last executing test programs: 49.319514502s ago: executing program 0 (id=175): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000740)={{0x12, 0x1, 0x0, 0xed, 0x3e, 0xc9, 0x8, 0xccd, 0xb3, 0x2dee, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb0, 0x87, 0x1d}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x550c, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, 0x0) 37.804669689s ago: executing program 0 (id=184): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r2, 0x4}, 0x8) 35.14968545s ago: executing program 0 (id=185): r0 = syz_io_uring_setup(0x239, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000d80)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r6, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="01000000000000000000150000000c002b800800010004", @ANYRES32=r7, @ANYBLOB="004969f6f55fc67ee478"], 0x28}}, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x8080}, 0x4000080) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r9 = accept(r4, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000100)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x85c}, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0}, 0x20) 23.461279143s ago: executing program 0 (id=186): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @empty}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x41}}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 23.301567657s ago: executing program 0 (id=187): r0 = socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = io_uring_setup(0x2a2c, &(0x7f0000000000)={0x0, 0x0, 0x2, 0xfffffffc}) close_range(r4, 0xffffffffffffffff, 0x0) bind$alg(r0, 0x0, 0x0) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x41, 0x800) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000400)}, 0xc6f0}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 21.439010997s ago: executing program 1 (id=188): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) listen(r1, 0x1000) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000fee000)=0x3fa, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'ip6tnl0\x00', 0x0, 0x4, 0x8, 0x2, 0x8001, 0x72, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0x9, 0xe}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0x18, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c7643600000001", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x7fff, 0x8001, 0x6, 0x28090, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x0, 0x6, @value, @void, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000000d40)=ANY=[@ANYBLOB="1808000000400000000000000000000085100000050000008500000031000000a70000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000180)=@raw=[@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @alu={0x7, 0x0, 0x3, 0x2, 0x1, 0x50, 0xfffffffffffffff0}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @generic={0x70, 0x0, 0x4, 0xa, 0xa59}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @ringbuf_query, @ldst={0x1, 0x1, 0x0, 0x9, 0x0, 0xffffffffffffffe0, 0xffffffffffffffff}, @generic={0x6, 0x8, 0x0, 0x8, 0x2}, @generic={0x81, 0x5, 0x7, 0x8, 0x4}], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x39, '\x00', r3, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x0, 0xc, 0xfff}, 0x10, 0x31f8, r4, 0x0, &(0x7f0000000480)=[r5], 0x0, 0x10, 0x7f, @void, @value}, 0x94) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848290000005e140602000000000e000a000f00000002", 0x29}], 0x1}, 0x0) 20.389941515s ago: executing program 1 (id=189): syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000980)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581d3b3"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = syz_io_uring_setup(0xd1, &(0x7f0000000480)={0x0, 0x80, 0x100, 0x2, 0x335}, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r0, 0x47ba, 0x0, 0x0, 0x0, 0x0) 18.579091563s ago: executing program 1 (id=190): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000180)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x8, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0x6}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4040, 0x0, 0x0) 18.100302196s ago: executing program 1 (id=191): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000910000000000000000000000005000600000000000a00000000000000fc0200000000000000000000000000000000000000000000020018"], 0x80}, 0x1, 0x7}, 0x0) 17.687979587s ago: executing program 1 (id=192): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, 0xa, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0xfffd}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 17.271368938s ago: executing program 1 (id=193): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000400)={'geneve0\x00', 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10122, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[], 0x48) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) syz_open_dev$loop(0x0, 0x2, 0x404b02) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='btrfs\x00', 0x0, 0x0) 0s ago: executing program 0 (id=194): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x3ff, &(0x7f0000000000)="9d71c1446d70") kernel console output (not intermixed with test programs): [ 54.957565][ T31] audit: type=1400 audit(54.860:68): avc: denied { read write } for pid=3081 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.958983][ T31] audit: type=1400 audit(54.860:69): avc: denied { open } for pid=3081 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13574' (ED25519) to the list of known hosts. [ 65.653373][ T31] audit: type=1400 audit(65.550:70): avc: denied { name_bind } for pid=3082 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 67.764877][ T31] audit: type=1400 audit(67.670:71): avc: