last executing test programs: 4.141038284s ago: executing program 0 (id=3966): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x20008044) 3.80153819s ago: executing program 0 (id=3967): r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) r1 = epoll_create1(0x0) r2 = dup2(r1, r1) ioctl$TUNGETFEATURES(r2, 0x5451, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) fstatfs(r3, &(0x7f0000002140)=""/23) flistxattr(r3, &(0x7f0000000040)=""/72, 0x48) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002b00)={&(0x7f0000002ac0)={0x18, 0x3f9, 0x100, 0x70bd2d, 0x25dfdbfe}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x8090) 3.390367657s ago: executing program 0 (id=3968): syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$RTC_PLL_GET(r1, 0x801c7011, &(0x7f0000000080)) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000140)=0x1, 0x4) (async) close$binfmt(r1) (async) r3 = openat$udambuf(0xffffff9c, &(0x7f0000000180), 0x2) ioctl$XFS_IOC_SWAPEXT(r0, 0xc0a8586d, &(0x7f00000001c0)={0x0, r3, r2, 0x4, 0x1, '\x00', {0x8, 0x8, 0x5, 0xa0d2, 0x0, 0x1000, 0xf34, 0x100, {0x3, 0x101}, {0x10, 0x1}, {0x9, 0x60}, 0xb6, 0x0, 0xfffffff9, 0x6, 0x4, 0x0, 0x4, 0x4, 0x3, 0x0, '\x00', 0xeca00000, 0x3, 0x7ff, 0x87}}) (async) io_setup(0x347b, &(0x7f0000000280)=0x0) (async) r5 = openat$ubi_ctrl(0xffffff9c, &(0x7f00000002c0), 0x280, 0x0) io_submit(r4, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x6, r5, &(0x7f0000000300)="ce8b6fdd0ed71781c2", 0x9, 0x8000000000000001, 0x0, 0x2, r1}]) (async) syncfs(r2) io_destroy(r4) (async) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r5, 0x3ba0, &(0x7f00000003c0)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_GET_HW_INFO(r5, 0x3b8a, &(0x7f0000000500)={0x28, 0x0, r6, 0x87, &(0x7f0000000440)=""/135}) (async) r7 = getpgid(0x0) syz_pidfd_open(r7, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$urandom(0xffffff9c, &(0x7f0000000540), 0x400, 0x0) (async) io_setup(0x0, &(0x7f0000000580)=0x0) io_destroy(r8) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000005c0)={'wg1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000006c0)={'tunl0\x00', &(0x7f0000000600)={'syztnl1\x00', r9, 0x1, 0x8000, 0x3ff, 0xc, {{0x1c, 0x4, 0x3, 0x3a, 0x70, 0x66, 0x0, 0x40, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x1e}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x6c, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xb31}, {@multicast2, 0x1}, {@multicast2, 0x7}, {@multicast1, 0x3}, {@private=0xa010101, 0x5}]}, @rr={0x7, 0xf, 0x4c, [@dev={0xac, 0x14, 0x14, 0x16}, @broadcast, @remote]}, @ssrr={0x89, 0x13, 0xa1, [@multicast1, @rand_addr=0x64010101, @local, @private=0xa010101]}, @rr={0x7, 0x7, 0xd3, [@empty]}]}}}}}) ioctl$XFS_IOC_START_COMMIT(r2, 0x80585882, &(0x7f0000000700)) (async) r10 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$FITRIM(r10, 0xc0185879, &(0x7f0000000780)={0x5, 0x3ff, 0x1}) (async) close(r0) (async) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f00000007c0)=0x3ff) 3.008623434s ago: executing program 0 (id=3970): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_load(0xffffff9c, &(0x7f0000001140), 0x2, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000001500)={0x8, 'vlan1\x00', {'netdevsim0\x00'}, 0x89a}) 2.530704043s ago: executing program 0 (id=3973): r0 = openat$zero(0xffffff9c, &(0x7f0000000640), 0x228000, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x439c1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40000) 2.288902738s ago: executing program 0 (id=3975): socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') exit(0xfffc0000) r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system', 0x0, 0x0) ioctl$FITHAW(r4, 0x5450) kcmp(r2, r3, 0x4, r1, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1140, 0x0) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x0) r5 = openat$rtc(0xffffff9c, &(0x7f0000000100), 0x400000, 0x0) ioctl$XFS_IOC_FSGEOMETRY_V1(r5, 0x80705864, &(0x7f0000000080)) 1.62184411s ago: executing program 1 (id=3976): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x20008044) 1.351046865s ago: executing program 1 (id=3977): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_load(0xffffff9c, &(0x7f0000001140), 0x2, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000001500)={0x8, 'vlan1\x00', {'netdevsim0\x00'}, 0x8}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'tunl0\x00', {'syzkaller0\x00'}, 0x7}) 1.129981639s ago: executing program 1 (id=3978): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f00000046c0)={0x0, 0x0, &(0x7f0000004680)={&(0x7f0000004600)={0x20, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x8, 0x11}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4c010) r2 = getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x5450, 0x0) r4 = syz_pidfd_open(r2, 0x0) r5 = pidfd_getfd(r4, r3, 0x0) r6 = socket$nl_audit(0x10, 0x3, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r7, r8) sendmsg$NL80211_CMD_SET_INTERFACE(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x9001}, 0x4010) r9 = pidfd_getfd(r4, r6, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r5) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r9, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x28, r10, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0x11, 0x2a, [@supported_rates={0x1, 0x7, [{0x48, 0x1}, {0x6c, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x16, 0x1}, {0x18, 0x1}]}, @ibss={0x6, 0x2, 0xc366}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040810}, 0x28000000) mlockall(0x5) dup2(r4, r9) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040)=0x1, 0x4) r11 = openat$selinux_validatetrans(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r11, 0x5450, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002b00)={&(0x7f0000002ac0)={0x18, 0x3f9, 0x100, 0x70bd2d, 0x25dfdbfe}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x8090) 372.351233ms ago: executing program 1 (id=3979): r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x20, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x5f) syz_open_pts(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r2, 0xc0804124, &(0x7f0000000000)) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000002380)={0x0, 0x7}, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0xffffff46) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x5451, 0x0) 183.054897ms ago: executing program 1 (id=3980): openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x222343, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x6, 0x6, 0x93, 0x2, 0x10, @empty, @local, 0x40, 0x10, 0x7e44, 0x5a7}}) 0s ago: executing program 1 (id=3981): r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004}, 0x20008044) kernel console output (not intermixed with test programs): xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 899.088445][ T28] audit: type=1400 audit(1154.968:4375): avc: denied { read } for pid=12594 comm="syz.0.3367" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 899.137960][ T28] audit: type=1400 audit(1155.018:4376): avc: denied { read write } for pid=12594 comm="syz.0.3367" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 899.276733][ T28] audit: type=1400 audit(1155.158:4377): avc: denied { read } for pid=12596 comm="syz.0.3368" name="sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 903.966892][ T28] kauditd_printk_skb: 95 callbacks suppressed [ 903.967281][ T28] audit: type=1400 audit(1159.848:4473): avc: denied { create } for pid=12645 comm="syz.1.3392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 904.168325][ T28] audit: type=1400 audit(1160.048:4474): avc: denied { read write } for pid=12649 comm="syz.0.3393" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 904.196803][ T28] audit: type=1400 audit(1160.078:4475): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 904.215920][ T28] audit: type=1400 audit(1160.098:4476): avc: denied { create } for pid=12649 comm="syz.0.3393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 904.232145][ T28] audit: type=1400 audit(1160.108:4477): avc: denied { create } for pid=12649 comm="syz.0.3393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 904.247679][ T28] audit: type=1400 audit(1160.128:4478): avc: denied { read } for pid=12649 comm="syz.0.3393" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 904.309213][ T28] audit: type=1400 audit(1160.188:4479): avc: denied { allowed } for pid=12651 comm="syz.1.3394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 904.340540][ T28] audit: type=1400 audit(1160.218:4480): avc: denied { read write } for pid=12651 comm="syz.1.3394" name="dsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 904.366205][ T28] audit: type=1400 audit(1160.248:4481): avc: denied { read } for pid=12651 comm="syz.1.3394" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 904.386884][ T28] audit: type=1400 audit(1160.268:4482): avc: denied { create } for pid=12651 comm="syz.1.3394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 910.954552][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 910.957206][ T28] audit: type=1400 audit(1166.828:4532): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 911.036687][ T28] audit: type=1400 audit(1166.918:4533): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 911.051323][ T28] audit: type=1400 audit(1166.928:4534): avc: denied { read } for pid=12703 comm="syz.1.3417" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 911.060424][ T28] audit: type=1400 audit(1166.938:4535): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 911.074115][ T28] audit: type=1400 audit(1166.948:4536): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 911.083404][ T28] audit: type=1400 audit(1166.958:4537): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 911.095259][ T28] audit: type=1400 audit(1166.968:4538): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 911.100782][ T28] audit: type=1400 audit(1166.978:4539): avc: denied { read } for pid=12703 comm="syz.1.3417" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 911.113607][ T28] audit: type=1400 audit(1166.988:4540): avc: denied { create } for pid=12703 comm="syz.1.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 911.137896][ T28] audit: type=1400 audit(1167.018:4541): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 911.419092][T12710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12710 comm=syz.1.3419 [ 914.416204][T12723] FAULT_INJECTION: forcing a failure. [ 914.416204][T12723] name failslab, interval 1, probability 0, space 0, times 0 [ 914.416542][T12723] CPU: 1 UID: 0 PID: 12723 Comm: syz.1.3425 Not tainted syzkaller #0 PREEMPT [ 914.416593][T12723] Hardware name: ARM-Versatile Express [ 914.416607][T12723] Call trace: [ 914.416634][T12723] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 914.416695][T12723] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 914.416705][T12723] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 914.416733][T12723] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 914.416775][T12723] r7:00000d40 r6:00000000 r5:83860000 r4:82b17dc8 [ 914.416793][T12723] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 914.417060][T12723] [<809cd4cc>] (should_fail_ex) from [<8054edbc>] (should_failslab+0x6c/0x94) [ 914.417219][T12723] r8:00000000 r7:00000d40 r6:00000000 r5:00000000 r4:830c4600 [ 914.417358][T12723] [<8054ed50>] (should_failslab) from [<8052c0cc>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 914.417520][T12723] [<8052c078>] (kmem_cache_alloc_noprof) from [<807c16c4>] (security_inode_alloc+0x30/0x1d0) [ 914.417810][T12723] r10:8561f340 r9:00000000 r8:00000000 r7:00000c40 r6:830bf400 r5:8561f240 [ 914.417883][T12723] r4:8561f240 [ 914.417930][T12723] [<807c1694>] (security_inode_alloc) from [<805a5f24>] (inode_init_always_gfp+0x184/0x1d8) [ 914.418047][T12723] r5:00000000 r4:8561f240 [ 914.418363][T12723] [<805a5da0>] (inode_init_always_gfp) from [<805a9684>] (alloc_inode+0x40/0xd0) [ 914.418583][T12723] r10:0000011d r9:00000000 r8:00000000 r7:00000000 r6:81e59bc0 r5:830bf400 [ 914.419884][T12723] r4:8561f240 r3:00000001 [ 914.419959][T12723] [<805a9644>] (alloc_inode) from [<815ddf00>] (sock_alloc+0x20/0x78) [ 914.420109][T12723] r7:00000000 r6:eace5f5c r5:852ad881 r4:8565bbc0 [ 914.420176][T12723] [<815ddee0>] (sock_alloc) from [<815e1860>] (do_accept+0x64/0x174) [ 914.420322][T12723] r5:852ad881 r4:8565bbc0 [ 914.420372][T12723] [<815e17fc>] (do_accept) from [<815e19f8>] (__sys_accept4+0x88/0x108) [ 914.420515][T12723] r10:0000011d r9:00000000 r8:852ad880 r7:00000000 r6:00000000 r5:852ad881 [ 914.420577][T12723] r4:00000006 [ 914.420614][T12723] [<815e1970>] (__sys_accept4) from [<815e1aa0>] (sys_accept+0x14/0x18) [ 914.420873][T12723] r9:83860000 r8:8020029c r7:0000011d r6:0012f1a4 r5:00000000 r4:00000000 [ 914.420962][T12723] [<815e1a8c>] (sys_accept) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 914.421065][T12723] Exception stack(0xeace5fa8 to 0xeace5ff0) [ 914.421220][T12723] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 