last executing test programs: 11.175810276s ago: executing program 0 (id=517): mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x2000, 0x103) mknod$loop(&(0x7f0000000140)='./file7\x00', 0x2030, 0x0) 11.039677782s ago: executing program 0 (id=518): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r1, 0x2000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) 9.490492006s ago: executing program 0 (id=519): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x10, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x2, 0x0, 0x3}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 9.382760987s ago: executing program 0 (id=520): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 8.369561699s ago: executing program 0 (id=521): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="000008000100001000001400fcff4500001600000000000190780a010100ac1414aa040090"], 0xfdef) 8.26043442s ago: executing program 0 (id=522): r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)={0x140040}, 0x18) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) socket(0x28, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x76, &(0x7f0000000000)=ANY=[], 0x0) 240.389394ms ago: executing program 1 (id=541): r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e0001"], 0x1c}], 0x1}, 0x0) 180.972605ms ago: executing program 1 (id=542): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)="cb", 0x1, 0x24000081, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendmmsg$inet(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000680)="49bbe4121f35be05", 0x8}], 0x1}}], 0x1, 0x4008095) 100.718861ms ago: executing program 1 (id=543): r0 = socket$packet(0x11, 0x3, 0x300) unshare(0x400) setsockopt$packet_int(r0, 0x107, 0xe, 0x0, 0x0) 89.516502ms ago: executing program 1 (id=544): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x26, 0x86d14cded5d0cba9}]}, 0x38}}, 0x0) 368.3µs ago: executing program 1 (id=545): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x1c1341, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x280}], 0x1, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=546): syz_open_dev$sndctrl(&(0x7f0000000000), 0x3, 0x141442) socket$key(0xf, 0x3, 0x2) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) write$UHID_INPUT(r2, &(0x7f0000001040)={0xf, {"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", 0x1000}}, 0x1006) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0x2}}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x0, @mcast1}, {0x2, 0x0, 0x4, @empty}, 0xffffffffffffffff, 0x100000}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00006d8000/0x3000)=nil, 0x3000}, 0x5}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c07000/0x3000)=nil, &(0x7f0000508000/0x4000)=nil, 0x3000, 0x2}) syz_io_uring_setup(0x10f, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x74, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000d5e9bd40eb030200c0ba050000010902115c01000000000904000001b504b100090581"], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x40, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): syzkaller login: [ 48.429055][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 48.429174][ T31] audit: type=1400 audit(48.350:68): avc: denied { read write } for pid=3109 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.433486][ T31] audit: type=1400 audit(48.350:69): avc: denied { open } for pid=3109 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:35658' (ED25519) to the list of known hosts. [ 57.802100][ T31] audit: type=1400 audit(57.680:70): avc: denied { name_bind } for pid=3110 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 59.903508][ T31] audit: type=1400 audit(59.820:71): avc: denied { execute } for pid=3112 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.954875][ T31] audit: type=1400 audit(59.880:72): avc: denied { execute_no_trans } for pid=3112 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.403738][ T31] audit: type=1400 audit(62.330:73): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.406749][ T31] audit: type=1400 audit(62.330:74): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.420136][ T3112] cgroup: Unknown subsys name 'net' [ 62.428023][ T31] audit: type=1400 audit(62.350:75): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.639870][ T3112] cgroup: Unknown subsys name 'cpuset' [ 62.646355][ T3112] cgroup: Unknown subsys name 'hugetlb' [ 62.647765][ T3112] cgroup: Unknown subsys name 'rlimit' [ 62.878535][ T31] audit: type=1400 audit(62.800:76): avc: denied { setattr } for pid=3112 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.879922][ T31] audit: type=1400 audit(62.800:77): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 62.880776][ T31] audit: type=1400 audit(62.800:78): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.039403][ T3114] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.040830][ T31] audit: type=1400 audit(62.960:79): avc: denied { relabelto } for pid=3114 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.046143][ T31] audit: type=1400 audit(62.970:80): avc: denied { write } for pid=3114 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 63.076121][ T31] audit: type=1400 audit(62.990:81): avc: denied { read } for pid=3112 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.077101][ T31] audit: type=1400 audit(63.000:82): avc: denied { open } for pid=3112 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.464073][ T3112] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.392606][ T31] audit: type=1400 audit(71.310:83): avc: denied { execmem } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 71.456649][ T31] audit: type=1400 audit(71.380:84): avc: denied { read } for pid=3117 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.457508][ T31] audit: type=1400 audit(71.380:85): avc: denied { open } for pid=3118 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.463902][ T31] audit: type=1400 audit(71.390:86): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 71.490835][ T31] audit: type=1400 audit(71.410:87): avc: denied { module_request } for pid=3118 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.491750][ T31] audit: type=1400 audit(71.410:88): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.604096][ T31] audit: type=1400 audit(71.530:89): avc: denied { sys_module } for pid=3118 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 72.225028][ T31] audit: type=1400 audit(72.150:90): avc: denied { ioctl } for pid=3117 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.254079][ T3118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.283633][ T3118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.351186][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.361648][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.106403][ T3118] hsr_slave_0: entered promiscuous mode [ 74.109315][ T3118] hsr_slave_1: entered promiscuous mode [ 74.423182][ T31] audit: type=1400 audit(74.340:91): avc: denied { create } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.424200][ T31] audit: type=1400 audit(74.340:92): avc: denied { write } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.425100][ T3118] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.435886][ T3118] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.443598][ T3118] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.465122][ T3118] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.510904][ T3117] hsr_slave_0: entered promiscuous mode [ 74.516283][ T3117] hsr_slave_1: entered promiscuous mode [ 74.518846][ T3117] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 74.519327][ T3117] Cannot create hsr debugfs directory [ 74.885261][ T3117] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.890156][ T3117] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.900446][ T3117] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.911293][ T3117] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.316499][ T3118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.491793][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.869936][ T3117] veth0_vlan: entered promiscuous mode [ 77.891127][ T3117] veth1_vlan: entered promiscuous mode [ 77.966619][ T3117] veth0_macvtap: entered promiscuous mode [ 77.981616][ T3117] veth1_macvtap: entered promiscuous mode [ 78.069556][ T3117] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.070384][ T3117] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.070840][ T3117] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.071197][ T3117] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.210346][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 78.210426][ T31] audit: type=1400 audit(78.130:94): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 78.229672][ T31] audit: type=1400 audit(78.150:95): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/syzkaller.yfuTQQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 78.236687][ T31] audit: type=1400 audit(78.160:96): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 78.248455][ T31] audit: type=1400 audit(78.170:97): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/syzkaller.yfuTQQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 78.254521][ T31] audit: type=1400 audit(78.170:98): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/syzkaller.yfuTQQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2033 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 78.271778][ T31] audit: type=1400 audit(78.190:99): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 78.278352][ T31] audit: type=1400 audit(78.200:100): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 78.288194][ T31] audit: type=1400 audit(78.210:101): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 78.291046][ T31] audit: type=1400 audit(78.210:102): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 78.298607][ T31] audit: type=1400 audit(78.220:103): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 78.366270][ T3117] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 78.497008][ T3118] veth0_vlan: entered promiscuous mode [ 78.521337][ T3118] veth1_vlan: entered promiscuous mode [ 78.590437][ T3118] veth0_macvtap: entered promiscuous mode [ 78.608196][ T3118] veth1_macvtap: entered promiscuous mode [ 78.681610][ T3118] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.685538][ T3118] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.687610][ T3118] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.687965][ T3118] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.997107][ T3813] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 81.858864][ C1] hrtimer: interrupt took 5052560 ns [ 83.757878][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 83.757937][ T31] audit: type=1400 audit(83.680:127): avc: denied { create } for pid=3824 comm="syz.0.7" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 83.839685][ T3819] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 84.676547][ T3828] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 84.695605][ T31] audit: type=1400 audit(84.620:128): avc: denied { create } for pid=3827 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 84.718940][ T3828] Zero length message leads to an empty skb [ 84.827150][ T31] audit: type=1400 audit(84.750:129): avc: denied { create } for pid=3829 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 84.831309][ T31] audit: type=1400 audit(84.750:130): avc: denied { ioctl } for pid=3829 comm="syz.1.9" path="socket:[3213]" dev="sockfs" ino=3213 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 84.836486][ T31] audit: type=1400 audit(84.760:131): avc: denied { bind } for pid=3829 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 84.839070][ T31] audit: type=1400 audit(84.760:132): avc: denied { write } for pid=3829 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 86.525721][ T31] audit: type=1400 