last executing test programs: 21m3.601699196s ago: executing program 0 (id=4431): r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRESOCT=r0], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0d0000007f000000040000000809000000000000", @ANYRES32=r2], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x38, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='contention_end\x00', r3}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x40}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r6) sendmsg$NL802154_CMD_GET_WPAN_PHY(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, {0xfffffffffffffffd}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004001000040122000b00000001000000", @ANYRES32, @ANYBLOB="0000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r8}, 0x38) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x16c, r9, 0x800, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc00}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bb8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x21}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x300}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc71}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc3}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40040) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f00000000c0), 0x1, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000001000000000000008d08000071122d0000000000"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, 0x0, 0x4004) socket$kcm(0x2, 0xa, 0x2) 20m59.891231587s ago: executing program 0 (id=4444): r0 = socket$kcm(0xa, 0x2, 0x3a) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000008ff"], 0x18) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 20m59.686782358s ago: executing program 0 (id=4446): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e60, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) 20m59.44954196s ago: executing program 0 (id=4448): r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRESOCT=r0], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0d0000007f000000040000000809000000000000", @ANYRES32=r2], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x38, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='contention_end\x00', r3}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x40}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r6) sendmsg$NL802154_CMD_GET_WPAN_PHY(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, {0xfffffffffffffffd}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004001000040122000b00000001000000", @ANYRES32, @ANYBLOB="0000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r8}, 0x38) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r2) sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x16c, r9, 0x800, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc00}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3bb8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x21}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x300}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc71}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc3}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40040) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f00000000c0), 0x1, r8}, 0x38) 20m55.131541333s ago: executing program 0 (id=4458): sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f00000007c0)={0x0, 0x128}, 0x1, 0x0, 0x0, 0x20000000}, 0x8810) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x500, 0x0, &(0x7f0000000800)={&(0x7f0000000040)=ANY=[@ANYBLOB="02"], 0x10}, 0x19}, 0x0) 20m54.830641608s ago: executing program 0 (id=4460): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r1, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000d40)="3ce2de4d8d957a8de4e490b6cd03b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565", 0x34, 0x4000800, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000080)=""/43, 0x2b}], 0x2}, 0x2}], 0x2, 0x22, 0x0) socket(0x1f, 0x3, 0x80000001) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000080)=0xfffffffffbfffffe) connect$vsock_stream(r3, &(0x7f0000000280)={0x28, 0x0, 0x0, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'lo\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x8}, 0x18) ppoll(&(0x7f0000000500)=[{r2}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x8000000000, 0x1}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffc}, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x5c}}, 0x4004890) 20m9.148987024s ago: executing program 32 (id=4460): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r1, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000d40)="3ce2de4d8d957a8de4e490b6cd03b988d4edef164bd3377aa381b5f50b7ca414516489f78cd7208982e9bde22b2b7c1c7606d565", 0x34, 0x4000800, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000080)=""/43, 0x2b}], 0x2}, 0x2}], 0x2, 0x22, 0x0) socket(0x1f, 0x3, 0x80000001) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000080)=0xfffffffffbfffffe) connect$vsock_stream(r3, &(0x7f0000000280)={0x28, 0x0, 0x0, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'lo\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x8}, 0x18) ppoll(&(0x7f0000000500)=[{r2}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x8000000000, 0x1}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffc}, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x5c}}, 0x4004890) 28.403651129s ago: executing program 1 (id=6523): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002d40)={@ifindex, 0xffffffffffffffff, 0x37, 0x2}, 0x20) 28.319820662s ago: executing program 1 (id=6524): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r3, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) r6 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r6, &(0x7f0000000100)={0x1d, r5, 0x1, {0x0, 0xff, 0x4}, 0xfe}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r3, {0x6, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) 25.510388466s ago: executing program 1 (id=6525): openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "c8444943470da91b", "42f3ac0e0b8a32be8fe91c368e60693800000000d6e5394b00", "e7198360", "f7a5c1777af05eaa"}, 0x38) write$binfmt_elf64(r3, 0x0, 0x78) 18.218677286s ago: executing program 2 (id=6529): syz_open_dev$tty1(0xc, 0x4, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f000000b100), 0x0, 0x10003, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x0) fchdir(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000000c0), 0x4000111, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) pwrite64(r2, &(0x7f0000000140)='2', 0x1, 0x8000c61) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r7, 0x0) 14.149916186s ago: executing program 2 (id=6530): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 14.070284799s ago: executing program 2 (id=6531): r0 = epoll_create1(0x0) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000003d40), 0x4) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @local}, 0x8) syz_emit_ethernet(0x2a, &(0x7f0000000380)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x20, 0xfc, 0x2, 0x0, @empty, @multicast1=0xe0000300}, @echo_reply={0x0, 0x0, 0x0, 0x64, 0xff58}}}}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13.946555374s ago: executing program 2 (id=6532): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="c99b57381801238c09d0ff0f1d0dbd3048a814138526a14d4065cc28a18426ef167a", 0x22) 13.848757837s ago: executing program 2 (id=6533): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) accept$unix(r2, &(0x7f0000000400)=@abs, &(0x7f0000000380)=0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x11, 0x4, 0x4, 0x9}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3, 0x1000000}, 0x20) 11.550281862s ago: executing program 1 (id=6534): creat(&(0x7f0000000100)='./file0\x00', 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r0, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x7], &(0x7f0000000500), 0x0, 0x100000}}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x0) 11.410764248s ago: executing program 1 (id=6535): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f00000001c0)={0xa, 0xe1c, 0x80000, @private2, 0x800}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@dstopts_2292={{0x18, 0x29, 0x4, {0x6c}}}], 0x18}, 0x40c0) 11.310709271s ago: executing program 1 (id=6536): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) socket$nl_rdma(0x10, 0x3, 0x14) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee7, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002040)={0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0xf}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$rds(r0, &(0x7f0000000740)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000880)=[@rdma_map={0x30, 0x10c, 0x3, {{0x0}, 0x0}}], 0x30}, 0x0) 0s ago: executing program 2 (id=6537): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x9, 0x10000, 0xff, 0x2, 0x4, 0xc, 0x7, 0xa, 0x100, 0x5, 0x1, 0xfffffffe, 0x31, 0x4006, 0x101, 0x0, 0x801a449, 0x3, 0x40000004, 0x89, 0xcaa3, 0x7ff, 0x20001e58, 0xb, 0xe68, 0x0, 0x8, 0xf9e8, 0x0, 0xfffffff8]}) kernel console output (not intermixed with test programs): r6:eacf5e48 r5:84d42780 r4:00000000 [ 3798.888543][T29845] [<8058bf30>] (file_setxattr) from [<8058c18c>] (path_setxattrat+0x104/0x17c) [ 3798.888603][T29845] r7:00000003 r6:84d42780 r5:84d42781 r4:00000000 [ 3798.888624][T29845] [<8058c088>] (path_setxattrat) from [<8058c404>] (sys_fsetxattr+0x30/0x38) [ 3798.888745][T29845] r8:8020029c r7:000000e4 r6:00130270 r5:00000000 r4:00000000 [ 3798.888988][T29845] [<8058c3d4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3798.889047][T29845] Exception stack(0xeacf5fa8 to 0xeacf5ff0) [ 3798.889177][T29845] 5fa0: 00000000 00000000 00000003 20000040 00000000 00000000 [ 3798.889219][T29845] 5fc0: 00000000 00000000 00130270 000000e4 002e0000 00000000 00006364 76f6e0bc [ 3798.889247][T29845] 5fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 3799.828324][T29394] veth0_vlan: entered promiscuous mode [ 3799.847787][T29394] veth1_vlan: entered promiscuous mode [ 3799.939254][T29394] veth0_macvtap: entered promiscuous mode [ 3799.944061][T29394] veth1_macvtap: entered promiscuous mode [ 3800.011521][T29392] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3800.026442][T29392] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3800.026634][T29392] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3800.026869][T29392] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3800.095237][ T31] audit: type=1400 audit(3800.020:556): avc: denied { mounton } for pid=29394 comm="syz-executor" path="/syzkaller.izHPoD/syz-tmp" dev="vda" ino=824 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3800.112547][ T31] audit: type=1400 audit(3800.030:557): avc: denied { mount } for pid=29394 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3800.112765][ T31] audit: type=1400 audit(3800.030:558): avc: denied { mount } for pid=29394 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3800.112961][ T31] audit: type=1400 audit(3800.030:559): avc: denied { mounton } for pid=29394 comm="syz-executor" path="/syzkaller.izHPoD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3800.123079][ T31] audit: type=1400 audit(3800.050:560): avc: denied { mounton } for pid=29394 comm="syz-executor" path="/syzkaller.izHPoD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=66060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3800.142158][ T31] audit: type=1400 audit(3800.070:561): avc: denied { unmount } for pid=29394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3800.150634][ T31] audit: type=1400 audit(3800.080:562): avc: denied { mounton } for pid=29394 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3800.151701][ T31] audit: type=1400 audit(3800.080:563): avc: denied { mount } for pid=29394 comm="syz-executor" name="/" dev="gadgetfs" ino=781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3800.157031][ T31] audit: type=1400 audit(3800.090:564): avc: denied { mount } for pid=29394 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3800.158730][ T31] audit: type=1400 audit(3800.090:565): avc: denied { mounton } for pid=29394 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3803.398250][T29891] SELinux: syz.1.5765 (29891) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3810.332360][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 3810.332594][ T31] audit: type=1400 audit(3810.260:571): avc: denied { create } for pid=29922 comm="syz.2.5771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3811.836740][T29933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29933 comm=syz.1.5774 [ 3814.948140][ T31] audit: type=1400 audit(3814.870:572): avc: denied { mounton } for pid=29943 comm="syz.1.5777" path="/522/file0" dev="tmpfs" ino=2676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3815.480980][T29944] FAULT_INJECTION: forcing a failure. [ 3815.480980][T29944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3815.481352][T29944] CPU: 1 UID: 0 PID: 29944 Comm: syz.1.5777 Not tainted syzkaller #0 PREEMPT [ 3815.481462][T29944] Hardware name: ARM-Versatile Express [ 3815.481489][T29944] Call trace: [ 3815.481534][T29944] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3815.481660][T29944] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 3815.481687][T29944] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3815.481739][T29944] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3815.481798][T29944] r5:84fa5400 r4:8294f190 [ 3815.481816][T29944] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3815.481956][T29944] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3815.482211][T29944] r8:76f6df30 r7:00000000 r6:00000000 r5:eadb1f68 r4:00000002 [ 3815.482289][T29944] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3815.482352][T29944] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 3815.482428][T29944] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 3815.482553][T29944] r10:00000001 r9:80608514 r8:00000002 r7:eadb1f68 r6:0000000f r5:76f6df30 [ 3815.482584][T29944] r4:84fa5400 r3:eadb1e9f [ 3815.482649][T29944] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 3815.482727][T29944] r8:76f6df30 r7:eadb1f68 r6:84fa5400 r5:0000000f r4:856dc240 [ 3815.482749][T29944] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 3815.482816][T29944] r10:00000003 r9:84fa5400 r8:8020029c r7:00000000 r6:00000000 r5:856dc240 [ 3815.482840][T29944] r4:856dc243 [ 3815.482858][T29944] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 3815.482943][T29944] r7:00000003 r6:00000004 r5:76f6df30 r4:0000000f [ 3815.482962][T29944] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3815.483014][T29944] Exception stack(0xeadb1fa8 to 0xeadb1ff0) [ 3815.483092][T29944] 1fa0: 0000000f 76f6df30 00000004 76f6df30 0000000f 00000000 [ 3815.483195][T29944] 1fc0: 0000000f 76f6df30 00000004 00000003 002e0000 00000000 00006364 76f6e0bc [ 3815.483308][T29944] 1fe0: 00000158 76f6ded0 000d80f0 00130194 [ 3815.791505][T29955] FAULT_INJECTION: forcing a failure. [ 3815.791505][T29955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3815.792396][T29955] CPU: 0 UID: 0 PID: 29955 Comm: syz.1.5781 Not tainted syzkaller #0 PREEMPT [ 3815.792479][T29955] Hardware name: ARM-Versatile Express [ 3815.792494][T29955] Call trace: [ 3815.792516][T29955] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3815.792575][T29955] r7:eadede20 r6:00000000 r5:60000013 r4:82260500 [ 3815.792586][T29955] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3815.792615][T29955] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3815.792646][T29955] r5:84f48c00 r4:8294f190 [ 3815.792654][T29955] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3815.792685][T29955] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3815.792720][T29955] r8:00008020 r7:eadede20 r6:20000300 r5:00000000 r4:eadedf20 [ 3815.792729][T29955] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3815.792757][T29955] [<809727c0>] (should_fail_usercopy) from [<815464c0>] (copy_msghdr_from_user+0x50/0x130) [ 3815.792792][T29955] [<81546470>] (copy_msghdr_from_user) from [<81546618>] (___sys_sendmsg+0x78/0xd0) [ 3815.792829][T29955] r8:00008020 r7:00000000 r6:85137900 r5:eadedf20 r4:eadede64 [ 3815.792837][T29955] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 3815.792873][T29955] r10:00000128 r9:84f48c00 r8:84eaff00 r7:00008020 r6:20000300 r5:84eaff00 [ 3815.792884][T29955] r4:00000003 [ 