914.421313][T12723] 5fc0: 00000000 00000000 0012f1a4 0000011d 003462d8 00000000 00000001 76f740dc [ 914.421513][T12723] 5fe0: 76f73e88 76f73e78 00018e58 001307a0 [ 916.111227][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 916.111658][ T28] audit: type=1400 audit(1171.988:4587): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 916.333299][ T28] audit: type=1400 audit(1172.208:4588): avc: denied { accept } for pid=12742 comm="syz.1.3435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 916.377976][ T28] audit: type=1400 audit(1172.258:4589): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 916.542389][ T28] audit: type=1400 audit(1172.418:4590): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 916.730924][ T28] audit: type=1400 audit(1172.608:4591): avc: denied { create } for pid=12746 comm="syz.1.3437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 916.813996][ T28] audit: type=1400 audit(1172.688:4592): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 916.885454][ T28] audit: type=1400 audit(1172.768:4593): avc: denied { read write } for pid=12751 comm="syz.1.3438" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 916.945578][ T28] audit: type=1400 audit(1172.828:4594): avc: denied { create } for pid=12751 comm="syz.1.3438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 916.957724][ T28] audit: type=1400 audit(1172.838:4595): avc: denied { create } for pid=12751 comm="syz.1.3438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 916.975221][ T28] audit: type=1400 audit(1172.848:4596): avc: denied { read } for pid=12751 comm="syz.1.3438" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 921.145242][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 921.146790][ T28] audit: type=1400 audit(1177.018:4636): avc: denied { execmem } for pid=12788 comm="syz.1.3454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 922.054210][T12793] FAULT_INJECTION: forcing a failure. [ 922.054210][T12793] name failslab, interval 1, probability 0, space 0, times 0 [ 922.058434][T12793] CPU: 1 UID: 0 PID: 12793 Comm: syz.0.3455 Not tainted syzkaller #0 PREEMPT [ 922.058594][T12793] Hardware name: ARM-Versatile Express [ 922.058621][T12793] Call trace: [ 922.058666][T12793] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 922.058890][T12793] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 922.058964][T12793] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 922.059023][T12793] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 922.059084][T12793] r7:00000000 r6:00000000 r5:8453a4c0 r4:82b17dc8 [ 922.059100][T12793] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 922.059159][T12793] [<809cd4cc>] (should_fail_ex) from [<8054edbc>] (should_failslab+0x6c/0x94) [ 922.059233][T12793] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 922.059253][T12793] [<8054ed50>] (should_failslab) from [<8052d3bc>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 922.059316][T12793] [<8052d314>] (__kmalloc_node_track_caller_noprof) from [<804bc5b0>] (kmemdup_noprof+0x28/0x44) [ 922.059392][T12793] r10:00000025 r9:84e44604 r8:eb03db28 r7:85095000 r6:85323758 r5:eb03db20 [ 922.059417][T12793] r4:00000017 [ 922.059436][T12793] [<804bc588>] (kmemdup_noprof) from [<807e9e80>] (sidtab_sid2str_get+0x54/0xa4) [ 922.059511][T12793] r7:85095000 r6:eb03db28 r5:eb03db20 r4:850c30c0 [ 922.059529][T12793] [<807e9e2c>] (sidtab_sid2str_get) from [<807f1410>] (sidtab_entry_to_string+0x34/0x94) [ 922.059596][T12793] r7:85095000 r6:850c30c0 r5:eb03db20 r4:0000005f [ 922.059614][T12793] [<807f13dc>] (sidtab_entry_to_string) from [<807f1588>] (security_sid_to_context_core+0x118/0x17c) [ 922.059692][T12793] r9:eb03dc44 r8:85095000 r7:84e44604 r6:eb03db28 r5:eb03db20 r4:0000005f [ 922.059718][T12793] [<807f1470>] (security_sid_to_context_core) from [<807f44dc>] (security_sid_to_context+0x1c/0x24) [ 922.059789][T12793] r8:807d3ec0 r7:807d4c38 r6:8453a4c0 r5:860d2770 r4:eb03dbb0 [ 922.059810][T12793] [<807f44c0>] (security_sid_to_context) from [<807d4cb8>] (avc_audit_post_callback+0x80/0x32c) [ 922.059863][T12793] [<807d4c38>] (avc_audit_post_callback) from [<807fca78>] (common_lsm_audit+0x108/0x14c) [ 922.059938][T12793] r10:00000025 r9:eb03dc44 r8:807d3ec0 r7:807d4c38 r6:eb03dc44 r5:860d2770 [ 922.059961][T12793] r4:8453ace8 [ 922.059978][T12793] [<807fc970>] (common_lsm_audit) from [<807d517c>] (slow_avc_audit+0xbc/0x114) [ 922.060085][T12793] r8:00000025 r7:fffffff3 r6:0000005f r5:0000005f r4:0000005f [ 922.060108][T12793] [<807d50c0>] (slow_avc_audit) from [<807d5bd0>] (avc_has_perm+0xe4/0xf4) [ 922.060166][T12793] r5:0000005f r4:00400000 [ 922.060185][T12793] [<807d5aec>] (avc_has_perm) from [<807dc4e4>] (sock_has_perm+0xd8/0x104) [ 922.060259][T12793] r9:8453a4c0 r8:00400000 r7:8680e400 r6:8252f804 r5:8603c440 r4:00000000 [ 922.060280][T12793] [<807dc40c>] (sock_has_perm) from [<807dd008>] (selinux_netlink_send+0x1bc/0x258) [ 922.060380][T12793] r9:82cef37c r8:8252f804 r7:eb03dccc r6:00000010 r5:8313a6c0 r4:00000000 [ 922.060403][T12793] [<807dce4c>] (selinux_netlink_send) from [<807cd5c4>] (security_netlink_send+0x54/0x1ac) [ 922.060481][T12793] r10:00000000 r9:00000000 r8:eb03df30 r7:8680e400 r6:00000010 r5:83879a80 [ 922.060505][T12793] r4:8680e400 [ 922.060523][T12793] [<807cd570>] (security_netlink_send) from [<817163f4>] (netlink_sendmsg+0x1a0/0x444) [ 922.060591][T12793] r5:83879a80 r4:eb03df20 [ 922.060609][T12793] [<81716254>] (netlink_sendmsg) from [<815df1b8>] (__sock_sendmsg+0x44/0x78) [ 922.060716][T12793] r10:040000c0 r9:00000000 r8:eb03ddcc r7:00000000 r6:8349f6c0 r5:eb03df20 [ 922.060744][T12793] r4:00000000 [ 922.060764][T12793] [<815df174>] (__sock_sendmsg) from [<815e01e8>] (____sys_sendmsg+0x238/0x2c4) [ 922.060824][T12793] r7:00000000 r6:00000000 r5:8349f6c0 r4:eb03df20 [ 922.060841][T12793] [<815dffb0>] (____sys_sendmsg) from [<815e05e8>] (___sys_sendmsg+0x9c/0xd0) [ 922.060902][T12793] r10:00000128 r9:20000b80 r8:040000c0 r7:00000000 r6:8349f6c0 r5:eb03df20 [ 922.060931][T12793] r4:00000000 [ 922.060974][T12793] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 922.061101][T12793] r9:8453a4c0 r8:83313400 r7:040000c0 r6:20000b80 r5:83313401 r4:00000003 [ 922.061125][T12793] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 922.061187][T12793] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 922.061206][T12793] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 922.061255][T12793] Exception stack(0xeb03dfa8 to 0xeb03dff0) [ 922.061343][T12793] dfa0: 00000000 00000000 00000003 20000b80 040000c0 00000000 [ 922.061388][T12793] dfc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f5f0dc [ 922.061421][T12793] dfe0: 76f5ee88 76f5ee78 00018e58 001307a0 [ 922.148520][ T28] audit: type=1400 audit(1177.928:4637): avc: denied { nlmsg_write } for pid=12792 comm="syz.0.3455" scontext=root:sysadm_r:sysadm_t tsid=95 tclass=netlink_audit_socket permissive=0 [ 922.222486][ T28] audit: type=1400 audit(1178.098:4638): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.230367][ T28] audit: type=1400 audit(1178.108:4639): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.235992][ T28] audit: type=1400 audit(1178.118:4640): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 922.242906][ T28] audit: type=1400 audit(1178.118:4641): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.248231][ T28] audit: type=1400 audit(1178.128:4642): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.250500][ T28] audit: type=1400 audit(1178.128:4643): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.257994][ T28] audit: type=1400 audit(1178.128:4644): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 922.261656][ T28] audit: type=1400 audit(1178.128:4645): avc: denied { create } for pid=12794 comm="syz.0.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 924.198585][T12825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12825 comm=syz.0.3467 [ 926.186044][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 926.188587][ T28] audit: type=1400 audit(1182.068:4718): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 926.249082][ T28] audit: type=1400 audit(1182.128:4719): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.252394][ T28] audit: type=1400 audit(1182.128:4720): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.258948][ T28] audit: type=1400 audit(1182.138:4721): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.269727][ T28] audit: type=1400 audit(1182.148:4722): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.278046][ T28] audit: type=1400 audit(1182.158:4723): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.291196][ T28] audit: type=1400 audit(1182.168:4724): avc: denied { read } for pid=12842 comm="syz.1.3475" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 926.297259][ T28] audit: type=1400 audit(1182.178:4725): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 926.322119][ T28] audit: type=1400 audit(1182.198:4726): avc: denied { read } for pid=12842 comm="syz.1.3475" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 926.336790][ T28] audit: type=1400 audit(1182.218:4727): avc: denied { create } for pid=12842 comm="syz.1.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 927.827052][T12857] FAULT_INJECTION: forcing a failure. [ 927.827052][T12857] name failslab, interval 1, probability 0, space 0, times 0 [ 927.827574][T12857] CPU: 1 UID: 0 PID: 12857 Comm: syz.0.3480 Not tainted syzkaller #0 PREEMPT [ 927.827724][T12857] Hardware name: ARM-Versatile Express [ 927.827765][T12857] Call trace: [ 927.827817][T12857] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 927.827996][T12857] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 927.828132][T12857] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 927.828227][T12857] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 927.828333][T12857] r7:00000000 r6:00000000 r5:83f5b100 r4:82b17dc8 [ 927.828378][T12857] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 927.828599][T12857] [<809cd4cc>] (should_fail_ex) from [<8054edbc>] (should_failslab+0x6c/0x94) [ 927.828695][T12857] r8:ffffffff r7:00000000 r6:83001240 r5:00000820 r4:00000017 [ 927.828745][T12857] [<8054ed50>] (should_failslab) from [<8052d3bc>] (__kmalloc_node_track_caller_noprof+0xa8/0x3bc) [ 927.828813][T12857] [<8052d314>] (__kmalloc_node_track_caller_noprof) from [<804bc5b0>] (kmemdup_noprof+0x28/0x44) [ 927.828883][T12857] r10:00000000 r9:84e44604 r8:eba95bac r7:85095000 r6:85323758 r5:eba95ba4 [ 927.828906][T12857] r4:00000017 [ 927.828926][T12857] [<804bc588>] (kmemdup_noprof) from [<807e9e80>] (sidtab_sid2str_get+0x54/0xa4) [ 927.829009][T12857] r7:85095000 r6:eba95bac r5:eba95ba4 r4:850c30c0 [ 927.829036][T12857] [<807e9e2c>] (sidtab_sid2str_get) from [<807f1410>] (sidtab_entry_to_string+0x34/0x94) [ 927.829110][T12857] r7:85095000 r6:850c30c0 r5:eba95ba4 r4:0000005f [ 927.829130][T12857] [<807f13dc>] (sidtab_entry_to_string) from [<807f1588>] (security_sid_to_context_core+0x118/0x17c) [ 927.829202][T12857] r9:eba95cec r8:85095000 r7:84e44604 r6:eba95bac r5:eba95ba4 r4:0000005f [ 927.829226][T12857] [<807f1470>] (security_sid_to_context_core) from [<807f44dc>] (security_sid_to_context+0x1c/0x24) [ 927.829288][T12857] r8:807d3ec0 r7:807d4c38 r6:83f5b100 r5:860d2738 r4:eba95c38 [ 927.829307][T12857] [<807f44c0>] (security_sid_to_context) from [<807d4c84>] (avc_audit_post_callback+0x4c/0x32c) [ 927.829356][T12857] [<807d4c38>] (avc_audit_post_callback) from [<807fca78>] (common_lsm_audit+0x108/0x14c) [ 927.829415][T12857] r10:00000000 r9:eba95cec r8:807d3ec0 r7:807d4c38 r6:eba95cec r5:860d2738 [ 927.829438][T12857] r4:83f5b928 [ 927.829458][T12857] [<807fc970>] (common_lsm_audit) from [<807d517c>] (slow_avc_audit+0xbc/0x114) [ 927.829518][T12857] r8:0000000e r7:fffffff3 r6:0000005f r5:0000005f r4:0000005f [ 927.829536][T12857] [<807d50c0>] (slow_avc_audit) from [<807d5bd0>] (avc_has_perm+0xe4/0xf4) [ 927.829589][T12857] r5:0000005f r4:00000020 [ 927.829607][T12857] [<807d5aec>] (avc_has_perm) from [<807e0f10>] (selinux_inode_setxattr+0x258/0x368) [ 927.829668][T12857] r9:86122788 r8:83f5b100 r7:8559e780 r6:8626af80 r5:855513b8 r4:8252f804 [ 927.829689][T12857] [<807e0cb8>] (selinux_inode_setxattr) from [<807c40d8>] (security_inode_setxattr+0x160/0x3e8) [ 927.829848][T12857] r10:807e0cb8 r9:00000002 r8:00000000 r7:82b1ed00 r6:00000000 r5:855513b8 [ 927.829948][T12857] r4:eba95e54 [ 927.829972][T12857] [<807c3f78>] (security_inode_setxattr) from [<805bbdfc>] (__vfs_setxattr_locked+0x64/0x12c) [ 927.830095][T12857] r10:eba95db8 r9:00000000 r8:8559e780 r7:00000000 r6:eba95e54 r5:82b1ed00 [ 927.830163][T12857] r4:855513b8 [ 927.830282][T12857] [<805bbd98>] (__vfs_setxattr_locked) from [<805bbf64>] (vfs_setxattr+0xa0/0x180) [ 927.830353][T12857] r8:00000000 r7:00000000 r6:855513b8 r5:8559e800 r4:eba95e40 [ 927.830409][T12857] [<805bbec4>] (vfs_setxattr) from [<805bc0d8>] (do_setxattr+0x94/0x9c) [ 927.830484][T12857] r10:00000002 r9:855513b8 r8:82b1ed00 r7:00000000 r6:00000000 r5:eba95e54 [ 927.830561][T12857] r4:eba95e40 [ 927.830609][T12857] [<805bc044>] (do_setxattr) from [<805bc314>] (file_setxattr+0x58/0x78) [ 927.830746][T12857] r9:00000000 r8:00000003 r7:85318b81 r6:eba95e40 r5:85318b80 r4:00000000 [ 927.830893][T12857] [<805bc2bc>] (file_setxattr) from [<805bc574>] (path_setxattrat+0x168/0x1bc) [ 927.831046][T12857] r7:85318b81 r6:85318b80 r5:00000000 r4:00000018 [ 927.831070][T12857] [<805bc40c>] (path_setxattrat) from [<805bc7c8>] (sys_fsetxattr+0x30/0x38) [ 927.831149][T12857] r10:000000e4 r9:83f5b100 r8:8020029c r7:000000e4 r6:0012f1a4 r5:00000000 [ 927.831263][T12857] r4:00000002 [ 927.831406][T12857] [<805bc798>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 927.831499][T12857] Exception stack(0xeba95fa8 to 0xeba95ff0) [ 927.831567][T12857] 5fa0: 00000002 00000000 00000003 20004c00 00000000 00000000 [ 927.831677][T12857] 5fc0: 00000002 00000000 0012f1a4 000000e4 003462d8 00000000 00000001 76f5f0dc [ 927.831713][T12857] 5fe0: 76f5ee88 76f5ee78 00018e58 001307a0 [ 930.386461][T12893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12893 comm=syz.0.3494 [ 931.288311][ T28] kauditd_printk_skb: 165 callbacks suppressed [ 931.288836][ T28] audit: type=1400 audit(1187.168:4893): avc: denied { create } for pid=12899 comm="syz.0.