audit(86.450:133): avc: denied { accept } for pid=3835 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 88.647483][ T3847] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 92.529226][ T3863] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 105.246372][ T31] audit: type=1400 audit(105.170:134): avc: denied { create } for pid=3916 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.257921][ T31] audit: type=1400 audit(105.180:135): avc: denied { bind } for pid=3916 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.782927][ T31] audit: type=1400 audit(105.700:136): avc: denied { setopt } for pid=3916 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 105.796256][ T31] audit: type=1400 audit(105.720:137): avc: denied { accept } for pid=3916 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.307489][ T31] audit: type=1400 audit(112.230:138): avc: denied { create } for pid=3946 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.328649][ T31] audit: type=1400 audit(112.230:139): avc: denied { setopt } for pid=3946 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.297198][ T31] audit: type=1326 audit(115.220:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.53" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 117.409930][ T31] audit: type=1400 audit(117.330:141): avc: denied { unmount } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 117.473523][ T31] audit: type=1400 audit(117.390:142): avc: denied { write } for pid=3979 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 117.474951][ T31] audit: type=1400 audit(117.390:143): avc: denied { read } for pid=3979 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 120.160416][ T31] audit: type=1400 audit(120.080:144): avc: denied { create } for pid=3991 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 126.753411][ T4033] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 135.753235][ T31] audit: type=1326 audit(135.670:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4078 comm="syz.1.92" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 142.051214][ T31] audit: type=1326 audit(141.960:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4108 comm="syz.1.102" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 147.360845][ T31] audit: type=1326 audit(147.220:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="syz.0.110" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 151.511038][ T4158] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 152.003045][ T31] audit: type=1326 audit(151.920:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4159 comm="syz.0.116" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 156.877117][ T4180] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 157.287911][ T31] audit: type=1326 audit(157.210:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.122" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 161.456605][ T4199] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 162.391604][ T31] audit: type=1326 audit(162.310:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.1.129" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 167.140247][ T4222] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 167.305969][ T31] audit: type=1400 audit(167.230:151): avc: denied { ioctl } for pid=4227 comm="syz.0.136" path="socket:[3844]" dev="sockfs" ino=3844 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 167.357609][ T31] audit: type=1400 audit(167.280:152): avc: denied { create } for pid=4227 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 167.379216][ T31] audit: type=1400 audit(167.300:153): avc: denied { ioctl } for pid=4227 comm="syz.0.136" path="socket:[3845]" dev="sockfs" ino=3845 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 167.404608][ T31] audit: type=1400 audit(167.330:154): avc: denied { write } for pid=4227 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 167.704609][ T31] audit: type=1400 audit(167.610:155): avc: denied { setopt } for pid=4227 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 173.508692][ T4254] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 177.723856][ T4277] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 182.204136][ T4303] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 183.074816][ T31] audit: type=1400 audit(183.000:156): avc: denied { create } for pid=4315 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 183.106039][ T31] audit: type=1400 audit(183.030:157): avc: denied { write } for pid=4315 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 188.586036][ T31] audit: type=1400 audit(188.510:158): avc: denied { setopt } for pid=4348 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 188.588971][ T31] audit: type=1400 audit(188.510:159): avc: denied { getopt } for pid=4348 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 189.733141][ T4370] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4370 comm=syz.1.181 [ 189.744299][ T31] audit: type=1400 audit(189.660:160): avc: denied { audit_write } for pid=4369 comm="syz.1.181" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 191.131486][ T31] audit: type=1400 audit(191.050:161): avc: denied { setattr } for pid=4394 comm="syz.0.190" name="NETLINK" dev="sockfs" ino=5135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 193.447224][ T31] audit: type=1326 audit(193.370:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4407 comm="syz.1.194" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 198.419503][ T31] audit: type=1326 audit(198.340:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4430 comm="syz.0.203" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 204.770360][ T31] audit: type=1326 audit(204.690:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4456 comm="syz.0.213" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 205.106261][ T31] audit: type=1400 audit(205.020:165): avc: denied { read } for pid=4460 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 210.605155][ T31] audit: type=1326 audit(210.520:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4476 comm="syz.1.219" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 213.437557][ T4492] FAULT_INJECTION: forcing a failure. [ 213.437557][ T4492] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 213.449702][ T4492] CPU: 0 UID: 0 PID: 4492 Comm: syz.1.224 Not tainted 6.12.0-rc2-syzkaller #0 [ 213.452300][ T4492] Hardware name: ARM-Versatile Express [ 213.453020][ T4492] Call trace: [ 213.454504][ T4492] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 213.463303][ T4492] r7:846ca3a3 r6:00000000 r5:60000013 r4:8203d408 [ 213.463930][ T4492] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 213.464722][ T4492] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 213.468376][ T4492] r5:00000000 r4:8274e844 [ 213.471955][ T4492] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 213.472509][ T4492] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 213.472868][ T4492] r6:00000000 r5:dfc0dea8 r4:00000024 [ 213.473101][ T4492] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 213.473451][ T4492] [<808e54f4>] (should_fail_usercopy) from [<8083a33c>] (_copy_from_iter+0x68/0x7c8) [ 213.473854][ T4492] [<8083a2d4>] (_copy_from_iter) from [<8182ca6c>] (isotp_sendmsg+0x25c/0x7fc) [ 213.474246][ T4492] r10:dfc0de98 r9:846ca3a3 r8:dfc0dea8 r7:00000024 r6:846c8000 r5:846ca000 [ 213.475668][ T4492] r4:00000000 [ 213.475929][ T4492] [<8182c810>] (isotp_sendmsg) from [<81483828>] (__sock_sendmsg+0x44/0x78) [ 213.479252][ T4492] r10:00000122 r9:8496e000 r8:00000003 r7:83321900 r6:83321900 r5:dfc0de98 [ 213.482648][ T4492] r4:00000000 [ 213.482987][ T4492] [<814837e4>] (__sock_sendmsg) from [<81485e80>] (__sys_sendto+0x108/0x14c) [ 213.486298][ T4492] r7:83321900 r6:76b53e1c r5:00000000 r4:00000000 [ 213.486773][ T4492] [<81485d78>] (__sys_sendto) from [<81485ee0>] (sys_sendto+0x1c/0x24) [ 213.489307][ T4492] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b53e1c [ 213.492291][ T4492] [<81485ec4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 213.495737][ T4492] Exception stack(0xdfc0dfa8 to 0xdfc0dff0) [ 213.497699][ T4492] dfa0: 76b53e1c 0000000c 00000003 76b53eb0 00000024 00000000 [ 213.498338][ T4492] dfc0: 76b53e1c 0000000c 00000000 00000122 00000003 00000000 76b53eb0 76b550bc [ 213.501527][ T4492] dfe0: 00000000 76b53df0 000d8408 00135358 [ 220.487409][ T4517] FAULT_INJECTION: forcing a failure. [ 220.487409][ T4517] name failslab, interval 1, probability 0, space 0, times 1 [ 220.488475][ T4517] CPU: 0 UID: 0 PID: 4517 Comm: syz.0.234 Not tainted 6.12.0-rc2-syzkaller #0 [ 220.489119][ T4517] Hardware name: ARM-Versatile Express [ 220.489377][ T4517] Call trace: [ 220.489679][ T4517] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 220.490068][ T4517] r7:00000d40 r6:8484f868 r5:60000013 r4:8203d408 [ 220.490396][ T4517] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 220.491048][ T4517] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 220.491525][ T4517] r5:00000000 r4:8271925c [ 220.491727][ T4517] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 220.492914][ T4517] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 220.493775][ T4517] r6:8484f868 r5:00000018 r4:82c01240 [ 220.496879][ T4517] [<804e81ac>] (should_failslab) from [<804cd638>] (__kmalloc_noprof+0x9c/0x458) [ 220.502909][ T4517] [<804cd59c>] (__kmalloc_noprof) from [<80750ef0>] (tomoyo_encode2+0x64/0xf0) [ 220.503827][ T4517] r10:00000fff r9:82f19000 r8:00000000 r7:84c43aa0 r6:8484f868 r5:84748ffd [ 220.504141][ T4517] r4:84748ff0 [ 220.504283][ T4517] [<80750e8c>] (tomoyo_encode2) from [<80750fa0>] (tomoyo_encode+0x24/0x30) [ 220.504710][ T4517] r9:82f19000 r8:00000000 r7:84c43aa0 r6:8484f868 r5:00001000 r4:84748ff1 [ 220.505182][ T4517] [<80750f7c>] (tomoyo_encode) from [<8075102c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 220.505727][ T4517] r5:00001000 r4:84748000 [ 220.505940][ T4517] [<80750fac>] (tomoyo_realpath_from_path) from [<8074d3dc>] (tomoyo_check_open_permission+0x150/0x1c0) [ 220.506386][ T4517] r10:00000000 r9:00000004 r8:844abdc0 r7:00000000 r6:00000000 r5:8484f868 [ 220.506764][ T4517] r4:00000001 r3:00000001 [ 220.507078][ T4517] [<8074d28c>] (tomoyo_check_open_permission) from [<80751e7c>] (tomoyo_file_open+0x34/0x38) [ 220.507478][ T4517] r9:8484f840 r8:8484f868 r7:00000000 r6:830ae580 r5:81a1cd00 r4:8484f840 [ 220.507907][ T4517] [<80751e48>] (tomoyo_file_open) from [<8070fb80>] (security_file_open+0xe8/0x344) [ 220.508290][ T4517] r5:81a1cd00 r4:8484f840 [ 220.508616][ T4517] [<8070fa98>] (security_file_open) from [<80510b88>] (do_dentry_open+0xe4/0x4c0) [ 220.509004][ T4517] r4:8484f840 [ 220.509193][ T4517] [<80510aa4>] (do_dentry_open) from [<80512a5c>] (vfs_open+0x2c/0xec) [ 220.509742][ T4517] r9:8484f840 r8:df9d1e58 r7:00000000 r6:8484f868 r5:8271f3f4 r4:8484f840 [ 220.510062][ T4517] [<80512a30>] (vfs_open) from [<8052b180>] (path_openat+0x770/0x11a4) [ 220.510467][ T4517] r6:df9d1f20 r5:8271f3f4 r4:00000000 [ 220.510704][ T4517] [<8052aa10>] (path_openat) from [<8052bc50>] (do_filp_open+0x9c/0x138) [ 220.511086][ T4517] r10:00000142 r9:836b1800 r8:00000001 r7:df9d1e58 r6:df9d1f20 r5:836b1800 [ 220.511400][ T4517] r4:82e4b000 [ 220.511658][ T4517] [<8052bbb4>] (do_filp_open) from [<80512f08>] (do_sys_openat2+0xbc/0xe4) [ 220.512215][ T4517] r8:8020029c r7:ffffff9c r6:00000006 r5:df9d1f58 r4:82e4b000 [ 220.512533][ T4517] [<80512e4c>] (do_sys_openat2) from [<80513310>] (sys_openat+0x98/0xd4) [ 220.512829][ T4517] r7:00000142 r6:00000000 r5:76b76e38 r4:ffffff9c [ 220.513177][ T4517] [<80513278>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 220.513438][ T4517] Exception stack(0xdf9d1fa8 to 0xdf9d1ff0) [ 220.513689][ T4517] 1fa0: 00000000 76b76e38 ffffff9c 76b76e38 00000000 00000000 [ 220.513949][ T4517] 1fc0: 00000000 76b76e38 00000000 00000142 00000000 00006364 003d0f00 76b770bc [ 220.514182][ T4517] 1fe0: 7f030101 