3815.792892][T29955] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 3815.792922][T29955] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3815.792931][T29955] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3815.792954][T29955] Exception stack(0xeadedfa8 to 0xeadedff0) [ 3815.792975][T29955] dfa0: 00000000 00000000 00000003 20000300 00008020 00000000 [ 3815.792994][T29955] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f6e0bc [ 3815.793009][T29955] dfe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 3820.744040][T29977] fuse: Unknown parameter 'gro' [ 3825.733723][ T31] audit: type=1400 audit(3825.660:573): avc: denied { map_read map_write } for pid=29994 comm="syz.2.5792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3831.408196][ T31] audit: type=1400 audit(3831.340:574): avc: denied { create } for pid=30008 comm="syz.1.5796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3831.413076][ T31] audit: type=1400 audit(3831.340:575): avc: denied { write } for pid=30008 comm="syz.1.5796" path="socket:[66196]" dev="sockfs" ino=66196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3839.869599][ T31] audit: type=1400 audit(3839.800:576): avc: denied { create } for pid=30047 comm="syz.2.5807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3840.021335][ T31] audit: type=1400 audit(3839.950:577): avc: denied { create } for pid=30050 comm="syz.2.5808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3843.634901][T30074] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=512 sclass=netlink_audit_socket pid=30074 comm=syz.1.5814 [ 3844.032173][T30082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30082 comm=syz.1.5816 [ 3844.574021][ T31] audit: type=1400 audit(3844.500:578): avc: denied { ioctl } for pid=30081 comm="syz.1.5816" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0xf50b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dbusd_exec_t:s0" [ 3846.954008][T30100] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5130 sclass=netlink_audit_socket pid=30100 comm=syz.1.5821 [ 3856.890033][T30150] FAULT_INJECTION: forcing a failure. [ 3856.890033][T30150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3856.891305][T30150] CPU: 0 UID: 0 PID: 30150 Comm: syz.2.5837 Not tainted syzkaller #0 PREEMPT [ 3856.891386][T30150] Hardware name: ARM-Versatile Express [ 3856.891401][T30150] Call trace: [ 3856.891422][T30150] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3856.891487][T30150] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 3856.891496][T30150] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3856.891524][T30150] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3856.891553][T30150] r5:8543e000 r4:8294f190 [ 3856.891561][T30150] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3856.891591][T30150] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3856.891633][T30150] r8:76f6df30 r7:00000000 r6:00000000 r5:eaf45f68 r4:00000002 [ 3856.891642][T30150] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3856.891669][T30150] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 3856.891701][T30150] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 3856.891738][T30150] r10:00000001 r9:80608514 r8:00000002 r7:eaf45f68 r6:0000000f r5:76f6df30 [ 3856.891750][T30150] r4:8543e000 r3:eaf45e9f [ 3856.891759][T30150] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 3856.891793][T30150] r8:76f6df30 r7:eaf45f68 r6:8543e000 r5:0000000f r4:84eaf000 [ 3856.891803][T30150] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 3856.891838][T30150] r10:00000003 r9:8543e000 r8:8020029c r7:00000000 r6:00000000 r5:84eaf000 [ 3856.891848][T30150] r4:84eaf003 [ 3856.891856][T30150] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 3856.891888][T30150] r7:00000003 r6:00000004 r5:76f6df30 r4:0000000f [ 3856.891896][T30150] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3856.891922][T30150] Exception stack(0xeaf45fa8 to 0xeaf45ff0) [ 3856.891959][T30150] 5fa0: 0000000f 76f6df30 00000004 76f6df30 0000000f 00000000 [ 3856.892002][T30150] 5fc0: 0000000f 76f6df30 00000004 00000003 002e0000 00000000 00006364 76f6e0bc [ 3856.892035][T30150] 5fe0: 00000158 76f6ded0 000d80f0 00130194 [ 3859.653422][ T31] audit: type=1400 audit(3859.580:579): avc: denied { write } for pid=30160 comm="syz.2.5841" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dbusd_exec_t:s0" [ 3861.454340][ T31] audit: type=1400 audit(3861.380:580): avc: denied { write } for pid=30160 comm="syz.2.5841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3861.460184][ T31] audit: type=1400 audit(3861.390:581): avc: denied { setattr } for pid=30160 comm="syz.2.5841" name="KEY" dev="sockfs" ino=66514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3861.989213][ T31] audit: type=1400 audit(3861.920:582): avc: denied { map } for pid=30160 comm="syz.2.5841" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dbusd_exec_t:s0" [ 3864.260876][ T31] audit: type=1400 audit(3864.190:583): avc: denied { read write } for pid=30169 comm="syz.1.5843" name="custom1" dev="binder" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3864.263265][ T31] audit: type=1400 audit(3864.190:584): avc: denied { open } for pid=30169 comm="syz.1.5843" path="/dev/binderfs/custom1" dev="binder" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3870.760937][T30198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30198 comm=syz.1.5849 [ 3882.584410][ T31] audit: type=1400 audit(3882.510:585): avc: denied { listen } for pid=30234 comm="syz.2.5859" path=2F34352FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 3882.594182][ T31] audit: type=1400 audit(3882.520:586): avc: denied { accept } for pid=30234 comm="syz.2.5859" path=2F34352FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 3883.090153][ T31] audit: type=1400 audit(3883.020:587): avc: denied { read } for pid=30242 comm="syz.2.5863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3885.617718][ T31] audit: type=1400 audit(3885.550:588): avc: denied { create } for pid=30246 comm="syz.2.5864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3885.623609][ T31] audit: type=1400 audit(3885.550:589): avc: denied { write } for pid=30246 comm="syz.2.5864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3908.230278][T30386] FAULT_INJECTION: forcing a failure. [ 3908.230278][T30386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3908.231735][T30386] CPU: 0 UID: 0 PID: 30386 Comm: syz.2.5897 Not tainted syzkaller #0 PREEMPT [ 3908.231874][T30386] Hardware name: ARM-Versatile Express [ 3908.232016][T30386] Call trace: [ 3908.232059][T30386] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3908.232166][T30386] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 3908.232187][T30386] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3908.232301][T30386] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3908.232354][T30386] r5:8388ec00 r4:8294f190 [ 3908.232371][T30386] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3908.232429][T30386] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3908.232489][T30386] r8:76ee9f30 r7:00000000 r6:00000000 r5:eb741f68 r4:00000002 [ 3908.232506][T30386] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3908.232553][T30386] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 3908.232607][T30386] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 3908.232774][T30386] r10:00000001 r9:80608514 r8:00000002 r7:eb741f68 r6:0000000f r5:76ee9f30 [ 3908.232805][T30386] r4:8388ec00 r3:eb741e9f [ 3908.232825][T30386] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 3908.232892][T30386] r8:76ee9f30 r7:eb741f68 r6:8388ec00 r5:0000000f r4:84eaf6c0 [ 3908.232909][T30386] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 3908.232970][T30386] r10:00000003 r9:8388ec00 r8:8020029c r7:00000000 r6:00000000 r5:84eaf6c0 [ 3908.232991][T30386] r4:84eaf6c3 [ 3908.233006][T30386] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 3908.233063][T30386] r7:00000003 r6:00000005 r5:76ee9f30 r4:0000000f [ 3908.233080][T30386] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3908.233129][T30386] Exception stack(0xeb741fa8 to 0xeb741ff0) [ 3908.233171][T30386] 1fa0: 0000000f 76ee9f30 00000005 76ee9f30 0000000f 00000000 [ 3908.233212][T30386] 1fc0: 0000000f 76ee9f30 00000005 00000003 002e0000 00000000 00006364 76eea0bc [ 3908.233304][T30386] 1fe0: 00000158 76ee9ed0 000d80f0 00130194 [ 3908.436701][T30390] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30390 comm=syz.2.5900 [ 3908.446519][T30390] FAULT_INJECTION: forcing a failure. [ 3908.446519][T30390] name failslab, interval 1, probability 0, space 0, times 0 [ 3908.450269][T30390] CPU: 1 UID: 0 PID: 30390 Comm: syz.2.5900 Not tainted syzkaller #0 PREEMPT [ 3908.450394][T30390] Hardware name: ARM-Versatile Express [ 3908.450433][T30390] Call trace: [ 3908.450477][T30390] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3908.450578][T30390] r7:85773c00 r6:00000000 r5:600f0013 r4:82260500 [ 3908.450600][T30390] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3908.450652][T30390] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3908.450708][T30390] r5:85773c00 r4:82917c00 [ 3908.450724][T30390] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3908.450783][T30390] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 3908.450850][T30390] r8:00000000 r7:85773c00 r6:00000cc0 r5:ffffffff r4:832cb240 [ 3908.450868][T30390] [<8051f1ac>] (should_failslab) from [<805031bc>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 3908.450917][T30390] [<8050316c>] (kmem_cache_alloc_node_noprof) from [<815515ac>] (__alloc_skb+0x138/0x160) [ 3908.450989][T30390] r10:00000000 r9:ffffffea r8:00000cc0 r7:00000000 r6:832cb240 r5:ffffffff [ 3908.451011][T30390] r4:828060c0 [ 3908.451027][T30390] [<81551474>] (__alloc_skb) from [<8167190c>] (netlink_ack+0x70/0x214) [ 3908.451095][T30390] r8:85f72180 r7:86d858c0 r6:00000000 r5:85f72180 r4:00000018 [ 3908.451114][T30390] [<8167189c>] (netlink_ack) from [<80371d18>] (audit_receive+0xf4/0x190) [ 3908.451226][T30390] r10:00000000 r9:00000000 r8:86d858c0 r7:00000014 r6:85773c00 r5:85f72180 [ 3908.451250][T30390] r4:82abcf78 [ 3908.451266][T30390] [<80371c24>] (audit_receive) from [<8167133c>] (netlink_unicast+0x1f0/0x30c) [ 3908.451330][T30390] r8:85715880 r7:85f72180 r6:8545fd80 r5:00000014 r4:86c2a800 [ 3908.451348][T30390] [<8167114c>] (netlink_unicast) from [<81671624>] (netlink_sendmsg+0x1cc/0x444) [ 3908.451410][T30390] r9:00000000 r8:00000000 r7:86c25c00 r6:00000014 r5:85f72180 r4:eb685f20 [ 3908.451440][T30390] [<81671458>] (netlink_sendmsg) from [<81543320>] (__sock_sendmsg+0x44/0x78) [ 3908.451508][T30390] r10:00000000 r9:eb685dc4 r8:eb685dc4 r7:00000000 r6:8518b900 r5:eb685f20 [ 3908.451528][T30390] r4:00000000 [ 3908.451545][T30390] [<815432dc>] (__sock_sendmsg) from [<81544674>] (____sys_sendmsg+0x298/0x2cc) [ 3908.451605][T30390] r7:00000000 r6:8518b900 r5:00008000 r4:eb685f20 [ 3908.451623][T30390] [<815443dc>] (____sys_sendmsg) from [<8154663c>] (___sys_sendmsg+0x9c/0xd0) [ 3908.451691][T30390] r10:eb685e24 r9:200002c0 r8:00008000 r7:00000000 r6:8518b900 r5:eb685f20 [ 3908.451712][T30390] r4:00000000 [ 3908.451728][T30390] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 3908.451794][T30390] r10:00000128 r9:85773c00 r8:84d43e40 r7:00008000 r6:200002c0 r5:84d43e41 [ 3908.451814][T30390] r4:00000003 [ 3908.451830][T30390] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 3908.451886][T30390] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3908.451903][T30390] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3908.451950][T30390] Exception stack(0xeb685fa8 to 0xeb685ff0) [ 3908.451990][T30390] 5fa0: 00000000 00000000 00000003 200002c0 00008000 00000000 [ 3908.452025][T30390] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f6e0bc [ 3908.452053][T30390] 5fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 3908.548058][ T31] audit: type=1400 audit(3908.470:590): avc: denied { kexec_image_load } for pid=30391 comm="syz.1.5901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 3908.615209][ T31] audit: type=1400 audit(3908.540:591): avc: denied { accept } for pid=30395 comm="syz.1.5903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3908.787478][ T31] audit: type=1400 audit(3908.710:592): avc: denied { write } for pid=30399 comm="syz.1.5905" path="socket:[67818]" dev="sockfs" ino=67818 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3914.664877][ T31] audit: type=1400 audit(3914.590:593): avc: denied { recv } for pid=0 comm="swapper/0" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3914.881366][T30436] FAULT_INJECTION: forcing a failure. [ 3914.881366][T30436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3914.887025][T30436] CPU: 1 UID: 0 PID: 30436 Comm: syz.1.5912 Not tainted syzkaller #0 PREEMPT [ 3914.887234][T30436] Hardware name: ARM-Versatile Express [ 3914.887263][T30436] Call trace: [ 3914.887309][T30436] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3914.887434][T30436] r7:00000000 r6:00000000 r5:60010113 r4:82260500 [ 3914.887456][T30436] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3914.887510][T30436] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3914.887561][T30436] r5:832e0000 r4:8294f190 [ 3914.887577][T30436] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3914.887641][T30436] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3914.887722][T30436] r8:76f6df30 r7:00000000 r6:00000000 r5:eb799f68 r4:00000002 [ 3914.887742][T30436] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3914.887792][T30436] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 3914.887858][T30436] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 3914.887935][T30436] r10:00000001 r9:80608514 r8:00000002 r7:eb799f68 r6:0000000f r5:76f6df30 [ 3914.887961][T30436] r4:832e0000 r3:eb799e9f [ 3914.887979][T30436] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 3914.888063][T30436] r8:76f6df30 r7:eb799f68 r6:832e0000 r5:0000000f r4:84d43a80 [ 3914.888085][T30436] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 3914.888160][T30436] r10:00000003 r9:832e0000 r8:8020029c r7:00000000 r6:00000000 r5:84d43a80 [ 3914.888273][T30436] r4:84d43a83 [ 3914.888302][T30436] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 3914.888404][T30436] r7:00000003 r6:00000005 r5:76f6df30 r4:0000000f [ 3914.888428][T30436] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3914.888487][T30436] Exception stack(0xeb799fa8 to 0xeb799ff0) [ 3914.888530][T30436] 9fa0: 0000000f 76f6df30 00000005 76f6df30 0000000f 00000000 [ 3914.888570][T30436] 9fc0: 0000000f 76f6df30 00000005 00000003 002e0000 00000000 00006364 76f6e0bc [ 3914.888600][T30436] 9fe0: 00000158 76f6ded0 000d80f0 00130194 [ 3916.802164][ T31] audit: type=1400 audit(3916.730:594): avc: denied { remount } for pid=30447 comm="syz.2.5916" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3916.916542][ T31] audit: type=1400 audit(3916.840:595): avc: denied { unmount } for pid=29394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3917.940262][T30464] can: request_module (can-proto-5) failed. [ 3927.118783][T29392] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3927.180225][T29392] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3927.268663][T29392] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3927.361535][T29392] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3927.699417][T29392] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3927.714665][T29392] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3927.724444][T29392] bond0 (unregistering): Released all slaves [ 3927.829657][T29392] hsr_slave_0: left promiscuous mode [ 3927.832503][T29392] hsr_slave_1: left promiscuous mode [ 3927.851267][T29392] veth1_macvtap: left promiscuous mode [ 3927.852756][T29392] veth0_macvtap: left promiscuous mode [ 3927.855065][T29392] veth1_vlan: left promiscuous mode [ 3927.858012][T29392] veth0_vlan: left promiscuous mode [ 3929.674376][T30521] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3929.691218][T30521] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3930.842670][T30521] hsr_slave_0: entered promiscuous mode [ 3930.845547][T30521] hsr_slave_1: entered promiscuous mode [ 3930.853241][T30521] debugfs: 'hsr0' already exists in 'hsr' [ 3930.853699][T30521] Cannot create hsr debugfs directory [ 3931.249786][T30765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30765 comm=syz.2.5936 [ 