last executing test programs: 22m18.122000485s ago: executing program 1 (id=456): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x8, 0x4) (fail_nth: 1) 22m17.798687372s ago: executing program 1 (id=457): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000300)={0x0, 0xfffffffffffffe7a, r2, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000600)={r3, 0x0, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0, 0x0], [0x800000], [0x0, 0x1001000], [0x0, 0x0, 0xe8a6]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f00000001c0)={0x0, 0xae, 0x3ff, 0x34325241, 0x0, [r4, 0x0, 0x0, r5], [0x2b8, 0x0, 0x0, 0xfffffffe]}) (fail_nth: 1) 22m17.492070608s ago: executing program 1 (id=459): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x205) (fail_nth: 1) 22m17.250178s ago: executing program 1 (id=460): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x49010, 0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0xd) r0 = openat$vcsu(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x205) 22m16.942913046s ago: executing program 1 (id=461): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={r4, r1, 0x25, 0x0, @void}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r8], 0x20}}, 0x20008040) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r5, r4, 0x4, r4}, 0x10) 22m16.453956242s ago: executing program 1 (id=463): r0 = openat$selinux_load(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000000c0)={0x0, 0x8000000000000000, 0x2590}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6ac2, 0x3, 0x1}) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82187202, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000e40)={'syztnl2\x00', &(0x7f0000000dc0)={'syztnl2\x00', 0x0, 0x4, 0x1, 0xf8, 0x783a, 0x35, @mcast1, @private0, 0x8, 0x700, 0x27afd3b9, 0x7}}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000b00)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000b40)="d96fcff9ff0099e48b5869cf654e3a2ce6e536fe9c81cdfa7bfae0ffde9c78d444511d56de5c589d0ed792eaf1342ffe212093a20aa9b1fe32ef4016ebd6d71ef0610ef52e0d0c61c3", 0x49}, {&(0x7f0000000bc0)="22a27e590019f8d5bb34bf7d3e28d219ab3f357738c6489e81108feb01d143a114a0b62904a54ee78d80347f5be4a18bd7d9d23c9fe35d074ba6c71edeb5b45ebafccbf5ab57fb3b01fb9a56d6c262d42076294108a4ce73de62441868cdac1a09f8ccf8c3792dbf86b2a2904cf764be0e71b792239fe5b7144b57221c178d6c93bf9e74a4bff651228616da1768bb9bec19866fe57d9b129d1edffb09afdabcbb26b6feed41267eb9c1837d64ba3575386177d7d226ee3cfdf85d32b9a57d8b095ac2b7909488707e67fda091ef5813", 0xd0}, {&(0x7f0000000cc0)="226c09f3597efd1157076b3810126393b96906c90579735ce6578b4267fdf89efaec6f44b68e62bda957dcdb3a7d12d331a136fff3af300bf8b509fca7db3fe86a35cb9440d03e9f358d23ad466daf083761af55d90cb65bada5d5a5378829cccc7f0546a8fcf93260a0b223825c6dc787ea88", 0x73}, {&(0x7f0000000d40)="8d6574edd634e4004f3360", 0xb}], 0x4, &(0x7f0000000e80)=[@ip_ttl={{0x10, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x10, 0x0, 0x1, 0x3bf}}, @ip_pktinfo={{0x18, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x2e}, @broadcast}}}, @ip_tos_u8={{0xd, 0x0, 0x1, 0xf}}, @ip_tos_int={{0x10, 0x0, 0x1, 0x1}}, @ip_ttl={{0x10, 0x0, 0x2, 0xd}}], 0x68}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000f40)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$EXT4_IOC_GETFSUUID(r3, 0x8008662c, &(0x7f0000000f80)) getsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f0000000fc0), &(0x7f0000001000)=0x4) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000001140)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, r4, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000880}, 0x80) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) geteuid() recvmmsg(0xffffffffffffffff, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001180)=""/23, 0x17}, {&(0x7f00000011c0)=""/172, 0xac}], 0x2, &(0x7f00000012c0)=""/83, 0x53}, 0x22c}], 0x1, 0x40000020, &(0x7f0000001380)={0x77359400}) ioctl$FBIOGET_FSCREENINFO(r3, 0x4602, &(0x7f00000013c0)) fcntl$setsig(r3, 0xa, 0xa) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0x80045006, &(0x7f0000001440)) fstat(r3, &(0x7f0000001480)) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000001500)=0x1) r5 = openat$iommufd(0xffffff9c, &(0x7f0000001540), 0x402c0, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r3, 0x3b88, &(0x7f0000001580)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r5, 0x3ba0, &(0x7f00000015c0)={0x48, 0x2, r6}) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000001640)=0x400) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000001680)={{0x2f, @loopback, 0x4e23, 0x4, 'sed\x00', 0xa, 0xa947, 0x69}, {@rand_addr=0x1, 0x4e23, 0x1, 0x9, 0x3ff, 0x9}}, 0x44) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000001700)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000001740)={0x3, 0xf2, "4315b5ac8e154a46d09649e99fb9dd5ac38b2a0ba04883ee2411a50b3a7b303fd8cd6442c21886759912f5cba73401347bfdfbfe3e5a0ac9eb2f7c73c0cd405b497f8e579edadab05bccc3b513343ff8cd8cfbe23140f2683d3b9fba363313bb4578ec353e11283128b0a57ed9079f1fe7df75ebae61c40c893297023d374bc8409019c398cefcb22756c97e42b9f48da6b5ba7892543a24bff1f4f969c7bbf33ced6b571bab9a94d05dfc8055fe19feca686ef7bd46340631798474a2d61749dfe1aa9ce9c6375d5e4a10c9714eaf9c1cc5eacd921405b5fd3f98ff8faff43051e2acb193b4bd674387e8d3bd8ae9e46e5d"}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000001940)={&(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x8, 0x5, 0x5}) 22m16.453497682s ago: executing program 32 (id=463): r0 = openat$selinux_load(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000000c0)={0x0, 0x8000000000000000, 0x2590}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000004c0)={r1, 0x6ac2, 0x3, 0x1}) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82187202, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000e40)={'syztnl2\x00', &(0x7f0000000dc0)={'syztnl2\x00', 0x0, 0x4, 0x1, 0xf8, 0x783a, 0x35, @mcast1, @private0, 0x8, 0x700, 0x27afd3b9, 0x7}}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000b00)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000b40)="d96fcff9ff0099e48b5869cf654e3a2ce6e536fe9c81cdfa7bfae0ffde9c78d444511d56de5c589d0ed792eaf1342ffe212093a20aa9b1fe32ef4016ebd6d71ef0610ef52e0d0c61c3", 0x49}, {&(0x7f0000000bc0)="22a27e590019f8d5bb34bf7d3e28d219ab3f357738c6489e81108feb01d143a114a0b62904a54ee78d80347f5be4a18bd7d9d23c9fe35d074ba6c71edeb5b45ebafccbf5ab57fb3b01fb9a56d6c262d42076294108a4ce73de62441868cdac1a09f8ccf8c3792dbf86b2a2904cf764be0e71b792239fe5b7144b57221c178d6c93bf9e74a4bff651228616da1768bb9bec19866fe57d9b129d1edffb09afdabcbb26b6feed41267eb9c1837d64ba3575386177d7d226ee3cfdf85d32b9a57d8b095ac2b7909488707e67fda091ef5813", 0xd0}, {&(0x7f0000000cc0)="226c09f3597efd1157076b3810126393b96906c90579735ce6578b4267fdf89efaec6f44b68e62bda957dcdb3a7d12d331a136fff3af300bf8b509fca7db3fe86a35cb9440d03e9f358d23ad466daf083761af55d90cb65bada5d5a5378829cccc7f0546a8fcf93260a0b223825c6dc787ea88", 0x73}, {&(0x7f0000000d40)="8d6574edd634e4004f3360", 0xb}], 0x4, &(0x7f0000000e80)=[@ip_ttl={{0x10, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x10, 0x0, 0x1, 0x3bf}}, @ip_pktinfo={{0x18, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x2e}, @broadcast}}}, @ip_tos_u8={{0xd, 0x0, 0x1, 0xf}}, @ip_tos_int={{0x10, 0x0, 0x1, 0x1}}, @ip_ttl={{0x10, 0x0, 0x2, 0xd}}], 0x68}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000f40)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$EXT4_IOC_GETFSUUID(r3, 0x8008662c, &(0x7f0000000f80)) getsockopt$SO_J1939_PROMISC(r3, 0x6b, 0x2, &(0x7f0000000fc0), &(0x7f0000001000)=0x4) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000001140)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x30, r4, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000880}, 0x80) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) geteuid() recvmmsg(0xffffffffffffffff, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001180)=""/23, 0x17}, {&(0x7f00000011c0)=""/172, 0xac}], 0x2, &(0x7f00000012c0)=""/83, 0x53}, 0x22c}], 0x1, 0x40000020, &(0x7f0000001380)={0x77359400}) ioctl$FBIOGET_FSCREENINFO(r3, 0x4602, &(0x7f00000013c0)) fcntl$setsig(r3, 0xa, 0xa) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0x80045006, &(0x7f0000001440)) fstat(r3, &(0x7f0000001480)) ioctl$SNDCTL_DSP_SETTRIGGER(r3, 0x40045010, &(0x7f0000001500)=0x1) r5 = openat$iommufd(0xffffff9c, &(0x7f0000001540), 0x402c0, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r3, 0x3b88, &(0x7f0000001580)={0xc, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r5, 0x3ba0, &(0x7f00000015c0)={0x48, 0x2, r6}) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000001640)=0x400) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000001680)={{0x2f, @loopback, 0x4e23, 0x4, 'sed\x00', 0xa, 0xa947, 0x69}, {@rand_addr=0x1, 0x4e23, 0x1, 0x9, 0x3ff, 0x9}}, 0x44) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000001700)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000001740)={0x3, 