last executing test programs: 11.807410003s ago: executing program 1 (id=1246): r0 = socket$inet6(0xa, 0x2, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="80000fdc2208a1ce", 0x8, 0x0, 0x0, 0x0) 11.470703553s ago: executing program 1 (id=1247): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newnexthop={0x24, 0x68, 0x1, 0x3, 0x80000000, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x6}]}]}, 0x24}}, 0x40000) 11.290088127s ago: executing program 1 (id=1249): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='huge=always,mpol=interleave']) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0x208e24b) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x3e, 0x0, 0x0) 8.526522586s ago: executing program 1 (id=1255): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r1, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r2, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) 7.475514146s ago: executing program 1 (id=1258): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x4, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010108, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x5, 0x0, 0x20}}}}}}, 0x0) 7.060260609s ago: executing program 1 (id=1260): sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa00000000000000001400020002000000e000000200000000000004000d0001"], 0x54}}, 0x0) r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000007c0)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f000200000009050502000000001009058b1e20"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0xc0105b08, &(0x7f0000000040)) 421.047768ms ago: executing program 0 (id=1279): pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) splice(r0, 0x0, r1, 0x0, 0x7, 0xa) 337.22619ms ago: executing program 0 (id=1280): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='children\x00') linkat(r0, &(0x7f0000000000)='\x00', r0, &(0x7f0000000040)='./file4\x00', 0x1400) 249.277183ms ago: executing program 0 (id=1281): signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 169.034085ms ago: executing program 0 (id=1282): r0 = socket$inet(0x2, 0x3, 0x1) close(r0) inotify_init1(0x0) fchown(r0, 0x0, 0x0) 79.711808ms ago: executing program 0 (id=1283): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) 0s ago: executing program 0 (id=1284): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x2, 0x0) kernel console output (not intermixed with test programs): >] (dump_stack+0x18/0x1c) [ 339.688465][ T5287] r5:00000000 r4:8271b79c [ 339.688667][ T5287] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 339.689032][ T5287] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 339.689747][ T5287] r6:00000cc0 r5:83ded500 r4:82c01540 [ 339.690196][ T5287] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 339.690876][ T5287] [<804d368c>] (__kmalloc_cache_noprof) from [<813bb2bc>] (snd_pcm_oss_change_params_locked+0x278/0xca8) [ 339.691368][ T5287] r10:850d9804 r9:000003e8 r8:850d9c00 r7:00000018 r6:8223c6bc r5:83ded500 [ 339.691761][ T5287] r4:850d9800 [ 339.691934][ T5287] [<813bb044>] (snd_pcm_oss_change_params_locked) from [<813bbf68>] (snd_pcm_oss_get_active_substream+0x94/0xc0) [ 339.692387][ T5287] r10:850d9eb8 r9:e067ded4 r8:850d9eb8 r7:84043c44 r6:84043c44 r5:83ded500 [ 339.692772][ T5287] r4:83ded500 [ 339.692959][ T5287] [<813bbed4>] (snd_pcm_oss_get_active_substream) from [<813bd7d0>] (snd_pcm_oss_ioctl+0x9c8/0x100c) [ 339.693449][ T5287] r9:0002ee00 r8:850d9c00 r7:84043c40 r6:20002880 r5:84043c40 r4:000003e8 [ 339.693827][ T5287] [<813bce08>] (snd_pcm_oss_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 339.694832][ T5287] r10:83d4d400 r9:00000004 r8:85453840 r7:20002880 r6:85453841 r5:00000000 [ 339.695681][ T5287] r4:c0045002 [ 339.695902][ T5287] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 339.696402][ T5287] Exception stack(0xe067dfa8 to 0xe067dff0) [ 339.696719][ T5287] dfa0: 00000000 00000000 00000004 c0045002 20002880 00000000 [ 339.697125][ T5287] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b250bc [ 339.697537][ T5287] dfe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 339.697833][ T5287] r10:00000036 r9:83d4d400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 339.698168][ T5287] r4:00000000 [ 339.857648][ T5295] FAULT_INJECTION: forcing a failure. [ 339.857648][ T5295] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.858097][ T5295] CPU: 1 UID: 0 PID: 5295 Comm: syz.0.490 Not tainted 6.12.0-syzkaller #0 [ 339.858515][ T5295] Hardware name: ARM-Versatile Express [ 339.858665][ T5295] Call trace: [ 339.858790][ T5295] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 339.859015][ T5295] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 339.859206][ T5295] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 339.859804][ T5295] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 339.860295][ T5295] r5:00000000 r4:82751908 [ 339.860466][ T5295] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 339.860832][ T5295] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 339.861102][ T5295] r6:00000000 r5:e05b5f68 r4:00000002 [ 339.861333][ T5295] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 339.861705][ T5295] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 339.862927][ T5295] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 339.863259][ T5295] r10:00000001 r9:805cc9a0 r8:00000002 r7:e05b5f68 r6:0000000f r5:76b31f30 [ 339.863554][ T5295] r4:82e44800 r3:e05b5e9f [ 339.863697][ T5295] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 339.863947][ T5295] r8:76b31f30 r7:e05b5f68 r6:82e44800 r5:0000000f r4:85453780 [ 339.864179][ T5295] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 339.864409][ T5295] r10:00000003 r9:82e44800 r8:8020029c r7:00000000 r6:00000000 r5:85453780 [ 339.864620][ T5295] r4:85453783 [ 339.864762][ T5295] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 339.865117][ T5295] r7:00000003 r6:00000004 r5:76b31f30 r4:0000000f [ 339.865333][ T5295] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 339.865663][ T5295] Exception stack(0xe05b5fa8 to 0xe05b5ff0) [ 339.866013][ T5295] 5fa0: 0000000f 76b31f30 00000004 76b31f30 0000000f 00000000 [ 339.866334][ T5295] 5fc0: 0000000f 76b31f30 00000004 00000003 00000000 00006364 003d0f00 76b320bc [ 339.866770][ T5295] 5fe0: 00000158 76b31ed0 000d8998 00131324 [ 340.395884][ T31] audit: type=1400 audit(340.330:227): avc: denied { getopt } for pid=5312 comm="syz.1.497" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.500888][ T5333] FAULT_INJECTION: forcing a failure. [ 341.500888][ T5333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.501300][ T5333] CPU: 0 UID: 0 PID: 5333 Comm: syz.1.504 Not tainted 6.12.0-syzkaller #0 [ 341.501549][ T5333] Hardware name: ARM-Versatile Express [ 341.501679][ T5333] Call trace: [ 341.501788][ T5333] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 341.502026][ T5333] r7:00000000 r6:76b24f30 r5:60000013 r4:820413b8 [ 341.502220][ T5333] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 341.502485][ T5333] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 341.502674][ T5333] r5:00000000 r4:82751908 [ 341.502788][ T5333] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 341.502999][ T5333] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 341.503245][ T5333] r6:76b24f30 r5:00000001 r4:00000001 [ 341.503378][ T5333] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 341.503676][ T5333] [<808f19d4>] (should_fail_usercopy) from [<8084f240>] (kstrtouint_from_user+0x60/0x134) [ 341.503920][ T5333] [<8084f1e0>] (kstrtouint_from_user) from [<805cdf64>] (proc_fail_nth_write+0x40/0xe8) [ 341.504191][ T5333] r8:ea949f68 r7:83d5b000 r6:00000001 r5:85443300 r4:00000001 [ 341.504410][ T5333] [<805cdf24>] (proc_fail_nth_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 341.504658][ T5333] r5:85443300 r4:805cdf24 [ 341.504798][ T5333] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 341.505042][ T5333] r10:00000004 r9:83d5b000 r8:8020029c r7:00000000 r6:00000002 r5:85443300 [ 341.505335][ T5333] r4:85443303 [ 341.505517][ T5333] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 341.505773][ T5333] r7:00000004 r6:00000003 r5:76b24f30 r4:00000001 [ 341.506000][ T5333] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 341.506324][ T5333] Exception stack(0xea949fa8 to 0xea949ff0) [ 341.506520][ T5333] 9fa0: 00000001 76b24f30 00000003 76b24f30 00000001 00000000 [ 341.506803][ T5333] 9fc0: 00000001 76b24f30 00000003 00000004 00000000 00006364 003d0f00 76b250bc [ 341.507112][ T5333] 9fe0: 00000158 76b24ed0 000d8998 001313ec [ 344.293151][ T5360] FAULT_INJECTION: forcing a failure. [ 344.293151][ T5360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.294039][ T5360] CPU: 1 UID: 0 PID: 5360 Comm: syz.1.511 Not tainted 6.12.0-syzkaller #0 [ 344.294394][ T5360] Hardware name: ARM-Versatile Express [ 344.294633][ T5360] Call trace: [ 344.294819][ T5360] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 344.295203][ T5360] r7:ead8de20 r6:20000380 r5:60000013 r4:820413b8 [ 344.295428][ T5360] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 344.295813][ T5360] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 344.296171][ T5360] r5:00000000 r4:82751908 [ 344.296369][ T5360] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 344.296767][ T5360] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 344.297136][ T5360] r6:20000380 r5:00000000 r4:ead8df20 [ 344.297367][ T5360] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 344.297726][ T5360] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 344.298129][ T5360] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 344.298467][ T5360] r8:00000040 r7:00000000 r6:84c3ea00 r5:ead8df20 r4:ead8de64 [ 344.298771][ T5360] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 344.299144][ T5360] r10:00000128 r9:83d4bc00 r8:854439c0 r7:00000040 r6:20000380 r5:854439c1 [ 344.299809][ T5360] r4:00000004 [ 344.300167][ T5360] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 344.300648][ T5360] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 344.300961][ T5360] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 344.301343][ T5360] Exception stack(0xead8dfa8 to 0xead8dff0) [ 344.301663][ T5360] dfa0: 00000000 00000000 00000004 20000380 00000040 00000000 [ 344.302046][ T5360] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76aa10bc [ 344.302426][ T5360] dfe0: 76aa0ec0 76aa0eb0 00018af0 00133450 [ 347.466994][ T5375] FAULT_INJECTION: forcing a failure. [ 347.466994][ T5375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.467801][ T5375] CPU: 0 UID: 0 PID: 5375 Comm: syz.1.513 Not tainted 6.12.0-syzkaller #0 [ 347.468107][ T5375] Hardware name: ARM-Versatile Express [ 347.468261][ T5375] Call trace: [ 347.468431][ T5375] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 347.468734][ T5375] r7:eb041e20 r6:20000340 r5:60000013 r4:820413b8 [ 347.468961][ T5375] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 347.469487][ T5375] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 347.470208][ T5375] r5:00000000 r4:82751908 [ 347.470425][ T5375] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 347.470748][ T5375] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 347.471086][ T5375] r6:20000340 r5:00000000 r4:eb041f20 [ 347.471306][ T5375] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 347.471666][ T5375] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 347.472031][ T5375] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 347.472340][ T5375] r8:00048000 r7:00000000 r6:84c3e280 r5:eb041f20 r4:eb041e64 [ 347.472594][ T5375] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 347.473036][ T5375] r10:00000128 r9:83d6d400 r8:854430c0 r7:00048000 r6:20000340 r5:854430c1 [ 347.475077][ T5375] r4:00000004 [ 347.475345][ T5375] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 347.476265][ T5375] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 347.476648][ T5375] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 347.476957][ T5375] Exception stack(0xeb041fa8 to 0xeb041ff0) [ 347.477188][ T5375] 1fa0: 00000000 00000000 00000004 20000340 00048000 00000000 [ 347.477451][ T5375] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76aa10bc [ 347.477697][ T5375] 1fe0: 76aa0ec0 76aa0eb0 00018af0 00133450 [ 347.485910][ T31] audit: type=1400 audit(347.420:228): avc: denied { remove_name } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.487370][ T31] audit: type=1400 audit(347.420:229): avc: denied { rename } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.484851][ T31] audit: type=1400 audit(348.420:230): avc: denied { ioctl } for pid=5378 comm="syz.0.516" path="socket:[6666]" dev="sockfs" ino=6666 ioctlcmd=0x9402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 348.504139][ T31] audit: type=1400 audit(348.440:231): avc: denied { setopt } for pid=5378 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.763040][ T5387] fuse: Bad value for 'fd' [ 354.350912][ T31] audit: type=1400 audit(354.290:232): avc: denied { write } for pid=5400 comm="syz.1.522" path="socket:[6695]" dev="sockfs" ino=6695 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 354.437021][ T5409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5409 comm=syz.1.522 [ 354.441428][ T5409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=5409 comm=syz.1.522 [ 355.068270][ T5416] FAULT_INJECTION: forcing a failure. [ 355.068270][ T5416] name failslab, interval 1, probability 0, space 0, times 0 [ 355.068940][ T5416] CPU: 1 UID: 0 PID: 5416 Comm: syz.0.524 Not tainted 6.12.0-syzkaller #0 [ 355.069369][ T5416] Hardware name: ARM-Versatile Express [ 355.069868][ T5416] Call trace: [ 355.070106][ T5416] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 355.070717][ T5416] r7:00000dc0 r6:844c6b40 r5:60000013 r4:820413b8 [ 355.071839][ T5416] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 355.072507][ T5416] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 355.073071][ T5416] r5:00000000 r4:8271b79c [ 355.073698][ T5416] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 355.074148][ T5416] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 355.074548][ T5416] r6:844c6b40 r5:00000540 r4:82c01600 [ 355.074794][ T5416] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 355.075190][ T5416] [<804d4614>] (__kmalloc_noprof) from [<81728428>] (tls_get_rec+0x38/0x1f8) [ 355.075638][ T5416] r10:837cfa00 r9:eb3edf20 r8:844c6b40 r7:833bc280 r6:844c6b40 r5:00000540 [ 355.075994][ T5416] r4:00000338 [ 355.076163][ T5416] [<817283f0>] (tls_get_rec) from [<8172b470>] (tls_sw_sendmsg+0x4b8/0xa68) [ 355.076546][ T5416] r10:00000000 r9:eb3edf20 r8:844c6b40 r7:833bc280 r6:837cfa6c r5:00000000 [ 355.076883][ T5416] r4:00000338 [ 355.077054][ T5416] [<8172afb8>] (tls_sw_sendmsg) from [<81764c24>] (inet6_sendmsg+0x40/0x4c) [ 355.077429][ T5416] r10:00000000 r9:eb3eddc4 r8:eb3eddc4 r7:833bc280 r6:844c6b40 r5:00000338 [ 355.077914][ T5416] r4:eb3edf20 [ 355.078198][ T5416] [<81764be4>] (inet6_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 355.079036][ T5416] r7:833bc280 r6:833bc280 r5:eb3edf20 r4:00000000 [ 355.079673][ T5416] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 355.080233][ T5416] r7:833bc280 r6:00000000 r5:00000000 r4:eb3edf20 [ 355.080745][ T5416] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 355.081302][ T5416] r10:eb3ede24 r9:20000940 r8:00000000 r7:00000000 r6:833bc280 r5:eb3edf20 [ 355.081636][ T5416] r4:00000000 [ 355.081817][ T5416] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 355.082206][ T5416] r10:00000128 r9:83d4b000 r8:854416c0 r7:00000000 r6:20000940 r5:854416c1 [ 355.082556][ T5416] r4:00000003 [ 355.082860][ T5416] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 355.083770][ T5416] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 355.084206][ T5416] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 355.084800][ T5416] Exception stack(0xeb3edfa8 to 0xeb3edff0) [ 355.085217][ T5416] dfa0: 00000000 00000000 00000003 20000940 00000000 00000000 [ 355.085577][ T5416] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b320bc [ 355.085952][ T5416] dfe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 355.304090][ T31] audit: type=1400 audit(355.240:233): avc: denied { write } for pid=5420 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 355.873946][ T31] audit: type=1400 audit(355.810:234): avc: denied { getopt } for pid=5420 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 355.886472][ T31] audit: type=1400 audit(355.820:235): avc: denied { setopt } for pid=5420 comm="syz.0.526" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 355.896583][ T31] audit: type=1400 audit(355.830:236): avc: denied { ioctl } for pid=5420 comm="syz.0.526" path="socket:[6730]" dev="sockfs" ino=6730 ioctlcmd=0x9410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 355.907000][ T31] audit: type=1400 audit(355.840:237): avc: denied { setopt } for pid=5420 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 356.998055][ T31] audit: type=1400 audit(356.930:238): avc: denied { bind } for pid=5431 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 357.002329][ T31] audit: type=1400 audit(356.930:239): avc: denied { node_bind } for pid=5431 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 357.055385][ T5432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5432 comm=syz.1.529 [ 357.276311][ T5436] fuse: Unknown parameter 'user_id00000000000000000000' [ 359.216931][ T31] audit: type=1400 audit(359.150:240): avc: denied { create } for pid=5442 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 359.224798][ T31] audit: type=1400 audit(359.160:241): avc: denied { write } for pid=5442 comm="syz.0.534" path="socket:[7604]" dev="sockfs" ino=7604 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 359.712913][ T5448] fuse: Bad value for 'fd' [ 361.463191][ T31] audit: type=1400 audit(361.400:242): avc: denied { accept } for pid=5455 comm="syz.0.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 361.470940][ T31] audit: type=1400 audit(361.410:243): avc: denied { ioctl } for pid=5455 comm="syz.0.539" path="socket:[6781]" dev="sockfs" ino=6781 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 362.471505][ T5465] fuse: Bad value for 'fd' [ 364.731359][ T5471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=5471 comm=syz.0.542 [ 364.741007][ T5471] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=5471 comm=syz.0.542 [ 366.246633][ T5483] fuse: Bad value for 'fd' [ 367.865290][ T5500] fuse: Unknown parameter '0x0000000000000004' [ 369.608478][ T5511] FAULT_INJECTION: forcing a failure. [ 369.608478][ T5511] name failslab, interval 1, probability 0, space 0, times 0 [ 369.609202][ T5511] CPU: 1 UID: 0 PID: 5511 Comm: syz.0.554 Not tainted 6.12.0-syzkaller #0 [ 369.610126][ T5511] Hardware name: ARM-Versatile Express [ 369.610566][ T5511] Call trace: [ 369.610877][ T5511] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 369.611533][ T5511] r7:836ae000 r6:00000cc0 r5:60000113 r4:820413b8 [ 369.611844][ T5511] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 369.612362][ T5511] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 369.612844][ T5511] r5:00000000 r4:8271b79c [ 369.613074][ T5511] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 369.613471][ T5511] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 369.613853][ T5511] r6:00000cc0 r5:842e1300 r4:82c02e40 [ 369.614064][ T5511] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 369.614431][ T5511] [<804d42e0>] (kmem_cache_alloc_noprof) from [<804b067c>] (__anon_vma_prepare+0x34/0x1b0) [ 369.614906][ T5511] r10:eb5bdec8 r9:83d99b00 r8:828c5ae0 r7:83d99b00 r6:842e1300 r5:842e1300 [ 369.615284][ T5511] r4:eb5bdda8 [ 369.615543][ T5511] [<804b0648>] (__anon_vma_prepare) from [<804974f4>] (__vmf_anon_prepare+0x5c/0xcc) [ 369.616014][ T5511] r10:eb5bdec8 r9:83d99b00 r8:00000001 r7:00000000 r6:20002000 r5:842e1300 [ 369.616398][ T5511] r4:eb5bdda8 r3:00000215 [ 369.616634][ T5511] [<80497498>] (__vmf_anon_prepare) from [<8049b2e4>] (handle_mm_fault+0xcd8/0x135c) [ 369.617103][ T5511] r7:00000000 r6:20002000 r5:836ae000 r4:00000215 [ 369.617387][ T5511] [<8049a60c>] (handle_mm_fault) from [<802141f4>] (do_page_fault+0xec/0x3d8) [ 369.617848][ T5511] r10:00000002 r9:83d99b00 r8:00000215 r7:20002000 r6:00000a06 r5:20002bc0 [ 369.618196][ T5511] r4:eb5bdec8 [ 369.618394][ T5511] [<80214108>] (do_page_fault) from [<80214660>] (do_translation_fault+0xfc/0x12c) [ 369.618841][ T5511] r10:836ae000 r9:836ae000 r8:80214564 r7:eb5bdec8 r6:20002bc0 r5:00000a06 [ 369.619210][ T5511] r4:8261d374 [ 369.619643][ T5511] [<80214564>] (do_translation_fault) from [<802146c8>] (do_DataAbort+0x38/0xa8) [ 369.620564][ T5511] r9:836ae000 r8:80214564 r7:eb5bdec8 r6:20002bc0 r5:00000a06 r4:8261d374 [ 369.620929][ T5511] [<80214690>] (do_DataAbort) from [<80200b0c>] (__dabt_svc+0x4c/0x80) [ 369.621338][ T5511] Exception stack(0xeb5bdec8 to 0xeb5bdf10) [ 369.621659][ T5511] dec0: 20002bc0 7effffff 00001000 b5003500 00000002 00000000 [ 369.622003][ T5511] dee0: 854410c1 20002bc0 854410c0 b5403587 836ae000 eb5bdfa4 a1002bc3 eb5bdf18 [ 369.622329][ T5511] df00: 80536fa4 81989c28 80000013 ffffffff [ 369.622641][ T5511] r8:854410c0 r7:eb5bdefc r6:ffffffff r5:80000013 r4:81989c28 [ 369.622971][ T5511] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 369.623355][ T5511] Exception stack(0xeb5bdfa8 to 0xeb5bdff0) [ 369.623716][ T5511] dfa0: 00000000 00000000 00000003 00000002 20002bc0 00000000 [ 369.624154][ T5511] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b320bc [ 369.624657][ T5511] dfe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 369.624955][ T5511] r10:00000036 r9:836ae000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 369.625300][ T5511] r4:00000000 [ 369.825331][ T5515] fuse: Unknown parameter '0x0000000000000004' [ 371.491074][ T5542] fuse: Unknown parameter '0x0000000000000004' [ 373.314706][ T5553] fuse: Unknown parameter '0x0000000000000004' [ 373.630183][ T31] audit: type=1400 audit(373.560:244): avc: denied { write } for pid=5554 comm="syz.1.568" name="net" dev="proc" ino=7732 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 373.634433][ T31] audit: type=1400 audit(373.570:245): avc: denied { add_name } for pid=5554 comm="syz.1.568" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 373.636183][ T31] audit: type=1400 audit(373.570:246): avc: denied { create } for pid=5554 comm="syz.1.568" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 373.636917][ T31] audit: type=1400 audit(373.570:247): avc: denied { associate } for pid=5554 comm="syz.1.568" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 374.046581][ T5562] fuse: Unknown parameter '0x0000000000000004' [ 374.872252][ T5575] fuse: Unknown parameter '0x0000000000000004' [ 375.490611][ T5585] fuse: Unknown parameter 'fd0x0000000000000004' [ 376.977773][ T5595] can: request_module (can-proto-5) failed. [ 377.311599][ T5599] fuse: Unknown parameter 'fd0x0000000000000004' [ 382.034769][ T31] audit: type=1400 audit(381.970:248): avc: denied { shutdown } for pid=5618 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 387.476386][ T31] audit: type=1400 audit(387.410:249): avc: denied { setattr } for pid=5653 comm="syz.1.609" name="NETLINK" dev="sockfs" ino=7924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 388.339154][ T5674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5674 comm=syz.0.616 [ 390.931073][ T5687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=5687 comm=syz.0.618 [ 390.951625][ T5687] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=5687 comm=syz.0.618 [ 394.577552][ T5704] Invalid ELF header type: 2 != 1 [ 394.580868][ T31] audit: type=1400 audit(394.510:250): avc: denied { module_load } for pid=5703 comm="syz.1.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 395.620580][ T5713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=5713 comm=syz.0.626 [ 397.066309][ T5721] sctp: [Deprecated]: syz.0.634 (pid 5721) Use of int in maxseg socket option. [ 397.066309][ T5721] Use struct sctp_assoc_value instead [ 398.885130][ T31] audit: type=1400 audit(398.820:251): avc: denied { nlmsg_write } for pid=5732 comm="syz.0.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 399.267653][ T31] audit: type=1400 audit(399.200:252): avc: denied { accept } for pid=5736 comm="syz.0.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 402.950256][ T31] audit: type=1400 audit(402.870:253): avc: denied { setattr } for pid=5760 comm="syz.1.648" path="pipe:[8110]" dev="pipefs" ino=8110 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 404.043127][ T31] audit: type=1400 audit(403.980:254): avc: denied { compute_member } for pid=5767 comm="syz.1.651" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 404.082524][ T5773] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5773 comm=syz.0.653 [ 406.523722][ T31] audit: type=1400 audit(406.460:255): avc: denied { create } for pid=5784 comm="syz.1.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 407.789155][ T31] audit: type=1400 audit(407.720:256): avc: denied { map } for pid=5800 comm="syz.1.665" path="socket:[8290]" dev="sockfs" ino=8290 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 407.796629][ T31] audit: type=1400 audit(407.730:257): avc: denied { read accept } for pid=5800 comm="syz.1.665" path="socket:[8290]" dev="sockfs" ino=8290 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 408.040978][ T5094] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 408.044773][ T31] audit: type=1400 audit(407.980:258): avc: denied { setopt } for pid=5800 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 408.230820][ T5094] usb 2-1: Using ep0 maxpacket: 32 [ 408.242893][ T5094] usb 2-1: config 1 interface 0 altsetting 250 endpoint 0x81 has an invalid bInterval 200, changing to 11 [ 408.243821][ T5094] usb 2-1: config 1 interface 0 altsetting 250 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 408.244232][ T5094] usb 2-1: config 1 interface 0 has no altsetting 0 [ 408.261094][ T5094] usb 2-1: New USB device found, idVendor=1130, idProduct=3101, bcdDevice= 0.40 [ 408.261589][ T5094] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 408.261889][ T5094] usb 2-1: Product: syz [ 408.262062][ T5094] usb 2-1: Manufacturer: syz [ 408.262261][ T5094] usb 2-1: SerialNumber: syz [ 408.525042][ T5094] usbhid 2-1:1.0: can't add hid device: -71 [ 408.525623][ T5094] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 408.528279][ T5094] usb 2-1: USB disconnect, device number 2 [ 410.053113][ T31] audit: type=1400 audit(409.980:259): avc: denied { write } for pid=5844 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 410.653325][ T5857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5857 comm=syz.1.680 [ 413.192666][ T5863] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5863 comm=syz.0.682 [ 413.193838][ T31] audit: type=1400 audit(413.130:260): avc: denied { write } for pid=5862 comm="syz.0.682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.571592][ T5870] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5870 comm=syz.1.685 [ 415.372207][ T31] audit: type=1400 audit(415.310:261): avc: denied { listen } for pid=5878 comm="syz.1.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.625545][ T31] audit: type=1400 audit(415.560:262): avc: denied { write } for pid=5878 comm="syz.1.688" path="socket:[8387]" dev="sockfs" ino=8387 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 422.314134][ T5929] FAULT_INJECTION: forcing a failure. [ 422.314134][ T5929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.314960][ T5929] CPU: 0 UID: 0 PID: 5929 Comm: syz.0.703 Not tainted 6.12.0-syzkaller #0 [ 422.315314][ T5929] Hardware name: ARM-Versatile Express [ 422.315600][ T5929] Call trace: [ 422.315822][ T5929] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 422.316233][ T5929] r7:84534000 r6:00000000 r5:60000013 r4:820413b8 [ 422.316505][ T5929] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 422.316904][ T5929] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 422.317267][ T5929] r5:00000000 r4:82751908 [ 422.317482][ T5929] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 422.317886][ T5929] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 422.318259][ T5929] r6:00000000 r5:ed2b9f30 r4:00000014 [ 422.318625][ T5929] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 422.319074][ T5929] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 422.319928][ T5929] [<80843950>] (_copy_from_iter) from [<815bb53c>] (netlink_sendmsg+0x19c/0x43c) [ 422.320600][ T5929] r10:00000000 r9:00000000 r8:ed2b9f30 r7:84a55000 r6:00000014 r5:85435540 [ 422.320985][ T5929] r4:ed2b9f20 [ 422.321165][ T5929] [<815bb3a0>] (netlink_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 422.321576][ T5929] r10:00000000 r9:ed2b9dc4 r8:ed2b9dc4 r7:84c3e500 r6:84c3e500 r5:ed2b9f20 [ 422.321941][ T5929] r4:00000000 [ 422.322130][ T5929] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 422.322553][ T5929] r7:84c3e500 r6:00000000 r5:00040080 r4:ed2b9f20 [ 422.322865][ T5929] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 422.323278][ T5929] r10:ed2b9e24 r9:2000c200 r8:00040080 r7:00000000 r6:84c3e500 r5:ed2b9f20 [ 422.323694][ T5929] r4:00000000 [ 422.323893][ T5929] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 422.324312][ T5929] r10:00000128 r9:84091800 r8:84476000 r7:00040080 r6:2000c200 r5:84476001 [ 422.324678][ T5929] r4:00000003 [ 422.324880][ T5929] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 422.325288][ T5929] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 422.325622][ T5929] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 422.326039][ T5929] Exception stack(0xed2b9fa8 to 0xed2b9ff0) [ 422.326370][ T5929] 9fa0: 00000000 00000000 00000003 2000c200 00040080 00000000 [ 422.326777][ T5929] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b320bc [ 422.327217][ T5929] 9fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 422.604455][ T31] audit: type=1400 audit(422.540:263): avc: denied { read } for pid=5931 comm="syz.0.