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 931.335206][ T28] audit: type=1400 audit(1187.208:4894): avc: denied { create } for pid=12899 comm="syz.0.3497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 931.357966][ T28] audit: type=1400 audit(1187.238:4895): avc: denied { read } for pid=12899 comm="syz.0.3497" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 931.577023][ T28] audit: type=1400 audit(1187.458:4896): avc: denied { read } for pid=12902 comm="syz.0.3498" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 931.616238][ T28] audit: type=1400 audit(1187.498:4897): avc: denied { read } for pid=12902 comm="syz.0.3498" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 931.750577][ T28] audit: type=1400 audit(1187.628:4898): avc: denied { create } for pid=12902 comm="syz.0.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 931.880366][ T28] audit: type=1400 audit(1187.758:4899): avc: denied { read } for pid=12902 comm="syz.0.3498" name="fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 932.258031][ T28] audit: type=1400 audit(1188.138:4900): avc: denied { read } for pid=12904 comm="syz.0.3499" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 932.329334][ T28] audit: type=1400 audit(1188.208:4901): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 932.408278][ T28] audit: type=1400 audit(1188.288:4902): avc: denied { create } for pid=12904 comm="syz.0.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 932.433351][T12907] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12907 comm=syz.1.3500 [ 932.495347][T12905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12905 comm=syz.0.3499 [ 936.336054][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 936.336489][ T28] audit: type=1400 audit(1192.218:4916): avc: denied { create } for pid=12918 comm="syz.0.3505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 936.679517][ T28] audit: type=1400 audit(1192.558:4917): avc: denied { read write } for pid=12921 comm="syz.0.3506" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 936.700432][ T28] audit: type=1400 audit(1192.578:4918): avc: denied { map_create } for pid=12921 comm="syz.0.3506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 936.716846][ T28] audit: type=1400 audit(1192.598:4919): avc: denied { read write } for pid=12921 comm="syz.0.3506" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 936.728307][ T28] audit: type=1400 audit(1192.608:4920): avc: denied { read } for pid=12921 comm="syz.0.3506" name="timer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 937.067365][ T28] audit: type=1400 audit(1192.948:4921): avc: denied { read write } for pid=12923 comm="syz.0.3507" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 937.212966][ T28] audit: type=1400 audit(1193.088:4922): avc: denied { create } for pid=12923 comm="syz.0.3507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 937.240097][ T28] audit: type=1400 audit(1193.118:4923): avc: denied { create } for pid=12923 comm="syz.0.3507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 937.265995][ T28] audit: type=1400 audit(1193.148:4924): avc: denied { read } for pid=12923 comm="syz.0.3507" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 937.640970][ T28] audit: type=1400 audit(1193.518:4925): avc: denied { name_bind } for pid=12928 comm="syz.0.3509" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 942.356223][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 942.359049][ T28] audit: type=1400 audit(1198.238:4937): avc: denied { prog_load } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.406191][ T28] audit: type=1400 audit(1198.288:4938): avc: denied { map_create } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.455020][ T28] audit: type=1400 audit(1198.328:4939): avc: denied { prog_load } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.465490][ T28] audit: type=1400 audit(1198.338:4940): avc: denied { map_create } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.488315][ T28] audit: type=1400 audit(1198.368:4941): avc: denied { prog_load } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.513299][ T28] audit: type=1400 audit(1198.388:4942): avc: denied { prog_load } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 942.636212][ T28] audit: type=1400 audit(1198.518:4943): avc: denied { prog_load } for pid=12943 comm="syz.0.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 943.195240][ T28] audit: type=1400 audit(1199.068:4944): avc: denied { create } for pid=12950 comm="syz.0.3518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 943.212983][ T28] audit: type=1400 audit(1199.088:4945): avc: denied { create } for pid=12950 comm="syz.0.3518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 943.233374][ T28] audit: type=1400 audit(1199.108:4946): avc: denied { create } for pid=12950 comm="syz.0.3518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 947.886832][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 947.890382][ T28] audit: type=1400 audit(1203.768:4958): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 948.079434][ T28] audit: type=1400 audit(1203.958:4959): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 948.241141][ T28] audit: type=1400 audit(1204.118:4960): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 948.325037][ T28] audit: type=1400 audit(1204.198:4961): avc: denied { read write } for pid=12974 comm="syz.1.3528" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 948.369674][ T28] audit: type=1400 audit(1204.248:4962): avc: denied { create } for pid=12974 comm="syz.1.3528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 948.390573][ T28] audit: type=1400 audit(1204.268:4963): avc: denied { create } for pid=12974 comm="syz.1.3528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 948.392730][ T28] audit: type=1400 audit(1204.268:4964): avc: denied { read } for pid=12974 comm="syz.1.3528" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 948.432829][ T28] audit: type=1400 audit(1204.308:4965): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 948.634970][ T28] audit: type=1400 audit(1204.498:4966): avc: denied { create } for pid=12976 comm="syz.1.3529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 948.701849][ T28] audit: type=1400 audit(1204.578:4967): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 951.225413][T12985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12985 comm=syz.0.3532 [ 953.362879][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 953.365760][ T28] audit: type=1400 audit(1209.238:4980): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 953.521899][T13018] FAULT_INJECTION: forcing a failure. [ 953.521899][T13018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.522320][T13018] CPU: 0 UID: 0 PID: 13018 Comm: syz.1.3538 Not tainted syzkaller #0 PREEMPT [ 953.522408][T13018] Hardware name: ARM-Versatile Express [ 953.522433][T13018] Call trace: [ 953.522476][T13018] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 953.522823][T13018] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 953.523493][T13018] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 953.523773][T13018] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 953.524373][T13018] r7:20000340 r6:00000000 r5:8318e200 r4:82b4ee88 [ 953.524565][T13018] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 953.524647][T13018] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 953.524731][T13018] r8:00000000 r7:20000340 r6:ec171e28 r5:00000000 r4:ec171f20 [ 953.524752][T13018] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 953.524818][T13018] [<809cd708>] (should_fail_usercopy) from [<815e03bc>] (copy_msghdr_from_user+0x50/0x1e0) [ 953.524893][T13018] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 953.524972][T13018] r8:00000000 r7:00000000 r6:856151c0 r5:ec171f20 r4:ec171e6c [ 953.525008][T13018] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 953.525084][T13018] r9:8318e200 r8:862c0580 r7:00000000 r6:20000340 r5:862c0581 r4:00000003 [ 953.525135][T13018] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 953.525202][T13018] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 953.525220][T13018] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 953.525267][T13018] Exception stack(0xec171fa8 to 0xec171ff0) [ 953.525343][T13018] 1fa0: 00000000 00000000 00000003 20000340 00000000 00000000 [ 953.525383][T13018] 1fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f740dc [ 953.525473][T13018] 1fe0: 76f73e88 76f73e78 00018e58 001307a0 [ 953.605607][ T28] audit: type=1400 audit(1209.478:4981): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 953.748828][ T28] audit: type=1400 audit(1209.628:4982): avc: denied { read } for pid=13019 comm="syz.1.3539" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 953.789717][ T28] audit: type=1400 audit(1209.668:4983): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 953.808453][ T28] audit: type=1400 audit(1209.688:4984): avc: denied { create } for pid=13015 comm="syz.0.3537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 953.818810][ T28] audit: type=1400 audit(1209.698:4985): avc: denied { create } for pid=13015 comm="syz.0.3537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 953.857829][ T28] audit: type=1400 audit(1209.738:4986): avc: denied { read append } for pid=13022 comm="syz.1.3540" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 953.862453][ T28] audit: type=1400 audit(1209.738:4987): avc: denied { create } for pid=13022 comm="syz.1.3540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 953.868531][ T28] audit: type=1400 audit(1209.748:4988): avc: denied { read } for pid=13015 comm="syz.0.3537" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 953.872788][ T28] audit: type=1400 audit(1209.748:4989): avc: denied { create } for pid=13022 comm="syz.1.3540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 957.511439][T13056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13056 comm=syz.1.3553 [ 958.380159][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 958.380577][ T28] audit: type=1400 audit(1214.258:5040): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 959.149084][ T28] audit: type=1400 audit(1215.028:5041): avc: denied { create } for pid=13065 comm="syz.1.3558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 960.487023][ T28] audit: type=1400 audit(1216.368:5042): avc: denied { read write } for pid=13069 comm="syz.0.3559" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 960.524013][ T28] audit: type=1400 audit(1216.398:5043): avc: denied { read write } for pid=13069 comm="syz.0.3559" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 960.687589][T13075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13075 comm=syz.0.3560 [ 960.691299][ T28] audit: type=1400 audit(1216.568:5044): avc: denied { create } for pid=13074 comm="syz.0.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 960.718873][ T28] audit: type=1400 audit(1216.598:5045): avc: denied { create } for pid=13074 comm="syz.0.