denied { execute } for pid=3084 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.772432][ T31] audit: type=1400 audit(67.670:72): avc: denied { execute_no_trans } for pid=3084 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.044488][ T31] audit: type=1400 audit(71.940:73): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.050653][ T31] audit: type=1400 audit(71.950:74): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.068172][ T3084] cgroup: Unknown subsys name 'net' [ 72.077076][ T31] audit: type=1400 audit(71.980:75): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.317624][ T3084] cgroup: Unknown subsys name 'cpuset' [ 72.323554][ T3084] cgroup: Unknown subsys name 'hugetlb' [ 72.325354][ T3084] cgroup: Unknown subsys name 'rlimit' [ 72.538212][ T31] audit: type=1400 audit(72.440:76): avc: denied { setattr } for pid=3084 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.541096][ T31] audit: type=1400 audit(72.440:77): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.543285][ T31] audit: type=1400 audit(72.440:78): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 72.782253][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 72.784446][ T31] audit: type=1400 audit(72.680:79): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.793134][ T31] audit: type=1400 audit(72.690:80): avc: denied { write } for pid=3086 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.829624][ T31] audit: type=1400 audit(72.730:81): avc: denied { read } for pid=3084 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.831916][ T31] audit: type=1400 audit(72.730:82): avc: denied { open } for pid=3084 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.815038][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.929875][ T31] audit: type=1400 audit(81.830:83): avc: denied { execmem } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.986672][ T31] audit: type=1400 audit(81.890:85): avc: denied { read } for pid=3090 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.987658][ T31] audit: type=1400 audit(81.890:84): avc: denied { read } for pid=3089 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.988166][ T31] audit: type=1400 audit(81.890:86): avc: denied { open } for pid=3089 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.992809][ T31] audit: type=1400 audit(81.890:87): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 82.017249][ T31] audit: type=1400 audit(81.920:88): avc: denied { module_request } for pid=3090 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.018278][ T31] audit: type=1400 audit(81.920:89): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.106959][ T31] audit: type=1400 audit(82.010:90): avc: denied { sys_module } for pid=3090 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 82.823723][ T31] audit: type=1400 audit(82.720:91): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.208849][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.236839][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.240941][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.266425][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.037943][ T3089] hsr_slave_0: entered promiscuous mode [ 85.040094][ T3089] hsr_slave_1: entered promiscuous mode [ 85.246979][ T3090] hsr_slave_0: entered promiscuous mode [ 85.249820][ T3090] hsr_slave_1: entered promiscuous mode [ 85.251777][ T3090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.252267][ T3090] Cannot create hsr debugfs directory [ 85.422435][ T31] audit: type=1400 audit(85.320:92): avc: denied { create } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.429923][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.440868][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.448491][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.452980][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.695826][ T3090] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 85.709041][ T3090] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 85.717435][ T3090] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.724684][ T3090] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.417926][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.562816][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.750852][ T3089] veth0_vlan: entered promiscuous mode [ 89.781531][ T3089] veth1_vlan: entered promiscuous mode [ 89.860482][ T3090] veth0_vlan: entered promiscuous mode [ 89.872680][ T3090] veth1_vlan: entered promiscuous mode [ 89.898504][ T3089] veth0_macvtap: entered promiscuous mode [ 89.919853][ T3089] veth1_macvtap: entered promiscuous mode [ 89.940953][ T3090] veth0_macvtap: entered promiscuous mode [ 89.960368][ T3090] veth1_macvtap: entered promiscuous mode [ 89.989749][ T3089] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.990481][ T3089] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.990733][ T3089] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.990927][ T3089] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.121178][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 90.121271][ T31] audit: type=1400 audit(90.020:95): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 90.124936][ T31] audit: type=1400 audit(90.020:96): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.GrVRT1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 90.131893][ T3090] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.132468][ T3090] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.132839][ T3090] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.133220][ T3090] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.139503][ T31] audit: type=1400 