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 428.983288][ T5968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5968 comm=syz.0.716 [ 430.527694][ T31] audit: type=1400 audit(430.460:264): avc: denied { shutdown } for pid=5986 comm="syz.1.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 430.528456][ T31] audit: type=1400 audit(430.460:265): avc: denied { read } for pid=5986 comm="syz.1.725" path="socket:[9478]" dev="sockfs" ino=9478 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 431.120376][ T31] audit: type=1400 audit(431.050:266): avc: denied { getopt } for pid=5986 comm="syz.1.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 431.880718][ T5992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=5992 comm=syz.0.720 [ 435.462634][ T6020] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=6020 comm=syz.0.730 [ 443.500298][ T6056] FAULT_INJECTION: forcing a failure. [ 443.500298][ T6056] name failslab, interval 1, probability 0, space 0, times 0 [ 443.501030][ T6056] CPU: 1 UID: 0 PID: 6056 Comm: syz.0.746 Not tainted 6.12.0-syzkaller #0 [ 443.501402][ T6056] Hardware name: ARM-Versatile Express [ 443.501881][ T6056] Call trace: [ 443.502296][ T6056] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 443.502926][ T6056] r7:00000d40 r6:85441f28 r5:60000013 r4:820413b8 [ 443.503246][ T6056] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 443.503749][ T6056] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 443.504182][ T6056] r5:00000000 r4:8271b79c [ 443.504402][ T6056] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 443.504823][ T6056] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 443.505250][ T6056] r6:85441f28 r5:0000001b r4:82c01240 [ 443.505499][ T6056] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 443.505936][ T6056] [<804d4614>] (__kmalloc_noprof) from [<8075b87c>] (tomoyo_encode2+0x64/0xf0) [ 443.506364][ T6056] r10:00000fff r9:82c9d800 r8:00000000 r7:833c7d48 r6:85441f28 r5:83d61ffd [ 443.506738][ T6056] r4:83d61fed [ 443.506944][ T6056] [<8075b818>] (tomoyo_encode2) from [<8075b92c>] (tomoyo_encode+0x24/0x30) [ 443.507372][ T6056] r9:82c9d800 r8:00000000 r7:833c7d48 r6:85441f28 r5:00001000 r4:83d61fee [ 443.507804][ T6056] [<8075b908>] (tomoyo_encode) from [<8075b9b8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 443.508249][ T6056] r5:00001000 r4:83d61000 [ 443.509445][ T6056] [<8075b938>] (tomoyo_realpath_from_path) from [<80757d68>] (tomoyo_check_open_permission+0x150/0x1c0) [ 443.510123][ T6056] r10:83d4bc00 r9:00000004 r8:84312640 r7:00000000 r6:00000000 r5:85441f28 [ 443.510539][ T6056] r4:00000001 r3:00000001 [ 443.510975][ T6056] [<80757c18>] (tomoyo_check_open_permission) from [<8075c808>] (tomoyo_file_open+0x34/0x38) [ 443.511708][ T6056] r9:00000005 r8:85441f28 r7:00000000 r6:831acee8 r5:81a1df80 r4:85441f00 [ 443.512111][ T6056] [<8075c7d4>] (tomoyo_file_open) from [<8071a514>] (security_file_open+0x54/0x194) [ 443.512734][ T6056] r5:81a1df80 r4:85441f00 [ 443.515841][ T6056] [<8071a4c0>] (security_file_open) from [<80517ed8>] (do_dentry_open+0xe8/0x664) [ 443.519175][ T6056] r5:81a1df80 r4:85441f00 [ 443.520755][ T6056] [<80517df0>] (do_dentry_open) from [<80519f0c>] (vfs_open+0x2c/0xec) [ 443.523949][ T6056] r8:844763c0 r7:84c3ec80 r6:85441f28 r5:ed865e84 r4:85441f00 [ 443.524340][ T6056] [<80519ee0>] (vfs_open) from [<8051a00c>] (dentry_open+0x40/0x68) [ 443.527351][ T6056] r6:83d4bc00 r5:ed865e84 r4:85441f00 [ 443.528061][ T6056] [<80519fcc>] (dentry_open) from [<8056c50c>] (open_namespace+0x6c/0xbc) [ 443.528521][ T6056] r5:00000000 r4:0000000a [ 443.528753][ T6056] [<8056c4a0>] (open_namespace) from [<8056c578>] (open_related_ns+0x1c/0x20) [ 443.529586][ T6056] r6:84818000 r5:200025c0 r4:0000894c [ 443.530175][ T6056] [<8056c55c>] (open_related_ns) from [<81496b38>] (sock_ioctl+0x384/0x608) [ 443.530463][ T6056] [<814967b4>] (sock_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 443.530829][ T6056] r9:00000005 r8:844763c0 r7:200025c0 r6:844763c1 r5:00000000 r4:0000894c [ 443.531168][ T6056] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 443.531624][ T6056] Exception stack(0xed865fa8 to 0xed865ff0) [ 443.531847][ T6056] 5fa0: 00000000 00000000 00000005 0000894c 200025c0 00000000 [ 443.532348][ T6056] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b110bc [ 443.532826][ T6056] 5fe0: 76b10ec0 76b10eb0 00018af0 00133450 [ 443.533174][ T6056] r10:00000036 r9:83d4bc00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 443.533432][ T6056] r4:00000000 [ 443.598353][ T6056] ERROR: Out of memory at tomoyo_realpath_from_path. [ 445.595685][ T6067] FAULT_INJECTION: forcing a failure. [ 445.595685][ T6067] name failslab, interval 1, probability 0, space 0, times 0 [ 445.596448][ T6067] CPU: 0 UID: 0 PID: 6067 Comm: syz.0.751 Not tainted 6.12.0-syzkaller #0 [ 445.596844][ T6067] Hardware name: ARM-Versatile Express [ 445.597047][ T6067] Call trace: [ 445.597265][ T6067] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 445.597621][ T6067] r7:83d76000 r6:00000dc0 r5:60000013 r4:820413b8 [ 445.597911][ T6067] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 445.598303][ T6067] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 445.598678][ T6067] r5:00000000 r4:8271b79c [ 445.598869][ T6067] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 445.599242][ T6067] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 445.600012][ T6067] r6:00000dc0 r5:84476480 r4:82ca8600 [ 445.600434][ T6067] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 445.601085][ T6067] [<804d42e0>] (kmem_cache_alloc_noprof) from [<8071930c>] (security_file_alloc+0x30/0x1dc) [ 445.601693][ T6067] r10:00000142 r9:82e5b000 r8:82605c40 r7:84437e80 r6:00002742 r5:84476480 [ 445.602125][ T6067] r4:84476480 [ 445.602381][ T6067] [<807192dc>] (security_file_alloc) from [<8051f3c8>] (init_file+0x48/0x110) [ 445.602932][ T6067] r5:84476480 r4:84476480 [ 445.603204][ T6067] [<8051f380>] (init_file) from [<8051faf0>] (alloc_empty_file+0x78/0x13c) [ 445.604017][ T6067] r7:84437e80 r6:00002742 r5:84476480 r4:8223c820 [ 445.604455][ T6067] [<8051fa78>] (alloc_empty_file) from [<805321f8>] (path_openat+0x40/0x11a4) [ 445.604977][ T6067] r8:ed801e58 r7:ed801e58 r6:ed801f20 r5:83d76000 r4:ffffff9c [ 445.605432][ T6067] [<805321b8>] (path_openat) from [<80533408>] (do_filp_open+0xac/0x148) [ 445.605864][ T6067] r10:00000142 r9:82e5b000 r8:00000001 r7:ed801e58 r6:ed801f20 r5:83d76000 [ 445.606228][ T6067] r4:ffffff9c [ 445.606512][ T6067] [<8053335c>] (do_filp_open) from [<8051a3b8>] (do_sys_openat2+0xbc/0xe4) [ 445.607068][ T6067] r9:83d76000 r8:8020029c r7:ffffff9c r6:00000006 r5:ed801f58 r4:82e5b000 [ 445.607571][ T6067] [<8051a2fc>] (do_sys_openat2) from [<8051a7c0>] (sys_openat+0x98/0xd4) [ 445.608027][ T6067] r7:00000142 r6:00131400 r5:20000000 r4:ffffff9c [ 445.608395][ T6067] [<8051a728>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 445.608808][ T6067] Exception stack(0xed801fa8 to 0xed801ff0) [ 445.609126][ T6067] 1fa0: 00000000 00000000 ffffff9c 20000000 0000275a 00000000 [ 445.609955][ T6067] 1fc0: 00000000 00000000 00131400 00000142 00000000 00006364 003d0f00 76b320bc [ 445.610648][ T6067] 1fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 445.611189][ T6067] r5:00000000 r4:00000000 [ 449.172400][ T6079] FAULT_INJECTION: forcing a failure. [ 449.172400][ T6079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 449.173526][ T6079] CPU: 1 UID: 0 PID: 6079 Comm: syz.1.755 Not tainted 6.12.0-syzkaller #0 [ 449.174227][ T6079] Hardware name: ARM-Versatile Express [ 449.174529][ T6079] Call trace: [ 449.174804][ T6079] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 449.175373][ T6079] r7:00000000 r6:76b03f30 r5:60000013 r4:820413b8 [ 449.175760][ T6079] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 449.176137][ T6079] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 449.176523][ T6079] r5:00000000 r4:82751908 [ 449.176744][ T6079] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 449.177051][ T6079] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 449.177439][ T6079] r6:76b03f30 r5:00000001 r4:00000001 [ 449.177707][ T6079] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 449.178068][ T6079] [<808f19d4>] (should_fail_usercopy) from [<8084f240>] (kstrtouint_from_user+0x60/0x134) [ 449.178439][ T6079] [<8084f1e0>] (kstrtouint_from_user) from [<805cdf64>] (proc_fail_nth_write+0x40/0xe8) [ 449.178903][ T6079] r8:ed9c1f68 r7:82e4bc00 r6:00000001 r5:85441c00 r4:00000001 [ 449.179232][ T6079] [<805cdf24>] (proc_fail_nth_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 449.180010][ T6079] r5:85441c00 r4:805cdf24 [ 449.180450][ T6079] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 449.180879][ T6079] r10:00000004 r9:82e4bc00 r8:8020029c r7:00000000 r6:00000002 r5:85441c00 [ 449.181283][ T6079] r4:85441c03 [ 449.181521][ T6079] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 449.181936][ T6079] r7:00000004 r6:00000005 r5:76b03f30 r4:00000001 [ 449.182258][ T6079] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 449.182696][ T6079] Exception stack(0xed9c1fa8 to 0xed9c1ff0) [ 449.183014][ T6079] 1fa0: 00000001 76b03f30 00000005 76b03f30 00000001 00000000 [ 449.183493][ T6079] 1fc0: 00000001 76b03f30 00000005 00000004 00000000 00006364 003d0f00 76b040bc [ 449.183904][ T6079] 1fe0: 00000158 76b03ed0 000d8998 001313ec [ 451.100730][ T6107] dlm: non-version read from control device 8224 [ 452.124736][ T6100] FAULT_INJECTION: forcing a failure. [ 452.124736][ T6100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.125423][ T6100] CPU: 1 UID: 0 PID: 6100 Comm: syz.0.762 Not tainted 6.12.0-syzkaller #0 [ 452.125867][ T6100] Hardware name: ARM-Versatile Express [ 452.126114][ T6100] Call trace: [ 452.126334][ T6100] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 452.126774][ T6100] r7:843723a3 r6:00000000 r5:60000013 r4:820413b8 [ 452.127051][ T6100] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 452.127471][ T6100] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 452.127876][ T6100] r5:00000000 r4:82751908 [ 452.128086][ T6100] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 452.128523][ T6100] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 452.128923][ T6100] r6:00000000 r5:edaa9f30 r4:00000020 [ 452.129167][ T6100] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 452.130081][ T6100] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 452.130569][ T6100] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 452.131014][ T6100] r10:edaa9f20 r9:843723a3 r8:edaa9f30 r7:00000020 r6:84370000 r5:84372000 [ 452.131393][ T6100] r4:00000000 [ 452.131624][ T6100] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 452.132523][ T6100] r10:00000000 r9:edaa9dc4 r8:edaa9dc4 r7:833bd180 r6:833bd180 r5:edaa9f20 [ 452.133085][ T6100] r4:00000000 [ 452.133442][ T6100] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 452.133869][ T6100] r7:833bd180 r6:00000000 r5:00040000 r4:edaa9f20 [ 452.134288][ T6100] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 452.135067][ T6100] r10:edaa9e24 r9:20000200 r8:00040000 r7:00000000 r6:833bd180 r5:edaa9f20 [ 452.135509][ T6100] r4:00000000 [ 452.135704][ T6100] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 452.136122][ T6100] r10:00000128 r9:82e4bc00 r8:85441840 r7:00040000 r6:20000200 r5:85441841 [ 452.136477][ T6100] r4:00000003 [ 452.136650][ T6100] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 452.137045][ T6100] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 452.137347][ T6100] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 452.137738][ T6100] Exception stack(0xedaa9fa8 to 0xedaa9ff0) [ 452.138042][ T6100] 9fa0: 00000000 00000000 00000003 20000200 00040000 00000000 [ 452.138383][ T6100] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b320bc [ 452.138763][ T6100] 9fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 455.730796][ T6123] FAULT_INJECTION: forcing a failure. [ 455.730796][ T6123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 455.736030][ T6123] CPU: 0 UID: 0 PID: 6123 Comm: syz.1.770 Not tainted 6.12.0-syzkaller #0 [ 455.737018][ T6123] Hardware name: ARM-Versatile Express [ 455.738624][ T6123] Call trace: [ 455.738925][ T6123] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 455.739676][ T6123] r7:843723a3 r6:00000000 r5:60000113 r4:820413b8 [ 455.740520][ T6123] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 455.741416][ T6123] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 455.741841][ T6123] r5:00000000 r4:82751908 [ 455.742076][ T6123] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 455.742511][ T6123] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 455.742946][ T6123] r6:00000000 r5:ed7ddf30 r4:00000020 [ 455.743206][ T6123] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 455.743717][ T6123] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 455.744175][ T6123] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 455.744627][ T6123] r10:ed7ddf20 r9:843723a3 r8:ed7ddf30 r7:00000020 r6:84370000 r5:84372000 [ 455.745025][ T6123] r4:00000000 [ 455.745280][ T6123] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 455.747318][ T6123] r10:00000000 r9:ed7dddc4 r8:ed7dddc4 r7:831a0000 r6:831a0000 r5:ed7ddf20 [ 455.747772][ T6123] r4:00000000 [ 455.748951][ T6123] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 455.749474][ T6123] r7:831a0000 r6:00000000 r5:00040000 r4:ed7ddf20 [ 455.752326][ T6123] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 455.752949][ T6123] r10:ed7dde24 r9:20000200 r8:00040000 r7:00000000 r6:831a0000 r5:ed7ddf20 [ 455.753354][ T6123] r4:00000000 [ 455.753602][ T6123] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 455.754068][ T6123] r10:00000128 r9:83d4b000 r8:84476240 r7:00040000 r6:20000200 r5:84476241 [ 455.754635][ T6123] r4:00000003 [ 455.754857][ T6123] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 455.755277][ T6123] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 455.755664][ T6123] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 455.756101][ T6123] Exception stack(0xed7ddfa8 to 0xed7ddff0) [ 455.756435][ T6123] dfa0: 00000000 00000000 00000003 20000200 00040000 00000000 [ 455.756837][ T6123] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b250bc [ 455.757257][ T6123] dfe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 