last executing test programs: 10.409349251s ago: executing program 1 (id=755): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESOCT=0x0]) mknod(&(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r1 = openat$tun(0xffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) socket$netlink(0x10, 0x3, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 7.858249944s ago: executing program 1 (id=759): r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x80800) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@private0, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f00000001c0)=0xe8) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000240), 0x200241, 0x0) close(r2) r3 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x30, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz1\x00'}}}}, 0x30}, 0x1, 0x0, 0x0, 0x8890}, 0x42) r4 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$SMC_PNETID_DEL(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x9040}, 0x2) setresuid(0x0, 0xee01, r1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = signalfd4(r4, &(0x7f0000000340)={[0x6, 0x6]}, 0x8, 0x80800) r8 = accept$inet(r2, &(0x7f0000000380)={0x2, 0x0, @multicast1}, &(0x7f00000003c0)=0x10) ioctl$BTRFS_IOC_SNAP_DESTROY(r7, 0x5000940f, &(0x7f0000000400)={{r8}, "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"}) sendmsg$NFT_MSG_GETSET(r6, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xa, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x80) r9 = dup2(r5, r5) mmap$snddsp_control(&(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x1000000, 0x2080832, r9, 0x83000000) syz_usb_connect(0x6, 0x24, &(0x7f0000000180)={{0x12, 0x1, 0x201, 0xe, 0x41, 0xb1, 0x28, 0x54c, 0x16a, 0x6a26, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x2, 0x1, 0x0, 0x3, [{{0x9, 0x4, 0x8d, 0x4e, 0x0, 0x9, 0x88, 0x10, 0x37}}]}}]}}, 0x0) socket$alg(0x26, 0x5, 0x0) 7.70371484s ago: executing program 1 (id=760): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x80000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='erspan0\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0086426, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4008641c, &(0x7f00000002c0)={r3, &(0x7f0000000380)=""/249}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x700, 0x1, 0x828, 0x81, {{0x28, 0x4, 0x1, 0x34, 0xa0, 0x64, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x12}, @local, {[@lsrr={0x83, 0x1b, 0x3a, [@loopback, @multicast1, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x19}]}, @rr={0x7, 0x7, 0x7b, [@multicast2]}, @timestamp_prespec={0x44, 0x34, 0x59, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@local, 0x7}, {@private=0xa010102, 0x800}, {@local}, {@multicast2, 0x1}, {@multicast1, 0x5}]}, @lsrr={0x83, 0x13, 0x6d, [@broadcast, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1]}, @cipso={0x86, 0x20, 0x0, [{0x5, 0x7, "660cbce43c"}, {0x5, 0x8, "7ccd8689d94a"}, {0x1, 0xb, "622008a979bb34c476"}]}]}}}}}) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x80000001, @vifc_lcl_addr=@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 4.47862417s ago: executing program 1 (id=769): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0xffffffff, 0x0, 0x0, 0x4, 0x2, 0x1}}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0xff, 0x0, 0x0, 0x0, 0x3}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x100}) 2.73061225s ago: executing program 0 (id=772): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newsa={0x138, 0x10, 0x1, 0xbffffffe, 0x100, {{@in=@empty, @in=@local, 0x1, 0x394, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@remote, {0x0, 0x9, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0x6, 0x0, 0x1f, 0x1ff}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0xfd, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newsa={0x138, 0x10, 0x1, 0x70bd29, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@remote, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x7, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) 2.509376479s ago: executing program 0 (id=773): r0 = socket$packet(0x11, 0x3, 0x300) getsockopt(r0, 0x1, 0x4b, 0x0, &(0x7f0000000b00)) 2.379146705s ago: executing program 0 (id=774): fanotify_mark(0xffffffffffffffff, 0x1, 0x40000030, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000e40), 0x40080, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 2.219247991s ago: executing program 0 (id=775): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = syz_io_uring_setup(0xcaf, &(0x7f0000000100)={0x0, 0xb601, 0x1, 0x5, 0x17a}, &(0x7f0000000240)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r0, 0xc000000, &(0x7f0000000040)=[{0x0}], 0x1, 0x1e}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff23}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) io_uring_enter(r1, 0x847ba, 0x0, 0xe, 0x0, 0x0) 1.643072134s ago: executing program 0 (id=776): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000cc0)=ANY=[@ANYBLOB="120100004f92b90857152077ebb7000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000080)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)={0x40, 0x13, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000001740)={0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x40, 0x19, 0x2, "0200"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 417.913314ms ago: executing program 0 (id=777): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = syz_io_uring_setup(0x4b6, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x0, 0x20e}, &(0x7f0000ff0000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000880)=""/96, 0x60}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) 317.805048ms ago: executing program 1 (id=778): r0 = syz_io_uring_setup(0x10f, &(0x7f00000000c0)={0x0, 0x211a, 0x80, 0x4, 0x306}, &(0x7f0000000340), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 0s ago: executing program 1 (id=779): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi0\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000003c0)={'comedi_parport\x00', [0x4f27, 0xb, 0x0, 0x4cd, 0x5, 0x6, 0x40004, 0x7, 0x7fffffff, 0x104, 0x7, 0xfff, 0x5, 0x20003, 0x9, 0x101, 0x3, 0x80000000, 0x5, 0x40000003, 0x87, 0xcaab, 0xe, 0xffffffff, 0xb, 0xe69, 0x3c, 0xc, 0x8000, 0x3a0, 0x3]}) kernel console output (not intermixed with test programs): [ 47.359826][ T31] audit: type=1400 audit(47.300:56): avc: denied { read write } for pid=3116 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.361712][ T31] audit: type=1400 audit(47.300:57): avc: denied { open } for pid=3116 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:50140' (ED25519) to the list of known hosts. [ 57.487889][ T31] audit: type=1400 audit(57.420:58): avc: denied { name_bind } for pid=3119 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 59.830782][ T31] audit: type=1400 audit(59.770:59): avc: denied { execute } for pid=3120 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.835747][ T31] audit: type=1400 audit(59.770:60): avc: denied { execute_no_trans } for pid=3120 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.613352][ T31] audit: type=1400 audit(62.550:61): avc: denied { mounton } for pid=3120 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.615998][ T31] audit: type=1400 audit(62.550:62): avc: denied { mount } for pid=3120 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.638552][ T3120] cgroup: Unknown subsys name 'net' [ 62.646443][ T31] audit: type=1400 audit(62.580:63): avc: denied { unmount } for pid=3120 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.834900][ T3120] cgroup: Unknown subsys name 'cpuset' [ 62.841493][ T3120] cgroup: Unknown subsys name 'hugetlb' [ 62.842364][ T3120] cgroup: Unknown subsys name 'rlimit' [ 63.117734][ T31] audit: type=1400 audit(63.060:64): avc: denied { setattr } for pid=3120 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.119527][ T31] audit: type=1400 audit(63.060:65): avc: denied { mounton } for pid=3120 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.122643][ T31] audit: type=1400 audit(63.060:66): avc: denied { mount } for pid=3120 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.234326][ T3122] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.236159][ T31] audit: type=1400 audit(63.170:67): avc: denied { relabelto } for pid=3122 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.241565][ T31] audit: type=1400 audit(63.180:68): avc: denied { write } for pid=3122 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 63.270057][ T31] audit: type=1400 audit(63.210:69): avc: denied { read } for pid=3120 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.277518][ T31] audit: type=1400 audit(63.210:70): avc: denied { open } for pid=3120 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.133946][ T3120] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 70.889348][ T31] audit: type=1400 audit(70.830:71): avc: denied { execmem } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 70.962560][ T31] audit: type=1400 audit(70.900:72): avc: denied { read } for pid=3125 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 70.965492][ T31] audit: type=1400 audit(70.900:73): avc: denied { open } for pid=3125 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 70.975625][ T31] audit: type=1400 audit(70.910:74): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 71.003561][ T31] audit: type=1400 audit(70.940:76): avc: denied { module_request } for pid=3125 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.003862][ T31] audit: type=1400 audit(70.940:75): avc: denied { module_request } for pid=3126 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.081771][ T31] audit: type=1400 audit(71.020:78): avc: denied { sys_module } for pid=3126 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 71.082098][ T31] audit: type=1400 audit(71.020:77): avc: denied { sys_module } for pid=3125 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 71.785955][ T31] audit: type=1400 audit(71.720:79): avc: denied { ioctl } for pid=3125 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.047981][ T3126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.054017][ T3125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.059155][ T3126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.091803][ T3125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.866411][ T3125] hsr_slave_0: entered promiscuous mode [ 73.869308][ T3125] hsr_slave_1: entered promiscuous mode [ 73.899105][ T3126] hsr_slave_0: entered promiscuous mode [ 73.900287][ T3126] hsr_slave_1: entered promiscuous mode [ 73.902750][ T3126] debugfs: 'hsr0' already exists in 'hsr' [ 73.903910][ T3126] Cannot create hsr debugfs directory [ 74.263328][ T31] audit: type=1400 audit(74.200:80): avc: denied { create } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.281984][ T3126] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.299001][ T3126] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.304755][ T3126] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.312865][ T3126] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.373149][ T3125] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.381323][ T3125] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.390745][ T3125] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.403139][ T3125] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.950874][ T3126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.050022][ T3125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.151492][ T3126] veth0_vlan: entered promiscuous mode [ 77.164962][ T3126] veth1_vlan: entered promiscuous mode [ 77.202839][ T3126] veth0_macvtap: entered promiscuous mode [ 77.210661][ T3126] veth1_macvtap: entered promiscuous mode [ 77.255767][ T1058] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.256266][ T1058] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.258729][ T1058] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.259064][ T1058] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.381051][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 77.381340][ T31] audit: type=1400 audit(77.320:83): avc: denied { mount } for pid=3126 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 77.388111][ T31] audit: type=1400 audit(77.320:84): avc: denied { mounton } for pid=3126 comm="syz-executor" path="/syzkaller.4pynEQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 77.390203][ T31] audit: type=1400 audit(77.330:85): avc: denied { mount } for pid=3126 