last executing test programs: 12.787997831s ago: executing program 1 (id=1866): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x50, r0, 0xcfc51000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1a4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180500000000c6ea72b70000002020207b0af8ff00000000bd8dd700000000000701000000feffffb702000008000000b70300000000000085900000000900000095000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0xc, 0xa8e386d8303866ee, &(0x7f0000003e40)=""/217, 0x0, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe9f}, 0xfffffffffffffdd5) socket$nl_generic(0x10, 0x3, 0x10) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000dc0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000640)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000001800000018003080140001800800010002000000080004000000000008000300", @ANYRES32=r2, @ANYBLOB="5233a0e932fb31e886528684b7970860757b8459388caa86ce3fc0c6d6711d531fadce76c169c023353efcb0889b1c8e25cec98e90950300000000000000bda566c7042ea9e1272031e7b63ccc2a86502bf27a0bf3d3f1e5d280229f68a1be11ecb6179b6f3236b5946f7e5de2f9d19cd1094e0498"], 0x34}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000a0000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x10002, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r5}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0x2, r6}, 0x38) 12.23358456s ago: executing program 1 (id=1869): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x209d}, 0x10) write(r0, &(0x7f00000000c0)="1800000016005f0214fffffffffffff8070000000e000000", 0x18) syz_genetlink_get_family_id$gtp(0x0, r0) 12.041915098s ago: executing program 1 (id=1871): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000000202010400200000000000000a000000240002800c0002800500010000000000140001"], 0x38}}, 0x0) 11.816029678s ago: executing program 1 (id=1873): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, 0x0, 0x0) 11.632679225s ago: executing program 1 (id=1874): r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) connect$nfc_llcp(r1, &(0x7f0000000200)={0x27, 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4, "4f31c21339c2d03fd6f035678b8c5f1647066b072e8c4a2decf9231c955148bd45e65d48a8e73f16a6a9bb9afc743cab0f0a0f08160f3cec2278fd71083e64", 0x8000000006}, 0x60) 11.35304828s ago: executing program 1 (id=1875): r0 = memfd_create(&(0x7f0000000600)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\x00\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6\xef|\xa7\x8b\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e\xff\x7f\x00\x00\x00\x00\x00\x00C\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc0\xf5\x9b\xa0\b\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a>h*\xe4\xf7\xafb\xe2\xa8\x1c\x89\xef:\x05\x00\x00\x00\x00\x00\x00\x00\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02#\xd5\x10?K\x04\xb6\n\x04\x97\xb1d\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a\x97\x03\xa3\xd9\xa6\xca\xaf\xe8@\x01k\x8e\x9cd\xf7\x8c\a2\xc4\xce*d\xd3\xbb\xf1,5\xf4\x17\xd6\x13> \xe1\xaa\xb3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd0\xc5\"\x1f\xee\xb1\xce\xa7\xcc9\x15>\xf3\xfecH\xbb6\x99\xb3\xc2\x8dz)\xb3\xd0-{Z\x1eT\xa5\x93fu\x8b\xc7\xfd/6\xcd5\xafP9\xbc\xd1\x16\xc6\x92\xbd6k\x9e\xcf\xfe\xa2Q\xa5\xa4\xaa\x10\xa8\xcd\xbd7cN\xb3c\xe0/J\"H\x11\x84JY\x95\xf0^t\f\x88\x92O|\x9a}j\xcb\x93\x8e\xabZXv\xa6s\x87\xd2\xf7\xc7V$\xfcO\x0f\xf5a\xfb\x13MI\xf3\xda\xf1\x9e\x0fd\x00\x1c\xf7\xec&\xa2z\x1d\xd9\xd6\xa0~7\xbd9_r\xb3\xfcb2\xa3[\xe4]\xb2\xff.\x16\xd9v>\xc1d\xeb\x98\xc9*nC\x00\'\x11\x13\xc8\xc0\xac\xdc\x99,U)\xbf\x8c\xd4\x01DU\x17\xe1UO\x1cru!\xa9M\xa63\xf3\xef', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) msgctl$MSG_INFO(0x0, 0xc, 0x0) 651.413161ms ago: executing program 0 (id=1891): r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1ff, 0x8000) read$hidraw(r0, 0x0, 0x0) 563.281419ms ago: executing program 0 (id=1892): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x8, 0x0, 0x0) 562.907049ms ago: executing program 0 (id=1893): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r0, 0x5, 0xe, 0x0, &(0x7f0000000000)="259a53f271a76d2688634c6588a8", 0x0, 0x0, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 482.815936ms ago: executing program 0 (id=1894): socket$kcm(0xa, 0x922000000003, 0x11) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000002700)={&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x24, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 352.671508ms ago: executing program 0 (id=1895): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020031000b12d25a806f8c6394f90f24fc60040007000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 0s ago: executing program 0 (id=1896): socket(0x10, 0x3, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x20321, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) close(r4) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000e40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x110000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x80) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r6, 0x4018620d, &(0x7f0000000100)) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r8 = dup3(r7, r6, 0x0) r9 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r9, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r9, 0x4018620d, &(0x7f0000000040)) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000300)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000380)={0x4c, 0x0, &(0x7f0000000740)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)={@flat=@weak_handle, @flat=@weak_binder, @flat=@weak_handle={0x77682a85, 0x0, 0x66642a85}}, &(0x7f0000000240)={0x38, 0x18, 0x84}}}], 0x0, 0x0, 0x0}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) kernel console output (not intermixed with test programs): [ 34.068753][ T31] audit: type=1400 audit(34.010:68): avc: denied { read write } for pid=3094 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.078971][ T31] audit: type=1400 audit(34.020:69): avc: denied { open } for pid=3094 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:15578' (ED25519) to the list of known hosts. [ 42.943528][ T31] audit: type=1400 audit(42.890:70): avc: denied { name_bind } for pid=3101 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 44.619236][ T31] audit: type=1400 audit(44.570:71): avc: denied { execute } for pid=3103 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 44.634641][ T31] audit: type=1400 audit(44.570:72): avc: denied { execute_no_trans } for pid=3103 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 46.757930][ T31] audit: type=1400 audit(46.700:73): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 46.759916][ T31] audit: type=1400 audit(46.710:74): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.767383][ T3103] cgroup: Unknown subsys name 'net' [ 46.772029][ T31] audit: type=1400 audit(46.720:75): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.957526][ T3103] cgroup: Unknown subsys name 'hugetlb' [ 46.958860][ T3103] cgroup: Unknown subsys name 'rlimit' [ 47.166139][ T31] audit: type=1400 audit(47.110:76): avc: denied { setattr } for pid=3103 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.167118][ T31] audit: type=1400 audit(47.110:77): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 47.167743][ T31] audit: type=1400 audit(47.110:78): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.312970][ T3105] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 47.313809][ T31] audit: type=1400 audit(47.260:79): avc: denied { relabelto } for pid=3105 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 51.742827][ T3103] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.226307][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 53.226411][ T31] audit: type=1400 audit(53.170:83): avc: denied { execmem } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.289012][ T31] audit: type=1400 audit(53.230:84): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 53.289748][ T31] audit: type=1400 audit(53.230:85): avc: denied { mount } for pid=3109 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 53.290879][ T31] audit: type=1400 audit(53.240:86): avc: denied { read } for pid=3108 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 53.291373][ T31] audit: type=1400 audit(53.240:87): avc: denied { open } for pid=3108 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 53.294274][ T31] audit: type=1400 audit(53.240:88): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 53.306960][ T31] audit: type=1400 audit(53.250:89): avc: denied { module_request } for pid=3108 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 53.311242][ T31] audit: type=1400 audit(53.250:90): avc: denied { module_request } for pid=3109 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 53.359178][ T31] audit: type=1400 audit(53.310:91): avc: denied { sys_module } for pid=3108 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 53.887675][ T31] audit: type=1400 audit(53.830:92): avc: denied { ioctl } for pid=3109 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.723847][ T3109] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.727613][ T3109] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.787299][ T3108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.794412][ T3108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.302449][ T3109] hsr_slave_0: entered promiscuous mode [ 55.305186][ T3109] hsr_slave_1: entered promiscuous mode [ 55.362938][ T3108] hsr_slave_0: entered promiscuous mode [ 55.364547][ T3108] hsr_slave_1: entered promiscuous mode [ 55.365758][ T3108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 55.366050][ T3108] Cannot create hsr debugfs directory [ 55.574538][ T3109] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 55.581077][ T3109] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 55.587951][ T3109] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 55.597538][ T3109] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 55.644554][ T3108] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.650605][ T3108] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.654668][ T3108] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.658645][ T3108] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.062300][ T3109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.093675][ T3108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.723885][ T3109] veth0_vlan: entered promiscuous mode [ 57.735979][ T3109] veth1_vlan: entered promiscuous mode [ 57.774999][ T3109] veth0_macvtap: entered promiscuous mode [ 57.781595][ T3109] veth1_macvtap: entered promiscuous mode [ 57.814836][ T3109] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.815447][ T3109] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.815710][ T3109] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.815926][ T3109] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.853322][ T3108] veth0_vlan: entered promiscuous mode [ 57.886536][ T3108] veth1_vlan: entered promiscuous mode [ 57.943799][ T3108] veth0_macvtap: entered promiscuous mode [ 57.965370][ T3108] veth1_macvtap: entered promiscuous mode [ 58.001454][ T3108] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.001890][ T3108] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.002182][ T3108] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.002408][ T3108] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.677718][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 58.677782][ T31] audit: type=1400 audit(58.620:105): avc: denied { create } for pid=3789 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 59.562076][ T31] audit: type=1400 audit(59.510:106): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 59.959025][ T31] audit: type=1400 audit(59.900:107): avc: denied { ioctl } for pid=3810 comm="syz.1.10" path="socket:[3121]" dev="sockfs" ino=3121 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 60.028586][ T31] audit: type=1400 audit(59.970:108): avc: denied { setopt } for pid=3815 comm="syz.0.13" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 60.082115][ T31] audit: type=1400 audit(60.020:109): avc: denied { getopt } for pid=3818 comm="syz.0.14" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 63.591613][ T31] audit: type=1400 audit(63.540:110): avc: denied { create } for pid=3850 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 63.594537][ T31] audit: type=1400 audit(63.540:111): avc: denied { write } for pid=3850 comm="syz.0.28" path="socket:[3196]" dev="sockfs" ino=3196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 71.983204][ T31] audit: type=1400 audit(71.930:112): avc: denied { node_bind } for pid=3931 comm="syz.0.63" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 74.217949][ T31] audit: type=1400 audit(74.160:113): avc: denied { ioctl } for pid=3948 comm="syz.0.70" path="net:[4026532662]" dev="nsfs" ino=4026532662 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.815501][ T31] audit: type=1400 audit(74.760:114): avc: denied { name_bind } for pid=3952 comm="syz.0.72" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 76.019094][ T31] audit: type=1400 audit(75.960:115): avc: denied { name_bind } for pid=3967 comm="syz.0.79" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 76.021426][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 76.033426][ T31] audit: type=1400 audit(75.980:116): avc: denied { create } for pid=3967 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 87.715837][ T31] audit: type=1400 audit(87.660:117): avc: denied { write } for pid=4097 comm="syz.1.137" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 90.115567][ T31] audit: type=1400 audit(90.060:118): avc: denied { setopt } for pid=4128 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.437237][ T31] audit: type=1400 audit(92.380:119): avc: denied { execute } for pid=4152 comm="syz.1.162" name="file0" dev="tmpfs" ino=493 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 95.342458][ T31] audit: type=1400 audit(95.290:120): avc: denied { write } for pid=4181 comm="syz.1.176" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 95.343179][ T31] audit: type=1400 audit(95.290:121): avc: denied { add_name } for pid=4181 comm="syz.1.176" name="custom1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 95.343610][ T31] audit: type=1400 audit(95.290:122): avc: denied { create } for pid=4181 comm="syz.1.176" name="custom1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 95.344179][ T31] audit: type=1400 audit(95.290:123): avc: denied { associate } for pid=4181 comm="syz.1.176" name="custom1" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 95.424821][ T31] audit: type=1400 audit(95.370:124): avc: denied { block_suspend } for pid=4183 comm="syz.1.177" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 96.778702][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 106.944977][ T31] audit: type=1400 audit(106.890:125): avc: denied { watch } for pid=4289 comm="syz.0.220" path="/93/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 110.246883][ T31] audit: type=1400 audit(110.190:126): avc: denied { mounton } for pid=4309 comm="syz.0.227" path="/96/file0" dev="tmpfs" ino=545 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 116.926372][ T31] audit: type=1400 audit(116.870:127): avc: denied { lock } for pid=4388 comm="syz.0.257" path="socket:[4229]" dev="sockfs" ino=4229 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 120.457093][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 121.771386][ T31] audit: type=1400 audit(121.720:128): avc: denied { ioctl } for pid=4481 comm="syz.1.300" path="socket:[4393]" dev="sockfs" ino=4393 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 141.981546][ T31] audit: type=1400 audit(141.930:129): avc: denied { read } for pid=4657 comm="syz.1.378" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 141.982972][ T31] audit: type=1400 audit(141.930:130): avc: denied { open } for pid=4657 comm="syz.1.378" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 141.985797][ T31] audit: type=1400 audit(141.930:131): avc: denied { ioctl } for pid=4657 comm="syz.1.378" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 154.191858][ T31] audit: type=1400 audit(154.140:132): avc: denied { setopt } for pid=4757 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 156.563931][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 167.579137][ T31] audit: type=1400 audit(167.520:133): avc: denied { connect } for pid=4907 comm="syz.1.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 167.581367][ T31] audit: type=1400 audit(167.530:134): avc: denied { write } for pid=4907 comm="syz.1.484" path="socket:[5014]" dev="sockfs" ino=5014 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 168.790030][ T31] audit: type=1400 audit(168.740:135): avc: denied { ioctl } for pid=4924 comm="syz.1.492" path="socket:[6082]" dev="sockfs" ino=6082 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 172.667601][ T31] audit: type=1400 audit(172.610:136): avc: denied { getopt } for pid=4979 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.753708][ T31] audit: type=1400 audit(174.700:137): avc: denied { append } for pid=5003 comm="syz.1.524" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.844199][ T5012] capability: warning: `syz.1.528' uses 32-bit capabilities (legacy support in use) [ 180.661681][ T31] audit: type=1400 audit(180.610:138): avc: denied { write } for pid=5079 comm="syz.0.560" name="task" dev="proc" ino=7369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 180.662240][ T31] audit: type=1400 audit(180.610:139): avc: denied { add_name } for pid=5079 comm="syz.0.560" name="542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 180.662675][ T31] audit: type=1400 audit(180.610:140): avc: denied { create } for pid=5079 comm="syz.0.560" name="542" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 180.663100][ T31] audit: type=1400 audit(180.610:141): avc: denied { associate } for pid=5079 comm="syz.0.560" name="542" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 195.613972][ T5251] Zero length message leads to an empty skb [ 202.236363][ T31] audit: type=1400 audit(202.180:142): avc: denied { name_bind } for pid=5329 comm="syz.0.672" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 203.676261][ T31] audit: type=1400 audit(203.620:143): avc: denied { map } for pid=5347 comm="syz.1.681" path="socket:[7821]" dev="sockfs" ino=7821 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 203.680788][ T31] audit: type=1400 audit(203.620:144): avc: denied { read } for pid=5347 comm="syz.1.681" path="socket:[7821]" dev="sockfs" ino=7821 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 207.617283][ T31] audit: type=1400 audit(207.560:145): avc: denied { connect } for pid=5376 comm="syz.0.694" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 208.706537][ T31] audit: type=1400 audit(208.650:146): avc: denied { bind } for pid=5385 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 228.283443][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 231.477552][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 236.165875][ T31] audit: type=1400 audit(236.110:147): avc: denied { append } for pid=5708 comm="syz.1.842" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 238.907962][ T31] audit: type=1400 audit(238.850:148): avc: denied { write } for pid=5740 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 239.547167][ T31] audit: type=1400 audit(239.490:149): avc: denied { create } for pid=5747 comm="syz.0.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 239.551542][ T31] audit: type=1400 audit(239.500:150): avc: denied { bind } for pid=5747 comm="syz.0.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 240.001977][ T31] audit: type=1400 audit(239.950:151): avc: denied { map_create } for pid=5751 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 240.002657][ T31] audit: type=1400 audit(239.950:152): avc: denied { perfmon } for pid=5751 comm="syz.1.861" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 240.003085][ T31] audit: type=1400 audit(239.950:153): avc: denied { map_read map_write } for pid=5751 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 240.028513][ T31] audit: type=1400 audit(239.960:154): avc: denied { prog_load } for pid=5751 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 240.029139][ T31] audit: type=1400 audit(239.960:155): avc: denied { bpf } for pid=5751 comm="syz.1.861" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 240.074544][ T31] audit: type=1400 audit(240.020:156): avc: denied { prog_run } for pid=5751 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 241.780992][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 241.781048][ T31] audit: type=1400 audit(241.730:158): avc: denied { create } for pid=5749 comm="syz.0.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 241.784644][ T31] audit: type=1400 audit(241.730:159): avc: denied { getopt } for pid=5749 comm="syz.0.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 242.181747][ T31] audit: type=1400 audit(242.130:160): avc: denied { create } for pid=5766 comm="syz.1.864" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 242.188054][ T31] audit: type=1400 audit(242.130:161): avc: denied { ioctl } for pid=5766 comm="syz.1.864" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=9526 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 243.212189][ T31] audit: type=1400 audit(243.150:162): avc: denied { create } for pid=5771 comm="syz.1.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 243.225031][ T31] audit: type=1400 audit(243.160:163): avc: denied { write } for pid=5771 comm="syz.1.866" path="socket:[9534]" dev="sockfs" ino=9534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 243.245147][ T5772] netlink: 72 bytes leftover after parsing attributes in process `syz.1.866'. [ 243.494167][ T31] audit: type=1400 audit(243.440:164): avc: denied { create } for pid=5775 comm="syz.1.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 243.496483][ T31] audit: type=1400 audit(243.440:165): avc: denied { setopt } for pid=5775 comm="syz.1.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 246.543646][ T31] audit: type=1400 audit(246.490:166): avc: denied { create } for pid=5789 comm="syz.0.873" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_rdma_socket permissive=1 [ 246.639088][ T31] audit: type=1400 audit(246.590:167): avc: denied { ioctl } for pid=5793 comm="syz.0.875" path="socket:[8581]" dev="sockfs" ino=8581 ioctlcmd=0xf511 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 246.857712][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 246.857807][ T31] audit: type=1400 audit(246.800:173): avc: denied { create } for pid=5799 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 246.872486][ T31] audit: type=1400 audit(246.820:174): avc: denied { getopt } for pid=5799 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 246.886571][ T5800] TCP: TCP_TX_DELAY enabled [ 246.975570][ T31] audit: type=1400 audit(246.920:175): avc: denied { setopt } for pid=5801 comm="syz.0.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 248.104227][ T31] audit: type=1400 audit(248.050:176): avc: denied { getopt } for pid=5805 comm="syz.0.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 248.110971][ T31] audit: type=1400 audit(248.060:177): avc: denied { write } for pid=5805 comm="syz.0.881" name="rt_cache" dev="proc" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 248.707926][ T31] audit: type=1400 audit(248.650:178): avc: denied { create } for pid=5810 comm="syz.0.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 248.746882][ T31] audit: type=1400 audit(248.690:179): avc: denied { setopt } for pid=5810 comm="syz.0.