463.652682][ T6179] FAULT_INJECTION: forcing a failure. [ 463.652682][ T6179] name failslab, interval 1, probability 0, space 0, times 0 [ 463.653107][ T6179] CPU: 0 UID: 0 PID: 6179 Comm: syz.1.787 Not tainted 6.12.0-syzkaller #0 [ 463.653340][ T6179] Hardware name: ARM-Versatile Express [ 463.653468][ T6179] Call trace: [ 463.653575][ T6179] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 463.653820][ T6179] r7:83d6c800 r6:00000cc0 r5:60000013 r4:820413b8 [ 463.653965][ T6179] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 463.654153][ T6179] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 463.654337][ T6179] r5:00000000 r4:8271b79c [ 463.654446][ T6179] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 463.654967][ T6179] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 463.655494][ T6179] r6:00000cc0 r5:84518000 r4:82ca8780 [ 463.655743][ T6179] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 463.656146][ T6179] [<804d42e0>] (kmem_cache_alloc_noprof) from [<81834dac>] (can_rx_register+0x70/0x188) [ 463.656792][ T6179] r10:84818d40 r9:00000000 r8:00000000 r7:84818d40 r6:83d3f940 r5:84518000 [ 463.657046][ T6179] r4:84850000 [ 463.657148][ T6179] [<81834d3c>] (can_rx_register) from [<81847d14>] (isotp_bind+0x260/0x2ec) [ 463.657458][ T6179] r8:00000000 r7:84518344 r6:00000005 r5:00000000 r4:84850000 [ 463.657646][ T6179] [<81847ab4>] (isotp_bind) from [<81497384>] (__sys_bind+0xec/0x108) [ 463.657863][ T6179] r10:0000011a r9:20000040 r8:833bca00 r7:854419c0 r6:00000018 r5:854419c1 [ 463.658088][ T6179] r4:00000000 [ 463.658218][ T6179] [<81497298>] (__sys_bind) from [<814973b0>] (sys_bind+0x10/0x14) [ 463.658447][ T6179] r9:83d6c800 r8:8020029c r7:0000011a r6:00131400 r5:00000000 r4:00000000 [ 463.658672][ T6179] [<814973a0>] (sys_bind) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 463.658902][ T6179] Exception stack(0xedda9fa8 to 0xedda9ff0) [ 463.659098][ T6179] 9fa0: 00000000 00000000 00000003 20000040 00000018 00000000 [ 463.659420][ T6179] 9fc0: 00000000 00000000 00131400 0000011a 00000000 00006364 003d0f00 76b250bc [ 463.659815][ T6179] 9fe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 463.683988][ T6178] can: receive list entry not found for dev vxcan0, id 005, mask C00007FF [ 467.420181][ T31] audit: type=1400 audit(467.340:267): avc: denied { listen } for pid=6202 comm="syz.1.798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 468.433578][ T31] audit: type=1400 audit(468.370:268): avc: denied { wake_alarm } for pid=6209 comm="syz.0.799" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 468.722277][ T31] audit: type=1400 audit(468.660:269): avc: denied { mounton } for pid=6211 comm="syz.0.800" path="/396/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 468.922551][ T6218] FAULT_INJECTION: forcing a failure. [ 468.922551][ T6218] name failslab, interval 1, probability 0, space 0, times 0 [ 468.923291][ T6218] CPU: 0 UID: 0 PID: 6218 Comm: syz.0.801 Not tainted 6.12.0-syzkaller #0 [ 468.923715][ T6218] Hardware name: ARM-Versatile Express [ 468.923946][ T6218] Call trace: [ 468.924201][ T6218] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 468.924658][ T6218] r7:83d4bc00 r6:00000cc0 r5:60000013 r4:820413b8 [ 468.924938][ T6218] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 468.925338][ T6218] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 468.925712][ T6218] r5:00000000 r4:8271b79c [ 468.925937][ T6218] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 468.926332][ T6218] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 468.926774][ T6218] r6:00000cc0 r5:200000c0 r4:82ca8b40 [ 468.927044][ T6218] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 468.927504][ T6218] [<804d42e0>] (kmem_cache_alloc_noprof) from [<8052c6cc>] (getname_flags.part.0+0x28/0x18c) [ 468.927948][ T6218] r10:0000003d r9:83d4bc00 r8:8020029c r7:00000003 r6:8223c840 r5:200000c0 [ 468.928299][ T6218] r4:200000c0 [ 468.928476][ T6218] [<8052c6a4>] (getname_flags.part.0) from [<8053178c>] (getname_flags+0x3c/0x50) [ 468.928859][ T6218] r9:83d4bc00 r8:8020029c r7:00000002 r6:ffffff9c r5:00000003 r4:200000c0 [ 468.929177][ T6218] [<80531750>] (getname_flags) from [<80531d90>] (user_path_at+0x2c/0x64) [ 468.930144][ T6218] r5:00000003 r4:edf09f7c [ 468.930576][ T6218] [<80531d64>] (user_path_at) from [<80519380>] (sys_chroot+0x48/0x10c) [ 468.931075][ T6218] r6:83d4bc00 r5:200000c0 r4:00000000 [ 468.931347][ T6218] [<80519338>] (sys_chroot) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 468.931768][ T6218] Exception stack(0xedf09fa8 to 0xedf09ff0) [ 468.932058][ T6218] 9fa0: 00000000 00000000 200000c0 00000000 00000000 00000000 [ 468.932440][ T6218] 9fc0: 00000000 00000000 00131400 0000003d 00000000 00006364 003d0f00 76b320bc [ 468.932833][ T6218] 9fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 468.933120][ T6218] r7:0000003d r6:00131400 r5:00000000 r4:00000000 [ 471.930214][ T2876] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 472.099930][ T2876] usb 1-1: Using ep0 maxpacket: 32 [ 472.111216][ T2876] usb 1-1: config 0 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 32, changing to 9 [ 472.112347][ T2876] usb 1-1: config 0 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 472.112687][ T2876] usb 1-1: config 0 interface 0 has no altsetting 0 [ 472.112855][ T2876] usb 1-1: New USB device found, idVendor=056a, idProduct=00c4, bcdDevice= 0.00 [ 472.113142][ T2876] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 472.121442][ T2876] usb 1-1: config 0 descriptor?? [ 472.594464][ T2876] wacom 0003:056A:00C4.0001: unknown main item tag 0x0 [ 472.614463][ T2876] wacom 0003:056A:00C4.0001: hidraw0: USB HID v0.00 Device [HID 056a:00c4] on usb-dummy_hcd.0-1/input0 [ 473.960528][ T5094] usb 1-1: reset high-speed USB device number 2 using dummy_hcd [ 474.099804][ T5094] usb 1-1: device descriptor read/64, error -32 [ 475.013182][ T2876] usb 1-1: USB disconnect, device number 2 [ 475.112445][ T31] audit: type=1400 audit(475.050:270): avc: denied { create } for pid=6252 comm="syz.1.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 475.390220][ T31] audit: type=1400 audit(475.320:271): avc: denied { ioctl } for pid=6252 comm="syz.1.808" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9837 ioctlcmd=0xf513 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 477.126728][ T31] audit: type=1400 audit(477.060:272): avc: denied { accept } for pid=6272 comm="syz.1.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 494.075585][ T6372] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6372 comm=syz.0.844 [ 495.545410][ T31] audit: type=1400 audit(495.480:273): avc: denied { connect } for pid=6383 comm="syz.0.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 498.022554][ T31] audit: type=1400 audit(497.960:274): avc: granted { setsecparam } for pid=6400 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 498.762076][ T31] audit: type=1400 audit(498.690:275): avc: denied { lock } for pid=6404 comm="syz.0.859" path="socket:[10133]" dev="sockfs" ino=10133 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 499.980691][ T31] audit: type=1400 audit(499.900:276): avc: denied { listen } for pid=6413 comm="syz.1.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 502.369836][ T6418] FAULT_INJECTION: forcing a failure. [ 502.369836][ T6418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 502.370589][ T6418] CPU: 1 UID: 0 PID: 6418 Comm: syz.1.863 Not tainted 6.12.0-syzkaller #0 [ 502.371052][ T6418] Hardware name: ARM-Versatile Express [ 502.371366][ T6418] Call trace: [ 502.371588][ T6418] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 502.372048][ T6418] r7:84a0a3a3 r6:00000000 r5:60000113 r4:820413b8 [ 502.372269][ T6418] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 502.372600][ T6418] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 502.372884][ T6418] r5:00000000 r4:82751908 [ 502.373062][ T6418] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 502.373350][ T6418] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 502.373586][ T6418] r6:00000000 r5:ee781f30 r4:00000014 [ 502.373808][ T6418] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 502.374141][ T6418] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 502.374491][ T6418] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 502.374811][ T6418] r10:ee781f20 r9:84a0a3a3 r8:ee781f30 r7:00000014 r6:84a08000 r5:84a0a000 [ 502.375057][ T6418] r4:00000000 [ 502.375223][ T6418] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 502.375632][ T6418] r10:00000000 r9:ee781dc4 r8:ee781dc4 r7:833bc500 r6:833bc500 r5:ee781f20 [ 502.375924][ T6418] r4:00000000 [ 502.376074][ T6418] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 502.376434][ T6418] r7:833bc500 r6:00000000 r5:04040004 r4:ee781f20 [ 502.376626][ T6418] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 502.376939][ T6418] r10:ee781e24 r9:20000140 r8:04040004 r7:00000000 r6:833bc500 r5:ee781f20 [ 502.377242][ T6418] r4:00000000 [ 502.377356][ T6418] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 502.377726][ T6418] r10:00000128 r9:8435e000 r8:85441540 r7:04040004 r6:20000140 r5:85441541 [ 502.377975][ T6418] r4:00000003 [ 502.378133][ T6418] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 502.378439][ T6418] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 502.378721][ T6418] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 502.379059][ T6418] Exception stack(0xee781fa8 to 0xee781ff0) [ 502.379480][ T6418] 1fa0: 00000000 00000000 00000003 20000140 04040004 00000000 [ 502.380107][ T6418] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b250bc [ 502.380387][ T6418] 1fe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 504.084526][ T6429] SELinux: Context system_u:object_r:syslogd_var_lib_t:s0 is not valid (left unmapped). [ 504.086029][ T31] audit: type=1400 audit(504.020:277): avc: denied { relabelto } for pid=6428 comm="syz.1.866" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 504.096250][ T31] audit: type=1400 audit(504.030:278): avc: denied { associate } for pid=6428 comm="syz.1.866" name="udmabuf" dev="devtmpfs" ino=664 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 505.172811][ T6434] FAULT_INJECTION: forcing a failure. [ 505.172811][ T6434] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 505.174512][ T6434] CPU: 0 UID: 0 PID: 6434 Comm: syz.0.867 Not tainted 6.12.0-syzkaller #0 [ 505.174931][ T6434] Hardware name: ARM-Versatile Express [ 505.175189][ T6434] Call trace: [ 505.175406][ T6434] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 505.175886][ T6434] r7:84486900 r6:00000000 r5:60000013 r4:820413b8 [ 505.176166][ T6434] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 505.176575][ T6434] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 505.176859][ T6434] r5:00000000 r4:82751908 [ 505.177065][ T6434] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 505.177417][ T6434] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 505.177794][ T6434] r6:00000000 r5:df9c1f30 r4:00000014 [ 505.177992][ T6434] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 505.178392][ T6434] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 505.178810][ T6434] [<80843950>] (_copy_from_iter) from [<815bb53c>] (netlink_sendmsg+0x19c/0x43c) [ 505.179268][ T6434] r10:00000000 r9:00000000 r8:df9c1f30 r7:84a56c00 r6:00000014 r5:8542c780 [ 505.180098][ T6434] r4:df9c1f20 [ 505.181195][ T6434] [<815bb3a0>] (netlink_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 505.181950][ T6434] r10:00000000 r9:df9c1dc4 r8:df9c1dc4 r7:84c3ec80 r6:84c3ec80 r5:df9c1f20 [ 505.182394][ T6434] r4:00000000 [ 505.182574][ T6434] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 505.182967][ T6434] r7:84c3ec80 r6:00000000 r5:00044080 r4:df9c1f20 [ 505.183270][ T6434] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 505.183784][ T6434] r10:df9c1e24 r9:20000280 r8:00044080 r7:00000000 r6:84c3ec80 r5:df9c1f20 [ 505.184165][ T6434] r4:00000000 [ 505.184559][ T6434] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 505.185001][ T6434] r10:00000128 r9:8435bc00 r8:84476900 r7:00044080 r6:20000280 r5:84476901 [ 505.185331][ T6434] r4:00000003 [ 505.185505][ T6434] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 505.185920][ T6434] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 505.186262][ T6434] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 505.186695][ T6434] Exception stack(0xdf9c1fa8 to 0xdf9c1ff0) [ 505.187012][ T6434] 1fa0: 00000000 00000000 00000003 20000280 00044080 00000000 [ 505.187376][ T6434] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b320bc [ 505.187799][ T6434] 1fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 507.207296][ T6439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=6439 comm=syz.0.868 [ 510.806793][ T6450] FAULT_INJECTION: forcing a failure. [ 510.806793][ T6450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 510.807570][ T6450] CPU: 1 UID: 0 PID: 6450 Comm: syz.1.872 Not tainted 6.12.0-syzkaller #0 [ 510.807953][ T6450] Hardware name: ARM-Versatile Express [ 510.808223][ T6450] Call trace: [ 510.808443][ T6450] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 510.808894][ T6450] r7:20000340 r6:0000000c r5:60000013 r4:820413b8 [ 510.809184][ T6450] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 510.810282][ T6450] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 510.816521][ T6450] r5:00000000 r4:82751908 [ 510.819706][ T6450] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 510.820421][ T6450] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 510.820868][ T6450] r6:0000000c r5:0000000c r4:dfa89e64 [ 510.821153][ T6450] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 510.821618][ T6450] [<808f19d4>] (should_fail_usercopy) from [<8149666c>] (move_addr_to_kernel+0x3c/0xe4) [ 510.822041][ T6450] [<81496630>] (move_addr_to_kernel) from [<814981b0>] (__copy_msghdr+0xe4/0x110) [ 510.822464][ T6450] r9:20000540 r8:b5403587 r7:dfa89e20 r6:20000540 r5:dfa89dd0 r4:dfa89f20 [ 510.822834][ T6450] [<814980cc>] (__copy_msghdr) from [<81498288>] (copy_msghdr_from_user+0xac/0x130) [ 510.823282][ T6450] r5:00000000 r4:dfa89f20 [ 510.823601][ T6450] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 510.824052][ T6450] r8:00000014 r7:00000000 r6:833bc280 r5:dfa89f20 r4:dfa89e64 [ 510.824374][ T6450] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 510.824804][ T6450] r10:00000128 r9:83d4b000 r8:85441b40 r7:00000014 r6:20000540 r5:85441b41 [ 510.825168][ T6450] r4:00000003 [ 510.825373][ T6450] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 510.825815][ T6450] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 510.826148][ T6450] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 510.826615][ T6450] Exception stack(0xdfa89fa8 to 0xdfa89ff0) [ 510.826905][ T6450] 9fa0: 00000000 00000000 00000003 20000540 00000014 00000000 [ 510.827269][ T6450] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b040bc [ 510.827664][ T6450] 9fe0: 76b03ec0 76b03eb0 00018af0 00133450 [ 514.782400][ T31] audit: type=1400 audit(514.720:279): avc: denied { read write } for pid=6467 comm="syz.1.877" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 514.783309][ T31] audit: type=1400 audit(514.720:280): avc: denied { open } for pid=6467 comm="syz.1.877" path="/dev/udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 514.785956][ T31] audit: type=1400 audit(514.720:281): avc: denied { setattr } for pid=6467 comm="syz.1.877" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_lib_t:s0" [ 515.040153][ T2876] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 515.105852][ T6477] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6477 comm=syz.1.880 [ 515.214199][ T2876] usb 1-1: config 1 interface 0 altsetting 4 endpoint 0x1 has invalid maxpacket 1023, setting to 64 [ 515.214623][ T2876] usb 1-1: config 1 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 515.214993][ T2876] usb 1-1: config 1 interface 0 has no altsetting 0 [ 515.223854][ T2876] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 515.224191][ T2876] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 515.224472][ T2876] usb 1-1: Product: syz [ 515.224737][ T2876] usb 1-1: Manufacturer: syz [ 515.224931][ T2876] usb 1-1: SerialNumber: syz [ 515.229131][ T6470] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 515.306078][ T31] audit: type=1400 audit(515.240:282): avc: denied { create } for pid=6478 comm="syz.1.