3931.523348][T30880] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=30880 comm=syz.2.5938 [ 3931.541601][T30880] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30880 comm=syz.2.5938 [ 3931.561951][T30521] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3931.579972][T30521] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3931.593664][T30521] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3931.619910][T30521] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3932.640485][T30911] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=30911 comm=syz.2.5942 [ 3932.644712][T30911] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30911 comm=syz.2.5942 [ 3932.832553][T30521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3934.423111][T30948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=30948 comm=syz.2.5946 [ 3934.428540][T30948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30948 comm=syz.2.5946 [ 3935.155460][T30969] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=30969 comm=syz.2.5950 [ 3935.171284][T30969] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30969 comm=syz.2.5950 [ 3935.490565][T30977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=30977 comm=syz.2.5952 [ 3936.585499][T30521] veth0_vlan: entered promiscuous mode [ 3936.605371][T30521] veth1_vlan: entered promiscuous mode [ 3936.699559][T30521] veth0_macvtap: entered promiscuous mode [ 3936.718998][T30521] veth1_macvtap: entered promiscuous mode [ 3936.822104][T29861] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3936.822475][T29861] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3936.822569][T29861] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3936.822661][T29861] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3949.842513][T31046] FAULT_INJECTION: forcing a failure. [ 3949.842513][T31046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3949.844918][T31046] CPU: 1 UID: 0 PID: 31046 Comm: syz.1.5964 Not tainted syzkaller #0 PREEMPT [ 3949.845018][T31046] Hardware name: ARM-Versatile Express [ 3949.845047][T31046] Call trace: [ 3949.845087][T31046] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3949.845198][T31046] r7:b5403587 r6:00000000 r5:60000013 r4:82260500 [ 3949.845218][T31046] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3949.845269][T31046] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3949.845325][T31046] r5:84854800 r4:8294f190 [ 3949.845345][T31046] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3949.845405][T31046] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 3949.845475][T31046] r8:00000000 r7:b5403587 r6:76fb0cd8 r5:00000000 r4:ecb29f0c [ 3949.845600][T31046] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 3949.845711][T31046] [<809727c0>] (should_fail_usercopy) from [<8022b1c8>] (restore_vfp_context+0x3c/0xe0) [ 3949.845771][T31046] [<8022b18c>] (restore_vfp_context) from [<8022b52c>] (restore_sigframe+0x1fc/0x210) [ 3949.845829][T31046] r6:76fb0cd8 r5:00000000 r4:ecb29fb0 [ 3949.845845][T31046] [<8022b330>] (restore_sigframe) from [<8022b744>] (sys_sigreturn+0x40/0x60) [ 3949.845935][T31046] r7:00000077 r6:00188f14 r5:00000004 r4:ecb29fb0 [ 3949.845979][T31046] [<8022b704>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3949.846032][T31046] Exception stack(0xecb29fa8 to 0xecb29ff0) [ 3949.846074][T31046] 9fa0: 76fb1b00 00000004 76fb1b10 00000000 003fb0d6 00e29828 [ 3949.846115][T31046] 9fc0: 76fb1b00 00000004 00188f14 00188f1c 002e0000 00000000 00006364 76fb10bc [ 3949.846145][T31046] 9fe0: 76fb1b38 76fb0ee8 0001d6d8 0014c820 [ 3949.846171][T31046] r5:00000004 r4:76fb1b00 [ 3951.261565][ T31] audit: type=1400 audit(3951.190:596): avc: denied { getopt } for pid=31059 comm="syz.2.5969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3952.323592][ T31] audit: type=1400 audit(3952.250:597): avc: denied { ioctl } for pid=31080 comm="syz.2.5976" path="socket:[69054]" dev="sockfs" ino=69054 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3953.117458][T31093] selinux_netlink_send: 2 callbacks suppressed [ 3953.120003][T31093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31093 comm=syz.2.5979 [ 3953.421787][ T31] audit: type=1400 audit(3953.350:598): avc: denied { create } for pid=31096 comm="syz.1.5981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3953.424181][ T31] audit: type=1400 audit(3953.350:599): avc: denied { setopt } for pid=31096 comm="syz.1.5981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3958.508623][ T31] audit: type=1400 audit(3958.440:600): avc: denied { setopt } for pid=31137 comm="syz.1.5993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3958.913316][T31149] FAULT_INJECTION: forcing a failure. [ 3958.913316][T31149] name failslab, interval 1, probability 0, space 0, times 0 [ 3958.913995][T31149] CPU: 0 UID: 0 PID: 31149 Comm: syz.1.5996 Not tainted syzkaller #0 PREEMPT [ 3958.914094][T31149] Hardware name: ARM-Versatile Express [ 3958.914122][T31149] Call trace: [ 3958.914179][T31149] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3958.914312][T31149] r7:85f38000 r6:00000000 r5:60000113 r4:82260500 [ 3958.914495][T31149] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3958.915047][T31149] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3958.915212][T31149] r5:85f38000 r4:82917c00 [ 3958.915236][T31149] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3958.915624][T31149] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 3958.915999][T31149] r8:00000000 r7:85f38000 r6:00000cc0 r5:841ca500 r4:83002e40 [ 3958.916113][T31149] [<8051f1ac>] (should_failslab) from [<80503828>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3958.916177][T31149] [<805037dc>] (kmem_cache_alloc_noprof) from [<804dc4ac>] (__anon_vma_prepare+0x34/0x1b0) [ 3958.916249][T31149] r10:ecc05e70 r9:841ca500 r8:82ac8318 r7:86c1e3c0 r6:841ca500 r5:841ca500 [ 3958.916270][T31149] r4:ecc05d48 [ 3958.916288][T31149] [<804dc478>] (__anon_vma_prepare) from [<804c3aec>] (__vmf_anon_prepare+0x5c/0xcc) [ 3958.916355][T31149] r10:ecc05e70 r9:841ca500 r8:00000001 r7:00000000 r6:20000000 r5:841ca500 [ 3958.916379][T31149] r4:ecc05d48 r3:00000215 [ 3958.916398][T31149] [<804c3a90>] (__vmf_anon_prepare) from [<804c7614>] (handle_mm_fault+0xcb8/0x14dc) [ 3958.916663][T31149] r7:00000000 r6:20000000 r5:85f38000 r4:00000215 [ 3958.916694][T31149] [<804c695c>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 3958.916841][T31149] r10:00000002 r9:86c1e3c0 r8:00000215 r7:20000000 r6:00000a06 r5:20000040 [ 3958.916865][T31149] r4:ecc05e70 [ 3958.916881][T31149] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 3958.916949][T31149] r10:85f38000 r9:85f38000 r8:80234648 r7:ecc05e70 r6:20000040 r5:00000a06 [ 3958.916974][T31149] r4:8281cee0 [ 3958.916991][T31149] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 3958.917238][T31149] r9:85f38000 r8:80234648 r7:ecc05e70 r6:20000040 r5:00000a06 r4:8281cee0 [ 3958.917415][T31149] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 3958.917579][T31149] Exception stack(0xecc05e70 to 0xecc05eb8) [ 3958.917707][T31149] 5e60: 20000040 7effffff 00000000 b5003500 [ 3958.917887][T31149] 5e80: b5403587 20000040 85716740 851fe500 83acc9c0 00000003 85f38000 ecc05f14 [ 3958.917930][T31149] 5ea0: a1000043 ecc05ec0 81544d18 81a0ae08 80000013 ffffffff [ 3958.918048][T31149] r8:83acc9c0 r7:ecc05ea4 r6:ffffffff r5:80000013 r4:81a0ae08 [ 3958.918148][T31149] [<815449e4>] (sock_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 3958.918386][T31149] r9:00000003 r8:83acc9c0 r7:20000040 r6:83acc9c1 r5:00000000 r4:00008904 [ 3958.918502][T31149] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3958.918624][T31149] Exception stack(0xecc05fa8 to 0xecc05ff0) [ 3958.918737][T31149] 5fa0: 00000000 00000000 00000003 00008904 20000040 00000000 [ 3958.918932][T31149] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 3958.919008][T31149] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 3958.919708][T31149] r10:00000036 r9:85f38000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3958.919764][T31149] r4:00000000 [ 3959.221547][ T31] audit: type=1400 audit(3959.150:601): avc: denied { prog_run } for pid=31132 comm="syz.2.5992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3969.138036][T31218] FAULT_INJECTION: forcing a failure. [ 3969.138036][T31218] name failslab, interval 1, probability 0, space 0, times 0 [ 3969.138373][T31218] CPU: 0 UID: 0 PID: 31218 Comm: syz.1.6009 Not tainted syzkaller #0 PREEMPT [ 3969.138501][T31218] Hardware name: ARM-Versatile Express [ 3969.138525][T31218] Call trace: [ 3969.138565][T31218] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3969.138673][T31218] r7:00000cc0 r6:00000000 r5:60000013 r4:82260500 [ 3969.138695][T31218] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3969.138746][T31218] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3969.138802][T31218] r5:85f3a400 r4:82917c00 [ 3969.138818][T31218] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3969.138874][T31218] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 3969.138944][T31218] r8:85f3a400 r7:00000cc0 r6:dfa21d40 r5:00000008 r4:83001240 [ 3969.138963][T31218] [<8051f1ac>] (should_failslab) from [<80504860>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 3969.139012][T31218] [<805047c0>] (__kmalloc_node_track_caller_noprof) from [<8049b720>] (kstrdup+0x38/0x64) [ 3969.139078][T31218] r10:85f3a400 r9:00000000 r8:828f5404 r7:8031d508 r6:dfa21d40 r5:00000007 [ 3969.139099][T31218] r4:00000cc0 [ 3969.139115][T31218] [<8049b6e8>] (kstrdup) from [<8031d508>] (__request_module+0xfc/0x2c0) [ 3969.139218][T31218] r7:85f3a400 r6:815b5bb8 r5:00000002 r4:855b47c0 [ 3969.139238][T31218] [<8031d40c>] (__request_module) from [<815b5bb8>] (dev_load+0x80/0x8c) [ 3969.139308][T31218] r3:00400140 r2:dfa21e28 r1:8242b520 [ 3969.139339][T31218] r8:dfa21e38 r7:00008915 r6:00000000 r5:00000000 r4:dfa21e28 [ 3969.139358][T31218] [<815b5b38>] (dev_load) from [<8178395c>] (devinet_ioctl+0x70/0x788) [ 3969.139411][T31218] r5:85716740 r4:dfa21e28 [ 3969.139429][T31218] [<817838ec>] (devinet_ioctl) from [<81786848>] (inet_ioctl+0x128/0x268) [ 3969.139504][T31218] r10:85f3a400 r9:81e72bb0 r8:dfa21ecc r7:85716740 r6:20000000 r5:87602300 [ 3969.139525][T31218] r4:00008915 [ 3969.139570][T31218] [<81786720>] (inet_ioctl) from [<81544ea8>] (sock_ioctl+0x4c4/0x600) [ 3969.139640][T31218] r7:851fe280 r6:85716740 r5:20000000 r4:00008915 [ 3969.139659][T31218] [<815449e4>] (sock_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 3969.139732][T31218] r9:00000003 r8:85a28000 r7:20000000 r6:85a28001 r5:00000000 r4:00008915 [ 3969.139752][T31218] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3969.139801][T31218] Exception stack(0xdfa21fa8 to 0xdfa21ff0) [ 3969.139838][T31218] 1fa0: 00000000 00000000 00000003 00008915 20000000 00000000 [ 3969.139872][T31218] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 3969.139901][T31218] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 3969.139938][T31218] r10:00000036 r9:85f3a400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3969.139959][T31218] r4:00000000 [ 3971.935096][T31234] FAULT_INJECTION: forcing a failure. [ 3971.935096][T31234] name failslab, interval 1, probability 0, space 0, times 0 [ 3971.935642][T31234] CPU: 0 UID: 0 PID: 31234 Comm: syz.1.6014 Not tainted syzkaller #0 PREEMPT [ 3971.935816][T31234] Hardware name: ARM-Versatile Express [ 3971.935848][T31234] Call trace: [ 3971.935896][T31234] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3971.936012][T31234] r7:85770000 r6:00000000 r5:60000013 r4:82260500 [ 3971.936038][T31234] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3971.936181][T31234] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3971.936245][T31234] r5:85770000 r4:82917c00 [ 3971.936267][T31234] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3971.936334][T31234] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 3971.936414][T31234] r8:00000000 r7:85770000 r6:00000dc0 r5:8468d800 r4:83001300 [ 3971.936445][T31234] [<8051f1ac>] (should_failslab) from [<80502bdc>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3971.936614][T31234] [<80502b90>] (__kmalloc_cache_noprof) from [<814696e0>] (snd_pcm_oss_change_params_locked+0x80/0xc84) [ 3971.936713][T31234] r10:20002940 r9:00000000 r8:8487f400 r7:85770000 r6:824656d0 r5:8468d800 [ 3971.936766][T31234] r4:8468d800 [ 3971.936945][T31234] [<81469660>] (snd_pcm_oss_change_params_locked) from [<8146a320>] (snd_pcm_oss_make_ready_locked+0x3c/0x54) [ 3971.937033][T31234] r10:20002940 r9:00000000 r8:00002020 r7:85770000 r6:8487f6b8 r5:8487f400 [ 3971.937193][T31234] r4:8468d800 [ 3971.937279][T31234] [<8146a2e4>] (snd_pcm_oss_make_ready_locked) from [<8146cbc0>] (snd_pcm_oss_read+0x164/0x2e8) [ 3971.937395][T31234] r5:8487f400 r4:85770000 [ 3971.937450][T31234] [<8146ca5c>] (snd_pcm_oss_read) from [<80553424>] (vfs_read+0x98/0x324) [ 3971.937571][T31234] r10:00000001 r9:8146ca5c r8:20002940 r7:dfa09f68 r6:85770000 r5:00002020 [ 3971.937595][T31234] r4:85a28600 [ 3971.937615][T31234] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 3971.937758][T31234] r10:00000003 r9:85770000 r8:8020029c r7:00000000 r6:00000000 r5:85a28600 [ 3971.937798][T31234] r4:85a28601 [ 3971.937818][T31234] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 3971.937891][T31234] r7:00000003 r6:00130270 r5:00000000 r4:00000000 [ 3971.937968][T31234] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3971.938163][T31234] Exception stack(0xdfa09fa8 to 0xdfa09ff0) [ 3971.938260][T31234] 9fa0: 00000000 00000000 00000003 20002940 00002020 00000000 [ 3971.938383][T31234] 9fc0: 00000000 00000000 00130270 00000003 002e0000 00000000 00006364 76fb10bc [ 3971.938654][T31234] 9fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 3975.278963][ T31] audit: type=1400 audit(3975.210:602): avc: denied { read } for pid=31265 comm="syz.1.6018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3976.001143][ T31] audit: type=1400 audit(3975.930:603): avc: denied { accept } for pid=31270 comm="syz.2.6019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3977.305763][T31279] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=31279 comm=syz.1.6022 [ 3979.337649][ T31] audit: type=1400 audit(3979.270:604): avc: denied { audit_write } for pid=31289 comm="syz.2.6024" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3979.341288][ T31] audit: type=1107 audit(3979.270:605): pid=31289 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='c' [ 3980.393078][T31304] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=31304 comm=syz.1.6026 [ 3986.792657][T31331] FAULT_INJECTION: forcing a failure. [ 3986.792657][T31331] name failslab, interval 1, probability 0, space 0, times 0 [ 3986.793227][T31331] CPU: 1 UID: 0 PID: 31331 Comm: syz.1.6031 Not tainted syzkaller #0 PREEMPT [ 3986.793337][T31331] Hardware name: ARM-Versatile Express [ 3986.793368][T31331] Call trace: [ 3986.793426][T31331] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3986.793565][T31331] r7:85f3bc00 r6:00000000 r5:60000013 r4:82260500 [ 3986.793601][T31331] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3986.793659][T31331] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3986.793873][T31331] r5:85f3bc00 r4:82917c00 [ 3986.793931][T31331] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 3986.794024][T31331] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 3986.794145][T31331] r8:00000000 r7:85f3bc00 r6:00000dc0 r5:dfae1f20 r4:83001240 [ 3986.794171][T31331] [<8051f1ac>] (should_failslab) from [<80502bdc>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3986.794233][T31331] [<80502b90>] (__kmalloc_cache_noprof) from [<817409a8>] (tcp_sendmsg_fastopen+0x94/0x188) [ 3986.794316][T31331] r10:2400c051 r9:dfae1f20 r8:dfae1e64 r7:dfae1cbc r6:0000001c r5:dfae1f20 [ 3986.794342][T31331] r4:87621740 [ 3986.794394][T31331] [<81740914>] (tcp_sendmsg_fastopen) from [<81741494>] (tcp_sendmsg_locked+0x9f8/0xfd8) [ 3986.794471][T31331] r8:87621740 r7:00000000 r6:0000001c r5:0000001c r4:04000000 [ 3986.794534][T31331] [<81740a9c>] (tcp_sendmsg_locked) from [<81741aa4>] (tcp_sendmsg+0x30/0x44) [ 3986.794688][T31331] r10:00000000 r9:dfae1dc4 r8:dfae1dc4 r7:00000000 r6:0000001c r5:dfae1f20 [ 3986.794836][T31331] r4:87621740 [ 3986.794986][T31331] [<81741a74>] (tcp_sendmsg) from [<81787770>] (inet_sendmsg+0x40/0x4c) [ 3986.795067][T31331] r7:00000000 r6:87621740 r5:0000001c r4:dfae1f20 [ 