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 248.798535][ T31] audit: type=1400 audit(248.740:180): avc: denied { create } for pid=5820 comm="syz.0.884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 248.805037][ T31] audit: type=1400 audit(248.750:181): avc: denied { bind } for pid=5820 comm="syz.0.884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 248.898690][ T31] audit: type=1400 audit(248.840:182): avc: denied { create } for pid=5825 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 249.553307][ T5854] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 250.220585][ T5884] FAULT_INJECTION: forcing a failure. [ 250.220585][ T5884] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 250.221536][ T5884] CPU: 0 UID: 0 PID: 5884 Comm: syz.1.903 Not tainted 6.11.0-rc2-syzkaller #0 [ 250.221967][ T5884] Hardware name: ARM-Versatile Express [ 250.222301][ T5884] Call trace: [ 250.222872][ T5884] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 250.223942][ T5884] r7:dfbc9eb8 r6:00000000 r5:60000013 r4:8200bb20 [ 250.224188][ T5884] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 250.224512][ T5884] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 250.224745][ T5884] r5:00000000 r4:82748bd4 [ 250.224903][ T5884] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 250.225158][ T5884] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 250.225412][ T5884] r6:00000000 r5:00000001 r4:00000001 [ 250.225569][ T5884] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 250.225822][ T5884] [<808b6378>] (should_fail_usercopy) from [<8080f084>] (kstrtouint_from_user+0x60/0x128) [ 250.226086][ T5884] [<8080f024>] (kstrtouint_from_user) from [<805ae78c>] (proc_fail_nth_write+0x40/0xe8) [ 250.226370][ T5884] r8:dfbc9f68 r7:84e33000 r6:00000001 r5:840d8180 r4:00000001 [ 250.226557][ T5884] [<805ae74c>] (proc_fail_nth_write) from [<805011d8>] (vfs_write+0xac/0x44c) [ 250.226819][ T5884] r5:840d8180 r4:805ae74c [ 250.226951][ T5884] [<8050112c>] (vfs_write) from [<805016fc>] (ksys_write+0x78/0xf8) [ 250.227229][ T5884] r10:00000004 r9:84e33000 r8:8020029c r7:00000000 r6:00000002 r5:840d8180 [ 250.227509][ T5884] r4:840d8183 [ 250.227665][ T5884] [<80501684>] (ksys_write) from [<8050178c>] (sys_write+0x10/0x14) [ 250.228100][ T5884] r7:00000004 r6:00000005 r5:76b28f30 r4:00000001 [ 250.228636][ T5884] [<8050177c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 250.229045][ T5884] Exception stack(0xdfbc9fa8 to 0xdfbc9ff0) [ 250.229319][ T5884] 9fa0: 00000001 76b28f30 00000005 76b28f30 00000001 00000000 [ 250.229561][ T5884] 9fc0: 00000001 76b28f30 00000005 00000004 00000000 00006364 003d0f00 76b290bc [ 250.229773][ T5884] 9fe0: 00000158 76b28ed0 000d7cc0 0013071c [ 250.381986][ T5887] can: request_module (can-proto-0) failed. [ 251.639436][ T152] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 251.842317][ T152] usb 2-1: config 1 interface 0 altsetting 12 endpoint 0x3 has invalid maxpacket 1024, setting to 64 [ 251.842684][ T152] usb 2-1: config 1 interface 0 has no altsetting 0 [ 251.849560][ T152] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 251.849970][ T152] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 251.850228][ T152] usb 2-1: Product: 鞊ꊁ迂前⚠ꁙ䅋哄詪㼂왛郰⨾ᴇ࢚孰丛텸⢲ț呯鲲㭥⪶Ⱂ꼮鄁൙꽟瓍柹⸖Ǵ鮼䍏輰첢㺗䡜삑ᅞ즏࿬ᤸ짝꛴㒌㯧磽瑙鍨䧩䫏ᱝธᶶ먀刄㼉揇 [ 251.853471][ T152] usb 2-1: Manufacturer: 㚙ц岁ⷴ￙覺慨㭔画ベ䝪ﱤ㸶ͬ츜⁙狠穲飽ᚔ쁻☰쎟椁䇉醵ㆡ벤Ⲭ친骴몱걜催휹騩䘰㸺挢觊爻ꗚ뚒낙蛅㡕᭱쯖㌧ꎻ흜揃澍᧳㙖䴲㶉媔긄㏚梼쭚 [ 251.854030][ T152] usb 2-1: SerialNumber: syz [ 251.867950][ T5911] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 252.040524][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 252.040657][ T31] audit: type=1400 audit(251.990:205): avc: denied { ioctl } for pid=5926 comm="syz.0.911" path="socket:[8750]" dev="sockfs" ino=8750 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 252.082433][ T31] audit: type=1400 audit(252.030:206): avc: denied { setopt } for pid=5926 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 252.084680][ T5927] fuse: Bad value for 'fd' [ 252.279709][ T152] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 252.296975][ T152] usb 2-1: USB disconnect, device number 2 [ 252.403622][ T5941] random: crng reseeded on system resumption [ 252.750754][ T31] audit: type=1400 audit(252.700:207): avc: denied { create } for pid=5949 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 252.753387][ T31] audit: type=1400 audit(252.700:208): avc: denied { write } for pid=5949 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 252.755264][ T31] audit: type=1400 audit(252.700:209): avc: denied { nlmsg_read } for pid=5949 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 252.915057][ T5954] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5954 comm=syz.1.918 [ 254.110228][ T5960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5960 comm=syz.1.921 [ 254.242142][ T5965] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 254.245436][ T31] audit: type=1400 audit(254.190:210): avc: denied { lock } for pid=5964 comm="syz.1.923" path="socket:[8785]" dev="sockfs" ino=8785 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 257.691181][ T5989] FAULT_INJECTION: forcing a failure. [ 257.691181][ T5989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.691992][ T5989] CPU: 1 UID: 0 PID: 5989 Comm: syz.1.932 Not tainted 6.11.0-rc2-syzkaller #0 [ 257.692707][ T5989] Hardware name: ARM-Versatile Express [ 257.693303][ T5989] Call trace: [ 257.693580][ T5989] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 257.694094][ T5989] r7:00000000 r6:00000000 r5:60000013 r4:8200bb20 [ 257.694537][ T5989] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 257.694944][ T5989] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 257.695550][ T5989] r5:00000000 r4:82748bd4 [ 257.695809][ T5989] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 257.696240][ T5989] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 257.696834][ T5989] r6:00000000 r5:e00cdf68 r4:00000002 [ 257.697059][ T5989] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 257.697584][ T5989] [<808b6378>] (should_fail_usercopy) from [<805387e0>] (simple_read_from_buffer+0x8c/0x134) [ 257.698084][ T5989] [<80538754>] (simple_read_from_buffer) from [<805ad4b4>] (proc_fail_nth_read+0xb8/0x100) [ 257.699172][ T5989] r10:00000001 r9:805ad3fc r8:00000002 r7:e00cdf68 r6:0000000f r5:76b28f30 [ 257.699722][ T5989] r4:84e33c00 r3:e00cde9f [ 257.700218][ T5989] [<805ad3fc>] (proc_fail_nth_read) from [<80500940>] (vfs_read+0x98/0x324) [ 257.700831][ T5989] r8:76b28f30 r7:e00cdf68 r6:84e33c00 r5:0000000f r4:8527a000 [ 257.701053][ T5989] [<805008a8>] (vfs_read) from [<805015f0>] (ksys_read+0x78/0xf8) [ 257.701336][ T5989] r10:00000003 r9:84e33c00 r8:8020029c r7:00000000 r6:00000000 r5:8527a000 [ 257.701639][ T5989] r4:8527a003 [ 257.701838][ T5989] [<80501578>] (ksys_read) from [<80501680>] (sys_read+0x10/0x14) [ 257.702147][ T5989] r7:00000003 r6:00000005 r5:76b28f30 r4:0000000f [ 257.702497][ T5989] [<80501670>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 257.702919][ T5989] Exception stack(0xe00cdfa8 to 0xe00cdff0) [ 257.703273][ T5989] dfa0: 0000000f 76b28f30 00000005 76b28f30 0000000f 00000000 [ 257.703549][ T5989] dfc0: 0000000f 76b28f30 00000005 00000003 00000000 00006364 003d0f00 76b290bc [ 257.704361][ T5989] dfe0: 00000158 76b28ed0 000d7cc0 00130654 [ 260.106974][ T31] audit: type=1400 audit(260.050:211): avc: denied { ioctl } for pid=6007 comm="syz.1.939" path="socket:[8860]" dev="sockfs" ino=8860 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 260.323548][ T31] audit: type=1400 audit(260.270:212): avc: denied { getopt } for pid=6017 comm="syz.0.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.399446][ T6024] fuse: Unknown parameter 'group_i' [ 260.437109][ T31] audit: type=1400 audit(260.380:213): avc: denied { setopt } for pid=6025 comm="syz.0.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 260.509825][ T31] audit: type=1400 audit(260.460:214): avc: denied { create } for pid=6032 comm="syz.1.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 260.525004][ T31] audit: type=1400 audit(260.470:215): avc: denied { write } for pid=6032 comm="syz.1.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 260.681843][ T31] audit: type=1400 audit(260.630:216): avc: denied { create } for pid=6041 comm="syz.1.953" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 260.701997][ T31] audit: type=1400 audit(260.650:217): avc: denied { unlink } for pid=3109 comm="syz-executor" name="file0" dev="tmpfs" ino=2839 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 260.875099][ T31] audit: type=1400 audit(260.820:218): avc: denied { create } for pid=6055 comm="syz.1.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 260.945796][ T6056] can: request_module (can-proto-3) failed. [ 260.954113][ T31] audit: type=1400 audit(260.900:219): avc: denied { write } for pid=6055 comm="syz.1.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 261.000078][ T6059] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=6059 comm=syz.1.960 [ 261.537850][ T31] audit: type=1400 audit(261.480:220): avc: denied { ioctl } for pid=6078 comm="syz.0.967" path="socket:[9005]" dev="sockfs" ino=9005 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 264.105609][ T6090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6090 comm=syz.1.971 [ 264.897679][ T6114] FAULT_INJECTION: forcing a failure. [ 264.897679][ T6114] name failslab, interval 1, probability 0, space 0, times 0 [ 264.901395][ T6114] CPU: 0 UID: 0 PID: 6114 Comm: syz.1.979 Not tainted 6.11.0-rc2-syzkaller #0 [ 264.902116][ T6114] Hardware name: ARM-Versatile Express [ 264.902603][ T6114] Call trace: [ 264.903045][ T6114] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 264.904296][ T6114] r7:845e8c00 r6:00000cc0 r5:60000013 r4:8200bb20 [ 264.904671][ T6114] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 264.905634][ T6114] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 264.906687][ T6114] r5:00000000 r4:8271619c [ 264.906939][ T6114] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 264.907446][ T6114] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 264.907810][ T6114] r6:00000cc0 r5:ffffffff r4:82cab780 [ 264.908150][ T6114] [<804dac94>] (should_failslab) from [<804c00a8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 264.909062][ T6114] [<804c0058>] (kmem_cache_alloc_node_noprof) from [<81454b64>] (__alloc_skb+0x138/0x160) [ 264.909577][ T6114] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab780 r5:ffffffff [ 264.909950][ T6114] r4:82606000 [ 264.910209][ T6114] [<81454a2c>] (__alloc_skb) from [<815661f0>] (netlink_alloc_large_skb+0x88/0xa0) [ 264.911061][ T6114] r8:00000000 r7:85129800 r6:00000020 r5:831a8f00 r4:00000140 [ 264.911388][ T6114] [<81566168>] (netlink_alloc_large_skb) from [<815667f8>] (netlink_sendmsg+0x134/0x43c) [ 264.911819][ T6114] r5:831a8f00 r4:ea98df38 [ 264.912040][ T6114] [<815666c4>] (netlink_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 264.912562][ T6114] r10:00000000 r9:ea98ddd4 r8:ea98ddd4 r7:00000000 r6:831a8f00 r5:ea98df38 [ 264.912914][ T6114] r4:00000000 [ 264.913117][ T6114] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 264.913560][ T6114] r7:00000000 r6:00000000 r5:831a8f00 r4:ea98df38 [ 264.913853][ T6114] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 264.914276][ T6114] r10:ea98de34 r9:200002c0 r8:00000000 r7:00000000 r6:831a8f00 r5:ea98df38 [ 264.914633][ T6114] r4:00000000 [ 264.914828][ T6114] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 264.915333][ T6114] r10:00000128 r9:845e8c00 r8:8020029c r7:00000000 r6:200002c0 r5:831a8f00 [ 264.915706][ T6114] r4:00000000 [ 264.915901][ T6114] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 264.916428][ T6114] Exception stack(0xea98dfa8 to 0xea98dff0) [ 264.916885][ T6114] dfa0: 00000000 00000000 00000003 200002c0 00000000 00000000 [ 264.917370][ T6114] dfc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b290bc [ 264.918433][ T6114] dfe0: 76b28ec0 76b28eb0 000188c0 00132780 [ 264.919207][ T6114] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 265.113598][ T6120] FAULT_INJECTION: forcing a failure. [ 265.113598][ T6120] name failslab, interval 1, probability 0, space 0, times 0 [ 265.113960][ T6120] CPU: 1 UID: 0 PID: 6120 Comm: syz.1.982 Not tainted 6.11.0-rc2-syzkaller #0 [ 265.114174][ T6120] Hardware name: ARM-Versatile Express [ 265.114273][ T6120] Call trace: [ 265.114400][ T6120] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 265.114639][ T6120] r7:845ebc00 r6:00000cc0 r5:60000013 r4:8200bb20 [ 265.114799][ T6120] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 265.115004][ T6120] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 265.115219][ T6120] r5:00000000 r4:8271619c [ 265.115353][ T6120] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 265.115603][ T6120] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 265.115838][ T6120] r6:00000cc0 r5:ffffffff r4:82cab780 [ 265.115980][ T6120] [<804dac94>] (should_failslab) from [<804c00a8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 265.116235][ T6120] [<804c0058>] (kmem_cache_alloc_node_noprof) from [<81454b64>] (__alloc_skb+0x138/0x160) [ 265.116535][ T6120] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab780 r5:ffffffff [ 265.116726][ T6120] r4:82606000 [ 265.116833][ T6120] [<81454a2c>] (__alloc_skb) from [<815661f0>] (netlink_alloc_large_skb+0x88/0xa0) [ 265.117086][ T6120] r8:00000000 r7:83e5d400 r6:00000014 r5:833a4f00 r4:00000140 [ 265.117289][ T6120] [<81566168>] (netlink_alloc_large_skb) from [<815667f8>] (netlink_sendmsg+0x134/0x43c) [ 265.117550][ T6120] r5:833a4f00 r4:ea98df38 [ 265.117676][ T6120] [<815666c4>] (netlink_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 265.117914][ T6120] r10:04000040 r9:ea98ddd4 r8:ea98ddd4 r7:00000000 r6:833a4f00 r5:ea98df38 [ 265.118282][ T6120] r4:00000000 [ 265.118451][ T6120] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 265.118886][ T6120] r7:00000000 r6:00000000 r5:833a4f00 r4:ea98df38 [ 265.119150][ T6120] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 265.119441][ T6120] r10:ea98de34 r9:20000900 r8:04000040 r7:00000000 r6:833a4f00 r5:ea98df38 [ 265.119705][ T6120] r4:00000000 [ 265.119896][ T6120] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 265.120170][ T6120] r10:00000128 r9:845ebc00 r8:8020029c r7:04000040 r6:20000900 r5:833a4f00 [ 265.120522][ T6120] r4:00000000 [ 265.120637][ T6120] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 265.120877][ T6120] Exception stack(0xea98dfa8 to 0xea98dff0) [ 265.121067][ T6120] dfa0: 00000000 00000000 00000004 20000900 04000040 00000000 [ 265.121327][ T6120] dfc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b290bc [ 265.121577][ T6120] dfe0: 76b28ec0 76b28eb0 000188c0 00132780 [ 265.121760][ T6120] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 265.191439][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 265.191495][ T31] audit: type=1400 audit(265.140:225): avc: denied { map } for pid=6121 comm="syz.1.983" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 265.198551][ T31] audit: type=1400 audit(265.140:226): avc: denied { read write } for pid=6121 comm="syz.1.983" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 265.893948][ T6131] 8021q: VLANs not supported on hsr0 [ 265.896897][ T31] audit: type=1400 audit(265.840:227): avc: denied { nlmsg_write } for pid=6111 comm="syz.0.