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 517.759725][ T31] audit: type=1400 audit(517.690:283): avc: denied { setattr } for pid=6492 comm="syz.1.886" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 518.112889][ T31] audit: type=1400 audit(518.050:284): avc: denied { mounton } for pid=6492 comm="syz.1.886" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 518.623618][ T6497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6497 comm=syz.1.887 [ 520.303377][ T2876] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 3 if 0 alt 4 proto 1 vid 0x0525 pid 0xA4A8 [ 526.126457][ T2876] usb 1-1: USB disconnect, device number 3 [ 526.138619][ T2876] usblp0: removed [ 527.395682][ T6528] FAULT_INJECTION: forcing a failure. [ 527.395682][ T6528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.396455][ T6528] CPU: 1 UID: 0 PID: 6528 Comm: syz.0.892 Not tainted 6.12.0-syzkaller #0 [ 527.396900][ T6528] Hardware name: ARM-Versatile Express [ 527.397148][ T6528] Call trace: [ 527.397363][ T6528] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 527.397828][ T6528] r7:84a0a3a3 r6:00000000 r5:60000013 r4:820413b8 [ 527.398138][ T6528] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 527.398513][ T6528] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 527.398855][ T6528] r5:00000000 r4:82751908 [ 527.399050][ T6528] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 527.401543][ T6528] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 527.402272][ T6528] r6:00000000 r5:dfde1f30 r4:00000014 [ 527.402567][ T6528] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 527.402971][ T6528] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 527.403458][ T6528] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 527.403906][ T6528] r10:dfde1f20 r9:84a0a3a3 r8:dfde1f30 r7:00000014 r6:84a08000 r5:84a0a000 [ 527.404909][ T6528] r4:00000000 [ 527.405227][ T6528] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 527.405874][ T6528] r10:00000000 r9:dfde1dc4 r8:dfde1dc4 r7:833bca00 r6:833bca00 r5:dfde1f20 [ 527.406606][ T6528] r4:00000000 [ 527.406976][ T6528] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 527.407627][ T6528] r7:833bca00 r6:00000000 r5:00004080 r4:dfde1f20 [ 527.407937][ T6528] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 527.408341][ T6528] r10:dfde1e24 r9:20000240 r8:00004080 r7:00000000 r6:833bca00 r5:dfde1f20 [ 527.408694][ T6528] r4:00000000 [ 527.408876][ T6528] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 527.409374][ T6528] r10:00000128 r9:836d1800 r8:85441540 r7:00004080 r6:20000240 r5:85441541 [ 527.410023][ T6528] r4:00000003 [ 527.410244][ T6528] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 527.410640][ T6528] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 527.411053][ T6528] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 527.411481][ T6528] Exception stack(0xdfde1fa8 to 0xdfde1ff0) [ 527.411819][ T6528] 1fa0: 00000000 00000000 00000003 20000240 00004080 00000000 [ 527.412201][ T6528] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b320bc [ 527.412578][ T6528] 1fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 529.040296][ T6553] FAULT_INJECTION: forcing a failure. [ 529.040296][ T6553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 529.041327][ T6553] CPU: 1 UID: 0 PID: 6553 Comm: syz.1.899 Not tainted 6.12.0-syzkaller #0 [ 529.041692][ T6553] Hardware name: ARM-Versatile Express [ 529.041951][ T6553] Call trace: [ 529.042181][ T6553] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 529.042600][ T6553] r7:8469a3a3 r6:00000000 r5:60000113 r4:820413b8 [ 529.042898][ T6553] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 529.043265][ T6553] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 529.043679][ T6553] r5:00000000 r4:82751908 [ 529.043896][ T6553] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 529.044264][ T6553] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 529.044608][ T6553] r6:00000000 r5:dff25f30 r4:00000014 [ 529.044851][ T6553] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 529.045221][ T6553] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 529.045615][ T6553] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 529.046024][ T6553] r10:dff25f20 r9:8469a3a3 r8:dff25f30 r7:00000014 r6:84698000 r5:8469a000 [ 529.046345][ T6553] r4:00000000 [ 529.046534][ T6553] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 529.046905][ T6553] r10:00000000 r9:dff25dc4 r8:dff25dc4 r7:833bc000 r6:833bc000 r5:dff25f20 [ 529.048850][ T6553] r4:00000000 [ 529.049057][ T6553] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 529.051242][ T6553] r7:833bc000 r6:00000000 r5:04040004 r4:dff25f20 [ 529.051685][ T6553] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 529.052144][ T6553] r10:dff25e24 r9:20000140 r8:04040004 r7:00000000 r6:833bc000 r5:dff25f20 [ 529.052543][ T6553] r4:00000000 [ 529.052723][ T6553] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 529.053121][ T6553] r10:00000128 r9:836d8000 r8:85441300 r7:04040004 r6:20000140 r5:85441301 [ 529.053450][ T6553] r4:00000003 [ 529.053693][ T6553] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 529.054161][ T6553] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 529.054540][ T6553] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 529.054953][ T6553] Exception stack(0xdff25fa8 to 0xdff25ff0) [ 529.055240][ T6553] 5fa0: 00000000 00000000 00000003 20000140 04040004 00000000 [ 529.055634][ T6553] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b040bc [ 529.055970][ T6553] 5fe0: 76b03ec0 76b03eb0 00018af0 00133450 [ 534.385536][ T31] audit: type=1400 audit(534.320:285): avc: denied { relabelfrom } for pid=6579 comm="syz.0.909" name="" dev="pipefs" ino=10384 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 534.392118][ T6580] SELinux: Context system_u:object_r:system_cron_spool_t:s0 is not valid (left unmapped). [ 534.393592][ T31] audit: type=1400 audit(534.330:286): avc: denied { relabelto } for pid=6579 comm="syz.0.909" name="" dev="pipefs" ino=10384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 540.482837][ T6612] sctp: [Deprecated]: syz.1.917 (pid 6612) Use of struct sctp_assoc_value in delayed_ack socket option. [ 540.482837][ T6612] Use struct sctp_sack_info instead [ 540.647398][ T6614] FAULT_INJECTION: forcing a failure. [ 540.647398][ T6614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 540.648156][ T6614] CPU: 1 UID: 0 PID: 6614 Comm: syz.1.918 Not tainted 6.12.0-syzkaller #0 [ 540.648543][ T6614] Hardware name: ARM-Versatile Express [ 540.648811][ T6614] Call trace: [ 540.649035][ T6614] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 540.650062][ T6614] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 540.650601][ T6614] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 540.651061][ T6614] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 540.651594][ T6614] r5:00000000 r4:82751908 [ 540.652227][ T6614] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 540.653145][ T6614] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 540.653563][ T6614] r6:00000000 r5:e0441f68 r4:00000002 [ 540.653845][ T6614] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 540.654278][ T6614] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 540.654760][ T6614] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 540.655243][ T6614] r10:00000001 r9:805cc9a0 r8:00000002 r7:e0441f68 r6:0000000f r5:76b24f30 [ 540.655636][ T6614] r4:83d76000 r3:e0441e9f [ 540.655886][ T6614] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 540.656312][ T6614] r8:76b24f30 r7:e0441f68 r6:83d76000 r5:0000000f r4:85441780 [ 540.656645][ T6614] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 540.657026][ T6614] r10:00000003 r9:83d76000 r8:8020029c r7:00000000 r6:00000000 r5:85441780 [ 540.657401][ T6614] r4:85441783 [ 540.657599][ T6614] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 540.658000][ T6614] r7:00000003 r6:00000005 r5:76b24f30 r4:0000000f [ 540.658312][ T6614] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 540.658753][ T6614] Exception stack(0xe0441fa8 to 0xe0441ff0) [ 540.659092][ T6614] 1fa0: 0000000f 76b24f30 00000005 76b24f30 0000000f 00000000 [ 540.659756][ T6614] 1fc0: 0000000f 76b24f30 00000005 00000003 00000000 00006364 003d0f00 76b250bc [ 540.660576][ T6614] 1fe0: 00000158 76b24ed0 000d8998 00131324 [ 552.295182][ T6651] FAULT_INJECTION: forcing a failure. [ 552.295182][ T6651] name failslab, interval 1, probability 0, space 0, times 0 [ 552.296453][ T6651] CPU: 0 UID: 0 PID: 6651 Comm: syz.1.929 Not tainted 6.12.0-syzkaller #0 [ 552.296985][ T6651] Hardware name: ARM-Versatile Express [ 552.297299][ T6651] Call trace: [ 552.298035][ T6651] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 552.298716][ T6651] r7:83d4ec00 r6:00000dc0 r5:60000013 r4:820413b8 [ 552.299367][ T6651] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 552.300080][ T6651] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 552.301424][ T6651] r5:00000000 r4:8271b79c [ 552.301798][ T6651] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 552.302889][ T6651] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 552.304366][ T6651] r6:00000dc0 r5:e05d1f20 r4:82c01240 [ 552.304847][ T6651] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 552.305968][ T6651] [<804d368c>] (__kmalloc_cache_noprof) from [<816861a8>] (tcp_sendmsg_fastopen+0x94/0x188) [ 552.306905][ T6651] r10:00000000 r9:e05d1f20 r8:00000000 r7:e05d1cc4 r6:00000000 r5:e05d1f20 [ 552.308044][ T6651] r4:8408f440 [ 552.308241][ T6651] [<81686114>] (tcp_sendmsg_fastopen) from [<81686b74>] (tcp_sendmsg_locked+0x8d8/0xd44) [ 552.309257][ T6651] r8:8408f440 r7:20000000 r6:00000000 r5:e05d1f20 r4:00000000 [ 552.310046][ T6651] [<8168629c>] (tcp_sendmsg_locked) from [<81687010>] (tcp_sendmsg+0x30/0x44) [ 552.311051][ T6651] r10:00000000 r9:e05d1dc4 r8:e05d1dc4 r7:00000000 r6:00000000 r5:e05d1f20 [ 552.312392][ T6651] r4:8408f440 [ 552.312912][ T6651] [<81686fe0>] (tcp_sendmsg) from [<816cc3b0>] (inet_sendmsg+0x40/0x4c) [ 552.314338][ T6651] r7:00000000 r6:8408f440 r5:00000000 r4:e05d1f20 [ 552.315575][ T6651] [<816cc370>] (inet_sendmsg) from [<818bd4a4>] (smc_sendmsg+0x84/0x278) [ 552.317172][ T6651] r7:00000000 r6:e05d1f20 r5:00000000 r4:84706880 [ 552.318101][ T6651] [<818bd420>] (smc_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 552.319062][ T6651] r9:e05d1dc4 r8:e05d1dc4 r7:833bdb80 r6:833bdb80 r5:e05d1f20 r4:00000000 [ 552.320119][ T6651] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 552.321212][ T6651] r7:833bdb80 r6:00000000 r5:20000000 r4:e05d1f20 [ 552.322130][ T6651] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 552.323466][ T6651] r10:e05d1e24 r9:20000100 r8:20000000 r7:00000000 r6:833bdb80 r5:e05d1f20 [ 552.324598][ T6651] r4:00000000 [ 552.325370][ T6651] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 552.327086][ T6651] r10:00000128 r9:83d4ec00 r8:844763c0 r7:20000000 r6:20000100 r5:844763c1 [ 552.328236][ T6651] r4:00000004 [ 552.328532][ T6651] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 552.329440][ T6651] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 552.330155][ T6651] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 552.330519][ T6651] Exception stack(0xe05d1fa8 to 0xe05d1ff0) [ 552.330864][ T6651] 1fa0: 00000000 00000000 00000004 20000100 20000000 00000000 [ 552.331256][ T6651] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b250bc [ 552.331654][ T6651] 1fe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 552.759684][ T6650] binder: 6648:6650 ioctl c00c620f 200019c0 returned -22 [ 552.844260][ T6650] capability: warning: `syz.0.928' uses 32-bit capabilities (legacy support in use) [ 559.968458][ T31] audit: type=1400 audit(559.900:287): avc: denied { map } for pid=6675 comm="syz.0.938" path="socket:[11629]" dev="sockfs" ino=11629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 563.786124][ T6694] FAULT_INJECTION: forcing a failure. [ 563.786124][ T6694] name failslab, interval 1, probability 0, space 0, times 0 [ 563.786699][ T6694] CPU: 1 UID: 0 PID: 6694 Comm: syz.1.944 Not tainted 6.12.0-syzkaller #0 [ 563.786995][ T6694] Hardware name: ARM-Versatile Express [ 563.787129][ T6694] Call trace: [ 563.787233][ T6694] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 563.787616][ T6694] r7:00000c40 r6:854419e8 r5:60000013 r4:820413b8 [ 563.787860][ T6694] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 563.788188][ T6694] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 563.788445][ T6694] r5:00000000 r4:8271b79c [ 563.788680][ T6694] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 563.789133][ T6694] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 563.789819][ T6694] r6:854419e8 r5:00001000 r4:82c016c0 [ 563.790035][ T6694] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 563.790484][ T6694] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 563.790773][ T6694] r10:84094800 r9:82f19400 r8:00000000 r7:833d3770 r6:854419e8 r5:00001000 [ 563.791136][ T6694] r4:00000000 [ 563.791245][ T6694] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 563.791659][ T6694] r10:84094800 