3986.795123][T31331] [<81787730>] (inet_sendmsg) from [<819387a4>] (smc_sendmsg+0x84/0x278) [ 3986.795313][T31331] r7:00000000 r6:dfae1f20 r5:0000001c r4:84e69500 [ 3986.795423][T31331] [<81938720>] (smc_sendmsg) from [<81543320>] (__sock_sendmsg+0x44/0x78) [ 3986.795510][T31331] r9:dfae1dc4 r8:dfae1dc4 r7:00000000 r6:85042500 r5:dfae1f20 r4:00000000 [ 3986.795627][T31331] [<815432dc>] (__sock_sendmsg) from [<81544674>] (____sys_sendmsg+0x298/0x2cc) [ 3986.795907][T31331] r7:00000000 r6:85042500 r5:2400c051 r4:dfae1f20 [ 3986.795994][T31331] [<815443dc>] (____sys_sendmsg) from [<8154663c>] (___sys_sendmsg+0x9c/0xd0) [ 3986.796192][T31331] r10:dfae1e24 r9:200001c0 r8:2400c051 r7:00000000 r6:85042500 r5:dfae1f20 [ 3986.796217][T31331] r4:00000000 [ 3986.796262][T31331] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 3986.796339][T31331] r10:00000128 r9:85f3bc00 r8:85a28540 r7:2400c051 r6:200001c0 r5:85a28541 [ 3986.796363][T31331] r4:00000004 [ 3986.796381][T31331] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 3986.796443][T31331] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3986.796463][T31331] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3986.796513][T31331] Exception stack(0xdfae1fa8 to 0xdfae1ff0) [ 3986.796677][T31331] 1fa0: 00000000 00000000 00000004 200001c0 2400c051 00000000 [ 3986.796732][T31331] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f4e0bc [ 3986.796764][T31331] 1fe0: 76f4dec0 76f4deb0 0001948c 001322c0 [ 3994.423426][ T31] audit: type=1400 audit(3994.350:606): avc: denied { name_bind } for pid=31381 comm="syz.2.6045" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 3998.935062][ T31] audit: type=1400 audit(3998.860:607): avc: denied { ioctl } for pid=31415 comm="syz.1.6056" path="net:[4026532706]" dev="nsfs" ino=4026532706 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4001.701422][ T31] audit: type=1400 audit(4001.630:608): avc: denied { bind } for pid=31420 comm="syz.2.6057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4004.782909][ T31] audit: type=1400 audit(4004.710:609): avc: denied { shutdown } for pid=31440 comm="syz.1.6062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4005.120960][T31450] FAULT_INJECTION: forcing a failure. [ 4005.120960][T31450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4005.121344][T31450] CPU: 0 UID: 0 PID: 31450 Comm: syz.2.6065 Not tainted syzkaller #0 PREEMPT [ 4005.121412][T31450] Hardware name: ARM-Versatile Express [ 4005.121426][T31450] Call trace: [ 4005.121450][T31450] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4005.121519][T31450] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4005.121530][T31450] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4005.121559][T31450] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4005.121589][T31450] r5:84fa6c00 r4:82917c54 [ 4005.121597][T31450] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4005.121629][T31450] [<80972580>] (should_fail_ex) from [<8051f2a8>] (should_fail_alloc_page+0x68/0x74) [ 4005.121731][T31450] r8:00000001 r7:00000000 r6:00000000 r5:00000cc0 r4:dfb8ddd0 [ 4005.121742][T31450] [<8051f240>] (should_fail_alloc_page) from [<804ed558>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4005.121770][T31450] [<804ed4c4>] (prepare_alloc_pages.constprop.0) from [<804f5a80>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4005.121807][T31450] r10:81d25928 r9:00000000 r8:84fa6c00 r7:84fa6c00 r6:00000cc0 r5:dfb8df68 [ 4005.121819][T31450] r4:00000000 r3:dfb8ddd0 [ 4005.121829][T31450] [<804f59d4>] (__alloc_frozen_pages_noprof) from [<804f6b8c>] (get_free_pages_noprof+0x1c/0x74) [ 4005.121865][T31450] r10:81d25928 r9:00000000 r8:dfb8df68 r7:84fa6c00 r6:83365658 r5:dfb8df68 [ 4005.121876][T31450] r4:00000000 [ 4005.121884][T31450] [<804f6b70>] (get_free_pages_noprof) from [<80a560e4>] (vcs_write+0x54/0x754) [ 4005.121914][T31450] [<80a56090>] (vcs_write) from [<80553d20>] (vfs_write+0xac/0x44c) [ 4005.121953][T31450] r10:81d25928 r9:00000000 r8:dfb8df68 r7:84fa6c00 r6:00000000 r5:85a28cc0 [ 4005.121964][T31450] r4:80a56090 [ 4005.121972][T31450] [<80553c74>] (vfs_write) from [<80554230>] (ksys_write+0x74/0xe8) [ 4005.122009][T31450] r10:00000004 r9:84fa6c00 r8:8020029c r7:00000000 r6:00000000 r5:85a28cc0 [ 4005.122020][T31450] r4:85a28cc1 [ 4005.122028][T31450] [<805541bc>] (ksys_write) from [<805542b4>] (sys_write+0x10/0x14) [ 4005.122061][T31450] r7:00000004 r6:00130270 r5:00000000 r4:00000000 [ 4005.122071][T31450] [<805542a4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4005.122097][T31450] Exception stack(0xdfb8dfa8 to 0xdfb8dff0) [ 4005.122118][T31450] dfa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 4005.122137][T31450] dfc0: 00000000 00000000 00130270 00000004 002e0000 00000000 00006364 76f6e0bc [ 4005.122152][T31450] dfe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4010.688199][T31499] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=371 sclass=netlink_audit_socket pid=31499 comm=syz.1.6078 [ 4010.690589][T31499] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31499 comm=syz.1.6078 [ 4016.261288][ T31] audit: type=1400 audit(4016.190:610): avc: denied { ioctl } for pid=31518 comm="syz.2.6083" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4016.266875][ T31] audit: type=1400 audit(4016.190:611): avc: denied { set_context_mgr } for pid=31518 comm="syz.2.6083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4016.272714][T31529] binder: BINDER_SET_CONTEXT_MGR already set [ 4016.273209][T31529] binder: 31518:31529 ioctl 40046207 0 returned -16 [ 4017.872114][T31539] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31539 comm=syz.2.6086 [ 4018.043735][T31544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31544 comm=syz.2.6088 [ 4019.670108][T31547] FAULT_INJECTION: forcing a failure. [ 4019.670108][T31547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4019.670591][T31547] CPU: 1 UID: 0 PID: 31547 Comm: syz.1.6085 Not tainted syzkaller #0 PREEMPT [ 4019.670703][T31547] Hardware name: ARM-Versatile Express [ 4019.670731][T31547] Call trace: [ 4019.670777][T31547] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4019.670883][T31547] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4019.670904][T31547] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4019.670957][T31547] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4019.671013][T31547] r5:85f3d400 r4:8294f190 [ 4019.671030][T31547] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4019.671090][T31547] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4019.671197][T31547] r8:dfc91eb8 r7:00000000 r6:00000001 r5:76f2cf30 r4:00000001 [ 4019.671217][T31547] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4019.671269][T31547] [<809727c0>] (should_fail_usercopy) from [<808beda8>] (kstrtouint_from_user+0x54/0x13c) [ 4019.671328][T31547] [<808bed54>] (kstrtouint_from_user) from [<80609b94>] (proc_fail_nth_write+0x40/0xf0) [ 4019.671393][T31547] r8:dfc91f68 r7:85f3d400 r6:00000001 r5:85613780 r4:00000001 [ 4019.671414][T31547] [<80609b54>] (proc_fail_nth_write) from [<80553d20>] (vfs_write+0xac/0x44c) [ 4019.671474][T31547] r5:85613780 r4:80609b54 [ 4019.671492][T31547] [<80553c74>] (vfs_write) from [<80554230>] (ksys_write+0x74/0xe8) [ 4019.671562][T31547] r10:00000004 r9:85f3d400 r8:8020029c r7:00000000 r6:00000002 r5:85613780 [ 4019.671583][T31547] r4:85613783 [ 4019.671599][T31547] [<805541bc>] (ksys_write) from [<805542b4>] (sys_write+0x10/0x14) [ 4019.671673][T31547] r7:00000004 r6:00000006 r5:76f2cf30 r4:00000001 [ 4019.671690][T31547] [<805542a4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4019.671740][T31547] Exception stack(0xdfc91fa8 to 0xdfc91ff0) [ 4019.671779][T31547] 1fa0: 00000001 76f2cf30 00000006 76f2cf30 00000001 00000000 [ 4019.671814][T31547] 1fc0: 00000001 76f2cf30 00000006 00000004 002e0000 00000000 00006364 76f2d0bc [ 4019.671842][T31547] 1fe0: 00000158 76f2ced0 000d80f0 0013025c [ 4020.070671][T31553] FAULT_INJECTION: forcing a failure. [ 4020.070671][T31553] name failslab, interval 1, probability 0, space 0, times 0 [ 4020.071046][T31553] CPU: 0 UID: 0 PID: 31553 Comm: syz.1.6090 Not tainted syzkaller #0 PREEMPT [ 4020.071162][T31553] Hardware name: ARM-Versatile Express [ 4020.071192][T31553] Call trace: [ 4020.071232][T31553] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4020.071330][T31553] r7:00000d40 r6:00000000 r5:60000013 r4:82260500 [ 4020.071349][T31553] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4020.071410][T31553] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4020.071465][T31553] r5:85f29800 r4:82917c00 [ 4020.071482][T31553] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4020.071609][T31553] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4020.071772][T31553] r8:85f29800 r7:00000d40 r6:85a28028 r5:0000001d r4:83001240 [ 4020.071937][T31553] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 4020.072255][T31553] [<80503b10>] (__kmalloc_noprof) from [<807c34dc>] (tomoyo_encode2+0x64/0xf0) [ 4020.072333][T31553] r10:00000fff r9:8309e400 r8:00000000 r7:834d2110 r6:85a28028 r5:83cbcffc [ 4020.072577][T31553] r4:83cbcfea [ 4020.072779][T31553] [<807c3478>] (tomoyo_encode2) from [<807c358c>] (tomoyo_encode+0x24/0x30) [ 4020.072870][T31553] r9:8309e400 r8:00000000 r7:834d2110 r6:85a28028 r5:00001000 r4:83cbcfeb [ 4020.072947][T31553] [<807c3568>] (tomoyo_encode) from [<807c3618>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4020.073085][T31553] r5:00001000 r4:83cbc000 [ 4020.073217][T31553] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4020.073451][T31553] r10:85f29800 r9:00000000 r8:85a28000 r7:0000541c r6:00000004 r5:81cd6504 [ 4020.073747][T31553] r4:85a28028 r3:826c0200 [ 4020.073771][T31553] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 4020.073842][T31553] r9:00000003 r8:85a28000 r7:00000000 r6:00000000 r5:0000541c r4:85a28000 [ 4020.074055][T31553] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 4020.074430][T31553] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 4020.074649][T31553] r7:00000000 r6:85a28001 r5:00000000 r4:0000541c [ 4020.075002][T31553] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4020.075223][T31553] Exception stack(0xdfc2dfa8 to 0xdfc2dff0) [ 4020.075307][T31553] dfa0: 00000000 00000000 00000003 0000541c 00000000 00000000 [ 4020.075462][T31553] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 4020.075535][T31553] dfe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4020.076120][T31553] r10:00000036 r9:85f29800 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 4020.076173][T31553] r4:00000000 [ 4020.081429][T31553] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4020.218786][ T31] audit: type=1400 audit(4020.150:612): avc: denied { map } for pid=31554 comm="syz.1.6091" path="socket:[70208]" dev="sockfs" ino=70208 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 4020.610367][ T31] audit: type=1400 audit(4020.540:613): avc: denied { read } for pid=31560 comm="syz.2.6092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4024.872154][ T31] audit: type=1400 audit(4024.800:614): avc: denied { connect } for pid=31581 comm="syz.2.6096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4026.020759][T31588] FAULT_INJECTION: forcing a failure. [ 4026.020759][T31588] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4026.023899][T31588] CPU: 1 UID: 0 PID: 31588 Comm: syz.1.6097 Not tainted syzkaller #0 PREEMPT [ 4026.024079][T31588] Hardware name: ARM-Versatile Express [ 4026.024111][T31588] Call trace: [ 4026.024163][T31588] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4026.024302][T31588] r7:20000000 r6:00000000 r5:60000013 r4:82260500 [ 4026.024326][T31588] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4026.024384][T31588] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4026.024448][T31588] r5:85f3a400 r4:8294f190 [ 4026.024469][T31588] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4026.024541][T31588] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4026.024623][T31588] r8:00000000 r7:20000000 r6:dfc75e14 r5:dfc75e1c r4:00000000 [ 4026.024640][T31588] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4026.024695][T31588] [<809727c0>] (should_fail_usercopy) from [<8154f5c8>] (sk_getsockopt+0xd24/0xe84) [ 4026.024766][T31588] [<8154e8a8>] (sk_getsockopt) from [<815442f8>] (do_sock_getsockopt+0x108/0x1ec) [ 4026.024851][T31588] r10:00000127 r9:85f3a400 r8:20000000 r7:b5403587 r6:851fea00 r5:00000019 [ 4026.024877][T31588] r4:00000001 [ 4026.024893][T31588] [<815441f0>] (do_sock_getsockopt) from [<81546200>] (__sys_getsockopt+0x94/0xdc) [ 4026.024967][T31588] r8:84eaf6c0 r7:dfc75f50 r6:00000019 r5:dfc75f58 r4:84eaf6c1 [ 4026.024986][T31588] [<8154616c>] (__sys_getsockopt) from [<81546264>] (sys_getsockopt+0x1c/0x24) [ 4026.025057][T31588] r8:8020029c r7:00000127 r6:00130270 r5:00000000 r4:20000000 [ 4026.025077][T31588] [<81546248>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4026.025130][T31588] Exception stack(0xdfc75fa8 to 0xdfc75ff0) [ 4026.025171][T31588] 5fa0: 20000000 00000000 00000003 00000001 00000019 00000000 [ 4026.025211][T31588] 5fc0: 20000000 00000000 00130270 00000127 002e0000 00000000 00006364 76fb10bc [ 4026.025241][T31588] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4028.022343][ T31] audit: type=1400 audit(4027.950:615): avc: denied { mount } for pid=31602 comm="syz.2.6102" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 4028.031492][ T31] audit: type=1400 audit(4027.960:616): avc: denied { remount } for pid=31602 comm="syz.2.6102" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 4028.062343][ T31] audit: type=1400 audit(4027.990:617): avc: denied { write } for pid=31602 comm="syz.2.6102" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 4028.552516][ T31] audit: type=1400 audit(4028.480:618): avc: denied { read } for pid=31593 comm="syz.1.6100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4029.938749][ T31] audit: type=1400 audit(4029.870:619): avc: denied { mount } for pid=31612 comm="syz.1.6105" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 4030.511502][ T31] audit: type=1400 audit(4030.440:620): avc: denied { unmount } for pid=29394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 4033.030450][T31642] FAULT_INJECTION: forcing a failure. [ 4033.030450][T31642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4033.030888][T31642] CPU: 1 UID: 0 PID: 31642 Comm: syz.2.6115 Not tainted syzkaller #0 PREEMPT [ 4033.031008][T31642] Hardware name: ARM-Versatile Express [ 4033.031037][T31642] Call trace: [ 4033.031096][T31642] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4033.031439][T31642] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4033.031553][T31642] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4033.031718][T31642] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4033.032117][T31642] r5:85f38000 r4:8294f190 [ 4033.032157][T31642] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4033.032343][T31642] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4033.032447][T31642] r8:76f4cf30 r7:00000000 r6:00000000 r5:dfce9f68 r4:00000002 [ 4033.032469][T31642] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4033.032788][T31642] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 4033.032874][T31642] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 4033.033093][T31642] r10:00000001 r9:80608514 r8:00000002 r7:dfce9f68 r6:0000000f r5:76f4cf30 [ 4033.033290][T31642] r4:85f38000 r3:dfce9e9f [ 4033.033420][T31642] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 4033.033511][T31642] r8:76f4cf30 r7:dfce9f68 r6:85f38000 r5:0000000f r4:84eaf000 [ 4033.033565][T31642] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 4033.033790][T31642] r10:00000003 r9:85f38000 r8:8020029c r7:00000000 r6:00000000 r5:84eaf000 [ 4033.033840][T31642] r4:84eaf003 [ 4033.034071][T31642] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 4033.034177][T31642] r7:00000003 r6:00000005 r5:76f4cf30 r4:0000000f [ 4033.034326][T31642] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4033.034435][T31642] Exception stack(0xdfce9fa8 to 0xdfce9ff0) [ 4033.034561][T31642] 9fa0: 0000000f 76f4cf30 00000005 76f4cf30 0000000f 00000000 [ 4033.034779][T31642] 9fc0: 0000000f 76f4cf30 00000005 00000003 002e0000 00000000 00006364 76f4d0bc [ 4033.034940][T31642] 9fe0: 00000158 76f4ced0 000d80f0 00130194 [ 4033.645588][ T31] audit: type=1400 audit(4033.570:621): avc: denied { ioctl } for pid=31644 comm="syz.2.6116" path="socket:[70325]" dev="sockfs" ino=70325 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 4036.845690][T31661] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4036.848725][T31661] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4037.014945][ T31] audit: type=1400 audit(4036.940:622): avc: denied { setattr } for pid=31670 comm="syz.1.6125" name="CAN_RAW" dev="sockfs" ino=70362 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4037.033448][ T31] audit: type=1400 audit(4036.960:623): avc: denied { setattr } for pid=31670 comm="syz.1.6125" name="RAWv6" dev="sockfs" ino=70364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4037.728689][ T31] audit: type=1400 audit(4037.660:624): avc: denied { create } for pid=31688 comm="syz.1.6131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 4039.030321][ T31] audit: type=1400 audit(4038.960:625): avc: denied { shutdown } for pid=31695 comm="syz.1.6133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4041.388804][T21225] usb 2-1: new high-speed USB device number 60 using dummy_hcd [ 4041.544535][T21225] usb 2-1: unable to get BOS descriptor or descriptor too short [ 4041.553888][T21225] usb 2-1: config 128 has an invalid interface number: 121 but max is 0 [ 4041.554205][T21225] usb 2-1: config 128 has no interface number 0 [ 4041.578573][T21225] usb 2-1: New USB device found, idVendor=0502, idProduct=1631, bcdDevice=8a.60 [ 4041.578893][T21225] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4041.579184][T21225] usb 2-1: Product: syz [ 4041.579361][T21225] usb 2-1: Manufacturer: syz [ 4041.579523][T21225] usb 2-1: SerialNumber: syz [ 4041.808832][T21225] usb 2-1: USB disconnect, device number 60 [ 4042.254858][T31727] fuse: Unknown parameter 'grou00000000000000000000' [ 4042.336652][T31729] FAULT_INJECTION: forcing a failure. [ 4042.336652][T31729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4042.336992][T31729] CPU: 1 UID: 0 PID: 31729 Comm: syz.1.6138 Not tainted syzkaller #0 PREEMPT [ 4042.337094][T31729] Hardware name: ARM-Versatile Express [ 4042.337120][T31729] Call trace: [ 4042.337163][T31729] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4042.337277][T31729] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4042.337299][T31729] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4042.337351][T31729] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4042.337408][T31729] r5:85773c00 r4:8294f190 [ 4042.337428][T31729] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4042.337493][T31729] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4042.337559][T31729] r8:76fb0f30 r7:00000000 r6:00000000 r5:dfd91f68 r4:00000002 [ 4042.337580][T31729] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4042.337631][T31729] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 4042.337692][T31729] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 4042.337758][T31729] r10:00000001 r9:80608514 r8:00000002 r7:dfd91f68 r6:0000000f r5:76fb0f30 [ 4042.337779][T31729] r4:85773c00 r3:dfd91e9f [ 4042.337798][T31729] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 4042.339585][T31729] r8:76fb0f30 r7:dfd91f68 r6:85773c00 r5:0000000f r4:84eaf840 [ 4042.339612][T31729] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 4042.339697][T31729] r10:00000003 r9:85773c00 r8:8020029c r7:00000000 r6:00000000 r5:84eaf840 [ 4042.339719][T31729] r4:84eaf843 [ 4042.339735][T31729] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 4042.339874][T31729] r7:00000003 r6:00000003 r5:76fb0f30 r4:0000000f [ 4042.340021][T31729] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4042.340297][T31729] Exception stack(0xdfd91fa8 to 0xdfd91ff0) [ 4042.340464][T31729] 1fa0: 0000000f 76fb0f30 00000003 76fb0f30 0000000f 00000000 [ 4042.340505][T31729] 1fc0: 0000000f 76fb0f30 00000003 00000003 002e0000 00000000 00006364 76fb10bc [ 4042.340531][T31729] 1fe0: 00000158 76fb0ed0 000d80f0 00130194 [ 4045.827986][ T31] audit: type=1400 audit(4045.760:626): avc: denied { read } for pid=31744 comm="syz.1.6142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4046.354173][ T31] audit: type=1400 audit(4046.280:627): avc: denied { ioctl } for pid=31744 comm="syz.1.6142" path="socket:[71017]" dev="sockfs" ino=71017 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4046.364405][ T31] audit: type=1400 audit(4046.280:628): avc: denied { bind } for pid=31744 comm="syz.1.6142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4046.368360][T31749] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6142'. [ 4050.252789][T31769] random: crng reseeded on system resumption [ 4050.326562][T31769] FAULT_INJECTION: forcing a failure. [ 4050.326562][T31769] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4050.326932][T31769] CPU: 0 UID: 0 PID: 31769 Comm: syz.2.6147 Not tainted syzkaller #0 PREEMPT [ 4050.327040][T31769] Hardware name: ARM-Versatile Express [ 4050.327068][T31769] Call trace: [ 4050.327112][T31769] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4050.327248][T31769] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4050.327267][T31769] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4050.327317][T31769] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4050.327370][T31769] r5:85f3d400 r4:82917c54 [ 4050.327386][T31769] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4050.327441][T31769] [<80972580>] (should_fail_ex) from [<8051f2a8>] (should_fail_alloc_page+0x68/0x74) [ 4050.327509][T31769] r8:00000001 r7:00000000 r6:00000000 r5:00000dc0 r4:dfdc9b78 [ 4050.327527][T31769] [<8051f240>] (should_fail_alloc_page) from [<804ed558>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4050.327575][T31769] [<804ed4c4>] (prepare_alloc_pages.constprop.0) from [<804f5a80>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4050.327640][T31769] r10:00000cc0 r9:00000000 r8:85f3d400 r7:00000000 r6:00000dc0 r5:00000cc0 [ 4050.327673][T31769] r4:00000000 r3:dfdc9b78 [ 4050.327692][T31769] [<804f59d4>] (__alloc_frozen_pages_noprof) from [<804f6b8c>] (get_free_pages_noprof+0x1c/0x74) [ 4050.327755][T31769] r10:00000cc0 r9:0000000e r8:84db900c r7:00000000 r6:00000cc0 r5:00000cc0 [ 4050.327775][T31769] r4:00000000 [ 4050.327791][T31769] [<804f6b70>] (get_free_pages_noprof) from [<804f6bfc>] (get_zeroed_page_noprof+0x18/0x1c) [ 4050.327914][T31769] [<804f6be4>] (get_zeroed_page_noprof) from [<802d6244>] (get_image_page+0x18/0x140) [ 4050.328019][T31769] [<802d622c>] (get_image_page) from [<802d6478>] (alloc_rtree_node+0x38/0x7c) [ 4050.328139][T31769] r9:0000000e r8:84db900c r7:00000000 r6:00000cc0 r5:84db9014 r4:84db90e4 [ 4050.328163][T31769] [<802d6440>] (alloc_rtree_node) from [<802d69b8>] (memory_bm_create+0x4fc/0x648) [ 4050.328259][T31769] r7:00000001 r6:00000001 r5:00000000 r4:84db9004 [ 4050.328294][T31769] [<802d64bc>] (memory_bm_create) from [<802d6d04>] (create_basic_memory_bitmaps+0xc4/0x208) [ 4050.328403][T31769] r10:82959578 r9:83384258 r8:82959598 r7:84f71d00 r6:854c4080 r5:00000000 [ 4050.328443][T31769] r4:82a7a168 [ 4050.328462][T31769] [<802d6c40>] (create_basic_memory_bitmaps) from [<802dbcb4>] (snapshot_open+0x108/0x130) [ 4050.328559][T31769] r10:82959578 r9:83384258 r8:82959598 r7:81c03224 r6:00400040 r5:00000000 [ 4050.328582][T31769] r4:82a7a248 [ 4050.328598][T31769] [<802dbbac>] (snapshot_open) from [<80a850d0>] (misc_open+0x134/0x14c) [ 4050.328698][T31769] r7:81c03224 r6:84eaf0c0 r5:000000e7 r4:82826e78 [ 4050.328734][T31769] [<80a84f9c>] (misc_open) from [<8055a62c>] (chrdev_open+0xb4/0x214) [ 4050.328856][T31769] r10:84eaf0c0 r9:00000000 r8:84eaf0e8 r7:81d2e268 r6:84eaf0c0 r5:83384258 [ 4050.328932][T31769] r4:833b0540 r3:80a84f9c [ 4050.328998][T31769] [<8055a578>] (chrdev_open) from [<8054e09c>] (do_dentry_open+0x2c0/0x4d0) [ 4050.329101][T31769] r9:00000000 r8:84eaf0e8 r7:8055a578 r6:83384258 r5:00000000 r4:84eaf0c0 [ 4050.329124][T31769] [<8054dddc>] (do_dentry_open) from [<8054fe04>] (vfs_open+0x2c/0xe8) [ 4050.329222][T31769] r9:00000000 r8:dfdc9e58 r7:00000000 r6:84eaf0e8 r5:8291edac r4:84eaf0c0 [ 4050.329275][T31769] [<8054fdd8>] (vfs_open) from [<805688f0>] (path_openat+0x30c/0x1150) [ 4050.329453][T31769] r6:dfdc9f20 r5:8291edac r4:00008c01 [ 4050.329540][T31769] [<805685e4>] (path_openat) from [<805697e0>] (do_filp_open+0xac/0x148) [ 4050.329627][T31769] r10:00000142 r9:8389c000 r8:00000000 r7:dfdc9e58 r6:dfdc9f20 r5:85f3d400 [ 4050.329649][T31769] r4:00000003 [ 4050.329702][T31769] [<80569734>] (do_filp_open) from [<80550364>] (do_sys_openat2+0x90/0xe0) [ 4050.329786][T31769] r9:85f3d400 r8:8020029c r7:00000003 r6:dfdc9f58 r5:8389c000 r4:00000006 [ 4050.329852][T31769] [<805502d4>] (do_sys_openat2) from [<8055078c>] (sys_openat+0x98/0xd4) [ 4050.329965][T31769] r7:00000142 r6:00130270 r5:20000000 r4:00000003 [ 4050.330076][T31769] [<805506f4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4050.330422][T31769] Exception stack(0xdfdc9fa8 to 0xdfdc9ff0) [ 4050.330486][T31769] 9fa0: 00000000 00000000 00000003 20000000 00008c01 0000003d [ 4050.330569][T31769] 9fc0: 00000000 00000000 00130270 00000142 002e0000 00000000 00006364 76f6e0bc [ 4050.330627][T31769] 9fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4050.330651][T31769] r5:00000000 r4:00000000 [ 4054.804024][T31789] fuse: Unknown parameter 'group_i00000000000000000000' [ 4060.795575][T31813] fuse: Unknown parameter 'group_i00000000000000000000' [ 4061.370054][T31816] fuse: Unknown parameter 'group_id00000000000000000000' [ 4062.080683][ T31] audit: type=1400 audit(4062.010:629): avc: denied { bind } for pid=31820 comm="syz.2.6160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4064.465729][T31829] FAULT_INJECTION: forcing a failure. [ 4064.465729][T31829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4064.467060][T31829] CPU: 0 UID: 0 PID: 31829 Comm: syz.1.6161 Not tainted syzkaller #0 PREEMPT [ 4064.467193][T31829] Hardware name: ARM-Versatile Express [ 4064.467217][T31829] Call trace: [ 4064.467258][T31829] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4064.467359][T31829] r7:200002c0 r6:00000000 r5:60000013 r4:82260500 [ 4064.467377][T31829] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4064.467423][T31829] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4064.467555][T31829] r5:85836c00 r4:8294f190 [ 4064.467634][T31829] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4064.467959][T31829] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4064.468062][T31829] r8:00000000 r7:200002c0 r6:86ddcfc0 r5:00000000 r4:df9f1f20 [ 4064.468355][T31829] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4064.468921][T31829] [<809727c0>] (should_fail_usercopy) from [<808b6128>] (_copy_from_iter+0x6c/0x7d8) [ 4064.469620][T31829] [<808b60bc>] (_copy_from_iter) from [<816715e4>] (netlink_sendmsg+0x18c/0x444) [ 4064.469762][T31829] r10:00000000 r9:00000000 r8:df9f1f30 r7:85a6a800 r6:00000014 r5:84f396c0 [ 4064.469861][T31829] r4:df9f1f20 [ 4064.470232][T31829] [<81671458>] (netlink_sendmsg) from [<81543320>] (__sock_sendmsg+0x44/0x78) [ 4064.470315][T31829] r10:00000000 r9:df9f1dc4 r8:df9f1dc4 r7:00000000 r6:85044a00 r5:df9f1f20 [ 4064.470334][T31829] r4:00000000 [ 4064.470590][T31829] [<815432dc>] (__sock_sendmsg) from [<81544674>] (____sys_sendmsg+0x298/0x2cc) [ 4064.470807][T31829] r7:00000000 r6:85044a00 r5:00000000 r4:df9f1f20 [ 4064.470834][T31829] [<815443dc>] (____sys_sendmsg) from [<8154663c>] (___sys_sendmsg+0x9c/0xd0) [ 4064.471194][T31829] r10:df9f1e24 r9:20000100 r8:00000000 r7:00000000 r6:85044a00 r5:df9f1f20 [ 4064.471215][T31829] r4:00000000 [ 4064.471303][T31829] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 4064.471485][T31829] r10:00000128 r9:85836c00 r8:85a28900 r7:00000000 r6:20000100 r5:85a28901 [ 4064.471662][T31829] r4:00000003 [ 4064.471818][T31829] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 4064.471996][T31829] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 4064.472102][T31829] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4064.472192][T31829] Exception stack(0xdf9f1fa8 to 0xdf9f1ff0) [ 4064.472229][T31829] 1fa0: 00000000 00000000 00000003 20000100 00000000 00000000 [ 4064.472327][T31829] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 4064.472385][T31829] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4064.621094][T31834] fuse: Unknown parameter 'group_id00000000000000000000' [ 4066.196888][T31841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31841 comm=syz.2.6167 [ 4066.556763][ T31] audit: type=1400 audit(4066.490:630): avc: denied { map } for pid=31842 comm="syz.2.6168" path="socket:[71128]" dev="sockfs" ino=71128 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4066.791311][T31848] fuse: Unknown parameter 'group_id00000000000000000000' [ 4066.923073][T31850] FAULT_INJECTION: forcing a failure. [ 4066.923073][T31850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4066.923644][T31850] CPU: 0 UID: 0 PID: 31850 Comm: syz.2.6170 Not tainted syzkaller #0 PREEMPT [ 4066.923799][T31850] Hardware name: ARM-Versatile Express [ 4066.923832][T31850] Call trace: [ 4066.923891][T31850] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4066.924026][T31850] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4066.924048][T31850] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4066.924103][T31850] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4066.924290][T31850] r5:8543a400 r4:82917c54 [ 4066.924362][T31850] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4066.924505][T31850] [<80972580>] (should_fail_ex) from [<8051f2a8>] (should_fail_alloc_page+0x68/0x74) [ 4066.924626][T31850] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dfa05c00 [ 4066.924894][T31850] [<8051f240>] (should_fail_alloc_page) from [<804ed558>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4066.925023][T31850] [<804ed4c4>] (prepare_alloc_pages.constprop.0) from [<804f5a80>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4066.925169][T31850] r10:dfa05db0 r9:00000000 r8:8543a400 r7:00000000 r6:00140cca r5:00000002 [ 4066.925196][T31850] r4:00000000 r3:dfa05c00 [ 4066.925256][T31850] [<804f59d4>] (__alloc_frozen_pages_noprof) from [<804f6b18>] (__folio_alloc_noprof+0x14/0x6c) [ 4066.925470][T31850] r10:dfa05db0 r9:84883a80 r8:841ca780 r7:00000000 r6:0000003c r5:00000002 [ 4066.925627][T31850] r4:859cea58 [ 4066.925756][T31850] [<804f6b04>] (__folio_alloc_noprof) from [<80497c88>] (shmem_get_folio_gfp.constprop.0+0x21c/0x864) [ 4066.926046][T31850] r5:00000002 r4:859cea58 [ 4066.926089][T31850] [<80497a6c>] (shmem_get_folio_gfp.constprop.0) from [<8049847c>] (shmem_fault+0x80/0x35c) [ 4066.926170][T31850] r10:00000000 r9:dfa05db0 r8:8543a400 r7:00100cca r6:00000000 r5:859cea58 [ 4066.926197][T31850] r4:dfa05db0 [ 4066.926214][T31850] [<804983fc>] (shmem_fault) from [<80758d00>] (shm_fault+0x24/0x28) [ 4066.926299][T31850] r10:00000000 r9:dfa05db0 r8:84883a80 r7:00000000 r6:21038000 r5:841ca780 [ 4066.926322][T31850] r4:dfa05db0 [ 4066.926339][T31850] [<80758cdc>] (shm_fault) from [<804c0ae8>] (__do_fault+0x44/0xfc) [ 4066.926402][T31850] [<804c0aa4>] (__do_fault) from [<804c7538>] (handle_mm_fault+0xbdc/0x14dc) [ 4066.926580][T31850] r7:00000000 r6:21038000 r5:8543a400 r4:00000014 [ 4066.926604][T31850] [<804c695c>] (handle_mm_fault) from [<804b8ea8>] (__get_user_pages+0x254/0x6f0) [ 4066.926680][T31850] r10:0000003c r9:21038000 r8:8543a400 r7:00000000 r6:00000014 r5:841ca780 [ 4066.926744][T31850] r4:00210008 [ 4066.926813][T31850] [<804b8c54>] (__get_user_pages) from [<804bbb28>] (populate_vma_page_range+0xd8/0x220) [ 4066.927001][T31850] r10:20ffc000 r9:84883a80 r8:dfa05ee0 r7:213fc000 r6:20ffc000 r5:841ca780 [ 4066.927189][T31850] r4:00000400 [ 4066.927262][T31850] [<804bba50>] (populate_vma_page_range) from [<804bc308>] (__mm_populate+0x11c/0x1b8) [ 4066.927430][T31850] r10:20ffc000 r9:84883b04 r8:00000001 r7:84883a80 r6:213fc000 r5:213fc000 [ 4066.927663][T31850] r4:841ca780 [ 4066.927685][T31850] [<804bc1ec>] (__mm_populate) from [<8075aa54>] (do_shmat+0x300/0x53c) [ 4066.927944][T31850] r10:00000001 r9:8543a400 r8:84c58400 r7:00000000 r6:00000001 r5:84883b04 [ 4066.928239][T31850] r4:84883a80 [ 4066.928307][T31850] [<8075a754>] (do_shmat) from [<8075acc4>] (sys_shmat+0x34/0x60) [ 4066.928509][T31850] r10:00000131 r9:8543a400 r8:8020029c r7:00000131 r6:00130270 r5:00000000 [ 4066.928603][T31850] r4:00000000 [ 4066.928624][T31850] [<8075ac90>] (sys_shmat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4066.928798][T31850] Exception