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 267.920219][ T31] audit: type=1400 audit(267.870:228): avc: denied { write } for pid=6141 comm="syz.0.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 268.000648][ T31] audit: type=1400 audit(267.950:229): avc: denied { create } for pid=6147 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.002203][ T31] audit: type=1400 audit(267.950:230): avc: denied { setopt } for pid=6147 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.003951][ T31] audit: type=1400 audit(267.950:231): avc: denied { write } for pid=6147 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.004667][ T31] audit: type=1400 audit(267.950:232): avc: denied { nlmsg_write } for pid=6147 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.005351][ T31] audit: type=1400 audit(267.950:233): avc: denied { read } for pid=6147 comm="syz.1.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.005946][ T6148] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6148 comm=syz.1.990 [ 268.007052][ T6148] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=6148 comm=syz.1.990 [ 268.103306][ T6154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6154 comm=syz.0.993 [ 268.239011][ T31] audit: type=1400 audit(268.180:234): avc: denied { create } for pid=6158 comm="syz.0.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 270.779119][ T6170] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6170 comm=syz.0.997 [ 273.485000][ T6185] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6185 comm=syz.0.1002 [ 273.758468][ T31] audit: type=1400 audit(273.700:235): avc: denied { setopt } for pid=6193 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 273.941845][ T6203] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6203 comm=syz.0.1010 [ 279.805068][ T6244] FAULT_INJECTION: forcing a failure. [ 279.805068][ T6244] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.805485][ T6244] CPU: 1 UID: 0 PID: 6244 Comm: syz.1.1026 Not tainted 6.11.0-rc2-syzkaller #0 [ 279.805701][ T6244] Hardware name: ARM-Versatile Express [ 279.805846][ T6244] Call trace: [ 279.806105][ T6244] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 279.806404][ T6244] r7:00000000 r6:00000000 r5:60000013 r4:8200bb20 [ 279.806627][ T6244] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 279.806941][ T6244] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 279.807210][ T6244] r5:00000000 r4:82748bd4 [ 279.807539][ T6244] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 279.807904][ T6244] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 279.808261][ T6244] r6:00000000 r5:eac85f68 r4:00000002 [ 279.808538][ T6244] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 279.808896][ T6244] [<808b6378>] (should_fail_usercopy) from [<805387e0>] (simple_read_from_buffer+0x8c/0x134) [ 279.809225][ T6244] [<80538754>] (simple_read_from_buffer) from [<805ad4b4>] (proc_fail_nth_read+0xb8/0x100) [ 279.809525][ T6244] r10:00000001 r9:805ad3fc r8:00000002 r7:eac85f68 r6:0000000f r5:76b28f30 [ 279.809769][ T6244] r4:845ed400 r3:eac85e9f [ 279.809906][ T6244] [<805ad3fc>] (proc_fail_nth_read) from [<80500940>] (vfs_read+0x98/0x324) [ 279.810161][ T6244] r8:76b28f30 r7:eac85f68 r6:845ed400 r5:0000000f r4:8527a6c0 [ 279.810355][ T6244] [<805008a8>] (vfs_read) from [<805015f0>] (ksys_read+0x78/0xf8) [ 279.810585][ T6244] r10:00000003 r9:845ed400 r8:8020029c r7:00000000 r6:00000000 r5:8527a6c0 [ 279.810819][ T6244] r4:8527a6c3 [ 279.810914][ T6244] [<80501578>] (ksys_read) from [<80501680>] (sys_read+0x10/0x14) [ 279.811148][ T6244] r7:00000003 r6:00000005 r5:76b28f30 r4:0000000f [ 279.811381][ T6244] [<80501670>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 279.811643][ T6244] Exception stack(0xeac85fa8 to 0xeac85ff0) [ 279.811849][ T6244] 5fa0: 0000000f 76b28f30 00000005 76b28f30 0000000f 00000000 [ 279.812155][ T6244] 5fc0: 0000000f 76b28f30 00000005 00000003 00000000 00006364 003d0f00 76b290bc [ 279.812446][ T6244] 5fe0: 00000158 76b28ed0 000d7cc0 00130654 [ 281.122748][ T31] audit: type=1400 audit(281.070:236): avc: denied { read } for pid=6282 comm="syz.0.1038" path="socket:[11302]" dev="sockfs" ino=11302 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 281.872689][ T6288] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6288 comm=syz.0.1040 [ 282.250798][ T31] audit: type=1400 audit(282.200:237): avc: denied { ioctl } for pid=6297 comm="syz.0.1043" path="socket:[10413]" dev="sockfs" ino=10413 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 282.892431][ T31] audit: type=1400 audit(282.840:238): avc: denied { listen } for pid=6302 comm="syz.1.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 285.082236][ T31] audit: type=1400 audit(285.030:239): avc: denied { write } for pid=6338 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 285.259089][ T31] audit: type=1400 audit(285.200:240): avc: denied { setopt } for pid=6358 comm="syz.1.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.434923][ T6371] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6371 comm=syz.1.1072 [ 285.487766][ T31] audit: type=1400 audit(285.430:241): avc: denied { read } for pid=6372 comm="syz.0.1074" path="socket:[10555]" dev="sockfs" ino=10555 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 285.764292][ T6391] raw_sendmsg: syz.0.1082 forgot to set AF_INET. Fix it! [ 286.420653][ T6417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6417 comm=syz.0.1091 [ 286.939918][ T31] audit: type=1400 audit(286.890:242): avc: denied { create } for pid=6432 comm="syz.1.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 286.952212][ T6433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=6433 comm=syz.1.1097 [ 287.249158][ T6428] syz.0.1095 uses obsolete (PF_INET,SOCK_PACKET) [ 287.359627][ T31] audit: type=1400 audit(287.310:243): avc: denied { wake_alarm } for pid=6446 comm="syz.0.1101" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 293.869192][ T31] audit: type=1400 audit(293.820:244): avc: denied { setopt } for pid=6502 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 293.876887][ T31] audit: type=1400 audit(293.820:245): avc: denied { read } for pid=6502 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 294.527586][ T31] audit: type=1400 audit(294.470:246): avc: denied { setattr } for pid=6505 comm="syz.0.1119" name="NETLINK" dev="sockfs" ino=10768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 297.151258][ T2948] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.186051][ T2948] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.235627][ T2948] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.285267][ T2948] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.435361][ T2948] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 297.442603][ T2948] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 297.445742][ T2948] bond0 (unregistering): Released all slaves [ 297.557413][ T2948] hsr_slave_0: left promiscuous mode [ 297.570102][ T2948] hsr_slave_1: left promiscuous mode [ 297.580047][ T2948] veth1_macvtap: left promiscuous mode [ 297.580566][ T2948] veth0_macvtap: left promiscuous mode [ 297.580855][ T2948] veth1_vlan: left promiscuous mode [ 297.581114][ T2948] veth0_vlan: left promiscuous mode [ 298.661845][ T6535] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.664979][ T6535] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.895868][ T6797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6797 comm=syz.0.1136 [ 300.128765][ T31] audit: type=1400 audit(300.070:247): avc: denied { mount } for pid=6801 comm="syz.0.1138" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 300.409248][ T6803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6803 comm=syz.0.1138 [ 300.489369][ T6803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6803 comm=syz.0.1138 [ 300.490505][ T6535] hsr_slave_0: entered promiscuous mode [ 300.500322][ T6535] hsr_slave_1: entered promiscuous mode [ 301.385881][ T6535] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 301.402692][ T6535] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 301.416492][ T6535] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 301.431076][ T6535] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 302.615415][ T6939] FAULT_INJECTION: forcing a failure. [ 302.615415][ T6939] name failslab, interval 1, probability 0, space 0, times 0 [ 302.615781][ T6939] CPU: 1 UID: 0 PID: 6939 Comm: syz.0.1140 Not tainted 6.11.0-rc2-syzkaller #0 [ 302.615961][ T6939] Hardware name: ARM-Versatile Express [ 302.616127][ T6939] Call trace: [ 302.616376][ T6939] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 302.616674][ T6939] r7:8377bc00 r6:00000cc0 r5:60000013 r4:8200bb20 [ 302.616883][ T6939] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 302.617123][ T6939] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 302.617407][ T6939] r5:00000000 r4:8271619c [ 302.617511][ T6939] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 302.617832][ T6939] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 302.618334][ T6939] r6:00000cc0 r5:ffffffff r4:82cab780 [ 302.618669][ T6939] [<804dac94>] (should_failslab) from [<804c00a8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 302.618969][ T6939] [<804c0058>] (kmem_cache_alloc_node_noprof) from [<81454b64>] (__alloc_skb+0x138/0x160) [ 302.619257][ T6939] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab780 r5:ffffffff [ 302.619496][ T6939] r4:82606000 [ 302.619625][ T6939] [<81454a2c>] (__alloc_skb) from [<815661f0>] (netlink_alloc_large_skb+0x88/0xa0) [ 302.619962][ T6939] r8:00000000 r7:841d7800 r6:00000014 r5:848f3900 r4:00000140 [ 302.620243][ T6939] [<81566168>] (netlink_alloc_large_skb) from [<815667f8>] (netlink_sendmsg+0x134/0x43c) [ 302.620636][ T6939] r5:848f3900 r4:eca0df38 [ 302.620837][ T6939] [<815666c4>] (netlink_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 302.621111][ T6939] r10:20004040 r9:eca0ddd4 r8:eca0ddd4 r7:00000000 r6:848f3900 r5:eca0df38 [ 302.621550][ T6939] r4:00000000 [ 302.621783][ T6939] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 302.622204][ T6939] r7:00000000 r6:00000000 r5:848f3900 r4:eca0df38 [ 302.622504][ T6939] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 302.622794][ T6939] r10:eca0de34 r9:200023c0 r8:20004040 r7:00000000 r6:848f3900 r5:eca0df38 [ 302.622998][ T6939] r4:00000000 [ 302.623130][ T6939] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 302.623465][ T6939] r10:00000128 r9:8377bc00 r8:8020029c r7:20004040 r6:200023c0 r5:848f3900 [ 302.623734][ T6939] r4:00000000 [ 302.623839][ T6939] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 302.624148][ T6939] Exception stack(0xeca0dfa8 to 0xeca0dff0) [ 302.624403][ T6939] dfa0: 00000000 00000000 00000004 200023c0 20004040 00000000 [ 302.624722][ T6939] dfc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b750bc [ 302.625082][ T6939] dfe0: 76b74ec0 76b74eb0 000188c0 00132780 [ 302.625273][ T6939] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 302.704816][ T6535] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.320512][ T31] audit: type=1400 audit(306.270:248): avc: denied { setopt } for pid=7029 comm="syz.0.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 306.401586][ T31] audit: type=1400 audit(306.350:249): avc: denied { bind } for pid=7029 comm="syz.0.