0xf2, "4315b5ac8e154a46d09649e99fb9dd5ac38b2a0ba04883ee2411a50b3a7b303fd8cd6442c21886759912f5cba73401347bfdfbfe3e5a0ac9eb2f7c73c0cd405b497f8e579edadab05bccc3b513343ff8cd8cfbe23140f2683d3b9fba363313bb4578ec353e11283128b0a57ed9079f1fe7df75ebae61c40c893297023d374bc8409019c398cefcb22756c97e42b9f48da6b5ba7892543a24bff1f4f969c7bbf33ced6b571bab9a94d05dfc8055fe19feca686ef7bd46340631798474a2d61749dfe1aa9ce9c6375d5e4a10c9714eaf9c1cc5eacd921405b5fd3f98ff8faff43051e2acb193b4bd674387e8d3bd8ae9e46e5d"}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000001940)={&(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x8, 0x5, 0x5}) 7m30.178747611s ago: executing program 2 (id=2304): r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000140)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) 7m30.079805046s ago: executing program 2 (id=2305): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0xf0b, 0xfffffffe, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x0, 0x0, 0x800000, 0x0, 0xffffffff}, 0x20, 0x0, 0x7, 0x8, 0x101, 0x14, 0x0, 0x0, 0x0, 0x0, {0x200}}}}]}, 0x78}}, 0x4080) 7m24.760292724s ago: executing program 2 (id=2315): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r1, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) socket$kcm(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x2}) socket$igmp6(0xa, 0x3, 0x2) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000580)={@val, @void, @eth={@empty, @random="0300", @val={@void, {0x8100, 0x0, 0x0, 0x4}}, {@mpls_mc={0x8848, {[], @ipv4=@generic={{0x5, 0x4, 0x2, 0x6, 0x14, 0x68, 0x0, 0x34, 0x0, 0x0, @loopback, @private=0xa010102}}}}}}}, 0x2a) 7m24.080947449s ago: executing program 2 (id=2316): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket(0x27, 0x4, 0x80000000) creat(0x0, 0x141) bpf$MAP_CREATE(0x0, 0x0, 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = timerfd_create(0x0, 0x0) timerfd_settime(r3, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) 7m16.098209831s ago: executing program 2 (id=2320): socket$kcm(0x10, 0x2, 0x0) socket(0x2b, 0x80801, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0x0, 0x3010, 0x1, 0x3db}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x47ba, 0x3e80, 0x0, 0x0, 0x0) 7m13.309030782s ago: executing program 2 (id=2321): mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 6m27.264078524s ago: executing program 33 (id=2321): mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) 4.628712297s ago: executing program 3 (id=2911): r0 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x80000, 0x0}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f00000000c0)={r1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000b40)={&(0x7f00000008c0)=[0x0, 0x0, 0x0], &(0x7f0000000900)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000ac0)=[0x0], &(0x7f0000000b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x1, 0x3}) 4.285416494s ago: executing program 3 (id=2912): sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d80)={0xa0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x10000, 0xfffffff7, 0x1, 0x7fff, 0xfffffff8]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x5]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x5, 0x8, 0x6, 0x4, 0xb]}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0xd}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x800}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20}, 0x8011) 4.232364497s ago: executing program 3 (id=2913): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1000, 0x9c0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/206) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/11, 0xb}], 0x1) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) read$hiddev(r2, &(0x7f0000000280)=""/21, 0x15) r3 = fcntl$dupfd(r0, 0x406, r0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/223, 0xdf}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/108, 0x6c}], 0x5, 0x0, 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) fstatfs(r3, &(0x7f0000000600)=""/4096) ioctl$FICLONE(r1, 0x40049409, r1) recvmsg(r2, &(0x7f0000001800)={&(0x7f0000001600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/139, 0x8b}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/47, 0x2f}], 0x3}, 0x40010143) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000001840)=@gcm_256={{0x304}, "6a6221a86a6e0a40", "04562a99037f376ba27a2a50e01d87459d69947efc54f119535e666bc42bfdae", "c820648b", "e5bcabee7743a7ee"}, 0x38) ioctl$SYNC_IOC_MERGE(r3, 0xc0303e03, &(0x7f0000001880)={"056ff166206f3e9ae4343b3221fe4d5afa67b5d50c627852f422eae7dd9bad58", r3, 0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f00000018c0)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), r3) sendmsg$NL80211_CMD_ABORT_SCAN(r3, &(0x7f0000001a00)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001980)={0x28, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x8}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040040}, 0x68850) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06055c8, &(0x7f0000001a40)={0x6, 0xde6, {0x56, 0xfffc, 0x9, {0xc, 0x81}, {0x4, 0x6}, @rumble={0xfff8, 0xd800}}, {0x52, 0xe2, 0x6, {0x7, 0x3}, {0x1, 0x200}, @const={0xfeff, {0x4080, 0x7, 0xd, 0x80}}}}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001ac0)={0xaa, 0x101}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) r6 = dup2(r2, r0) mknodat(r3, &(0x7f0000001b00)='./file0\x00', 0x40, 0xb6) sendmsg$NL80211_CMD_TESTMODE(r2, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0x100, r5, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x36}}}}, [@NL80211_ATTR_TESTDATA={0x11, 0x45, "0adc027c61d5acbda5bf585ef5"}, @NL80211_ATTR_TESTDATA={0xc9, 0x45, "11174edaab3640b0e879ec2aecacba8af3c3721ff4c036f1c6db83ebc59db2995c0445abdb0b0d7b5c1edc624e5d0179df260c494ca9704bfdd986d2cecb09138523d76c023f4e723766ca04dad26931f7002231c8aec32ae27c7c16beb851977289380ee6be5374f4ef1a0142470d1b0fb28b1f5d0791caa5a44d0730e875e4d7e63600dcaf8c09030f1e87ae5e7237b11193ea21c465dc5c2b5d3ccca3f213e1cb63cd9ec1029cb48e2afa94c0e42ad23ff034c9670f21f3cba440f8b1a45506ca56d41a"}]}, 0x100}, 0x1, 0x0, 0x0, 0x8081}, 0xd36a1274c6918376) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000001fc0)={&(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f00)=[0x0, 0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0, 0x0, 0x0], 0x5, 0x3, 0x6, 0x4}) ioctl$DRM_IOCTL_MODE_GETFB2(r6, 0xc06864ce, &(0x7f0000002000)={r7, 0x3435, 0x7, 0xffffff74, 0x2, [], [0xcc2093a1, 0x340, 0x8, 0x3], [0x9, 0x0, 0xda07, 0xf], [0x9, 0xffffffffffffffff, 0x3, 0xf]}) ioctl$DRM_IOCTL_MODE_CURSOR(r6, 0xc01c64a3, &(0x7f0000002080)={0x2, r8, 0x7ff, 0x9, 0x0, 0x7, 0x38000000}) ioctl$SNDCTL_TMR_CONTINUE(r3, 0x5404) sendmsg$kcm(r3, &(0x7f00000022c0)={&(0x7f0000002100)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002180)="30afba8a1895bb52cfabbd2097430ffcd56984ff091312ee7ec4ad0c72e0673971415ffd617ebed577e09ee54cb441fc2740a53741103d4e1768824d1c3bb9c936c37291be92b3ef067289835820e3f23123734e29b45cca9750f30cd3c1fd9ed7aad2cb097a78ddc76bb193647100568bdaa0b7d3ab07b3e808b6eaa5412a30e096b6251db0947aa248d90f219ccc98b6ce876c900372aa5859cde7894d0e9626514d10c654bc82c58c8ecc4f94eedfcf9270d2fc404aeaac80c9ee6b9f60c0d5b600", 0xc3}], 0x1}, 0x40010) 3.585084829s ago: executing program 3 (id=2914): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0xd, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40c0}, 0x44845) 3.38110418s ago: executing program 3 (id=2915): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1/file0\x00', 0x42, 0x53) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x275a, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r4) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000800)={r6, 0x6, 0x6}) dup2(r4, r5) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RRENAME(r7, &(0x7f0000000240)={0x7}, 0x0) r8 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r8, 0x5450, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x5450, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x5450, 0x0) 3.239374387s ago: executing program 3 (id=2916): futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x183201, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000280)) futex(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x2, 0x0, &(0x7f0000000000)=0x21, 0xfffffffc) r1 = semget$private(0x0, 0x4, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/177) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0x5451, 0x0) r3 = openat$selinux_mls(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000140)) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x14, &(0x7f0000000040)={0x1}, 0x8) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000495000/0x2000)=nil, 0x2000, 0x0) get_mempolicy(0x0, 0x0, 0x203, &(0x7f0000394000/0x3000)=nil, 0x3) 1.308580744s ago: executing program 0 (id=2923): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1000, 