r9:00000000 r8:854419c0 r7:00005450 r6:00000004 r5:81ad1efc [ 563.791908][ T6694] r4:854419e8 r3:824bb340 [ 563.792034][ T6694] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 563.792312][ T6694] r9:00000005 r8:854419c0 r7:00000000 r6:00000000 r5:00005450 r4:854419c0 [ 563.792534][ T6694] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 563.792806][ T6694] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 563.793198][ T6694] r7:00000000 r6:854419c1 r5:00000000 r4:00005450 [ 563.793546][ T6694] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 563.793998][ T6694] Exception stack(0xea9edfa8 to 0xea9edff0) [ 563.794228][ T6694] dfa0: 00000000 00000000 00000005 00005450 00000000 00000000 [ 563.794566][ T6694] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b250bc [ 563.794818][ T6694] dfe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 563.795061][ T6694] r10:00000036 r9:84094800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 563.795403][ T6694] r4:00000000 [ 563.809733][ T6694] ERROR: Out of memory at tomoyo_realpath_from_path. [ 564.406874][ T6704] FAULT_INJECTION: forcing a failure. [ 564.406874][ T6704] name failslab, interval 1, probability 0, space 0, times 0 [ 564.407524][ T6704] CPU: 0 UID: 0 PID: 6704 Comm: syz.1.948 Not tainted 6.12.0-syzkaller #0 [ 564.407819][ T6704] Hardware name: ARM-Versatile Express [ 564.407963][ T6704] Call trace: [ 564.408063][ T6704] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 564.408303][ T6704] r7:84094800 r6:00000cc0 r5:60000013 r4:820413b8 [ 564.408530][ T6704] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 564.408784][ T6704] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 564.409023][ T6704] r5:00000000 r4:8271b79c [ 564.409239][ T6704] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 564.409693][ T6704] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 564.410080][ T6704] r6:00000cc0 r5:00000002 r4:82c01240 [ 564.410337][ T6704] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 564.410593][ T6704] [<804d368c>] (__kmalloc_cache_noprof) from [<802fca4c>] (__request_module+0xe8/0x2c0) [ 564.410839][ T6704] r10:84094800 r9:00000003 r8:826f8ad4 r7:84094800 r6:814967a8 r5:00000002 [ 564.411051][ T6704] r4:00000000 [ 564.411161][ T6704] [<802fc964>] (__request_module) from [<814967a8>] (br_ioctl_call+0x94/0xa0) [ 564.411413][ T6704] r3:00000000 r2:00008941 r1:821c2710 [ 564.411636][ T6704] r8:00000000 r7:00008941 r6:00000000 r5:84818d40 r4:82924398 [ 564.411842][ T6704] [<81496714>] (br_ioctl_call) from [<81496a74>] (sock_ioctl+0x2c0/0x608) [ 564.412112][ T6704] r8:85045780 r7:833bb680 r6:84818d40 r5:00000000 r4:00008941 [ 564.412415][ T6704] [<814967b4>] (sock_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 564.412833][ T6704] r9:00000003 r8:85045780 r7:00000000 r6:85045781 r5:00000000 r4:00008941 [ 564.413194][ T6704] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 564.413533][ T6704] Exception stack(0xea939fa8 to 0xea939ff0) [ 564.413687][ T6704] 9fa0: 00000000 00000000 00000003 00008941 00000000 00000000 [ 564.413921][ T6704] 9fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b250bc [ 564.414131][ T6704] 9fe0: 76b24ec0 76b24eb0 00018af0 00133450 [ 564.414291][ T6704] r10:00000036 r9:84094800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 564.414501][ T6704] r4:00000000 [ 565.524914][ T6711] SELinux: Context system_u:object_r:fonts_t:s0 is not valid (left unmapped). [ 565.525053][ T31] audit: type=1400 audit(565.460:288): avc: denied { relabelfrom } for pid=6710 comm="syz.1.951" name="NETLINK" dev="sockfs" ino=11690 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 565.541683][ T31] audit: type=1400 audit(565.460:289): avc: denied { relabelto } for pid=6710 comm="syz.1.951" name="NETLINK" dev="sockfs" ino=11690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_generic_socket permissive=1 trawcon="system_u:object_r:fonts_t:s0" [ 575.198889][ T6745] FAULT_INJECTION: forcing a failure. [ 575.198889][ T6745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 575.211224][ T6745] CPU: 0 UID: 0 PID: 6745 Comm: syz.1.960 Not tainted 6.12.0-syzkaller #0 [ 575.211432][ T6745] Hardware name: ARM-Versatile Express [ 575.211619][ T6745] Call trace: [ 575.211708][ T6745] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 575.211895][ T6745] r7:eac11e20 r6:200000c0 r5:60000013 r4:820413b8 [ 575.212067][ T6745] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 575.212271][ T6745] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 575.212495][ T6745] r5:00000000 r4:82751908 [ 575.212627][ T6745] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 575.212831][ T6745] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 575.213071][ T6745] r6:200000c0 r5:00000000 r4:eac11f20 [ 575.213212][ T6745] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 575.213444][ T6745] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 575.213688][ T6745] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 575.213931][ T6745] r8:00004000 r7:00000000 r6:833b8c80 r5:eac11f20 r4:eac11e64 [ 575.214241][ T6745] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 575.214533][ T6745] r10:00000128 r9:84095400 r8:85441300 r7:00004000 r6:200000c0 r5:85441301 [ 575.214861][ T6745] r4:00000004 [ 575.214991][ T6745] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 575.215360][ T6745] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 575.215832][ T6745] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 575.216105][ T6745] Exception stack(0xeac11fa8 to 0xeac11ff0) [ 575.216265][ T6745] 1fa0: 00000000 00000000 00000004 200000c0 00004000 00000000 [ 575.216510][ T6745] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b040bc [ 575.216784][ T6745] 1fe0: 76b03ec0 76b03eb0 00018af0 00133450 [ 584.586177][ T6776] block nbd0: shutting down sockets [ 584.614251][ T31] audit: type=1400 audit(584.550:290): avc: denied { create } for pid=6775 comm="syz.0.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 591.163699][ T6792] block nbd0: shutting down sockets [ 592.026981][ T31] audit: type=1400 audit(591.960:291): avc: denied { lock } for pid=6795 comm="syz.0.975" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 594.823704][ T6769] fuse: Unknown parameter '0x0000000000006f6c' [ 601.681305][ T31] audit: type=1400 audit(601.620:292): avc: denied { connect } for pid=6839 comm="syz.1.984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 601.699778][ T31] audit: type=1400 audit(601.620:293): avc: denied { name_connect } for pid=6839 comm="syz.1.984" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 606.971896][ T31] audit: type=1400 audit(606.910:294): avc: denied { nlmsg_read } for pid=6874 comm="syz.0.992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 608.234308][ T6889] FAULT_INJECTION: forcing a failure. [ 608.234308][ T6889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.234962][ T6889] CPU: 0 UID: 0 PID: 6889 Comm: syz.1.997 Not tainted 6.12.0-syzkaller #0 [ 608.235320][ T6889] Hardware name: ARM-Versatile Express [ 608.235595][ T6889] Call trace: [ 608.235793][ T6889] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 608.236174][ T6889] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 608.236414][ T6889] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 608.236721][ T6889] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 608.237042][ T6889] r5:00000000 r4:82751908 [ 608.237216][ T6889] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 608.237539][ T6889] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 608.237853][ T6889] r6:00000000 r5:eb851f68 r4:00000002 [ 608.238050][ T6889] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 608.238348][ T6889] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 608.238789][ T6889] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 608.239244][ T6889] r10:00000001 r9:805cc9a0 r8:00000002 r7:eb851f68 r6:0000000f r5:76b24f30 [ 608.239893][ T6889] r4:836abc00 r3:eb851e9f [ 608.240270][ T6889] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 608.240802][ T6889] r8:76b24f30 r7:eb851f68 r6:836abc00 r5:0000000f r4:85441e40 [ 608.241113][ T6889] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 608.241474][ T6889] r10:00000003 r9:836abc00 r8:8020029c r7:00000000 r6:00000000 r5:85441e40 [ 608.241828][ T6889] r4:85441e43 [ 608.242005][ T6889] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 608.242561][ T6889] r7:00000003 r6:00000004 r5:76b24f30 r4:0000000f [ 608.242991][ T6889] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 608.243599][ T6889] Exception stack(0xeb851fa8 to 0xeb851ff0) [ 608.243899][ T6889] 1fa0: 0000000f 76b24f30 00000004 76b24f30 0000000f 00000000 [ 608.244192][ T6889] 1fc0: 0000000f 76b24f30 00000004 00000003 00000000 00006364 003d0f00 76b250bc [ 608.244563][ T6889] 1fe0: 00000158 76b24ed0 000d8998 00131324 [ 608.392420][ T6891] FAULT_INJECTION: forcing a failure. [ 608.392420][ T6891] name failslab, interval 1, probability 0, space 0, times 0 [ 608.393045][ T6891] CPU: 0 UID: 0 PID: 6891 Comm: syz.1.998 Not tainted 6.12.0-syzkaller #0 [ 608.393364][ T6891] Hardware name: ARM-Versatile Express [ 608.393533][ T6891] Call trace: [ 608.393705][ T6891] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 608.394062][ T6891] r7:836abc00 r6:00400cc0 r5:60000013 r4:820413b8 [ 608.394291][ T6891] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 608.394599][ T6891] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 608.394921][ T6891] r5:00000000 r4:8271b79c [ 608.395110][ T6891] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 608.395462][ T6891] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 608.395834][ T6891] r6:00400cc0 r5:00000100 r4:82c02000 [ 608.396064][ T6891] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 608.396480][ T6891] [<804d368c>] (__kmalloc_cache_noprof) from [<80546038>] (alloc_fdtable+0x54/0x14c) [ 608.396892][ T6891] r10:82874d10 r9:8402a018 r8:00000000 r7:000000e0 r6:8402aa00 r5:00000100 [ 608.397130][ T6891] r4:8402a000 [ 608.397258][ T6891] [<80545fe4>] (alloc_fdtable) from [<80547438>] (dup_fd+0x2e8/0x34c) [ 608.397540][ T6891] r5:8402a018 r4:8402a000 [ 608.397711][ T6891] [<80547150>] (dup_fd) from [<8023fc8c>] (copy_process+0x844/0x2050) [ 608.398054][ T6891] r10:eb6e5f30 r9:00000000 r8:00000000 r7:eb6e5ea4 r6:836abc00 r5:00000000 [ 608.398333][ T6891] r4:836a8000 [ 608.398467][ T6891] [<8023f448>] (copy_process) from [<802415dc>] (kernel_clone+0xac/0x3e4) [ 608.398810][ T6891] r10:00000078 r9:00000000 r8:00000000 r7:836abc00 r6:eb6e5f30 r5:00000000 [ 608.399080][ T6891] r4:00000000 [ 608.399208][ T6891] [<80241530>] (kernel_clone) from [<80241cc8>] (sys_clone+0x78/0x9c) [ 608.399813][ T6891] r10:00000078 r9:836abc00 r8:8020029c r7:20000180 r6:200002c0 r5:00000000 [ 608.400251][ T6891] r4:00000000 [ 608.400521][ T6891] [<80241c50>] (sys_clone) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 608.400849][ T6891] Exception stack(0xeb6e5fa8 to 0xeb6e5ff0) [ 608.401260][ T6891] 5fa0: 00000000 00000000 00000000 20000180 00000000 200002c0 [ 608.401814][ T6891] 5fc0: 00000000 00000000 00000001 00000078 00000000 00006364 003d0f00 76b250bc [ 608.402197][ T6891] 5fe0: 76b24e98 76b24e88 00018b58 00133450 [ 608.402534][ T6891] r7:00000078 r6:00000001 r5:00000000 r4:00000000 [ 613.872128][ T31] audit: type=1400 audit(613.810:295): avc: denied { getopt } for pid=6923 comm="syz.1.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 617.012212][ T31] audit: type=1400 audit(616.950:296): avc: denied { relabelto } for pid=6930 comm="syz.1.1011" name="iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 617.014262][ T31] audit: type=1400 audit(616.950:297): avc: denied { associate } for pid=6930 comm="syz.1.1011" name="iommu" dev="devtmpfs" ino=612 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_cron_spool_t:s0" [ 620.113773][ T31] audit: type=1400 audit(620.050:298): avc: denied { create } for pid=6946 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 620.118758][ T31] audit: type=1400 audit(620.050:299): avc: denied { write } for pid=6946 comm="syz.1.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 620.195226][ T31] audit: type=1400 audit(620.130:300): avc: denied { name_bind } for pid=6946 comm="syz.1.1016" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 620.213344][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 632.926909][ T6949] fuse: Unknown parameter '0x0000000000006f6c' [ 637.430332][ T31] audit: type=1400 audit(637.350:301): avc: denied { create } for pid=6986 comm="syz.1.1029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 648.663697][ T6985] fuse: Unknown parameter '0x0000000000006f6c' [ 648.987187][ T31] audit: type=1400 audit(648.920:302): avc: denied { create } for pid=7041 comm="syz.1.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 660.431682][ T7076] SELinux: Context system_u:object_r:udev_tbl_t:s0 is not valid (left unmapped). [ 660.433562][ T31] audit: type=1400 audit(660.370:303): avc: denied { relabelto } for pid=7075 comm="syz.1.1046" name="vcs8" dev="devtmpfs" ino=783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:udev_tbl_t:s0" [ 660.435582][ T31] audit: type=1400 audit(660.370:304): avc: denied { associate } for pid=7075 comm="syz.1.1046" name="vcs8" dev="devtmpfs" ino=783 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:udev_tbl_t:s0" [ 665.386551][ T7060] fuse: Unknown parameter '0x0000000000006f6c' [ 682.785752][ T7109] fuse: Unknown parameter '0x0000000000006f6c' [ 686.216382][ T31] audit: type=1400 audit(686.150:305): avc: denied { read } for pid=7154 comm="syz.0.1062" name="iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 686.217993][ T31] audit: type=1400 audit(686.150:306): avc: denied { open } for pid=7154 comm="syz.0.1062" path="/dev/iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 686.242094][ T31] audit: type=1400 audit(686.180:307): avc: denied { ioctl } for pid=7154 comm="syz.0.1062" path="/dev/iommu" dev="devtmpfs" ino=612 ioctlcmd=0x4806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 686.254452][ T7155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=769 sclass=netlink_route_socket pid=7155 comm=syz.0.1062 [ 707.551132][ T31] audit: type=1400 audit(707.490:308): avc: denied { getopt } for pid=7219 comm="syz.1.