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 306.411549][ T31] audit: type=1400 audit(306.360:250): avc: denied { write } for pid=7029 comm="syz.0.1155" path="socket:[11254]" dev="sockfs" ino=11254 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 306.567980][ T6535] veth0_vlan: entered promiscuous mode [ 306.581052][ T6535] veth1_vlan: entered promiscuous mode [ 306.636378][ T6535] veth0_macvtap: entered promiscuous mode [ 306.653474][ T6535] veth1_macvtap: entered promiscuous mode [ 306.711525][ T6535] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.711853][ T6535] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.712016][ T6535] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.712161][ T6535] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.690961][ T31] audit: type=1400 audit(311.640:251): avc: denied { ioctl } for pid=7121 comm="syz.1.1187" path="socket:[12178]" dev="sockfs" ino=12178 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 314.908561][ T9] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 315.088598][ T9] usb 1-1: Invalid ep0 maxpacket: 64 [ 315.249036][ T9] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 315.428713][ T9] usb 1-1: Invalid ep0 maxpacket: 64 [ 315.429805][ T9] usb usb1-port1: attempt power cycle [ 315.838802][ T9] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 315.874901][ T9] usb 1-1: Invalid ep0 maxpacket: 64 [ 316.018981][ T9] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 316.053093][ T9] usb 1-1: Invalid ep0 maxpacket: 64 [ 316.056009][ T9] usb usb1-port1: unable to enumerate USB device [ 322.474882][ T7205] FAULT_INJECTION: forcing a failure. [ 322.474882][ T7205] name failslab, interval 1, probability 0, space 0, times 0 [ 322.476569][ T7205] CPU: 1 UID: 0 PID: 7205 Comm: syz.1.1213 Not tainted 6.11.0-rc2-syzkaller #0 [ 322.476969][ T7205] Hardware name: ARM-Versatile Express [ 322.477231][ T7205] Call trace: [ 322.477467][ T7205] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 322.479076][ T7205] r7:845ec800 r6:00000cc0 r5:60000013 r4:8200bb20 [ 322.479553][ T7205] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 322.479980][ T7205] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 322.481469][ T7205] r5:00000000 r4:8271619c [ 322.481718][ T7205] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 322.482197][ T7205] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 322.482707][ T7205] r6:00000cc0 r5:ffffffff r4:82cab780 [ 322.482992][ T7205] [<804dac94>] (should_failslab) from [<804c00a8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 322.483540][ T7205] [<804c0058>] (kmem_cache_alloc_node_noprof) from [<81454b64>] (__alloc_skb+0x138/0x160) [ 322.484135][ T7205] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab780 r5:ffffffff [ 322.484620][ T7205] r4:82606000 [ 322.484860][ T7205] [<81454a2c>] (__alloc_skb) from [<815661f0>] (netlink_alloc_large_skb+0x88/0xa0) [ 322.485405][ T7205] r8:00000000 r7:85192800 r6:00000001 r5:848f3b80 r4:00000140 [ 322.485806][ T7205] [<81566168>] (netlink_alloc_large_skb) from [<815667f8>] (netlink_sendmsg+0x134/0x43c) [ 322.486369][ T7205] r5:848f3b80 r4:e0461f38 [ 322.486622][ T7205] [<815666c4>] (netlink_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 322.488153][ T7205] r10:04000040 r9:e0461dd4 r8:e0461dd4 r7:00000000 r6:848f3b80 r5:e0461f38 [ 322.488992][ T7205] r4:00000000 [ 322.489593][ T7205] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 322.490108][ T7205] r7:00000000 r6:00000000 r5:848f3b80 r4:e0461f38 [ 322.490850][ T7205] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 322.492641][ T7205] r10:e0461e34 r9:20003700 r8:04000040 r7:00000000 r6:848f3b80 r5:e0461f38 [ 322.493267][ T7205] r4:00000000 [ 322.493434][ T7205] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 322.493786][ T7205] r10:00000128 r9:845ec800 r8:8020029c r7:04000040 r6:20003700 r5:848f3b80 [ 322.494094][ T7205] r4:00000000 [ 322.494243][ T7205] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 322.494582][ T7205] Exception stack(0xe0461fa8 to 0xe0461ff0) [ 322.494831][ T7205] 1fa0: 00000000 00000000 00000003 20003700 04000040 00000000 [ 322.495163][ T7205] 1fc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b500bc [ 322.495482][ T7205] 1fe0: 76b4fec0 76b4feb0 000188c0 00132780 [ 322.495737][ T7205] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 324.627428][ T31] audit: type=1400 audit(324.570:252): avc: denied { ioctl } for pid=7225 comm="syz.1.1220" path="socket:[13354]" dev="sockfs" ino=13354 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 324.731376][ T31] audit: type=1400 audit(324.680:253): avc: denied { create } for pid=7230 comm="syz.1.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 325.537882][ T7253] serio: Serial port pts0 [ 326.553133][ T7265] FAULT_INJECTION: forcing a failure. [ 326.553133][ T7265] name failslab, interval 1, probability 0, space 0, times 0 [ 326.553765][ T7265] CPU: 1 UID: 0 PID: 7265 Comm: syz.1.1225 Not tainted 6.11.0-rc2-syzkaller #0 [ 326.554099][ T7265] Hardware name: ARM-Versatile Express [ 326.554304][ T7265] Call trace: [ 326.554479][ T7265] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 326.554833][ T7265] r7:00000d40 r6:84c761f0 r5:60000013 r4:8200bb20 [ 326.555055][ T7265] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 326.555357][ T7265] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 326.555655][ T7265] r5:00000000 r4:8271619c [ 326.555823][ T7265] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 326.556136][ T7265] [<808b6184>] (should_fail_ex) from [<804dad00>] (should_failslab+0x6c/0x94) [ 326.556472][ T7265] r6:84c761f0 r5:00000014 r4:82c01240 [ 326.556675][ T7265] [<804dac94>] (should_failslab) from [<804c0a98>] (__kmalloc_noprof+0x9c/0x458) [ 326.557007][ T7265] [<804c09fc>] (__kmalloc_noprof) from [<80720cb8>] (tomoyo_encode2+0x64/0xf0) [ 326.557345][ T7265] r10:00000fff r9:84134000 r8:00000000 r7:83322c38 r6:84c761f0 r5:84764ffc [ 326.557640][ T7265] r4:84764ff3 [ 326.557817][ T7265] [<80720c54>] (tomoyo_encode2) from [<80720d68>] (tomoyo_encode+0x24/0x30) [ 326.558404][ T7265] r9:84134000 r8:00000000 r7:83322c38 r6:84c761f0 r5:00001000 r4:84764ff4 [ 326.558760][ T7265] [<80720d44>] (tomoyo_encode) from [<80720df4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 326.559153][ T7265] r5:00001000 r4:84764000 [ 326.559352][ T7265] [<80720d74>] (tomoyo_realpath_from_path) from [<8071cef4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 326.559782][ T7265] r10:845ed400 r9:00000000 r8:84c76180 r7:00005760 r6:00000004 r5:81ad0da8 [ 326.560122][ T7265] r4:84c761f0 r3:824b7380 [ 326.560330][ T7265] [<8071ce28>] (tomoyo_path_number_perm) from [<807217c0>] (tomoyo_file_ioctl+0x1c/0x20) [ 326.560863][ T7265] r9:00000005 r8:84c76180 r7:84c76180 r6:00005760 r5:00000000 r4:822061e4 [ 326.561047][ T7265] [<807217a4>] (tomoyo_file_ioctl) from [<806e4790>] (security_file_ioctl+0x40/0x5c) [ 326.561281][ T7265] [<806e4750>] (security_file_ioctl) from [<8051a0ec>] (sys_ioctl+0x50/0xda4) [ 326.561467][ T7265] r7:00000000 r6:84c76181 r5:00000000 r4:00005760 [ 326.561592][ T7265] [<8051a09c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 326.561752][ T7265] Exception stack(0xe0869fa8 to 0xe0869ff0) [ 326.561884][ T7265] 9fa0: 00000000 00000000 00000005 00005760 00000000 00000000 [ 326.562054][ T7265] 9fc0: 00000000 00000000 00130730 00000036 00000000 00006364 003d0f00 76b0e0bc [ 326.562226][ T7265] 9fe0: 76b0dec0 76b0deb0 000188c0 00132780 [ 326.562350][ T7265] r10:00000036 r9:845ed400 r8:8020029c r7:00000036 r6:00130730 r5:00000000 [ 326.562508][ T7265] r4:00000000 [ 326.569154][ T7265] ERROR: Out of memory at tomoyo_realpath_from_path. [ 327.392796][ T7272] serio: Serial port pts0 [ 331.030330][ T7293] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7293 comm=syz.0.1237 [ 334.949660][ T7313] syz.0.1243 (7313): /proc/7313/oom_adj is deprecated, please use /proc/7313/oom_score_adj instead. [ 335.087754][ T7317] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=25 sclass=netlink_audit_socket pid=7317 comm=syz.0.1245 [ 335.790584][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.824550][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.884674][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.945798][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.129703][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 336.133766][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 336.136201][ T11] bond0 (unregistering): Released all slaves [ 336.279167][ T11] hsr_slave_0: left promiscuous mode [ 336.281576][ T11] hsr_slave_1: left promiscuous mode [ 336.285090][ T11] veth1_macvtap: left promiscuous mode [ 336.285319][ T11] veth0_macvtap: left promiscuous mode [ 336.285550][ T11] veth1_vlan: left promiscuous mode [ 336.285784][ T11] veth0_vlan: left promiscuous mode [ 337.397814][ T7332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.401712][ T7332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 338.215857][ T7332] hsr_slave_0: entered promiscuous mode [ 338.217948][ T7332] hsr_slave_1: entered promiscuous mode [ 338.229177][ T7332] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 338.229461][ T7332] Cannot create hsr debugfs directory [ 338.839102][ T7332] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 338.843696][ T7332] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 338.855359][ T7332] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 338.863192][ T7332] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 339.409031][ T7332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.986817][ T7332] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 339.987238][ T7332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 341.719640][ T7332] veth0_vlan: entered promiscuous mode [ 341.727399][ T7332] veth1_vlan: entered promiscuous mode [ 341.792372][ T7332] veth0_macvtap: entered promiscuous mode [ 341.802797][ T7332] veth1_macvtap: entered promiscuous mode [ 341.871021][ T7332] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.871540][ T7332] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.871767][ T7332] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.872052][ T7332] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.359710][ T31] audit: type=1400 audit(342.300:254): avc: denied { setopt } for pid=7755 comm="syz.1.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 342.776479][ T7766] FAULT_INJECTION: forcing a failure. [ 342.776479][ T7766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.777119][ T7766] CPU: 1 UID: 0 PID: 7766 Comm: syz.1.1257 Not tainted 6.11.0-rc2-syzkaller #0 [ 342.777466][ T7766] Hardware name: ARM-Versatile Express [ 342.777675][ T7766] Call trace: [ 342.777847][ T7766] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 342.778578][ T7766] r7:00000000 r6:00000000 r5:60000013 r4:8200bb20 [ 342.779159][ T7766] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 342.779541][ T7766] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 342.779893][ T7766] r5:00000000 r4:82748bd4 [ 342.780141][ T7766] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 342.780534][ T7766] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 342.780927][ T7766] r6:00000000 r5:e07a1f68 r4:00000002 [ 342.781187][ T7766] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 342.781583][ T7766] [<808b6378>] (should_fail_usercopy) from [<805387e0>] (simple_read_from_buffer+0x8c/0x134) [ 342.781971][ T7766] [<80538754>] (simple_read_from_buffer) from [<805ad4b4>] (proc_fail_nth_read+0xb8/0x100) [ 342.782422][ T7766] r10:00000001 r9:805ad3fc r8:00000002 r7:e07a1f68 r6:0000000f r5:76b4ff30 [ 342.782773][ T7766] r4:834b0000 r3:e07a1e9f [ 342.783022][ T7766] [<805ad3fc>] (proc_fail_nth_read) from [<80500940>] (vfs_read+0x98/0x324) [ 342.783459][ T7766] r8:76b4ff30 r7:e07a1f68 r6:834b0000 r5:0000000f r4:846d5240 [ 342.783773][ T7766] [<805008a8>] (vfs_read) from [<805015f0>] (ksys_read+0x78/0xf8) [ 342.784171][ T7766] r10:00000003 r9:834b0000 r8:8020029c r7:00000000 r6:00000000 r5:846d5240 [ 342.784550][ T7766] r4:846d5243 [ 342.784749][ T7766] [<80501578>] (ksys_read) from [<80501680>] (sys_read+0x10/0x14) [ 342.785088][ T7766] r7:00000003 r6:00000004 r5:76b4ff30 r4:0000000f [ 342.785385][ T7766] [<80501670>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 342.785778][ T7766] Exception stack(0xe07a1fa8 to 0xe07a1ff0) [ 342.786191][ T7766] 1fa0: 0000000f 76b4ff30 00000004 76b4ff30 0000000f 00000000 [ 342.786547][ T7766] 1fc0: 0000000f 76b4ff30 00000004 00000003 00000000 00006364 003d0f00 76b500bc [ 342.786883][ T7766] 1fe0: 00000158 76b4fed0 000d7cc0 00130654 [ 342.851647][ T31] audit: type=1400 audit(342.790:255): avc: denied { remove_name } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 342.853161][ T31] audit: type=1400 audit(342.800:256): avc: denied { rename } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 344.532332][ T7809] ALSA: seq fatal error: cannot create timer (-22) [ 344.553643][ T7809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7809 comm=syz.1.1275 [ 345.117280][ T31] audit: type=1400 audit(345.060:257): avc: denied { lock } for pid=7807 comm="syz.0.1276" path="socket:[13893]" dev="sockfs" ino=13893 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 349.789809][ T31] audit: type=1400 audit(349.740:258): avc: denied { setopt } for pid=7849 comm="syz.1.