0x9c0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/206) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/11, 0xb}], 0x1) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) read$hiddev(r2, &(0x7f0000000280)=""/21, 0x15) r3 = fcntl$dupfd(r0, 0x406, r0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/223, 0xdf}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/108, 0x6c}], 0x5, 0x0, 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) fstatfs(r3, &(0x7f0000000600)=""/4096) ioctl$FICLONE(r1, 0x40049409, r1) recvmsg(r2, &(0x7f0000001800)={&(0x7f0000001600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/139, 0x8b}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/47, 0x2f}], 0x3}, 0x40010143) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000001840)=@gcm_256={{0x304}, "6a6221a86a6e0a40", "04562a99037f376ba27a2a50e01d87459d69947efc54f119535e666bc42bfdae", "c820648b", "e5bcabee7743a7ee"}, 0x38) ioctl$SYNC_IOC_MERGE(r3, 0xc0303e03, &(0x7f0000001880)={"056ff166206f3e9ae4343b3221fe4d5afa67b5d50c627852f422eae7dd9bad58", r3, 0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f00000018c0)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), r3) sendmsg$NL80211_CMD_ABORT_SCAN(r3, &(0x7f0000001a00)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001980)={0x28, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x8}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040040}, 0x68850) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06055c8, &(0x7f0000001a40)={0x6, 0xde6, {0x56, 0xfffc, 0x9, {0xc, 0x81}, {0x4, 0x6}, @rumble={0xfff8, 0xd800}}, {0x52, 0xe2, 0x6, {0x7, 0x3}, {0x1, 0x200}, @const={0xfeff, {0x4080, 0x7, 0xd, 0x80}}}}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001ac0)={0xaa, 0x101}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) r6 = dup2(r2, r0) mknodat(r3, &(0x7f0000001b00)='./file0\x00', 0x40, 0xb6) sendmsg$NL80211_CMD_TESTMODE(r2, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0x100, r5, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x36}}}}, [@NL80211_ATTR_TESTDATA={0x11, 0x45, "0adc027c61d5acbda5bf585ef5"}, @NL80211_ATTR_TESTDATA={0xc9, 0x45, "11174edaab3640b0e879ec2aecacba8af3c3721ff4c036f1c6db83ebc59db2995c0445abdb0b0d7b5c1edc624e5d0179df260c494ca9704bfdd986d2cecb09138523d76c023f4e723766ca04dad26931f7002231c8aec32ae27c7c16beb851977289380ee6be5374f4ef1a0142470d1b0fb28b1f5d0791caa5a44d0730e875e4d7e63600dcaf8c09030f1e87ae5e7237b11193ea21c465dc5c2b5d3ccca3f213e1cb63cd9ec1029cb48e2afa94c0e42ad23ff034c9670f21f3cba440f8b1a45506ca56d41a"}]}, 0x100}, 0x1, 0x0, 0x0, 0x8081}, 0xd36a1274c6918376) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000001d00)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x9, 0x4, 0xffffffffffffffff, 0x9, 0x8, 0x80000000}, {0x401, 0x2, 0x2, 0xfffffffffffffe1e, 0x8dc, 0x6}], ['\x00', '\x00', '\x00', '\x00']}) ioctl$DRM_IOCTL_MODE_GETFB2(r6, 0xc06864ce, &(0x7f0000002000)={0x0, 0x3435, 0x7, 0xffffff74, 0x2, [], [0xcc2093a1, 0x340, 0x8, 0x3], [0x9, 0x0, 0xda07, 0xf], [0x9, 0xffffffffffffffff, 0x3, 0xf]}) ioctl$DRM_IOCTL_MODE_CURSOR(r6, 0xc01c64a3, &(0x7f0000002080)={0x2, 0x0, 0x7ff, 0x9, 0x0, 0x7, 0x38000000}) ioctl$SNDCTL_TMR_CONTINUE(r3, 0x5404) sendmsg$kcm(r3, &(0x7f00000022c0)={&(0x7f0000002100)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002180)="30afba8a1895bb52cfabbd2097430ffcd56984ff091312ee7ec4ad0c72e0673971415ffd617ebed577e09ee54cb441fc2740a53741103d4e1768824d1c3bb9c936c37291be92b3ef067289835820e3f23123734e29b45cca9750f30cd3c1fd9ed7aad2cb097a78ddc76bb193647100568bdaa0b7d3ab07b3e808b6eaa5412a30e096b6251db0947aa248d90f219ccc98b6ce876c900372aa5859cde7894d0e9626514d10c654bc82c58c8ecc4f94eedfcf9270d2fc404aeaac80c9ee6b9f60c0d5b600", 0xc3}], 0x1}, 0x40010) 847.110827ms ago: executing program 0 (id=2924): sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0xd, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x40c0}, 0x44845) 647.284107ms ago: executing program 0 (id=2925): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, 0x0, 0x20008800) (fail_nth: 1) 348.516422ms ago: executing program 0 (id=2926): fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000000be80)={0x0, 0x0}) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$cgroup_pid(r1, &(0x7f0000000000), 0xffffff5f) write$P9_RGETLOCK(r1, &(0x7f00000000c0)={0x2e, 0x37, 0x2, {0x1, 0x6, 0x5, r0, 0x10, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x2e) 171.084161ms ago: executing program 0 (id=2927): r0 = open(&(0x7f0000000040)='./bus/file0\x00', 0x400e02, 0x8d30a4d5303fc25e) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0189436, &(0x7f0000000080)) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockname$l2tp(r1, 0x0, &(0x7f00000000c0)) 0s ago: executing program 0 (id=2928): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1000, 0x9c0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/206) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/11, 0xb}], 0x1) r1 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) read$hiddev(r2, &(0x7f0000000280)=""/21, 0x15) r3 = fcntl$dupfd(r0, 0x406, r0) preadv(r3, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/223, 0xdf}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/108, 0x6c}], 0x5, 0x0, 0x1) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) fstatfs(r3, &(0x7f0000000600)=""/4096) ioctl$FICLONE(r1, 0x40049409, r1) recvmsg(r2, &(0x7f0000001800)={&(0x7f0000001600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/139, 0x8b}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/47, 0x2f}], 0x3}, 0x40010143) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000001840)=@gcm_256={{0x304}, "6a6221a86a6e0a40", "04562a99037f376ba27a2a50e01d87459d69947efc54f119535e666bc42bfdae", "c820648b", "e5bcabee7743a7ee"}, 0x38) ioctl$SYNC_IOC_MERGE(r3, 0xc0303e03, &(0x7f0000001880)={"056ff166206f3e9ae4343b3221fe4d5afa67b5d50c627852f422eae7dd9bad58", r3, 0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f00000018c0)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), r3) sendmsg$NL80211_CMD_ABORT_SCAN(r3, &(0x7f0000001a00)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001980)={0x28, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x8}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040040}, 0x68850) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06055c8, &(0x7f0000001a40)={0x6, 0xde6, {0x56, 0xfffc, 0x9, {0xc, 0x81}, {0x4, 0x6}, @rumble={0xfff8, 0xd800}}, {0x52, 0xe2, 0x6, {0x7, 0x3}, {0x1, 0x200}, @const={0xfeff, {0x4080, 0x7, 0xd, 0x80}}}}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001ac0)={0xaa, 0x101}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) r6 = dup2(r2, r0) mknodat(r3, &(0x7f0000001b00)='./file0\x00', 0x40, 0xb6) sendmsg$NL80211_CMD_TESTMODE(r2, &(0x7f0000001cc0)={&(0x7f0000001b40), 0xc, &(0x7f0000001c80)={&(0x7f0000001b80)={0x100, r5, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x36}}}}, [@NL80211_ATTR_TESTDATA={0x11, 0x45, "0adc027c61d5acbda5bf585ef5"}, @NL80211_ATTR_TESTDATA={0xc9, 0x45, "11174edaab3640b0e879ec2aecacba8af3c3721ff4c036f1c6db83ebc59db2995c0445abdb0b0d7b5c1edc624e5d0179df260c494ca9704bfdd986d2cecb09138523d76c023f4e723766ca04dad26931f7002231c8aec32ae27c7c16beb851977289380ee6be5374f4ef1a0142470d1b0fb28b1f5d0791caa5a44d0730e875e4d7e63600dcaf8c09030f1e87ae5e7237b11193ea21c465dc5c2b5d3ccca3f213e1cb63cd9ec1029cb48e2afa94c0e42ad23ff034c9670f21f3cba440f8b1a45506ca56d41a"}]}, 0x100}, 0x1, 0x0, 0x0, 0x8081}, 0xd36a1274c6918376) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000001d00)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x9, 0x4, 0xffffffffffffffff, 0x9, 0x8, 0x80000000}, {0x401, 0x2, 0x2, 0xfffffffffffffe1e, 0x8dc, 0x6}], ['\x00', '\x00', '\x00', '\x00']}) ioctl$DRM_IOCTL_MODE_GETFB2(r6, 0xc06864ce, &(0x7f0000002000)={0x0, 0x3435, 0x7, 0xffffff74, 0x2, [], [0xcc2093a1, 0x340, 0x8, 0x3], [0x9, 0x0, 0xda07, 0xf], [0x9, 0xffffffffffffffff, 0x3, 0xf]}) ioctl$DRM_IOCTL_MODE_CURSOR(r6, 0xc01c64a3, &(0x7f0000002080)={0x2, 0x0, 0x7ff, 0x9, 0x0, 0x7, 0x38000000}) ioctl$SNDCTL_TMR_CONTINUE(r3, 0x5404) sendmsg$kcm(r3, &(0x7f00000022c0)={&(0x7f0000002100)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002180)="30afba8a1895bb52cfabbd2097430ffcd56984ff091312ee7ec4ad0c72e0673971415ffd617ebed577e09ee54cb441fc2740a53741103d4e1768824d1c3bb9c936c37291be92b3ef067289835820e3f23123734e29b45cca9750f30cd3c1fd9ed7aad2cb097a78ddc76bb193647100568bdaa0b7d3ab07b3e808b6eaa5412a30e096b6251db0947aa248d90f219ccc98b6ce876c900372aa5859cde7894d0e9626514d10c654bc82c58c8ecc4f94eedfcf9270d2fc404aeaac80c9ee6b9f60c0d5b600", 0xc3}], 0x1}, 0x40010) kernel console output (not intermixed with test programs): 849.825825][ T8260] el0_svc_compat+0x4c/0x184 [ 849.825939][ T8260] el0t_32_sync_handler+0x88/0xac [ 849.826028][ T8260] el0t_32_sync+0x19c/0x1a0 [ 849.835291][ T8260] ERROR: Out of memory at tomoyo_realpath_from_path. [ 850.222432][ T8268] FAULT_INJECTION: forcing a failure. [ 850.222432][ T8268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 850.222906][ T8268] CPU: 1 UID: 0 PID: 8268 Comm: syz.0.1577 Not tainted syzkaller #0 PREEMPT [ 850.222967][ T8268] Hardware name: linux,dummy-virt (DT) [ 850.222996][ T8268] Call trace: [ 850.223017][ T8268] show_stack+0x18/0x24 (C) [ 850.223093][ T8268] dump_stack_lvl+0xdc/0xf4 [ 850.223143][ T8268] dump_stack+0x1c/0x28 [ 850.223183][ T8268] should_fail_ex+0x5a0/0x6ac [ 850.223225][ T8268] should_fail+0x14/0x20 [ 850.223261][ T8268] should_fail_usercopy+0x1c/0x28 [ 850.223299][ T8268] simple_read_from_buffer+0x84/0x214 [ 850.223343][ T8268] proc_fail_nth_read+0x160/0x21c [ 850.223388][ T8268] vfs_read+0x18c/0xa28 [ 850.223436][ T8268] ksys_read+0xec/0x1d8 [ 850.223475][ T8268] __arm64_sys_read+0x6c/0x9c [ 850.223511][ T8268] invoke_syscall+0x6c/0x258 [ 850.223612][ T8268] el0_svc_common.constprop.0+0xac/0x230 [ 850.223745][ T8268] do_el0_svc_compat+0x40/0x68 [ 850.223945][ T8268] el0_svc_compat+0x4c/0x184 [ 850.224075][ T8268] el0t_32_sync_handler+0x88/0xac [ 850.224172][ T8268] el0t_32_sync+0x19c/0x1a0 [ 850.495385][ T30] audit: type=1400 audit(850.020:429): avc: denied { create } for pid=8271 comm="syz.0.