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 960.994257][ T28] audit: type=1400 audit(1216.868:5046): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 961.259750][ T28] audit: type=1400 audit(1217.138:5047): avc: denied { create } for pid=13078 comm="syz.1.3562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 961.319641][ T28] audit: type=1400 audit(1217.188:5048): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 961.490332][ T28] audit: type=1400 audit(1217.368:5049): avc: denied { name_bind } for pid=13080 comm="syz.1.3563" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 965.220688][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 965.221234][ T28] audit: type=1400 audit(1221.098:5051): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 965.346545][ T28] audit: type=1400 audit(1221.228:5052): avc: denied { create } for pid=13086 comm="syz.1.3564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 965.487016][ T28] audit: type=1400 audit(1221.358:5053): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 965.649694][ T28] audit: type=1400 audit(1221.528:5054): avc: denied { read append } for pid=13088 comm="syz.1.3565" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 965.693419][ T28] audit: type=1400 audit(1221.568:5055): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 965.884771][ T28] audit: type=1400 audit(1221.758:5056): avc: denied { read } for pid=13090 comm="syz.1.3566" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 965.930825][ T28] audit: type=1400 audit(1221.808:5057): avc: denied { read append } for pid=13090 comm="syz.1.3566" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 966.013455][ T28] audit: type=1400 audit(1221.888:5058): avc: denied { read } for pid=13090 comm="syz.1.3566" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ping_exec_t:s0" [ 966.119958][ T28] audit: type=1400 audit(1221.998:5059): avc: denied { create } for pid=13090 comm="syz.1.3566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 966.162044][ T28] audit: type=1400 audit(1222.038:5060): avc: denied { read } for pid=13090 comm="syz.1.3566" name="mouse0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 971.881815][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 971.885075][ T28] audit: type=1400 audit(1227.758:5072): avc: denied { create } for pid=13107 comm="syz.0.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 971.890808][ T28] audit: type=1400 audit(1227.768:5073): avc: denied { create } for pid=13107 comm="syz.0.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 972.015319][ T28] audit: type=1400 audit(1227.888:5074): avc: denied { create } for pid=13109 comm="syz.0.3574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 972.022122][ T28] audit: type=1400 audit(1227.898:5075): avc: denied { read } for pid=13109 comm="syz.0.3574" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 972.053819][ T28] audit: type=1400 audit(1227.928:5076): avc: denied { create } for pid=13109 comm="syz.0.3574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 972.209813][ T28] audit: type=1400 audit(1228.088:5077): avc: denied { read write } for pid=13111 comm="syz.0.3575" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 972.219993][ T28] audit: type=1400 audit(1228.098:5078): avc: denied { read } for pid=13111 comm="syz.0.3575" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 972.272250][ T28] audit: type=1400 audit(1228.148:5079): avc: denied { write } for pid=13111 comm="syz.0.3575" name="dmmidi2" dev="devtmpfs" ino=742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 972.474314][ T28] audit: type=1400 audit(1228.348:5080): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 972.558124][ T28] audit: type=1400 audit(1228.438:5081): avc: denied { create } for pid=13113 comm="syz.0.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 974.028201][T13141] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13141 comm=syz.1.3588 [ 974.823189][T13153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13153 comm=syz.1.3594 [ 975.413662][T13167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13167 comm=syz.0.3600 [ 976.539765][T13177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13177 comm=syz.0.3605 [ 977.023518][ T28] kauditd_printk_skb: 184 callbacks suppressed [ 977.025186][ T28] audit: type=1400 audit(1232.898:5266): avc: denied { write } for pid=13184 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 977.066407][ T28] audit: type=1400 audit(1232.938:5267): avc: denied { search } for pid=13184 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.115326][ T28] audit: type=1400 audit(1232.988:5268): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.115878][ T28] audit: type=1400 audit(1232.988:5269): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.116428][ T28] audit: type=1400 audit(1232.988:5270): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.116522][ T28] audit: type=1400 audit(1232.988:5271): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.116581][ T28] audit: type=1400 audit(1232.988:5272): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.116631][ T28] audit: type=1400 audit(1232.988:5273): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.116701][ T28] audit: type=1400 audit(1232.988:5274): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 977.118879][ T28] audit: type=1400 audit(1232.998:5275): avc: denied { search } for pid=13186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 979.419080][T13215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13215 comm=syz.1.3619 [ 979.757134][T13219] FAULT_INJECTION: forcing a failure. [ 979.757134][T13219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 979.759274][T13219] CPU: 0 UID: 0 PID: 13219 Comm: syz.1.3621 Not tainted syzkaller #0 PREEMPT [ 979.759404][T13219] Hardware name: ARM-Versatile Express [ 979.759434][T13219] Call trace: [ 979.759485][T13219] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 979.759604][T13219] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 979.759630][T13219] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 979.759700][T13219] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 979.759765][T13219] r7:20002b40 r6:00000000 r5:83f56200 r4:82b4ee88 [ 979.759784][T13219] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 979.759849][T13219] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 979.759913][T13219] r8:00008090 r7:20002b40 r6:f3129e28 r5:00000000 r4:f3129f20 [ 979.759933][T13219] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 979.759985][T13219] [<809cd708>] (should_fail_usercopy) from [<815e03bc>] (copy_msghdr_from_user+0x50/0x1e0) [ 979.760046][T13219] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 979.760102][T13219] r8:00008090 r7:00000000 r6:855d5440 r5:f3129f20 r4:f3129e6c [ 979.760120][T13219] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 979.760179][T13219] r9:83f56200 r8:83311700 r7:00008090 r6:20002b40 r5:83311701 r4:00000003 [ 979.760196][T13219] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 979.760251][T13219] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 979.760268][T13219] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 979.760309][T13219] Exception stack(0xf3129fa8 to 0xf3129ff0) [ 979.760344][T13219] 9fa0: 00000000 00000000 00000003 20002b40 00008090 00000000 [ 979.760411][T13219] 9fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f740dc [ 979.760440][T13219] 9fe0: 76f73e88 76f73e78 00018e58 001307a0 [ 982.116181][ T28] kauditd_printk_skb: 109 callbacks suppressed [ 982.116596][ T28] audit: type=1400 audit(1237.988:5385): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 982.176627][ T28] audit: type=1400 audit(1238.058:5386): avc: denied { create } for pid=13256 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 982.228818][ T28] audit: type=1400 audit(1238.108:5387): avc: denied { create } for pid=13256 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 982.233361][ T28] audit: type=1400 audit(1238.108:5388): avc: denied { create } for pid=13256 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 982.249888][ T28] audit: type=1400 audit(1238.128:5389): avc: denied { read write } for pid=13257 comm="syz.1.3640" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 982.254215][ T28] audit: type=1400 audit(1238.128:5390): avc: denied { create } for pid=13257 comm="syz.1.3640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 982.269387][ T28] audit: type=1400 audit(1238.148:5391): avc: denied { create } for pid=13257 comm="syz.1.3640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 982.288396][ T28] audit: type=1400 audit(1238.168:5392): avc: denied { create } for pid=13256 comm="syz.0.3639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 982.300335][ T28] audit: type=1400 audit(1238.178:5393): avc: denied { nlmsg_write } for pid=13257 comm="syz.1.3640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 982.345669][ T28] audit: type=1400 audit(1238.218:5394): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 987.698499][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 987.700572][ T28] audit: type=1400 audit(1243.578:5462): avc: denied { read write } for pid=13315 comm="syz.0.3666" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 990.393594][ T28] audit: type=1400 audit(1246.268:5463): avc: denied { read write } for pid=13321 comm="syz.0.3668" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 990.446268][ T28] audit: type=1400 audit(1246.328:5464): avc: denied { create } for pid=13321 comm="syz.0.3668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 990.478813][ T28] audit: type=1400 audit(1246.358:5465): avc: denied { create } for pid=13321 comm="syz.0.3668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 990.481508][ T28] audit: type=1400 audit(1246.358:5466): avc: denied { read } for pid=13321 comm="syz.0.3668" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 990.619880][ T28] audit: type=1400 audit(1246.498:5467): avc: denied { create } for pid=13323 comm="syz.0.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 990.638119][ T28] audit: type=1400 audit(1246.518:5468): avc: denied { create } for pid=13323 comm="syz.0.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 990.649376][ T28] audit: type=1400 audit(1246.518:5469): avc: denied { allowed } for pid=13323 comm="syz.0.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 990.670601][ T28] audit: type=1400 audit(1246.548:5470): avc: denied { create } for pid=13323 comm="syz.0.3669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 990.694952][ T28] audit: type=1400 audit(1246.568:5471): avc: denied { read } for pid=13323 comm="syz.0.3669" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 990.971337][T13328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13328 comm=syz.0.3671 [ 993.679401][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 993.681806][ T28] audit: type=1400 audit(1249.558:5484): avc: denied { read write } for pid=13332 comm="syz.0.3673" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 993.726182][ T28] audit: type=1400 audit(1249.608:5485): avc: denied { create } for pid=13332 comm="syz.0.3673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 993.743020][ T28] audit: type=1400 audit(1249.618:5486): avc: denied { create } for pid=13332 comm="syz.0.3673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 993.747796][ T28] audit: type=1400 audit(1249.628:5487): avc: denied { read } for pid=13332 comm="syz.0.3673" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 993.857001][ T28] audit: type=1400 audit(1249.738:5488): avc: denied { read write } for pid=13334 comm="syz.0.3674" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 993.884243][ T28] audit: type=1400 audit(1249.758:5489): avc: denied { create } for pid=13334 comm="syz.0.3674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 993.890320][ T28] audit: type=1400 audit(1249.768:5490): avc: denied { create } for pid=13334 comm="syz.0.3674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 994.030636][ T28] audit: type=1400 audit(1249.908:5491): avc: denied { read } for pid=13336 comm="syz.0.3675" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 994.054075][ T28] audit: type=1400 audit(1249.928:5492): avc: denied { read write } for pid=13336 comm="syz.0.3675" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 994.077222][ T28] audit: type=1400 audit(1249.958:5493): avc: denied { create } for pid=13336 comm="syz.0.3675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 997.795643][T13361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pid=13361 comm=syz.1.3687 [ 997.880394][T13361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13361 comm=syz.1.3687 [ 998.271424][T13368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13368 comm=syz.1.3690 [ 998.273081][T13368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13368 comm=syz.1.3690 [ 998.669060][T13378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pid=13378 comm=syz.1.3695 [ 998.691057][T13378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13378 comm=syz.1.3695 [ 998.775148][ T28] kauditd_printk_skb: 62 callbacks suppressed [ 998.775542][ T28] audit: type=1400 audit(1254.648:5556): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 998.832034][T13382] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13382 comm=syz.1.3697 [ 998.836640][T13382] FAULT_INJECTION: forcing a failure. [ 998.836640][T13382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 998.843220][T13382] CPU: 1 UID: 0 PID: 13382 Comm: syz.1.3697 Not tainted syzkaller #0 PREEMPT [ 998.843327][T13382] Hardware name: ARM-Versatile Express [ 998.843347][T13382] Call