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 732.216361][ T7298] FAULT_INJECTION: forcing a failure. [ 732.216361][ T7298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.217117][ T7298] CPU: 1 UID: 0 PID: 7298 Comm: syz.0.1099 Not tainted 6.12.0-syzkaller #0 [ 732.217466][ T7298] Hardware name: ARM-Versatile Express [ 732.217747][ T7298] Call trace: [ 732.217959][ T7298] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 732.218368][ T7298] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 732.218655][ T7298] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 732.219033][ T7298] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 732.219841][ T7298] r5:00000000 r4:82751908 [ 732.220134][ T7298] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 732.220811][ T7298] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 732.221395][ T7298] r6:00000000 r5:ed309f68 r4:00000002 [ 732.221661][ T7298] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 732.222078][ T7298] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 732.222569][ T7298] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 732.223066][ T7298] r10:00000001 r9:805cc9a0 r8:00000002 r7:ed309f68 r6:0000000f r5:76b31f30 [ 732.223558][ T7298] r4:83d4c800 r3:ed309e9f [ 732.223811][ T7298] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 732.224260][ T7298] r8:76b31f30 r7:ed309f68 r6:83d4c800 r5:0000000f r4:85185cc0 [ 732.224616][ T7298] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 732.225055][ T7298] r10:00000003 r9:83d4c800 r8:8020029c r7:00000000 r6:00000000 r5:85185cc0 [ 732.225450][ T7298] r4:85185cc3 [ 732.225654][ T7298] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 732.226043][ T7298] r7:00000003 r6:00000005 r5:76b31f30 r4:0000000f [ 732.226337][ T7298] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 732.226692][ T7298] Exception stack(0xed309fa8 to 0xed309ff0) [ 732.227020][ T7298] 9fa0: 0000000f 76b31f30 00000005 76b31f30 0000000f 00000000 [ 732.227410][ T7298] 9fc0: 0000000f 76b31f30 00000005 00000003 00000000 00006364 003d0f00 76b320bc [ 732.227836][ T7298] 9fe0: 00000158 76b31ed0 000d8998 00131324 [ 735.905787][ T7312] FAULT_INJECTION: forcing a failure. [ 735.905787][ T7312] name failslab, interval 1, probability 0, space 0, times 0 [ 735.906686][ T7312] CPU: 0 UID: 0 PID: 7312 Comm: syz.0.1103 Not tainted 6.12.0-syzkaller #0 [ 735.907116][ T7312] Hardware name: ARM-Versatile Express [ 735.907330][ T7312] Call trace: [ 735.907566][ T7312] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 735.908056][ T7312] r7:00000cc0 r6:00000001 r5:60000013 r4:820413b8 [ 735.908459][ T7312] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 735.909083][ T7312] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 735.909874][ T7312] r5:00000000 r4:8271b79c [ 735.910330][ T7312] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 735.910887][ T7312] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 735.911320][ T7312] r6:00000001 r5:00000001 r4:82c01240 [ 735.911617][ T7312] [<804ef4d4>] (should_failslab) from [<804d5364>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 735.912130][ T7312] [<804d52c4>] (__kmalloc_node_track_caller_noprof) from [<804732b4>] (kstrdup+0x38/0x5c) [ 735.912596][ T7312] r10:00000000 r9:ed5d1ecb r8:826f8ad4 r7:802fca60 r6:00000001 r5:00000cc0 [ 735.912964][ T7312] r4:ed5d1e08 [ 735.913159][ T7312] [<8047327c>] (kstrdup) from [<802fca60>] (__request_module+0xfc/0x2c0) [ 735.913572][ T7312] r7:83d4b000 r6:815033c0 r5:00000002 r4:8507ab80 [ 735.913950][ T7312] [<802fc964>] (__request_module) from [<815033c0>] (dev_load+0x68/0x8c) [ 735.914807][ T7312] r3:00400140 r2:ed5d1ecc r1:820b18dc [ 735.915266][ T7312] r8:00000000 r7:84818000 r6:ed5d1ecc r5:00000000 r4:ed5d1ecc [ 735.915737][ T7312] [<81503358>] (dev_load) from [<81504984>] (dev_ioctl+0x5c4/0x678) [ 735.916172][ T7312] r5:00000042 r4:00008942 [ 735.916402][ T7312] [<815043c0>] (dev_ioctl) from [<81496d18>] (sock_ioctl+0x564/0x608) [ 735.916860][ T7312] r10:83d4b000 r9:81c6d72c r8:ed5d1ecc r7:b5403587 r6:84818000 r5:20000040 [ 735.917398][ T7312] r4:00008942 r3:00000000 [ 735.917623][ T7312] [<814967b4>] (sock_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 735.918078][ T7312] r9:00000003 r8:85443600 r7:20000040 r6:85443601 r5:00000000 r4:00008942 [ 735.918500][ T7312] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 735.919063][ T7312] Exception stack(0xed5d1fa8 to 0xed5d1ff0) [ 735.919532][ T7312] 1fa0: 00000000 00000000 00000003 00008942 20000040 00000000 [ 735.920328][ T7312] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b320bc [ 735.920830][ T7312] 1fe0: 76b31ec0 76b31eb0 00018af0 00133450 [ 735.921128][ T7312] r10:00000036 r9:83d4b000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 735.921490][ T7312] r4:00000000 [ 736.310159][ T31] audit: type=1400 audit(736.240:309): avc: denied { accept } for pid=7320 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 736.825994][ T31] audit: type=1400 audit(736.760:310): avc: denied { read } for pid=7327 comm="syz.1.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 737.131547][ T31] audit: type=1400 audit(737.050:311): avc: denied { bind } for pid=7327 comm="syz.1.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 740.177372][ T7343] fuse: Unknown parameter '0xffffffffffffffff0x000000000000000f' [ 742.623087][ T7352] FAULT_INJECTION: forcing a failure. [ 742.623087][ T7352] name failslab, interval 1, probability 0, space 0, times 0 [ 742.623901][ T7352] CPU: 0 UID: 0 PID: 7352 Comm: syz.0.1116 Not tainted 6.12.0-syzkaller #0 [ 742.624282][ T7352] Hardware name: ARM-Versatile Express [ 742.624523][ T7352] Call trace: [ 742.624822][ T7352] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 742.625288][ T7352] r7:00000c40 r6:851859e8 r5:60000013 r4:820413b8 [ 742.625595][ T7352] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 742.626014][ T7352] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 742.626420][ T7352] r5:00000000 r4:8271b79c [ 742.626645][ T7352] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 742.627062][ T7352] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 742.627537][ T7352] r6:851859e8 r5:00001000 r4:82c016c0 [ 742.627832][ T7352] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 742.628261][ T7352] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 742.628721][ T7352] r10:83d4d400 r9:82f19400 r8:00000000 r7:833d3880 r6:851859e8 r5:00001000 [ 742.629086][ T7352] r4:00000000 [ 742.629368][ T7352] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 742.630173][ T7352] r10:83d4d400 r9:00000000 r8:851859c0 r7:400454da r6:00000004 r5:81ad1efc [ 742.630571][ T7352] r4:851859e8 r3:824bb340 [ 742.630843][ T7352] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 742.631307][ T7352] r9:00000004 r8:851859c0 r7:20000000 r6:20000000 r5:400454da r4:851859c0 [ 742.631719][ T7352] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 742.632181][ T7352] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 742.632629][ T7352] r7:20000000 r6:851859c1 r5:00000000 r4:400454da [ 742.632951][ T7352] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 742.633337][ T7352] Exception stack(0xed775fa8 to 0xed775ff0) [ 742.633660][ T7352] 5fa0: 00000000 00000000 00000004 400454da 20000000 00000000 [ 742.634086][ T7352] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76aae0bc [ 742.634480][ T7352] 5fe0: 76aadec0 76aadeb0 00018af0 00133450 [ 742.634797][ T7352] r10:00000036 r9:83d4d400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 742.635177][ T7352] r4:00000000 [ 742.680829][ T7352] ERROR: Out of memory at tomoyo_realpath_from_path. [ 760.252932][ T7417] netlink: 'syz.1.1139': attribute type 4 has an invalid length. [ 762.755726][ T31] audit: type=1400 audit(762.690:312): avc: denied { lock } for pid=7426 comm="syz.0.1141" path="socket:[12681]" dev="sockfs" ino=12681 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 770.092584][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 772.846069][ T7465] FAULT_INJECTION: forcing a failure. [ 772.846069][ T7465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.846744][ T7465] CPU: 0 UID: 0 PID: 7465 Comm: syz.0.1149 Not tainted 6.12.0-syzkaller #0 [ 772.847082][ T7465] Hardware name: ARM-Versatile Express [ 772.847301][ T7465] Call trace: [ 772.847518][ T7465] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 772.847892][ T7465] r7:00000000 r6:76b31f30 r5:60000013 r4:820413b8 [ 772.848109][ T7465] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 772.848440][ T7465] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 772.848777][ T7465] r5:00000000 r4:82751908 [ 772.848960][ T7465] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 772.849509][ T7465] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 772.850209][ T7465] r6:76b31f30 r5:00000001 r4:00000001 [ 772.850438][ T7465] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 772.850769][ T7465] [<808f19d4>] (should_fail_usercopy) from [<8084f240>] (kstrtouint_from_user+0x60/0x134) [ 772.851115][ T7465] [<8084f1e0>] (kstrtouint_from_user) from [<805cdf64>] (proc_fail_nth_write+0x40/0xe8) [ 772.851505][ T7465] r8:eddb5f68 r7:84093c00 r6:00000001 r5:854433c0 r4:00000001 [ 772.851775][ T7465] [<805cdf24>] (proc_fail_nth_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 772.852096][ T7465] r5:854433c0 r4:805cdf24 [ 772.852303][ T7465] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 772.852642][ T7465] r10:00000004 r9:84093c00 r8:8020029c r7:00000000 r6:00000002 r5:854433c0 [ 772.852951][ T7465] r4:854433c3 [ 772.853131][ T7465] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 772.853465][ T7465] r7:00000004 r6:00000004 r5:76b31f30 r4:00000001 [ 772.853743][ T7465] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 772.854047][ T7465] Exception stack(0xeddb5fa8 to 0xeddb5ff0) [ 772.854309][ T7465] 5fa0: 00000001 76b31f30 00000004 76b31f30 00000001 00000000 [ 772.854691][ T7465] 5fc0: 00000001 76b31f30 00000004 00000004 00000000 00006364 003d0f00 76b320bc [ 772.854977][ T7465] 5fe0: 00000158 76b31ed0 000d8998 001313ec [ 774.482245][ T31] audit: type=1400 audit(774.420:313): avc: denied { bind } for pid=7470 comm="syz.0.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 774.491429][ T31] audit: type=1400 audit(774.430:314): avc: denied { name_bind } for pid=7470 comm="syz.0.1151" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 774.492653][ T31] audit: type=1400 audit(774.430:315): avc: denied { node_bind } for pid=7470 comm="syz.0.1151" saddr=ff01::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 776.633511][ T7497] serio: Serial port ptm0 [ 776.998989][ T7503] tmpfs: Unsupported parameter 'mpol' [ 778.525724][ T31] audit: type=1400 audit(778.460:316): avc: denied { setattr } for pid=7523 comm="syz.1.1166" name="NETLINK" dev="sockfs" ino=12796 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 778.976895][ T7528] netlink: 732 bytes leftover after parsing attributes in process `syz.1.1167'. [ 779.480100][ T31] audit: type=1400 audit(779.410:317): avc: denied { map } for pid=7529 comm="syz.1.1170" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.481144][ T31] audit: type=1400 audit(779.410:318): avc: denied { execute } for pid=7529 comm="syz.1.1170" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.314279][ T31] audit: type=1400 audit(780.250:319): avc: denied { create } for pid=7534 comm="syz.0.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 781.368228][ T7544] ======================================================= [ 781.368228][ T7544] WARNING: The mand mount option has been deprecated and [ 781.368228][ T7544] and is ignored by this kernel. Remove the mand [ 781.368228][ T7544] option from the mount to silence this warning. [ 781.368228][ T7544] ======================================================= [ 784.642197][ T7574] netlink: 'syz.1.1184': attribute type 4 has an invalid length. [ 784.829093][ T7576] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1186'. [ 785.031758][ T31] audit: type=1400 audit(784.970:320): avc: denied { read } for pid=7570 comm="syz.0.1185" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 785.032886][ T31] audit: type=1400 audit(784.970:321): avc: denied { open } for pid=7570 comm="syz.0.1185" path="/588/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 785.131717][ T7579] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1187'. [ 785.132722][ T7579] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1187'. [ 785.642694][ T7584] dns_resolver: Unsupported server list version (126) [ 786.504398][ T31] audit: type=1400 audit(786.440:322): avc: denied { append } for pid=7588 comm="syz.0.1191" name="iommu" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_cron_spool_t:s0" [ 792.145140][ T7739] input: syz0 as /devices/virtual/input/input10 [ 792.233238][ T7593] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 792.237855][ T7593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 792.877684][ T7798] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1199'. [ 792.911470][ T7798] netlink: 33 bytes leftover after parsing attributes in process `syz.0.1199'. [ 792.912011][ T7798] netlink: 33 bytes leftover after parsing attributes in process `syz.0.1199'. [ 793.787488][ T31] audit: type=1400 audit(793.720:323): avc: denied { nlmsg_write } for pid=7828 comm="syz.0.