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 851.912080][ T8293] FAULT_INJECTION: forcing a failure. [ 851.912080][ T8293] name failslab, interval 1, probability 0, space 0, times 0 [ 851.914774][ T8293] CPU: 0 UID: 0 PID: 8293 Comm: syz.2.1590 Not tainted syzkaller #0 PREEMPT [ 851.914856][ T8293] Hardware name: linux,dummy-virt (DT) [ 851.914886][ T8293] Call trace: [ 851.914908][ T8293] show_stack+0x18/0x24 (C) [ 851.914990][ T8293] dump_stack_lvl+0xdc/0xf4 [ 851.915038][ T8293] dump_stack+0x1c/0x28 [ 851.915079][ T8293] should_fail_ex+0x5a0/0x6ac [ 851.915120][ T8293] should_failslab+0xbc/0x11c [ 851.915160][ T8293] __kmalloc_noprof+0xd0/0x4d0 [ 851.915200][ T8293] tomoyo_realpath_from_path+0x90/0x534 [ 851.915243][ T8293] tomoyo_path_number_perm+0x200/0x438 [ 851.915286][ T8293] tomoyo_file_ioctl+0x1c/0x28 [ 851.915327][ T8293] security_file_ioctl_compat+0x8c/0x19c [ 851.915384][ T8293] __arm64_compat_sys_ioctl+0x98/0x234 [ 851.915433][ T8293] invoke_syscall+0x6c/0x258 [ 851.915473][ T8293] el0_svc_common.constprop.0+0xac/0x230 [ 851.915510][ T8293] do_el0_svc_compat+0x40/0x68 [ 851.915547][ T8293] el0_svc_compat+0x4c/0x184 [ 851.915588][ T8293] el0t_32_sync_handler+0x88/0xac [ 851.915625][ T8293] el0t_32_sync+0x19c/0x1a0 [ 851.931994][ T8293] ERROR: Out of memory at tomoyo_realpath_from_path. [ 852.464745][ T30] audit: type=1400 audit(851.990:430): avc: denied { read } for pid=8302 comm="syz.2.1595" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 852.465125][ T30] audit: type=1400 audit(851.990:431): avc: denied { open } for pid=8302 comm="syz.2.1595" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 852.474851][ T30] audit: type=1400 audit(852.000:432): avc: denied { ioctl } for pid=8302 comm="syz.2.1595" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 852.509346][ T30] audit: type=1400 audit(852.020:433): avc: denied { write } for pid=8302 comm="syz.2.1595" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 852.607035][ T30] audit: type=1400 audit(852.130:434): avc: denied { append } for pid=8302 comm="syz.2.1595" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 859.223705][ T30] audit: type=1400 audit(858.750:435): avc: denied { write } for pid=8355 comm="syz.0.1617" name="vlan1" dev="proc" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 864.281190][ T30] audit: type=1400 audit(863.810:436): avc: denied { read } for pid=8376 comm="syz.0.1625" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 864.285049][ T30] audit: type=1400 audit(863.810:437): avc: denied { open } for pid=8376 comm="syz.0.1625" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 864.302746][ T30] audit: type=1400 audit(863.830:438): avc: denied { ioctl } for pid=8376 comm="syz.0.1625" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x620f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 864.308166][ T8377] binder: 8376:8377 ioctl c00c620f 20000100 returned -22 [ 864.363759][ T30] audit: type=1400 audit(863.890:439): avc: denied { connect } for pid=8376 comm="syz.0.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 865.290440][ T30] audit: type=1400 audit(864.820:440): avc: denied { ioctl } for pid=8388 comm="syz.0.1631" path="socket:[19912]" dev="sockfs" ino=19912 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 869.048461][ T8416] FAULT_INJECTION: forcing a failure. [ 869.048461][ T8416] name failslab, interval 1, probability 0, space 0, times 0 [ 869.052204][ T8416] CPU: 0 UID: 0 PID: 8416 Comm: syz.0.1642 Not tainted syzkaller #0 PREEMPT [ 869.052346][ T8416] Hardware name: linux,dummy-virt (DT) [ 869.052403][ T8416] Call trace: [ 869.052452][ T8416] show_stack+0x18/0x24 (C) [ 869.052597][ T8416] dump_stack_lvl+0xdc/0xf4 [ 869.052703][ T8416] dump_stack+0x1c/0x28 [ 869.052813][ T8416] should_fail_ex+0x5a0/0x6ac [ 869.052960][ T8416] should_failslab+0xbc/0x11c [ 869.053048][ T8416] __kmalloc_noprof+0xd0/0x4d0 [ 869.053132][ T8416] tomoyo_realpath_from_path+0x90/0x534 [ 869.053259][ T8416] tomoyo_path_number_perm+0x200/0x438 [ 869.053335][ T8416] tomoyo_file_ioctl+0x1c/0x28 [ 869.053413][ T8416] security_file_ioctl_compat+0x8c/0x19c [ 869.053500][ T8416] __arm64_compat_sys_ioctl+0x98/0x234 [ 869.053587][ T8416] invoke_syscall+0x6c/0x258 [ 869.053671][ T8416] el0_svc_common.constprop.0+0xac/0x230 [ 869.053798][ T8416] do_el0_svc_compat+0x40/0x68 [ 869.053940][ T8416] el0_svc_compat+0x4c/0x184 [ 869.054027][ T8416] el0t_32_sync_handler+0x88/0xac [ 869.054102][ T8416] el0t_32_sync+0x19c/0x1a0 [ 869.075513][ T8416] ERROR: Out of memory at tomoyo_realpath_from_path. [ 869.081618][ T30] audit: type=1400 audit(868.610:441): avc: denied { ioctl } for pid=8415 comm="syz.0.1642" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf30 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 881.139574][ T8512] FAULT_INJECTION: forcing a failure. [ 881.139574][ T8512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 881.140119][ T8512] CPU: 1 UID: 0 PID: 8512 Comm: syz.2.1675 Not tainted syzkaller #0 PREEMPT [ 881.140234][ T8512] Hardware name: linux,dummy-virt (DT) [ 881.140288][ T8512] Call trace: [ 881.140337][ T8512] show_stack+0x18/0x24 (C) [ 881.140970][ T8512] dump_stack_lvl+0xdc/0xf4 [ 881.141138][ T8512] dump_stack+0x1c/0x28 [ 881.141279][ T8512] should_fail_ex+0x5a0/0x6ac [ 881.141488][ T8512] should_fail+0x14/0x20 [ 881.141672][ T8512] should_fail_usercopy+0x1c/0x28 [ 881.141862][ T8512] _inline_copy_from_user+0x34/0x134 [ 881.141958][ T8512] get_compat_msghdr+0x90/0x118 [ 881.142072][ T8512] ___sys_sendmsg+0x184/0x19c [ 881.142177][ T8512] __sys_sendmsg+0x114/0x19c [ 881.142265][ T8512] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 881.142351][ T8512] invoke_syscall+0x6c/0x258 [ 881.142451][ T8512] el0_svc_common.constprop.0+0xac/0x230 [ 881.142578][ T8512] do_el0_svc_compat+0x40/0x68 [ 881.142669][ T8512] el0_svc_compat+0x4c/0x184 [ 881.142758][ T8512] el0t_32_sync_handler+0x88/0xac [ 881.142862][ T8512] el0t_32_sync+0x19c/0x1a0 [ 881.884624][ T8522] FAULT_INJECTION: forcing a failure. [ 881.884624][ T8522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 881.885322][ T8522] CPU: 1 UID: 0 PID: 8522 Comm: syz.0.1679 Not tainted syzkaller #0 PREEMPT [ 881.885442][ T8522] Hardware name: linux,dummy-virt (DT) [ 881.885495][ T8522] Call trace: [ 881.885539][ T8522] show_stack+0x18/0x24 (C) [ 881.885674][ T8522] dump_stack_lvl+0xdc/0xf4 [ 881.885830][ T8522] dump_stack+0x1c/0x28 [ 881.885939][ T8522] should_fail_ex+0x5a0/0x6ac [ 881.886105][ T8522] should_fail+0x14/0x20 [ 881.886196][ T8522] should_fail_usercopy+0x1c/0x28 [ 881.886279][ T8522] _inline_copy_from_user+0x34/0x134 [ 881.886365][ T8522] get_compat_msghdr+0x90/0x118 [ 881.886556][ T8522] ___sys_sendmsg+0x184/0x19c [ 881.886690][ T8522] __sys_sendmsg+0x114/0x19c [ 881.886766][ T8522] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 881.886848][ T8522] invoke_syscall+0x6c/0x258 [ 881.887098][ T8522] el0_svc_common.constprop.0+0xac/0x230 [ 881.887183][ T8522] do_el0_svc_compat+0x40/0x68 [ 881.887356][ T8522] el0_svc_compat+0x4c/0x184 [ 881.887475][ T8522] el0t_32_sync_handler+0x88/0xac [ 881.887557][ T8522] el0t_32_sync+0x19c/0x1a0 [ 882.188668][ T30] audit: type=1400 audit(881.710:442): avc: denied { create } for pid=8523 comm="syz.0.1680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 882.269546][ T30] audit: type=1400 audit(881.800:443): avc: denied { ioctl } for pid=8523 comm="syz.0.1680" path="socket:[21109]" dev="sockfs" ino=21109 ioctlcmd=0xf507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 882.284070][ T30] audit: type=1400 audit(881.810:444): avc: denied { write } for pid=8523 