trace: [ 998.843379][T13382] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 998.843501][T13382] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 998.843516][T13382] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 998.843558][T13382] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 998.843607][T13382] r7:00000000 r6:00000000 r5:83f5bd40 r4:82b4ee88 [ 998.843619][T13382] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 998.843666][T13382] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 998.843732][T13382] r8:76f73f08 r7:00000000 r6:00000000 r5:f3c49f68 r4:00000002 [ 998.843746][T13382] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 998.843791][T13382] [<809cd708>] (should_fail_usercopy) from [<805bf3dc>] (simple_read_from_buffer+0x80/0x140) [ 998.843836][T13382] [<805bf35c>] (simple_read_from_buffer) from [<80643a94>] (proc_fail_nth_read+0xb8/0x108) [ 998.843890][T13382] r10:806439dc r9:00000001 r8:00000002 r7:f3c49f68 r6:0000000f r5:76f73f08 [ 998.843908][T13382] r4:83f5bd40 r3:f3c49e9f [ 998.843921][T13382] [<806439dc>] (proc_fail_nth_read) from [<80580890>] (vfs_read+0xc0/0x328) [ 998.843981][T13382] r8:83f5bd40 r7:f3c49f68 r6:76f73f08 r5:862c0b80 r4:0000000f [ 998.843994][T13382] [<805807d0>] (vfs_read) from [<80581524>] (ksys_read+0x74/0xec) [ 998.844048][T13382] r10:00000003 r9:83f5bd40 r8:8020029c r7:00000000 r6:00000000 r5:862c0b80 [ 998.844062][T13382] r4:862c0b83 [ 998.844074][T13382] [<805814b0>] (ksys_read) from [<805815ac>] (sys_read+0x10/0x14) [ 998.844123][T13382] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 998.844136][T13382] [<8058159c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 998.844174][T13382] Exception stack(0xf3c49fa8 to 0xf3c49ff0) [ 998.844201][T13382] 9fa0: 00000000 00000000 00000004 76f73f08 0000000f 00000000 [ 998.844225][T13382] 9fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f740dc [ 998.844244][T13382] 9fe0: 76f73e58 76f73e44 0010b9c4 001125a8 [ 998.881503][ T28] audit: type=1400 audit(1254.758:5557): avc: denied { create } for pid=13379 comm="syz.0.3696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 998.923448][ T28] audit: type=1400 audit(1254.798:5558): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 998.939189][ T28] audit: type=1400 audit(1254.818:5559): avc: denied { nlmsg_write } for pid=13379 comm="syz.0.3696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 999.089396][ T28] audit: type=1400 audit(1254.968:5560): avc: denied { read write } for pid=13384 comm="syz.0.3699" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 999.091392][ T28] audit: type=1400 audit(1254.968:5561): avc: denied { prog_load } for pid=13383 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 999.095828][ T28] audit: type=1400 audit(1254.968:5562): avc: denied { prog_load } for pid=13383 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 999.134936][ T28] audit: type=1400 audit(1255.008:5563): avc: denied { create } for pid=13383 comm="syz.1.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 999.137164][ T28] audit: type=1400 audit(1255.018:5564): avc: denied { create } for pid=13384 comm="syz.0.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 999.148012][ T28] audit: type=1400 audit(1255.028:5565): avc: denied { create } for pid=13384 comm="syz.0.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1004.713701][ T28] kauditd_printk_skb: 55 callbacks suppressed [ 1004.714140][ T28] audit: type=1400 audit(1260.588:5621): avc: denied { create } for pid=13422 comm="syz.0.3714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1004.947132][ T28] audit: type=1400 audit(1260.828:5622): avc: denied { create } for pid=13425 comm="syz.0.3715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1004.966793][T13426] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=527 sclass=netlink_audit_socket pid=13426 comm=syz.0.3715 [ 1005.096423][ T28] audit: type=1400 audit(1260.978:5623): avc: denied { read write } for pid=13427 comm="syz.0.3716" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1005.111817][ T28] audit: type=1400 audit(1260.988:5624): avc: denied { read } for pid=13427 comm="syz.0.3716" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1005.183961][ T28] audit: type=1400 audit(1261.058:5625): avc: denied { read write } for pid=13429 comm="syz.0.3717" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1005.223657][ T28] audit: type=1400 audit(1261.098:5626): avc: denied { create } for pid=13429 comm="syz.0.3717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 1005.228506][ T28] audit: type=1400 audit(1261.108:5627): avc: denied { create } for pid=13429 comm="syz.0.3717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1005.231937][ T28] audit: type=1400 audit(1261.108:5628): avc: denied { read } for pid=13429 comm="syz.0.3717" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1005.338141][ T28] audit: type=1400 audit(1261.218:5629): avc: denied { write } for pid=13431 comm="syz.0.3718" name="i2c-0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1005.483660][ T28] audit: type=1400 audit(1261.358:5630): avc: denied { read } for pid=13436 comm="syz.0.3719" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1006.266440][T13442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13442 comm=syz.0.3721 [ 1008.061434][T13460] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13460 comm=syz.1.3730 [ 1009.096042][T13473] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13473 comm=syz.0.3736 [ 1010.680531][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 1010.681164][ T28] audit: type=1400 audit(1266.558:5678): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1010.851124][ T28] audit: type=1400 audit(1266.728:5679): avc: denied { allowed } for pid=13480 comm="syz.1.3739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1010.897051][ T28] audit: type=1400 audit(1266.778:5680): avc: denied { read write } for pid=13480 comm="syz.1.3739" name="dsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1011.016866][ T28] audit: type=1400 audit(1266.898:5681): avc: denied { read } for pid=13480 comm="syz.1.3739" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1011.044914][ T28] audit: type=1400 audit(1266.918:5682): avc: denied { create } for pid=13480 comm="syz.1.3739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1011.225528][ T28] audit: type=1400 audit(1267.068:5683): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1011.395215][ T28] audit: type=1400 audit(1267.268:5684): avc: denied { create } for pid=13483 comm="syz.1.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1011.649701][ T28] audit: type=1400 audit(1267.528:5685): avc: denied { name_bind } for pid=13483 comm="syz.1.3740" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 1014.579814][ T28] audit: type=1400 audit(1270.458:5686): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1014.777071][ T28] audit: type=1400 audit(1270.658:5687): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1015.689945][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 1015.690460][ T28] audit: type=1400 audit(1271.568:5695): avc: denied { allowed } for pid=13494 comm="syz.1.3744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1015.702166][ T28] audit: type=1400 audit(1271.578:5696): avc: denied { read write } for pid=13494 comm="syz.1.3744" name="dsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1015.712103][ T28] audit: type=1400 audit(1271.588:5697): avc: denied { read } for pid=13494 comm="syz.1.3744" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1015.716192][ T28] audit: type=1400 audit(1271.598:5698): avc: denied { create } for pid=13494 comm="syz.1.3744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1015.772517][ T28] audit: type=1400 audit(1271.648:5699): avc: denied { create } for pid=13496 comm="syz.0.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1015.817002][ T28] audit: type=1400 audit(1271.698:5700): avc: denied { name_bind } for pid=13496 comm="syz.0.3745" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 1015.895327][ T28] audit: type=1400 audit(1271.758:5701): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1016.341315][ T28] audit: type=1400 audit(1272.218:5702): avc: denied { nlmsg_write } for pid=13498 comm="syz.1.3746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 1016.429235][ T28] audit: type=1400 audit(1272.308:5703): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1016.510446][ T28] audit: type=1400 audit(1272.388:5704): avc: denied { read write } for pid=13500 comm="syz.1.3747" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1019.015222][T13524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13524 comm=syz.0.3756 [ 1021.686264][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 1021.686659][ T28] audit: type=1400 audit(1277.548:5820): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1021.773833][ T28] audit: type=1400 audit(1277.648:5821): avc: denied { allowed } for pid=13532 comm="syz.1.3760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1021.788111][ T28] audit: type=1400 audit(1277.668:5822): avc: denied { read write } for pid=13532 comm="syz.1.3760" name="dsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1021.817389][ T28] audit: type=1400 audit(1277.698:5823): avc: denied { read } for pid=13532 comm="syz.1.3760" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1021.828940][ T28] audit: type=1400 audit(1277.708:5824): avc: denied { create } for pid=13532 comm="syz.1.3760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1022.112151][ T28] audit: type=1400 audit(1277.988:5825): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1022.211082][ T28] audit: type=1400 audit(1278.088:5826): avc: denied { setattr } for pid=13534 comm="syz.1.3761" name="" dev="pipefs" ino=41447 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 1022.252346][ T28] audit: type=1400 audit(1278.128:5827): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1022.367614][ T28] audit: type=1400 audit(1278.248:5828): avc: denied { read write } for pid=13536 comm="syz.1.3762" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1022.558280][ T28] audit: type=1400 audit(1278.438:5829): avc: denied { create } for pid=13536 comm="syz.1.3762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 1024.637471][T13550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13550 comm=syz.0.3768 [ 1026.798653][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 1026.800711][ T28] audit: type=1400 audit(1282.678:5872): avc: denied { create } for pid=13560 comm="syz.1.3773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1026.815780][T13561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13561 comm=syz.1.3773 [ 1026.820215][ T28] audit: type=1400 audit(1282.698:5873): avc: denied { create } for pid=13560 comm="syz.1.3773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1026.827836][ T28] audit: type=1400 audit(1282.708:5874): avc: denied { create } for pid=13560 comm="syz.1.3773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1026.864028][ T28] audit: type=1400 audit(1282.738:5875): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1027.077957][ T28] audit: type=1400 audit(1282.958:5876): avc: denied { read } for pid=13562 comm="syz.1.3774" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1027.155743][ T28] audit: type=1400 audit(1283.008:5877): avc: denied { create } for pid=13562 comm="syz.1.3774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1027.307040][ T28] audit: type=1400 audit(1283.178:5878): avc: denied { create } for pid=13562 comm="syz.1.3774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1027.327443][ T28] audit: type=1400 audit(1283.208:5879): avc: denied { create } for pid=13562 comm="syz.1.3774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1027.437979][ T28] audit: type=1400 audit(1283.318:5880): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1027.531530][ T28] audit: type=1400 audit(1283.408:5881): avc: denied { allowed } for pid=13564 comm="syz.0.3775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1028.596108][T13577] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1537 sclass=netlink_audit_socket pid=13577 comm=syz.1.3781 [ 1031.996485][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 1031.996839][ T28] audit: type=1400 audit(1287.868:5907): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1032.144110][ T28] audit: type=1400 audit(1288.018:5908): avc: denied { read write } for pid=13591 comm="syz.1.3788" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1032.237829][ T28] audit: type=1400 audit(1288.118:5909): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1032.348271][ T28] audit: type=1400 audit(1288.228:5910): avc: denied { read write } for pid=13593 comm="syz.1.3790" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1032.431951][ T28] audit: type=1400 audit(1288.308:5911): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1032.590444][ T28] audit: type=1400 