audit(90.040:97): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.156961][ T31] audit: type=1400 audit(90.060:98): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.GrVRT1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 90.158723][ T31] audit: type=1400 audit(90.060:99): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.GrVRT1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 90.181204][ T31] audit: type=1400 audit(90.080:100): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 90.202674][ T31] audit: type=1400 audit(90.100:101): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 90.204247][ T31] audit: type=1400 audit(90.100:102): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 90.205118][ T31] audit: type=1400 audit(90.100:103): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 90.205868][ T31] audit: type=1400 audit(90.100:104): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 90.249429][ T3089] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 96.307438][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 96.307540][ T31] audit: type=1400 audit(96.210:132): avc: denied { create } for pid=3799 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 96.309891][ T31] audit: type=1400 audit(96.210:133): avc: denied { write } for pid=3799 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 100.082710][ T31] audit: type=1400 audit(99.980:134): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 101.470678][ T31] audit: type=1400 audit(101.370:135): avc: denied { ioctl } for pid=3833 comm="syz.1.22" path="socket:[3195]" dev="sockfs" ino=3195 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.355630][ T31] audit: type=1400 audit(103.260:136): avc: denied { getopt } for pid=3850 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.965506][ T31] audit: type=1400 audit(104.870:137): avc: denied { create } for pid=3868 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 104.969149][ T31] audit: type=1400 audit(104.870:138): avc: denied { getopt } for pid=3868 comm="syz.1.35" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.628787][ T31] audit: type=1400 audit(108.530:139): avc: denied { name_bind } for pid=3894 comm="syz.0.46" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 108.629744][ T31] audit: type=1400 audit(108.530:140): avc: denied { node_bind } for pid=3894 comm="syz.0.46" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 108.648798][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 109.871966][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 109.892117][ T3904] FAULT_INJECTION: forcing a failure. [ 109.892117][ T3904] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 109.893580][ T3904] CPU: 0 UID: 0 PID: 3904 Comm: syz.1.50 Not tainted 6.12.0-rc7-syzkaller #0 [ 109.894436][ T3904] Hardware name: ARM-Versatile Express [ 109.894981][ T3904] Call trace: [ 109.895398][ T3904] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 109.896575][ T3904] r7:83ecb180 r6:00000000 r5:60000013 r4:8203dc40 [ 109.896897][ T3904] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 109.897271][ T3904] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 109.897666][ T3904] r5:00000000 r4:8274e844 [ 109.897838][ T3904] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 109.898233][ T3904] [<808e6518>] (should_fail_ex) from [<808e6708>] (should_fail+0x14/0x18) [ 109.898569][ T3904] r6:00000000 r5:20000280 r4:00000004 [ 109.898762][ T3904] [<808e66f4>] (should_fail) from [<808e6728>] (should_fail_usercopy+0x1c/0x20) [ 109.899091][ T3904] [<808e670c>] (should_fail_usercopy) from [<81668684>] (do_ip_getsockopt+0x68c/0xbb0) [ 109.899445][ T3904] [<81667ffc>] (do_ip_getsockopt) from [<81668c0c>] (ip_getsockopt+0x64/0x134) [ 109.899859][ T3904] r10:00000127 r9:20000280 r8:00000000 r7:20000280 r6:20000240 r5:83ecb180 [ 109.900189][ T3904] r4:0000000d [ 109.900350][ T3904] [<81668ba8>] (ip_getsockopt) from [<8177c618>] (ipv6_getsockopt+0x148/0x150) [ 109.900760][ T3904] r9:20000280 r8:00000000 r7:20000280 r6:20000240 r5:0000000d r4:83ecb320 [ 109.901076][ T3904] [<8177c4d0>] (ipv6_getsockopt) from [<81679910>] (tcp_getsockopt+0x34/0x6c) [ 109.901496][ T3904] r9:20000280 r8:00000000 r7:84852780 r6:0000000d r5:00000000 r4:8177c4d0 [ 109.901802][ T3904] [<816798dc>] (tcp_getsockopt) from [<8148a744>] (sock_common_getsockopt+0x28/0x30) [ 109.902268][ T3904] r4:816798dc [ 109.902482][ T3904] [<8148a71c>] (sock_common_getsockopt) from [<81487538>] (do_sock_getsockopt+0x10c/0x29c) [ 109.902921][ T3904] r4:8148a71c [ 109.903088][ T3904] [<8148742c>] (do_sock_getsockopt) from [<814894c0>] (sys_getsockopt+0x90/0xd4) [ 109.903528][ T3904] r9:83bb0c00 r8:84852780 r7:20000240 r6:0000000d r5:00000000 r4:00000000 [ 109.903807][ T3904] [<81489430>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 109.904488][ T3904] Exception stack(0xe0795fa8 to 0xe0795ff0) [ 109.905048][ T3904] 5fa0: 20000280 00000000 00000007 00000000 0000000d 20000240 [ 109.905437][ T3904] 5fc0: 20000280 00000000 00131400 00000127 00000000 00006364 003d0f00 76be80bc [ 109.905746][ T3904] 5fe0: 76be7ec0 76be7eb0 00018af0 00133450 [ 109.906064][ T3904] r8:8020029c r7:00000127 r6:00131400 r5:00000000 r4:20000280 [ 111.829395][ T3918] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3918 comm=syz.0.56 [ 112.405078][ T3923] FAULT_INJECTION: forcing a failure. [ 112.405078][ T3923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.406082][ T3923] CPU: 0 UID: 0 PID: 3923 Comm: syz.1.58 Not tainted 6.12.0-rc7-syzkaller #0 [ 112.406468][ T3923] Hardware name: ARM-Versatile Express [ 112.406768][ T3923] Call trace: [ 112.407431][ T3923] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 112.408435][ T3923] r7:00000000 