76b76df8 000d8408 00130cb8 [ 220.514373][ T4517] r5:76b76e38 r4:00000000 [ 220.542995][ T4517] ERROR: Out of memory at tomoyo_realpath_from_path. [ 222.973045][ T4528] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4528 comm=syz.1.237 [ 223.600135][ T31] audit: type=1400 audit(223.520:167): avc: denied { map_create } for pid=4524 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 224.313369][ T31] audit: type=1400 audit(224.230:168): avc: denied { append } for pid=4533 comm="syz.0.238" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 227.090613][ T4552] FAULT_INJECTION: forcing a failure. [ 227.090613][ T4552] name failslab, interval 1, probability 0, space 0, times 0 [ 227.100225][ T4552] CPU: 1 UID: 0 PID: 4552 Comm: syz.0.244 Not tainted 6.12.0-rc2-syzkaller #0 [ 227.105747][ T4552] Hardware name: ARM-Versatile Express [ 227.110370][ T4552] Call trace: [ 227.112021][ T4552] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 227.120954][ T4552] r7:84968c00 r6:00000cc0 r5:60000013 r4:8203d408 [ 227.121861][ T4552] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 227.131757][ T4552] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 227.132556][ T4552] r5:00000000 r4:8271925c [ 227.132900][ T4552] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 227.138951][ T4552] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 227.143406][ T4552] r6:00000cc0 r5:ffffffff r4:82f01180 [ 227.143898][ T4552] [<804e81ac>] (should_failslab) from [<804ccc48>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 227.150830][ T4552] [<804ccbf8>] (kmem_cache_alloc_node_noprof) from [<81491090>] (__alloc_skb+0x138/0x160) [ 227.154413][ T4552] r10:dfc19d4c r9:00000000 r8:00000cc0 r7:00000000 r6:82f01180 r5:ffffffff [ 227.155050][ T4552] r4:82606000 [ 227.159419][ T4552] [<81490f58>] (__alloc_skb) from [<81499264>] (alloc_skb_with_frags+0x44/0x1ec) [ 227.162960][ T4552] r8:802a6e50 r7:dfc19cd4 r6:00000000 r5:00001000 r4:00000000 [ 227.165513][ T4552] [<81499220>] (alloc_skb_with_frags) from [<8148a964>] (sock_alloc_send_pskb+0x1f4/0x228) [ 227.167357][ T4552] r10:dfc19d4c r9:00000000 r8:802a6e50 r7:dfc19cd4 r6:84968c00 r5:7fffffff [ 227.172830][ T4552] r4:846f8000 [ 227.176308][ T4552] [<8148a770>] (sock_alloc_send_pskb) from [<8182cac4>] (isotp_sendmsg+0x2b4/0x7fc) [ 227.177112][ T4552] r10:dfc19f38 r9:00000014 r8:dfc19f48 r7:00000014 r6:846f8000 r5:846fa000 [ 227.181890][ T4552] r4:00000000 [ 227.183551][ T4552] [<8182c810>] (isotp_sendmsg) from [<81483828>] (__sock_sendmsg+0x44/0x78) [ 227.188016][ T4552] r10:00008000 r9:dfc19dd4 r8:dfc19dd4 r7:00000000 r6:83320500 r5:dfc19f38 [ 227.191920][ T4552] r4:00000000 [ 227.192406][ T4552] [<814837e4>] (__sock_sendmsg) from [<8148482c>] (____sys_sendmsg+0x2ac/0x2cc) [ 227.193106][ T4552] r7:00000000 r6:00000000 r5:83320500 r4:dfc19f38 [ 227.196938][ T4552] [<81484580>] (____sys_sendmsg) from [<81486794>] (___sys_sendmsg+0x9c/0xd0) [ 227.199441][ T4552] r10:dfc19e34 r9:20000880 r8:00008000 r7:00000000 r6:83320500 r5:dfc19f38 [ 227.202282][ T4552] r4:00000000 [ 227.206980][ T4552] [<814866f8>] (___sys_sendmsg) from [<81486cac>] (sys_sendmsg+0x78/0xbc) [ 227.210574][ T4552] r10:00000128 r9:84968c00 r8:8020029c r7:00008000 r6:20000880 r5:83320500 [ 227.212245][ T4552] r4:00000000 [ 227.216714][ T4552] [<81486c34>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 227.221508][ T4552] Exception stack(0xdfc19fa8 to 0xdfc19ff0) [ 227.222416][ T4552] 9fa0: 00000000 00000000 00000003 20000880 00008000 00000000 [ 227.223074][ T4552] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b770bc [ 227.228710][ T4552] 9fe0: 76b76ec0 76b76eb0 00018af8 00132ec0 [ 227.232574][ T4552] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 228.802818][ T31] audit: type=1400 audit(228.710:169): avc: denied { write } for pid=4560 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 228.894963][ T31] audit: type=1400 audit(228.820:170): avc: denied { read } for pid=4560 comm="syz.1.248" path="socket:[4363]" dev="sockfs" ino=4363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 232.055934][ T31] audit: type=1400 audit(231.980:171): avc: denied { name_bind } for pid=4584 comm="syz.0.256" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 232.074471][ T31] audit: type=1400 audit(232.000:172): avc: denied { getopt } for pid=4584 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 232.114139][ T4585] geneve2: entered promiscuous mode [ 232.117293][ T4585] geneve2: entered allmulticast mode [ 232.346410][ T4585] FAULT_INJECTION: forcing a failure. [ 232.346410][ T4585] name failslab, interval 1, probability 0, space 0, times 0 [ 232.347269][ T4585] CPU: 0 UID: 0 PID: 4585 Comm: syz.0.256 Not tainted 6.12.0-rc2-syzkaller #0 [ 232.347712][ T4585] Hardware name: ARM-Versatile Express [ 232.348031][ T4585] Call trace: [ 232.348692][ T4585] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 232.349838][ T4585] r7:00000820 r6:83fdda58 r5:60000013 r4:8203d408 [ 232.350041][ T4585] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 232.350245][ T4585] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 232.350440][ T4585] r5:00000000 r4:8271925c [ 232.350637][ T4585] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 232.350879][ T4585] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 232.351108][ T4585] r6:83fdda58 r5:00000017 r4:82c01240 [ 232.351267][ T4585] [<804e81ac>] (should_failslab) from [<804ce2ec>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 232.351515][ T4585] [<804ce24c>] (__kmalloc_node_track_caller_noprof) from [<8046cc88>] (kmemdup_noprof+0x28/0x44) [ 232.351776][ T4585] r10:00000126 r9:83ff4c04 r8:dfa35d34 r7:83d4f000 r6:83fdda58 r5:00000017 [ 232.352239][ T4585] r4:84189100 [ 232.352386][ T4585] [<8046cc60>] (kmemdup_noprof) from [<80730064>] (sidtab_sid2str_get+0x54/0xa4) [ 232.353999][ T4585] r7:83d4f000 r6:dfa35d34 r5:dfa35d2c r4:84189100 [ 232.354314][ T4585] [<80730010>] (sidtab_sid2str_get) from [<8073749c>] (sidtab_entry_to_string+0x34/0x94) [ 232.354772][ T4585] r7:83d4f000 r6:84189100 r5:dfa35d2c r4:00000060 [ 232.355086][ T4585] [<80737468>] (sidtab_entry_to_string) from [<80737614>] (security_sid_to_context_core+0x118/0x17c) [ 232.355587][ T4585] r9:dfa35e74 r8:83d4f000 r7:83ff4c04 r6:dfa35d34 r5:dfa35d2c r4:00000060 [ 232.355965][ T4585] [<807374fc>] (security_sid_to_context_core) from [<8073a410>] (security_sid_to_context+0x1c/0x24) [ 232.356456][ T4585] r8:84969800 r7:8071b858 r6:83f89000 r5:8434d000 r4:dfa35de0 [ 232.356788][ T4585] [<8073a3f4>] (security_sid_to_context) from [<8071ca38>] (avc_audit_post_callback+0x48/0x2f8) [ 232.357270][ T4585] [<8071c9f0>] (avc_audit_post_callback) from [<807421b0>] (common_lsm_audit+0x16c/0x904) [ 232.358192][ T4585] r10:00000126 r9:dfa35e74 r8:8071c9f0 r7:8071b858 r6:83f89000 r5:8434d000 [ 232.358688][ T4585] r4:dfa35e74 [ 232.359157][ T4585] [<80742044>] (common_lsm_audit) from [<8071cf00>] (slow_avc_audit+0xbc/0x114) [ 232.359788][ T4585] r9:dfa35e74 r8:00000016 r7:00000060 r6:00000060 r5:00000060 r4:00000060 [ 232.361012][ T4585] [<8071ce44>] (slow_avc_audit) from [<8071d7ec>] (avc_has_perm+0xd4/0xe4) [ 232.361936][ T4585] r5:00000000 r4:00010000 [ 232.362634][ T4585] [<8071d718>] (avc_has_perm) from [<80722b70>] (sock_has_perm+0xd8/0x104) [ 232.363267][ T4585] r9:84969800 r8:00010000 r7:83f89000 r6:8224220c r5:8501a780 r4:00000000 [ 232.363636][ T4585] [<80722a98>] (sock_has_perm) from [<80723240>] (selinux_socket_setsockopt+0x24/0x40) [ 232.364113][ T4585] r9:84969800 r8:8020029c r7:00000000 r6:00000001 r5:00000107 r4:83320000 [ 232.364517][ T4585] [<8072321c>] (selinux_socket_setsockopt) from [<80716ea0>] (security_socket_setsockopt+0x1d8/0x1e4) [ 232.365018][ T4585] r7:00000000 r6:00000001 r5:00000107 r4:83320000 [ 232.365311][ T4585] [<80716cc8>] (security_socket_setsockopt) from [<81482cb0>] (do_sock_setsockopt+0x4c/0x17c) [ 232.365828][ T4585] r7:00000000 r6:83320000 r5:00000001 r4:00000000 [ 232.366100][ T4585] [<81482c64>] (do_sock_setsockopt) from [<814861d8>] (sys_setsockopt+0x78/0xbc) [ 232.366558][ T4585] r6:83320000 r5:00000001 r4:00000107 [ 232.366821][ T4585] [<81486160>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 232.367332][ T4585] Exception stack(0xdfa35fa8 to 0xdfa35ff0) [ 232.367844][ T4585] 5fa0: 00000010 00000000 00000006 00000107 00000001 200004c0 [ 232.368261][ T4585] 5fc0: 00000010 00000000 00130e70 00000126 00000000 00006364 003d0f00 76b770bc [ 232.368661][ T4585] 5fe0: 76b76ec0 76b76eb0 00018af8 00132ec0 [ 232.369020][ T4585] r7:00000126 r6:00130e70 r5:00000000 r4:00000010 [ 232.436076][ T31] audit: type=1400 audit(232.270:173): avc: denied { setopt } for pid=4584 comm="syz.0.256" ssid=96 tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.561011][ T4599] binfmt_misc: register: failed to install interpreter file ./file0 [ 233.603015][ T31] audit: type=1400 audit(233.520:174): avc: denied { nlmsg_write } for pid=4597 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 233.617328][ T4599] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4599 comm=syz.1.261 [ 238.424168][ T4619] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 238.448858][ T31] audit: type=1400 audit(238.370:175): avc: denied { connect } for pid=4625 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 238.449756][ T31] audit: type=1400 audit(238.370:176): avc: denied { name_connect } for pid=4625 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 238.987507][ T31] audit: type=1400 audit(238.910:177): avc: denied { listen } for pid=4625 comm="syz.0.270" lport=38156 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 239.512436][ T31] audit: type=1400 audit(239.430:178): avc: denied { accept } for pid=4625 comm="syz.0.270" lport=38156 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 239.554240][ T31] audit: type=1400 audit(239.480:179): avc: denied { setopt } for pid=4625 comm="syz.0.270" lport=38156 faddr=100.1.1.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 239.624984][ T31] audit: type=1400 audit(239.550:180): avc: denied { getopt } for pid=4625 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 239.692801][ T31] audit: type=1400 audit(239.610:181): avc: denied { write } for pid=4625 comm="syz.0.270" lport=38156 faddr=100.1.1.