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 350.369213][ T47] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 350.518913][ T47] usb 2-1: device descriptor read/64, error -71 [ 350.788613][ T47] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 350.938563][ T47] usb 2-1: device descriptor read/64, error -71 [ 351.059045][ T47] usb usb2-port1: attempt power cycle [ 351.468731][ T47] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 351.500729][ T47] usb 2-1: device descriptor read/8, error -71 [ 351.778579][ T47] usb 2-1: new low-speed USB device number 6 using dummy_hcd [ 351.810185][ T47] usb 2-1: device descriptor read/8, error -71 [ 351.929102][ T47] usb usb2-port1: unable to enumerate USB device [ 352.128516][ T31] audit: type=1400 audit(352.070:259): avc: denied { getopt } for pid=7869 comm="syz.0.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 355.334813][ T31] audit: type=1400 audit(355.280:260): avc: denied { accept } for pid=7888 comm="syz.0.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 355.344619][ T31] audit: type=1400 audit(355.290:261): avc: denied { getopt } for pid=7888 comm="syz.0.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 360.203506][ T7934] fuse: Bad value for 'user_id' [ 360.203838][ T7934] fuse: Bad value for 'user_id' [ 360.264816][ T7937] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1548 sclass=netlink_tcpdiag_socket pid=7937 comm=syz.1.1320 [ 360.268433][ T31] audit: type=1400 audit(360.210:262): avc: denied { remount } for pid=7935 comm="syz.1.1320" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 360.524285][ T7949] FAULT_INJECTION: forcing a failure. [ 360.524285][ T7949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.524687][ T7949] CPU: 1 UID: 0 PID: 7949 Comm: syz.1.1324 Not tainted 6.11.0-rc2-syzkaller #0 [ 360.524870][ T7949] Hardware name: ARM-Versatile Express [ 360.524993][ T7949] Call trace: [ 360.525084][ T7949] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 360.525310][ T7949] r7:00000000 r6:00000000 r5:60000013 r4:8200bb20 [ 360.525442][ T7949] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 360.525627][ T7949] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 360.525810][ T7949] r5:00000000 r4:82748bd4 [ 360.525900][ T7949] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 360.526085][ T7949] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 360.526267][ T7949] r6:00000000 r5:dfe61f68 r4:00000002 [ 360.526385][ T7949] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 360.526579][ T7949] [<808b6378>] (should_fail_usercopy) from [<805387e0>] (simple_read_from_buffer+0x8c/0x134) [ 360.526790][ T7949] [<80538754>] (simple_read_from_buffer) from [<805ad4b4>] (proc_fail_nth_read+0xb8/0x100) [ 360.527012][ T7949] r10:00000001 r9:805ad3fc r8:00000002 r7:dfe61f68 r6:0000000f r5:76b4ff30 [ 360.527177][ T7949] r4:834b0000 r3:dfe61e9f [ 360.527278][ T7949] [<805ad3fc>] (proc_fail_nth_read) from [<80500940>] (vfs_read+0x98/0x324) [ 360.527469][ T7949] r8:76b4ff30 r7:dfe61f68 r6:834b0000 r5:0000000f r4:851e4840 [ 360.527621][ T7949] [<805008a8>] (vfs_read) from [<805015f0>] (ksys_read+0x78/0xf8) [ 360.527797][ T7949] r10:00000003 r9:834b0000 r8:8020029c r7:00000000 r6:00000000 r5:851e4840 [ 360.527980][ T7949] r4:851e4843 [ 360.528203][ T7949] [<80501578>] (ksys_read) from [<80501680>] (sys_read+0x10/0x14) [ 360.528608][ T7949] r7:00000003 r6:00000004 r5:76b4ff30 r4:0000000f [ 360.528797][ T7949] [<80501670>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 360.529052][ T7949] Exception stack(0xdfe61fa8 to 0xdfe61ff0) [ 360.529235][ T7949] 1fa0: 0000000f 76b4ff30 00000004 76b4ff30 0000000f 00000000 [ 360.529485][ T7949] 1fc0: 0000000f 76b4ff30 00000004 00000003 00000000 00006364 003d0f00 76b500bc [ 360.529724][ T7949] 1fe0: 00000158 76b4fed0 000d7cc0 00130654 [ 360.744748][ T31] audit: type=1400 audit(360.690:263): avc: denied { connect } for pid=7959 comm="syz.1.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 361.033905][ T31] audit: type=1400 audit(360.980:264): avc: denied { getopt } for pid=7972 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 361.086037][ T31] audit: type=1400 audit(361.030:265): avc: denied { read } for pid=7972 comm="syz.1.1334" path="socket:[14152]" dev="sockfs" ino=14152 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 361.533368][ T31] audit: type=1400 audit(361.480:266): avc: denied { write } for pid=7989 comm="syz.0.1340" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 361.569041][ T8] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 361.741066][ T31] audit: type=1400 audit(361.690:267): avc: denied { map } for pid=7998 comm="syz.0.1344" path="/dev/sequencer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 361.748839][ T8] usb 2-1: Using ep0 maxpacket: 32 [ 361.759816][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 361.760242][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 361.760526][ T8] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 361.760790][ T8] usb 2-1: New USB device found, idVendor=048d, idProduct=8595, bcdDevice= 0.00 [ 361.760965][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 361.762674][ T8] usb 2-1: config 0 descriptor?? [ 362.216635][ T8] itetech 0003:048D:8595.0001: unknown main item tag 0x0 [ 362.217013][ T8] itetech 0003:048D:8595.0001: unknown main item tag 0x0 [ 362.217206][ T8] itetech 0003:048D:8595.0001: unknown main item tag 0x0 [ 362.217380][ T8] itetech 0003:048D:8595.0001: unknown main item tag 0x0 [ 362.217561][ T8] itetech 0003:048D:8595.0001: unknown main item tag 0x0 [ 362.229361][ T8] itetech 0003:048D:8595.0001: hidraw0: USB HID v0.00 Device [HID 048d:8595] on usb-dummy_hcd.1-1/input0 [ 364.331119][ T47] usb 2-1: USB disconnect, device number 7 [ 364.778904][ T8052] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8052 comm=syz.1.1352 [ 365.845750][ T8054] FAULT_INJECTION: forcing a failure. [ 365.845750][ T8054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 365.846345][ T8054] CPU: 0 UID: 0 PID: 8054 Comm: syz.1.1355 Not tainted 6.11.0-rc2-syzkaller #0 [ 365.846621][ T8054] Hardware name: ARM-Versatile Express [ 365.846778][ T8054] Call trace: [ 365.846873][ T8054] [<81953b48>] (dump_backtrace) from [<81953c44>] (show_stack+0x18/0x1c) [ 365.847112][ T8054] r7:84eb239b r6:00000000 r5:60000113 r4:8200bb20 [ 365.847396][ T8054] [<81953c2c>] (show_stack) from [<81971934>] (dump_stack_lvl+0x70/0x7c) [ 365.847700][ T8054] [<819718c4>] (dump_stack_lvl) from [<81971958>] (dump_stack+0x18/0x1c) [ 365.847944][ T8054] r5:00000000 r4:82748bd4 [ 365.848030][ T8054] [<81971940>] (dump_stack) from [<808b6310>] (should_fail_ex+0x18c/0x1dc) [ 365.848330][ T8054] [<808b6184>] (should_fail_ex) from [<808b6374>] (should_fail+0x14/0x18) [ 365.848668][ T8054] r6:00000000 r5:dfc9df48 r4:00000014 [ 365.848777][ T8054] [<808b6360>] (should_fail) from [<808b6394>] (should_fail_usercopy+0x1c/0x20) [ 365.848948][ T8054] [<808b6378>] (should_fail_usercopy) from [<80805018>] (_copy_from_iter+0x64/0x5f8) [ 365.849160][ T8054] [<80804fb4>] (_copy_from_iter) from [<817e99dc>] (isotp_sendmsg+0x25c/0x7fc) [ 365.849346][ T8054] r10:dfc9df38 r9:84eb239b r8:dfc9df48 r7:00000014 r6:84eb0000 r5:84eb2000 [ 365.849544][ T8054] r4:00000000 [ 365.849626][ T8054] [<817e9780>] (isotp_sendmsg) from [<8144700c>] (__sock_sendmsg+0x44/0x78) [ 365.849806][ T8054] r10:00000000 r9:dfc9ddd4 r8:dfc9ddd4 r7:00000000 r6:83207180 r5:dfc9df38 [ 365.849987][ T8054] r4:00000000 [ 365.850078][ T8054] [<81446fc8>] (__sock_sendmsg) from [<81447f7c>] (____sys_sendmsg+0x2ac/0x2cc) [ 365.850262][ T8054] r7:00000000 r6:00000000 r5:83207180 r4:dfc9df38 [ 365.850382][ T8054] [<81447cd0>] (____sys_sendmsg) from [<81449ee8>] (___sys_sendmsg+0x9c/0xd0) [ 365.850611][ T8054] r10:dfc9de34 r9:20000580 r8:00000000 r7:00000000 r6:83207180 r5:dfc9df38 [ 365.850813][ T8054] r4:00000000 [ 365.850896][ T8054] [<81449e4c>] (___sys_sendmsg) from [<8144a400>] (sys_sendmsg+0x78/0xbc) [ 365.851070][ T8054] r10:00000128 r9:845ee000 r8:8020029c r7:00000000 r6:20000580 r5:83207180 [ 365.851331][ T8054] r4:00000000 [ 365.851414][ T8054] [<8144a388>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 365.851678][ T8054] Exception stack(0xdfc9dfa8 to 0xdfc9dff0) [ 365.851898][ T8054] dfa0: 00000000 00000000 00000003 20000580 00000000 00000000 [ 365.852066][ T8054] dfc0: 00000000 00000000 00130730 00000128 00000000 00006364 003d0f00 76b500bc [ 365.852252][ T8054] dfe0: 76b4fec0 76b4feb0 000188c0 00132780 [ 365.852400][ T8054] r7:00000128 r6:00130730 r5:00000000 r4:00000000 [ 366.417190][ T8078] netlink: 'syz.1.1365': attribute type 2 has an invalid length. [ 366.417500][ T8078] netlink: 'syz.1.1365': attribute type 1 has an invalid length. [ 367.009816][ T8105] serio: Serial port pts0 [ 367.618030][ T31] audit: type=1400 audit(367.560:268): avc: denied { shutdown } for pid=8115 comm="syz.1.1375" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 367.625226][ T31] audit: type=1400 audit(367.570:269): avc: denied { read } for pid=8115 comm="syz.1.1375" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 367.675880][ T31] audit: type=1400 audit(367.620:270): avc: denied { write } for pid=8117 comm="syz.1.1376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 369.989898][ T31] audit: type=1400 audit(369.940:271): avc: denied { create } for pid=8117 comm="syz.1.1376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 373.731482][ T31] audit: type=1400 audit(373.680:272): avc: denied { write } for pid=8134 comm="syz.0.1378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 374.637803][ T31] audit: type=1400 audit(374.580:273): avc: denied { relabelfrom } for pid=8138 comm="syz.1.1379" name="SCTP" dev="sockfs" ino=15428 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 374.637870][ T8139] SELinux: Context system_u:object_r:etc_mail_t:s0 is not valid (left unmapped). [ 374.647586][ T31] audit: type=1400 audit(374.590:274): avc: denied { relabelto } for pid=8138 comm="syz.1.1379" name="SCTP" dev="sockfs" ino=15428 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 trawcon="system_u:object_r:etc_mail_t:s0" [ 374.677520][ T31] audit: type=1400 audit(374.620:275): avc: denied { create } for pid=8138 comm="syz.1.1379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 376.571330][ T31] audit: type=1400 audit(376.520:276): avc: denied { create } for pid=8152 comm="syz.0.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 379.076828][ T31] audit: type=1400 audit(379.020:277): avc: granted { setsecparam } for pid=8197 comm="syz.1.1402" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 379.134726][ T8201] SELinux: Context system_u:object_r:tty_device_t:s0 is not valid (left unmapped). [ 379.134792][ T31] audit: type=1400 audit(379.080:278): avc: denied { relabelfrom } for pid=8200 comm="syz.1.1403" name="RAW" dev="sockfs" ino=15638 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 379.135654][ T31] audit: type=1400 audit(379.080:279): avc: denied { relabelto } for pid=8200 comm="syz.1.1403" name="RAW" dev="sockfs" ino=15638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=rawip_socket permissive=1 trawcon="system_u:object_r:tty_device_t:s0" [ 380.010392][ T8216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8216 comm=syz.0.1409 [ 385.912938][ T31] audit: type=1400 audit(385.860:280): avc: denied { getopt } for pid=8258 comm="syz.1.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 387.082844][ T31] audit: type=1400 audit(387.030:281): avc: denied { watch } for pid=8273 comm="syz.1.1431" path="/144" dev="tmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 390.651410][ T31] audit: type=1400 audit(390.600:282): avc: denied { create } for pid=8335 comm="syz.0.1446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 395.527804][ T31] audit: type=1400 audit(395.470:283): avc: denied { bind } for pid=8365 comm="syz.1.