r6:00000000 r5:60000013 r4:8203dc40 [ 112.408640][ T3923] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 112.408884][ T3923] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 112.409137][ T3923] r5:00000000 r4:8274e844 [ 112.409281][ T3923] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 112.409537][ T3923] [<808e6518>] (should_fail_ex) from [<808e6708>] (should_fail+0x14/0x18) [ 112.409765][ T3923] r6:00000000 r5:e4839f68 r4:00000002 [ 112.409921][ T3923] [<808e66f4>] (should_fail) from [<808e6728>] (should_fail_usercopy+0x1c/0x20) [ 112.410199][ T3923] [<808e670c>] (should_fail_usercopy) from [<8054f480>] (simple_read_from_buffer+0x8c/0x134) [ 112.410480][ T3923] [<8054f3f4>] (simple_read_from_buffer) from [<805c4020>] (proc_fail_nth_read+0xb8/0x100) [ 112.410784][ T3923] r10:00000001 r9:805c3f68 r8:00000002 r7:e4839f68 r6:0000000f r5:76be7f30 [ 112.411006][ T3923] r4:83bb6c00 r3:e4839e9f [ 112.411132][ T3923] [<805c3f68>] (proc_fail_nth_read) from [<80516a34>] (vfs_read+0x98/0x324) [ 112.411399][ T3923] r8:76be7f30 r7:e4839f68 r6:83bb6c00 r5:0000000f r4:842d0780 [ 112.411558][ T3923] [<8051699c>] (vfs_read) from [<805176e4>] (ksys_read+0x78/0xf8) [ 112.411814][ T3923] r10:00000003 r9:83bb6c00 r8:8020029c r7:00000000 r6:00000000 r5:842d0780 [ 112.412009][ T3923] r4:842d0783 [ 112.412130][ T3923] [<8051766c>] (ksys_read) from [<80517774>] (sys_read+0x10/0x14) [ 112.412410][ T3923] r7:00000003 r6:00000005 r5:76be7f30 r4:0000000f [ 112.412606][ T3923] [<80517764>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 112.412902][ T3923] Exception stack(0xe4839fa8 to 0xe4839ff0) [ 112.413395][ T3923] 9fa0: 0000000f 76be7f30 00000005 76be7f30 0000000f 00000000 [ 112.413676][ T3923] 9fc0: 0000000f 76be7f30 00000005 00000003 00000000 00006364 003d0f00 76be80bc [ 112.414063][ T3923] 9fe0: 00000158 76be7ed0 000d8998 00131324 [ 112.787096][ T31] audit: type=1400 audit(112.690:141): avc: denied { shutdown } for pid=3926 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.076276][ T31] audit: type=1400 audit(113.970:142): avc: denied { ioctl } for pid=3938 comm="syz.1.63" path="socket:[3311]" dev="sockfs" ino=3311 ioctlcmd=0xf510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 114.091676][ T31] audit: type=1400 audit(113.990:143): avc: denied { create } for pid=3938 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 114.491814][ T31] audit: type=1400 audit(114.390:144): avc: denied { read } for pid=3942 comm="syz.1.65" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.606055][ T31] audit: type=1400 audit(114.510:145): avc: denied { ioctl } for pid=3946 comm="syz.1.67" path="socket:[2565]" dev="sockfs" ino=2565 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.715079][ T3950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=3950 comm=syz.0.68 [ 116.241409][ T3960] FAULT_INJECTION: forcing a failure. [ 116.241409][ T3960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.243307][ T3960] CPU: 1 UID: 0 PID: 3960 Comm: syz.1.70 Not tainted 6.12.0-rc7-syzkaller #0 [ 116.243844][ T3960] Hardware name: ARM-Versatile Express [ 116.244263][ T3960] Call trace: [ 116.244507][ T3960] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 116.244947][ T3960] r7:00000000 r6:00000000 r5:60000013 r4:8203dc40 [ 116.245210][ T3960] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 116.245597][ T3960] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 116.246031][ T3960] r5:00000000 r4:8274e844 [ 116.246234][ T3960] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 116.246593][ T3960] [<808e6518>] (should_fail_ex) from [<808e6708>] (should_fail+0x14/0x18) [ 116.246948][ T3960] r6:00000000 r5:eaa81f68 r4:00000002 [ 116.247186][ T3960] [<808e66f4>] (should_fail) from [<808e6728>] (should_fail_usercopy+0x1c/0x20) [ 116.247561][ T3960] [<808e670c>] (should_fail_usercopy) from [<8054f480>] (simple_read_from_buffer+0x8c/0x134) [ 116.248010][ T3960] [<8054f3f4>] (simple_read_from_buffer) from [<805c4020>] (proc_fail_nth_read+0xb8/0x100) [ 116.248451][ T3960] r10:00000001 r9:805c3f68 r8:00000002 r7:eaa81f68 r6:0000000f r5:76be7f30 [ 116.248768][ T3960] r4:84debc00 r3:eaa81e9f [ 116.248966][ T3960] [<805c3f68>] (proc_fail_nth_read) from [<80516a34>] (vfs_read+0x98/0x324) [ 116.249367][ T3960] r8:76be7f30 r7:eaa81f68 r6:84debc00 r5:0000000f r4:842729c0 [ 116.249649][ T3960] [<8051699c>] (vfs_read) from [<805176e4>] (ksys_read+0x78/0xf8) [ 116.250122][ T3960] r10:00000003 r9:84debc00 r8:8020029c r7:00000000 r6:00000000 r5:842729c0 [ 116.251051][ T3960] r4:842729c3 [ 116.251253][ T3960] [<8051766c>] (ksys_read) from [<80517774>] (sys_read+0x10/0x14) [ 116.251693][ T3960] r7:00000003 r6:00000003 r5:76be7f30 r4:0000000f [ 116.251986][ T3960] [<80517764>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.252478][ T3960] Exception stack(0xeaa81fa8 to 0xeaa81ff0) [ 116.252839][ T3960] 1fa0: 0000000f 76be7f30 00000003 76be7f30 0000000f 00000000 [ 116.253323][ T3960] 1fc0: 0000000f 76be7f30 00000003 00000003 00000000 00006364 003d0f00 76be80bc [ 116.253763][ T3960] 1fe0: 00000158 76be7ed0 000d8998 00131324 [ 117.592993][ T31] audit: type=1400 audit(117.490:146): avc: denied { create } for pid=3967 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 117.600418][ T31] audit: type=1400 audit(117.500:147): avc: denied { create } for pid=3967 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 117.606486][ T31] audit: type=1400 audit(117.500:148): avc: denied { ioctl } for pid=3967 comm="syz.1.73" path="socket:[2576]" dev="sockfs" ino=2576 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 118.154640][ T31] audit: type=1400 audit(118.050:149): avc: denied { create } for pid=3967 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.160365][ T31] audit: type=1400 audit(118.060:150): avc: denied { getopt } for pid=3967 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 118.860156][ T3979] Zero length message leads to an empty skb [ 118.876259][ T31] audit: type=1400 audit(118.770:151): avc: denied { ioctl } for pid=3977 comm="syz.1.75" path="socket:[3401]" dev="sockfs" ino=3401 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 127.328104][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 127.328215][ T31] audit: type=1400 audit(127.230:153): avc: denied { accept } for pid=3977 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 129.250812][ T4019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=4019 comm=syz.1.91 [ 131.482423][ T31] audit: type=1400 audit(131.380:154): avc: denied { setopt } for pid=4032 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 132.006694][ T4042] FAULT_INJECTION: forcing a failure. [ 132.006694][ T4042] name failslab, interval 1, probability 0, space 0, times 1 [ 132.007369][ T4042] CPU: 0 UID: 0 PID: 4042 Comm: syz.0.101 Not tainted 6.12.0-rc7-syzkaller #0 [ 132.007730][ T4042] Hardware name: ARM-Versatile Express [ 132.007999][ T4042] Call trace: [ 132.008219][ T4042] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 132.008691][ T4042] r7:84deb000 r6:00000dc0 r5:60000013 r4:8203dc40 [ 132.008990][ T4042] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 132.009400][ T4042] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 132.009932][ T4042] r5:00000000 r4:8271925c [ 132.010337][ T4042] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 132.011117][ T4042] [<808e6518>] (should_fail_ex) from [<804e8cc8>] (should_failslab+0x6c/0x94) [ 132.011859][ T4042] r6:00000dc0 r5:826f6690 r4:82c01240 [ 132.012154][ T4042] [<804e8c5c>] (should_failslab) from [<804cd064>] (__kmalloc_cache_noprof+0x4c/0x344) [ 132.013047][ T4042] [<804cd018>] (__kmalloc_cache_noprof) from [<802603dc>] (call_usermodehelper_setup+0x48/0xb8) [ 132.013654][ T4042] r10:84deb000 r9:84f41180 r8:826f6564 r7:826f6564 r6:84f1c080 r5:826f6690 [ 132.014032][ T4042] r4:84f1c080 [ 132.014261][ T4042] [<80260394>] (call_usermodehelper_setup) from [<802f985c>] (__request_module+0x150/0x2c0) [ 132.015112][ T4042] r7:84deb000 r6:84f1c4c0 r5:00000002 r4:84f1c080 [ 132.015413][ T4042] [<802f970c>] (__request_module) from [<81487b04>] (br_ioctl_call+0x94/0xa0) [ 132.015855][ T4042] r3:00000000 r2:00008941 r1:821beb70 [ 132.016135][ T4042] r8:00000000 r7:00008941 r6:00000000 r5:843c8000 r4:82920e98 [ 132.016478][ T4042] [<81487a70>] (br_ioctl_call) from [<81487dd0>] (sock_ioctl+0x2c0/0x608) [ 132.016876][ T4042] r8:00000003 r7:8485c000 r6:843c8000 r5:00000000 r4:00008941 [ 132.017182][ T4042] [<81487b10>] (sock_ioctl) from [<805302cc>] (sys_ioctl+0x134/0xd98) [ 132.017611][ T4042] r9:84f41180 r8:00000003 r7:00000000 r6:84f41181 r5:00000000 r4:00008941 [ 132.018010][ T4042] [<80530198>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 132.018439][ T4042] Exception stack(0xeaa35fa8 to 0xeaa35ff0) [ 132.018778][ T4042] 5fa0: 00000000 00000000 00000003 00008941 00000000 00000000 [ 132.019193][ T4042] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b420bc [ 132.019598][ T4042] 5fe0: 76b41ec0 76b41eb0 00018af0 00133450 [ 132.019887][ T4042] r10:00000036 r9:84deb000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 132.020268][ T4042] r4:00000000 [ 132.131524][ T4044] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4044 comm=syz.0.102 [ 135.406610][ T4065] FAULT_INJECTION: forcing a failure. [ 135.406610][ T4065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.409357][ T4065] CPU: 0 UID: 0 PID: 4065 Comm: syz.1.112 Not tainted 6.12.0-rc7-syzkaller #0 [ 135.412065][ T4065] Hardware name: ARM-Versatile Express [ 135.412917][ T4065] Call trace: [ 135.414160][ T4065] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 135.414864][ T4065] r7:00000000 r6:00000000 r5:60000013 r4:8203dc40 [ 135.415248][ T4065] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 135.415755][ T4065] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 135.416137][ T4065] r5:00000000 r4:8274e844 [ 135.416326][ T4065] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 135.416694][ T4065] [<808e6518>] (should_fail_ex) from [<808e6708>] (should_fail+0x14/0x18) [ 135.417026][ T4065] r6:00000000 r5:eaeadf68 r4:00000002 [ 135.417242][ T4065] [<808e66f4>] (should_fail) from [<808e6728>] (should_fail_usercopy+0x1c/0x20) [ 135.417604][ T4065] [<808e670c>] (should_fail_usercopy) from [<8054f480>] (simple_read_from_buffer+0x8c/0x134) [ 135.418016][ T4065] [<8054f3f4>] (simple_read_from_buffer) from [<805c4020>] (proc_fail_nth_read+0xb8/0x100) [ 135.418444][ T4065] r10:00000001 r9:805c3f68 r8:00000002 r7:eaeadf68 r6:0000000f r5:76be7f30 [ 135.418741][ T4065] r4:83e4c800 r3:eaeade9f [ 135.418928][ T4065] [<805c3f68>] (proc_fail_nth_read) from [<80516a34>] (vfs_read+0x98/0x324) [ 135.419310][ T4065] r8:76be7f30 r7:eaeadf68 r6:83e4c800 r5:0000000f r4:84f41c00 [ 135.419584][ T4065] [<8051699c>] (vfs_read) from [<805176e4>] (ksys_read+0x78/0xf8) [ 135.419947][ T4065] r10:00000003 r9:83e4c800 r8:8020029c r7:00000000 r6:00000000 r5:84f41c00 [ 135.420239][ T4065] r4:84f41c03 [ 135.420422][ T4065] [<8051766c>] (ksys_read) from [<80517774>] (sys_read+0x10/0x14) [ 135.420779][ T4065] r7:00000003 r6:00000004 r5:76be7f30 r4:0000000f [ 135.421013][ T4065] [<80517764>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 135.421346][ T4065] Exception stack(0xeaeadfa8 to 0xeaeadff0) [ 135.421605][ T4065] dfa0: 0000000f 76be7f30 00000004 76be7f30 0000000f 00000000 [ 135.421921][ T4065] dfc0: 0000000f 76be7f30 00000004 00000003 00000000 00006364 