stack(0xdfa05fa8 to 0xdfa05ff0) [ 4066.929077][T31850] 5fa0: 00000000 00000000 00000001 20ffd000 00007000 00000000 [ 4066.929314][T31850] 5fc0: 00000000 00000000 00130270 00000131 002e0000 00000000 00006364 76f6e0bc [ 4066.929354][T31850] 5fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4067.444629][T31852] FAULT_INJECTION: forcing a failure. [ 4067.444629][T31852] name failslab, interval 1, probability 0, space 0, times 0 [ 4067.447353][T31852] CPU: 1 UID: 0 PID: 31852 Comm: syz.2.6171 Not tainted syzkaller #0 PREEMPT [ 4067.447512][T31852] Hardware name: ARM-Versatile Express [ 4067.447540][T31852] Call trace: [ 4067.447584][T31852] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4067.447689][T31852] r7:00000d40 r6:00000000 r5:60000013 r4:82260500 [ 4067.447711][T31852] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4067.447767][T31852] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4067.447827][T31852] r5:85439800 r4:82917c00 [ 4067.447846][T31852] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4067.447907][T31852] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4067.447979][T31852] r8:85439800 r7:00000d40 r6:84eaf3e8 r5:0000001f r4:83001240 [ 4067.447999][T31852] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 4067.448051][T31852] [<80503b10>] (__kmalloc_noprof) from [<807c34dc>] (tomoyo_encode2+0x64/0xf0) [ 4067.448124][T31852] r10:00000fff r9:8309e400 r8:00000000 r7:834ef550 r6:84eaf3e8 r5:85cc9ffc [ 4067.448147][T31852] r4:85cc9fe8 [ 4067.448164][T31852] [<807c3478>] (tomoyo_encode2) from [<807c358c>] (tomoyo_encode+0x24/0x30) [ 4067.448231][T31852] r9:8309e400 r8:00000000 r7:834ef550 r6:84eaf3e8 r5:00001000 r4:85cc9fe9 [ 4067.448250][T31852] [<807c3568>] (tomoyo_encode) from [<807c3618>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4067.448309][T31852] r5:00001000 r4:85cc9000 [ 4067.448329][T31852] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4067.448406][T31852] r10:00000000 r9:00000000 r8:83df6058 r7:00000000 r6:00000005 r5:81cd6504 [ 4067.448433][T31852] r4:84eaf3e8 r3:826c0200 [ 4067.448452][T31852] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3fd8>] (tomoyo_path_chmod+0x20/0x24) [ 4067.448522][T31852] r9:fffff000 r8:83df6058 r7:00000000 r6:83df60d8 r5:00000000 r4:84eaf3e8 [ 4067.448543][T31852] [<807c3fb8>] (tomoyo_path_chmod) from [<8077af08>] (security_path_chmod+0x68/0x1d4) [ 4067.448601][T31852] [<8077aea0>] (security_path_chmod) from [<8054f3a0>] (chmod_common+0x80/0x178) [ 4067.448663][T31852] r5:84eaf3e8 r4:00000000 [ 4067.448683][T31852] [<8054f320>] (chmod_common) from [<8054f528>] (sys_fchmod+0x48/0x84) [ 4067.448753][T31852] r10:0000005e r9:85439800 r8:8020029c r7:0000005e r6:84eaf3c0 r5:00000000 [ 4067.448826][T31852] r4:84eaf3c1 [ 4067.448852][T31852] [<8054f4e0>] (sys_fchmod) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4067.448907][T31852] Exception stack(0xdf9f9fa8 to 0xdf9f9ff0) [ 4067.448948][T31852] 9fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 4067.448982][T31852] 9fc0: 00000000 00000000 00130270 0000005e 002e0000 00000000 00006364 76f6e0bc [ 4067.449011][T31852] 9fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4067.449044][T31852] r7:0000005e r6:00130270 r5:00000000 r4:00000000 [ 4067.463257][T31852] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4068.157637][T29921] usb 2-1: new high-speed USB device number 61 using dummy_hcd [ 4068.308151][T29921] usb 2-1: Using ep0 maxpacket: 32 [ 4068.321063][T29921] usb 2-1: config 1 interface 0 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 32 [ 4068.321378][T29921] usb 2-1: config 1 interface 0 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1024 [ 4068.321701][T29921] usb 2-1: config 1 interface 0 has no altsetting 0 [ 4068.341538][T29921] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 4068.341841][T29921] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4068.342119][T29921] usb 2-1: Product: 嫶ᴪ뿺ि⪚柮㌕풥⪧汝⠵ۍᚇঞ꫹્赪廑⋂၅륱人ꡖႲ飍뢭മ谇ዝ⇠鿸㍛ﵧ缑蒀캴დ셫浦䰜犔⪚遍⼩䄚䌙졦Uኟ䳉塇妤緬ⴔ⣺餾 [ 4068.342233][T29921] usb 2-1: Manufacturer: 﫞낝䠕盱☫狽✋뜀璵܅ʼ獕懟ꕮ䟱鶪㶢떹쮛Ԗ瑼쥘ꡣ잋Ǖ肵⠂텛乄⢣ሊ祸ᵛロऴㄜ棛笺ử﬈䟌펖퉞曔壚䙽ᓕ舋㤨Ꜩꛆᆣら뭉꽲䥮㞈舊촢韌︇즓ꪑ韵⥫涞䄱᥿뢃쯐葵ﶀ马ᵹ욁铟獺᾿䟊ffl낗춟ηđꝜ೦☮阀瀞뼟滳즙玏㯒㓣졘尤ퟢ≧짉䠗し [ 4068.342362][T29921] usb 2-1: SerialNumber: 楉㻋萵찇ꗜ耂췟٤…撋㟐괒⥺㘥ܠ嘀犘Ṍ࿠㆛勧䏁舐銶굔ꀳᢿ퍍樟羱Ꭿ꯾팀㌉揄⨊儳앵橹븧Վꨴ崬픨敆艱遭᭡駩琚ﮍ噈汨תּ⺩㢧嗓鸁荜軟魩⩗┹⧕꜅ [ 4068.358786][T31857] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 4068.368330][T31857] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 4070.153364][T31868] fuse: Bad value for 'user_id' [ 4070.153927][T31868] fuse: Bad value for 'user_id' [ 4072.567697][ T31] audit: type=1400 audit(4072.500:631): avc: denied { getopt } for pid=31876 comm="syz.2.6178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4072.732034][T31886] fuse: Bad value for 'user_id' [ 4072.733736][T31886] fuse: Bad value for 'user_id' [ 4073.442867][T29921] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -32 [ 4075.990268][T31892] FAULT_INJECTION: forcing a failure. [ 4075.990268][T31892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4075.992993][T31892] CPU: 0 UID: 0 PID: 31892 Comm: syz.2.6180 Not tainted syzkaller #0 PREEMPT [ 4075.993160][T31892] Hardware name: ARM-Versatile Express [ 4075.993188][T31892] Call trace: [ 4075.993234][T31892] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4075.993353][T31892] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4075.993374][T31892] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4075.993434][T31892] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4075.993495][T31892] r5:84fa1800 r4:8294f190 [ 4075.993513][T31892] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4075.993572][T31892] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4075.993638][T31892] r8:76f2bf30 r7:00000000 r6:00000000 r5:dfcd1f68 r4:00000002 [ 4075.993656][T31892] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4075.993747][T31892] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 4075.993831][T31892] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 4075.993934][T31892] r10:00000001 r9:80608514 r8:00000002 r7:dfcd1f68 r6:0000000f r5:76f2bf30 [ 4075.993963][T31892] r4:84fa1800 r3:dfcd1e9f [ 4075.993981][T31892] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 4075.994052][T31892] r8:76f2bf30 r7:dfcd1f68 r6:84fa1800 r5:0000000f r4:84d43e40 [ 4075.994072][T31892] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 4075.994144][T31892] r10:00000003 r9:84fa1800 r8:8020029c r7:00000000 r6:00000000 r5:84d43e40 [ 4075.994166][T31892] r4:84d43e43 [ 4075.994185][T31892] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 4075.994248][T31892] r7:00000003 r6:00000005 r5:76f2bf30 r4:0000000f [ 4075.994268][T31892] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4075.994320][T31892] Exception stack(0xdfcd1fa8 to 0xdfcd1ff0) [ 4075.994360][T31892] 1fa0: 0000000f 76f2bf30 00000005 76f2bf30 0000000f 00000000 [ 4075.994403][T31892] 1fc0: 0000000f 76f2bf30 00000005 00000003 002e0000 00000000 00006364 76f2c0bc [ 4075.994434][T31892] 1fe0: 00000158 76f2bed0 000d80f0 00130194 [ 4078.605443][T31011] usb 2-1: USB disconnect, device number 61 [ 4094.721982][ T31] audit: type=1400 audit(4094.650:632): avc: denied { execute } for pid=31996 comm="" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4094.997887][T32003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32003 comm=syz.1.6207 [ 4098.274533][ T31] audit: type=1400 audit(4354.198:633): avc: denied { create } for pid=32008 comm="syz.1.6209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 4101.844439][T32045] fuse: Bad value for 'fd' [ 4102.201857][T32043] FAULT_INJECTION: forcing a failure. [ 4102.201857][T32043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4102.202251][T32043] CPU: 0 UID: 0 PID: 32043 Comm: syz.2.6218 Not tainted syzkaller #0 PREEMPT [ 4102.202352][T32043] Hardware name: ARM-Versatile Express [ 4102.202438][T32043] Call trace: [ 4102.202489][T32043] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4102.202597][T32043] r7:dfd55e20 r6:00000000 r5:60000013 r4:82260500 [ 4102.202615][T32043] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4102.202677][T32043] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4102.202731][T32043] r5:85770c00 r4:8294f190 [ 4102.202747][T32043] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4102.202857][T32043] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4102.203002][T32043] r8:20000801 r7:dfd55e20 r6:20000240 r5:00000000 r4:dfd55f20 [ 4102.203181][T32043] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4102.203296][T32043] [<809727c0>] (should_fail_usercopy) from [<815464c0>] (copy_msghdr_from_user+0x50/0x130) [ 4102.203363][T32043] [<81546470>] (copy_msghdr_from_user) from [<81546618>] (___sys_sendmsg+0x78/0xd0) [ 4102.203603][T32043] r8:20000801 r7:00000000 r6:851ff680 r5:dfd55f20 r4:dfd55e64 [ 4102.203713][T32043] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 4102.203804][T32043] r10:00000128 r9:85770c00 r8:84eaf900 r7:20000801 r6:20000240 r5:84eaf901 [ 4102.203827][T32043] r4:00000004 [ 4102.203844][T32043] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 4102.204135][T32043] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 4102.204223][T32043] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4102.204278][T32043] Exception stack(0xdfd55fa8 to 0xdfd55ff0) [ 4102.204320][T32043] 5fa0: 00000000 00000000 00000004 20000240 20000801 00000000 [ 4102.204428][T32043] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f6e0bc [ 4102.204568][T32043] 5fe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4102.287472][T32055] fuse: Invalid rootmode [ 4103.044704][T32065] FAULT_INJECTION: forcing a failure. [ 4103.044704][T32065] name failslab, interval 1, probability 0, space 0, times 0 [ 4103.049536][T32065] CPU: 1 UID: 0 PID: 32065 Comm: syz.1.6227 Not tainted syzkaller #0 PREEMPT [ 4103.049700][T32065] Hardware name: ARM-Versatile Express [ 4103.049728][T32065] Call trace: [ 4103.049773][T32065] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4103.049882][T32065] r7:85f3a400 r6:00000000 r5:60000013 r4:82260500 [ 4103.049904][T32065] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4103.049964][T32065] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4103.050023][T32065] r5:85f3a400 r4:82917c00 [ 4103.050041][T32065] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4103.050105][T32065] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4103.050178][T32065] r8:00000000 r7:85f3a400 r6:00400dc0 r5:84c21d80 r4:830020c0 [ 4103.050198][T32065] [<8051f1ac>] (should_failslab) from [<80502bdc>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 4103.050252][T32065] [<80502b90>] (__kmalloc_cache_noprof) from [<8073a71c>] (fuse_file_alloc+0xd0/0xec) [ 4103.050334][T32065] r10:84eaf900 r9:00000000 r8:85daca00 r7:00000001 r6:824656d0 r5:84c21d80 [ 4103.050361][T32065] r4:85daca00 [ 4103.050382][T32065] [<8073a64c>] (fuse_file_alloc) from [<8073a814>] (fuse_file_open+0xb8/0x230) [ 4103.050478][T32065] r9:00000000 r8:84144800 r7:00000000 r6:00000000 r5:00000001 r4:84c21d80 [ 4103.050499][T32065] [<8073a75c>] (fuse_file_open) from [<8073aae8>] (fuse_open+0x84/0x2fc) [ 4103.050572][T32065] r10:84eaf900 r9:84c21d80 r8:00000000 r7:84eaf900 r6:00000000 r5:00000000 [ 4103.050596][T32065] r4:8503ac80 [ 4103.050614][T32065] [<8073aa64>] (fuse_open) from [<8054e09c>] (do_dentry_open+0x2c0/0x4d0) [ 4103.050684][T32065] r10:84eaf900 r9:00000000 r8:84eaf928 r7:8073aa64 r6:8503ac80 r5:00000000 [ 4103.050708][T32065] r4:84eaf900 [ 4103.050727][T32065] [<8054dddc>] (do_dentry_open) from [<8054fe04>] (vfs_open+0x2c/0xe8) [ 4103.050800][T32065] r9:00000000 r8:dfdede58 r7:00000000 r6:84eaf928 r5:8291edac r4:84eaf900 [ 4103.050821][T32065] [<8054fdd8>] (vfs_open) from [<805688f0>] (path_openat+0x30c/0x1150) [ 4103.050883][T32065] r6:dfdedf20 r5:8291edac r4:00000000 [ 4103.050903][T32065] [<805685e4>] (path_openat) from [<805697e0>] (do_filp_open+0xac/0x148) [ 4103.050969][T32065] r10:00000142 r9:8389d000 r8:00000001 r7:dfdede58 r6:dfdedf20 r5:85f3a400 [ 4103.050992][T32065] r4:ffffff9c [ 4103.051010][T32065] [<80569734>] (do_filp_open) from [<80550364>] (do_sys_openat2+0x90/0xe0) [ 4103.051080][T32065] r9:85f3a400 r8:8020029c r7:ffffff9c r6:dfdedf58 r5:8389d000 r4:00000005 [ 4103.051100][T32065] [<805502d4>] (do_sys_openat2) from [<8055078c>] (sys_openat+0x98/0xd4) [ 4103.051204][T32065] r7:00000142 r6:00130270 r5:20000000 r4:ffffff9c [ 4103.051227][T32065] [<805506f4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4103.051281][T32065] Exception stack(0xdfdedfa8 to 0xdfdedff0) [ 4103.051323][T32065] dfa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 4103.051365][T32065] dfc0: 00000000 00000000 00130270 00000142 002e0000 00000000 00006364 76f900bc [ 4103.051396][T32065] dfe0: 76f8fec0 76f8feb0 0001948c 001322c0 [ 4103.051433][T32065] r5:00000000 r4:00000000 [ 4117.362892][T32140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=32140 comm=syz.1.6247 [ 4117.496749][T32144] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=32144 comm=syz.1.6248 [ 4121.774186][T32184] FAULT_INJECTION: forcing a failure. [ 4121.774186][T32184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4121.779368][T32184] CPU: 1 UID: 0 PID: 32184 Comm: syz.1.6257 Not tainted syzkaller #0 PREEMPT [ 4121.779561][T32184] Hardware name: ARM-Versatile Express [ 4121.779592][T32184] Call trace: [ 4121.779638][T32184] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4121.779752][T32184] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4121.779773][T32184] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4121.779823][T32184] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4121.779934][T32184] r5:85f38c00 r4:8294f190 [ 4121.779986][T32184] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4121.780054][T32184] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4121.780120][T32184] r8:76fb0f30 r7:00000000 r6:00000000 r5:dfe31f68 r4:00000002 [ 4121.780142][T32184] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4121.780198][T32184] [<809727c0>] (should_fail_usercopy) from [<8058e5d4>] (simple_read_from_buffer+0x80/0x13c) [ 4121.780256][T32184] [<8058e554>] (simple_read_from_buffer) from [<806085cc>] (proc_fail_nth_read+0xb8/0x108) [ 4121.780327][T32184] r10:00000001 r9:80608514 r8:00000002 r7:dfe31f68 r6:0000000f r5:76fb0f30 [ 4121.780353][T32184] r4:85f38c00 r3:dfe31e9f [ 4121.780370][T32184] [<80608514>] (proc_fail_nth_read) from [<80553424>] (vfs_read+0x98/0x324) [ 4121.780447][T32184] r8:76fb0f30 r7:dfe31f68 r6:85f38c00 r5:0000000f r4:84eafd80 [ 4121.780466][T32184] [<8055338c>] (vfs_read) from [<80554134>] (ksys_read+0x74/0xe8) [ 4121.780535][T32184] r10:00000003 r9:85f38c00 r8:8020029c r7:00000000 r6:00000000 r5:84eafd80 [ 4121.780557][T32184] r4:84eafd83 [ 4121.780575][T32184] [<805540c0>] (ksys_read) from [<805541b8>] (sys_read+0x10/0x14) [ 4121.780638][T32184] r7:00000003 r6:00000001 r5:76fb0f30 r4:0000000f [ 4121.780654][T32184] [<805541a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4121.780705][T32184] Exception stack(0xdfe31fa8 to 0xdfe31ff0) [ 4121.780743][T32184] 1fa0: 0000000f 76fb0f30 00000001 76fb0f30 0000000f 00000000 [ 4121.780781][T32184] 1fc0: 0000000f 76fb0f30 00000001 00000003 002e0000 00000000 00006364 76fb10bc [ 4121.780807][T32184] 1fe0: 00000158 76fb0ed0 000d80f0 00130194 [ 4123.853592][ T31] audit: type=1400 audit(4379.778:634): avc: denied { shutdown } for pid=32198 comm="syz.2.6264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4125.493318][T32209] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6266'. [ 4129.888293][T31490] usb 2-1: new high-speed USB device number 62 using dummy_hcd [ 4130.123627][T31490] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 4130.126782][T31490] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4130.146227][T31490] usb 2-1: Product: syz [ 4130.146432][T31490] usb 2-1: Manufacturer: syz [ 4130.146532][T31490] usb 2-1: SerialNumber: syz [ 4132.349600][T31490] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 4132.350948][T31490] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 4132.352113][T31490] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 4132.378178][T31490] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 4132.400166][T31490] usb 2-1: USB disconnect, device number 62 [ 4132.960776][T32256] FAULT_INJECTION: forcing a failure. [ 4132.960776][T32256] name failslab, interval 1, probability 