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 77.397239][ T31] audit: type=1400 audit(77.330:86): avc: denied { mounton } for pid=3126 comm="syz-executor" path="/syzkaller.4pynEQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 77.401475][ T31] audit: type=1400 audit(77.340:87): avc: denied { mounton } for pid=3126 comm="syz-executor" path="/syzkaller.4pynEQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 77.446139][ T31] audit: type=1400 audit(77.380:88): avc: denied { unmount } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 77.452588][ T31] audit: type=1400 audit(77.390:89): avc: denied { mounton } for pid=3126 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 77.457422][ T31] audit: type=1400 audit(77.390:90): avc: denied { mount } for pid=3126 comm="syz-executor" name="/" dev="gadgetfs" ino=1942 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 77.462879][ T31] audit: type=1400 audit(77.400:91): avc: denied { mount } for pid=3126 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 77.464718][ T31] audit: type=1400 audit(77.400:92): avc: denied { mounton } for pid=3126 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 77.533930][ T3126] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 77.553137][ T3125] veth0_vlan: entered promiscuous mode [ 77.590835][ T3125] veth1_vlan: entered promiscuous mode [ 77.648077][ T3125] veth0_macvtap: entered promiscuous mode [ 77.660504][ T3125] veth1_macvtap: entered promiscuous mode [ 77.728647][ T3813] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.729100][ T3813] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.729167][ T3813] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.729200][ T3813] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.009795][ T3829] fuse: Bad value for 'fd' [ 80.533962][ T3831] fuse: Bad value for 'fd' [ 82.407993][ T43] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 82.567700][ T43] usb 1-1: Using ep0 maxpacket: 16 [ 82.575279][ T43] usb 1-1: unable to get BOS descriptor or descriptor too short [ 82.581743][ T43] usb 1-1: config 1 interface 0 altsetting 7 endpoint 0x1 has invalid wMaxPacketSize 0 [ 82.581986][ T43] usb 1-1: config 1 interface 0 altsetting 7 bulk endpoint 0x1 has invalid maxpacket 0 [ 82.582177][ T43] usb 1-1: config 1 interface 0 altsetting 7 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 82.582300][ T43] usb 1-1: config 1 interface 0 has no altsetting 0 [ 82.592501][ T43] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 82.593295][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 82.593926][ T43] usb 1-1: Product: syz [ 82.594322][ T43] usb 1-1: Manufacturer: syz [ 82.594707][ T43] usb 1-1: SerialNumber: syz [ 82.808453][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 82.810228][ T31] audit: type=1400 audit(82.750:111): avc: denied { ioctl } for pid=3841 comm="syz.0.5" path="socket:[2002]" dev="sockfs" ino=2002 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 82.812998][ T31] audit: type=1400 audit(82.750:112): avc: denied { bind } for pid=3841 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 82.824022][ T31] audit: type=1400 audit(82.760:113): avc: denied { write } for pid=3841 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 83.343380][ T3849] Zero length message leads to an empty skb [ 83.855918][ T31] audit: type=1400 audit(83.790:114): avc: denied { allowed } for pid=3852 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 83.863584][ T31] audit: type=1400 audit(83.800:115): avc: denied { create } for pid=3852 comm="syz.1.6" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 84.440762][ T3854] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3854 comm=syz.1.6 [ 84.857504][ T43] usb 1-1: USB disconnect, device number 2 [ 84.927127][ T31] audit: type=1400 audit(84.860:116): avc: denied { create } for pid=3867 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 84.933094][ T31] audit: type=1400 audit(84.870:117): avc: denied { ioctl } for pid=3867 comm="syz.0.8" path="socket:[2474]" dev="sockfs" ino=2474 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 84.938636][ T31] audit: type=1400 audit(84.880:118): avc: denied { setopt } for pid=3867 comm="syz.0.8" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 90.070056][ T3886] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3886 comm=syz.1.11 [ 94.204592][ T3908] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3908 comm=syz.0.16 [ 98.032964][ T3926] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3926 comm=syz.1.21 [ 101.861177][ T3945] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3945 comm=syz.1.26 [ 104.809657][ T3960] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3960 comm=syz.0.31 [ 106.410473][ T31] audit: type=1400 audit(106.340:119): avc: denied { ioctl } for pid=3971 comm="syz.1.36" path="socket:[3206]" dev="sockfs" ino=3206 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 107.047536][ T3982] fuse: Bad value for 'fd' [ 107.564564][ T3984] fuse: Bad value for 'fd' [ 109.172887][ T31] audit: type=1400 audit(109.110:120): avc: denied { read } for pid=3989 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 109.871775][ T3992] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 110.244274][ T31] audit: type=1400 audit(110.180:121): avc: denied { nlmsg_write } for pid=4001 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 110.259953][ T4002] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 114.475972][ T4018] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=4018 comm=syz.1.49 [ 117.327276][ T31] audit: type=1400 audit(117.260:122): avc: denied { create } for pid=4032 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 120.128041][ T4053] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=4053 comm=syz.0.58 [ 126.755687][ T31] audit: type=1400 audit(126.690:123): avc: denied { read } for pid=4087 comm="syz.0.69" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 126.759103][ T31] audit: type=1400 audit(126.690:124): avc: denied { open } for pid=4087 comm="syz.0.69" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 126.763395][ T31] audit: type=1400 audit(126.700:125): avc: denied { create } for pid=4087 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 126.767766][ T31] audit: type=1400 audit(126.700:126): avc: denied { bind } for pid=4087 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 126.775884][ T31] audit: type=1400 audit(126.710:127): avc: denied { connect } for pid=4087 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 128.383393][ T31] audit: type=1400 audit(128.320:128): avc: denied { create } for pid=4101 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 128.387806][ T31] audit: type=1400 audit(128.330:129): avc: denied { write } for pid=4101 comm="syz.1.74" path="socket:[3395]" dev="sockfs" ino=3395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 132.650560][ T31] audit: type=1400 audit(132.590:130): avc: denied { append } for pid=4122 comm="syz.1.79" name="event0" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 132.656044][ T31] audit: type=1400 audit(132.590:131): avc: denied { read } for pid=4128 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 133.171118][ T31] audit: type=1400 audit(133.110:132): avc: denied { getopt } for pid=4128 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 137.961960][ T31] audit: type=1400 audit(137.900:133): avc: denied { create } for pid=4152 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.968405][ T31] audit: type=1400 audit(137.900:134): avc: denied { ioctl } for pid=4152 comm="syz.1.85" path="socket:[3595]" dev="sockfs" ino=3595 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 138.523431][ T31] audit: type=1400 audit(138.460:135): avc: denied { create } for pid=4152 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 138.561160][ T31] audit: type=1400 audit(138.500:136): avc: denied { write } for pid=4152 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.218885][ T31] audit: type=1400 audit(141.160:137): avc: denied { prog_load } for pid=4173 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.219215][ T31] audit: type=1400 audit(141.160:138): avc: denied { bpf } for pid=4173 comm="syz.0.90" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 141.223982][ T31] audit: type=1400 audit(141.160:139): avc: denied { perfmon } for pid=4173 comm="syz.0.90" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 141.263859][ T31] audit: type=1400 audit(141.200:140): avc: denied { prog_run } for pid=4173 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.385827][ T31] audit: type=1400 audit(141.320:141): avc: denied { connect } for pid=4175 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 142.276355][ T31] audit: type=1400 audit(142.210:142): avc: denied { create } for pid=4182 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 149.529122][ T4224] FAULT_INJECTION: forcing a failure. [ 149.529122][ T4224] name failslab, interval 1, probability 0, space 0, times 0 [ 149.531982][ T4224] CPU: 0 UID: 0 PID: 4224 Comm: syz.1.104 Not tainted syzkaller #0 PREEMPT [ 149.532289][ T4224] Hardware name: ARM-Versatile Express [ 149.532596][ T4224] Call trace: [ 149.533166][ T4224] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 149.534365][ T4224] r7:00000c40 r6:00000000 r5:60000013 r4:82260ed4 [ 149.534490][ T4224] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 149.534560][ T4224] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 149.534766][ T4224] r5:83b80c00 r4:82917c00 [ 149.534792][ T4224] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 149.534852][ T4224] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 149.534915][ T4224] r8:83b80c00 r7:00000c40 r6:85a2a6e8 r5:00001000 r4:830016c0 [ 149.534931][ T4224] [<8051f3b4>] (should_failslab) from [<80503db0>] (__kmalloc_noprof+0x9c/0x458) [ 149.534976][ T4224] [<80503d14>] (__kmalloc_noprof) from [<807c3b34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 149.535060][ T4224] r10:83b80c00 r9:8309f800 r8:00000000 r7:85033330 r6:85a2a6e8 r5:00001000 [ 149.535088][ T4224] r4:00000000 [ 149.535105][ T4224] [<807c3af8>] (tomoyo_realpath_from_path) from [<807bfc78>] (tomoyo_path_number_perm+0xcc/0x22c) [ 149.535163][ T4224] r10:83b80c00 r9:00000000 r8:85a2a6c0 r7:00005607 r6:00000004 r5:81cd6504 [ 149.535186][ T4224] r4:85a2a6e8 r3:826c0200 [ 149.535201][ T4224] [<807bfbac>] (tomoyo_path_number_perm) from [<807c4558>] (tomoyo_file_ioctl+0x1c/0x20) [ 149.535258][ T4224] r9:00000004 r8:85a2a6c0 r7:00000000 r6:00000000 r5:00005607 r4:85a2a6c0 [ 149.535276][ T4224] [<807c453c>] (tomoyo_file_ioctl) from [<80770dac>] (security_file_ioctl+0x64/0x1e4) [ 149.535324][ T4224] [<80770d48>] (security_file_ioctl) from [<8056cfa0>] (sys_ioctl+0x4c/0xba0) [ 149.535405][ T4224] r7:00000000 r6:85a2a6c1 r5:00000000 r4:00005607 [ 149.535421][ T4224] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 149.535539][ T4224] Exception stack(0xe0281fa8 to 0xe0281ff0) [ 149.535707][ T4224] 1fa0: 00000000 00000000 00000004 00005607 00000000 00000000 [ 149.535758][ T4224] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76fa20bc [ 149.535785][ T4224] 1fe0: 76fa1ec0 76fa1eb0 000195a4 00132510 [ 149.535856][ T4224] r10:00000036 r9:83b80c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 149.535879][ T4224] r4:00000000 [ 149.552892][ T4224] ERROR: Out of memory at tomoyo_realpath_from_path. [ 154.163716][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 154.165281][ T31] audit: type=1400 audit(154.100:144): avc: denied { getopt } for pid=4256 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.183238][ T31] audit: type=1400 audit(154.120:145): avc: denied { ioctl } for pid=4256 comm="syz.1.114" path="socket:[2981]" dev="sockfs" ino=2981 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.516332][ T31] audit: type=1400 audit(154.450:146): avc: denied { setopt } for pid=4256 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 155.493160][ T4268] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4268 comm=syz.0.116 [ 155.574420][ T4270] capability: warning: `syz.0.117' uses 32-bit capabilities (legacy support in use) [ 155.947861][ T4274] could not allocate digest TFM handle sha224-ni [ 157.048381][ T31] audit: type=1400 audit(156.990:147): avc: denied { accept } for pid=4277 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 163.287898][ T4357] FAULT_INJECTION: forcing a failure. [ 163.287898][ T4357] name failslab, interval 