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 243.093184][ T4644] fuse: Unknown parameter '017777777777777777777770x0000000000000004' [ 246.927479][ T31] audit: type=1326 audit(246.850:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.1.280" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 249.549153][ T31] audit: type=1400 audit(249.470:183): avc: denied { ioctl } for pid=4680 comm="syz.1.286" path="socket:[5569]" dev="sockfs" ino=5569 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 249.962799][ T31] audit: type=1400 audit(249.870:184): avc: denied { ioctl } for pid=4680 comm="syz.1.286" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x9424 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 251.254467][ T31] audit: type=1326 audit(251.180:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.1.289" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 251.375147][ T4691] can: request_module (can-proto-4) failed. [ 252.201776][ T31] audit: type=1400 audit(252.120:186): avc: denied { remount } for pid=4695 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 252.247159][ T4696] FAULT_INJECTION: forcing a failure. [ 252.247159][ T4696] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 252.282669][ T4696] CPU: 0 UID: 0 PID: 4696 Comm: syz.0.291 Not tainted 6.12.0-rc2-syzkaller #0 [ 252.283583][ T4696] Hardware name: ARM-Versatile Express [ 252.283835][ T4696] Call trace: [ 252.284181][ T4696] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 252.284665][ T4696] r7:00000000 r6:00000000 r5:60000113 r4:8203d408 [ 252.285152][ T4696] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 252.285849][ T4696] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 252.290023][ T4696] r5:00000000 r4:8274e844 [ 252.290654][ T4696] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 252.292590][ T4696] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 252.296899][ T4696] r6:00000000 r5:dfc71f68 r4:00000002 [ 252.301696][ T4696] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 252.302630][ T4696] [<808e54f4>] (should_fail_usercopy) from [<8054e70c>] (simple_read_from_buffer+0x8c/0x134) [ 252.307133][ T4696] [<8054e680>] (simple_read_from_buffer) from [<805c320c>] (proc_fail_nth_read+0xb8/0x100) [ 252.311995][ T4696] r10:00000001 r9:805c3154 r8:00000002 r7:dfc71f68 r6:0000000f r5:76b76f30 [ 252.312799][ T4696] r4:8496b000 r3:dfc71e9f [ 252.313528][ T4696] [<805c3154>] (proc_fail_nth_read) from [<80515e6c>] (vfs_read+0x98/0x324) [ 252.314108][ T4696] r8:76b76f30 r7:dfc71f68 r6:8496b000 r5:0000000f r4:8484f9c0 [ 252.314624][ T4696] [<80515dd4>] (vfs_read) from [<80516b1c>] (ksys_read+0x78/0xf8) [ 252.318359][ T4696] r10:00000003 r9:8496b000 r8:8020029c r7:00000000 r6:00000000 r5:8484f9c0 [ 252.319038][ T4696] r4:8484f9c3 [ 252.321992][ T4696] [<80516aa4>] (ksys_read) from [<80516bac>] (sys_read+0x10/0x14) [ 252.324896][ T4696] r7:00000003 r6:00000004 r5:76b76f30 r4:0000000f [ 252.328304][ T4696] [<80516b9c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 252.329916][ T4696] Exception stack(0xdfc71fa8 to 0xdfc71ff0) [ 252.330337][ T4696] 1fa0: 0000000f 76b76f30 00000004 76b76f30 0000000f 00000000 [ 252.332733][ T4696] 1fc0: 0000000f 76b76f30 00000004 00000003 00000000 00006364 003d0f00 76b770bc [ 252.335598][ T4696] 1fe0: 00000158 76b76ed0 000d8408 00130d94 [ 252.400001][ T31] audit: type=1400 audit(252.320:187): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 254.400313][ T31] audit: type=1400 audit(254.320:188): avc: denied { map_read map_write } for pid=4711 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 255.344891][ T4716] FAULT_INJECTION: forcing a failure. [ 255.344891][ T4716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 255.345270][ T4716] CPU: 1 UID: 0 PID: 4716 Comm: syz.1.297 Not tainted 6.12.0-rc2-syzkaller #0 [ 255.345468][ T4716] Hardware name: ARM-Versatile Express [ 255.345717][ T4716] Call trace: [ 255.345985][ T4716] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 255.346193][ T4716] r7:20001700 r6:00000000 r5:60000013 r4:8203d408 [ 255.346323][ T4716] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 255.346522][ T4716] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 255.346734][ T4716] r5:00000000 r4:8274e844 [ 255.346873][ T4716] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 255.347076][ T4716] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 255.347281][ T4716] r6:00000000 r5:00000000 r4:00000000 [ 255.347407][ T4716] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 255.347615][ T4716] [<808e54f4>] (should_fail_usercopy) from [<808378dc>] (copy_page_from_iter_atomic+0x1ac/0xa54) [ 255.347860][ T4716] [<80837730>] (copy_page_from_iter_atomic) from [<8043c13c>] (generic_perform_write+0x168/0x2c8) [ 255.348095][ T4716] r10:00001000 r9:00000000 r8:84953b60 r7:00000000 r6:81a19c80 r5:00000007 [ 255.348280][ T4716] r4:00000000 [ 255.348371][ T4716] [<8043bfd4>] (generic_perform_write) from [<80465580>] (shmem_file_write_iter+0x7c/0x84) [ 255.348592][ T4716] r10:81a19e00 r9:20001700 r8:8484fb40 r7:dfa6def0 r6:84953ad8 r5:dfa6df08 [ 255.348769][ T4716] r4:00000000 [ 255.348867][ T4716] [<80465504>] (shmem_file_write_iter) from [<805168cc>] (vfs_write+0x274/0x44c) [ 255.349086][ T4716] r9:20001700 r8:dfa6df68 r7:8496e000 r6:00000007 r5:8484fb40 r4:80465504 [ 255.349255][ T4716] [<80516658>] (vfs_write) from [<80516c28>] (ksys_write+0x78/0xf8) [ 255.349450][ T4716] r10:00000004 r9:8496e000 r8:8020029c r7:00000000 r6:00000000 r5:8484fb40 [ 255.349683][ T4716] r4:8484fb43 [ 255.349784][ T4716] [<80516bb0>] (ksys_write) from [<80516cb8>] (sys_write+0x10/0x14) [ 255.349977][ T4716] r7:00000004 r6:00130e70 r5:00000000 r4:00000000 [ 255.350120][ T4716] [<80516ca8>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 255.350311][ T4716] Exception stack(0xdfa6dfa8 to 0xdfa6dff0) [ 255.350455][ T4716] dfa0: 00000000 00000000 00000005 20001700 00000007 00000000 [ 255.350642][ T4716] dfc0: 00000000 00000000 00130e70 00000004 00000000 00006364 003d0f00 76b550bc [ 255.350830][ T4716] dfe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 261.306019][ T31] audit: type=1400 audit(261.230:189): avc: denied { ioctl } for pid=4769 comm="syz.1.318" path="socket:[4699]" dev="sockfs" ino=4699 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 261.369222][ T31] audit: type=1400 audit(261.290:190): avc: denied { setopt } for pid=4768 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 262.190242][ T31] audit: type=1400 audit(262.110:191): avc: denied { getopt } for pid=4769 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.339752][ T4796] geneve2: entered promiscuous mode [ 264.340273][ T4796] geneve2: entered allmulticast mode [ 264.863886][ T31] audit: type=1326 audit(264.790:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.0.327" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 266.540880][ T31] audit: type=1400 audit(266.450:193): avc: denied { map } for pid=4813 comm="syz.1.330" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5797 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 266.547690][ T31] audit: type=1400 audit(266.460:194): avc: denied { read write } for pid=4813 comm="syz.1.330" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5797 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 270.048025][ T31] audit: type=1326 audit(269.970:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.1.336" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 273.383265][ T4852] fuse: Bad value for 'fd' [ 273.491329][ T31] audit: type=1326 audit(273.410:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4851 comm="syz.1.341" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 277.055655][ T4870] fuse: Bad value for 'fd' [ 277.111017][ T31] audit: type=1326 audit(277.030:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4869 comm="syz.1.347" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 277.864427][ T4866] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 278.114635][ T4866] usb 1-1: Invalid ep0 maxpacket: 32 [ 278.266134][ T4866] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 278.446422][ T4866] usb 1-1: Invalid ep0 maxpacket: 32 [ 278.458241][ T4866] usb usb1-port1: attempt power cycle [ 278.842752][ T4866] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 278.894318][ T4866] usb 1-1: Invalid ep0 maxpacket: 32 [ 279.037874][ T4866] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 279.078016][ T4866] usb 1-1: Invalid ep0 maxpacket: 32 [ 279.078982][ T4866] usb usb1-port1: unable to enumerate USB device [ 280.880921][ T31] audit: type=1400 audit(280.800:198): avc: denied { bind } for pid=4878 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 280.925275][ T31] audit: type=1400 audit(280.850:199): avc: denied { create } for pid=4878 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 280.956736][ T31] audit: type=1400 audit(280.880:200): avc: denied { setopt } for pid=4878 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 284.588752][ T4891] fuse: Bad value for 'fd' [ 284.691507][ T31] audit: type=1326 audit(284.600:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4890 comm="syz.1.352" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 290.130539][ T4909] FAULT_INJECTION: forcing a failure. [ 290.130539][ T4909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.131686][ T4909] CPU: 0 UID: 0 PID: 4909 Comm: syz.1.356 Not tainted 6.12.0-rc2-syzkaller #0 [ 290.132552][ T4909] Hardware name: ARM-Versatile Express [ 290.132919][ T4909] Call trace: [ 290.133455][ T4909] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 290.133935][ T4909] r7:000000ad r6:00130e70 r5:60000013 r4:8203d408 [ 290.134218][ T4909] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 290.134615][ T4909] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 290.139051][ T4909] r5:00000000 r4:8274e844 [ 290.139540][ T4909] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 290.140002][ T4909] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 290.141109][ T4909] r6:00130e70 r5:76b54b38 r4:76b54bc0 [ 290.141450][ T4909] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 290.142248][ T4909] [<808e54f4>] (should_fail_usercopy) from [<8025ac9c>] (restore_altstack+0x34/0xf8) [ 290.150640][ T4909] [<8025ac68>] (restore_altstack) from [<8020b988>] (sys_rt_sigreturn+0x64/0x74) [ 290.152543][ T4909] r5:76b54b38 r4:df9c9fb0 [ 290.152908][ T4909] [<8020b924>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 290.153407][ T4909] Exception stack(0xdf9c9fa8 to 0xdf9c9ff0) [ 290.153907][ T4909] 9fa0: 00000000 00000000 00000003 20000500 000000f5 00000000 [ 290.154413][ T4909] 9fc0: 00000000 00000000 00130e70 00000003 00000000 00006364 003d0f00 76b550bc [ 290.154974][ T4909] 9fe0: 76b54ec0 76b54eb0 00018af8 00132ebc [ 290.155561][ T4909] r5:00000000 r4:00000000 [ 292.434654][ T4930] lo: entered allmulticast mode [ 292.437037][ T4930] FAULT_INJECTION: forcing a failure. [ 292.437037][ T4930] name failslab, interval 1, probability 0, space 0, times 0 [ 292.437822][ T4930] CPU: 0 UID: 0 PID: 4930 Comm: syz.1.362 Not tainted 6.12.0-rc2-syzkaller #0 [ 292.438096][ T4930] Hardware name: ARM-Versatile Express [ 292.438206][ T4930] Call trace: [ 292.438299][ T4930] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 292.438488][ T4930] r7:84926c00 r6:00000820 r5:60000013 r4:8203d408 [ 292.438661][ T4930] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 292.438835][ T4930] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 292.439119][ T4930] r5:00000000 r4:8271925c [ 292.439311][ T4930] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 292.439856][ T4930] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 292.440312][ T4930] r6:00000820 r5:ffffffff r4:82f01180 [ 292.440500][ T4930] [<804e81ac>] (should_failslab) from [<804ccc48>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 292.440854][ T4930] [<804ccbf8>] (kmem_cache_alloc_node_noprof) from [<81491090>] (__alloc_skb+0x138/0x160) [ 292.441200][ T4930] r10:8348c000 r9:00000000 r8:00000820 r7:00000000 r6:82f01180 r5:ffffffff [ 292.441417][ T4930] r4:82606000 [ 292.441686][ T4930] [<81490f58>] (__alloc_skb) from [<814c52ec>] (__neigh_notify+0x3c/0xdc) [ 292.442877][ T4930] r8:83ef8000 r7:00000000 r6:0000001d r5:85007c00 r4:85007c00 [ 292.443299][ T4930] [<814c52b0>] (__neigh_notify) from [<814c6eac>] (neigh_cleanup_and_release+0x28/0x12c) [ 292.443621][ T4930] r9:82ff711c r8:85007c14 r7:00000000 r6:00000000 r5:85007c00 r4:85007c00 [ 292.443893][ T4930] [<814c6e84>] (neigh_cleanup_and_release) from [<814c71b4>] (neigh_flush_dev+0x144/0x1f0) [ 292.444284][ T4930] r7:00000000 r6:00000000 r5:85007c00 r4:85007c00 [ 292.444582][ T4930] [<814c7070>] (neigh_flush_dev) from [<814c72d0>] (__neigh_ifdown+0x34/0x170) [ 292.448171][ T4930] r10:84926c00 r9:00000000 r8:fffffff2 r7:827e1200 r6:827e10a8 r5:8348c000 [ 292.451957][ T4930] r4:00000000 [ 292.452154][ T4930] [<814c729c>] (__neigh_ifdown) from [<814c743c>] (neigh_ifdown+0x14/0x1c) [ 292.452496][ T4930] r9:00000000 r8:fffffff2 r7:8348c148 r6:83ef8000 r5:827e4628 r4:8348c000 [ 292.452787][ T4930] [<814c7428>] (neigh_ifdown) from [<816ab7f0>] (arp_ifdown+0x1c/0x20) [ 292.453023][ T4930] [<816ab7d4>] (arp_ifdown) from [<816bf300>] (fib_netdev_event+0x170/0x1d8) [ 292.453257][ T4930] [<816bf190>] (fib_netdev_event) from [<80271480>] (notifier_call_chain+0x74/0x1ac) [ 292.453559][ T4930] r7:8348c148 r6:827e1b5c r5:827e4628 r4:816bf190 [ 292.453778][ T4930] [<8027140c>] (notifier_call_chain) from [<8027169c>] (raw_notifier_call_chain+0x20/0x28) [ 292.454036][ T4930] r10:dfbd1c54 