003d0f00 76be80bc [ 135.422426][ T4065] dfe0: 00000158 76be7ed0 000d8998 00131324 [ 136.700681][ T31] audit: type=1400 audit(136.600:155): avc: denied { setopt } for pid=4079 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.705761][ T4080] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 140.477339][ T4115] FAULT_INJECTION: forcing a failure. [ 140.477339][ T4115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.478399][ T4115] CPU: 1 UID: 0 PID: 4115 Comm: syz.0.134 Not tainted 6.12.0-rc7-syzkaller #0 [ 140.478956][ T4115] Hardware name: ARM-Versatile Express [ 140.479234][ T4115] Call trace: [ 140.479470][ T4115] [<8199cb58>] (dump_backtrace) from [<8199cc54>] (show_stack+0x18/0x1c) [ 140.479952][ T4115] r7:00000000 r6:00000000 r5:60000013 r4:8203dc40 [ 140.480233][ T4115] [<8199cc3c>] (show_stack) from [<819bb104>] (dump_stack_lvl+0x70/0x7c) [ 140.480654][ T4115] [<819bb094>] (dump_stack_lvl) from [<819bb128>] (dump_stack+0x18/0x1c) [ 140.481064][ T4115] r5:00000000 r4:8274e844 [ 140.481292][ T4115] [<819bb110>] (dump_stack) from [<808e66a4>] (should_fail_ex+0x18c/0x1dc) [ 140.481713][ T4115] [<808e6518>] (should_fail_ex) from [<808e6708>] (should_fail+0x14/0x18) [ 140.482146][ T4115] r6:00000000 r5:eb171f68 r4:00000002 [ 140.482416][ T4115] [<808e66f4>] (should_fail) from [<808e6728>] (should_fail_usercopy+0x1c/0x20) [ 140.482838][ T4115] [<808e670c>] (should_fail_usercopy) from [<8054f480>] (simple_read_from_buffer+0x8c/0x134) [ 140.483293][ T4115] [<8054f3f4>] (simple_read_from_buffer) from [<805c4020>] (proc_fail_nth_read+0xb8/0x100) [ 140.483749][ T4115] r10:00000001 r9:805c3f68 r8:00000002 r7:eb171f68 r6:0000000f r5:76b41f30 [ 140.484544][ T4115] r4:8457b000 r3:eb171e9f [ 140.484844][ T4115] [<805c3f68>] (proc_fail_nth_read) from [<80516a34>] (vfs_read+0x98/0x324) [ 140.485249][ T4115] r8:76b41f30 r7:eb171f68 r6:8457b000 r5:0000000f r4:84272d80 [ 140.485596][ T4115] [<8051699c>] (vfs_read) from [<805176e4>] (ksys_read+0x78/0xf8) [ 140.487133][ T4115] r10:00000003 r9:8457b000 r8:8020029c r7:00000000 r6:00000000 r5:84272d80 [ 140.487625][ T4115] r4:84272d83 [ 140.487887][ T4115] [<8051766c>] (ksys_read) from [<80517774>] (sys_read+0x10/0x14) [ 140.488358][ T4115] r7:00000003 r6:00000004 r5:76b41f30 r4:0000000f [ 140.489147][ T4115] [<80517764>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 140.489777][ T4115] Exception stack(0xeb171fa8 to 0xeb171ff0) [ 140.490196][ T4115] 1fa0: 0000000f 76b41f30 00000004 76b41f30 0000000f 00000000 [ 140.490678][ T4115] 1fc0: 0000000f 76b41f30 00000004 00000003 00000000 00006364 003d0f00 76b420bc [ 140.491134][ T4115] 1fe0: 00000158 76b41ed0 000d8998 00131324 [ 143.280325][ T4139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=4139 comm=syz.0.141 [ 145.915835][ T31] audit: type=1400 audit(145.820:156): avc: denied { create } for pid=4152 comm="syz.0.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 145.921051][ T4153] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 145.921403][ T4153] audit: out of memory in audit_log_start [ 146.058026][ T4155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=4155 comm=syz.0.145 [ 146.188207][ T31] audit: type=1400 audit(146.090:157): avc: denied { setopt } for pid=4156 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 146.404558][ T31] audit: type=1400 audit(146.310:158): avc: denied { bind } for pid=4156 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 146.940421][ T31] audit: type=1400 audit(146.840:159): avc: denied { name_bind } for pid=4164 comm="syz.0.150" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 149.218973][ T31] audit: type=1400 audit(149.120:160): avc: denied { map_create } for pid=4167 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 149.235666][ T31] audit: type=1400 audit(149.130:161): avc: denied { prog_load } for pid=4167 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 149.236540][ T31] audit: type=1400 audit(149.130:162): avc: denied { bpf } for pid=4167 comm="syz.0.151" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 149.237244][ T31] audit: type=1400 audit(149.130:163): avc: denied { perfmon } for pid=4167 comm="syz.0.151" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 156.117070][ T31] audit: type=1400 audit(156.020:164): avc: denied { create } for pid=4173 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 162.647483][ T31] audit: type=1400 audit(162.550:165): avc: denied { connect } for pid=4184 comm="syz.0.156" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.649880][ T31] audit: type=1400 audit(162.550:166): avc: denied { write } for pid=4184 comm="syz.0.156" path="socket:[3816]" dev="sockfs" ino=3816 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 164.472218][ T31] audit: type=1400 audit(164.370:167): avc: denied { listen } for pid=4187 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 164.655198][ T31] audit: type=1400 audit(164.550:168): avc: denied { write } for pid=4187 comm="syz.0.157" lport=33284 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 164.780303][ T31] audit: type=1400 audit(164.680:169): avc: denied { prog_run } for pid=4192 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 178.007077][ T31] audit: type=1400 audit(177.910:170): avc: denied { create } for pid=4215 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 178.050436][ T31] audit: type=1400 audit(177.950:171): avc: denied { create } for pid=4215 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 185.426166][ T4222] capability: warning: `syz.0.168' uses deprecated v2 capabilities in a way that may be insecure [ 186.984666][ T31] audit: type=1400 audit(186.880:172): avc: denied { write } for pid=4224 