1, probability 0, space 0, times 0 [ 163.289630][ T4357] CPU: 0 UID: 0 PID: 4357 Comm: syz.1.143 Not tainted syzkaller #0 PREEMPT [ 163.289737][ T4357] Hardware name: ARM-Versatile Express [ 163.289761][ T4357] Call trace: [ 163.289800][ T4357] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 163.289904][ T4357] r7:00000c40 r6:00000000 r5:60000013 r4:82260ed4 [ 163.289924][ T4357] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 163.289978][ T4357] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 163.290028][ T4357] r5:84b89800 r4:82917c00 [ 163.290044][ T4357] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 163.290097][ T4357] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 163.290161][ T4357] r8:84b89800 r7:00000c40 r6:859d2928 r5:00001000 r4:830016c0 [ 163.290179][ T4357] [<8051f3b4>] (should_failslab) from [<80503db0>] (__kmalloc_noprof+0x9c/0x458) [ 163.290227][ T4357] [<80503d14>] (__kmalloc_noprof) from [<807c3b34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 163.290295][ T4357] r10:84b89800 r9:8309f800 r8:00000000 r7:8362ea18 r6:859d2928 r5:00001000 [ 163.290316][ T4357] r4:00000000 [ 163.290331][ T4357] [<807c3af8>] (tomoyo_realpath_from_path) from [<807bfc78>] (tomoyo_path_number_perm+0xcc/0x22c) [ 163.290389][ T4357] r10:84b89800 r9:00000000 r8:859d2900 r7:00005607 r6:00000004 r5:81cd6504 [ 163.290411][ T4357] r4:859d2928 r3:826c0200 [ 163.290427][ T4357] [<807bfbac>] (tomoyo_path_number_perm) from [<807c4558>] (tomoyo_file_ioctl+0x1c/0x20) [ 163.290530][ T4357] r9:00000004 r8:859d2900 r7:00000000 r6:00000000 r5:00005607 r4:859d2900 [ 163.290551][ T4357] [<807c453c>] (tomoyo_file_ioctl) from [<80770dac>] (security_file_ioctl+0x64/0x1e4) [ 163.290606][ T4357] [<80770d48>] (security_file_ioctl) from [<8056cfa0>] (sys_ioctl+0x4c/0xba0) [ 163.290666][ T4357] r7:00000000 r6:859d2901 r5:00000000 r4:00005607 [ 163.290686][ T4357] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 163.290735][ T4357] Exception stack(0xdfab1fa8 to 0xdfab1ff0) [ 163.290776][ T4357] 1fa0: 00000000 00000000 00000004 00005607 00000000 00000000 [ 163.290812][ T4357] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f600bc [ 163.290840][ T4357] 1fe0: 76f5fec0 76f5feb0 000195a4 00132510 [ 163.290878][ T4357] r10:00000036 r9:84b89800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 163.290897][ T4357] r4:00000000 [ 163.296911][ T4357] ERROR: Out of memory at tomoyo_realpath_from_path. [ 163.944495][ T31] audit: type=1400 audit(163.880:148): avc: denied { map_create } for pid=4359 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 165.365929][ T4378] FAULT_INJECTION: forcing a failure. [ 165.365929][ T4378] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 165.367140][ T4378] CPU: 0 UID: 0 PID: 4378 Comm: syz.0.158 Not tainted syzkaller #0 PREEMPT [ 165.367442][ T4378] Hardware name: ARM-Versatile Express [ 165.367713][ T4378] Call trace: [ 165.369310][ T4378] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 165.370561][ T4378] r7:00000000 r6:00000000 r5:60000013 r4:82260ed4 [ 165.370644][ T4378] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 165.370696][ T4378] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 165.370742][ T4378] r5:84b88c00 r4:8294f150 [ 165.370755][ T4378] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 165.370803][ T4378] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 165.370857][ T4378] r8:76f27f30 r7:00000000 r6:00000000 r5:dfa35f68 r4:00000002 [ 165.370870][ T4378] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 165.370912][ T4378] [<809731c0>] (should_fail_usercopy) from [<8058e8d8>] (simple_read_from_buffer+0x80/0x13c) [ 165.370963][ T4378] [<8058e858>] (simple_read_from_buffer) from [<80608904>] (proc_fail_nth_read+0xb8/0x108) [ 165.371053][ T4378] r10:00000001 r9:8060884c r8:00000002 r7:dfa35f68 r6:0000000f r5:76f27f30 [ 165.371078][ T4378] r4:84b88c00 r3:dfa35e9f [ 165.371092][ T4378] [<8060884c>] (proc_fail_nth_read) from [<80553720>] (vfs_read+0x98/0x324) [ 165.371147][ T4378] r8:76f27f30 r7:dfa35f68 r6:84b88c00 r5:0000000f r4:859d2540 [ 165.371161][ T4378] [<80553688>] (vfs_read) from [<80554430>] (ksys_read+0x74/0xe8) [ 165.371214][ T4378] r10:00000003 r9:84b88c00 r8:8020029c r7:00000000 r6:00000000 r5:859d2540 [ 165.371236][ T4378] r4:859d2543 [ 165.371248][ T4378] [<805543bc>] (ksys_read) from [<805544b4>] (sys_read+0x10/0x14) [ 165.371318][ T4378] r7:00000003 r6:00000004 r5:76f27f30 r4:0000000f [ 165.371332][ T4378] [<805544a4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 165.371432][ T4378] Exception stack(0xdfa35fa8 to 0xdfa35ff0) [ 165.371634][ T4378] 5fa0: 0000000f 76f27f30 00000004 76f27f30 0000000f 00000000 [ 165.371682][ T4378] 5fc0: 0000000f 76f27f30 00000004 00000003 00300000 00000000 00006364 76f280bc [ 165.371705][ T4378] 5fe0: 00000158 76f27ed0 000d81d0 001303dc [ 166.721213][ T31] audit: type=1400 audit(166.660:149): avc: denied { create } for pid=4401 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 166.731017][ T31] audit: type=1400 audit(166.670:150): avc: denied { ioctl } for pid=4401 comm="syz.0.168" path="socket:[4015]" dev="sockfs" ino=4015 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 167.272799][ T31] audit: type=1400 audit(167.210:151): avc: denied { create } for pid=4412 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 167.284719][ T31] audit: type=1400 audit(167.220:152): avc: denied { ioctl } for pid=4412 comm="syz.1.173" path="socket:[4035]" dev="sockfs" ino=4035 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 168.164837][ T4428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4428 comm=syz.0.178 [ 180.229370][ T4552] fuse: Bad value for 'fd' [ 180.749679][ T4553] fuse: Bad value for 'fd' [ 184.341992][ T31] audit: type=1400 audit(184.280:153): avc: denied { write } for pid=4579 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 184.410581][ T31] audit: type=1400 audit(184.350:154): avc: denied { bind } for pid=4579 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 184.413720][ T31] audit: type=1400 audit(184.350:155): avc: denied { ioctl } for pid=4579 comm="syz.0.224" path="socket:[5327]" dev="sockfs" ino=5327 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 188.563161][ T4616] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4616 comm=syz.1.234 [ 188.680202][ T31] audit: type=1400 audit(188.620:156): avc: denied { setattr } for pid=4615 comm="syz.1.234" name="[userfaultfd]" dev="anon_inodefs" ino=5378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 189.654344][ T31] audit: type=1400 audit(189.590:157): avc: denied { map } for pid=4624 comm="syz.0.236" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4587 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 189.657909][ T31] audit: type=1400 audit(189.590:158): avc: denied { read write } for pid=4624 comm="syz.0.236" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4587 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 190.993335][ T4651] fuse: Bad value for 'rootmode' [ 193.591558][ T4681] fuse: root generation should be zero [ 193.710672][ T31] audit: type=1400 audit(193.650:159): avc: denied { nlmsg_tty_audit } for pid=4686 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 199.565167][ T4726] fuse: Unknown parameter '6H¦2{™ô.' [ 203.198306][ T31] audit: type=1400 audit(203.140:160): avc: denied { setopt } for pid=4753 comm="syz.1.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 209.048983][ T31] audit: type=1400 audit(208.980:161): avc: denied { bind } for pid=4777 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 212.235572][ T4792] FAULT_INJECTION: forcing a failure. [ 212.235572][ T4792] name failslab, interval 1, probability 0, space 0, times 0 [ 212.235927][ T4792] CPU: 0 UID: 0 PID: 4792 Comm: syz.0.277 Not tainted syzkaller #0 PREEMPT [ 212.235989][ T4792] Hardware name: ARM-Versatile Express [ 212.236004][ T4792] Call trace: [ 212.236096][ T4792] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 212.236158][ T4792] r7:00000d40 r6:00000000 r5:60000013 r4:82260ed4 [ 212.236169][ T4792] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 212.236195][ T4792] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 212.236221][ T4792] r5:84b8c800 r4:82917c00 [ 212.236228][ T4792] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 212.236267][ T4792] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 212.236300][ T4792] r8:84b8c800 r7:00000d40 r6:83acef28 r5:0000001d r4:83001240 [ 212.236309][ T4792] [<8051f3b4>] (should_failslab) from [<80503db0>] (__kmalloc_noprof+0x9c/0x458) [ 212.236603][ T4792] [<80503d14>] (__kmalloc_noprof) from [<807c3a3c>] (tomoyo_encode2+0x64/0xf0) [ 212.236668][ T4792] r10:00000fff r9:8309e400 r8:00000000 r7:83632ee0 r6:83acef28 r5:84e74ffc [ 212.237031][ T4792] r4:84e74fea [ 212.237091][ T4792] [<807c39d8>] (tomoyo_encode2) from [<807c3aec>] (tomoyo_encode+0x24/0x30) [ 212.237267][ T4792] r9:8309e400 r8:00000000 r7:83632ee0 r6:83acef28 r5:00001000 r4:84e74feb [ 212.237372][ T4792] [<807c3ac8>] (tomoyo_encode) from [<807c3b78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 212.237649][ T4792] r5:00001000 r4:84e74000 [ 212.237869][ T4792] [<807c3af8>] (tomoyo_realpath_from_path) from [<807bfc78>] (tomoyo_path_number_perm+0xcc/0x22c) [ 212.237921][ T4792] r10:84b8c800 r9:00000000 r8:83acef00 r7:00000002 r6:00000004 r5:81cd6504 [ 212.237950][ T4792] r4:83acef28 r3:826c0200 [ 212.237976][ T4792] [<807bfbac>] (tomoyo_path_number_perm) from [<807c4558>] (tomoyo_file_ioctl+0x1c/0x20) [ 212.238026][ T4792] r9:00000003 r8:83acef00 r7:20000bc0 r6:20000bc0 r5:00000002 r4:83acef00 [ 212.238045][ T4792] [<807c453c>] (tomoyo_file_ioctl) from [<80770dac>] (security_file_ioctl+0x64/0x1e4) [ 212.238099][ T4792] [<80770d48>] (security_file_ioctl) from [<8056cfa0>] (sys_ioctl+0x4c/0xba0) [ 212.238132][ T4792] r7:20000bc0 r6:83acef01 r5:00000000 r4:00000002 [ 212.238141][ T4792] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 212.238163][ T4792] Exception stack(0xdfca1fa8 to 0xdfca1ff0) [ 212.238188][ T4792] 1fa0: 00000000 00000000 00000003 00000002 20000bc0 00000000 [ 212.238206][ T4792] 1fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 212.238218][ T4792] 1fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 212.238236][ T4792] r10:00000036 r9:84b8c800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 212.238252][ T4792] r4:00000000 [ 212.239455][ T4792] ERROR: Out of memory at tomoyo_realpath_from_path. [ 215.635352][ T31] audit: type=1400 audit(215.570:162): avc: denied { create } for pid=4810 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 217.103832][ T31] audit: type=1400 audit(217.040:163): avc: denied { getopt } for pid=4807 comm="syz.0.282" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 217.114955][ T31] audit: type=1400 audit(217.050:164): avc: denied { write } for pid=4807 comm="syz.0.282" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 219.184142][ T31] audit: type=1400 audit(219.120:165): avc: denied { create } for pid=4830 comm="syz.1.