r9:84949690 r8:00000009 r7:8348c148 r6:83ef8000 r5:00000002 [ 292.454240][ T4930] r4:dfbd19d8 [ 292.454433][ T4930] [<8027167c>] (raw_notifier_call_chain) from [<814b3804>] (call_netdevice_notifiers_info+0x54/0xa0) [ 292.455095][ T4930] [<814b37b0>] (call_netdevice_notifiers_info) from [<814bbbc8>] (__dev_notify_flags+0x64/0xe4) [ 292.455651][ T4930] r6:00000200 r5:00000201 r4:8348c000 [ 292.456072][ T4930] [<814bbb64>] (__dev_notify_flags) from [<814bc588>] (dev_change_flags+0x54/0x60) [ 292.456572][ T4930] r5:00000000 r4:8348c000 [ 292.456802][ T4930] [<814bc534>] (dev_change_flags) from [<814cf358>] (do_setlink+0x384/0x1078) [ 292.457326][ T4930] r8:00000000 r7:dfbd1c54 r6:00000003 r5:84b74c00 r4:8348c000 [ 292.457711][ T4930] [<814cefd4>] (do_setlink) from [<814d5638>] (rtnl_newlink+0x5c8/0x94c) [ 292.458136][ T4930] r10:dfbd1c54 r9:8348c000 r8:00000000 r7:00000000 r6:84b74c00 r5:84021000 [ 292.458488][ T4930] r4:83ef80e4 [ 292.458672][ T4930] [<814d5070>] (rtnl_newlink) from [<814cd438>] (rtnetlink_rcv_msg+0x138/0x334) [ 292.459143][ T4930] r10:00000000 r9:00000000 r8:82921c98 r7:850ec480 r6:82921c98 r5:00000000 [ 292.459589][ T4930] r4:84949680 [ 292.459808][ T4930] [<814cd300>] (rtnetlink_rcv_msg) from [<815a7080>] (netlink_rcv_skb+0xc0/0x120) [ 292.460339][ T4930] r10:00000000 r9:00000000 r8:83ef8000 r7:00000028 r6:84949680 r5:814cd300 [ 292.460790][ T4930] r4:850ec480 [ 292.460981][ T4930] [<815a6fc0>] (netlink_rcv_skb) from [<814cbcf4>] (rtnetlink_rcv+0x18/0x1c) [ 292.461495][ T4930] r7:850ec480 r6:8438bd00 r5:00000028 r4:83f58000 [ 292.462399][ T4930] [<814cbcdc>] (rtnetlink_rcv) from [<815a6868>] (netlink_unicast+0x19c/0x29c) [ 292.463194][ T4930] [<815a66cc>] (netlink_unicast) from [<815a6b44>] (netlink_sendmsg+0x1dc/0x43c) [ 292.466765][ T4930] r9:00000000 r8:00000000 r7:84b76000 r6:00000028 r5:850ec480 r4:dfbd1f38 [ 292.467240][ T4930] [<815a6968>] (netlink_sendmsg) from [<81483828>] (__sock_sendmsg+0x44/0x78) [ 292.471979][ T4930] r10:00000000 r9:dfbd1dd4 r8:dfbd1dd4 r7:00000000 r6:83320000 r5:dfbd1f38 [ 292.472515][ T4930] r4:00000000 [ 292.472735][ T4930] [<814837e4>] (__sock_sendmsg) from [<8148482c>] (____sys_sendmsg+0x2ac/0x2cc) [ 292.473128][ T4930] r7:00000000 r6:00000000 r5:83320000 r4:dfbd1f38 [ 292.473398][ T4930] [<81484580>] (____sys_sendmsg) from [<81486794>] (___sys_sendmsg+0x9c/0xd0) [ 292.473819][ T4930] r10:dfbd1e34 r9:20000140 r8:00000000 r7:00000000 r6:83320000 r5:dfbd1f38 [ 292.474166][ T4930] r4:00000000 [ 292.474387][ T4930] [<814866f8>] (___sys_sendmsg) from [<81486cac>] (sys_sendmsg+0x78/0xbc) [ 292.474805][ T4930] r10:00000128 r9:84926c00 r8:8020029c r7:00000000 r6:20000140 r5:83320000 [ 292.475161][ T4930] r4:00000000 [ 292.475421][ T4930] [<81486c34>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 292.475850][ T4930] Exception stack(0xdfbd1fa8 to 0xdfbd1ff0) [ 292.476239][ T4930] 1fa0: 00000000 00000000 00000003 20000140 00000000 00000000 [ 292.476624][ T4930] 1fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b550bc [ 292.477079][ T4930] 1fe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 292.477561][ T4930] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 292.536281][ T4930] tunl0: entered allmulticast mode [ 292.539622][ T4930] gre0: entered allmulticast mode [ 292.573162][ T4930] gretap0: entered allmulticast mode [ 292.593012][ T4930] erspan0: entered allmulticast mode [ 292.643002][ T4930] ip_vti0: entered allmulticast mode [ 292.646747][ T4930] ip6_vti0: entered allmulticast mode [ 292.665346][ T4930] sit0: entered allmulticast mode [ 292.684461][ T4930] ip6tnl0: entered allmulticast mode [ 292.689042][ T4930] ip6gre0: entered allmulticast mode [ 292.707019][ T4930] syz_tun: entered allmulticast mode [ 292.728680][ T4930] ip6gretap0: entered allmulticast mode [ 292.773235][ T4930] vcan0: entered allmulticast mode [ 292.781129][ T4930] bond0: entered allmulticast mode [ 292.781695][ T4930] bond_slave_0: entered allmulticast mode [ 292.792888][ T4930] bond_slave_1: entered allmulticast mode [ 292.815337][ T4930] dummy0: entered allmulticast mode [ 292.833048][ T4930] nlmon0: entered allmulticast mode [ 292.853020][ T4930] vxcan0: entered allmulticast mode [ 292.866178][ T4930] vxcan1: entered allmulticast mode [ 292.895567][ T4930] veth0: entered allmulticast mode [ 292.914380][ T4930] veth1: entered allmulticast mode [ 292.952673][ T4931] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 293.000391][ T4930] wg0: entered allmulticast mode [ 293.044684][ T4930] wg1: entered allmulticast mode [ 293.061082][ T4930] wg2: entered allmulticast mode [ 293.084183][ T4930] veth0_to_bridge: entered allmulticast mode [ 293.105720][ T4930] bridge_slave_0: entered allmulticast mode [ 293.123034][ T4930] veth1_to_bridge: entered allmulticast mode [ 293.133417][ T4931] usb 1-1: device descriptor read/64, error -71 [ 293.145442][ T4930] bridge_slave_1: entered allmulticast mode [ 293.163686][ T4930] veth0_to_bond: entered allmulticast mode [ 293.242776][ T4930] veth1_to_bond: entered allmulticast mode [ 293.314029][ T4930] veth0_to_team: entered allmulticast mode [ 293.381781][ T4930] team_slave_0: entered allmulticast mode [ 293.384014][ T4930] veth1_to_team: entered allmulticast mode [ 293.385991][ T4930] team_slave_1: entered allmulticast mode [ 293.386793][ T4930] veth0_to_batadv: entered allmulticast mode [ 293.394151][ T4930] batadv_slave_0: entered allmulticast mode [ 293.404009][ T4931] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 293.405702][ T4930] veth1_to_batadv: entered allmulticast mode [ 293.414392][ T4930] batadv_slave_1: entered allmulticast mode [ 293.424450][ T4930] xfrm0: entered allmulticast mode [ 293.437537][ T4930] veth0_to_hsr: entered allmulticast mode [ 293.448117][ T4930] hsr_slave_0: entered allmulticast mode [ 293.453539][ T4930] veth1_to_hsr: entered allmulticast mode [ 293.475765][ T4930] hsr_slave_1: entered allmulticast mode [ 293.483891][ T4930] hsr0: entered allmulticast mode [ 293.497917][ T4930] veth1_virt_wifi: entered allmulticast mode [ 293.514050][ T4930] veth0_virt_wifi: entered allmulticast mode [ 293.524147][ T4930] veth1_vlan: entered allmulticast mode [ 293.532910][ T4931] usb 1-1: device descriptor read/64, error -71 [ 293.534386][ T4930] veth0_vlan: entered allmulticast mode [ 293.547254][ T4930] vlan0: entered allmulticast mode [ 293.553917][ T4930] vlan1: entered allmulticast mode [ 293.557602][ T4930] macvlan0: entered allmulticast mode [ 293.562641][ T4930] macvlan1: entered allmulticast mode [ 293.574492][ T4930] ipvlan0: entered allmulticast mode [ 293.575301][ T4930] ipvlan1: entered allmulticast mode [ 293.578207][ T4930] veth1_macvtap: entered allmulticast mode [ 293.580596][ T4930] veth0_macvtap: entered allmulticast mode [ 293.593507][ T4930] macvtap0: entered allmulticast mode [ 293.604278][ T4930] macsec0: entered allmulticast mode [ 293.615889][ T4930] geneve0: entered allmulticast mode [ 293.631609][ T4930] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 293.633210][ T4930] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 293.633523][ T4930] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 293.633857][ T4930] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 293.641692][ T4930] geneve1: entered allmulticast mode [ 293.643901][ T4931] usb usb1-port1: attempt power cycle [ 293.685798][ T4930] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 293.692745][ T4930] netdevsim netdevsim1 netdevsim1: entered allmulticast mode [ 293.705454][ T4930] netdevsim netdevsim1 netdevsim2: entered allmulticast mode [ 293.713906][ T4930] netdevsim netdevsim1 netdevsim3: entered allmulticast mode [ 294.032657][ T4931] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 294.095312][ T4931] usb 1-1: device descriptor read/8, error -71 [ 294.126488][ T4938] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 294.368212][ T4931] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 294.418316][ T4931] usb 1-1: device descriptor read/8, error -71 [ 294.537749][ T4931] usb usb1-port1: unable to enumerate USB device [ 295.264292][ T4942] FAULT_INJECTION: forcing a failure. [ 295.264292][ T4942] name failslab, interval 1, probability 0, space 0, times 0 [ 295.264844][ T4942] CPU: 0 UID: 0 PID: 4942 Comm: syz.1.365 Not tainted 6.12.0-rc2-syzkaller #0 [ 295.266143][ T4942] Hardware name: ARM-Versatile Express [ 295.266599][ T4942] Call trace: [ 295.266768][ T4942] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 295.271971][ T4942] r7:00000d40 r6:8484f928 r5:60000013 r4:8203d408 [ 295.272333][ T4942] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 295.275050][ T4942] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 295.275590][ T4942] r5:00000000 r4:8271925c [ 295.276978][ T4942] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 295.277499][ T4942] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 295.282194][ T4942] r6:8484f928 r5:0000002a r4:82c01240 [ 295.282444][ T4942] [<804e81ac>] (should_failslab) from [<804cd638>] (__kmalloc_noprof+0x9c/0x458) [ 295.285791][ T4942] [<804cd59c>] (__kmalloc_noprof) from [<80750ef0>] (tomoyo_encode2+0x64/0xf0) [ 295.286475][ T4942] r10:00000fff r9:84158c00 r8:00000000 r7:84c41660 r6:8484f928 r5:84748ffc [ 295.287797][ T4942] r4:84748fdd [ 295.287947][ T4942] [<80750e8c>] (tomoyo_encode2) from [<80750fa0>] (tomoyo_encode+0x24/0x30) [ 295.288300][ T4942] r9:84158c00 r8:00000000 r7:84c41660 r6:8484f928 r5:00001000 r4:84748fde [ 295.289955][ T4942] [<80750f7c>] (tomoyo_encode) from [<8075102c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 295.294469][ T4942] r5:00001000 r4:84748000 [ 295.296803][ T4942] [<80750fac>] (tomoyo_realpath_from_path) from [<8074d3dc>] (tomoyo_check_open_permission+0x150/0x1c0) [ 295.297688][ T4942] r10:00000000 r9:00000006 r8:844abdc0 r7:00000002 r6:00000000 r5:8484f928 [ 295.298874][ T4942] r4:00000001 r3:00000001 [ 295.299126][ T4942] [<8074d28c>] (tomoyo_check_open_permission) from [<80751e7c>] (tomoyo_file_open+0x34/0x38) [ 295.301912][ T4942] r9:8484f900 r8:8484f928 r7:00000000 r6:832fc848 r5:81a22d88 r4:8484f900 [ 295.302529][ T4942] [<80751e48>] (tomoyo_file_open) from [<8070fb80>] (security_file_open+0xe8/0x344) [ 295.308055][ T4942] r5:81a22d88 r4:8484f900 [ 295.308250][ T4942] [<8070fa98>] (security_file_open) from [<80510b88>] (do_dentry_open+0xe4/0x4c0) [ 295.308789][ T4942] r4:8484f900 [ 295.308930][ T4942] [<80510aa4>] (do_dentry_open) from [<80512a5c>] (vfs_open+0x2c/0xec) [ 295.309870][ T4942] r9:8484f900 r8:dfc31e58 r7:00000000 r6:8484f928 r5:8271f3f4 r4:8484f900 [ 295.310662][ T4942] [<80512a30>] (vfs_open) from [<8052b180>] (path_openat+0x770/0x11a4) [ 295.314340][ T4942] r6:dfc31f20 r5:8271f3f4 r4:00000002 [ 295.319399][ T4942] [<8052aa10>] (path_openat) from [<8052bc50>] (do_filp_open+0x9c/0x138) [ 295.319818][ T4942] r10:00000142 r9:836b5400 r8:00000001 r7:dfc31e58 r6:dfc31f20 r5:836b5400 [ 295.320342][ T4942] r4:82e4c000 [ 295.320574][ T4942] [<8052bbb4>] (do_filp_open) from [<80512f08>] (do_sys_openat2+0xbc/0xe4) [ 295.320886][ T4942] r8:8020029c r7:00000004 r6:00000006 r5:dfc31f58 r4:82e4c000 [ 295.321089][ T4942] [<80512e4c>] (do_sys_openat2) from [<80513310>] (sys_openat+0x98/0xd4) [ 295.321321][ T4942] r7:00000142 r6:00130e70 r5:20000080 r4:00000004 [ 295.321524][ T4942] [<80513278>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 295.321800][ T4942] Exception stack(0xdfc31fa8 to 0xdfc31ff0) [ 295.322174][ T4942] 1fa0: 00000000 00000000 00000004 20000080 00000002 00000000 [ 295.322530][ T4942] 1fc0: 00000000 00000000 00130e70 00000142 00000000 00006364 003d0f00 76b550bc [ 295.322973][ T4942] 1fe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 295.324370][ T4942] r5:00000000 r4:00000000 [ 295.335730][ T4942] ERROR: Out of memory at tomoyo_realpath_from_path. [ 299.247609][ T4955] serio: Serial port pts0 [ 301.688596][ T31] audit: type=1400 audit(301.610:202): avc: denied { create } for pid=4964 