0, space 0, times 0 [ 4132.969259][T32256] CPU: 1 UID: 0 PID: 32256 Comm: syz.1.6274 Not tainted syzkaller #0 PREEMPT [ 4132.969389][T32256] Hardware name: ARM-Versatile Express [ 4132.969409][T32256] Call trace: [ 4132.969450][T32256] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4132.969554][T32256] r7:83a13c00 r6:00000000 r5:60000013 r4:82260500 [ 4132.969570][T32256] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4132.969614][T32256] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4132.969671][T32256] r5:83a13c00 r4:82917c00 [ 4132.969684][T32256] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4132.969735][T32256] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4132.969792][T32256] r8:00000000 r7:83a13c00 r6:00000dc0 r5:00000000 r4:83001240 [ 4132.969807][T32256] [<8051f1ac>] (should_failslab) from [<80502bdc>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 4132.969848][T32256] [<80502b90>] (__kmalloc_cache_noprof) from [<8056b120>] (file_f_owner_allocate+0x3c/0x88) [ 4132.969905][T32256] r10:00000037 r9:84eafc00 r8:00000003 r7:00000001 r6:84eafc00 r5:00000000 [ 4132.969924][T32256] r4:84eafc00 [ 4132.969936][T32256] [<8056b0e4>] (file_f_owner_allocate) from [<8056b1e4>] (f_setown+0x78/0xac) [ 4132.969981][T32256] r5:84eafc00 r4:00000000 [ 4132.969994][T32256] [<8056b16c>] (f_setown) from [<8056bb14>] (do_fcntl+0x67c/0x860) [ 4132.970042][T32256] r7:00000003 r6:00000000 r5:84eafc00 r4:00000008 [ 4132.970055][T32256] [<8056b498>] (do_fcntl) from [<8056bd68>] (sys_fcntl+0x70/0xd0) [ 4132.970105][T32256] r8:00000003 r7:00000000 r6:00000008 r5:00000000 r4:84eafc01 [ 4132.970119][T32256] [<8056bcf8>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4132.970620][T32256] Exception stack(0xdff75fa8 to 0xdff75ff0) [ 4132.971940][T32256] 5fa0: 00000000 00000000 00000003 00000008 00000000 00000000 [ 4132.973502][T32256] 5fc0: 00000000 00000000 00130270 00000037 002e0000 00000000 00006364 76fb10bc [ 4132.974751][T32256] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4132.975838][T32256] r9:83a13c00 r8:8020029c r7:00000037 r6:00130270 r5:00000000 r4:00000000 [ 4136.771698][ T31] audit: type=1400 audit(4392.698:635): avc: denied { listen } for pid=32274 comm="syz.1.6279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4140.129749][ T31] audit: type=1400 audit(4396.058:636): avc: denied { associate } for pid=32292 comm="syz.1.6284" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 4141.103261][ T31] audit: type=1400 audit(4397.028:637): avc: denied { watch watch_reads } for pid=32307 comm="syz.2.6291" path="/" dev="tmpfs" ino=1435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4144.462139][ T31] audit: type=1400 audit(4400.388:638): avc: denied { mount } for pid=32320 comm="syz.2.6294" name="/" dev="ramfs" ino=72276 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 4156.990870][T32391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32391 comm=syz.1.6314 [ 4173.268024][T32460] fuse: Bad value for 'fd' [ 4176.738226][T32478] fuse: Unknown parameter '0x0000000000000003' [ 4180.267941][T32494] fuse: Unknown parameter '0x0000000000000003' [ 4185.433253][T32512] fuse: Unknown parameter '0x0000000000000003' [ 4188.081498][T32526] fuse: Unknown parameter '0x0000000000000003' [ 4189.549715][ T31] audit: type=1400 audit(4445.478:639): avc: denied { listen } for pid=32533 comm="syz.1.6353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4189.636629][ T31] audit: type=1400 audit(4445.568:640): avc: denied { create } for pid=32533 comm="syz.1.6353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 4191.767232][T32542] fuse: Unknown parameter '0x0000000000000003' [ 4193.584249][ T31] audit: type=1400 audit(4449.508:641): avc: denied { lock } for pid=32551 comm="syz.1.6359" path="socket:[73073]" dev="sockfs" ino=73073 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 4193.849905][T32557] fuse: Unknown parameter '0x0000000000000003' [ 4196.517798][T32568] FAULT_INJECTION: forcing a failure. [ 4196.517798][T32568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4196.518195][T32568] CPU: 0 UID: 0 PID: 32568 Comm: syz.2.6364 Not tainted syzkaller #0 PREEMPT [ 4196.518303][T32568] Hardware name: ARM-Versatile Express [ 4196.518333][T32568] Call trace: [ 4196.518378][T32568] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4196.518501][T32568] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4196.518929][T32568] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4196.519236][T32568] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4196.519966][T32568] r5:83a13000 r4:82917c54 [ 4196.520026][T32568] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4196.520123][T32568] [<80972580>] (should_fail_ex) from [<8051f2a8>] (should_fail_alloc_page+0x68/0x74) [ 4196.520203][T32568] r8:00000001 r7:00000000 r6:00000000 r5:00440dc2 r4:dfaadc18 [ 4196.520582][T32568] [<8051f240>] (should_fail_alloc_page) from [<804ed558>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4196.520661][T32568] [<804ed4c4>] (prepare_alloc_pages.constprop.0) from [<804f5a80>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4196.520741][T32568] r10:001ed000 r9:00000000 r8:83a13000 r7:002b9000 r6:00440dc2 r5:84882d80 [ 4196.520767][T32568] r4:00000000 r3:dfaadc18 [ 4196.520996][T32568] [<804f59d4>] (__alloc_frozen_pages_noprof) from [<804f6ab4>] (__alloc_pages_noprof+0x10/0x60) [ 4196.521276][T32568] r10:001ed000 r9:001ed000 r8:858c1000 r7:002b9000 r6:002b9000 r5:84882d80 [ 4196.521306][T32568] r4:84882d80 [ 4196.521391][T32568] [<804f6aa4>] (__alloc_pages_noprof) from [<804c09b8>] (pte_alloc_one+0x28/0x114) [ 4196.521471][T32568] [<804c0990>] (pte_alloc_one) from [<804c2224>] (__pte_alloc+0x2c/0x104) [ 4196.521546][T32568] r5:86ec5000 r4:84882d80 [ 4196.521665][T32568] [<804c21f8>] (__pte_alloc) from [<804c9a00>] (copy_page_range+0x1084/0x1944) [ 4196.521798][T32568] r5:858c1008 r4:84c28fc0 [ 4196.521939][T32568] [<804c897c>] (copy_page_range) from [<804d13c8>] (dup_mmap+0x41c/0x97c) [ 4196.522492][T32568] r10:8348fc58 r9:82c305a0 r8:82c3059c r7:8348fc00 r6:854ea400 r5:84882d80 [ 4196.522693][T32568] r4:84afa780 [ 4196.522713][T32568] [<804d0fac>] (dup_mmap) from [<80252c6c>] (copy_process+0xd6c/0x16f8) [ 4196.522874][T32568] r10:dfaadf30 r9:84880680 r8:84882d80 r7:dfaadea4 r6:83a13000 r5:00808000 [ 4196.523168][T32568] r4:83a14800 [ 4196.523215][T32568] [<80251f00>] (copy_process) from [<8025373c>] (kernel_clone+0xac/0x3ec) [ 4196.523431][T32568] r10:83a13000 r9:83a13000 r8:00000000 r7:00000000 r6:dfaadf30 r5:00000000 [ 4196.523460][T32568] r4:00808000 [ 4196.523660][T32568] [<80253690>] (kernel_clone) from [<80253e30>] (sys_clone+0x78/0x9c) [ 4196.523895][T32568] r10:00000078 r9:83a13000 r8:8020029c r7:00000000 r6:00000000 r5:00000000 [ 4196.524215][T32568] r4:00000000 [ 4196.524724][T32568] [<80253db8>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4196.524953][T32568] Exception stack(0xdfaadfa8 to 0xdfaadff0) [ 4196.525374][T32568] dfa0: 20000000 00000000 00808000 00000000 00000000 00000000 [ 4196.525512][T32568] dfc0: 20000000 00000000 00000003 00000078 002e0000 00000000 00006364 76f6e0bc [ 4196.525683][T32568] dfe0: 76f6de98 76f6de88 00019668 001322c0 [ 4196.525722][T32568] r7:00000078 r6:00000003 r5:00000000 r4:20000000 [ 4196.777452][T32571] fuse: Unknown parameter 'fd0x0000000000000003' [ 4197.875689][ T31] audit: type=1400 audit(4453.798:642): avc: denied { bind } for pid=32579 comm="syz.2.6370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 4197.956815][ T31] audit: type=1400 audit(4453.878:643): avc: denied { accept } for pid=32579 comm="syz.2.6370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 4197.957118][T29921] hid (null): usage index exceeded [ 4197.957368][T29921] hid (null): report_id 0 is invalid [ 4198.067569][T29921] hid-generic 0007:C443:62C71BE0.0012: unknown main item tag 0x0 [ 4198.068114][T29921] hid-generic 0007:C443:62C71BE0.0012: ignoring exceeding usage max [ 4198.069262][T29921] hid-generic 0007:C443:62C71BE0.0012: ignoring exceeding usage max [ 4198.077441][T29921] hid-generic 0007:C443:62C71BE0.0012: usage index exceeded [ 4198.077723][T29921] hid-generic 0007:C443:62C71BE0.0012: item 0 4 2 2 parsing failed [ 4198.078359][T29921] hid-generic 0007:C443:62C71BE0.0012: probe with driver hid-generic failed with error -22 [ 4198.626902][T32586] fuse: Unknown parameter 'fd0x0000000000000003' [ 4200.309941][T32596] FAULT_INJECTION: forcing a failure. [ 4200.309941][T32596] name failslab, interval 1, probability 0, space 0, times 0 [ 4200.310313][T32596] CPU: 0 UID: 0 PID: 32596 Comm: syz.2.6375 Not tainted syzkaller #0 PREEMPT [ 4200.310408][T32596] Hardware name: ARM-Versatile Express [ 4200.310438][T32596] Call trace: [ 4200.310501][T32596] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4200.310621][T32596] r7:00000c40 r6:00000000 r5:60000013 r4:82260500 [ 4200.310763][T32596] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4200.310949][T32596] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4200.311080][T32596] r5:85f38c00 r4:82917c00 [ 4200.311189][T32596] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4200.311301][T32596] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4200.311445][T32596] r8:85f38c00 r7:00000c40 r6:84eaff28 r5:00001000 r4:830016c0 [ 4200.311533][T32596] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 4200.311656][T32596] [<80503b10>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4200.311741][T32596] r10:85f38c00 r9:8331d000 r8:00000000 r7:850a2220 r6:84eaff28 r5:00001000 [ 4200.311845][T32596] r4:00000000 [ 4200.312097][T32596] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4200.312311][T32596] r10:85f38c00 r9:00000000 r8:84eaff00 r7:80041272 r6:00000004 r5:81cd6504 [ 4200.312451][T32596] r4:84eaff28 r3:826c0200 [ 4200.312595][T32596] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 4200.312732][T32596] r9:00000004 r8:84eaff00 r7:00000000 r6:00000000 r5:80041272 r4:84eaff00 [ 4200.313063][T32596] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 4200.313176][T32596] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 4200.313270][T32596] r7:00000000 r6:84eaff01 r5:00000000 r4:80041272 [ 4200.313349][T32596] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4200.313667][T32596] Exception stack(0xdf9e5fa8 to 0xdf9e5ff0) [ 4200.313783][T32596] 5fa0: 00000000 00000000 00000004 80041272 00000000 00000000 [ 4200.313977][T32596] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f4d0bc [ 4200.314220][T32596] 5fe0: 76f4cec0 76f4ceb0 0001948c 001322c0 [ 4200.314347][T32596] r10:00000036 r9:85f38c00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 4200.314531][T32596] r4:00000000 [ 4200.338866][T32596] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4200.518888][T32598] fuse: Unknown parameter 'fd0x0000000000000003' [ 4209.044267][T32629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32629 comm=syz.1.6385 [ 4216.095195][ T31] audit: type=1400 audit(4472.008:644): avc: denied { setattr } for pid=32648 comm="syz.2.6391" name="NFC_LLCP" dev="sockfs" ino=73764 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4219.211665][T32665] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=32665 comm=syz.1.6395 [ 4219.239278][ T31] audit: type=1400 audit(4475.168:645): avc: denied { audit_read } for pid=32663 comm="syz.1.6395" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4219.385315][T32667] netlink: 248 bytes leftover after parsing attributes in process `syz.1.6396'. [ 4219.388080][ T31] audit: type=1400 audit(4475.308:646): avc: denied { nlmsg_read } for pid=32666 comm="syz.1.6396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4220.418785][ T31] audit: type=1400 audit(4476.348:647): avc: denied { read } for pid=32666 comm="syz.1.6396" path="socket:[73236]" dev="sockfs" ino=73236 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4232.253674][T32718] FAULT_INJECTION: forcing a failure. [ 4232.253674][T32718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4232.254132][T32718] CPU: 0 UID: 0 PID: 32718 Comm: syz.1.6406 Not tainted syzkaller #0 PREEMPT [ 4232.254288][T32718] Hardware name: ARM-Versatile Express [ 4232.254326][T32718] Call trace: [ 4232.254374][T32718] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4232.254507][T32718] r7:84e6becc r6:00000000 r5:60000013 r4:82260500 [ 4232.254532][T32718] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4232.254587][T32718] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4232.254641][T32718] r5:85f3ec00 r4:8294f190 [ 4232.254657][T32718] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4232.254908][T32718] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4232.255066][T32718] r8:00000044 r7:84e6becc r6:ffffffa4 r5:dfa61ed4 r4:20000380 [ 4232.255213][T32718] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4232.255405][T32718] [<809727c0>] (should_fail_usercopy) from [<81938bc8>] (copy_from_sockptr_offset.constprop.0+0x48/0xd4) [ 4232.255574][T32718] [<81938b80>] (copy_from_sockptr_offset.constprop.0) from [<81938d44>] (smc_setsockopt+0xf0/0x3cc) [ 4232.255835][T32718] r6:ffffffa4 r5:84e6b9c0 r4:00000488 [ 4232.256146][T32718] [<81938c58>] (smc_setsockopt) from [<81542b48>] (do_sock_setsockopt+0x70/0xc8) [ 4232.256254][T32718] r9:85f3ec00 r8:00000044 r7:8501ea00 r6:00000488 r5:00000000 r4:81938c54 [ 4232.256284][T32718] [<81542ad8>] (do_sock_setsockopt) from [<81546100>] (__sys_setsockopt+0x7c/0xc4) [ 4232.256352][T32718] r8:00000000 r7:84d42b40 r6:84d42b41 r5:00000488 r4:00000000 [ 4232.256371][T32718] [<81546084>] (__sys_setsockopt) from [<81546164>] (sys_setsockopt+0x1c/0x24) [ 4232.256452][T32718] r8:8020029c r7:00000126 r6:00130270 r5:00000000 r4:00000044 [ 4232.256471][T32718] [<81546148>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4232.256610][T32718] Exception stack(0xdfa61fa8 to 0xdfa61ff0) [ 4232.256652][T32718] 1fa0: 00000044 00000000 00000003 00000000 00000488 20000380 [ 4232.256687][T32718] 1fc0: 00000044 00000000 00130270 00000126 002e0000 00000000 00006364 76f2d0bc [ 4232.256720][T32718] 1fe0: 76f2cec0 76f2ceb0 0001948c 001322c0 [ 4237.521930][ T31] audit: type=1400 audit(4493.448:648): avc: denied { accept } for pid=32734 comm="syz.2.6410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4247.131520][ T31] audit: type=1400 audit(4503.048:649): avc: denied { connect } for pid=308 comm="syz.2.6420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4258.935456][ T351] FAULT_INJECTION: forcing a failure. [ 4258.935456][ T351] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4258.935801][ T351] CPU: 0 UID: 0 PID: 351 Comm: syz.2.6430 Not tainted syzkaller #0 PREEMPT [ 4258.935875][ T351] Hardware name: ARM-Versatile Express [ 4258.935930][ T351] Call trace: [ 4258.935977][ T351] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4258.936038][ T351] r7:00000000 r6:00000000 r5:60000013 r4:82260500 [ 4258.936048][ T351] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4258.936076][ T351] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4258.936105][ T351] r5:85f3c800 r4:8294f190 [ 4258.936140][ T351] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4258.936172][ T351] [<80972580>] (should_fail_ex) from [<809727bc>] (should_fail+0x14/0x18) [ 4258.936205][ T351] r8:00000000 r7:00000000 r6:00000019 r5:df9ede90 r4:00000038 [ 4258.936214][ T351] [<809727a8>] (should_fail) from [<809727dc>] (should_fail_usercopy+0x1c/0x20) [ 4258.936240][ T351] [<809727c0>] (should_fail_usercopy) from [<803cee3c>] (__sys_bpf+0xb0/0x20f0) [ 4258.936268][ T351] [<803ced8c>] (__sys_bpf) from [<803d141c>] (sys_bpf+0x2c/0x48) [ 4258.936347][ T351] r10:00000182 r9:85f3c800 r8:8020029c r7:00000182 r6:00130270 r5:00000000 [ 4258.936357][ T351] r4:00000000 [ 4258.936371][ T351] [<803d13f0>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4258.936405][ T351] Exception stack(0xdf9edfa8 to 0xdf9edff0) [ 4258.936427][ T351] dfa0: 00000000 00000000 00000019 20000080 00000038 00000000 [ 4258.936445][ T351] dfc0: 00000000 00000000 00130270 00000182 002e0000 00000000 00006364 76f6e0bc [ 4258.936458][ T351] dfe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4260.128945][ T357] FAULT_INJECTION: forcing a failure. [ 4260.128945][ T357] name failslab, interval 1, probability 0, space 0, times 0 [ 4260.129334][ T357] CPU: 0 UID: 0 PID: 357 Comm: syz.1.6432 Not tainted syzkaller #0 PREEMPT [ 4260.129511][ T357] Hardware name: ARM-Versatile Express [ 4260.129543][ T357] Call