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 187.860235][ T2883] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 188.036177][ T2883] usb 1-1: Using ep0 maxpacket: 32 [ 188.102744][ T2883] usb 1-1: config index 0 descriptor too short (expected 29220, got 36) [ 188.103189][ T2883] usb 1-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 188.103557][ T2883] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 188.104278][ T2883] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 188.104771][ T2883] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 188.107342][ T2883] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 188.110483][ T2883] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 188.113212][ T2883] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 188.124418][ T2883] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 188.125386][ T2883] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 188.138901][ T2883] usb 1-1: config 0 descriptor?? [ 188.447732][ T2883] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 188.460798][ T2883] usb 1-1: USB disconnect, device number 2 [ 188.518295][ T2883] usblp0: removed [ 191.196844][ T4257] ptrace attach of "/syz-executor exec"[4258] was attempted by " \x07† ” \x09 ž "[4257] [ 193.874658][ T2883] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 194.044615][ T2883] usb 1-1: Using ep0 maxpacket: 8 [ 194.118123][ T2883] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee [ 194.118587][ T2883] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 194.118859][ T2883] usb 1-1: Product: syz [ 194.119043][ T2883] usb 1-1: Manufacturer: syz [ 194.119220][ T2883] usb 1-1: SerialNumber: syz [ 194.130354][ T2883] usb 1-1: config 0 descriptor?? [ 198.725387][ T31] audit: type=1400 audit(198.630:173): avc: denied { getopt } for pid=4268 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 200.003720][ T31] audit: type=1400 audit(199.900:174): avc: denied { connect } for pid=4273 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 200.009005][ T4274] vcan0: tx drop: invalid sa for name 0x0000000000000002 [ 204.396637][ T2883] usb 1-1: USB disconnect, device number 3 [ 204.564848][ T31] audit: type=1400 audit(204.460:175): avc: denied { connect } for pid=4296 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 204.566118][ T31] audit: type=1400 audit(204.460:176): avc: denied { name_connect } for pid=4296 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 204.980265][ T31] audit: type=1400 audit(204.880:177): avc: denied { sqpoll } for pid=4287 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 218.817680][ T31] audit: type=1400 audit(218.720:178): avc: denied { bind } for pid=4307 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 218.818366][ T31] audit: type=1400 audit(218.720:179): avc: denied { name_bind } for pid=4307 comm="syz.0.186" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 218.818971][ T31] audit: type=1400 audit(218.720:180): avc: denied { node_bind } for pid=4307 comm="syz.0.186" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 218.829309][ T31] audit: type=1400 audit(218.730:181): avc: denied { name_connect } for pid=4307 comm="syz.0.186" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 223.034868][ T3044] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 223.219383][ T3044] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 223.220375][ T3044] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 223.220711][ T3044] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 223.221144][ T3044] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 223.274657][ T3044] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 223.275152][ T3044] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 223.275411][ T3044] usb 2-1: Product: syz [ 223.275627][ T3044] usb 2-1: Manufacturer: syz [ 223.328606][ T3044] cdc_wdm 2-1:1.0: skipping garbage [ 223.328989][ T3044] cdc_wdm 2-1:1.0: skipping garbage [ 223.336248][ T3044] cdc_wdm 2-1:1.0: cdc-wdm0: USB WDM device [ 223.582876][ T3044] usb 2-1: USB disconnect, device number 2 [ 226.862377][ T31] audit: type=1400 audit(226.760:182): avc: denied { create } for pid=4342 comm="syz.1.193" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 242.450535][ T4348] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 242.452611][ T4348] ------------[ cut here ]------------ [ 242.454963][ T4348] kernel BUG at mm/usercopy.c:102! [ 242.458118][ T4348] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 242.458924][ T4348] Modules linked in: [ 242.459583][ T4348] CPU: 0 UID: 0 PID: 4348 Comm: syz.0.194 Not tainted 6.12.0-rc7-syzkaller #0 [ 242.459992][ T4348] Hardware name: ARM-Versatile Express [ 242.460675][ T4348] PC is at usercopy_abort+0x98/0x9c [ 242.461638][ T4348] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 242.462040][ T4348] pc : [<819a30e8>] lr : [<802bcae4>] psr: 60000013 [ 242.463171][ T4348] sp : dfca5e38 ip : dfca5d78 fp : dfca5e5c [ 242.463500][ T4348] r10: 0000001a r9 : 84d0b000 r8 : 84d0bc50 [ 242.463850][ T4348] r7 : ddea6520 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 242.464379][ T4348] r3 : 84d0b000 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 242.465051][ T4348] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 242.470583][ T4348] Control: 30c5387d Table: 84f3e340 DAC: fffffffd [ 242.474660][ T4348] Register r0 information: non-paged memory [ 242.475567][ T4348] Register r1 information: NULL pointer [ 242.475847][ T4348] Register r2 information: NULL pointer [ 242.476117][ T4348] Register r3 information: slab task_struct start 84d0b000 pointer offset 0 size 3072 [ 242.477312][ T4348] Register r4 information: non-paged memory [ 242.477782][ T4348] Register r5 information: non-paged memory [ 242.478090][ T4348] Register r6 information: NULL pointer [ 242.478369][ T4348] Register r7 information: non-slab/vmalloc memory [ 242.478982][ T4348] Register r8 information: slab task_struct start 84d0bc00 pointer offset 80 size 3072 [ 242.479451][ T4348] Register r9 information: slab task_struct start 84d0b000 pointer offset 0 size 3072 [ 242.479940][ T4348] Register r10 information: non-paged memory [ 242.480228][ T4348] Register r11 information: 2-page vmalloc region starting at 0xdfca4000 allocated at kernel_clone+0xac/0x3e4 [ 242.480927][ T4348] Register r12 information: 2-page vmalloc region starting at 0xdfca4000 allocated at kernel_clone+0xac/0x3e4 [ 242.481502][ T4348] Process syz.0.194 (pid: 4348, stack limit = 0xdfca4000) [ 242.482157][ T4348] Stack: (0xdfca5e38 to 0xdfca6000) [ 242.482424][ T4348] 5e20: 8205bcdc 8202d6e8 [ 242.482825][ T4348] 5e40: 82042d38 00000050 00000074 84d0b000 dfca5e8c dfca5e60 804cf6e0 819a305c [ 242.483210][ T4348] 5e60: 00000074 dfca5e70 802147c0 84d0bc50 00000074 00000000 84d0bcc4 ddea6520 [ 242.483613][ T4348] 5e80: dfca5ec4 dfca5e90 8050e3a4 804cf614 00000074 000003ff dfca5eb4 84d0bc50 [ 242.484223][ T4348] 5ea0: 00000074 000003ff 00000000 20000000 84d0b000 0000001a dfca5ef4 dfca5ec8 [ 242.484726][ T4348] 5ec0: 80209d94 8050e128 84d0bc00 dddd0400 dfca5ef4 dfca5ee0 819c85c4 20000000 [ 242.486361][ T4348] 5ee0: 0000000c 000003ff dfca5f6c dfca5ef8 8020a448 80209d10 00000000 20000000 [ 242.492728][ T4348] 5f00: dfca5f1c dfca5f10 819c8490 8027b990 dfca5f6c dfca5f20 802805a4 819c846c [ 242.494460][ T4348] 5f20: dfca5f54 00000000 8027d414 60000013 81974fb0 8198c234 dfca5f54 328d2261 [ 242.494888][ T4348] 5f40: 84d0bc00 0000000f 84d0bc00 328d2261 0000000f 84d0bc00 000003ff 00000000 [ 242.495316][ T4348] 5f60: dfca5fa4 dfca5f70 802528b4 8020a120 80202cc0 328d2261 dfca5fac 00000000 [ 242.495751][ T4348] 5f80: 00000000 002862f4 0000001a 8020029c 84d0b000 0000001a 00000000 dfca5fa8 [ 242.496155][ T4348] 5fa0: 80200060 80252688 00000000 00000000 0000000f 000000ff 000003ff 20000000 [ 242.496528][ T4348] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b420bc [ 242.496909][ T4348] 5fe0: 76b41ec0 76b41eb0 00018af0 00133450 60000010 0000000f 00000000 00000000 [ 242.497454][ T4348] Call trace: [ 242.497761][ T4348] [<819a3050>] (usercopy_abort) from [<804cf6e0>] (__check_heap_object+0xd8/0xf4) [ 242.498345][ T4348] [<804cf608>] (__check_heap_object) from [<8050e3a4>] (__check_object_size+0x288/0x304) [ 242.498941][ T4348] r8:ddea6520 r7:84d0bcc4 r6:00000000 r5:00000074 r4:84d0bc50 [ 242.499220][ T4348] [<8050e11c>] (__check_object_size) from [<80209d94>] (fpa_set+0x90/0x118) [ 242.499650][ T4348] r10:0000001a r9:84d0b000 r8:20000000 r7:00000000 r6:000003ff r5:00000074 [ 242.499970][ T4348] r4:84d0bc50 [ 242.500138][ T4348] [<80209d04>] (fpa_set) from [<8020a448>] (arch_ptrace+0x334/0x424) [ 242.500560][ T4348] r6:000003ff r5:0000000c r4:20000000 [ 242.500813][ T4348] [<8020a114>] (arch_ptrace) from [<802528b4>] (sys_ptrace+0x238/0x4e0) [ 242.501216][ T4348] r7:00000000 r6:000003ff r5:84d0bc00 r4:0000000f [ 242.501507][ T4348] [<8025267c>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 242.501861][ T4348] Exception stack(0xdfca5fa8 to 0xdfca5ff0) [ 242.502280][ T4348] 5fa0: 00000000 00000000 0000000f 000000ff 000003ff 20000000 [ 242.502668][ T4348] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b420bc [ 242.503025][ T4348] 5fe0: 76b41ec0 76b41eb0 00018af0 00133450 [ 242.503295][ T4348] r10:0000001a r9:84d0b000 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 242.503656][ T4348] r4:00000000 [ 242.504293][ T4348] Code: e30b0ce0 e3480205 e58dc000 ebfff273 (e7f001f2) [ 242.505082][ T4348] ---[ end trace 0000000000000000 ]--- [ 242.505815][ T4348] Kernel panic - not syncing: Fatal exception [ 242.508030][ T4348] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:05:21 Registers: info registers vcpu 0 CPU#0 R00=82fc9c40 R01=00000072 R02=eb025000 R03=eb025018 R04=82873448 R05=82fc9c40 R06=809e9bc0 R07=82873454 R08=8287341c R09=00000039 R10=00000001 R11=dfca5b5c R12=00000002 R13=dfca5b50 R14=827584a4 R15=809e9bd0 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76b420bc R12=20001450 R13=20001450 R14=00018b8c R15=00018b8c PSR=20000010 --C- A S usr32 s00=04000000 s01=00000000 d00=0000000004000000 s02=10000000 s03=ffe4169a d01=ffe4169a10000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff9f44e7 s09=ff2bb865 d04=ff2bb865ff9f44e7 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=fea9b191 s13=ff639f97 d06=ff639f97fea9b191 s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=00000000 s17=017375bd d08=017375bd00000000 s18=e0000000 s19=00008cdb d09=00008cdbe0000000 s20=00f14fdf s21=ff639f93 d10=ff639f9300f14fdf s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=059f44e7 s25=00000000 d12=00000000059f44e7 s26=10000000 s27=ffe4169a d13=ffe4169a10000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=00e683ef s33=ff34089e d16=ff34089e00e683ef s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=00e9b5bf s37=ff817119 d18=ff81711900e9b5bf s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=00d349d0 s43=00000000 d21=0000000000d349d0 s44=00000001 s45=00000000 d22=0000000000000001 s46=00466df0 s47=00000000 d23=0000000000466df0 s48=01cd4222 s49=017375bd d24=017375bd01cd4222 s50=053a28d0 s51=00000000 d25=00000000053a28d0 s52=01d4315a s53=0094a210 d26=0094a21001d4315a s54=01de8e4f s55=ffb1c148 d27=ffb1c14801de8e4f s56=ff81e093 s57=01fdb778 d28=01fdb778ff81e093 s58=00fedbbc s59=01de8e4f d29=01de8e4f00fedbbc s60=ff62172c s61=ffe41699 d30=ffe41699ff62172c s62=4a651c17 s63=002a8f08 d31=002a8f084a651c17 FPSCR: 00000000