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 301.898845][ T31] audit: type=1400 audit(301.820:203): avc: denied { ioctl } for pid=4968 comm="syz.1.374" path="socket:[4923]" dev="sockfs" ino=4923 ioctlcmd=0x4c0a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 302.511596][ T4973] FAULT_INJECTION: forcing a failure. [ 302.511596][ T4973] name failslab, interval 1, probability 0, space 0, times 0 [ 302.513718][ T4973] CPU: 0 UID: 0 PID: 4973 Comm: syz.1.375 Not tainted 6.12.0-rc2-syzkaller #0 [ 302.514269][ T4973] Hardware name: ARM-Versatile Express [ 302.514525][ T4973] Call trace: [ 302.514747][ T4973] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 302.515171][ T4973] r7:00000c40 r6:dfbe9efc r5:60000013 r4:8203d408 [ 302.515480][ T4973] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 302.515836][ T4973] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 302.516214][ T4973] r5:00000000 r4:8271925c [ 302.516414][ T4973] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 302.516761][ T4973] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 302.517134][ T4973] r6:dfbe9efc r5:00001000 r4:82c016c0 [ 302.517370][ T4973] [<804e81ac>] (should_failslab) from [<804cd638>] (__kmalloc_noprof+0x9c/0x458) [ 302.517776][ T4973] [<804cd59c>] (__kmalloc_noprof) from [<80750fe8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 302.518306][ T4973] r10:00000028 r9:84b75800 r8:00000000 r7:84c41110 r6:dfbe9efc r5:00001000 [ 302.518704][ T4973] r4:00000000 [ 302.519042][ T4973] [<80750fac>] (tomoyo_realpath_from_path) from [<8074d530>] (tomoyo_path_perm+0xe4/0x200) [ 302.520159][ T4973] r10:00000028 r9:00000002 r8:00000001 r7:00000000 r6:00000006 r5:00000000 [ 302.520545][ T4973] r4:00000000 r3:00000000 [ 302.520937][ T4973] [<8074d44c>] (tomoyo_path_perm) from [<807518cc>] (tomoyo_path_rmdir+0x40/0x64) [ 302.521359][ T4973] r8:00000000 r7:ffffff9c r6:82e4e000 r5:84c41110 r4:00000000 [ 302.521702][ T4973] [<8075188c>] (tomoyo_path_rmdir) from [<80709cd8>] (security_path_rmdir+0x90/0x1d4) [ 302.523000][ T4973] r4:dfbe9f50 [ 302.523274][ T4973] [<80709c48>] (security_path_rmdir) from [<8052c1ec>] (do_rmdir+0x140/0x1a8) [ 302.523656][ T4973] r5:00000000 r4:84c41110 [ 302.523909][ T4973] [<8052c0ac>] (do_rmdir) from [<8052c274>] (sys_rmdir+0x20/0x24) [ 302.524269][ T4973] r9:8496e000 r8:8020029c r7:00000028 r6:00130e70 r5:00000000 r4:00000000 [ 302.525285][ T4973] [<8052c254>] (sys_rmdir) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 302.525747][ T4973] Exception stack(0xdfbe9fa8 to 0xdfbe9ff0) [ 302.526059][ T4973] 9fa0: 00000000 00000000 20000200 00000000 00000000 00000000 [ 302.526449][ T4973] 9fc0: 00000000 00000000 00130e70 00000028 00000000 00006364 003d0f00 76b340bc [ 302.526827][ T4973] 9fe0: 76b33ec0 76b33eb0 00018af8 00132ec0 [ 302.531725][ T4973] ERROR: Out of memory at tomoyo_realpath_from_path. [ 302.558066][ T31] audit: type=1400 audit(302.480:204): avc: denied { remove_name } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 302.559094][ T31] audit: type=1400 audit(302.480:205): avc: denied { rename } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 302.766698][ T4978] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 302.776508][ T4978] FAULT_INJECTION: forcing a failure. [ 302.776508][ T4978] name failslab, interval 1, probability 0, space 0, times 0 [ 302.777145][ T4978] CPU: 1 UID: 0 PID: 4978 Comm: syz.0.376 Not tainted 6.12.0-rc2-syzkaller #0 [ 302.777480][ T4978] Hardware name: ARM-Versatile Express [ 302.777746][ T4978] Call trace: [ 302.777953][ T4978] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 302.778321][ T4978] r7:84926c00 r6:00000cc0 r5:60000113 r4:8203d408 [ 302.778585][ T4978] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 302.778933][ T4978] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 302.779267][ T4978] r5:00000000 r4:8271925c [ 302.779465][ T4978] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 302.779808][ T4978] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 302.780143][ T4978] r6:00000cc0 r5:8504fc60 r4:82c02e40 [ 302.780339][ T4978] [<804e81ac>] (should_failslab) from [<804cd2b4>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 302.780699][ T4978] [<804cd268>] (kmem_cache_alloc_noprof) from [<804a9d00>] (__anon_vma_prepare+0x34/0x1b0) [ 302.781086][ T4978] r10:dfb05db8 r9:83f4d200 r8:828c1b20 r7:83f4d200 r6:8504fc60 r5:8504fc60 [ 302.781507][ T4978] r4:dfb05c98 [ 302.781731][ T4978] [<804a9ccc>] (__anon_vma_prepare) from [<80490c98>] (__vmf_anon_prepare+0x5c/0xcc) [ 302.782639][ T4978] r10:dfb05db8 r9:83f4d200 r8:00000001 r7:00000000 r6:20000000 r5:8504fc60 [ 302.783135][ T4978] r4:dfb05c98 r3:00000215 [ 302.783346][ T4978] [<80490c3c>] (__vmf_anon_prepare) from [<804949b4>] (handle_mm_fault+0xcc8/0x1348) [ 302.783886][ T4978] r7:00000000 r6:20000000 r5:84926c00 r4:00000215 [ 302.784368][ T4978] [<80493cec>] (handle_mm_fault) from [<802141b4>] (do_page_fault+0xec/0x3d8) [ 302.785035][ T4978] r10:00000002 r9:83f4d200 r8:00000215 r7:20000000 r6:00000a06 r5:200000c0 [ 302.785693][ T4978] r4:dfb05db8 [ 302.785900][ T4978] [<802140c8>] (do_page_fault) from [<80214620>] (do_translation_fault+0xfc/0x12c) [ 302.786365][ T4978] r10:000000c5 r9:84926c00 r8:80214524 r7:dfb05db8 r6:200000c0 r5:00000a06 [ 302.786694][ T4978] r4:8261d1ac [ 302.786890][ T4978] [<80214524>] (do_translation_fault) from [<80214688>] (do_DataAbort+0x38/0xa8) [ 302.787292][ T4978] r9:84926c00 r8:80214524 r7:dfb05db8 r6:200000c0 r5:00000a06 r4:8261d1ac [ 302.787662][ T4978] [<80214650>] (do_DataAbort) from [<80200b0c>] (__dabt_svc+0x4c/0x80) [ 302.788035][ T4978] Exception stack(0xdfb05db8 to 0xdfb05e00) [ 302.788304][ T4978] 5da0: 200000c0 dfb05e50 [ 302.788669][ T4978] 5dc0: ffffffc8 00000009 00000000 00000000 00001346 00000000 0000c1ff 00000001 [ 302.789040][ T4978] 5de0: 000000c5 dfb05ebc 00000000 dfb05e0c 00000000 81968bc0 a0000013 ffffffff [ 302.789395][ T4978] r8:0000c1ff r7:dfb05dec r6:ffffffff r5:a0000013 r4:81968bc0 [ 302.789756][ T4978] [<8051d69c>] (cp_new_stat64) from [<8051dd4c>] (__do_sys_fstat64+0x78/0x80) [ 302.790153][ T4978] r7:000000c5 r6:00130e70 r5:200000c0 r4:00000003 [ 302.790431][ T4978] [<8051dcd4>] (__do_sys_fstat64) from [<8051e1c0>] (sys_fstat64+0x10/0x14) [ 302.790801][ T4978] r5:00000000 r4:00000000 [ 302.791011][ T4978] [<8051e1b0>] (sys_fstat64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 302.791469][ T4978] Exception stack(0xdfb05fa8 to 0xdfb05ff0) [ 302.791775][ T4978] 5fa0: 00000000 00000000 00000003 200000c0 00000000 00000000 [ 302.792859][ T4978] 5fc0: 00000000 00000000 00130e70 000000c5 00000000 00006364 003d0f00 76b770bc [ 302.793632][ T4978] 5fe0: 76b76ec0 76b76eb0 00018af8 00132ec0 [ 303.417830][ T31] audit: type=1400 audit(303.340:206): avc: denied { getopt } for pid=4990 comm="syz.1.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 303.487670][ T31] audit: type=1400 audit(303.410:207): avc: denied { write } for pid=4990 comm="syz.1.382" name="kcm" dev="proc" ino=4026532827 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 303.737911][ T5001] FAULT_INJECTION: forcing a failure. [ 303.737911][ T5001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.741244][ T5001] CPU: 1 UID: 0 PID: 5001 Comm: syz.1.383 Not tainted 6.12.0-rc2-syzkaller #0 [ 303.741704][ T5001] Hardware name: ARM-Versatile Express [ 303.742237][ T5001] Call trace: [ 303.742880][ T5001] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 303.743490][ T5001] r7:830af900 r6:83ef8000 r5:60000013 r4:8203d408 [ 303.743773][ T5001] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 303.744164][ T5001] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 303.744507][ T5001] r5:00000000 r4:8274e844 [ 303.744699][ T5001] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 303.745057][ T5001] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 303.745390][ T5001] r6:83ef8000 r5:20001200 r4:000089f3 [ 303.745639][ T5001] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 303.745993][ T5001] [<808e54f4>] (should_fail_usercopy) from [<81484d78>] (sock_ioctl+0x3a8/0x608) [ 303.746360][ T5001] [<814849d0>] (sock_ioctl) from [<8052f6e4>] (sys_ioctl+0x134/0xda8) [ 303.746984][ T5001] r9:850df540 r8:00000006 r7:20001200 r6:850df541 r5:00000000 r4:000089f3 [ 303.747572][ T5001] [<8052f5b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 303.747978][ T5001] Exception stack(0xdfb81fa8 to 0xdfb81ff0) [ 303.748260][ T5001] 1fa0: 00000000 00000000 00000006 000089f3 20001200 00000000 [ 303.748615][ T5001] 1fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b550bc [ 303.748948][ T5001] 1fe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 303.749197][ T5001] r10:00000036 r9:836b1800 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 303.749515][ T5001] r4:00000000 [ 304.209717][ T31] audit: type=1400 audit(304.130:208): avc: denied { create } for pid=5008 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 304.229036][ T5011] FAULT_INJECTION: forcing a failure. [ 304.229036][ T5011] name failslab, interval 1, probability 0, space 0, times 0 [ 304.231639][ T5011] CPU: 1 UID: 0 PID: 5011 Comm: syz.1.388 Not tainted 6.12.0-rc2-syzkaller #0 [ 304.235272][ T5011] Hardware name: ARM-Versatile Express [ 304.237370][ T5011] Call trace: [ 304.237703][ T5011] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 304.240843][ T5011] r7:836b1800 r6:00000cc0 r5:60000013 r4:8203d408 [ 304.241941][ T5011] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 304.242282][ T5011] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 304.242768][ T5011] r5:00000000 r4:8271925c [ 304.243013][ T5011] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 304.243642][ T5011] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 304.244170][ T5011] r6:00000cc0 r5:20000080 r4:82ca8b40 [ 304.244427][ T5011] [<804e81ac>] (should_failslab) from [<804cd2b4>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 304.244958][ T5011] [<804cd268>] (kmem_cache_alloc_noprof) from [<80524fc4>] (getname_flags.part.0+0x28/0x18c) [ 304.245597][ T5011] r10:0000000f r9:836b1800 r8:8020029c r7:00000001 r6:8223783c r5:20000080 [ 304.246009][ T5011] r4:20000080 [ 304.246231][ T5011] [<80524f9c>] (getname_flags.part.0) from [<8052a080>] (getname_flags+0x3c/0x50) [ 304.246768][ T5011] r9:836b1800 r8:8020029c r7:00000002 r6:ffffff9c r5:00000001 r4:20000080 [ 304.247089][ T5011] [<8052a044>] (getname_flags) from [<8052a5e8>] (user_path_at+0x2c/0x64) [ 304.247695][ T5011] r5:00000001 r4:dfb79f7c [ 304.248172][ T5011] [<8052a5bc>] (user_path_at) from [<80512388>] (sys_chmod+0x4c/0xb0) [ 304.248554][ T5011] r6:20000080 r5:00000000 r4:00000000 [ 304.248788][ T5011] [<8051233c>] (sys_chmod) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 304.249173][ T5011] Exception stack(0xdfb79fa8 to 0xdfb79ff0) [ 304.249555][ T5011] 9fa0: 00000000 00000000 20000080 00000000 00000000 00000000 [ 304.250046][ T5011] 9fc0: 00000000 00000000 00130e70 0000000f 00000000 00006364 003d0f00 76b550bc [ 304.250372][ T5011] 9fe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 304.250670][ T5011] r7:0000000f r6:00130e70 r5:00000000 r4:00000000 [ 305.383068][ T5035] FAULT_INJECTION: forcing a failure. [ 305.383068][ T5035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.383750][ T5035] CPU: 1 UID: 0 PID: 5035 Comm: syz.1.395 Not tainted 6.12.0-rc2-syzkaller #0 [ 305.384101][ T5035] Hardware name: ARM-Versatile Express [ 305.384329][ T5035] Call trace: [ 305.384547][ T5035] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 305.385720][ T5035] r7:845423a3 r6:00000000 r5:60000013 r4:8203d408 [ 305.386347][ T5035] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 305.387106][ T5035] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 305.388253][ T5035] r5:00000000 r4:8274e844 [ 305.388473][ T5035] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 305.388854][ T5035] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 