comm="syz.0.1680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 882.428687][ T8526] FAULT_INJECTION: forcing a failure. [ 882.428687][ T8526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 882.429274][ T8526] CPU: 1 UID: 0 PID: 8526 Comm: syz.2.1681 Not tainted syzkaller #0 PREEMPT [ 882.429388][ T8526] Hardware name: linux,dummy-virt (DT) [ 882.429456][ T8526] Call trace: [ 882.429507][ T8526] show_stack+0x18/0x24 (C) [ 882.429638][ T8526] dump_stack_lvl+0xdc/0xf4 [ 882.429736][ T8526] dump_stack+0x1c/0x28 [ 882.429825][ T8526] should_fail_ex+0x5a0/0x6ac [ 882.429915][ T8526] should_fail+0x14/0x20 [ 882.429996][ T8526] should_fail_usercopy+0x1c/0x28 [ 882.430071][ T8526] _inline_copy_from_user+0x34/0x134 [ 882.430157][ T8526] get_compat_msghdr+0x90/0x118 [ 882.430232][ T8526] ___sys_sendmsg+0x184/0x19c [ 882.430307][ T8526] __sys_sendmsg+0x114/0x19c [ 882.430379][ T8526] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 882.430464][ T8526] invoke_syscall+0x6c/0x258 [ 882.430537][ T8526] el0_svc_common.constprop.0+0xac/0x230 [ 882.430677][ T8526] do_el0_svc_compat+0x40/0x68 [ 882.430762][ T8526] el0_svc_compat+0x4c/0x184 [ 882.430864][ T8526] el0t_32_sync_handler+0x88/0xac [ 882.431036][ T8526] el0t_32_sync+0x19c/0x1a0 [ 884.295873][ T8551] FAULT_INJECTION: forcing a failure. [ 884.295873][ T8551] name failslab, interval 1, probability 0, space 0, times 0 [ 884.311352][ T8551] CPU: 0 UID: 0 PID: 8551 Comm: syz.2.1693 Not tainted syzkaller #0 PREEMPT [ 884.311606][ T8551] Hardware name: linux,dummy-virt (DT) [ 884.311665][ T8551] Call trace: [ 884.311720][ T8551] show_stack+0x18/0x24 (C) [ 884.311868][ T8551] dump_stack_lvl+0xdc/0xf4 [ 884.311966][ T8551] dump_stack+0x1c/0x28 [ 884.312055][ T8551] should_fail_ex+0x5a0/0x6ac [ 884.312140][ T8551] should_failslab+0xbc/0x11c [ 884.312219][ T8551] kmem_cache_alloc_noprof+0x74/0x3b8 [ 884.312302][ T8551] getname_flags.part.0+0x48/0x3d4 [ 884.312400][ T8551] getname_flags+0x78/0xc4 [ 884.312507][ T8551] __arm64_sys_unlinkat+0x80/0xf4 [ 884.312596][ T8551] invoke_syscall+0x6c/0x258 [ 884.312686][ T8551] el0_svc_common.constprop.0+0xac/0x230 [ 884.312769][ T8551] do_el0_svc_compat+0x40/0x68 [ 884.312847][ T8551] el0_svc_compat+0x4c/0x184 [ 884.312935][ T8551] el0t_32_sync_handler+0x88/0xac [ 884.313027][ T8551] el0t_32_sync+0x19c/0x1a0 [ 884.498497][ T30] audit: type=1400 audit(884.020:445): avc: denied { unmount } for pid=8025 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 885.125532][ T30] audit: type=1400 audit(884.650:446): avc: denied { setopt } for pid=8562 comm="syz.2.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 885.181124][ T30] audit: type=1400 audit(884.710:447): avc: denied { getopt } for pid=8562 comm="syz.2.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 885.187918][ T30] audit: type=1400 audit(884.720:448): avc: denied { ioctl } for pid=8562 comm="syz.2.1698" path="socket:[21199]" dev="sockfs" ino=21199 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 885.195918][ T30] audit: type=1400 audit(884.720:449): avc: denied { create } for pid=8562 comm="syz.2.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 885.204931][ T30] audit: type=1400 audit(884.730:450): avc: denied { write } for pid=8562 comm="syz.2.1698" name="AF_VSOCK" dev="sockfs" ino=21200 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 886.333989][ T30] audit: type=1400 audit(885.860:451): avc: denied { execute } for pid=8580 comm="syz.2.1706" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 888.283942][ T8595] FAULT_INJECTION: forcing a failure. [ 888.283942][ T8595] name failslab, interval 1, probability 0, space 0, times 0 [ 888.290539][ T8595] CPU: 0 UID: 0 PID: 8595 Comm: syz.2.1709 Not tainted syzkaller #0 PREEMPT [ 888.290782][ T8595] Hardware name: linux,dummy-virt (DT) [ 888.290857][ T8595] Call trace: [ 888.290907][ T8595] show_stack+0x18/0x24 (C) [ 888.291079][ T8595] dump_stack_lvl+0xdc/0xf4 [ 888.291188][ T8595] dump_stack+0x1c/0x28 [ 888.291275][ T8595] should_fail_ex+0x5a0/0x6ac [ 888.291378][ T8595] should_failslab+0xbc/0x11c [ 888.291463][ T8595] __kmalloc_noprof+0xd0/0x4d0 [ 888.291548][ T8595] tomoyo_realpath_from_path+0x90/0x534 [ 888.291645][ T8595] tomoyo_path_number_perm+0x200/0x438 [ 888.291733][ T8595] tomoyo_file_ioctl+0x1c/0x28 [ 888.291816][ T8595] security_file_ioctl_compat+0x8c/0x19c [ 888.291907][ T8595] __arm64_compat_sys_ioctl+0x98/0x234 [ 888.291997][ T8595] invoke_syscall+0x6c/0x258 [ 888.292078][ T8595] el0_svc_common.constprop.0+0xac/0x230 [ 888.292160][ T8595] do_el0_svc_compat+0x40/0x68 [ 888.292237][ T8595] el0_svc_compat+0x4c/0x184 [ 888.292317][ T8595] el0t_32_sync_handler+0x88/0xac [ 888.292412][ T8595] el0t_32_sync+0x19c/0x1a0 [ 888.311874][ T8595] ERROR: Out of memory at tomoyo_realpath_from_path. [ 888.331024][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 888.331668][ T30] audit: type=1400 audit(887.840:453): avc: denied { ioctl } for pid=8594 comm="syz.2.1709" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 888.923121][ T30] audit: type=1400 audit(888.440:454): avc: denied { bind } for pid=8598 comm="syz.2.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 888.949620][ T30] audit: type=1400 audit(888.480:455): avc: denied { listen } for pid=8598 comm="syz.2.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 888.954457][ T30] audit: type=1400 audit(888.480:456): avc: denied { accept } for pid=8598 comm="syz.2.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 890.454763][ T8612] FAULT_INJECTION: forcing a failure. [ 890.454763][ T8612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 890.459473][ T8612] CPU: 0 UID: 0 PID: 8612 Comm: syz.2.1717 Not tainted syzkaller #0 PREEMPT [ 890.459608][ T8612] Hardware name: linux,dummy-virt (DT) [ 890.459667][ T8612] Call trace: [ 890.459714][ T8612] show_stack+0x18/0x24 (C) [ 890.459855][ T8612] dump_stack_lvl+0xdc/0xf4 [ 890.459953][ T8612] dump_stack+0x1c/0x28 [ 890.460041][ T8612] should_fail_ex+0x5a0/0x6ac [ 890.460126][ T8612] should_fail+0x14/0x20 [ 890.460206][ T8612] should_fail_usercopy+0x1c/0x28 [ 890.460287][ T8612] _inline_copy_from_user+0x34/0x134 [ 890.460375][ T8612] get_compat_msghdr+0x90/0x118 [ 890.460464][ T8612] ___sys_sendmsg+0x184/0x19c [ 890.460551][ T8612] __sys_sendmsg+0x114/0x19c [ 890.460628][ T8612] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 890.460744][ T8612] invoke_syscall+0x6c/0x258 [ 890.460834][ T8612] el0_svc_common.constprop.0+0xac/0x230 [ 890.460919][ T8612] do_el0_svc_compat+0x40/0x68 [ 890.460998][ T8612] el0_svc_compat+0x4c/0x184 [ 890.461082][ T8612] el0t_32_sync_handler+0x88/0xac [ 890.461181][ T8612] el0t_32_sync+0x19c/0x1a0 [ 893.930666][ T30] audit: type=1400 audit(893.460:457): avc: denied { mounton } for pid=8642 comm="syz.0.1729" path="/192/file0" dev="tmpfs" ino=1000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 893.973136][ T8643] FAULT_INJECTION: forcing a failure. [ 893.973136][ T8643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 893.974069][ T8643] CPU: 1 UID: 0 PID: 8643 Comm: syz.0.1729 Not tainted syzkaller #0 PREEMPT [ 893.974190][ T8643] Hardware name: linux,dummy-virt (DT) [ 893.974251][ T8643] Call trace: [ 893.974304][ T8643] show_stack+0x18/0x24 (C) [ 893.974479][ T8643] dump_stack_lvl+0xdc/0xf4 [ 893.974586][ T8643] dump_stack+0x1c/0x28 [ 893.974715][ T8643] should_fail_ex+0x5a0/0x6ac [ 893.974812][ T8643] should_fail+0x14/0x20 [ 893.974966][ T8643] should_fail_usercopy+0x1c/0x28 [ 893.975135][ T8643] strncpy_from_user+0x34/0x2d8 [ 893.975237][ T8643] path_getxattrat+0xe8/0x204 [ 893.975514][ T8643] __arm64_sys_getxattr+0x8c/0xdc [ 893.975610][ T8643] invoke_syscall+0x6c/0x258 [ 893.975786][ T8643] el0_svc_common.constprop.0+0xac/0x230 [ 893.975963][ T8643] do_el0_svc_compat+0x40/0x68 [ 893.976158][ T8643] el0_svc_compat+0x4c/0x184 [ 893.976292][ T8643] el0t_32_sync_handler+0x88/0xac [ 893.976466][ T8643] el0t_32_sync+0x19c/0x1a0 [ 896.630785][ T8666] FAULT_INJECTION: forcing a failure. [ 896.630785][ T8666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 896.631667][ T8666] CPU: 1 UID: 0 PID: 8666 Comm: syz.0.1739 Not tainted syzkaller #0 PREEMPT [ 896.631781][ T8666] Hardware name: linux,dummy-virt (DT) [ 896.631839][ T8666] Call trace: [ 896.631935][ T8666] show_stack+0x18/0x24 (C) [ 896.632132][ T8666] dump_stack_lvl+0xdc/0xf4 [ 896.632222][ T8666] dump_stack+0x1c/0x28 [ 896.632314][ T8666] should_fail_ex+0x5a0/0x6ac [ 896.632401][ T8666] should_fail+0x14/0x20 [ 896.632484][ T8666] should_fail_usercopy+0x1c/0x28 [ 896.632564][ T8666] _inline_copy_from_user+0x34/0x134 [ 896.632661][ T8666] __arm64_sys_io_uring_register+0x9c0/0x201c [ 896.632748][ T8666] invoke_syscall+0x6c/0x258 [ 896.632830][ T8666] el0_svc_common.constprop.0+0xac/0x230 [ 896.632996][ T8666] do_el0_svc_compat+0x40/0x68 [ 896.633116][ T8666] el0_svc_compat+0x4c/0x184 [ 896.633245][ T8666] el0t_32_sync_handler+0x88/0xac [ 