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 221.527265][ T31] audit: type=1400 audit(221.460:166): avc: denied { create } for pid=4846 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 224.765216][ T4865] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4865 comm=syz.0.299 [ 224.869762][ T4865] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4865 comm=syz.0.299 [ 226.081671][ T31] audit: type=1400 audit(226.020:167): avc: denied { write } for pid=4877 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 233.804319][ T4930] fuse: Bad value for 'fd' [ 236.383651][ T31] audit: type=1400 audit(236.320:168): avc: denied { execute } for pid=4942 comm="syz.1.324" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D95336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 236.585690][ T4948] ======================================================= [ 236.585690][ T4948] WARNING: The mand mount option has been deprecated and [ 236.585690][ T4948] and is ignored by this kernel. Remove the mand [ 236.585690][ T4948] option from the mount to silence this warning. [ 236.585690][ T4948] ======================================================= [ 236.594151][ T31] audit: type=1400 audit(236.530:169): avc: denied { mount } for pid=4947 comm="syz.1.326" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 236.637747][ T31] audit: type=1400 audit(236.570:170): avc: denied { unmount } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 238.806344][ T4965] FAULT_INJECTION: forcing a failure. [ 238.806344][ T4965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.808489][ T4965] CPU: 1 UID: 0 PID: 4965 Comm: syz.0.331 Not tainted syzkaller #0 PREEMPT [ 238.808591][ T4965] Hardware name: ARM-Versatile Express [ 238.808617][ T4965] Call trace: [ 238.808696][ T4965] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 238.808807][ T4965] r7:00000000 r6:00000000 r5:60000013 r4:82260ed4 [ 238.808827][ T4965] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 238.808874][ T4965] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 238.808929][ T4965] r5:838abc00 r4:8294f150 [ 238.808946][ T4965] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 238.809005][ T4965] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 238.809068][ T4965] r8:76f27f30 r7:00000000 r6:00000000 r5:dfcfdf68 r4:00000002 [ 238.809086][ T4965] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 238.809141][ T4965] [<809731c0>] (should_fail_usercopy) from [<8058e8d8>] (simple_read_from_buffer+0x80/0x13c) [ 238.809202][ T4965] [<8058e858>] (simple_read_from_buffer) from [<80608904>] (proc_fail_nth_read+0xb8/0x108) [ 238.809264][ T4965] r10:00000001 r9:8060884c r8:00000002 r7:dfcfdf68 r6:0000000f r5:76f27f30 [ 238.809288][ T4965] r4:838abc00 r3:dfcfde9f [ 238.809303][ T4965] [<8060884c>] (proc_fail_nth_read) from [<80553720>] (vfs_read+0x98/0x324) [ 238.809361][ T4965] r8:76f27f30 r7:dfcfdf68 r6:838abc00 r5:0000000f r4:849a0780 [ 238.809379][ T4965] [<80553688>] (vfs_read) from [<80554430>] (ksys_read+0x74/0xe8) [ 238.809452][ T4965] r10:00000003 r9:838abc00 r8:8020029c r7:00000000 r6:00000000 r5:849a0780 [ 238.809472][ T4965] r4:849a0783 [ 238.809486][ T4965] [<805543bc>] (ksys_read) from [<805544b4>] (sys_read+0x10/0x14) [ 238.809545][ T4965] r7:00000003 r6:00000005 r5:76f27f30 r4:0000000f [ 238.809562][ T4965] [<805544a4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 238.809605][ T4965] Exception stack(0xdfcfdfa8 to 0xdfcfdff0) [ 238.809638][ T4965] dfa0: 0000000f 76f27f30 00000005 76f27f30 0000000f 00000000 [ 238.809671][ T4965] dfc0: 0000000f 76f27f30 00000005 00000003 00300000 00000000 00006364 76f280bc [ 238.809698][ T4965] dfe0: 00000158 76f27ed0 000d81d0 001303dc [ 247.391647][ T5006] fuse: Bad value for 'fd' [ 248.144378][ T5012] netlink: 4 bytes leftover after parsing attributes in process `syz.0.344'. [ 251.291048][ T5025] fuse: Bad value for 'fd' [ 251.783234][ T31] audit: type=1400 audit(251.720:171): avc: denied { create } for pid=5032 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 251.788611][ T31] audit: type=1400 audit(251.730:172): avc: denied { write } for pid=5032 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 251.793920][ T31] audit: type=1400 audit(251.730:173): avc: denied { ioctl } for pid=5032 comm="syz.1.351" path="socket:[6159]" dev="sockfs" ino=6159 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 257.137242][ T5075] fuse: Bad value for 'fd' [ 261.087714][ T5111] fuse: Bad value for 'fd' [ 262.735709][ T5119] fuse: Bad value for 'fd' [ 266.380282][ T5147] fuse: Bad value for 'fd' [ 266.861989][ T5148] fuse: Bad value for 'fd' [ 271.030791][ T5176] fuse: Bad value for 'fd' [ 271.623969][ T5178] fuse: Bad value for 'fd' [ 272.428483][ T5186] fuse: Bad value for 'group_id' [ 272.430380][ T5186] fuse: Bad value for 'group_id' [ 272.815960][ T5198] fuse: Bad value for 'group_id' [ 272.816324][ T5198] fuse: Bad value for 'group_id' [ 274.905215][ T31] audit: type=1400 audit(274.840:174): avc: denied { write } for pid=5212 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 274.913836][ T5216] fuse: Bad value for 'fd' [ 279.745577][ T31] audit: type=1400 audit(279.680:175): avc: denied { setopt } for pid=5255 comm="syz.0.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 279.842073][ T31] audit: type=1400 audit(279.780:176): avc: denied { getopt } for pid=5255 comm="syz.0.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 282.055854][ T5271] fuse: Bad value for 'fd' [ 282.334283][ T5276] block nbd0: shutting down sockets [ 284.788646][ T5298] fuse: Bad value for 'fd' [ 284.979584][ T5303] FAULT_INJECTION: forcing a failure. [ 284.979584][ T5303] name failslab, interval 1, probability 0, space 0, times 0 [ 284.981852][ T5303] CPU: 0 UID: 0 PID: 5303 Comm: syz.1.420 Not tainted syzkaller #0 PREEMPT [ 284.982016][ T5303] Hardware name: ARM-Versatile Express [ 284.982048][ T5303] Call trace: [ 284.982094][ T5303] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 284.982604][ T5303] r7:84b88c00 r6:00000000 r5:60000013 r4:82260ed4 [ 284.982631][ T5303] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 284.982690][ T5303] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 284.982746][ T5303] r5:84b88c00 r4:82917c00 [ 284.982764][ T5303] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 284.982827][ T5303] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 284.982900][ T5303] r8:00000000 r7:84b88c00 r6:00000cc0 r5:20000000 r4:830a2a80 [ 284.982917][ T5303] [<8051f3b4>] (should_failslab) from [<80503a2c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 284.982968][ T5303] [<805039e0>] (kmem_cache_alloc_noprof) from [<80562e40>] (getname_flags.part.0+0x28/0x18c) [ 284.983041][ T5303] r10:00000142 r9:84b88c00 r8:8020029c r7:00000000 r6:82466858 r5:20000000 [ 284.983062][ T5303] r4:20000000 [ 284.983079][ T5303] [<80562e18>] (getname_flags.part.0) from [<80567ddc>] (getname_flags+0x3c/0x50) [ 284.983142][ T5303] r9:84b88c00 r8:8020029c r7:ffffff9c r6:dff2df58 r5:00000000 r4:20000000 [ 284.983163][ T5303] [<80567da0>] (getname_flags) from [<80550630>] (do_sys_openat2+0x60/0xe0) [ 284.983220][ T5303] r5:20000000 r4:00000000 [ 284.983249][ T5303] [<805505d0>] (do_sys_openat2) from [<80550a88>] (sys_openat+0x98/0xd4) [ 284.983313][ T5303] r7:00000142 r6:001304b8 r5:20000000 r4:ffffff9c [ 284.983333][ T5303] [<805509f0>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 284.983381][ T5303] Exception stack(0xdff2dfa8 to 0xdff2dff0) [ 284.983423][ T5303] dfa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 284.983458][ T5303] dfc0: 00000000 00000000 001304b8 00000142 00300000 00000000 00006364 76fc30bc [ 284.983489][ T5303] dfe0: 76fc2ec0 76fc2eb0 000195a4 00132510 [ 284.983516][ T5303] r5:00000000 r4:00000000 [ 285.095208][ T5307] fuse: Unknown parameter 'grou00000000000000000000000' [ 285.189751][ T5309] UHID_CREATE from different security context by process 604 (syz.1.422), this is not allowed. [ 285.385705][ T5315] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=514 sclass=netlink_audit_socket pid=5315 comm=syz.1.425 [ 285.436031][ T5317] fuse: Unknown parameter 'grou00000000000000000000000' [ 285.947646][ T100] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 286.077349][ T100] usb 1-1: device descriptor read/64, error -71 [ 286.317679][ T100] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 286.447578][ T100] usb 1-1: device descriptor read/64, error -71 [ 286.558422][ T100] usb usb1-port1: attempt power cycle [ 286.897689][ T100] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 286.919503][ T100] usb 1-1: device descriptor read/8, error -71 [ 287.167612][ T100] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 287.192933][ T100] usb 1-1: device descriptor read/8, error -71 [ 287.308040][ T100] usb usb1-port1: unable to enumerate USB device [ 289.037160][ T5340] fuse: Unknown parameter 'grou00000000000000000000000' [ 295.926439][ T5364] fuse: Unknown parameter 'group_i00000000000000000000000' [ 297.201464][ T31] audit: type=1400 audit(297.140:177): avc: denied { create } for pid=5375 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 297.493350][ T5381] fuse: Unknown parameter 'group_i00000000000000000000000' [ 297.731777][ T31] audit: type=1400 audit(297.670:178): avc: denied { write } for pid=5375 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 298.779456][ T5399] fuse: Unknown parameter 'group_i00000000000000000000000' [ 302.161967][ T5414] fuse: Unknown parameter 'group_id00000000000000000000000' [ 305.213363][ T5451] fuse: Unknown parameter 'group_id00000000000000000000000' [ 307.075245][ T5477] fuse: Unknown parameter 'group_id00000000000000000000000' [ 310.029773][ T5497] fuse: Bad value for 'user_id' [ 310.031228][ T5497] fuse: Bad value for 'user_id' [ 311.419742][ T5514] fuse: Bad value for 'user_id' [ 311.422526][ T5514] fuse: Bad value for 'user_id' [ 311.500968][ T5516] fuse: Bad value for 'fd' [ 312.273366][ T5525] FAULT_INJECTION: forcing a failure. [ 312.273366][ T5525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.273707][ T5525] CPU: 0 UID: 0 PID: 5525 Comm: syz.0.475 Not tainted syzkaller #0 PREEMPT [ 312.273795][ T5525] Hardware name: ARM-Versatile Express [ 312.273818][ T5525] Call trace: [ 312.273855][ T5525] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 312.274000][ T5525] r7:76f27b58 r6:00000000 r5:60000013 r4:82260ed4 [ 312.274018][ T5525] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 312.274064][ T5525] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 312.274115][ T5525] r5:84125400 r4:8294f150 [ 312.274128][ T5525] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 312.274180][ T5525] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 312.274354][ T5525] r8:b5003587 r7:76f27b58 r6:76f27b38 r5:dfa3df58 r4:76f27b38 [ 312.274499][ T5525] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 312.274554][ T5525] [<809731c0>] (should_fail_usercopy) from [<8026cd10>] (copy_siginfo_to_user+0x1c/0xa4) [ 312.274637][ T5525] [<8026ccf4>] (copy_siginfo_to_user) from [<8022bb58>] (do_work_pending+0x380/0x4f8) [ 312.274871][ T5525] r9:fffffe00 r8:b5003587 r7:84125c30 r6:76f27b38 r5:dfa3dfb0 r4:84125400 [ 312.274962][ T5525] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 312.275154][ T5525] Exception stack(0xdfa3dfb0 to 0xdfa3dff8) [ 312.275227][ T5525] dfa0: 00000003 200000c0 24040010 00000000 [ 312.275259][ T5525] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f280bc [ 312.275386][ T5525] dfe0: 76f27ec0 76f27eb0 000195a4 0013250c 60000010 00000003 [ 312.275570][ T5525] r10:00000128 r9:84125400 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 312.275683][ T5525] r4:00000000 [ 312.355659][ T5529] fuse: Bad value for 'user_id' [ 312.357598][ T5529] fuse: Bad value for 'user_id' [ 312.441310][ T5531] fuse: Bad value for 'fd' [ 314.323883][ T31] audit: type=1400 audit(314.260:179): avc: denied { setopt } for pid=5542 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 314.333725][ T31] audit: type=1400 audit(314.270:180): avc: denied { map_read map_write } for pid=5542 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.460319][ T5545] fuse: Bad value for 'fd' [ 314.542954][ T5547] fuse: Bad value for 'fd' [ 315.741187][ T5557] FAULT_INJECTION: forcing a failure. [ 315.741187][ T5557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.742380][ T5557] CPU: 1 UID: 0 PID: 5557 Comm: syz.0.485 Not tainted syzkaller #0 PREEMPT [ 315.742472][ T5557] Hardware name: ARM-Versatile Express [ 315.742491][ T5557] Call trace: [ 315.742524][ T5557] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 315.742607][ T5557] r7:00000000 r6:00000000 r5:60000013 r4:82260ed4 [ 315.742622][ T5557] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 315.742663][ T5557] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 315.742708][ T5557] r5:858d3c00 r4:8294f150 [ 315.742721][ T5557] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 315.742769][ T5557] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 315.742823][ T5557] r8:76f27f30 r7:00000000 r6:00000000 r5:dfa9df68 r4:00000002 [ 315.742837][ T5557] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 315.742881][ T5557] [<809731c0>] (should_fail_usercopy) from [<8058e8d8>] (simple_read_from_buffer+0x80/0x13c) [ 315.742931][ T5557] [<8058e858>] (simple_read_from_buffer) from [<80608904>] (proc_fail_nth_read+0xb8/0x108) [ 315.742987][ T5557] r10:00000001 r9:8060884c r8:00000002 r7:dfa9df68 r6:0000000f r5:76f27f30 [ 315.743005][ T5557] r4:858d3c00 r3:dfa9de9f [ 315.743018][ T5557] [<8060884c>] (proc_fail_nth_read) from [<80553720>] (vfs_read+0x98/0x324) [ 315.743134][ T5557] r8:76f27f30 r7:dfa9df68 r6:858d3c00 r5:0000000f r4:849a06c0 [ 315.743150][ T5557] [<80553688>] (vfs_read) from [<80554430>] (ksys_read+0x74/0xe8) [ 315.743210][ T5557] r10:00000003 r9:858d3c00 r8:8020029c r7:00000000 r6:00000000 r5:849a06c0 [ 315.743231][ T5557] r4:849a06c3 [ 315.743246][ T5557] [<805543bc>] (ksys_read) from [<805544b4>] (sys_read+0x10/0x14) [ 315.743303][ T5557] r7:00000003 r6:00000004 r5:76f27f30 r4:0000000f [ 315.743320][ T5557] [<805544a4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 315.743367][ T5557] Exception stack(0xdfa9dfa8 to 0xdfa9dff0) [ 315.743402][ T5557] dfa0: 0000000f 76f27f30 00000004 76f27f30 0000000f 00000000 [ 315.743450][ T5557] dfc0: 0000000f 76f27f30 00000004 00000003 00300000 00000000 00006364 76f280bc [ 315.743477][ T5557] dfe0: 00000158 76f27ed0 000d81d0 001303dc [ 317.317827][ T5578] FAULT_INJECTION: forcing a failure. [ 317.317827][ T5578] name failslab, interval 1, probability 0, space 0, times 0 [ 317.318654][ T5578] CPU: 0 UID: 0 PID: 5578 Comm: syz.1.493 Not tainted syzkaller #0 PREEMPT [ 317.318763][ T5578] Hardware name: ARM-Versatile Express [ 317.318928][ T5578] Call trace: [ 317.319032][ T5578] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 317.319243][ T5578] r7:84079800 r6:00000000 r5:60000013 r4:82260ed4 [ 317.319370][ T5578] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 317.319485][ T5578] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 317.319548][ T5578] r5:84079800 r4:82917c00 [ 317.319652][ T5578] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 317.319826][ T5578] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 317.319939][ T5578] r8:00000000 r7:84079800 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 317.319987][ T5578] [<8051f3b4>] (should_failslab) from [<805033c0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 317.320098][ T5578] [<80503370>] (kmem_cache_alloc_node_noprof) from [<81552738>] (__alloc_skb+0x138/0x160) [ 317.320196][ T5578] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 317.320285][ T5578] r4:828060c0 [ 317.320308][ T5578] [<81552600>] (__alloc_skb) from [<816721a0>] (netlink_alloc_large_skb+0x88/0xa0) [ 317.320448][ T5578] r8:00000000 r7:84fa5800 r6:00000014 r5:8515e500 r4:00000140 [ 317.320593][ T5578] [<81672118>] (netlink_alloc_large_skb) from [<816728e8>] (netlink_sendmsg+0x134/0x444) [ 317.320724][ T5578] r5:8515e500 r4:dfa89f20 [ 317.320850][ T5578] [<816727b4>] (netlink_sendmsg) from [<81544508>] (__sock_sendmsg+0x44/0x78) [ 317.320920][ T5578] r10:00000000 r9:dfa89dc4 r8:dfa89dc4 r7:00000000 r6:8515e500 r5:dfa89f20 [ 317.321076][ T5578] r4:00000000 [ 317.321236][ T5578] [<815444c4>] (__sock_sendmsg) from [<81545860>] (____sys_sendmsg+0x298/0x2cc) [ 317.321323][ T5578] r7:00000000 r6:8515e500 r5:04000000 r4:dfa89f20 [ 317.321361][ T5578] [<815455c8>] (____sys_sendmsg) from [<81547828>] (___sys_sendmsg+0x9c/0xd0) [ 317.321494][ T5578] r10:dfa89e24 r9:20000340 r8:04000000 r7:00000000 r6:8515e500 r5:dfa89f20 [ 317.321538][ T5578] r4:00000000 [ 317.321648][ T5578] [<8154778c>] (___sys_sendmsg) from [<81547cc0>] (__sys_sendmsg+0x8c/0xe0) [ 317.321827][ T5578] r10:00000128 r9:84079800 r8:859d26c0 r7:04000000 r6:20000340 r5:859d26c1 [ 317.321856][ T5578] r4:00000000 [ 317.321899][ T5578] [<81547c34>] (__sys_sendmsg) from [<81547d28>] (sys_sendmsg+0x14/0x18) [ 317.321967][ T5578] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 317.322128][ T5578] [<81547d14>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 317.322301][ T5578] Exception stack(0xdfa89fa8 to 0xdfa89ff0) [ 317.322426][ T5578] 9fa0: 00000000 00000000 00000000 20000340 04000000 00000000 [ 317.322497][ T5578] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fc30bc [ 317.322532][ T5578] 9fe0: 76fc2ec0 76fc2eb0 000195a4 00132510 [ 318.143012][ T31] audit: type=1400 audit(318.080:181): avc: denied { create } for pid=5594 comm="syz.1.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 321.865193][ T5621] FAULT_INJECTION: forcing a failure. [ 321.865193][ T5621] name failslab, interval 1, probability 0, space 0, times 0 [ 321.866174][ T5621] CPU: 1 UID: 0 PID: 5621 Comm: syz.1.505 Not tainted syzkaller #0 PREEMPT [ 321.866328][ T5621] Hardware name: ARM-Versatile Express [ 321.866357][ T5621] Call trace: [ 321.866379][ T5621] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 321.866760][ T5621] r7:8407a400 r6:00000000 r5:60000013 r4:82260ed4 [ 321.866772][ T5621] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 321.866801][ T5621] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 321.866831][ T5621] r5:8407a400 r4:82917c00 [ 321.866839][ T5621] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 321.866870][ T5621] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 321.866907][ T5621] r8:00000000 r7:8407a400 r6:00000cc0 r5:8291b158 r4:830a2cc0 [ 321.866916][ T5621] [<8051f3b4>] (should_failslab) from [<80503a2c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 321.866941][ T5621] [<805039e0>] (kmem_cache_alloc_noprof) from [<80555fa0>] (alloc_empty_file+0x54/0x13c) [ 321.866978][ T5621] r10:00000142 r9:832e1000 r8:82805cc0 r7:84bd0d00 r6:00000000 r5:8291b158 [ 321.866988][ T5621] r4:82466838 [ 321.866996][ T5621] [<80555f4c>] (alloc_empty_file) from [<80568928>] (path_openat+0x40/0x1150) [ 321.867030][ T5621] r8:dfb79e58 r7:dfb79e58 r6:dfb79f20 r5:8407a400 r4:ffffff9c [ 321.867040][ T5621] [<805688e8>] (path_openat) from [<80569ae4>] (do_filp_open+0xac/0x148) [ 321.867071][ T5621] r10:00000142 r9:832e1000 r8:00000001 r7:dfb79e58 r6:dfb79f20 r5:8407a400 [ 321.867081][ T5621] r4:ffffff9c [ 321.867089][ T5621] [<80569a38>] (do_filp_open) from [<80550660>] (do_sys_openat2+0x90/0xe0) [ 321.867122][ T5621] r9:8407a400 r8:8020029c r7:ffffff9c r6:dfb79f58 r5:832e1000 r4:00000005 [ 321.867131][ T5621] [<805505d0>] (do_sys_openat2) from [<80550a88>] (sys_openat+0x98/0xd4) [ 321.867162][ T5621] r7:00000142 r6:001304b8 r5:20000000 r4:ffffff9c [ 321.867171][ T5621] [<805509f0>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 321.867195][ T5621] Exception stack(0xdfb79fa8 to 0xdfb79ff0) [ 321.867216][ T5621] 9fa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 321.867234][ T5621] 9fc0: 00000000 00000000 001304b8 00000142 00300000 00000000 00006364 76fc30bc [ 321.867248][ T5621] 9fe0: 76fc2ec0 76fc2eb0 000195a4 00132510 [ 321.867261][ T5621] r5:00000000 r4:00000000 [ 322.023776][ T31] audit: type=1400 audit(321.960:182): avc: denied { ioctl } for pid=5624 comm="syz.1.506" path="net:[4026532645]" dev="nsfs" ino=4026532645 ioctlcmd=0x5516 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 322.086169][ T5628] FAULT_INJECTION: forcing a failure. [ 322.086169][ T5628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.087655][ T5628] CPU: 0 UID: 0 PID: 5628 Comm: syz.1.507 Not tainted syzkaller #0 PREEMPT [ 322.087724][ T5628] Hardware name: ARM-Versatile Express [ 322.087744][ T5628] Call trace: [ 322.087779][ T5628] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 322.087955][ T5628] r7:00000000 r6:00000000 r5:60000013 r4:82260ed4 [ 322.088550][ T5628] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 322.088655][ T5628] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 322.088716][ T5628] r5:8407a400 r4:8294f150 [ 322.088755][ T5628] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 322.088823][ T5628] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 322.088982][ T5628] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfb7df68 r4:00000002 [ 322.089088][ T5628] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 322.089134][ T5628] [<809731c0>] (should_fail_usercopy) from [<8058e8d8>] (simple_read_from_buffer+0x80/0x13c) [ 322.089184][ T5628] [<8058e858>] (simple_read_from_buffer) from [<80608904>] (proc_fail_nth_read+0xb8/0x108) [ 322.089291][ T5628] r10:00000001 r9:8060884c r8:00000002 r7:dfb7df68 r6:0000000f r5:76fc2f30 [ 322.089372][ T5628] r4:8407a400 r3:dfb7de9f [ 322.089417][ T5628] [<8060884c>] (proc_fail_nth_read) from [<80553720>] (vfs_read+0x98/0x324) [ 322.089820][ T5628] r8:76fc2f30 r7:dfb7df68 r6:8407a400 r5:0000000f r4:849a06c0 [ 322.090092][ T5628] [<80553688>] (vfs_read) from [<80554430>] (ksys_read+0x74/0xe8) [ 322.090170][ T5628] r10:00000003 r9:8407a400 r8:8020029c r7:00000000 r6:00000000 r5:849a06c0 [ 322.090279][ T5628] r4:849a06c3 [ 322.090297][ T5628] [<805543bc>] (ksys_read) from [<805544b4>] (sys_read+0x10/0x14) [ 322.090412][ T5628] r7:00000003 r6:00000005 r5:76fc2f30 r4:0000000f [ 322.090651][ T5628] [<805544a4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 322.090818][ T5628] Exception stack(0xdfb7dfa8 to 0xdfb7dff0) [ 322.090974][ T5628] dfa0: 0000000f 76fc2f30 00000005 76fc2f30 0000000f 00000000 [ 322.091047][ T5628] dfc0: 0000000f 76fc2f30 00000005 00000003 00300000 00000000 00006364 76fc30bc [ 322.091070][ T5628] dfe0: 00000158 76fc2ed0 000d81d0 001303dc [ 322.815133][ T5638] fuse: Bad value for 'fd' [ 322.899250][ T31] audit: type=1400 audit(322.840:183): avc: denied { mount } for pid=5639 comm="syz.1.511" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 323.013153][ T31] audit: type=1400 audit(322.950:184): avc: denied { create } for pid=5644 comm="syz.0.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 326.089856][ T31] audit: type=1400 audit(326.030:185): avc: denied { unmount } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 326.152084][ T5660] fuse: Bad value for 'fd' [ 327.437024][ T5665] fuse: Bad value for 'user_id' [ 327.438909][ T5665] fuse: Bad value for 'user_id' [ 329.564734][ T5674] fuse: Bad value for 'fd' [ 330.679500][ T5679] fuse: Bad value for 'user_id' [ 330.679817][ T5679] fuse: Bad value for 'user_id' [ 332.630189][ T31] audit: type=1400 audit(332.570:186): avc: denied { ioctl } for pid=5685 comm="syz.0.525" path="socket:[7988]" dev="sockfs" ino=7988 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 332.886080][ T5696] fuse: Bad value for 'user_id' [ 332.887572][ T5696] fuse: Bad value for 'user_id' [ 332.946335][ T5698] FAULT_INJECTION: forcing a failure. [ 332.946335][ T5698] name failslab, interval 1, probability 0, space 0, times 0 [ 332.947140][ T5698] CPU: 1 UID: 0 PID: 5698 Comm: syz.0.529 Not tainted syzkaller #0 PREEMPT [ 332.947216][ T5698] Hardware name: ARM-Versatile Express [ 332.947270][ T5698] Call trace: [ 332.947295][ T5698] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 332.947360][ T5698] r7:00000cc0 r6:00000000 r5:60000013 r4:82260ed4 [ 332.947381][ T5698] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 332.947430][ T5698] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 332.947459][ T5698] r5:84120c00 r4:82917c00 [ 332.947467][ T5698] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 332.947501][ T5698] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 332.947537][ T5698] r8:84120c00 r7:00000cc0 r6:dfbade08 r5:00000008 r4:83001240 [ 332.947545][ T5698] [<8051f3b4>] (should_failslab) from [<80504a64>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 332.947570][ T5698] [<805049c4>] (__kmalloc_node_track_caller_noprof) from [<8049b768>] (kstrdup+0x38/0x64) [ 332.947603][ T5698] r10:00000000 r9:dfbadecb r8:828f5404 r7:8031d568 r6:dfbade08 r5:00000007 [ 332.947613][ T5698] r4:00000cc0 [ 332.947621][ T5698] [<8049b730>] (kstrdup) from [<8031d568>] (__request_module+0xfc/0x2c0) [ 332.947650][ T5698] r7:84120c00 r6:815b6dc8 r5:00000002 r4:84a71800 [ 332.947658][ T5698] [<8031d46c>] (__request_module) from [<815b6dc8>] (dev_load+0x80/0x8c) [ 332.947707][ T5698] r3:00400140 r2:dfbadecc r1:8242c168 [ 332.947842][ T5698] r8:00000000 r7:854c8000 r6:dfbadecc r5:00000000 r4:dfbadecc [ 332.947962][ T5698] [<815b6d48>] (dev_load) from [<815b83f0>] (dev_ioctl+0x384/0x62c) [ 332.948088][ T5698] r5:00000027 r4:00008927 [ 332.948130][ T5698] [<815b806c>] (dev_ioctl) from [<8154612c>] (sock_ioctl+0x55c/0x600) [ 332.948209][ T5698] r10:84120c00 r9:81e7309c r8:dfbadecc r7:b5403587 r6:854c8000 r5:20000000 [ 332.948272][ T5698] r4:00008927 r3:00000000 [ 332.948311][ T5698] [<81545bd0>] (sock_ioctl) from [<8056d084>] (sys_ioctl+0x130/0xba0) [ 332.948562][ T5698] r9:00000003 r8:849a0780 r7:20000000 r6:849a0781 r5:00000000 r4:00008927 [ 332.948600][ T5698] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 332.948687][ T5698] Exception stack(0xdfbadfa8 to 0xdfbadff0) [ 332.948767][ T5698] dfa0: 00000000 00000000 00000003 00008927 20000000 00000000 [ 332.948805][ T5698] dfc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 332.948884][ T5698] dfe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 332.949098][ T5698] r10:00000036 r9:84120c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 332.949112][ T5698] r4:00000000 [ 333.586550][ T5709] fuse: Bad value for 'fd' [ 336.433110][ T5726] fuse: Bad value for 'fd' [ 336.902266][ T5737] fuse: Bad value for 'fd' [ 336.983966][ T5739] fuse: Bad value for 'fd' [ 337.242320][ T31] audit: type=1400 audit(337.170:187): avc: denied { setopt } for pid=5744 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 337.502358][ T5750] fuse: Bad value for 'fd' [ 337.598164][ T5752] fuse: Bad value for 'fd' [ 338.208375][ T5765] fuse: Bad value for 'fd' [ 340.287654][ T31] audit: type=1400 audit(340.230:188): avc: granted { setsecparam } for pid=5771 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 340.777041][ T31] audit: type=1400 audit(340.710:189): avc: denied { create } for pid=5780 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 343.745562][ T31] audit: type=1400 audit(343.680:190): avc: denied { connect } for pid=5801 comm="syz.1.