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 794.354928][ T7593] hsr_slave_0: entered promiscuous mode [ 794.382261][ T7593] hsr_slave_1: entered promiscuous mode [ 794.385158][ T7593] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 794.385614][ T7593] Cannot create hsr debugfs directory [ 794.930935][ T7593] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 795.006796][ T7593] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 795.201869][ T7593] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 795.361328][ T7593] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 795.655258][ T7593] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 795.724952][ T7593] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 795.752329][ T7593] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 795.758844][ T7593] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 797.679998][ T31] audit: type=1326 audit(797.610:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7960 comm="syz.0.1203" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 797.825583][ T7593] 8021q: adding VLAN 0 to HW filter on device bond0 [ 806.066913][ T7593] veth0_vlan: entered promiscuous mode [ 806.155352][ T7593] veth1_vlan: entered promiscuous mode [ 806.520250][ T7593] veth0_macvtap: entered promiscuous mode [ 806.630620][ T7593] veth1_macvtap: entered promiscuous mode [ 806.703934][ T7593] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.705960][ T7593] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.707954][ T7593] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.708318][ T7593] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.775907][ T8010] netlink: 'syz.0.1207': attribute type 10 has an invalid length. [ 807.031695][ T31] audit: type=1400 audit(806.970:325): avc: denied { mounton } for pid=7593 comm="syz-executor" path="/syzkaller.AQnlF3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=14170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 807.062261][ T31] audit: type=1400 audit(806.990:326): avc: denied { mount } for pid=7593 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 807.081881][ T31] audit: type=1400 audit(807.000:327): avc: denied { mounton } for pid=7593 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 807.914551][ T31] audit: type=1400 audit(807.850:328): avc: denied { set_context_mgr } for pid=8023 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 807.933236][ T7836] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 808.000508][ T31] audit: type=1400 audit(807.940:329): avc: denied { map } for pid=8023 comm="syz.1.1211" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.022916][ T7836] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 808.052265][ T31] audit: type=1400 audit(807.990:330): avc: denied { call } for pid=8023 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 808.088108][ T7836] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 808.181642][ T7836] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 808.824632][ T7836] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 808.842043][ T7836] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 808.867085][ T7836] bond0 (unregistering): Released all slaves [ 809.000650][ T7836] hsr_slave_0: left promiscuous mode [ 809.004179][ T7836] hsr_slave_1: left promiscuous mode [ 809.017008][ T7836] veth1_macvtap: left promiscuous mode [ 809.017748][ T7836] veth0_macvtap: left promiscuous mode [ 809.018172][ T7836] veth1_vlan: left promiscuous mode [ 809.018681][ T7836] veth0_vlan: left promiscuous mode [ 810.750125][ T2876] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 810.910817][ T2876] usb 2-1: Using ep0 maxpacket: 8 [ 810.923783][ T2876] usb 2-1: config 0 has an invalid interface number: 55 but max is 0 [ 810.924565][ T2876] usb 2-1: config 0 has no interface number 0 [ 810.926732][ T2876] usb 2-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 810.927525][ T2876] usb 2-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 810.928575][ T2876] usb 2-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 810.940603][ T2876] usb 2-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 810.942437][ T2876] usb 2-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 810.942889][ T2876] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 810.972337][ T2876] usb 2-1: config 0 descriptor?? [ 811.011622][ T2876] ldusb 2-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 811.219049][ T96] usb 2-1: USB disconnect, device number 3 [ 811.227812][ T96] ldusb 2-1:0.55: LD USB Device #0 now disconnected [ 812.307505][ T31] audit: type=1400 audit(812.240:331): avc: denied { bind } for pid=8216 comm="syz.1.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 812.740900][ T8019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 812.744796][ T8019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 813.170267][ T96] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 813.320721][ T96] usb 2-1: Using ep0 maxpacket: 32 [ 813.338207][ T96] usb 2-1: config 1 interface 0 altsetting 0 has an endpoint descriptor with address 0x7B, changing to 0xB [ 813.339066][ T96] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 248 [ 813.380251][ T96] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 813.380985][ T96] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 813.381318][ T96] usb 2-1: Product: syz [ 813.381576][ T96] usb 2-1: Manufacturer: syz [ 813.381778][ T96] usb 2-1: SerialNumber: syz [ 813.403491][ T8277] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 813.644176][ T96] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 4 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 814.005947][ T96] usb 2-1: USB disconnect, device number 4 [ 814.012675][ T96] usblp0: removed [ 814.387571][ T8019] hsr_slave_0: entered promiscuous mode [ 814.405646][ T8019] hsr_slave_1: entered promiscuous mode [ 815.335606][ C1] vkms_vblank_simulate: vblank timer overrun [ 815.576499][ T8019] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 815.597819][ T8019] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 815.617349][ T8019] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 815.637774][ T8019] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 816.916082][ T8019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 820.824208][ T31] audit: type=1400 audit(820.760:332): avc: denied { read } for pid=8522 comm="syz.1.1235" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 820.825323][ T31] audit: type=1400 audit(820.760:333): avc: denied { open } for pid=8522 comm="syz.1.1235" path="/26/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 820.889881][ T8528] block device autoloading is deprecated and will be removed. [ 820.895053][ T31] audit: type=1400 audit(820.830:334): avc: denied { ioctl } for pid=8522 comm="syz.1.1235" path="/26/file0/file0" dev="fuse" ino=0 ioctlcmd=0x912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 821.783694][ T8019] veth0_vlan: entered promiscuous mode [ 821.800328][ T7599] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 821.832991][ T8019] veth1_vlan: entered promiscuous mode [ 822.023374][ T8019] veth0_macvtap: entered promiscuous mode [ 822.043275][ T7599] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 822.044103][ T7599] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 822.044693][ T7599] usb 2-1: New USB device found, idVendor=05d8, idProduct=810a, bcdDevice=92.b8 [ 822.045124][ T7599] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 822.063060][ T8019] veth1_macvtap: entered promiscuous mode [ 822.093303][ T7599] usb 2-1: config 0 descriptor?? [ 822.204138][ T8019] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.204828][ T8019] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.205297][ T8019] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.205807][ T8019] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 822.437367][ T8541] i2c i2c-0: died at extended address code [ 822.517369][ T102] usb 2-1: USB disconnect, device number 5 [ 825.361763][ T31] audit: type=1400 audit(825.280:335): avc: denied { connect } for pid=8590 comm="syz.1.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 825.896894][ T8601] tmpfs: Unsupported parameter 'huge' [ 826.170017][ T31] audit: type=1400 audit(826.100:336): avc: denied { watch watch_reads } for pid=8603 comm="syz.0.1250" path="/6" dev="tmpfs" ino=42 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 826.470106][ T31] audit: type=1400 audit(826.390:337): avc: denied { create } for pid=8606 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 826.471361][ T31] audit: type=1400 audit(826.400:338): avc: denied { setopt } for pid=8606 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 826.475767][ T31] audit: type=1400 audit(826.400:339): avc: denied { bind } for pid=8606 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 826.512831][ T31] audit: type=1400 audit(826.430:340): avc: denied { write } for pid=8606 comm="syz.0.1251" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 826.555609][ T31] audit: type=1400 audit(826.430:341): avc: denied { connect } for pid=8606 comm="syz.0.1251" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 827.426426][ T31] audit: type=1400 audit(827.360:342): avc: denied { create } for pid=8614 comm="syz.0.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 828.341332][ T8619] md: md2 stopped. [ 830.191595][ T8647] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1259'. [ 830.546890][ T8011] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 830.789714][ T8011] usb 2-1: Using ep0 maxpacket: 8 [ 830.815516][ T8011] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 830.816175][ T8011] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 830.816512][ T8011] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 830.816913][ T8011] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 830.817614][ T8011] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 830.818048][ T8011] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 831.072252][ T8011] usb 2-1: usb_control_msg returned -32 [ 831.072562][ T8011] usbtmc 2-1:16.0: can't read capabilities [ 836.949926][ T8730] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 836.951819][ T8730] ------------[ cut here ]------------ [ 836.952190][ T8730] kernel BUG at mm/usercopy.c:102! [ 836.952467][ T8730] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 836.953030][ T8730] Modules linked in: [ 836.954004][ T8730] CPU: 0 UID: 0 PID: 8730 Comm: syz.0.1284 Not tainted 6.12.0-syzkaller #0 [ 836.954793][ T8730] Hardware name: ARM-Versatile Express [ 836.955274][ T8730] PC is at usercopy_abort+0x98/0x9c [ 836.955779][ T8730] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 836.956738][ T8730] pc : [<819be580>] lr : [<802be434>] psr: 60000013 [ 836.958595][ T8730] sp : dfcf5e38 ip : dfcf5d78 fp : dfcf5e5c [ 836.959339][ T8730] r10: 0000001a r9 : 83d76c00 r8 : 83d75450 [ 836.959927][ T8730] r7 : dde833c0 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 836.960550][ T8730] r3 : 83d76c00 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 836.961398][ T8730] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 836.961904][ T8730] Control: 30c5387d Table: 84bd68c0 DAC: fffffffd [ 836.962351][ T8730] Register r0 information: non-paged memory [ 836.963085][ T8730] Register r1 information: NULL pointer [ 836.963419][ T8730] Register r2 information: NULL pointer [ 836.963756][ T8730] Register r3 information: slab task_struct start 83d76c00 pointer offset 0 size 3072 [ 836.964922][ T8730] Register r4 information: non-paged memory [ 836.965262][ T8730] Register r5 information: non-paged memory [ 836.965603][ T8730] Register r6 information: NULL pointer [ 836.965891][ T8730] Register r7 information: non-slab/vmalloc memory [ 836.966299][ T8730] Register r8 information: slab task_struct start 83d75400 pointer offset 80 size 3072 [ 836.967141][ T8730] Register r9 information: slab task_struct start 83d76c00 pointer offset 0 size 3072 [ 836.968084][ T8730] Register r10 information: non-paged memory [ 836.968559][ T8730] Register r11 information: 2-page vmalloc region starting at 0xdfcf4000 allocated at kernel_clone+0xac/0x3e4 [ 836.970034][ T8730] Register r12 information: 2-page vmalloc region starting at 0xdfcf4000 allocated at kernel_clone+0xac/0x3e4 [ 836.970645][ T8730] Process syz.0.1284 (pid: 8730, stack limit = 0xdfcf4000) [ 836.971252][ T8730] Stack: (0xdfcf5e38 to 0xdfcf6000) [ 836.971562][ T8730] 5e20: 8205f678 82030fcc [ 836.972121][ T8730] 5e40: 820464dc 00000050 00000074 819be4e8 dfcf5e8c dfcf5e60 804d5d54 819be4f4 [ 836.972990][ T8730] 5e60: 00000074 dfcf5e70 80214800 83d75450 00000074 00000000 83d754c4 dde833c0 [ 836.973456][ T8730] 5e80: dfcf5ec4 dfcf5e90 80514b34 804d5c88 00000074 00000002 dfcf5eb4 83d75450 [ 836.974044][ T8730] 5ea0: 00000074 00000002 00000000 00000000 83d76c00 0000001a dfcf5ef4 dfcf5ec8 [ 836.974535][ T8730] 5ec0: 80209db4 805148b8 83d75400 ddde4180 dfcf5ef4 dfcf5ee0 819e37e4 00000000 [ 836.974932][ T8730] 5ee0: 0000000c 00000002 dfcf5f6c dfcf5ef8 8020a468 80209d30 00000000 00000000 [ 836.975295][ T8730] 5f00: dfcf5f1c dfcf5f10 819e36b0 8027c778 dfcf5f6c dfcf5f20 802813ec 819e368c [ 836.975742][ T8730] 5f20: dfcf5f54 00000000 8027e354 60000013 81990410 819a7694 dfcf5f54 229c2883 [ 836.976119][ T8730] 5f40: 0000000f 83d75400 0000000f 229c2883 83d75400 0000000f 00000002 00000000 [ 836.976565][ T8730] 5f60: dfcf5fa4 dfcf5f70 80252fdc 8020a140 80202cc0 229c2883 dfcf5fac 00000000 [ 836.976985][ T8730] 5f80: 00000000 002862f4 0000001a 8020029c 83d76c00 0000001a 00000000 dfcf5fa8 [ 836.977375][ T8730] 5fa0: 80200060 80252db0 00000000 00000000 0000000f 00000053 00000002 00000000 [ 836.977736][ T8730] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b460bc [ 836.978130][ T8730] 5fe0: 76b45ec0 76b45eb0 00018af0 00133450 60000010 0000000f 00000000 00000000 [ 836.978761][ T8730] Call trace: [ 836.979668][ T8730] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4) [ 836.980373][ T8730] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304) [ 836.981040][ T8730] r8:dde833c0 r7:83d754c4 r6:00000000 r5:00000074 r4:83d75450 [ 836.981427][ T8730] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118) [ 836.981869][ T8730] r10:0000001a r9:83d76c00 r8:00000000 r7:00000000 r6:00000002 r5:00000074 [ 836.982288][ T8730] r4:83d75450 [ 836.982480][ T8730] [<80209d24>] (fpa_set) from [<8020a468>] (arch_ptrace+0x334/0x424) [ 836.983249][ T8730] r6:00000002 r5:0000000c r4:00000000 [ 836.983530][ T8730] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc) [ 836.984241][ T8730] r7:00000000 r6:00000002 r5:0000000f r4:83d75400 [ 836.984465][ T8730] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 836.985016][ T8730] Exception stack(0xdfcf5fa8 to 0xdfcf5ff0) [ 836.985407][ T8730] 5fa0: 00000000 00000000 0000000f 00000053 00000002 00000000 [ 836.985908][ T8730] 5fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b460bc [ 836.986443][ T8730] 5fe0: 76b45ec0 76b45eb0 00018af0 00133450 [ 836.986678][ T8730] r10:0000001a r9:83d76c00 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 836.987369][ T8730] r4:00000000 [ 836.987941][ T8730] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) [ 836.988620][ T8730] ---[ end trace 0000000000000000 ]--- [ 836.989548][ T8730] Kernel panic - not syncing: Fatal exception [ 836.992262][ T8730] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:24:01 Registers: info registers vcpu 0 CPU#0 R00=8275b5a8 R01=0b590b58 R02=00000002 R03=eb055030 R04=83ede440 R05=20000093 R06=60000093 R07=00000001 R08=8287741c R09=0000004f R10=00000001 R11=dfcf5ba4 R12=dfcf5b68 R13=dfcf5b80 R14=819e32f4 R15=809fa2b4 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=827bee38 R01=821e34dc R02=db209100 R03=819d7f48 R04=828b9200 R05=00028bb8 R06=a57ba800 R07=000000c2 R08=ddddb270 R09=ddddb2c0 R10=db209100 R11=df805e84 R12=df805e88 R13=df805e78 R14=81249f50 R15=819d7f58 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005927e9 s17=00000000 d08=00000000005927e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00050002 s33=80030808 d16=8003080800050002 s34=ffff022f s35=0303ffff d17=0303ffffffff022f s36=08002f88 s37=2f900300 d18=2f90030008002f88 s38=030e8002 s39=80020e80 d19=80020e80030e8002 s40=0e880303 s41=03aa0800 d20=03aa08000e880303 s42=020e9003 s43=ffffffff d21=ffffffff020e9003 s44=0e980303 s45=03000800 d22=030008000e980303 s46=08002f98 s47=2fa00304 d23=2fa0030408002f98 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=aca9abbd s53=5db04c31 d26=5db04c31aca9abbd s54=6eec742d s55=2ddd9a36 d27=2ddd9a366eec742d s56=0d0cef10 s57=ed68af18 d28=ed68af180d0cef10 s58=7def5c86 s59=1e8af3d2 d29=1e8af3d27def5c86 s60=2842b4b4 s61=16d358f4 d30=16d358f42842b4b4 s62=189cfb65 s63=72b5d4eb d31=72b5d4eb189cfb65 FPSCR: 00000000