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 395.528775][ T31] audit: type=1400 audit(395.470:284): avc: denied { name_bind } for pid=8365 comm="syz.1.1458" src=288 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 395.549369][ T31] audit: type=1400 audit(395.500:285): avc: denied { node_bind } for pid=8365 comm="syz.1.1458" saddr=172.20.20.187 src=288 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 395.817044][ T8368] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1459'. [ 396.251270][ T8370] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1460'. [ 397.472039][ T8376] netlink: 'syz.1.1463': attribute type 1 has an invalid length. [ 397.790004][ T8376] 8021q: adding VLAN 0 to HW filter on device bond1 [ 397.824150][ T8376] 8021q: adding VLAN 0 to HW filter on device bond1 [ 397.825180][ T8376] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 397.826838][ T8376] bond1: (slave ip6tnl1): Error -95 calling set_mac_address [ 401.968480][ C1] hrtimer: interrupt took 10046112 ns [ 403.849709][ T8445] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1474'. [ 415.564937][ T31] audit: type=1400 audit(415.510:286): avc: denied { bind } for pid=8482 comm="syz.1.1486" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 415.568939][ T31] audit: type=1400 audit(415.520:287): avc: denied { node_bind } for pid=8482 comm="syz.1.1486" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 417.730314][ T8497] netlink: 792 bytes leftover after parsing attributes in process `syz.0.1490'. [ 425.057366][ T31] audit: type=1400 audit(424.990:288): avc: denied { name_bind } for pid=8548 comm="syz.0.1504" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 425.148949][ T31] audit: type=1400 audit(425.100:289): avc: denied { read } for pid=8548 comm="syz.0.1504" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 426.922749][ T8556] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65535 sclass=netlink_xfrm_socket pid=8556 comm=syz.1.1507 [ 427.043627][ T31] audit: type=1400 audit(426.990:290): avc: denied { audit_write } for pid=8557 comm="syz.1.1508" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 427.045035][ T31] audit: type=1107 audit(426.990:291): pid=8557 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 427.652707][ T31] audit: type=1326 audit(427.600:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.1510" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x0 [ 439.728455][ C0] sched: RT throttling activated [ 439.996996][ T31] audit: type=1400 audit(439.930:293): avc: denied { connect } for pid=8613 comm="syz.1.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 439.997762][ T31] audit: type=1400 audit(439.930:294): avc: denied { name_connect } for pid=8613 comm="syz.1.1523" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 442.357541][ T31] audit: type=1400 audit(442.300:295): avc: denied { mounton } for pid=8626 comm="syz.1.1527" path="/proc/474/task" dev="proc" ino=16487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 455.509304][ T8518] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 455.699187][ T8518] usb 2-1: Using ep0 maxpacket: 32 [ 455.713096][ T8518] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 255, changing to 11 [ 455.713626][ T8518] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 59391, setting to 1024 [ 455.714118][ T8518] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 455.714434][ T8518] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 455.724326][ T8518] usb 2-1: config 0 descriptor?? [ 455.729456][ T8675] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 455.740148][ T8518] hub 2-1:0.0: USB hub found [ 455.939005][ T8518] hub 2-1:0.0: 2 ports detected [ 457.962506][ T8518] usb 2-1: USB disconnect, device number 8 [ 457.962928][ T3786] hub 2-1:0.0: hub_ext_port_status failed (err = -71) [ 457.963445][ T3786] usb 2-1-port2: attempt power cycle [ 466.279292][ T8707] serio: Serial port ptm0 [ 469.480593][ T31] audit: type=1326 audit(469.430:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.481154][ T31] audit: type=1326 audit(469.430:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.493347][ T31] audit: type=1326 audit(469.440:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.493943][ T31] audit: type=1326 audit(469.440:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.494474][ T31] audit: type=1326 audit(469.440:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.495014][ T31] audit: type=1326 audit(469.440:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=280 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.495494][ T31] audit: type=1326 audit(469.440:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 469.496005][ T31] audit: type=1326 audit(469.440:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.0.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 475.538633][ T9] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 475.761452][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 475.761757][ T9] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 475.762094][ T9] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 475.762310][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 475.779003][ T9] usb 2-1: config 0 descriptor?? [ 476.251705][ T9] plantronics 0003:047F:FFFF.0002: unknown main item tag 0xd [ 476.252193][ T9] plantronics 0003:047F:FFFF.0002: bogus close delimiter [ 476.252495][ T9] plantronics 0003:047F:FFFF.0002: item 0 1 2 10 parsing failed [ 476.252835][ T9] plantronics 0003:047F:FFFF.0002: parse failed [ 476.253036][ T9] plantronics 0003:047F:FFFF.0002: probe with driver plantronics failed with error -22 [ 476.468925][ T24] usb 2-1: USB disconnect, device number 13 [ 480.113694][ T8793] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1577'. [ 480.979894][ T8802] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1581'. [ 481.339342][ T8809] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 481.771817][ T8819] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1588'. [ 482.499526][ T8841] sctp: [Deprecated]: syz.1.1593 (pid 8841) Use of struct sctp_assoc_value in delayed_ack socket option. [ 482.499526][ T8841] Use struct sctp_sack_info instead [ 482.500810][ T8841] sctp: [Deprecated]: syz.1.1593 (pid 8841) Use of struct sctp_assoc_value in delayed_ack socket option. [ 482.500810][ T8841] Use struct sctp_sack_info instead [ 483.477288][ T8858] Illegal XDP return value 4285923328 on prog (id 37) dev N/A, expect packet loss! [ 483.950226][ T31] audit: type=1400 audit(483.900:304): avc: denied { name_bind } for pid=8864 comm="syz.1.1603" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 484.010133][ T31] audit: type=1400 audit(483.960:305): avc: denied { accept } for pid=8864 comm="syz.1.1603" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 484.554925][ T31] audit: type=1400 audit(484.500:306): avc: denied { name_connect } for pid=8864 comm="syz.1.1603" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 485.506450][ T31] audit: type=1400 audit(485.440:307): avc: denied { write } for pid=8878 comm="syz.0.1609" path="socket:[17507]" dev="sockfs" ino=17507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 485.540719][ T8880] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1608'. [ 486.574699][ T31] audit: type=1400 audit(486.520:308): avc: denied { setattr } for pid=8894 comm="syz.1.1616" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 487.438598][ T31] audit: type=1400 audit(487.380:309): avc: denied { ioctl } for pid=8909 comm="syz.0.1623" path="socket:[17580]" dev="sockfs" ino=17580 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 501.605290][ T31] audit: type=1400 audit(501.550:310): avc: denied { name_connect } for pid=9058 comm="syz.1.1674" dest=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 502.078721][ T31] audit: type=1400 audit(502.020:311): avc: denied { write } for pid=9068 comm="syz.0.1679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 506.458749][ T2904] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 506.668414][ T2904] usb 1-1: Using ep0 maxpacket: 8 [ 506.692559][ T2904] usb 1-1: unable to get BOS descriptor or descriptor too short [ 506.723994][ T2904] usb 1-1: string descriptor 0 read error: -22 [ 506.724491][ T2904] usb 1-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.40 [ 506.724762][ T2904] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 506.988651][ T2904] usbhid 1-1:1.0: can't add hid device: -71 [ 506.992095][ T2904] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 507.000571][ T2904] usb 1-1: USB disconnect, device number 6 [ 511.178717][ T31] audit: type=1326 audit(511.120:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.179372][ T31] audit: type=1326 audit(511.120:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.180725][ T31] audit: type=1326 audit(511.120:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=263 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.181473][ T31] audit: type=1326 audit(511.120:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.181942][ T31] audit: type=1326 audit(511.120:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.191402][ T31] audit: type=1326 audit(511.130:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.192439][ T31] audit: type=1326 audit(511.130:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 511.193218][ T31] audit: type=1326 audit(511.130:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9151 comm="syz.0.1705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.268736][ T31] audit: type=1326 audit(517.190:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.269782][ T31] audit: type=1326 audit(517.190:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.270422][ T31] audit: type=1326 audit(517.190:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.270988][ T31] audit: type=1326 audit(517.190:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.271587][ T31] audit: type=1326 audit(517.190:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.272176][ T31] audit: type=1326 audit(517.190:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.272896][ T31] audit: type=1326 audit(517.190:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.288686][ T31] audit: type=1326 audit(517.190:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.291411][ T31] audit: type=1326 audit(517.240:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 517.313042][ T31] audit: type=1326 audit(517.250:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.0.1719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 518.901552][ T9207] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1726'. [ 518.901966][ T9207] netlink: 104 bytes leftover after parsing attributes in process `syz.0.1726'. [ 524.796022][ T9234] syz.0.1735[9234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.796234][ T9234] syz.0.1735[9234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.798513][ T9234] syz.0.1735[9234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.832848][ T9234] syz.0.1735[9234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.451369][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 528.451524][ T31] audit: type=1326 audit(528.400:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.453254][ T31] audit: type=1326 audit(528.400:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.454005][ T31] audit: type=1326 audit(528.400:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.454569][ T31] audit: type=1326 audit(528.400:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.455162][ T31] audit: type=1326 audit(528.400:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.455890][ T31] audit: type=1326 audit(528.400:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.456508][ T31] audit: type=1326 audit(528.400:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.468912][ T31] audit: type=1326 audit(528.400:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.469614][ T31] audit: type=1326 audit(528.400:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132780 code=0x7ffc0000 [ 528.482240][ T31] audit: type=1326 audit(528.430:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9266 comm="syz.1.1750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x7ffc0000 [ 539.651059][ T9312] capability: warning: `syz.1.1765' uses deprecated v2 capabilities in a way that may be insecure [ 539.803419][ T9317] syzkaller0: entered promiscuous mode [ 539.803855][ T9317] syzkaller0: entered allmulticast mode [ 540.351579][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 540.351641][ T31] audit: type=1326 