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.332835][ T31] audit: type=1400 audit(344.270:191): avc: denied { mounton } for pid=5801 comm="syz.1.564" path="/proc/816/task" dev="proc" ino=7163 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 344.687228][ T100] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 344.846834][ T100] usb 2-1: Using ep0 maxpacket: 16 [ 344.855104][ T100] usb 2-1: config 1 interface 0 altsetting 7 endpoint 0x1 has invalid wMaxPacketSize 0 [ 344.855792][ T100] usb 2-1: config 1 interface 0 altsetting 7 bulk endpoint 0x1 has invalid maxpacket 0 [ 344.858153][ T100] usb 2-1: config 1 interface 0 altsetting 7 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 344.859443][ T100] usb 2-1: config 1 interface 0 has no altsetting 0 [ 344.872757][ T100] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 344.872962][ T100] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 344.873059][ T100] usb 2-1: Product: syz [ 344.873138][ T100] usb 2-1: Manufacturer: syz [ 344.873224][ T100] usb 2-1: SerialNumber: syz [ 345.308812][ T5806] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 345.311517][ T5806] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 345.335426][ T100] usb 2-1: USB disconnect, device number 2 [ 345.837637][ T31] audit: type=1400 audit(345.780:192): avc: denied { mounton } for pid=5840 comm="syz.1.573" path="/290/file0" dev="tmpfs" ino=1574 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 350.787553][ T5872] fuse: Bad value for 'fd' [ 350.895321][ T5874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5874 comm=syz.0.583 [ 351.436029][ T31] audit: type=1400 audit(351.370:193): avc: denied { read } for pid=5873 comm="syz.0.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 354.289808][ T5894] fuse: Bad value for 'group_id' [ 354.291398][ T5894] fuse: Bad value for 'group_id' [ 355.055275][ T5903] fuse: Bad value for 'fd' [ 355.745055][ T5914] fuse: Bad value for 'group_id' [ 355.746315][ T5914] fuse: Bad value for 'group_id' [ 356.686181][ T5922] fuse: Bad value for 'fd' [ 357.001937][ T5927] fuse: Bad value for 'group_id' [ 357.002185][ T5927] fuse: Bad value for 'group_id' [ 357.985037][ T5939] FAULT_INJECTION: forcing a failure. [ 357.985037][ T5939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.985454][ T5939] CPU: 0 UID: 0 PID: 5939 Comm: syz.0.600 Not tainted syzkaller #0 PREEMPT [ 357.985552][ T5939] Hardware name: ARM-Versatile Express [ 357.985579][ T5939] Call trace: [ 357.985619][ T5939] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 357.986016][ T5939] r7:00000000 r6:00000000 r5:60000013 r4:82260ed4 [ 357.986156][ T5939] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 357.986394][ T5939] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 357.986527][ T5939] r5:83b83000 r4:8294f150 [ 357.986619][ T5939] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 357.986841][ T5939] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 357.986943][ T5939] r8:848c6c80 r7:00000000 r6:dfad5d7c r5:00000000 r4:00000000 [ 357.986962][ T5939] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 357.987011][ T5939] [<809731c0>] (should_fail_usercopy) from [<81734708>] (copy_to_sockptr_offset.constprop.0+0x60/0x100) [ 357.987066][ T5939] [<817346a8>] (copy_to_sockptr_offset.constprop.0) from [<8173766c>] (do_ip_getsockopt+0x2b8/0xa1c) [ 357.987118][ T5939] r8:848c6c80 r7:00000000 r6:b5403587 r5:dfad5d90 r4:200001c0 [ 357.987135][ T5939] [<817373b8>] (do_ip_getsockopt) from [<81737e34>] (ip_getsockopt+0x64/0x134) [ 357.987190][ T5939] r10:00000127 r9:83b83000 r8:00000000 r7:200001c0 r6:00000000 r5:848c6c80 [ 357.987209][ T5939] r4:0000000d [ 357.987224][ T5939] [<81737dd0>] (ip_getsockopt) from [<817487f4>] (tcp_getsockopt+0x34/0x6c) [ 357.987327][ T5939] r9:83b83000 r8:200001c0 r7:81548578 r6:8515f680 r5:0000000d r4:81737dd0 [ 357.987371][ T5939] [<817487c0>] (tcp_getsockopt) from [<815485a0>] (sock_common_getsockopt+0x28/0x30) [ 357.987427][ T5939] r4:817487c0 [ 357.987451][ T5939] [<81548578>] (sock_common_getsockopt) from [<81545500>] (do_sock_getsockopt+0x124/0x1ec) [ 357.987504][ T5939] r4:00000000 [ 357.987518][ T5939] [<815453dc>] (do_sock_getsockopt) from [<815473ec>] (__sys_getsockopt+0x94/0xdc) [ 357.987570][ T5939] r8:859d2600 r7:dfad5f50 r6:0000000d r5:dfad5f58 r4:859d2601 [ 357.987586][ T5939] [<81547358>] (__sys_getsockopt) from [<81547450>] (sys_getsockopt+0x1c/0x24) [ 357.987632][ T5939] r8:8020029c r7:00000127 r6:001304b8 r5:00000000 r4:200001c0 [ 357.987649][ T5939] [<81547434>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 357.987687][ T5939] Exception stack(0xdfad5fa8 to 0xdfad5ff0) [ 357.987775][ T5939] 5fa0: 200001c0 00000000 00000003 00000000 0000000d 00000000 [ 357.987810][ T5939] 5fc0: 200001c0 00000000 001304b8 00000127 00300000 00000000 00006364 76f280bc [ 357.987834][ T5939] 5fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 360.234571][ T5952] fuse: Unknown parameter 'user_i00000000000000000000' [ 360.329483][ T5957] FAULT_INJECTION: forcing a failure. [ 360.329483][ T5957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.334062][ T5957] CPU: 0 UID: 0 PID: 5957 Comm: syz.1.606 Not tainted syzkaller #0 PREEMPT [ 360.334134][ T5957] Hardware name: ARM-Versatile Express [ 360.334147][ T5957] Call trace: [ 360.334168][ T5957] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 360.334239][ T5957] r7:00000000 r6:00000000 r5:60000113 r4:82260ed4 [ 360.334249][ T5957] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 360.334275][ T5957] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 360.334301][ T5957] r5:83b59800 r4:8294f150 [ 360.334308][ T5957] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 360.334336][ T5957] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 360.334367][ T5957] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfab9f68 r4:00000002 [ 360.334374][ T5957] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 360.334398][ T5957] [<809731c0>] (should_fail_usercopy) from [<8058e8d8>] (simple_read_from_buffer+0x80/0x13c) [ 360.334427][ T5957] [<8058e858>] (simple_read_from_buffer) from [<80608904>] (proc_fail_nth_read+0xb8/0x108) [ 360.334460][ T5957] r10:00000001 r9:8060884c r8:00000002 r7:dfab9f68 r6:0000000f r5:76fc2f30 [ 360.334470][ T5957] r4:83b59800 r3:dfab9e9f [ 360.334478][ T5957] [<8060884c>] (proc_fail_nth_read) from [<80553720>] (vfs_read+0x98/0x324) [ 360.334507][ T5957] r8:76fc2f30 r7:dfab9f68 r6:83b59800 r5:0000000f r4:859d2000 [ 360.334517][ T5957] [<80553688>] (vfs_read) from [<80554430>] (ksys_read+0x74/0xe8) [ 360.334548][ T5957] r10:00000003 r9:83b59800 r8:8020029c r7:00000000 r6:00000000 r5:859d2000 [ 360.334557][ T5957] r4:859d2003 [ 360.334564][ T5957] [<805543bc>] (ksys_read) from [<805544b4>] (sys_read+0x10/0x14) [ 360.334592][ T5957] r7:00000003 r6:00000004 r5:76fc2f30 r4:0000000f [ 360.334600][ T5957] [<805544a4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 360.334621][ T5957] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 360.334638][ T5957] 9fa0: 0000000f 76fc2f30 00000004 76fc2f30 0000000f 00000000 [ 360.334654][ T5957] 9fc0: 0000000f 76fc2f30 00000004 00000003 00300000 00000000 00006364 76fc30bc [ 360.334666][ T5957] 9fe0: 00000158 76fc2ed0 000d81d0 001303dc [ 360.471609][ T5963] fuse: Unknown parameter 'user_i00000000000000000000' [ 360.931443][ T5966] capability: warning: `syz.1.608' uses deprecated v2 capabilities in a way that may be insecure [ 360.939928][ T31] audit: type=1400 audit(360.880:194): avc: denied { create } for pid=5959 comm="syz.1.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 360.944964][ T31] audit: type=1400 audit(360.880:195): avc: denied { bind } for pid=5959 comm="syz.1.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 364.262160][ T5986] fuse: Unknown parameter 'user_i00000000000000000000' [ 364.349045][ T5988] fuse: Bad value for 'fd' [ 365.220330][ T5996] fuse: Bad value for 'fd' [ 365.290573][ T5998] fuse: Unknown parameter 'user_id00000000000000000000' [ 365.374159][ T6000] fuse: Unknown parameter '0x0000000000000003' [ 365.644658][ T6008] fuse: Bad value for 'fd' [ 365.685399][ T6010] fuse: Unknown parameter 'user_id00000000000000000000' [ 365.732372][ T6012] fuse: Unknown parameter '0x0000000000000003' [ 369.003429][ T6028] fuse: Bad value for 'fd' [ 369.135121][ T6033] fuse: Unknown parameter '0x0000000000000003' [ 371.449683][ T6053] fuse: Unknown parameter '0x0000000000000003' [ 372.829934][ T31] audit: type=1400 audit(372.770:196): avc: denied { ioctl } for pid=6066 comm="syz.1.640" path="socket:[9624]" dev="sockfs" ino=9624 ioctlcmd=0x940c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 374.701731][ T6079] fuse: Unknown parameter '0x0000000000000003' [ 374.786350][ T6081] FAULT_INJECTION: forcing a failure. [ 374.786350][ T6081] name failslab, interval 1, probability 0, space 0, times 0 [ 374.790053][ T6081] CPU: 0 UID: 0 PID: 6081 Comm: syz.0.643 Not tainted syzkaller #0 PREEMPT [ 374.790183][ T6081] Hardware name: ARM-Versatile Express [ 374.790209][ T6081] Call trace: [ 374.790264][ T6081] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 374.790535][ T6081] r7:00000c40 r6:00000000 r5:60000013 r4:82260ed4 [ 374.790774][ T6081] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 374.790896][ T6081] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 374.791116][ T6081] r5:841e0000 r4:82917c00 [ 374.791632][ T6081] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 374.791733][ T6081] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 374.791834][ T6081] r8:841e0000 r7:00000c40 r6:859d21a8 r5:00001000 r4:830016c0 [ 374.791915][ T6081] [<8051f3b4>] (should_failslab) from [<80503db0>] (__kmalloc_noprof+0x9c/0x458) [ 374.792341][ T6081] [<80503d14>] (__kmalloc_noprof) from [<807c3b34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 374.792465][ T6081] r10:841e0000 r9:8309e400 r8:00000000 r7:834e5b28 r6:859d21a8 r5:00001000 [ 374.792521][ T6081] r4:00000000 [ 374.792569][ T6081] [<807c3af8>] (tomoyo_realpath_from_path) from [<807bfc78>] (tomoyo_path_number_perm+0xcc/0x22c) [ 374.792636][ T6081] r10:841e0000 r9:00000000 r8:859d2180 r7:80045519 r6:00000004 r5:81cd6504 [ 374.792659][ T6081] r4:859d21a8 r3:826c0200 [ 374.792860][ T6081] [<807bfbac>] (tomoyo_path_number_perm) from [<807c4558>] (tomoyo_file_ioctl+0x1c/0x20) [ 374.792930][ T6081] r9:00000003 r8:859d2180 r7:00000000 r6:00000000 r5:80045519 r4:859d2180 [ 374.793135][ T6081] [<807c453c>] (tomoyo_file_ioctl) from [<80770dac>] (security_file_ioctl+0x64/0x1e4) [ 374.793222][ T6081] [<80770d48>] (security_file_ioctl) from [<8056cfa0>] (sys_ioctl+0x4c/0xba0) [ 374.793314][ T6081] r7:00000000 r6:859d2181 r5:00000000 r4:80045519 [ 374.793371][ T6081] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 374.793438][ T6081] Exception stack(0xdfc59fa8 to 0xdfc59ff0) [ 374.793582][ T6081] 9fa0: 00000000 00000000 00000003 80045519 00000000 00000000 [ 374.793698][ T6081] 9fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f280bc [ 374.793855][ T6081] 9fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 374.793986][ T6081] r10:00000036 r9:841e0000 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 374.794163][ T6081] r4:00000000 [ 374.798976][ T6081] ERROR: Out of memory at tomoyo_realpath_from_path. [ 378.377423][ T31] audit: type=1400 audit(378.310:197): avc: denied { write } for pid=6111 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 379.622024][ T6122] fuse: Bad value for 'group_id' [ 379.622207][ T6122] fuse: Bad value for 'group_id' [ 380.718296][ T6126] FAULT_INJECTION: forcing a failure. [ 380.718296][ T6126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.719292][ T6126] CPU: 0 UID: 0 PID: 6126 Comm: syz.1.658 Not tainted syzkaller #0 PREEMPT [ 380.719394][ T6126] Hardware name: ARM-Versatile Express [ 380.719422][ T6126] Call trace: [ 380.719468][ T6126] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 380.719596][ T6126] r7:00006364 r6:00000000 r5:60000013 r4:82260ed4 [ 380.719615][ T6126] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 380.719665][ T6126] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 380.719715][ T6126] r5:83b81800 r4:8294f150 [ 380.719769][ T6126] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 380.719841][ T6126] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 380.719970][ T6126] r8:00000000 r7:00006364 r6:76fa20bc r5:83b82030 r4:76fa1bb8 [ 380.720053][ T6126] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 380.720140][ T6126] [<809731c0>] (should_fail_usercopy) from [<8022b624>] (setup_sigframe+0xe4/0x1c4) [ 380.720205][ T6126] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 380.720269][ T6126] r10:00000004 r9:b5403587 r8:00000000 r7:83b82030 r6:76fa1bb8 r5:dfc5dfb0 [ 380.720290][ T6126] r4:83b81800 [ 380.720306][ T6126] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 380.720405][ T6126] Exception stack(0xdfc5dfb0 to 0xdfc5dff8) [ 380.720473][ T6126] dfa0: fffffffc 00000000 00000000 00000000 [ 380.720530][ T6126] dfc0: 00000000 00000000 001304b8 00000004 00300000 00000000 00006364 76fa20bc [ 380.720562][ T6126] dfe0: 76fa1ec0 76fa1eb0 000195a4 00132510 60000010 00000004 [ 380.720618][ T6126] r10:00000004 r9:83b81800 r8:8020029c r7:00000004 r6:001304b8 r5:00000000 [ 380.720642][ T6126] r4:00000000 [ 381.597823][ T31] audit: type=1400 audit(381.530:198): avc: denied { setattr } for pid=6132 comm="syz.0.660" name="NETLINK" dev="sockfs" ino=8566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 381.790768][ T6137] fuse: Bad value for 'group_id' [ 381.792038][ T6137] fuse: Bad value for 'group_id' [ 382.054717][ T6143] FAULT_INJECTION: forcing a failure. [ 382.054717][ T6143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 382.055139][ T6143] CPU: 0 UID: 0 PID: 6143 Comm: syz.0.665 Not tainted syzkaller #0 PREEMPT [ 382.055336][ T6143] Hardware name: ARM-Versatile Express [ 382.055571][ T6143] Call trace: [ 382.055621][ T6143] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 382.055728][ T6143] r7:df879e20 r6:00000000 r5:60000013 r4:82260ed4 [ 382.055749][ T6143] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 382.055852][ T6143] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 382.056382][ T6143] r5:84b88000 r4:8294f150 [ 382.056836][ T6143] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 382.056975][ T6143] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 382.057141][ T6143] r8:24000001 r7:df879e20 r6:20000200 r5:00000000 r4:df879f20 [ 382.057181][ T6143] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 382.057301][ T6143] [<809731c0>] (should_fail_usercopy) from [<815476ac>] (copy_msghdr_from_user+0x50/0x130) [ 382.057355][ T6143] [<8154765c>] (copy_msghdr_from_user) from [<81547804>] (___sys_sendmsg+0x78/0xd0) [ 382.057403][ T6143] r8:24000001 r7:00000000 r6:836ad680 r5:df879f20 r4:df879e64 [ 382.057417][ T6143] [<8154778c>] (___sys_sendmsg) from [<81547cc0>] (__sys_sendmsg+0x8c/0xe0) [ 382.057551][ T6143] r10:00000128 r9:84b88000 r8:84d9ccc0 r7:24000001 r6:20000200 r5:84d9ccc1 [ 382.057578][ T6143] r4:00000003 [ 382.057599][ T6143] [<81547c34>] (__sys_sendmsg) from [<81547d28>] (sys_sendmsg+0x14/0x18) [ 382.057664][ T6143] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 382.057683][ T6143] [<81547d14>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 382.057730][ T6143] Exception stack(0xdf879fa8 to 0xdf879ff0) [ 382.057778][ T6143] 9fa0: 00000000 00000000 00000003 20000200 24000001 00000000 [ 382.057815][ T6143] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f280bc [ 382.057845][ T6143] 9fe0: 76f27ec0 76f27eb0 000195a4 00132510 [ 382.208878][ T6147] fuse: Bad value for 'group_id' [ 382.209181][ T6147] fuse: Bad value for 'group_id' [ 382.286403][ T31] audit: type=1400 audit(382.220:199): avc: denied { write } for pid=6148 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 382.316454][ T31] audit: type=1400 audit(382.250:200): avc: denied { ioctl } for pid=6148 comm="syz.0.668" path="socket:[8600]" dev="sockfs" ino=8600 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 383.540989][ T31] audit: type=1400 audit(383.480:201): avc: denied { write } for pid=6155 comm="syz.0.670" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 386.792804][ T6180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6180 comm=syz.1.678 [ 386.800262][ T6180] fuse: Bad value for 'fd' [ 388.789338][ T6201] FAULT_INJECTION: forcing a failure. [ 388.789338][ T6201] name failslab, interval 1, probability 0, space 0, times 0 [ 388.789686][ T6201] CPU: 0 UID: 0 PID: 6201 Comm: syz.1.681 Not tainted syzkaller #0 PREEMPT [ 388.789804][ T6201] Hardware name: ARM-Versatile Express [ 388.789845][ T6201] Call trace: [ 388.789888][ T6201] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 388.789990][ T6201] r7:00000d40 r6:00000000 r5:60000013 r4:82260ed4 [ 388.790009][ T6201] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 388.790056][ T6201] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 388.790103][ T6201] r5:84b89800 r4:82917c00 [ 388.790117][ T6201] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 388.790203][ T6201] [<80972f80>] (should_fail_ex) from [<8051f420>] (should_failslab+0x6c/0x94) [ 388.790374][ T6201] r8:84b89800 r7:00000d40 r6:84d9c328 r5:00000018 r4:83001240 [ 388.790586][ T6201] [<8051f3b4>] (should_failslab) from [<80503db0>] (__kmalloc_noprof+0x9c/0x458) [ 388.790712][ T6201] [<80503d14>] (__kmalloc_noprof) from [<807c3a3c>] (tomoyo_encode2+0x64/0xf0) [ 388.790852][ T6201] r10:00000fff r9:8309f800 r8:00000000 r7:85032d48 r6:84d9c328 r5:84e76ffd [ 388.791064][ T6201] r4:84e76ff0 [ 388.791172][ T6201] [<807c39d8>] (tomoyo_encode2) from [<807c3aec>] (tomoyo_encode+0x24/0x30) [ 388.791374][ T6201] r9:8309f800 r8:00000000 r7:85032d48 r6:84d9c328 r5:00001000 r4:84e76ff1 [ 388.791518][ T6201] [<807c3ac8>] (tomoyo_encode) from [<807c3b78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 388.791862][ T6201] r5:00001000 r4:84e76000 [ 388.792263][ T6201] [<807c3af8>] (tomoyo_realpath_from_path) from [<807bfc78>] (tomoyo_path_number_perm+0xcc/0x22c) [ 388.792380][ T6201] r10:84b89800 r9:00000000 r8:84d9c300 r7:00005607 r6:00000004 r5:81cd6504 [ 388.793740][ T6201] r4:84d9c328 r3:826c0200 [ 388.794111][ T6201] [<807bfbac>] (tomoyo_path_number_perm) from [<807c4558>] (tomoyo_file_ioctl+0x1c/0x20) [ 388.794570][ T6201] r9:00000004 r8:84d9c300 r7:00000000 r6:00000000 r5:00005607 r4:84d9c300 [ 388.794744][ T6201] [<807c453c>] (tomoyo_file_ioctl) from [<80770dac>] (security_file_ioctl+0x64/0x1e4) [ 388.795065][ T6201] [<80770d48>] (security_file_ioctl) from [<8056cfa0>] (sys_ioctl+0x4c/0xba0) [ 388.795220][ T6201] r7:00000000 r6:84d9c301 r5:00000000 r4:00005607 [ 388.795729][ T6201] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 388.795808][ T6201] Exception stack(0xdfcddfa8 to 0xdfcddff0) [ 388.795886][ T6201] dfa0: 00000000 00000000 00000004 00005607 00000000 00000000 [ 388.795961][ T6201] dfc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f600bc [ 388.796024][ T6201] dfe0: 76f5fec0 76f5feb0 000195a4 00132510 [ 388.796098][ T6201] r10:00000036 r9:84b89800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 388.796136][ T6201] r4:00000000 [ 388.810690][ T6201] ERROR: Out of memory at tomoyo_realpath_from_path. [ 391.714761][ T6217] fuse: Bad value for 'fd' [ 398.159344][ T6261] fuse: Unknown parameter 'grou00000000000000000000000' [ 398.753987][ T6265] FAULT_INJECTION: forcing a failure. [ 398.753987][ T6265] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 398.754352][ T6265] CPU: 0 UID: 0 PID: 6265 Comm: syz.1.705 Not tainted syzkaller #0 PREEMPT [ 398.754463][ T6265] Hardware name: ARM-Versatile Express [ 398.754508][ T6265] Call trace: [ 398.754544][ T6265] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 398.754634][ T6265] r7:00000000 r6:00000000 r5:60000113 r4:82260ed4 [ 398.754650][ T6265] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 398.754690][ T6265] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 398.754731][ T6265] r5:83b80c00 r4:82917c54 [ 398.754743][ T6265] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 398.755354][ T6265] [<80972f80>] (should_fail_ex) from [<8051f4b0>] (should_fail_alloc_page+0x68/0x74) [ 398.756442][ T6265] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dfd15df0 [ 398.756461][ T6265] [<8051f448>] (should_fail_alloc_page) from [<804ed754>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 398.756755][ T6265] [<804ed6c0>] (prepare_alloc_pages.constprop.0) from [<804f5c7c>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 398.756907][ T6265] r10:dfd15fb0 r9:00000000 r8:83b80c00 r7:00000040 r6:00140cca r5:83b80c00 [ 398.756927][ T6265] r4:00000000 r3:dfd15df0 [ 398.756974][ T6265] [<804f5bd0>] (__alloc_frozen_pages_noprof) from [<804f6d14>] (__folio_alloc_noprof+0x14/0x6c) [ 398.757092][ T6265] r10:dfd15fb0 r9:8476da00 r8:00000000 r7:00000040 r6:76fa0e84 r5:83b80c00 [ 398.757268][ T6265] r4:00001255 [ 398.757281][ T6265] [<804f6d00>] (__folio_alloc_noprof) from [<804c7850>] (handle_mm_fault+0xcf8/0x14dc) [ 398.757329][ T6265] r5:83b80c00 r4:00001255 [ 398.757341][ T6265] [<804c6b58>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 398.757578][ T6265] r10:00000002 r9:84269a00 r8:00000255 r7:83b80c00 r6:00000a07 r5:76fa0e84 [ 398.757594][ T6265] r4:dfd15fb0 [ 398.757608][ T6265] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 398.757718][ T6265] r10:00006364 r9:00000000 r8:80234128 r7:dfd15fb0 r6:76fa0e84 r5:00000a07 [ 398.757734][ T6265] r4:8281cef0 [ 398.757746][ T6265] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 398.757784][ T6265] Exception stack(0xdfd15fb0 to 0xdfd15ff8) [ 398.757887][ T6265] 5fa0: 20000140 00000003 00000000 00000000 [ 398.758022][ T6265] 5fc0: 0001bfcc 20000140 00000000 001892b0 00300000 00000000 00006364 76fa20bc [ 398.758117][ T6265] 5fe0: 00000000 76fa0e80 00019584 0001bfd8 20000010 ffffffff [ 398.758188][ T6265] r8:826b7044 r7:83b80c00 r6:ffffffff r5:20000010 r4:0001bfd8 [ 398.759553][ T6265] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 401.809141][ T31] audit: type=1400 audit(401.750:202): avc: denied { setopt } for pid=6288 comm="syz.0.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 401.825931][ T31] audit: type=1400 audit(401.760:203): avc: denied { read } for pid=6288 comm="syz.0.712" path="socket:[9935]" dev="sockfs" ino=9935 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 402.542193][ T31] audit: type=1400 audit(402.480:204): avc: denied { write } for pid=6303 comm="syz.0.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 403.721950][ T31] audit: type=1400 audit(403.660:205): avc: denied { read } for pid=6317 comm="syz.1.