audit(1288.468:5912): avc: denied { create } for pid=13597 comm="syz.1.3791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1032.633921][ T28] audit: type=1400 audit(1288.508:5913): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1032.737215][ T28] audit: type=1400 audit(1288.618:5914): avc: denied { write } for pid=13601 comm="syz.1.3793" name="dev_mcast" dev="proc" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 1032.770970][ T28] audit: type=1400 audit(1288.648:5915): avc: denied { read } for pid=13601 comm="syz.1.3793" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1032.852348][ T28] audit: type=1400 audit(1288.728:5916): avc: denied { create } for pid=13601 comm="syz.1.3793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1033.138248][T13604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13604 comm=syz.0.3794 [ 1033.396029][T13608] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13608 comm=syz.1.3796 [ 1035.370279][T13637] FAULT_INJECTION: forcing a failure. [ 1035.370279][T13637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1035.374191][T13637] CPU: 0 UID: 0 PID: 13637 Comm: syz.1.3808 Not tainted syzkaller #0 PREEMPT [ 1035.374377][T13637] Hardware name: ARM-Versatile Express [ 1035.374450][T13637] Call trace: [ 1035.374523][T13637] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1035.374631][T13637] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1035.374701][T13637] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1035.374792][T13637] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1035.374857][T13637] r7:20000140 r6:00000000 r5:8385a4c0 r4:82b4ee88 [ 1035.374877][T13637] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1035.374942][T13637] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1035.375028][T13637] r8:00040000 r7:20000140 r6:f4911e28 r5:00000000 r4:f4911f20 [ 1035.375050][T13637] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1035.375108][T13637] [<809cd708>] (should_fail_usercopy) from [<815e03bc>] (copy_msghdr_from_user+0x50/0x1e0) [ 1035.375178][T13637] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 1035.375255][T13637] r8:00040000 r7:00000000 r6:83614cc0 r5:f4911f20 r4:f4911e6c [ 1035.375276][T13637] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1035.375336][T13637] r9:8385a4c0 r8:863ea500 r7:00040000 r6:20000140 r5:863ea501 r4:00000003 [ 1035.375356][T13637] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1035.375416][T13637] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1035.375436][T13637] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1035.375482][T13637] Exception stack(0xf4911fa8 to 0xf4911ff0) [ 1035.375523][T13637] 1fa0: 00000000 00000000 00000003 20000140 00040000 00000000 [ 1035.375561][T13637] 1fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f740dc [ 1035.375595][T13637] 1fe0: 76f73e88 76f73e78 00018e58 001307a0 [ 1036.711394][T13651] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13651 comm=syz.1.3815 [ 1037.055212][ T28] kauditd_printk_skb: 62 callbacks suppressed [ 1037.055493][ T28] audit: type=1400 audit(1292.928:5979): avc: denied { read write } for pid=13654 comm="syz.0.3817" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1037.087464][ T28] audit: type=1400 audit(1292.968:5980): avc: denied { create } for pid=13654 comm="syz.0.3817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1037.096466][ T28] audit: type=1400 audit(1292.978:5981): avc: denied { accept } for pid=13654 comm="syz.0.3817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 1037.247371][ T28] audit: type=1400 audit(1293.128:5982): avc: denied { create } for pid=13656 comm="syz.1.3818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1037.306589][ T28] audit: type=1400 audit(1293.188:5983): avc: denied { read } for pid=13658 comm="syz.0.3819" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1037.329720][ T28] audit: type=1400 audit(1293.208:5984): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1037.363131][ T28] audit: type=1400 audit(1293.238:5985): avc: denied { create } for pid=13658 comm="syz.0.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1037.417927][ T28] audit: type=1400 audit(1293.298:5986): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1037.469591][ T28] audit: type=1400 audit(1293.348:5987): avc: denied { create } for pid=13658 comm="syz.0.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1037.479572][ T28] audit: type=1400 audit(1293.358:5988): avc: denied { create } for pid=13658 comm="syz.0.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1042.102230][ T28] kauditd_printk_skb: 76 callbacks suppressed [ 1042.102942][ T28] audit: type=1400 audit(1297.978:6065): avc: denied { create } for pid=13725 comm="syz.1.3849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1042.122574][ T28] audit: type=1400 audit(1297.998:6066): avc: denied { read write } for pid=13725 comm="syz.1.3849" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1042.153288][ T28] audit: type=1400 audit(1298.028:6067): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1042.224179][ T28] audit: type=1400 audit(1298.098:6068): avc: denied { allowed } for pid=13727 comm="syz.1.3850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1042.238057][ T28] audit: type=1400 audit(1298.118:6069): avc: denied { read write } for pid=13727 comm="syz.1.3850" name="dsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1042.247877][ T28] audit: type=1400 audit(1298.128:6070): avc: denied { read } for pid=13727 comm="syz.1.3850" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1042.253463][ T28] audit: type=1400 audit(1298.128:6071): avc: denied { create } for pid=13727 comm="syz.1.3850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1042.305075][ T28] audit: type=1400 audit(1298.178:6072): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1042.368771][ T28] audit: type=1400 audit(1298.248:6073): avc: denied { read } for pid=13729 comm="syz.1.3851" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1042.392108][ T28] audit: type=1400 audit(1298.268:6074): avc: denied { create } for pid=13729 comm="syz.1.3851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1046.707412][T13753] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13753 comm=syz.0.3859 [ 1046.775296][T13753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=13753 comm=syz.0.3859 [ 1047.420367][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 1047.420958][ T28] audit: type=1400 audit(1303.298:6105): avc: denied { create } for pid=13754 comm="syz.1.3861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1047.431149][ T28] audit: type=1400 audit(1303.308:6106): avc: denied { create } for pid=13754 comm="syz.1.3861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1047.897164][ T28] audit: type=1400 audit(1303.778:6107): avc: denied { read } for pid=13757 comm="syz.0.3862" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1047.967103][ T28] audit: type=1400 audit(1303.848:6108): avc: denied { create } for pid=13757 comm="syz.0.3862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1048.003746][ T28] audit: type=1400 audit(1303.878:6109): avc: denied { create } for pid=13757 comm="syz.0.3862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1048.013823][ T28] audit: type=1400 audit(1303.888:6110): avc: denied { create } for pid=13757 comm="syz.0.3862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1049.477460][ T28] audit: type=1400 audit(1305.358:6111): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1050.245186][ T28] audit: type=1400 audit(1306.118:6112): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1050.985309][ T28] audit: type=1400 audit(1306.858:6113): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1051.225845][T13769] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=13769 comm=syz.1.3866 [ 1051.228775][T13769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13769 comm=syz.1.3866 [ 1051.247878][ T28] audit: type=1400 audit(1307.128:6114): avc: denied { read } for pid=13767 comm="syz.0.3867" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1052.827303][T13790] FAULT_INJECTION: forcing a failure. [ 1052.827303][T13790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1052.827819][T13790] CPU: 0 UID: 0 PID: 13790 Comm: syz.0.3875 Not tainted syzkaller #0 PREEMPT [ 1052.827893][T13790] Hardware name: ARM-Versatile Express [ 1052.827917][T13790] Call trace: [ 1052.828002][T13790] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1052.828109][T13790] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1052.828126][T13790] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1052.828178][T13790] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1052.828235][T13790] r7:00000000 r6:00000000 r5:8385c980 r4:82b4ee88 [ 1052.828253][T13790] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1052.828312][T13790] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1052.828380][T13790] r8:76f3df08 r7:00000000 r6:00000000 r5:df991f68 r4:00000002 [ 1052.828404][T13790] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1052.828480][T13790] [<809cd708>] (should_fail_usercopy) from [<805bf3dc>] (simple_read_from_buffer+0x80/0x140) [ 1052.828541][T13790] [<805bf35c>] (simple_read_from_buffer) from [<80643a94>] (proc_fail_nth_read+0xb8/0x108) [ 1052.828610][T13790] r10:806439dc r9:00000001 r8:00000002 r7:df991f68 r6:0000000f r5:76f3df08 [ 1052.828633][T13790] r4:8385c980 r3:df991e9f [ 1052.828684][T13790] [<806439dc>] (proc_fail_nth_read) from [<80580890>] (vfs_read+0xc0/0x328) [ 1052.828762][T13790] r8:8385c980 r7:df991f68 r6:76f3df08 r5:863ea600 r4:0000000f [ 1052.828782][T13790] [<805807d0>] (vfs_read) from [<80581524>] (ksys_read+0x74/0xec) [ 1052.828848][T13790] r10:00000003 r9:8385c980 r8:8020029c r7:00000000 r6:00000000 r5:863ea600 [ 1052.828870][T13790] r4:863ea603 [ 1052.828899][T13790] [<805814b0>] (ksys_read) from [<805815ac>] (sys_read+0x10/0x14) [ 1052.828971][T13790] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 1052.828989][T13790] [<8058159c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1052.829043][T13790] Exception stack(0xdf991fa8 to 0xdf991ff0) [ 1052.829085][T13790] 1fa0: 00000000 00000000 00000004 76f3df08 0000000f 00000000 [ 1052.829123][T13790] 1fc0: 00000000 00000000 00000000 00000003 00346378 00000000 003d0f00 76f3e0dc [ 1052.829153][T13790] 1fe0: 76f3de58 76f3de44 0010b9c4 001125a8 [ 1053.267205][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 1053.267680][ T28] audit: type=1400 audit(1309.148:6127): avc: denied { create } for pid=13793 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1053.305256][ T28] audit: type=1400 audit(1309.168:6128): avc: denied { create } for pid=13793 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1053.306983][ T28] audit: type=1400 audit(1309.188:6129): avc: denied { create } for pid=13793 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1053.580254][T13796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13796 comm=syz.0.3878 [ 1053.595434][T13796] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13796 comm=syz.0.3878 [ 1053.611166][ T28] audit: type=1400 audit(1309.488:6130): avc: denied { read } for pid=13795 comm="syz.0.3878" name="sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1053.629961][ T28] audit: type=1400 audit(1309.508:6131): avc: denied { create } for pid=13795 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1053.635086][ T28] audit: type=1400 audit(1309.508:6132): avc: denied { read write } for pid=13795 comm="syz.0.3878" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1053.656855][ T28] audit: type=1400 audit(1309.538:6133): avc: denied { read write } for pid=13795 comm="syz.0.3878" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1053.968500][ T28] audit: type=1400 audit(1309.848:6134): avc: denied { read } for pid=13797 comm="syz.0.3879" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1053.999297][ T28] audit: type=1400 audit(1309.878:6135): avc: denied { create } for pid=13797 comm="syz.0.3879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1054.087409][ T28] audit: type=1400 audit(1309.968:6136): avc: denied { create } for pid=13797 comm="syz.0.3879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1058.361815][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 1058.363438][ T28] audit: type=1400 audit(1314.238:6146): avc: denied { create } for pid=13815 comm="syz.0.3886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1061.864903][ T28] audit: type=1400 audit(1317.738:6147): avc: denied { create } for pid=13820 comm="syz.0.3888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1061.867450][ T28] audit: type=1400 audit(1317.738:6148): avc: denied { create } for pid=13820 comm="syz.0.3888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1061.930020][ T28] audit: type=1400 audit(1317.808:6149): avc: denied { read } for pid=13820 comm="syz.0.3888" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1062.000851][ T28] audit: type=1400 audit(1317.878:6150): avc: denied { nlmsg_tty_audit } for pid=13820 comm="syz.0.3888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 1062.341085][ T28] audit: type=1400 audit(1318.218:6151): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1062.631092][ T28] audit: type=1400 audit(1318.508:6152): avc: denied { read append } for pid=13826 comm="syz.0.3891" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1062.684673][ T28] audit: type=1400 audit(1318.558:6153): avc: denied { create } for pid=13826 comm="syz.0.3891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1062.710242][ T28] audit: type=1400 audit(1318.588:6154): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1062.737191][ T28] audit: type=1400 audit(1318.618:6155): avc: denied { map } for pid=13826 comm="syz.0.3891" path="pipe:[43193]" dev="pipefs" ino=43193 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 1063.470615][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 1063.473110][ T28] audit: type=1400 audit(1319.348:6169): avc: denied { write } for pid=13836 comm="syz.1.3897" name="sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1063.476284][ T28] audit: type=1400 audit(1319.348:6170): avc: denied { write } for pid=13836 comm="syz.1.3897" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1063.500106][ T28] audit: type=1400 audit(1319.378:6171): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1063.580526][ T28] audit: type=1400 audit(1319.458:6172): avc: denied { create } for pid=13840 comm="syz.1.