896.633331][ T8666] el0t_32_sync+0x19c/0x1a0 [ 897.774061][ T8678] FAULT_INJECTION: forcing a failure. [ 897.774061][ T8678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.774721][ T8678] CPU: 0 UID: 0 PID: 8678 Comm: syz.2.1744 Not tainted syzkaller #0 PREEMPT [ 897.774833][ T8678] Hardware name: linux,dummy-virt (DT) [ 897.774890][ T8678] Call trace: [ 897.774937][ T8678] show_stack+0x18/0x24 (C) [ 897.775075][ T8678] dump_stack_lvl+0xdc/0xf4 [ 897.775170][ T8678] dump_stack+0x1c/0x28 [ 897.775263][ T8678] should_fail_ex+0x5a0/0x6ac [ 897.775418][ T8678] should_fail+0x14/0x20 [ 897.775642][ T8678] should_fail_usercopy+0x1c/0x28 [ 897.776039][ T8678] simple_read_from_buffer+0x84/0x214 [ 897.776234][ T8678] proc_fail_nth_read+0x160/0x21c [ 897.776329][ T8678] vfs_read+0x18c/0xa28 [ 897.776428][ T8678] ksys_read+0xec/0x1d8 [ 897.776657][ T8678] __arm64_sys_read+0x6c/0x9c [ 897.777076][ T8678] invoke_syscall+0x6c/0x258 [ 897.777307][ T8678] el0_svc_common.constprop.0+0xac/0x230 [ 897.777440][ T8678] do_el0_svc_compat+0x40/0x68 [ 897.777574][ T8678] el0_svc_compat+0x4c/0x184 [ 897.777666][ T8678] el0t_32_sync_handler+0x88/0xac [ 897.777750][ T8678] el0t_32_sync+0x19c/0x1a0 [ 900.984608][ T8694] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8694 comm=syz.0.1749 [ 906.030240][ T8726] FAULT_INJECTION: forcing a failure. [ 906.030240][ T8726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.035116][ T8726] CPU: 1 UID: 0 PID: 8726 Comm: syz.2.1762 Not tainted syzkaller #0 PREEMPT [ 906.035346][ T8726] Hardware name: linux,dummy-virt (DT) [ 906.035408][ T8726] Call trace: [ 906.035458][ T8726] show_stack+0x18/0x24 (C) [ 906.035619][ T8726] dump_stack_lvl+0xdc/0xf4 [ 906.035751][ T8726] dump_stack+0x1c/0x28 [ 906.035891][ T8726] should_fail_ex+0x5a0/0x6ac [ 906.035997][ T8726] should_fail+0x14/0x20 [ 906.036131][ T8726] should_fail_usercopy+0x1c/0x28 [ 906.036216][ T8726] _inline_copy_from_user+0x34/0x134 [ 906.036311][ T8726] get_compat_msghdr+0x90/0x118 [ 906.036390][ T8726] ___sys_sendmsg+0x184/0x19c [ 906.036494][ T8726] __sys_sendmsg+0x114/0x19c [ 906.036663][ T8726] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 906.036751][ T8726] invoke_syscall+0x6c/0x258 [ 906.036828][ T8726] el0_svc_common.constprop.0+0xac/0x230 [ 906.036904][ T8726] do_el0_svc_compat+0x40/0x68 [ 906.036981][ T8726] el0_svc_compat+0x4c/0x184 [ 906.037072][ T8726] el0t_32_sync_handler+0x88/0xac [ 906.037183][ T8726] el0t_32_sync+0x19c/0x1a0 [ 908.543860][ T30] audit: type=1400 audit(908.070:458): avc: denied { create } for pid=8739 comm="syz.2.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 908.579910][ T30] audit: type=1400 audit(908.100:459): avc: denied { bind } for pid=8739 comm="syz.2.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 909.301211][ T30] audit: type=1400 audit(908.830:460): avc: denied { read } for pid=8746 comm="syz.0.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 909.403313][ T8751] FAULT_INJECTION: forcing a failure. [ 909.403313][ T8751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.404179][ T8751] CPU: 0 UID: 0 PID: 8751 Comm: syz.2.1773 Not tainted syzkaller #0 PREEMPT [ 909.404282][ T8751] Hardware name: linux,dummy-virt (DT) [ 909.404339][ T8751] Call trace: [ 909.404397][ T8751] show_stack+0x18/0x24 (C) [ 909.404555][ T8751] dump_stack_lvl+0xdc/0xf4 [ 909.404650][ T8751] dump_stack+0x1c/0x28 [ 909.404742][ T8751] should_fail_ex+0x5a0/0x6ac [ 909.404922][ T8751] should_fail+0x14/0x20 [ 909.405026][ T8751] should_fail_usercopy+0x1c/0x28 [ 909.405117][ T8751] simple_read_from_buffer+0x84/0x214 [ 909.405372][ T8751] proc_fail_nth_read+0x160/0x21c [ 909.405495][ T8751] vfs_read+0x18c/0xa28 [ 909.405635][ T8751] ksys_read+0xec/0x1d8 [ 909.405727][ T8751] __arm64_sys_read+0x6c/0x9c [ 909.405804][ T8751] invoke_syscall+0x6c/0x258 [ 909.405882][ T8751] el0_svc_common.constprop.0+0xac/0x230 [ 909.405962][ T8751] do_el0_svc_compat+0x40/0x68 [ 909.406144][ T8751] el0_svc_compat+0x4c/0x184 [ 909.406702][ T8751] el0t_32_sync_handler+0x88/0xac [ 909.407045][ T8751] el0t_32_sync+0x19c/0x1a0 [ 912.397953][ T8778] FAULT_INJECTION: forcing a failure. [ 912.397953][ T8778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 912.400599][ T8778] CPU: 1 UID: 0 PID: 8778 Comm: syz.2.1785 Not tainted syzkaller #0 PREEMPT [ 912.400732][ T8778] Hardware name: linux,dummy-virt (DT) [ 912.400793][ T8778] Call trace: [ 912.400847][ T8778] show_stack+0x18/0x24 (C) [ 912.401000][ T8778] dump_stack_lvl+0xdc/0xf4 [ 912.401101][ T8778] dump_stack+0x1c/0x28 [ 912.401218][ T8778] should_fail_ex+0x5a0/0x6ac [ 912.401308][ T8778] should_fail+0x14/0x20 [ 912.401420][ T8778] should_fail_usercopy+0x1c/0x28 [ 912.401503][ T8778] _inline_copy_from_user+0x34/0x134 [ 912.401597][ T8778] get_compat_msghdr+0x90/0x118 [ 912.401680][ T8778] ___sys_sendmsg+0x184/0x19c [ 912.401767][ T8778] __sys_sendmsg+0x114/0x19c [ 912.401846][ T8778] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 912.401930][ T8778] invoke_syscall+0x6c/0x258 [ 912.402014][ T8778] el0_svc_common.constprop.0+0xac/0x230 [ 912.402093][ T8778] do_el0_svc_compat+0x40/0x68 [ 912.402168][ T8778] el0_svc_compat+0x4c/0x184 [ 912.402249][ T8778] el0t_32_sync_handler+0x88/0xac [ 912.402328][ T8778] el0t_32_sync+0x19c/0x1a0 [ 915.865948][ T8813] FAULT_INJECTION: forcing a failure. [ 915.865948][ T8813] name failslab, interval 1, probability 0, space 0, times 0 [ 915.869532][ T8813] CPU: 1 UID: 0 PID: 8813 Comm: syz.0.1801 Not tainted syzkaller #0 PREEMPT [ 915.869670][ T8813] Hardware name: linux,dummy-virt (DT) [ 915.869742][ T8813] Call trace: [ 915.869791][ T8813] show_stack+0x18/0x24 (C) [ 915.869940][ T8813] dump_stack_lvl+0xdc/0xf4 [ 915.870043][ T8813] dump_stack+0x1c/0x28 [ 915.870130][ T8813] should_fail_ex+0x5a0/0x6ac [ 915.870219][ T8813] should_failslab+0xbc/0x11c [ 915.870309][ T8813] __kmalloc_noprof+0xd0/0x4d0 [ 915.870401][ T8813] tomoyo_realpath_from_path+0x90/0x534 [ 915.870510][ T8813] tomoyo_path_number_perm+0x200/0x438 [ 915.870596][ T8813] tomoyo_file_ioctl+0x1c/0x28 [ 915.870688][ T8813] security_file_ioctl_compat+0x8c/0x19c [ 915.870790][ T8813] __arm64_compat_sys_ioctl+0x98/0x234 [ 915.870896][ T8813] invoke_syscall+0x6c/0x258 [ 915.870987][ T8813] el0_svc_common.constprop.0+0xac/0x230 [ 915.871066][ T8813] do_el0_svc_compat+0x40/0x68 [ 915.871155][ T8813] el0_svc_compat+0x4c/0x184 [ 915.871252][ T8813] el0t_32_sync_handler+0x88/0xac [ 915.871339][ T8813] el0t_32_sync+0x19c/0x1a0 [ 915.888555][ T8813] ERROR: Out of memory at tomoyo_realpath_from_path. [ 916.458009][ T8819] FAULT_INJECTION: forcing a failure. [ 916.458009][ T8819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 916.458533][ T8819] CPU: 0 UID: 0 PID: 8819 Comm: syz.0.1803 Not tainted syzkaller #0 PREEMPT [ 916.458658][ T8819] Hardware name: linux,dummy-virt (DT) [ 916.458750][ T8819] Call trace: [ 916.458804][ T8819] show_stack+0x18/0x24 (C) [ 916.458949][ T8819] dump_stack_lvl+0xdc/0xf4 [ 916.459052][ T8819] dump_stack+0x1c/0x28 [ 916.459143][ T8819] should_fail_ex+0x5a0/0x6ac [ 916.459251][ T8819] should_fail+0x14/0x20 [ 916.459340][ T8819] should_fail_usercopy+0x1c/0x28 [ 916.459475][ T8819] _inline_copy_from_user+0x34/0x134 [ 916.459608][ T8819] get_compat_msghdr+0x90/0x118 [ 916.459875][ T8819] ___sys_sendmsg+0x184/0x19c [ 916.459985][ T8819] __sys_sendmsg+0x114/0x19c [ 916.460153][ T8819] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 916.460252][ T8819] invoke_syscall+0x6c/0x258 [ 916.460424][ T8819] el0_svc_common.constprop.0+0xac/0x230 [ 916.460557][ T8819] do_el0_svc_compat+0x40/0x68 [ 916.460709][ T8819] el0_svc_compat+0x4c/0x184 [ 916.460928][ T8819] el0t_32_sync_handler+0x88/0xac [ 916.461056][ T8819] el0t_32_sync+0x19c/0x1a0 [ 917.458123][ T8364] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 917.642889][ T8364] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 917.646000][ T8364] usb 1-1: config 1 has no interface number 0 [ 917.649545][ T8364] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 8 [ 917.651241][ T8364] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0xB has invalid maxpacket 32 [ 917.708073][ T8364] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 917.710939][ T8364] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 917.713041][ T8364] usb 1-1: Product: syz [ 917.714174][ T8364] usb 1-1: Manufacturer: syz [ 917.715238][ T8364] usb 1-1: SerialNumber: syz [ 917.750319][ T8826] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 917.759943][ T8826] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 917.792026][ T8364] usb 1-1: Error in usbnet_get_endpoints (-22) [ 918.438799][ T30] audit: type=1400 audit(917.960:461): avc: denied { create } for pid=8833 comm="syz.2.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 918.471847][ T30] audit: type=1400 audit(918.000:462): avc: denied { setopt } for pid=8833 comm="syz.2.