trace: [ 4260.129595][ T357] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4260.129719][ T357] r7:00000c40 r6:00000000 r5:60000013 r4:82260500 [ 4260.129740][ T357] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4260.129795][ T357] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4260.129850][ T357] r5:85f3e000 r4:82917c00 [ 4260.130174][ T357] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4260.130364][ T357] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4260.130534][ T357] r8:85f3e000 r7:00000c40 r6:84d43aa8 r5:00001000 r4:830016c0 [ 4260.130577][ T357] [<8051f1ac>] (should_failslab) from [<80503bac>] (__kmalloc_noprof+0x9c/0x458) [ 4260.130815][ T357] [<80503b10>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4260.130992][ T357] r10:85f3e000 r9:8331d000 r8:00000000 r7:850f82a8 r6:84d43aa8 r5:00001000 [ 4260.131017][ T357] r4:00000000 [ 4260.131034][ T357] [<807c3598>] (tomoyo_realpath_from_path) from [<807bf718>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4260.131106][ T357] r10:85f3e000 r9:00000000 r8:84d43a80 r7:000089a1 r6:00000004 r5:81cd6504 [ 4260.131299][ T357] r4:84d43aa8 r3:826c0200 [ 4260.131358][ T357] [<807bf64c>] (tomoyo_path_number_perm) from [<807c3ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 4260.131492][ T357] r9:00000003 r8:84d43a80 r7:00000000 r6:00000000 r5:000089a1 r4:84d43a80 [ 4260.131609][ T357] [<807c3fdc>] (tomoyo_file_ioctl) from [<8077084c>] (security_file_ioctl+0x64/0x1e4) [ 4260.131690][ T357] [<807707e8>] (security_file_ioctl) from [<8056cc9c>] (sys_ioctl+0x4c/0xba0) [ 4260.131777][ T357] r7:00000000 r6:84d43a81 r5:00000000 r4:000089a1 [ 4260.131958][ T357] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4260.132079][ T357] Exception stack(0xdfa61fa8 to 0xdfa61ff0) [ 4260.132554][ T357] 1fa0: 00000000 00000000 00000003 000089a1 00000000 00000000 [ 4260.132636][ T357] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fb10bc [ 4260.132713][ T357] 1fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4260.132851][ T357] r10:00000036 r9:85f3e000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 4260.132940][ T357] r4:00000000 [ 4260.140313][ T357] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4262.243933][ T368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=6 sclass=netlink_audit_socket pid=368 comm=syz.2.6435 [ 4262.260590][ T368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=368 comm=syz.2.6435 [ 4262.272413][ T368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=368 comm=syz.2.6435 [ 4265.990711][ T31] audit: type=1400 audit(4521.918:650): avc: denied { accept } for pid=385 comm="syz.2.6438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4274.002605][ T439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=439 comm=syz.2.6453 [ 4291.837636][ T523] FAULT_INJECTION: forcing a failure. [ 4291.837636][ T523] name failslab, interval 1, probability 0, space 0, times 0 [ 4291.839293][ T523] CPU: 1 UID: 0 PID: 523 Comm: syz.1.6474 Not tainted syzkaller #0 PREEMPT [ 4291.839429][ T523] Hardware name: ARM-Versatile Express [ 4291.839460][ T523] Call trace: [ 4291.839504][ T523] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4291.839617][ T523] r7:84854800 r6:00000000 r5:60000013 r4:82260500 [ 4291.839639][ T523] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4291.839694][ T523] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4291.839748][ T523] r5:84854800 r4:82917c00 [ 4291.839768][ T523] [<8021fb9c>] (dump_stack) from [<80972744>] (should_fail_ex+0x1c4/0x228) [ 4291.839826][ T523] [<80972580>] (should_fail_ex) from [<8051f218>] (should_failslab+0x6c/0x94) [ 4291.839893][ T523] r8:00000000 r7:84854800 r6:00000820 r5:86d81540 r4:832cb240 [ 4291.839911][ T523] [<8051f1ac>] (should_failslab) from [<80503828>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 4291.839968][ T523] [<805037dc>] (kmem_cache_alloc_noprof) from [<81557a78>] (skb_clone+0x60/0x1c8) [ 4291.840044][ T523] r10:000001a2 r9:85d34780 r8:84d84800 r7:86d81540 r6:854956c0 r5:86d81540 [ 4291.840066][ T523] r4:00000820 [ 4291.840084][ T523] [<81557a18>] (skb_clone) from [<8166e0dc>] (__netlink_deliver_tap+0x1f4/0x28c) [ 4291.840145][ T523] r5:00000018 r4:85495000 [ 4291.840165][ T523] [<8166dee8>] (__netlink_deliver_tap) from [<8167143c>] (netlink_unicast+0x2f0/0x30c) [ 4291.840231][ T523] r10:00000000 r9:00000000 r8:85716740 r7:86d81540 r6:85d34780 r5:00000018 [ 4291.840255][ T523] r4:84d84800 [ 4291.840273][ T523] [<8167114c>] (netlink_unicast) from [<81671624>] (netlink_sendmsg+0x1cc/0x444) [ 4291.840337][ T523] r9:00000000 r8:00000000 r7:86c04000 r6:00000018 r5:86d81540 r4:df9e5f20 [ 4291.840360][ T523] [<81671458>] (netlink_sendmsg) from [<81543320>] (__sock_sendmsg+0x44/0x78) [ 4291.840447][ T523] r10:00000000 r9:df9e5dc4 r8:df9e5dc4 r7:00000000 r6:85042c80 r5:df9e5f20 [ 4291.840470][ T523] r4:00000000 [ 4291.840490][ T523] [<815432dc>] (__sock_sendmsg) from [<81544674>] (____sys_sendmsg+0x298/0x2cc) [ 4291.840553][ T523] r7:00000000 r6:85042c80 r5:00000080 r4:df9e5f20 [ 4291.840573][ T523] [<815443dc>] (____sys_sendmsg) from [<8154663c>] (___sys_sendmsg+0x9c/0xd0) [ 4291.840649][ T523] r10:df9e5e24 r9:20000100 r8:00000080 r7:00000000 r6:85042c80 r5:df9e5f20 [ 4291.840675][ T523] r4:00000000 [ 4291.840692][ T523] [<815465a0>] (___sys_sendmsg) from [<81546ad4>] (__sys_sendmsg+0x8c/0xe0) [ 4291.840760][ T523] r10:00000128 r9:84854800 r8:84d43f00 r7:00000080 r6:20000100 r5:84d43f01 [ 4291.840781][ T523] r4:00000003 [ 4291.840799][ T523] [<81546a48>] (__sys_sendmsg) from [<81546b3c>] (sys_sendmsg+0x14/0x18) [ 4291.840865][ T523] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 4291.840884][ T523] [<81546b28>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4291.840938][ T523] Exception stack(0xdf9e5fa8 to 0xdf9e5ff0) [ 4291.840983][ T523] 5fa0: 00000000 00000000 00000003 20000100 00000080 00000000 [ 4291.841032][ T523] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fb10bc [ 4291.841067][ T523] 5fe0: 76fb0ec0 76fb0eb0 0001948c 001322c0 [ 4350.357827][ T551] netlink: 'syz.2.6483': attribute type 4 has an invalid length. [ 4350.562232][ T31] audit: type=1400 audit(4606.488:651): avc: denied { create } for pid=559 comm="syz.2.6487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4354.347885][ T584] input: syz1 as /devices/virtual/input/input24 [ 4354.479559][ T585] [U] t tz [ 4355.634254][ T605] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4355.648594][ T605] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4357.636603][ T618] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4357.638305][ T618] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4376.848289][T24156] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 4376.996592][T24156] usb 2-1: Using ep0 maxpacket: 8 [ 4377.055534][T24156] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 4377.056218][T24156] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 4377.056518][T24156] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 4377.056759][T24156] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 4377.056951][T24156] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 4377.057097][T24156] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 4377.057138][T24156] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4377.344645][T24156] usb 2-1: usb_control_msg returned -32 [ 4377.345087][T24156] usbtmc 2-1:16.0: can't read capabilities [ 4391.581679][T25445] usb 2-1: USB disconnect, device number 63 [ 4394.536335][ T681] syz_tun: entered allmulticast mode [ 4394.543638][ T681] SELinux: failure in sel_netif_sid_slow(), invalid network interface (0) [ 4394.544016][ T681] mroute: pending queue full, dropping entries [ 4394.552318][ T681] syz_tun: left allmulticast mode [ 4404.429246][ T711] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6524'. [ 4405.947279][ T719] netlink: 11 bytes leftover after parsing attributes in process `syz.2.6521'. [ 4418.306525][ T31] audit: type=1400 audit(4674.228:652): avc: denied { execute } for pid=730 comm="syz.2.6529" path="/file1" dev="ramfs" ino=74420 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 4421.415061][ T31] audit: type=1400 audit(4677.338:653): avc: denied { bind } for pid=747 comm="syz.1.6536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4425.976201][ T31] audit: type=1400 audit(4681.898:654): avc: denied { write } for pid=747 comm="syz.1.6536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4432.735203][ T752] 8<--- cut here --- [ 4432.735499][ T752] Unable to handle kernel paging request at virtual address fee04f27 when write [ 4432.735792][ T752] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 4432.736990][ T752] Internal error: Oops: a06 [#1] SMP ARM [ 4432.741003][ T752] Modules linked in: [ 4432.741548][ T752] CPU: 1 UID: 0 PID: 752 Comm: syz.2.6537 Not tainted syzkaller #0 PREEMPT [ 4432.742217][ T752] Hardware name: ARM-Versatile Express [ 4432.742501][ T752] PC is at parport_attach+0x174/0x1d0 [ 4432.742810][ T752] LR is at parport_attach+0x164/0x1d0 [ 4432.743229][ T752] pc : [<813abc58>] lr : [<813abc48>] psr: 60000013 [ 4432.743494][ T752] sp : dfa4dd30 ip : dfa4dd30 fp : dfa4dd54 [ 4432.744879][ T752] r10: 82b16f40 r9 : 00000003 r8 : 840f7900 [ 4432.745950][ T752] r7 : dfa4dd90 r6 : 840f7900 r5 : 00000000 r4 : 00000000 [ 4432.746358][ T752] r3 : fee04f27 r2 : 81e15484 r1 : 00000001 r0 : 813ab8c8 [ 4432.747639][ T752] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4432.748062][ T752] Control: 30c5387d Table: 85b840c0 DAC: 00000000 [ 4432.748420][ T752] Register r0 information: non-slab/vmalloc memory [ 4432.749491][ T752] Register r1 information: non-paged memory [ 4432.749914][ T752] Register r2 information: non-slab/vmalloc memory [ 4432.750233][ T752] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4432.751006][ T752] Register r4 information: NULL pointer [ 4432.752340][ T752] Register r5 information: NULL pointer [ 4432.752630][ T752] Register r6 information: slab kmalloc-192 start 840f7900 pointer offset 0 size 192 [ 4432.753943][ T752] Register r7 information: 2-page vmalloc region starting at 0xdfa4c000 allocated at kernel_clone+0xac/0x3ec [ 4432.754516][ T752] Register r8 information: slab kmalloc-192 start 840f7900 pointer offset 0 size 192 [ 4432.755089][ T752] Register r9 information: non-paged memory [ 4432.755497][ T752] Register r10 information: non-slab/vmalloc memory [ 4432.755824][ T752] Register r11 information: 2-page vmalloc region starting at 0xdfa4c000 allocated at kernel_clone+0xac/0x3ec [ 4432.756637][ T752] Register r12 information: 2-page vmalloc region starting at 0xdfa4c000 allocated at kernel_clone+0xac/0x3ec [ 4432.757153][ T752] Process syz.2.6537 (pid: 752, stack limit = 0xdfa4c000) [ 4432.757503][ T752] Stack: (0xdfa4dd30 to 0xdfa4e000) [ 4432.757756][ T752] dd20: 823fe6c8 840f7900 829cf9ac 829cf9ac [ 4432.758077][ T752] dd40: 81e15944 840f7944 dfa4dd8c dfa4dd58 813a7cf4 813abaf0 200000c0 00000000 [ 4432.758380][ T752] dd60: dfa4dd7c 200000c0 840f7900 b5403587 200000c0 85f29800 40946400 00000003 [ 4432.758716][ T752] dd80: dfa4de4c dfa4dd90 813a3840 813a7bf8 656d6f63 705f6964 6f707261 00007472 [ 4432.759011][ T752] dda0: 00000000 00004f27 00000009 00010000 000000ff 00000002 00000004 0000000c [ 4432.759327][ T752] ddc0: 00000007 0000000a 00000100 00000005 00000001 fffffffe 00000031 00004006 [ 4432.759591][ T752] dde0: 00000101 00000000 0801a449 00000003 40000004 00000089 0000caa3 000007ff [ 4432.760086][ T752] de00: 20001e58 0000000b 00000e68 00000000 00000008 0000f9e8 00000000 fffffff8 [ 4432.760490][ T752] de20: 00000000 28b82975 00000000 85a28600 840f7900 200000c0 200000c0 85f29800 [ 4432.760795][ T752] de40: dfa4df14 dfa4de50 813a480c 813a374c 00000000 00000000 00000000 28b82975 [ 4432.761072][ T752] de60: 00000000 00000000 8247054c 0000005f 83df6658 840f7930 8424800c 85f29800 [ 4432.761397][ T752] de80: dfa4dee4 dfa4de90 80797a5c 8078ddc0 00000064 00000001 00000000 dfa4deac [ 4432.761814][ T752] dea0: 8588b6d0 834ef880 00006400 0000000b dfa4dea0 00000000 00000000 28b82975 [ 4432.762145][ T752] dec0: 85a28600 40946400 200000c0 200000c0 85a28600 00000003 dfa4def4 dfa4dee8 [ 4432.762441][ T752] dee0: 80797b7c 28b82975 dfa4df14 40946400 00000000 85a28601 200000c0 85a28600 [ 4432.762917][ T752] df00: 00000003 85f29800 dfa4dfa4 dfa4df18 8056cd80 813a423c ecac8b10 85f29800 [ 4432.763348][ T752] df20: dfa4df3c dfa4df30 81a39d78 81a39c48 dfa4df54 dfa4df40 8025e490 8028ef64 [ 4432.763693][ T752] df40: dfa4dfb0 40000000 dfa4df84 dfa4df58 802229ec 8025e44c 00000000 8281cddc [ 4432.764072][ T752] df60: dfa4dfb0 0014c820 ecac8b10 80222940 00000000 28b82975 dfa4dfac 00000000 [ 4432.764356][ T752] df80: 00000000 002f6308 00000036 8020029c 85f29800 00000036 00000000 dfa4dfa8 [ 4432.764642][ T752] dfa0: 80200060 8056cc5c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4432.764980][ T752] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f6e0bc [ 4432.765344][ T752] dfe0: 76f6dec0 76f6deb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 4432.765736][ T752] Call trace: [ 4432.765946][ T752] [<813abae4>] (parport_attach) from [<813a7cf4>] (comedi_device_attach+0x108/0x250) [ 4432.766476][ T752] r6:840f7944 r5:81e15944 r4:829cf9ac [ 4432.766809][ T752] [<813a7bec>] (comedi_device_attach) from [<813a3840>] (do_devconfig_ioctl+0x100/0x220) [ 4432.767248][ T752] r10:00000003 r9:40946400 r8:85f29800 r7:200000c0 r6:b5403587 r5:840f7900 [ 4432.767637][ T752] r4:200000c0 [ 4432.767837][ T752] [<813a3740>] (do_devconfig_ioctl) from [<813a480c>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 4432.768264][ T752] r8:85f29800 r7:200000c0 r6:200000c0 r5:840f7900 r4:85a28600 [ 4432.768565][ T752] [<813a4230>] (comedi_unlocked_ioctl) from [<8056cd80>] (sys_ioctl+0x130/0xba0) [ 4432.769285][ T752] r10:85f29800 r9:00000003 r8:85a28600 r7:200000c0 r6:85a28601 r5:00000000 [ 4432.769642][ T752] r4:40946400 [ 4432.769862][ T752] [<8056cc50>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4432.770207][ T752] Exception stack(0xdfa4dfa8 to 0xdfa4dff0) [ 4432.770445][ T752] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4432.770773][ T752] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f6e0bc [ 4432.771473][ T752] dfe0: 76f6dec0 76f6deb0 0001948c 001322c0 [ 4432.771866][ T752] r10:00000036 r9:85f29800 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 4432.772223][ T752] r4:00000000 [ 4432.772953][ T752] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 4432.773697][ T752] ---[ end trace 0000000000000000 ]--- [ 4432.774504][ T752] Kernel panic - not syncing: Fatal exception [ 4432.777097][ T752] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:51:19 Registers: info registers vcpu 0 CPU#0 R00=010d4000 R01=00000001 R02=010d4000 R03=76a12e40 R04=fff70000 R05=01164000 R06=76a16e0c R07=0000002d R08=00008b3f R09=76a135fc R10=01048008 R11=7e8422bc R12=76a13a18 R13=7e8420ac R14=769992fc R15=769942c8 PSR=80010010 N--- A S usr32 s00=ffffffff s01=7301ffff d00=7301ffffffffffff s02=616b7a79 s03=72656c6c d01=72656c6c616b7a79 s04=00000000 s05=00000010 d02=0000001000000000 s06=0000198d s07=00000000 d03=000000000000198d s08=00000000 s09=0000003d d04=0000003d00000000 s10=01738a06 s11=80080002 d05=8008000201738a06 s12=04c09090 s13=081b8003 d06=081b800304c09090 s14=ffffffef s15=ffffffff d07=ffffffffffffffef s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=726a5c37 s33=c0fc5c22 d16=c0fc5c22726a5c37 s34=9b5499ef s35=788d1544 d17=788d15449b5499ef s36=31263166 s37=018e8e62 d18=018e8e6231263166 s38=71e7b959 s39=ed02c93d d19=ed02c93d71e7b959 s40=b1f0f908 s41=0b498bbd d20=0b498bbdb1f0f908 s42=a20d3c6a s43=325a022b d21=325a022ba20d3c6a s44=6b7f5597 s45=7a39b684 d22=7a39b6846b7f5597 s46=62a5ca99 s47=60286d25 d23=60286d2562a5ca99 s48=0000000b s49=000a0004 d24=000a00040000000b s50=00080000 s51=00000000 d25=0000000000080000 s52=00000300 s53=ffea0000 d26=ffea000000000300 s54=000cffff s55=00010000 d27=00010000000cffff s56=00000000 s57=00000300 d28=0000030000000000 s58=00000000 s59=0010000a d29=0010000a00000000 s60=0008000f s61=000a0004 d30=000a00040008000f s62=000c0000 s63=00160000 d31=00160000000c0000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00002554 R01=00000000 R02=00002555 R03=00000000 R04=829590f8 R05=80000193 R06=82826ef8 R07=00000000 R08=00000001 R09=00000000 R10=00002555 R11=dfa4dae4 R12=00000000 R13=dfa4da98 R14=0001d538 R15=802e4abc PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000