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1063.612829][ T28] audit: type=1400 audit(1319.488:6173): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1063.790373][ T28] audit: type=1400 audit(1319.668:6174): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1064.704191][ T28] audit: type=1400 audit(1320.578:6175): avc: denied { create } for pid=13842 comm="syz.0.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1064.759882][ T28] audit: type=1400 audit(1320.638:6176): avc: denied { read } for pid=13842 comm="syz.0.3899" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1064.763939][ T28] audit: type=1400 audit(1320.638:6177): avc: denied { read } for pid=13842 comm="syz.0.3899" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1066.415395][ T28] audit: type=1400 audit(1322.278:6178): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1067.111654][T13861] FAULT_INJECTION: forcing a failure. [ 1067.111654][T13861] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1067.112017][T13861] CPU: 0 UID: 0 PID: 13861 Comm: syz.0.3907 Not tainted syzkaller #0 PREEMPT [ 1067.112077][T13861] Hardware name: ARM-Versatile Express [ 1067.112092][T13861] Call trace: [ 1067.112117][T13861] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1067.112177][T13861] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1067.112188][T13861] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1067.112216][T13861] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1067.112247][T13861] r7:20000580 r6:00000000 r5:8385c980 r4:82b4ee88 [ 1067.112257][T13861] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1067.112370][T13861] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1067.112454][T13861] r8:00044000 r7:20000580 r6:e025de28 r5:00000000 r4:e025df20 [ 1067.112538][T13861] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1067.112598][T13861] [<809cd708>] (should_fail_usercopy) from [<815e03bc>] (copy_msghdr_from_user+0x50/0x1e0) [ 1067.112680][T13861] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 1067.112840][T13861] r8:00044000 r7:00000000 r6:8361b1c0 r5:e025df20 r4:e025de6c [ 1067.112881][T13861] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1067.112973][T13861] r9:8385c980 r8:83311980 r7:00044000 r6:20000580 r5:83311981 r4:00000004 [ 1067.112999][T13861] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1067.113072][T13861] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1067.113087][T13861] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1067.113113][T13861] Exception stack(0xe025dfa8 to 0xe025dff0) [ 1067.113145][T13861] dfa0: 00000000 00000000 00000004 20000580 00044000 00000000 [ 1067.113183][T13861] dfc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f5f0dc [ 1067.113276][T13861] dfe0: 76f5ee88 76f5ee78 00018e58 001307a0 [ 1067.314006][T13864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13864 comm=syz.0.3908 [ 1067.432882][T13864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13864 comm=syz.0.3908 [ 1067.955092][T13872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13872 comm=syz.1.3911 [ 1068.689192][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 1068.690371][ T28] audit: type=1400 audit(1324.568:6202): avc: denied { read write } for pid=13877 comm="syz.1.3914" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1068.806858][ T28] audit: type=1400 audit(1324.688:6203): avc: denied { create } for pid=13877 comm="syz.1.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 1068.981571][ T28] audit: type=1400 audit(1324.858:6204): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1069.065658][ T28] audit: type=1400 audit(1324.948:6205): avc: denied { read append } for pid=13883 comm="syz.1.3915" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1069.070287][ T28] audit: type=1400 audit(1324.948:6206): avc: denied { setattr } for pid=13883 comm="syz.1.3915" name="" dev="pipefs" ino=43317 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 1069.095245][ T28] audit: type=1400 audit(1324.958:6207): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1069.207084][T13886] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13886 comm=syz.1.3916 [ 1069.241226][ T28] audit: type=1400 audit(1325.118:6208): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1069.995089][ T28] audit: type=1400 audit(1325.868:6209): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1070.333689][ T28] audit: type=1400 audit(1326.208:6210): avc: denied { read } for pid=13890 comm="syz.1.3918" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1070.340960][ T28] audit: type=1400 audit(1326.218:6211): avc: denied { create } for pid=13890 comm="syz.1.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=0 [ 1070.586568][T13893] FAULT_INJECTION: forcing a failure. [ 1070.586568][T13893] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.595145][T13893] CPU: 1 UID: 0 PID: 13893 Comm: syz.1.3919 Not tainted syzkaller #0 PREEMPT [ 1070.595295][T13893] Hardware name: ARM-Versatile Express [ 1070.595318][T13893] Call trace: [ 1070.595361][T13893] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1070.595460][T13893] r7:60000113 r6:60000113 r5:8231c750 r4:00000000 [ 1070.595476][T13893] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1070.595520][T13893] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1070.595572][T13893] r7:00000000 r6:00000000 r5:84540000 r4:82b17dc8 [ 1070.595586][T13893] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1070.595667][T13893] [<809cd4cc>] (should_fail_ex) from [<8054edbc>] (should_failslab+0x6c/0x94) [ 1070.595734][T13893] r8:00000cc0 r7:00000000 r6:00000cc0 r5:00000000 r4:830e4c00 [ 1070.595751][T13893] [<8054ed50>] (should_failslab) from [<8052c84c>] (kmem_cache_alloc_node_noprof+0x58/0x3c8) [ 1070.595809][T13893] [<8052c7f4>] (kmem_cache_alloc_node_noprof) from [<815f0b2c>] (__alloc_skb+0x74/0x2c0) [ 1070.595883][T13893] r10:00000000 r9:815f0cdc r8:00000cc0 r7:00000000 r6:830e4c00 r5:ffffffff [ 1070.595902][T13893] r4:ddde4708 [ 1070.595918][T13893] [<815f0ab8>] (__alloc_skb) from [<81715bc8>] (netlink_alloc_large_skb+0x8c/0xa8) [ 1070.595997][T13893] r9:00000000 r8:00000000 r7:8680e800 r6:00000014 r5:8365e7c0 r4:00000140 [ 1070.596016][T13893] [<81715b3c>] (netlink_alloc_large_skb) from [<81716384>] (netlink_sendmsg+0x130/0x444) [ 1070.596071][T13893] r5:8365e7c0 r4:e025df20 [ 1070.596086][T13893] [<81716254>] (netlink_sendmsg) from [<815df1b8>] (__sock_sendmsg+0x44/0x78) [ 1070.596151][T13893] r10:00044000 r9:00000000 r8:e025ddcc r7:00000000 r6:8365e7c0 r5:e025df20 [ 1070.596172][T13893] r4:00000000 [ 1070.596188][T13893] [<815df174>] (__sock_sendmsg) from [<815e01e8>] (____sys_sendmsg+0x238/0x2c4) [ 1070.596250][T13893] r7:00000000 r6:00000000 r5:8365e7c0 r4:e025df20 [ 1070.596265][T13893] [<815dffb0>] (____sys_sendmsg) from [<815e05e8>] (___sys_sendmsg+0x9c/0xd0) [ 1070.596328][T13893] r10:00000128 r9:20000580 r8:00044000 r7:00000000 r6:8365e7c0 r5:e025df20 [ 1070.596345][T13893] r4:00000000 [ 1070.596360][T13893] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1070.596417][T13893] r9:84540000 r8:83311700 r7:00044000 r6:20000580 r5:83311701 r4:00000004 [ 1070.596434][T13893] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1070.596491][T13893] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1070.596508][T13893] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1070.596557][T13893] Exception stack(0xe025dfa8 to 0xe025dff0) [ 1070.596599][T13893] dfa0: 00000000 00000000 00000004 20000580 00044000 00000000 [ 1070.596631][T13893] dfc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f740dc [ 1070.596656][T13893] dfe0: 76f73e88 76f73e78 00018e58 001307a0 [ 1073.757234][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 1073.757682][ T28] audit: type=1400 audit(1329.638:6261): avc: denied { create } for pid=13932 comm="syz.1.3935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1073.776567][ T28] audit: type=1400 audit(1329.658:6262): avc: denied { create } for pid=13932 comm="syz.1.3935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1073.837504][ T28] audit: type=1400 audit(1329.718:6263): avc: denied { create } for pid=13932 comm="syz.1.3935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1073.861296][ T28] audit: type=1400 audit(1329.738:6264): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1074.316456][ T28] audit: type=1400 audit(1330.198:6265): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1074.606361][ T28] audit: type=1400 audit(1330.488:6266): avc: denied { read } for pid=13936 comm="syz.1.3937" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1074.627434][ T28] audit: type=1400 audit(1330.508:6267): avc: denied { read write } for pid=13936 comm="syz.1.3937" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1074.649099][ T28] audit: type=1400 audit(1330.528:6268): avc: denied { create } for pid=13936 comm="syz.1.3937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1074.650221][ T28] audit: type=1400 audit(1330.528:6269): avc: denied { create } for pid=13936 comm="syz.1.3937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1074.685331][ T28] audit: type=1400 audit(1330.558:6270): avc: denied { create } for pid=13936 comm="syz.1.3937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1076.118169][T13952] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13952 comm=syz.1.3944 [ 1076.154269][T13953] FAULT_INJECTION: forcing a failure. [ 1076.154269][T13953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1076.155811][T13953] CPU: 1 UID: 0 PID: 13953 Comm: syz.0.3945 Not tainted syzkaller #0 PREEMPT [ 1076.155888][T13953] Hardware name: ARM-Versatile Express [ 1076.155905][T13953] Call trace: [ 1076.155930][T13953] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1076.156327][T13953] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1076.156344][T13953] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1076.156375][T13953] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1076.156408][T13953] r7:20000400 r6:00000000 r5:84696e40 r4:82b4ee88 [ 1076.156416][T13953] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1076.156457][T13953] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1076.156492][T13953] r8:00000000 r7:20000400 r6:00000014 r5:00000000 r4:ea719f30 [ 1076.156501][T13953] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1076.156531][T13953] [<809cd708>] (should_fail_usercopy) from [<80905478>] (_copy_from_iter+0x64/0x7c4) [ 1076.156564][T13953] [<80905414>] (_copy_from_iter) from [<817163dc>] (netlink_sendmsg+0x188/0x444) [ 1076.156604][T13953] r10:00000000 r9:00000000 r8:ea719f30 r7:8680f000 r6:00000014 r5:860be3c0 [ 1076.156616][T13953] r4:ea719f20 [ 1076.156629][T13953] [<81716254>] (netlink_sendmsg) from [<815df1b8>] (__sock_sendmsg+0x44/0x78) [ 1076.156668][T13953] r10:00044000 r9:00000000 r8:ea719dcc r7:00000000 r6:8365e7c0 r5:ea719f20 [ 1076.156679][T13953] r4:00000000 [ 1076.156687][T13953] [<815df174>] (__sock_sendmsg) from [<815e01e8>] (____sys_sendmsg+0x238/0x2c4) [ 1076.156735][T13953] r7:00000000 r6:00000000 r5:8365e7c0 r4:ea719f20 [ 1076.156745][T13953] [<815dffb0>] (____sys_sendmsg) from [<815e05e8>] (___sys_sendmsg+0x9c/0xd0) [ 1076.156781][T13953] r10:00000128 r9:20000580 r8:00044000 r7:00000000 r6:8365e7c0 r5:ea719f20 [ 1076.156791][T13953] r4:00000000 [ 1076.156799][T13953] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1076.156832][T13953] r9:84696e40 r8:83313f00 r7:00044000 r6:20000580 r5:83313f01 r4:00000004 [ 