305.389224][ T5035] r6:00000000 r5:dfc75ea8 r4:00000020 [ 305.389476][ T5035] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 305.389887][ T5035] [<808e54f4>] (should_fail_usercopy) from [<8083a33c>] (_copy_from_iter+0x68/0x7c8) [ 305.390274][ T5035] [<8083a2d4>] (_copy_from_iter) from [<8182ca6c>] (isotp_sendmsg+0x25c/0x7fc) [ 305.390653][ T5035] r10:dfc75e98 r9:845423a3 r8:dfc75ea8 r7:00000020 r6:84540000 r5:84542000 [ 305.390975][ T5035] r4:00000000 [ 305.391158][ T5035] [<8182c810>] (isotp_sendmsg) from [<81483828>] (__sock_sendmsg+0x44/0x78) [ 305.391532][ T5035] r10:00000122 r9:83f32400 r8:00000004 r7:830aec80 r6:830aec80 r5:dfc75e98 [ 305.391865][ T5035] r4:00000000 [ 305.392342][ T5035] [<814837e4>] (__sock_sendmsg) from [<81485e80>] (__sys_sendto+0x108/0x14c) [ 305.393013][ T5035] r7:830aec80 r6:76b53e1c r5:00000000 r4:00000000 [ 305.393329][ T5035] [<81485d78>] (__sys_sendto) from [<81485ee0>] (sys_sendto+0x1c/0x24) [ 305.393814][ T5035] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b53e1c [ 305.394110][ T5035] [<81485ec4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 305.394485][ T5035] Exception stack(0xdfc75fa8 to 0xdfc75ff0) [ 305.394756][ T5035] 5fa0: 76b53e1c 0000000c 00000004 76b53eb0 00000020 00000000 [ 305.395121][ T5035] 5fc0: 76b53e1c 0000000c 00000000 00000122 00000004 00000000 76b53eb0 76b550bc [ 305.395480][ T5035] 5fe0: 00000000 76b53df0 000d8408 00135358 [ 306.099439][ T31] audit: type=1400 audit(306.020:209): avc: denied { create } for pid=5042 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 306.114070][ T31] audit: type=1400 audit(306.040:210): avc: denied { setopt } for pid=5042 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 306.120264][ T31] audit: type=1400 audit(306.040:211): avc: denied { ioctl } for pid=5042 comm="syz.1.399" path="socket:[5064]" dev="sockfs" ino=5064 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 308.169213][ T5063] block nbd0: shutting down sockets [ 309.615472][ T5083] serio: Serial port pts0 [ 310.120417][ T31] audit: type=1400 audit(310.040:212): avc: denied { ioctl } for pid=5082 comm="syz.0.410" path="socket:[6182]" dev="sockfs" ino=6182 ioctlcmd=0x4b33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 310.924706][ T31] audit: type=1400 audit(310.850:213): avc: denied { read } for pid=5105 comm="syz.1.417" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 310.925480][ T31] audit: type=1400 audit(310.850:214): avc: denied { open } for pid=5105 comm="syz.1.417" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 310.927291][ T31] audit: type=1400 audit(310.850:215): avc: denied { ioctl } for pid=5105 comm="syz.1.417" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 313.593652][ T4876] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 313.753272][ T4876] usb 1-1: Using ep0 maxpacket: 8 [ 313.769766][ T4876] usb 1-1: unable to get BOS descriptor or descriptor too short [ 313.785771][ T4876] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 313.786407][ T4876] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 313.786901][ T4876] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 313.804144][ T4876] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.07 [ 313.804910][ T4876] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 313.805459][ T4876] usb 1-1: Product: syz [ 313.805739][ T4876] usb 1-1: Manufacturer: syz [ 313.805963][ T4876] usb 1-1: SerialNumber: syz [ 313.989920][ T31] audit: type=1326 audit(313.910:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5127 comm="syz.1.423" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 314.071092][ T4876] usb 1-1: 0:2 : does not exist [ 314.089700][ T4876] usb 1-1: USB disconnect, device number 10 [ 319.020681][ T31] audit: type=1400 audit(318.940:217): avc: denied { getopt } for pid=5165 comm="syz.0.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 319.099566][ T5170] fuse: Bad value for 'fd' [ 319.114083][ T31] audit: type=1326 audit(319.040:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5169 comm="syz.0.430" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 320.012752][ T31] audit: type=1400 audit(319.930:219): avc: denied { write } for pid=5174 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 321.934658][ T5192] FAULT_INJECTION: forcing a failure. [ 321.934658][ T5192] name failslab, interval 1, probability 0, space 0, times 0 [ 321.935311][ T5192] CPU: 0 UID: 0 PID: 5192 Comm: syz.1.434 Not tainted 6.12.0-rc2-syzkaller #0 [ 321.935662][ T5192] Hardware name: ARM-Versatile Express [ 321.935895][ T5192] Call trace: [ 321.936096][ T5192] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 321.936625][ T5192] r7:8496ec00 r6:00000d40 r5:60000013 r4:8203d408 [ 321.936891][ T5192] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 321.937239][ T5192] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 321.937636][ T5192] r5:00000000 r4:8271925c [ 321.937841][ T5192] [<819b778c>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 321.938318][ T5192] [<808e5300>] (should_fail_ex) from [<804e8218>] (should_failslab+0x6c/0x94) [ 321.938746][ T5192] r6:00000d40 r5:832ffb80 r4:82ca86c0 [ 321.939006][ T5192] [<804e81ac>] (should_failslab) from [<804cd2b4>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 321.939502][ T5192] [<804cd268>] (kmem_cache_alloc_noprof) from [<80709728>] (security_inode_alloc+0x30/0x1e8) [ 321.939909][ T5192] r10:832ffc88 r9:00000000 r8:00000000 r7:84acf000 r6:81a1cd84 r5:832ffb80 [ 321.940215][ T5192] r4:832ffb80 [ 321.940375][ T5192] [<807096f8>] (security_inode_alloc) from [<805384c8>] (inode_init_always_gfp+0x170/0x1c4) [ 321.940760][ T5192] r5:00000000 r4:832ffb80 [ 321.940964][ T5192] [<80538358>] (inode_init_always_gfp) from [<8053a2b0>] (alloc_inode+0x40/0xcc) [ 321.941330][ T5192] r10:e0489ce4 r9:e0489d10 r8:806cf0fc r7:806cf12c r6:81ac9bf0 r5:84acf000 [ 321.941710][ T5192] r4:832ffb80 [ 321.942062][ T5192] [<8053a270>] (alloc_inode) from [<8053b824>] (iget5_locked+0x44/0x84) [ 321.942432][ T5192] r7:806cf12c r6:00000005 r5:84acf000 r4:00000000 [ 321.942947][ T5192] [<8053b7e0>] (iget5_locked) from [<806d1a88>] (fuse_iget+0x60/0x254) [ 321.943358][ T5192] r8:00000000 r7:e0489bd8 r6:806cf12c r5:806cf0fc r4:84acf000 [ 321.943883][ T5192] [<806d1a28>] (fuse_iget) from [<806c68f4>] (fuse_lookup_name+0x148/0x260) [ 321.944518][ T5192] r10:e0489ce4 r9:850ee300 r8:00000005 r7:00000000 r6:00000000 r5:84acf000 [ 321.944861][ T5192] r4:e0489ce8 [ 321.945197][ T5192] [<806c67ac>] (fuse_lookup_name) from [<806c6a8c>] (fuse_lookup+0x80/0x160) [ 321.945703][ T5192] r10:84c43770 r9:00000000 r8:00000001 r7:00000000 r6:84c43770 r5:8331ec80 [ 321.946032][ T5192] r4:8484f300 [ 321.946224][ T5192] [<806c6a0c>] (fuse_lookup) from [<806c6c58>] (fuse_atomic_open+0xec/0x188) [ 321.946744][ T5192] r8:8271f3f4 r7:84af2800 r6:e0489f20 r5:8331ec80 r4:8484f300 [ 321.947087][ T5192] [<806c6b6c>] (fuse_atomic_open) from [<8052b58c>] (path_openat+0xb7c/0x11a4) [ 321.947671][ T5192] r10:00000000 r9:8484f300 r8:e0489e58 r7:806c6b6c r6:e0489f20 r5:84c43770 [ 321.948188][ T5192] r4:84c47550 [ 321.948372][ T5192] [<8052aa10>] (path_openat) from [<8052bc50>] (do_filp_open+0x9c/0x138) [ 321.948837][ T5192] r10:00000005 r9:8496ec00 r8:00000001 r7:e0489e58 r6:e0489f20 r5:8496ec00 [ 321.949166][ T5192] r4:82e4d000 [ 321.950236][ T5192] [<8052bbb4>] (do_filp_open) from [<80512f08>] (do_sys_openat2+0xbc/0xe4) [ 321.950688][ T5192] r8:8020029c r7:ffffff9c r6:00000005 r5:e0489f58 r4:82e4d000 [ 321.951313][ T5192] [<80512e4c>] (do_sys_openat2) from [<8051323c>] (sys_open+0x94/0xd0) [ 321.952066][ T5192] r7:00000005 r6:00130e70 r5:00000000 r4:200001c0 [ 321.952620][ T5192] [<805131a8>] (sys_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 321.952910][ T5192] Exception stack(0xe0489fa8 to 0xe0489ff0) [ 321.953126][ T5192] 9fa0: 00000000 00000000 200001c0 00000000 00000000 00000000 [ 321.954159][ T5192] 9fc0: 00000000 00000000 00130e70 00000005 00000000 00006364 003d0f00 76b340bc [ 321.954614][ T5192] 9fe0: 76b33ec0 76b33eb0 00018af8 00132ec0 [ 321.954922][ T5192] r5:00000000 r4:00000000 [ 323.072933][ T31] audit: type=1400 audit(322.980:220): avc: denied { name_bind } for pid=5214 comm="syz.1.438" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 323.073732][ T31] audit: type=1400 audit(322.980:221): avc: denied { node_bind } for pid=5214 comm="syz.1.438" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 324.633948][ T5230] fuse: Bad value for 'fd' [ 324.675573][ T31] audit: type=1326 audit(324.600:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5229 comm="syz.0.439" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 328.317413][ T31] audit: type=1400 audit(328.240:223): avc: denied { mounton } for pid=5238 comm="syz.1.442" path="/230/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 328.323393][ T5241] fuseblk: Invalid rootmode [ 329.364071][ T5256] fuse: Unknown parameter '' [ 330.230934][ T31] audit: type=1400 audit(330.150:224): avc: denied { block_suspend } for pid=5259 comm="syz.1.449" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 330.238885][ T31] audit: type=1400 audit(330.160:225): avc: denied { write } for pid=5259 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 332.362567][ T31] audit: type=1400 audit(332.280:226): avc: denied { accept } for pid=5274 comm="syz.1.453" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 332.670957][ T31] audit: type=1326 audit(332.590:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5285 comm="syz.1.456" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 336.875820][ T5304] syz.0.463 uses obsolete (PF_INET,SOCK_PACKET) [ 337.340686][ T31] audit: type=1400 audit(337.260:228): avc: denied { connect } for pid=5309 comm="syz.0.464" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 337.959033][ T5312] block device autoloading is deprecated and will be removed. [ 337.963381][ T5312] syz.0.465: attempt to access beyond end of device [ 337.963381][ T5312] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 338.291578][ T31] audit: type=1326 audit(338.210:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.295279][ T31] audit: type=1326 audit(338.220:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.299827][ T31] audit: type=1326 audit(338.220:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.301515][ T31] audit: type=1326 audit(338.220:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.309747][ T31] audit: type=1326 audit(338.230:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.310760][ T31] audit: type=1326 audit(338.230:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=433 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.311530][ T31] audit: type=1326 audit(338.230:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.314700][ T31] audit: type=1326 audit(338.230:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 338.319970][ T31] audit: type=1326 audit(338.230:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5311 comm="syz.0.