audit(540.300:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9322 comm="syz.1.1768" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132780 code=0x0 [ 540.458786][ T9327] tap0: tun_chr_ioctl cmd 2147767517 [ 540.974602][ C0] IPv4: Oversized IP packet from 172.20.20.24 [ 542.509987][ T9350] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1778'. [ 543.586760][ T9362] netlink: 'syz.1.1783': attribute type 4 has an invalid length. [ 544.173899][ T9366] syzkaller0: entered promiscuous mode [ 544.174968][ T9366] syzkaller0: entered allmulticast mode [ 550.360243][ T9391] syzkaller0: entered promiscuous mode [ 550.360659][ T9391] syzkaller0: entered allmulticast mode [ 554.482056][ T31] audit: type=1400 audit(554.430:357): avc: denied { getopt } for pid=9409 comm="syz.0.1800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 557.551360][ T9420] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1804'. [ 560.191400][ T9424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=9424 comm=syz.1.1805 [ 562.409749][ T8570] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 562.679665][ T8570] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 562.679991][ T8570] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 562.680210][ T8570] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 562.680439][ T8570] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 562.701600][ T8570] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 562.701868][ T8570] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 562.702030][ T8570] usb 2-1: Manufacturer: syz [ 562.710302][ T8570] usb 2-1: config 0 descriptor?? [ 563.182065][ T8570] appleir 0003:05AC:8243.0003: unknown main item tag 0x0 [ 563.182730][ T8570] appleir 0003:05AC:8243.0003: No inputs registered, leaving [ 563.198823][ T8570] appleir 0003:05AC:8243.0003: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 563.499213][ T9434] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 563.500385][ T9434] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 564.242778][ T3786] usb 2-1: USB disconnect, device number 14 [ 568.766428][ T9479] fuse: Unknown parameter 'fd-IL10UoʦGu ctRA1[tT!1d1~|$YgJ$x6e[G8Xc_ANo9Lg<"0x000000000000000600000000000000000000' [ 585.028796][ T8544] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 585.212323][ T8544] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 585.212657][ T8544] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 585.213296][ T8544] usb 1-1: New USB device found, idVendor=28de, idProduct=1142, bcdDevice= 0.00 [ 585.213665][ T8544] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 585.215667][ T8544] usb 1-1: config 0 descriptor?? [ 585.692638][ T8544] hid-steam 0003:28DE:1142.0004: unknown main item tag 0x0 [ 585.693028][ T8544] hid-steam 0003:28DE:1142.0004: item fetching failed at offset 3/5 [ 585.693381][ T8544] hid-steam 0003:28DE:1142.0004: steam_probe:parse of hid interface failed [ 585.693644][ T8544] hid-steam 0003:28DE:1142.0004: probe with driver hid-steam failed with error -22 [ 585.902880][ T9199] usb 1-1: USB disconnect, device number 7 [ 586.667201][ T31] audit: type=1400 audit(586.610:358): avc: denied { unmount } for pid=7332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 586.930502][ T31] audit: type=1400 audit(586.880:359): avc: denied { create } for pid=9528 comm="syz.0.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 586.932226][ T31] audit: type=1400 audit(586.880:360): avc: denied { write } for pid=9528 comm="syz.0.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 589.770128][ T31] audit: type=1400 audit(589.720:361): avc: denied { bind } for pid=9569 comm="syz.1.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 589.793490][ T31] audit: type=1400 audit(589.740:362): avc: denied { write } for pid=9569 comm="syz.1.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 589.804058][ T31] audit: type=1400 audit(589.750:363): avc: denied { create } for pid=9573 comm="syz.0.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 589.807511][ T31] audit: type=1400 audit(589.750:364): avc: denied { getopt } for pid=9573 comm="syz.0.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 589.880124][ T31] audit: type=1400 audit(589.820:365): avc: denied { read } for pid=9569 comm="syz.1.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 590.031846][ T9570] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 590.032258][ T9570] macsec1: entered promiscuous mode [ 590.432616][ T9586] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 590.432988][ T9586] macsec1: entered promiscuous mode [ 590.502370][ T31] audit: type=1400 audit(590.450:366): avc: denied { listen } for pid=9583 comm="syz.1.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 590.855597][ T31] audit: type=1400 audit(590.800:367): avc: denied { bind } for pid=9591 comm="syz.0.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 592.360658][ T31] audit: type=1400 audit(592.310:368): avc: denied { ioctl } for pid=9604 comm="syz.0.1861" path="socket:[18901]" dev="sockfs" ino=18901 ioctlcmd=0x8b14 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 593.072021][ T31] audit: type=1400 audit(593.020:369): avc: denied { setopt } for pid=9616 comm="syz.1.1864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 593.351729][ T31] audit: type=1400 audit(593.280:370): avc: denied { create } for pid=9621 comm="syz.1.1865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 594.512181][ T9640] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1871'. [ 607.574236][ T31] audit: type=1400 audit(607.520:371): avc: denied { set_context_mgr } for pid=9694 comm="syz.0.1896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 607.695109][ T9697] ------------[ cut here ]------------ [ 607.695565][ T9697] kernel BUG at drivers/android/binder.c:1173! [ 607.695879][ T9697] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 607.696620][ T9697] Modules linked in: [ 607.697114][ T9697] CPU: 1 UID: 0 PID: 9697 Comm: syz.0.1896 Not tainted 6.11.0-rc2-syzkaller #0 [ 607.698168][ T9697] Hardware name: ARM-Versatile Express [ 607.699121][ T9697] PC is at binder_inc_ref_for_node+0x524/0x580 [ 607.699885][ T31] audit: type=1400 audit(607.640:372): avc: denied { map } for pid=9694 comm="syz.0.1896" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 607.699927][ T9697] LR is at binder_inc_ref_for_node+0x1e0/0x580 [ 607.701379][ T9697] pc : [<81322920>] lr : [<813225dc>] psr: 60000013 [ 607.702035][ T9697] sp : dfb21d20 ip : dfb21d20 fp : dfb21d64 [ 607.702372][ T9697] r10: 850982dc r9 : 00000000 r8 : 84cea794 [ 607.702819][ T9697] r7 : 00000000 r6 : 00000001 r5 : 84cea600 r4 : 844c0700 [ 607.703330][ T9697] r3 : 850982d0 r2 : 00000000 r1 : 84cea614 r0 : 844b19dc [ 607.703789][ T9697] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 607.704413][ T9697] Control: 30c5387d Table: 8532c240 DAC: 00000000 [ 607.705065][ T9697] Register r0 information: slab kmalloc-64 start 844b19c0 pointer offset 28 size 64 [ 607.709298][ T9697] Register r1 information: slab kmalloc-512 start 84cea600 pointer offset 20 size 512 [ 607.709925][ T9697] Register r2 information: NULL pointer [ 607.710514][ T9697] Register r3 information: slab kmalloc-64 start 850982c0 pointer offset 16 size 64 [ 607.710988][ T9697] Register r4 information: slab kmalloc-128 start 844c0700 pointer offset 0 size 128 [ 607.711438][ T9697] Register r5 information: slab kmalloc-512 start 84cea600 pointer offset 0 size 512 [ 607.711919][ T9697] Register r6 information: non-paged memory [ 607.712393][ T9697] Register r7 information: NULL pointer [ 607.712809][ T9697] Register r8 information: slab kmalloc-512 start 84cea600 pointer offset 404 size 512 [ 607.713513][ T9697] Register r9 information: NULL pointer [ 607.713839][ T9697] Register r10 information: slab kmalloc-64 start 850982c0 pointer offset 28 size 64 [ 607.714595][ T9697] Register r11 information: 2-page vmalloc region starting at 0xdfb20000 allocated at kernel_clone+0xac/0x3e4 [ 607.715284][ T9697] Register r12 information: 2-page vmalloc region starting at 0xdfb20000 allocated at kernel_clone+0xac/0x3e4 [ 607.715982][ T9697] Process syz.0.1896 (pid: 9697, stack limit = 0xdfb20000) [ 607.716385][ T9697] Stack: (0xdfb21d20 to 0xdfb22000) [ 607.716655][ T9697] 1d20: 20000013 828d19d4 84cea614 850982e4 84cea610 844b19c0 00000000 00000001 [ 607.717457][ T9697] 1d40: 00000001 00000000 20000308 dfb21eb8 8457f400 84cea600 dfb21e54 dfb21d68 [ 607.718095][ T9697] 1d60: 81327c7c 81322408 dfb21dc8 dfb21d78 804bc5b4 80826fd4 00000000 00000000 [ 607.718697][ T9697] 1d80: dfb21dac dfb21d90 8020c014 8020cff0 00000000 00000001 84eefc30 82f0ec00 [ 607.720329][ T9697] 1da0: dfb21dec 84eefc34 20000300 20000308 40086303 40106309 b5003500 b5403587 [ 607.728241][ T9697] 1dc0: 82f0ec00 ffbfff78 00000000 00000000 00000000 00000000 00000000 82f0ec00 [ 607.728869][ T9697] 1de0: dfb21e14 dfb21df0 8027cfbc 802acb1c 00000000 00000000 00000000 84cea790 [ 607.729936][ T9697] 1e00: 00000000 00000000 00000000 e2d2131c dfb21e2c dfb21e20 8197e948 c0306201 [ 607.730296][ T9697] 1e20: 8290bd54 e2d2131c 00000000 00000008 00000000 c0306201 82f0ec00 dfb21eb0 [ 607.730650][ T9697] 1e40: 84cea600 852bbd80 dfb21f14 dfb21e58 8132ba74 81327774 00000008 dfb21eb8 [ 607.731094][ T9697] 1e60: 20000300 00000000 00000000 00000000 00000000 00000000 00000062 852bbd80 [ 607.731623][ T9697] 1e80: 00000007 82f0ec00 dfb21ee4 8457f400 200003c0 84cea600 8290bd54 00000001 [ 607.731977][ T9697] 1ea0: dfb21eb4 00000000 852b3250 83321330 00000008 00000000 00000000 00000000 [ 607.732322][ T9697] 1ec0: 20000300 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 607.732699][ T9697] 1ee0: 806f6bb8 e2d2131c dfb21f14 c0306201 00000000 852bbd81 200003c0 852bbd80 [ 607.733055][ T9697] 1f00: 00000007 82f0ec00 dfb21fa4 dfb21f18 8051a1d0 8132a708 82f0ec00 00000001 [ 607.733423][ T9697] 1f20: ecac8b10 82f0ec00 dfb21f44 dfb21f38 81972e70 81972d40 dfb21f5c dfb21f48 [ 607.733773][ T9697] 1f40: 8024bb50 8027b53c 40000000 dfb21fb0 dfb21f84 dfb21f60 80202dd8 8024bb0c [ 607.734145][ T9697] 1f60: 8261c9cc dfb21fb0 0014cc30 ecac8b10 80202cc0 e2d2131c dfb21fac 00000000 [ 607.734494][ T9697] 1f80: 00000000 00266408 00000036 8020029c 82f0ec00 00000036 00000000 dfb21fa8 [ 607.734842][ T9697] 1fa0: 80200060 8051a0a8 00000000 00000000 00000007 c0306201 200003c0 00000000 [ 607.735220][ T9697] 1fc0: 00000000 00000000 00266408 00000036 00000000 00006364 003d0f00 76b960bc [ 607.735566][ T9697] 1fe0: 76b95ec0 76b95eb0 000188c0 00132780 60000010 00000007 00000000 00000000 [ 607.735947][ T9697] Call trace: [ 607.736189][ T9697] [<813223fc>] (binder_inc_ref_for_node) from [<81327c7c>] (binder_thread_write+0x514/0x1560) [ 607.736681][ T9697] r10:84cea600 r9:8457f400 r8:dfb21eb8 r7:20000308 r6:00000000 r5:00000001 [ 607.737083][ T9697] r4:00000001 [ 607.737251][ T9697] [<81327768>] (binder_thread_write) from [<8132ba74>] (binder_ioctl+0x1378/0x1884) [ 607.737646][ T9697] r10:852bbd80 r9:84cea600 r8:dfb21eb0 r7:82f0ec00 r6:c0306201 r5:00000000 [ 607.737966][ T9697] r4:00000008 [ 607.738482][ T9697] [<8132a6fc>] (binder_ioctl) from [<8051a1d0>] (sys_ioctl+0x134/0xda4) [ 607.739238][ T9697] r10:82f0ec00 r9:00000007 r8:852bbd80 r7:200003c0 r6:852bbd81 r5:00000000 [ 607.739573][ T9697] r4:c0306201 [ 607.739973][ T9697] [<8051a09c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 607.740853][ T9697] Exception stack(0xdfb21fa8 to 0xdfb21ff0) [ 607.741486][ T9697] 1fa0: 00000000 00000000 00000007 c0306201 200003c0 00000000 [ 607.742977][ T9697] 1fc0: 00000000 00000000 00266408 00000036 00000000 00006364 003d0f00 76b960bc [ 607.743626][ T9697] 1fe0: 76b95ec0 76b95eb0 000188c0 00132780 [ 607.744021][ T9697] r10:00000036 r9:82f0ec00 r8:8020029c r7:00000036 r6:00266408 r5:00000000 [ 607.744628][ T9697] r4:00000000 [ 607.745138][ T9697] Code: eafffef1 e1a0000a ebc666bf eafffeee (e7f001f2) [ 607.746286][ T9697] ---[ end trace 0000000000000000 ]--- [ 607.746907][ T9697] Kernel panic - not syncing: Fatal exception [ 607.748937][ T9697] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:08:24 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=dddd38c0 R02=00008895 R03=00000007 R04=ddc7932e R05=00000008 R06=ddc70a99 R07=00000008 R08=dddc7430 R09=dddc7480 R10=0000008d R11=df801eb4 R12=df801eb8 R13=df801e98 R14=8030e8b0 R15=8120004c PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=82fc2040 R01=0000005d R02=eb2d1000 R03=eb2d1018 R04=8286e425 R05=82fc2040 R06=809b2760 R07=8286e45b R08=8286e418 R09=00000044 R10=60000093 R11=dfb21a5c R12=00000002 R13=dfb21a50 R14=827525dc R15=809b2770 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000