1076.156842][T13953] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1076.156871][T13953] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1076.156879][T13953] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1076.156903][T13953] Exception stack(0xea719fa8 to 0xea719ff0) [ 1076.156926][T13953] 9fa0: 00000000 00000000 00000004 20000580 00044000 00000000 [ 1076.156945][T13953] 9fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f5f0dc [ 1076.156959][T13953] 9fe0: 76f5ee88 76f5ee78 00018e58 001307a0 [ 1077.290997][T13967] FAULT_INJECTION: forcing a failure. [ 1077.290997][T13967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1077.295108][T13967] CPU: 1 UID: 0 PID: 13967 Comm: syz.0.3951 Not tainted syzkaller #0 PREEMPT [ 1077.295253][T13967] Hardware name: ARM-Versatile Express [ 1077.295280][T13967] Call trace: [ 1077.295368][T13967] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1077.295484][T13967] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1077.295508][T13967] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1077.295566][T13967] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1077.295629][T13967] r7:20000340 r6:00000000 r5:850a6e40 r4:82b4ee88 [ 1077.295647][T13967] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1077.295706][T13967] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1077.295778][T13967] r8:00000040 r7:20000340 r6:ea7b1e28 r5:00000000 r4:ea7b1f20 [ 1077.295798][T13967] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1077.295855][T13967] [<809cd708>] (should_fail_usercopy) from [<815e03bc>] (copy_msghdr_from_user+0x50/0x1e0) [ 1077.295922][T13967] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 1077.295992][T13967] r8:00000040 r7:00000000 r6:8565bbc0 r5:ea7b1f20 r4:ea7b1e6c [ 1077.296012][T13967] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1077.296073][T13967] r9:850a6e40 r8:862c0200 r7:00000040 r6:20000340 r5:862c0201 r4:00000004 [ 1077.296091][T13967] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1077.296146][T13967] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1077.296164][T13967] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1077.296236][T13967] Exception stack(0xea7b1fa8 to 0xea7b1ff0) [ 1077.296274][T13967] 1fa0: 00000000 00000000 00000004 20000340 00000040 00000000 [ 1077.296308][T13967] 1fc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f5f0dc [ 1077.296336][T13967] 1fe0: 76f5ee88 76f5ee78 00018e58 001307a0 [ 1078.257140][T13975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13975 comm=syz.0.3955 [ 1078.261821][T13975] FAULT_INJECTION: forcing a failure. [ 1078.261821][T13975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1078.268029][T13975] CPU: 1 UID: 0 PID: 13975 Comm: syz.0.3955 Not tainted syzkaller #0 PREEMPT [ 1078.268173][T13975] Hardware name: ARM-Versatile Express [ 1078.268196][T13975] Call trace: [ 1078.268235][T13975] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1078.268337][T13975] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1078.268355][T13975] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1078.268400][T13975] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1078.268453][T13975] r7:00000000 r6:00000000 r5:850a6e40 r4:82b4ee88 [ 1078.268466][T13975] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1078.268518][T13975] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1078.268576][T13975] r8:76f5ef08 r7:00000000 r6:00000000 r5:e4361f68 r4:00000002 [ 1078.268590][T13975] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1078.268638][T13975] [<809cd708>] (should_fail_usercopy) from [<805bf3dc>] (simple_read_from_buffer+0x80/0x140) [ 1078.268688][T13975] [<805bf35c>] (simple_read_from_buffer) from [<80643a94>] (proc_fail_nth_read+0xb8/0x108) [ 1078.268765][T13975] r10:806439dc r9:00000001 r8:00000002 r7:e4361f68 r6:0000000f r5:76f5ef08 [ 1078.268791][T13975] r4:850a6e40 r3:e4361e9f [ 1078.268810][T13975] [<806439dc>] (proc_fail_nth_read) from [<80580890>] (vfs_read+0xc0/0x328) [ 1078.268877][T13975] r8:850a6e40 r7:e4361f68 r6:76f5ef08 r5:862bcb80 r4:0000000f [ 1078.268896][T13975] [<805807d0>] (vfs_read) from [<80581524>] (ksys_read+0x74/0xec) [ 1078.268959][T13975] r10:00000003 r9:850a6e40 r8:8020029c r7:00000000 r6:00000000 r5:862bcb80 [ 1078.268979][T13975] r4:862bcb83 [ 1078.268996][T13975] [<805814b0>] (ksys_read) from [<805815ac>] (sys_read+0x10/0x14) [ 1078.269053][T13975] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 1078.269070][T13975] [<8058159c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1078.269115][T13975] Exception stack(0xe4361fa8 to 0xe4361ff0) [ 1078.269152][T13975] 1fa0: 00000000 00000000 00000005 76f5ef08 0000000f 00000000 [ 1078.269184][T13975] 1fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76f5f0dc [ 1078.269209][T13975] 1fe0: 76f5ee58 76f5ee44 0010b9c4 001125a8 [ 1078.670213][T13977] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13977 comm=syz.0.3956 [ 1078.901951][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 1078.902420][ T28] audit: type=1400 audit(1334.778:6314): avc: denied { read } for pid=13978 comm="syz.0.3957" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1078.953475][ T28] audit: type=1400 audit(1334.828:6315): avc: denied { read write } for pid=13978 comm="syz.0.3957" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1079.019283][ T28] audit: type=1400 audit(1334.898:6316): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1079.028103][ T28] audit: type=1400 audit(1334.908:6317): avc: denied { create } for pid=13978 comm="syz.0.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1079.030163][ T28] audit: type=1400 audit(1334.908:6318): avc: denied { create } for pid=13978 comm="syz.0.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1079.042104][ T28] audit: type=1400 audit(1334.918:6319): avc: denied { create } for pid=13978 comm="syz.0.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1079.317138][ T28] audit: type=1400 audit(1335.198:6320): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1079.419617][T13989] FAULT_INJECTION: forcing a failure. [ 1079.419617][T13989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1079.425150][T13989] CPU: 0 UID: 0 PID: 13989 Comm: syz.1.3961 Not tainted syzkaller #0 PREEMPT [ 1079.425316][T13989] Hardware name: ARM-Versatile Express [ 1079.425347][T13989] Call trace: [ 1079.425395][T13989] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1079.425510][T13989] r7:60000013 r6:60000013 r5:8231c750 r4:00000000 [ 1079.425531][T13989] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1079.425584][T13989] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1079.425643][T13989] r7:0000000c r6:00000000 r5:83868c40 r4:82b4ee88 [ 1079.425661][T13989] [<8021e360>] (dump_stack) from [<809cd68c>] (should_fail_ex+0x1c0/0x224) [ 1079.425731][T13989] [<809cd4cc>] (should_fail_ex) from [<809cd704>] (should_fail+0x14/0x18) [ 1079.425819][T13989] r8:b5403587 r7:0000000c r6:20000180 r5:ea8ede6c r4:0000000c [ 1079.425863][T13989] [<809cd6f0>] (should_fail) from [<809cd724>] (should_fail_usercopy+0x1c/0x20) [ 1079.425925][T13989] [<809cd708>] (should_fail_usercopy) from [<815e02a8>] (move_addr_to_kernel+0x34/0xf8) [ 1079.426005][T13989] [<815e0274>] (move_addr_to_kernel) from [<815e0504>] (copy_msghdr_from_user+0x198/0x1e0) [ 1079.426107][T13989] r7:20000340 r6:ea8ede28 r5:00000000 r4:ea8edf20 [ 1079.426126][T13989] [<815e036c>] (copy_msghdr_from_user) from [<815e05c4>] (___sys_sendmsg+0x78/0xd0) [ 1079.426195][T13989] r8:00000040 r7:00000000 r6:8349c7c0 r5:ea8edf20 r4:ea8ede6c [ 1079.426215][T13989] [<815e054c>] (___sys_sendmsg) from [<815e264c>] (__sys_sendmsg+0x8c/0xe0) [ 1079.426332][T13989] r9:83868c40 r8:863ea600 r7:00000040 r6:20000340 r5:863ea601 r4:00000004 [ 1079.426356][T13989] [<815e25c0>] (__sys_sendmsg) from [<815e26b4>] (sys_sendmsg+0x14/0x18) [ 1079.426480][T13989] r8:8020029c r7:00000128 r6:0012f1a4 r5:00000000 r4:00000000 [ 1079.426500][T13989] [<815e26a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1079.426571][T13989] Exception stack(0xea8edfa8 to 0xea8edff0) [ 1079.426612][T13989] dfa0: 00000000 00000000 00000004 20000340 00000040 00000000 [ 1079.426648][T13989] dfc0: 00000000 00000000 0012f1a4 00000128 003462d8 00000000 00000001 76f740dc [ 1079.426678][T13989] dfe0: 76f73e88 76f73e78 00018e58 001307a0 [ 1079.519693][ T28] audit: type=1400 audit(1335.398:6321): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1079.627140][ T28] audit: type=1400 audit(1335.508:6322): avc: denied { read } for pid=13990 comm="syz.1.3963" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1079.637083][ T28] audit: type=1400 audit(1335.518:6323): avc: denied { create } for pid=13990 comm="syz.1.3963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=0 [ 1081.585505][T13997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13997 comm=syz.0.3965 [ 1083.908469][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 1083.909633][ T28] audit: type=1400 audit(1339.788:6346): avc: denied { create } for pid=14018 comm="syz.1.3974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1083.929158][ T28] audit: type=1400 audit(1339.808:6347): avc: denied { mac_admin } for pid=14018 comm="syz.1.3974" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1083.947043][ T28] audit: type=1401 audit(1339.828:6348): op=setxattr invalid_context="system_u:object_r:auth_cache_t:s0" [ 1084.164229][ T28] audit: type=1400 audit(1340.038:6349): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1084.325189][ T28] audit: type=1400 audit(1340.198:6350): avc: denied { read write } for pid=14021 comm="syz.0.3975" name="sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1084.410795][ T28] audit: type=1400 audit(1340.288:6351): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1084.642403][ T28] audit: type=1400 audit(1340.518:6352): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1084.849359][T14031] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14031 comm=syz.1.3978 [ 1085.079818][T14031] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14031 comm=syz.1.3978 [ 1085.170444][ T28] audit: type=1400 audit(1341.048:6353): avc: denied { nlmsg_tty_audit } for pid=14030 comm="syz.1.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 1085.391786][ T28] audit: type=1400 audit(1341.268:6354): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1085.477663][ T28] audit: type=1400 audit(1341.358:6355): avc: denied { read } for pid=14032 comm="syz.1.3979" dev="nsfs" ino=4026532746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1085.861870][T14026] ------------[ cut here ]------------ [ 1085.862287][T14026] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.0.3975/14026 [ 1085.864600][T14026] Modules linked in: [ 1085.865869][T14026] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1085.866499][T14026] CPU: 1 UID: 0 PID: 14026 Comm: syz.0.3975 Not tainted syzkaller #0 PREEMPT [ 1085.866900][T14026] Hardware name: ARM-Versatile Express [ 1085.867111][T14026] Call trace: [ 1085.867575][T14026] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1085.868033][T14026] r7:82a1e778 r6:00000000 r5:8231c750 r4:00000001 [ 1085.868281][T14026] [<80201af0>] (show_stack) from [<8021e34c>] (dump_stack_lvl+0x5c/0x70) [ 1085.868692][T14026] [<8021e2f0>] (dump_stack_lvl) from [<8021e378>] (dump_stack+0x18/0x1c) [ 1085.869136][T14026] r7:82a1e778 r6:00000000 r5:8469bd40 r4:82c7bd3c [ 1085.869378][T14026] [<8021e360>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 1085.869781][T14026] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 1085.870203][T14026] r7:80265f40 [ 1085.870372][T14026] [<80202818>] (panic) from [<80250668>] (get_taint+0x0/0x1c) [ 1085.870791][T14026] r3:82a0b544 r2:00000001 r1:82303238 r0:8230ab18 [ 1085.871054][T14026] [<802505f0>] (check_panic_on_warn) from [<802507e4>] (__warn+0x98/0x1ac) [ 1085.871443][T14026] [<8025074c>] (__warn) from [<80250a70>] (warn_slowpath_fmt+0x178/0x1f4) [ 1085.871964][T14026] r8:00000009 r7:8230bd14 r6:eaa85ebc r5:8469bd40 r4:00000000 [ 1085.872278][T14026] [<802508fc>] (warn_slowpath_fmt) from [<80265f40>] (do_notify_parent+0x37c/0x384) [ 1085.872895][T14026] r10:8469c434 r9:00000000 r8:eaa85f68 r7:8469c610 r6:00000080 r5:8469bd40 [ 1085.873306][T14026] r4:8469bd40 [ 1085.873479][T14026] [<80265bc4>] (do_notify_parent) from [<80257a50>] (do_exit+0x798/0xae4) [ 1085.874012][T14026] r8:eaa85f68 r7:8469c610 r6:833ebc00 r5:8469bd40 r4:83f60c40 [ 1085.874436][T14026] [<802572b8>] (do_exit) from [<80257f28>] (do_group_exit+0x0/0x8c) [ 1085.874992][T14026] r7:00000001 [ 1085.875189][T14026] [<80257f10>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1085.875549][T14026] Exception stack(0xeaa85fa8 to 0xeaa85ff0) [ 1085.875845][T14026] 5fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 1085.876161][T14026] 5fc0: 00000000 00000000 00000000 00000001 00346378 00000000 00000001 76f3e0dc [ 1085.876511][T14026] 5fe0: 76f3de60 76f3de50 000193b4 001307a0 [ 1085.878937][T14026] Rebooting in 86400 seconds..