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 345.471626][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 345.471736][ T31] audit: type=1400 audit(345.390:249): avc: denied { connect } for pid=5352 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.399085][ T5367] netlink: 8 bytes leftover after parsing attributes in process `syz.0.481'. [ 349.746995][ T4206] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 349.912934][ T4206] usb 1-1: Using ep0 maxpacket: 8 [ 349.952803][ T4206] usb 1-1: config 0 has no interfaces? [ 349.994981][ T4206] usb 1-1: New USB device found, idVendor=046d, idProduct=08ad, bcdDevice=45.03 [ 349.995284][ T4206] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 349.995580][ T4206] usb 1-1: Product: syz [ 349.995683][ T4206] usb 1-1: Manufacturer: syz [ 349.995799][ T4206] usb 1-1: SerialNumber: syz [ 350.054842][ T4206] usb 1-1: config 0 descriptor?? [ 350.314732][ T4894] usb 1-1: USB disconnect, device number 11 [ 350.696286][ T4876] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 350.873302][ T4876] usb 2-1: Using ep0 maxpacket: 32 [ 350.914118][ T4876] usb 2-1: config index 0 descriptor too short (expected 156, got 27) [ 350.914716][ T4876] usb 2-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 350.915350][ T4876] usb 2-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 350.915826][ T4876] usb 2-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 350.916325][ T4876] usb 2-1: config 0 interface 0 has no altsetting 0 [ 350.996678][ T4876] usb 2-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 350.999706][ T4876] usb 2-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 351.000281][ T4876] usb 2-1: Product: syz [ 351.000540][ T4876] usb 2-1: Manufacturer: syz [ 351.012742][ T4876] usb 2-1: SerialNumber: syz [ 351.017025][ T4876] usb 2-1: config 0 descriptor?? [ 351.024458][ T4876] ldusb 2-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 351.034739][ T4876] ldusb 2-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 351.300014][ T4876] usb 2-1: USB disconnect, device number 2 [ 351.304644][ T4876] ldusb 2-1:0.0: LD USB Device #0 now disconnected [ 356.001551][ T31] audit: type=1400 audit(355.900:250): avc: denied { setopt } for pid=5442 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 358.362603][ T4876] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 358.522500][ T4876] usb 2-1: Using ep0 maxpacket: 8 [ 358.527869][ T4876] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 358.528370][ T4876] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 358.531126][ T4876] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 358.545911][ T4876] usb 2-1: config 0 descriptor?? [ 358.569907][ T4876] iowarrior 2-1:0.0: no interrupt-in endpoint found [ 368.640183][ T5480] netlink: 40 bytes leftover after parsing attributes in process `syz.0.507'. [ 368.682894][ T31] audit: type=1400 audit(368.610:251): avc: denied { setopt } for pid=5479 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 368.854931][ T31] audit: type=1400 audit(368.780:252): avc: denied { write } for pid=5483 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 368.855889][ T5484] netlink: 144 bytes leftover after parsing attributes in process `syz.0.509'. [ 368.856403][ T31] audit: type=1400 audit(368.780:253): avc: denied { nlmsg_write } for pid=5483 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 369.222970][ T24] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 369.382683][ T24] usb 1-1: Using ep0 maxpacket: 16 [ 369.405693][ T24] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 369.406216][ T24] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 369.406537][ T24] usb 1-1: Product: syz [ 369.406756][ T24] usb 1-1: Manufacturer: syz [ 369.406974][ T24] usb 1-1: SerialNumber: syz [ 369.420755][ T24] r8152-cfgselector 1-1: Unknown version 0x0000 [ 369.421340][ T24] r8152-cfgselector 1-1: config 0 descriptor?? [ 369.866788][ T4894] r8152-cfgselector 1-1: USB disconnect, device number 12 [ 369.961433][ T5500] capability: warning: `syz.0.511' uses deprecated v2 capabilities in a way that may be insecure [ 370.302773][ T24] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 370.457914][ T24] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x6 has invalid wMaxPacketSize 0 [ 370.468998][ T24] usb 1-1: New USB device found, idVendor=04d8, idProduct=fd08, bcdDevice=4c.b3 [ 370.469713][ T24] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 370.470756][ T24] usb 1-1: Product: syz [ 370.470960][ T24] usb 1-1: Manufacturer: syz [ 370.471149][ T24] usb 1-1: SerialNumber: syz [ 370.476391][ T24] usb 1-1: config 0 descriptor?? [ 370.484354][ T24] ir_toy 1-1:0.0: required endpoints not found [ 370.690093][ T4871] usb 1-1: USB disconnect, device number 13 [ 372.385100][ T4653] usb 2-1: USB disconnect, device number 3 [ 373.544526][ T31] audit: type=1400 audit(373.470:254): avc: denied { bind } for pid=5529 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 373.547267][ T31] audit: type=1400 audit(373.470:255): avc: denied { listen } for pid=5529 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 373.553486][ T31] audit: type=1400 audit(373.470:256): avc: denied { connect } for pid=5529 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 373.563794][ T31] audit: type=1400 audit(373.490:257): avc: denied { accept } for pid=5529 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 373.566966][ T31] audit: type=1400 audit(373.490:258): avc: denied { read } for pid=5529 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 373.623893][ T31] audit: type=1400 audit(373.550:259): avc: denied { execute } for pid=5531 comm="syz.0.517" name="file2" dev="tmpfs" ino=1348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 373.633622][ T5532] process 'syz.0.517' launched './file2' with NULL argv: empty string added [ 373.637731][ T31] audit: type=1400 audit(373.560:260): avc: denied { execute_no_trans } for pid=5531 comm="syz.0.517" path="/252/file2" dev="tmpfs" ino=1348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 373.700930][ T31] audit: type=1400 audit(373.620:261): avc: denied { create } for pid=5531 comm="syz.0.517" name="file7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 373.717150][ T31] audit: type=1400 audit(373.640:262): avc: denied { unlink } for pid=3117 comm="syz-executor" name="file7" dev="tmpfs" ino=1349 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 376.822795][ T4894] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 376.952922][ T4894] usb 1-1: device descriptor read/64, error -71 [ 377.192758][ T4894] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 377.322479][ T4894] usb 1-1: device descriptor read/64, error -71 [ 377.433696][ T4894] usb usb1-port1: attempt power cycle [ 377.782511][ T4894] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 377.803751][ T4894] usb 1-1: device descriptor read/8, error -71 [ 378.052814][ T4894] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 378.077187][ T4894] usb 1-1: device descriptor read/8, error -71 [ 378.190644][ T4894] usb usb1-port1: unable to enumerate USB device [ 380.138648][ T5557] netlink: 28 bytes leftover after parsing attributes in process `syz.1.523'. [ 380.223620][ T31] audit: type=1400 audit(380.150:263): avc: denied { bind } for pid=5558 comm="syz.1.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 380.961311][ T31] audit: type=1400 audit(380.880:264): avc: denied { view } for pid=5572 comm="syz.1.531" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 381.433085][ T4894] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 381.583227][ T4894] usb 2-1: Using ep0 maxpacket: 32 [ 381.589509][ T4894] usb 2-1: config 0 has an invalid interface number: 141 but max is 0 [ 381.590366][ T4894] usb 2-1: config 0 has no interface number 0 [ 381.590643][ T4894] usb 2-1: config 0 interface 141 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 381.591146][ T4894] usb 2-1: config 0 interface 141 altsetting 0 endpoint 0xD has invalid wMaxPacketSize 0 [ 381.602503][ T4894] usb 2-1: New USB device found, idVendor=0e6f, idProduct=582c, bcdDevice=31.68 [ 381.603002][ T4894] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 381.603294][ T4894] usb 2-1: Product: syz [ 381.603501][ T4894] usb 2-1: Manufacturer: syz [ 381.603714][ T4894] usb 2-1: SerialNumber: syz [ 381.610560][ T4894] usb 2-1: config 0 descriptor?? [ 381.820198][ T5577] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.533'. [ 381.875077][ T4894] usb 2-1: USB disconnect, device number 4 [ 382.600509][ T31] audit: type=1400 audit(382.520:265): avc: denied { connect } for pid=5596 comm="syz.1.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.612580][ T31] audit: type=1400 audit(382.530:266): avc: denied { write } for pid=5596 comm="syz.1.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.741814][ T5599] netlink: 4 bytes leftover after parsing attributes in process `syz.1.536'. [ 382.998687][ T5606] tun0: tun_chr_ioctl cmd 1074025680 [ 384.741657][ T31] audit: type=1400 audit(384.660:267): avc: denied { create } for pid=5622 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 384.747014][ T31] audit: type=1400 audit(384.670:268): avc: denied { write } for pid=5622 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 384.852621][ T31] audit: type=1400 audit(384.770:269): avc: denied { ioctl } for pid=5626 comm="syz.1.546" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8032 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 385.998589][ T5627] ------------[ cut here ]------------ [ 385.999196][ T5627] WARNING: CPU: 1 PID: 5627 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 386.000028][ T5627] Modules linked in: [ 386.001210][ T5627] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 386.001957][ T5627] CPU: 1 UID: 0 PID: 5627 Comm: syz.1.546 Not tainted 6.12.0-rc2-syzkaller #0 [ 386.002757][ T5627] Hardware name: ARM-Versatile Express [ 386.003578][ T5627] Call trace: [ 386.003866][ T5627] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 386.004638][ T5627] r7:00000000 r6:82622f44 r5:00000000 r4:8203d408 [ 386.005065][ T5627] [<819992bc>] (show_stack) from [<819b7764>] (dump_stack_lvl+0x54/0x7c) [ 386.005531][ T5627] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 386.005991][ T5627] r5:00000000 r4:82870d18 [ 386.006209][ T5627] [<819b778c>] (dump_stack) from [<81999e00>] (panic+0x120/0x374) [ 386.006586][ T5627] [<81999ce0>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 386.007087][ T5627] r3:8260c5c4 r2:00000001 r1:820257e8 r0:8202d250 [ 386.007387][ T5627] r7:8048c6b4 [ 386.007665][ T5627] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 386.008141][ T5627] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 386.008722][ T5627] r8:00000009 r7:82054e4c r6:dff51d24 r5:84788000 r4:00000000 [ 386.009025][ T5627] [<80242350>] (warn_slowpath_fmt) from [<8048c6b4>] (kunmap_local_indexed+0x20c/0x224) [ 386.009581][ T5627] r10:ffedc038 r9:83f4d200 r8:20508000 r7:00000000 r6:00000003 r5:84788000 [ 386.010145][ T5627] r4:ffedc000 [ 386.010333][ T5627] [<8048c4a8>] (kunmap_local_indexed) from [<80505ad8>] (move_pages+0x7e8/0x149c) [ 386.010926][ T5627] r7:00000000 r6:00044380 r5:defa937c r4:ffeda840 [ 386.011271][ T5627] [<805052f0>] (move_pages) from [<80581d18>] (userfaultfd_ioctl+0x114c/0x2080) [ 386.011698][ T5627] r10:83f4d200 r9:dff51e98 r8:00000001 r7:20c0a000 r6:00000000 r5:20000080 [ 386.012246][ T5627] r4:851b7000 [ 386.012498][ T5627] [<80580bcc>] (userfaultfd_ioctl) from [<8052f6e4>] (sys_ioctl+0x134/0xda8) [ 386.012933][ T5627] r10:84788000 r9:8507acc0 r8:00000005 r7:20000080 r6:8507acc1 r5:00000000 [ 386.013437][ T5627] r4:c028aa05 [ 386.013695][ T5627] [<8052f5b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 386.014230][ T5627] Exception stack(0xdff51fa8 to 0xdff51ff0) [ 386.014874][ T5627] 1fa0: 00000000 00000000 00000005 c028aa05 20000080 00000000 [ 386.015411][ T5627] 1fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b550bc [ 386.015901][ T5627] 1fe0: 76b54ec0 76b54eb0 00018af8 00132ec0 [ 386.016426][ T5627] r10:00000036 r9:84788000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 386.016948][ T5627] r4:00000000 [ 386.019125][ T5627] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:19:50 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000007 R02=7ee82170 R03=7ee8227c R04=00000008 R05=76fb0c80 R06=7ee8227c R07=0000019e R08=014cd730 R09=7ee821fc R10=7ee8227c R11=00000000 R12=7ee82170 R13=df971ff8 R14=76bb0e90 R15=76bb0e90 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83e60040 R01=00000030 R02=eb1c5000 R03=00000000 R04=82873423 R05=83e60040 R06=809e87b4 R07=82873479 R08=8287341c R09=0000005e R10=00000001 R11=dff51a40 R12=00000002 R13=dff51a34 R14=827584a4 R15=809e880c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000