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 407.422077][ T6337] FAULT_INJECTION: forcing a failure. [ 407.422077][ T6337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.422412][ T6337] CPU: 0 UID: 0 PID: 6337 Comm: syz.1.726 Not tainted syzkaller #0 PREEMPT [ 407.422496][ T6337] Hardware name: ARM-Versatile Express [ 407.422521][ T6337] Call trace: [ 407.422561][ T6337] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 407.422664][ T6337] r7:dfd3de20 r6:00000000 r5:60000013 r4:82260ed4 [ 407.422682][ T6337] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 407.422732][ T6337] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 407.422824][ T6337] r5:83b83000 r4:8294f150 [ 407.422867][ T6337] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 407.423031][ T6337] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 407.423186][ T6337] r8:00040040 r7:dfd3de20 r6:200006c0 r5:00000000 r4:dfd3df20 [ 407.423376][ T6337] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 407.423723][ T6337] [<809731c0>] (should_fail_usercopy) from [<815476ac>] (copy_msghdr_from_user+0x50/0x130) [ 407.423911][ T6337] [<8154765c>] (copy_msghdr_from_user) from [<81547804>] (___sys_sendmsg+0x78/0xd0) [ 407.423990][ T6337] r8:00040040 r7:00000000 r6:8515e000 r5:dfd3df20 r4:dfd3de64 [ 407.424431][ T6337] [<8154778c>] (___sys_sendmsg) from [<81547cc0>] (__sys_sendmsg+0x8c/0xe0) [ 407.424568][ T6337] r10:00000128 r9:83b83000 r8:859d2840 r7:00040040 r6:200006c0 r5:859d2841 [ 407.425016][ T6337] r4:00000003 [ 407.425125][ T6337] [<81547c34>] (__sys_sendmsg) from [<81547d28>] (sys_sendmsg+0x14/0x18) [ 407.425192][ T6337] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 407.425229][ T6337] [<81547d14>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 407.425455][ T6337] Exception stack(0xdfd3dfa8 to 0xdfd3dff0) [ 407.425576][ T6337] dfa0: 00000000 00000000 00000003 200006c0 00040040 00000000 [ 407.425684][ T6337] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fc30bc [ 407.425771][ T6337] dfe0: 76fc2ec0 76fc2eb0 000195a4 00132510 [ 413.499787][ T31] audit: type=1400 audit(413.440:206): avc: denied { append } for pid=6375 comm="syz.0.736" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 413.571700][ T31] audit: type=1400 audit(413.510:207): avc: denied { setopt } for pid=6378 comm="syz.0.737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 421.651020][ T6442] FAULT_INJECTION: forcing a failure. [ 421.651020][ T6442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 421.651522][ T6442] CPU: 1 UID: 0 PID: 6442 Comm: syz.0.757 Not tainted syzkaller #0 PREEMPT [ 421.651656][ T6442] Hardware name: ARM-Versatile Express [ 421.651685][ T6442] Call trace: [ 421.651730][ T6442] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 421.651854][ T6442] r7:76f26e1c r6:00000000 r5:60000013 r4:82260ed4 [ 421.651878][ T6442] [<80201b08>] (show_stack) from [<8021fc60>] (dump_stack_lvl+0x70/0x7c) [ 421.651934][ T6442] [<8021fbf0>] (dump_stack_lvl) from [<8021fc84>] (dump_stack+0x18/0x1c) [ 421.651990][ T6442] r5:8407d400 r4:8294f150 [ 421.652017][ T6442] [<8021fc6c>] (dump_stack) from [<80973144>] (should_fail_ex+0x1c4/0x228) [ 421.652108][ T6442] [<80972f80>] (should_fail_ex) from [<809731bc>] (should_fail+0x14/0x18) [ 421.652780][ T6442] r8:84d9c781 r7:76f26e1c r6:dfe09ee4 r5:0000000c r4:0000000c [ 421.652996][ T6442] [<809731a8>] (should_fail) from [<809731dc>] (should_fail_usercopy+0x1c/0x20) [ 421.653091][ T6442] [<809731c0>] (should_fail_usercopy) from [<815458c8>] (move_addr_to_kernel+0x34/0xf8) [ 421.653362][ T6442] [<81545894>] (move_addr_to_kernel) from [<81546fdc>] (__sys_sendto+0xd0/0x160) [ 421.653580][ T6442] r7:76f26e1c r6:836acf00 r5:00000000 r4:00000000 [ 421.653724][ T6442] [<81546f0c>] (__sys_sendto) from [<81547088>] (sys_sendto+0x1c/0x24) [ 421.653799][ T6442] r9:8407d400 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f26e1c [ 421.653832][ T6442] [<8154706c>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 421.653915][ T6442] Exception stack(0xdfe09fa8 to 0xdfe09ff0) [ 421.654165][ T6442] 9fa0: 76f26e1c 0000000c 00000003 76f26eb0 00000020 00000000 [ 421.654502][ T6442] 9fc0: 76f26e1c 0000000c 00000000 00000122 00000003 00000000 76f26eb0 76f280bc [ 421.654701][ T6442] 9fe0: 00000000 76f26df0 000d81d0 001349a8 [ 423.291132][ T6448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6448 comm=syz.1.759 [ 423.307568][ T31] audit: type=1400 audit(423.250:208): avc: denied { accept } for pid=6447 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 423.312192][ T6448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2570 sclass=netlink_route_socket pid=6448 comm=syz.1.759 [ 424.095757][ T31] audit: type=1400 audit(424.030:209): avc: denied { mount } for pid=6458 comm="syz.0.764" name="/" dev="ramfs" ino=10212 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 424.190847][ T31] audit: type=1400 audit(424.130:210): avc: denied { name_bind } for pid=6460 comm="syz.0.765" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 424.192773][ T31] audit: type=1400 audit(424.130:211): avc: denied { node_bind } for pid=6460 comm="syz.0.765" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 424.433509][ T31] audit: type=1400 audit(424.370:212): avc: denied { map } for pid=6462 comm="syz.0.766" path="/dev/usbmon2" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 427.612793][ T31] audit: type=1400 audit(427.550:213): avc: denied { ioctl } for pid=6480 comm="syz.0.770" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10237 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 427.958532][ T6481] fuse: Unknown parameter 'TracerPid: 0 [ 427.958532][ T6481] Uid: 0 0 0 0 [ 427.958532][ T6481] Gid: 0 0 0 0 [ 427.958532][ T6481] FDSize: 256 [ 427.958532][ T6481] Groups: 0 10 [ 427.958532][ T6481] NStgid: 1117 [ 427.958532][ T6481] NSpid: 1118 [ 427.958532][ T6481] NSpgid: 1117 [ 427.958532][ T6481] NSsid: 0 [ 427.958532][ T6481] Kthread: 0 [ 427.958532][ T6481] VmPeak: 39912 kB [ 427.958532][ T6481] VmSize: 39912 kB [ 427.958532][ T6481] VmLck: @' [ 428.463154][ T31] audit: type=1400 audit(428.400:214): avc: denied { nlmsg_write } for pid=6488 comm="syz.0.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 428.660861][ T31] audit: type=1400 audit(428.600:215): avc: denied { getopt } for pid=6490 comm="syz.0.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 429.786857][ T6467] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 429.937133][ T6467] usb 1-1: Using ep0 maxpacket: 8 [ 429.944691][ T6467] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 429.945017][ T6467] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 429.959196][ T6467] usb 1-1: config 0 descriptor?? [ 430.178121][ T6467] asix 1-1:0.0 (unnamed net_device) (uninitialized): invalid hw address, using random [ 430.500930][ T6479] veth0_to_team: entered promiscuous mode [ 430.593544][ T6467] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -32 [ 430.594633][ T6467] asix 1-1:0.0: probe with driver asix failed with error -32 [ 430.611875][ T6467] usb 1-1: USB disconnect, device number 7 [ 431.233156][ T6519] 8<--- cut here --- [ 431.235801][ T6519] Unable to handle kernel paging request at virtual address fee04f27 when write [ 431.236680][ T6519] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 431.240136][ T6519] Internal error: Oops: a06 [#1] SMP ARM [ 431.249717][ T6519] Modules linked in: [ 431.254848][ T6519] CPU: 0 UID: 0 PID: 6519 Comm: syz.1.779 Not tainted syzkaller #0 PREEMPT [ 431.255416][ T6519] Hardware name: ARM-Versatile Express [ 431.256790][ T6519] PC is at parport_attach+0x174/0x1d0 [ 431.257312][ T6519] LR is at parport_attach+0x164/0x1d0 [ 431.257947][ T6519] pc : [<813acdb8>] lr : [<813acda8>] psr: 60000013 [ 431.264130][ T6519] sp : dfe65d30 ip : dfe65d30 fp : dfe65d54 [ 431.265823][ T6519] r10: 82b16f40 r9 : 00000003 r8 : 83dcdcc0 [ 431.266138][ T6519] r7 : dfe65d90 r6 : 83dcdcc0 r5 : 00000000 r4 : 00000000 [ 431.266682][ T6519] r3 : fee04f27 r2 : 81e15684 r1 : 00000001 r0 : 813aca28 [ 431.267394][ T6519] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 431.273989][ T6519] Control: 30c5387d Table: 85a8f840 DAC: fffffffd [ 431.276700][ T6519] Register r0 information: non-slab/vmalloc memory [ 431.277617][ T6519] Register r1 information: non-paged memory [ 431.278000][ T6519] Register r2 information: non-slab/vmalloc memory [ 431.278448][ T6519] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 431.287265][ T6519] Register r4 information: NULL pointer [ 431.288387][ T6519] Register r5 information: NULL pointer [ 431.301835][ T6519] Register r6 information: slab kmalloc-192 start 83dcdcc0 pointer offset 0 size 192 [ 431.305928][ T6519] Register r7 information: 2-page vmalloc region starting at 0xdfe64000 allocated at kernel_clone+0xac/0x3ec [ 431.307463][ T6519] Register r8 information: slab kmalloc-192 start 83dcdcc0 pointer offset 0 size 192 [ 431.308013][ T6519] Register r9 information: non-paged memory [ 431.313642][ T6519] Register r10 information: non-slab/vmalloc memory [ 431.316817][ T6519] Register r11 information: 2-page vmalloc region starting at 0xdfe64000 allocated at kernel_clone+0xac/0x3ec [ 431.317562][ T6519] Register r12 information: 2-page vmalloc region starting at 0xdfe64000 allocated at kernel_clone+0xac/0x3ec [ 431.318268][ T6519] Process syz.1.779 (pid: 6519, stack limit = 0xdfe64000) [ 431.318618][ T6519] Stack: (0xdfe65d30 to 0xdfe66000) [ 431.318789][ T6519] 5d20: 823ff1e0 83dcdcc0 829cf9ac 829cf9ac [ 431.323259][ T6519] 5d40: 81e15b44 83dcdd04 dfe65d8c dfe65d58 813a8e54 813acc50 200003c0 00000000 [ 431.328227][ T6519] 5d60: dfe65d7c 200003c0 83dcdcc0 b5403587 200003c0 8407a400 40946400 00000000 [ 431.329859][ T6519] 5d80: dfe65e4c dfe65d90 813a49a0 813a8d58 656d6f63 705f6964 6f707261 00007472 [ 431.333835][ T6519] 5da0: 00000000 00004f27 0000000b 00000000 000004cd 00000005 00000006 00040004 [ 431.337013][ T6519] 5dc0: 00000007 7fffffff 00000104 00000007 00000fff 00000005 00020003 00000009 [ 431.337549][ T6519] 5de0: 00000101 00000003 80000000 00000005 40000003 00000087 0000caab 0000000e [ 431.340223][ T6519] 5e00: ffffffff 0000000b 00000e69 0000003c 0000000c 00008000 000003a0 00000003 [ 431.340799][ T6519] 5e20: 00000000 e5c64ad4 00000001 859d2900 83dcdcc0 200003c0 200003c0 8407a400 [ 431.341258][ T6519] 5e40: dfe65f14 dfe65e50 813a596c 813a48ac 00000001 00000001 81a3f724 dddcf080 [ 431.346734][ T6519] 5e60: 00000000 8280c960 00000000 00000004 81c01b44 83dcdcf0 00000002 e5c64ad4 [ 431.347984][ T6519] 5e80: 80291574 00000000 8407a400 ffffffff dfe65efc 80200c04 8407a400 8407a400 [ 431.348393][ T6519] 5ea0: dfe65ec4 dfe65eb0 81a3f730 8028f00c 813a5390 a0000013 dfe65fa4 dfe65ec8 [ 431.348812][ T6519] 5ec0: 80200c24 81a3f6f0 859d2900 40946400 200003c0 813a5390 40946400 00000000 [ 431.357467][ T6519] 5ee0: 859d2901 e5c64ad4 859d2900 40946400 00000000 859d2901 200003c0 859d2900 [ 431.358118][ T6519] 5f00: 00000003 8407a400 dfe65fa4 dfe65f18 8056d084 813a539c ecac8b10 8407a400 [ 431.359153][ T6519] 5f20: dfe65f3c dfe65f30 81a3b7f8 81a3b6c8 dfe65f54 dfe65f40 8025e490 8028f00c [ 431.359613][ T6519] 5f40: dfe65fb0 40000000 dfe65f84 dfe65f58 802229ec 8025e44c 00000000 8281cddc [ 431.360556][ T6519] 5f60: dfe65fb0 0014ca70 ecac8b10 80222940 00000000 e5c64ad4 dfe65fac 00000000 [ 431.362766][ T6519] 5f80: 00000000 00316308 00000036 8020029c 8407a400 00000036 00000000 dfe65fa8 [ 431.363149][ T6519] 5fa0: 80200060 8056cf60 00000000 00000000 00000003 40946400 200003c0 00000000 [ 431.366651][ T6519] 5fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc30bc [ 431.369953][ T6519] 5fe0: 76fc2ec0 76fc2eb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 431.370530][ T6519] Call trace: [ 431.370828][ T6519] [<813acc44>] (parport_attach) from [<813a8e54>] (comedi_device_attach+0x108/0x250) [ 431.373240][ T6519] r6:83dcdd04 r5:81e15b44 r4:829cf9ac [ 431.373684][ T6519] [<813a8d4c>] (comedi_device_attach) from [<813a49a0>] (do_devconfig_ioctl+0x100/0x220) [ 431.376996][ T6519] r10:00000000 r9:40946400 r8:8407a400 r7:200003c0 r6:b5403587 r5:83dcdcc0 [ 431.377346][ T6519] r4:200003c0 [ 431.377602][ T6519] [<813a48a0>] (do_devconfig_ioctl) from [<813a596c>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 431.381167][ T6519] r8:8407a400 r7:200003c0 r6:200003c0 r5:83dcdcc0 r4:859d2900 [ 431.381584][ T6519] [<813a5390>] (comedi_unlocked_ioctl) from [<8056d084>] (sys_ioctl+0x130/0xba0) [ 431.382128][ T6519] r10:8407a400 r9:00000003 r8:859d2900 r7:200003c0 r6:859d2901 r5:00000000 [ 431.386388][ T6519] r4:40946400 [ 431.386750][ T6519] [<8056cf54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 431.387245][ T6519] Exception stack(0xdfe65fa8 to 0xdfe65ff0) [ 431.387603][ T6519] 5fa0: 00000000 00000000 00000003 40946400 200003c0 00000000 [ 431.388152][ T6519] 5fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc30bc [ 431.388609][ T6519] 5fe0: 76fc2ec0 76fc2eb0 000195a4 00132510 [ 431.391145][ T6519] r10:00000036 r9:8407a400 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 431.392703][ T6519] r4:00000000 [ 431.393189][ T6519] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 431.396954][ T6519] ---[ end trace 0000000000000000 ]--- [ 431.399583][ T6519] Kernel panic - not syncing: Fatal exception [ 431.404642][ T6519] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:29:41 Registers: info registers vcpu 0 CPU#0 R00=828fd2e8 R01=00000001 R02=dfe65bd8 R03=81c00000 R04=829023f8 R05=828fd2e8 R06=fffffffe R07=00000000 R08=8039a848 R09=8281cdd8 R10=dfe65bd8 R11=dfe65bcc R12=dfe65b98 R13=dfe65b98 R14=802855fc R15=8039a848 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=92db5000 R01=dfe6d000 R02=00000001 R03=80239bb8 R04=7f013000 R05=00000001 R06=82ac8f44 R07=82ac8320 R08=7f013000 R09=dfe6d000 R10=8280c9b4 R11=dfe05d9c R12=dfe05da0 R13=dfe05d70 R14=80230af0 R15=80239bd0 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000