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 931.567663][ T7536] usb 1-1: USB disconnect, device number 9 [ 932.024044][ T30] audit: type=1400 audit(931.540:463): avc: denied { relabelfrom } for pid=8876 comm="syz.2.1825" name="NETLINK" dev="sockfs" ino=21856 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 932.047894][ T30] audit: type=1400 audit(931.560:464): avc: denied { mac_admin } for pid=8876 comm="syz.2.1825" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 932.053640][ T8877] SELinux: Context system_u:object_r:klogd_var_run_t:s0 is not valid (left unmapped). [ 932.069383][ T30] audit: type=1400 audit(931.580:465): avc: denied { relabelto } for pid=8876 comm="syz.2.1825" name="NETLINK" dev="sockfs" ino=21856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_generic_socket permissive=1 trawcon="system_u:object_r:klogd_var_run_t:s0" [ 932.110017][ T8891] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1826'. [ 932.111344][ T8891] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1826'. [ 932.642853][ T30] audit: type=1400 audit(932.170:466): avc: denied { accept } for pid=8889 comm="syz.0.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 937.065287][ T8942] FAULT_INJECTION: forcing a failure. [ 937.065287][ T8942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 937.065700][ T8942] CPU: 0 UID: 0 PID: 8942 Comm: syz.2.1836 Not tainted syzkaller #0 PREEMPT [ 937.065761][ T8942] Hardware name: linux,dummy-virt (DT) [ 937.065788][ T8942] Call trace: [ 937.065809][ T8942] show_stack+0x18/0x24 (C) [ 937.065893][ T8942] dump_stack_lvl+0xdc/0xf4 [ 937.065940][ T8942] dump_stack+0x1c/0x28 [ 937.065979][ T8942] should_fail_ex+0x5a0/0x6ac [ 937.066021][ T8942] should_fail+0x14/0x20 [ 937.066057][ T8942] should_fail_usercopy+0x1c/0x28 [ 937.066179][ T8942] simple_read_from_buffer+0x84/0x214 [ 937.066226][ T8942] proc_fail_nth_read+0x160/0x21c [ 937.066271][ T8942] vfs_read+0x18c/0xa28 [ 937.066309][ T8942] ksys_read+0xec/0x1d8 [ 937.066346][ T8942] __arm64_sys_read+0x6c/0x9c [ 937.066436][ T8942] invoke_syscall+0x6c/0x258 [ 937.066477][ T8942] el0_svc_common.constprop.0+0xac/0x230 [ 937.066516][ T8942] do_el0_svc_compat+0x40/0x68 [ 937.066587][ T8942] el0_svc_compat+0x4c/0x184 [ 937.066634][ T8942] el0t_32_sync_handler+0x88/0xac [ 937.066671][ T8942] el0t_32_sync+0x19c/0x1a0 [ 938.540565][ T8961] FAULT_INJECTION: forcing a failure. [ 938.540565][ T8961] name failslab, interval 1, probability 0, space 0, times 0 [ 938.543224][ T8961] CPU: 1 UID: 0 PID: 8961 Comm: syz.0.1843 Not tainted syzkaller #0 PREEMPT [ 938.543400][ T8961] Hardware name: linux,dummy-virt (DT) [ 938.543465][ T8961] Call trace: [ 938.543521][ T8961] show_stack+0x18/0x24 (C) [ 938.543809][ T8961] dump_stack_lvl+0xdc/0xf4 [ 938.543915][ T8961] dump_stack+0x1c/0x28 [ 938.544009][ T8961] should_fail_ex+0x5a0/0x6ac [ 938.544099][ T8961] should_failslab+0xbc/0x11c [ 938.544191][ T8961] __kmalloc_noprof+0xd0/0x4d0 [ 938.544285][ T8961] tomoyo_realpath_from_path+0x90/0x534 [ 938.544374][ T8961] tomoyo_path_number_perm+0x200/0x438 [ 938.544460][ T8961] tomoyo_file_ioctl+0x1c/0x28 [ 938.544539][ T8961] security_file_ioctl_compat+0x8c/0x19c [ 938.544620][ T8961] __arm64_compat_sys_ioctl+0x98/0x234 [ 938.544720][ T8961] invoke_syscall+0x6c/0x258 [ 938.544799][ T8961] el0_svc_common.constprop.0+0xac/0x230 [ 938.544874][ T8961] do_el0_svc_compat+0x40/0x68 [ 938.544952][ T8961] el0_svc_compat+0x4c/0x184 [ 938.545032][ T8961] el0t_32_sync_handler+0x88/0xac [ 938.545109][ T8961] el0t_32_sync+0x19c/0x1a0 [ 938.584941][ T8961] ERROR: Out of memory at tomoyo_realpath_from_path. [ 938.959589][ T30] audit: type=1400 audit(938.490:467): avc: denied { read write } for pid=8969 comm="syz.0.1847" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 938.965743][ T30] audit: type=1400 audit(938.490:468): avc: denied { open } for pid=8969 comm="syz.0.1847" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 938.993888][ T30] audit: type=1400 audit(938.520:469): avc: denied { ioctl } for pid=8969 comm="syz.0.1847" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 939.149077][ T8973] FAULT_INJECTION: forcing a failure. [ 939.149077][ T8973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 939.151296][ T8973] CPU: 0 UID: 0 PID: 8973 Comm: syz.0.1849 Not tainted syzkaller #0 PREEMPT [ 939.151416][ T8973] Hardware name: linux,dummy-virt (DT) [ 939.151455][ T8973] Call trace: [ 939.151504][ T8973] show_stack+0x18/0x24 (C) [ 939.151636][ T8973] dump_stack_lvl+0xdc/0xf4 [ 939.151704][ T8973] dump_stack+0x1c/0x28 [ 939.151747][ T8973] should_fail_ex+0x5a0/0x6ac [ 939.151788][ T8973] should_fail+0x14/0x20 [ 939.151909][ T8973] should_fail_usercopy+0x1c/0x28 [ 939.151957][ T8973] _inline_copy_from_user+0x34/0x134 [ 939.152000][ T8973] get_compat_msghdr+0x90/0x118 [ 939.152037][ T8973] ___sys_sendmsg+0x184/0x19c [ 939.152079][ T8973] __sys_sendmsg+0x114/0x19c [ 939.152115][ T8973] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 939.152152][ T8973] invoke_syscall+0x6c/0x258 [ 939.152191][ T8973] el0_svc_common.constprop.0+0xac/0x230 [ 939.152230][ T8973] do_el0_svc_compat+0x40/0x68 [ 939.152265][ T8973] el0_svc_compat+0x4c/0x184 [ 939.152307][ T8973] el0t_32_sync_handler+0x88/0xac [ 939.152347][ T8973] el0t_32_sync+0x19c/0x1a0 [ 939.516936][ T8975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=8975 comm=syz.0.1850 [ 939.527828][ T8975] fuse: Unknown parameter 'root-ode' [ 940.795567][ T30] audit: type=1400 audit(940.320:470): avc: denied { getopt } for pid=8981 comm="syz.0.1852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 940.825792][ T30] audit: type=1400 audit(940.350:471): avc: denied { ioctl } for pid=8981 comm="syz.0.1852" path="socket:[21966]" dev="sockfs" ino=21966 ioctlcmd=0x64b6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 944.612048][ T9009] FAULT_INJECTION: forcing a failure. [ 944.612048][ T9009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 944.620667][ T9009] CPU: 1 UID: 0 PID: 9009 Comm: syz.0.1865 Not tainted syzkaller #0 PREEMPT [ 944.621017][ T9009] Hardware name: linux,dummy-virt (DT) [ 944.621080][ T9009] Call trace: [ 944.621127][ T9009] show_stack+0x18/0x24 (C) [ 944.621366][ T9009] dump_stack_lvl+0xdc/0xf4 [ 944.621469][ T9009] dump_stack+0x1c/0x28 [ 944.621562][ T9009] should_fail_ex+0x5a0/0x6ac [ 944.621655][ T9009] should_fail+0x14/0x20 [ 944.621730][ T9009] should_fail_usercopy+0x1c/0x28 [ 944.621814][ T9009] _inline_copy_from_user+0x34/0x134 [ 944.621905][ T9009] get_compat_msghdr+0x90/0x118 [ 944.621988][ T9009] ___sys_sendmsg+0x184/0x19c [ 944.622072][ T9009] __sys_sendmsg+0x114/0x19c [ 944.622153][ T9009] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 944.622227][ T9009] invoke_syscall+0x6c/0x258 [ 944.622306][ T9009] el0_svc_common.constprop.0+0xac/0x230 [ 944.622380][ T9009] do_el0_svc_compat+0x40/0x68 [ 944.622450][ T9009] el0_svc_compat+0x4c/0x184 [ 944.622560][ T9009] el0t_32_sync_handler+0x88/0xac [ 944.622641][ T9009] el0t_32_sync+0x19c/0x1a0 [ 947.128997][ T9026] FAULT_INJECTION: forcing a failure. [ 947.128997][ T9026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 947.129814][ T9026] CPU: 1 UID: 0 PID: 9026 Comm: syz.2.1870 Not tainted syzkaller #0 PREEMPT [ 947.129934][ T9026] Hardware name: linux,dummy-virt (DT) [ 947.129993][ T9026] Call trace: [ 947.130094][ T9026] show_stack+0x18/0x24 (C) [ 947.130652][ T9026] dump_stack_lvl+0xdc/0xf4 [ 947.130760][ T9026] dump_stack+0x1c/0x28 [ 947.130851][ T9026] should_fail_ex+0x5a0/0x6ac [ 947.130946][ T9026] should_fail+0x14/0x20 [ 947.131072][ T9026] should_fail_usercopy+0x1c/0x28 [ 947.131171][ T9026] _inline_copy_from_user+0x34/0x134 [ 947.131298][ T9026] get_compat_msghdr+0x90/0x118 [ 947.131389][ T9026] ___sys_sendmsg+0x184/0x19c [ 947.131556][ T9026] __sys_sendmsg+0x114/0x19c [ 947.131672][ T9026] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 947.131773][ T9026] invoke_syscall+0x6c/0x258 [ 947.131838][ T9026] el0_svc_common.constprop.0+0xac/0x230 [ 947.131887][ T9026] do_el0_svc_compat+0x40/0x68 [ 947.131924][ T9026] el0_svc_compat+0x4c/0x184 [ 947.131966][ T9026] el0t_32_sync_handler+0x88/0xac [ 947.132082][ T9026] el0t_32_sync+0x19c/0x1a0 [ 947.874407][ T30] audit: type=1400 audit(947.400:472): avc: denied { append } for pid=9028 comm="syz.2.1871" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 950.342779][ T30] audit: type=1400 audit(949.870:473): avc: denied { setattr } for pid=9043 comm="syz.2.1875" name="NETLINK" dev="sockfs" ino=22983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 950.833945][ T9050] FAULT_INJECTION: forcing a failure. [ 950.833945][ T9050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 950.834712][ T9050] CPU: 1 UID: 0 PID: 9050 Comm: syz.0.1878 Not tainted syzkaller #0 PREEMPT [ 950.834816][ T9050] Hardware name: linux,dummy-virt (DT) [ 950.834872][ T9050] Call trace: [ 950.834956][ T9050] show_stack+0x18/0x24 (C) [ 950.835106][ T9050] dump_stack_lvl+0xdc/0xf4 [ 950.835216][ T9050] dump_stack+0x1c/0x28 [ 950.835366][ T9050] should_fail_ex+0x5a0/0x6ac [ 950.835463][ T9050] should_fail+0x14/0x20 [ 950.835541][ T9050] should_fail_usercopy+0x1c/0x28 [ 950.835658][ T9050] _inline_copy_from_user+0x34/0x134 [ 950.835757][ T9050] get_compat_msghdr+0x90/0x118 [ 950.835833][ T9050] ___sys_sendmsg+0x184/0x19c [ 950.835919][ T9050] __sys_sendmsg+0x114/0x19c [ 950.836000][ T9050] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 950.836124][ T9050] invoke_syscall+0x6c/0x258 [ 950.836348][ T9050] el0_svc_common.constprop.0+0xac/0x230 [ 950.836446][ T9050] do_el0_svc_compat+0x40/0x68 [ 950.836526][ T9050] el0_svc_compat+0x4c/0x184 [ 950.836680][ T9050] el0t_32_sync_handler+0x88/0xac [ 950.836775][ T9050] el0t_32_sync+0x19c/0x1a0 [ 954.847103][ T30] audit: type=1400 audit(954.370:474): avc: denied { map } for pid=9057 comm="syz.0.1881" path="socket:[23022]" dev="sockfs" ino=23022 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 955.589207][ T9066] FAULT_INJECTION: forcing a failure. [ 955.589207][ T9066] name failslab, interval 1, probability 0, space 0, times 0 [ 955.589739][ T9066] CPU: 1 UID: 0 PID: 9066 Comm: syz.0.1883 Not tainted syzkaller #0 PREEMPT [ 955.589852][ T9066] Hardware name: linux,dummy-virt (DT) [ 955.589901][ T9066] Call trace: [ 955.589944][ T9066] show_stack+0x18/0x24 (C) [ 955.590083][ T9066] dump_stack_lvl+0xdc/0xf4 [ 955.590230][ T9066] dump_stack+0x1c/0x28 [ 955.590328][ T9066] should_fail_ex+0x5a0/0x6ac [ 955.590447][ T9066] should_failslab+0xbc/0x11c [ 955.590546][ T9066] __kmalloc_noprof+0xd0/0x4d0 [ 955.590636][ T9066] tomoyo_realpath_from_path+0x90/0x534 [ 955.590785][ T9066] tomoyo_path_number_perm+0x200/0x438 [ 955.590908][ T9066] tomoyo_file_ioctl+0x1c/0x28 [ 955.591019][ T9066] security_file_ioctl_compat+0x8c/0x19c [ 955.591179][ T9066] __arm64_compat_sys_ioctl+0x98/0x234 [ 955.591301][ T9066] invoke_syscall+0x6c/0x258 [ 955.591440][ T9066] el0_svc_common.constprop.0+0xac/0x230 [ 955.591565][ T9066] do_el0_svc_compat+0x40/0x68 [ 955.591675][ T9066] el0_svc_compat+0x4c/0x184 [ 955.591764][ T9066] el0t_32_sync_handler+0x88/0xac [ 955.591836][ T9066] el0t_32_sync+0x19c/0x1a0 [ 955.593727][ T9066] ERROR: Out of memory at tomoyo_realpath_from_path. [ 955.941880][ T9069] FAULT_INJECTION: forcing a failure. [ 955.941880][ T9069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 955.942502][ T9069] CPU: 1 UID: 0 PID: 9069 Comm: syz.0.1885 Not tainted syzkaller #0 PREEMPT [ 955.942602][ T9069] Hardware name: linux,dummy-virt (DT) [ 955.942653][ T9069] Call trace: [ 955.942697][ T9069] show_stack+0x18/0x24 (C) [ 955.942889][ T9069] dump_stack_lvl+0xdc/0xf4 [ 955.943001][ T9069] dump_stack+0x1c/0x28 [ 955.943089][ T9069] should_fail_ex+0x5a0/0x6ac [ 955.943220][ T9069] should_fail+0x14/0x20 [ 955.943325][ T9069] should_fail_usercopy+0x1c/0x28 [ 955.943451][ T9069] _inline_copy_from_user+0x34/0x134 [ 955.943571][ T9069] get_compat_msghdr+0x90/0x118 [ 955.943661][ T9069] ___sys_sendmsg+0x184/0x19c [ 955.943784][ T9069] __sys_sendmsg+0x114/0x19c [ 955.943868][ T9069] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 955.943949][ T9069] invoke_syscall+0x6c/0x258 [ 955.944076][ T9069] el0_svc_common.constprop.0+0xac/0x230 [ 955.944159][ T9069] do_el0_svc_compat+0x40/0x68 [ 955.944245][ T9069] el0_svc_compat+0x4c/0x184 [ 955.944333][ T9069] el0t_32_sync_handler+0x88/0xac [ 955.944414][ T9069] el0t_32_sync+0x19c/0x1a0 [ 956.694193][ T30] audit: type=1400 audit(956.220:475): avc: denied { create } for pid=9070 comm="syz.0.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 956.723674][ T9078] FAULT_INJECTION: forcing a failure. [ 956.723674][ T9078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 956.724349][ T9078] CPU: 1 UID: 0 PID: 9078 Comm: syz.2.1888 Not tainted syzkaller #0 PREEMPT [ 956.724479][ T9078] Hardware name: linux,dummy-virt (DT) [ 956.724541][ T9078] Call trace: [ 956.724587][ T9078] show_stack+0x18/0x24 (C) [ 956.724726][ T9078] dump_stack_lvl+0xdc/0xf4 [ 956.724833][ T9078] dump_stack+0x1c/0x28 [ 956.724915][ T9078] should_fail_ex+0x5a0/0x6ac [ 956.724997][ T9078] should_fail+0x14/0x20 [ 956.725070][ T9078] should_fail_usercopy+0x1c/0x28 [ 956.725202][ T9078] _inline_copy_from_user+0x34/0x134 [ 956.725349][ T9078] get_compat_msghdr+0x90/0x118 [ 956.725448][ T9078] ___sys_sendmsg+0x184/0x19c [ 956.725591][ T9078] __sys_sendmsg+0x114/0x19c [ 956.725680][ T9078] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 956.725771][ T9078] invoke_syscall+0x6c/0x258 [ 956.725910][ T9078] el0_svc_common.constprop.0+0xac/0x230 [ 956.726049][ T9078] do_el0_svc_compat+0x40/0x68 [ 956.726212][ T9078] el0_svc_compat+0x4c/0x184 [ 956.726338][ T9078] el0t_32_sync_handler+0x88/0xac [ 956.726485][ T9078] el0t_32_sync+0x19c/0x1a0 [ 958.948955][ T30] audit: type=1400 audit(958.470:476): avc: denied { create } for pid=9094 comm="syz.2.1895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 959.279996][ T9102] FAULT_INJECTION: forcing a failure. [ 959.279996][ T9102] name failslab, interval 1, probability 0, space 0, times 0 [ 959.280336][ T9102] CPU: 1 UID: 0 PID: 9102 Comm: syz.2.1898 Not tainted syzkaller #0 PREEMPT [ 959.280393][ T9102] Hardware name: linux,dummy-virt (DT) [ 959.280425][ T9102] Call trace: [ 959.280448][ T9102] show_stack+0x18/0x24 (C) [ 959.280519][ T9102] dump_stack_lvl+0xdc/0xf4 [ 959.280569][ T9102] dump_stack+0x1c/0x28 [ 959.280608][ T9102] should_fail_ex+0x5a0/0x6ac [ 959.280657][ T9102] should_failslab+0xbc/0x11c [ 959.280702][ T9102] __kmalloc_noprof+0xd0/0x4d0 [ 959.280743][ T9102] tomoyo_realpath_from_path+0x90/0x534 [ 959.280787][ T9102] tomoyo_path_number_perm+0x200/0x438 [ 959.280825][ T9102] tomoyo_file_ioctl+0x1c/0x28 [ 959.280947][ T9102] security_file_ioctl_compat+0x8c/0x19c [ 959.281060][ T9102] __arm64_compat_sys_ioctl+0x98/0x234 [ 959.281113][ T9102] invoke_syscall+0x6c/0x258 [ 959.281222][ T9102] el0_svc_common.constprop.0+0xac/0x230 [ 959.281310][ T9102] do_el0_svc_compat+0x40/0x68 [ 959.281393][ T9102] el0_svc_compat+0x4c/0x184 [ 959.281501][ T9102] el0t_32_sync_handler+0x88/0xac [ 959.281625][ T9102] el0t_32_sync+0x19c/0x1a0 [ 959.285786][ T9102] ERROR: Out of memory at tomoyo_realpath_from_path. [ 960.578998][ T30] audit: type=1400 audit(960.110:477): avc: denied { ioctl } for pid=9111 comm="syz.0.1901" path="/dev/ptyq4" dev="devtmpfs" ino=115 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 962.033807][ T9131] FAULT_INJECTION: forcing a failure. [ 962.033807][ T9131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 962.040053][ T9131] CPU: 1 UID: 0 PID: 9131 Comm: syz.0.1909 Not tainted syzkaller #0 PREEMPT [ 962.040401][ T9131] Hardware name: linux,dummy-virt (DT) [ 962.040467][ T9131] Call trace: [ 962.040516][ T9131] show_stack+0x18/0x24 (C) [ 962.040718][ T9131] dump_stack_lvl+0xdc/0xf4 [ 962.040834][ T9131] dump_stack+0x1c/0x28 [ 962.040920][ T9131] should_fail_ex+0x5a0/0x6ac [ 962.041014][ T9131] should_fail+0x14/0x20 [ 962.041092][ T9131] should_fail_usercopy+0x1c/0x28 [ 962.041194][ T9131] _inline_copy_from_user+0x34/0x134 [ 962.041296][ T9131] get_compat_msghdr+0x90/0x118 [ 962.041384][ T9131] ___sys_sendmsg+0x184/0x19c [ 962.041425][ T9131] __sys_sendmsg+0x114/0x19c [ 962.041460][ T9131] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 962.041496][ T9131] invoke_syscall+0x6c/0x258 [ 962.041534][ T9131] el0_svc_common.constprop.0+0xac/0x230 [ 962.041572][ T9131] do_el0_svc_compat+0x40/0x68 [ 962.041609][ T9131] el0_svc_compat+0x4c/0x184 [ 962.041648][ T9131] el0t_32_sync_handler+0x88/0xac [ 962.041684][ T9131] el0t_32_sync+0x19c/0x1a0 [ 973.730324][ T30] audit: type=1400 audit(973.260:478): avc: denied { create } for pid=9218 comm="syz.0.1942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 976.455845][ T30] audit: type=1400 audit(975.980:479): avc: denied { bind } for pid=9242 comm="syz.0.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 977.692597][ T9266] FAULT_INJECTION: forcing a failure. [ 977.692597][ T9266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 977.692991][ T9266] CPU: 1 UID: 0 PID: 9266 Comm: syz.0.1958 Not tainted syzkaller #0 PREEMPT [ 977.693057][ T9266] Hardware name: linux,dummy-virt (DT) [ 977.693085][ T9266] Call trace: [ 977.693109][ T9266] show_stack+0x18/0x24 (C) [ 977.693253][ T9266] dump_stack_lvl+0xdc/0xf4 [ 977.693336][ T9266] dump_stack+0x1c/0x28 [ 977.693380][ T9266] should_fail_ex+0x5a0/0x6ac [ 977.693447][ T9266] should_fail+0x14/0x20 [ 977.693566][ T9266] should_fail_usercopy+0x1c/0x28 [ 977.693626][ T9266] _inline_copy_from_user+0x34/0x134 [ 977.693688][ T9266] get_compat_msghdr+0x90/0x118 [ 977.693728][ T9266] ___sys_sendmsg+0x184/0x19c [ 977.693780][ T9266] __sys_sendmsg+0x114/0x19c [ 977.693847][ T9266] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 977.693939][ T9266] invoke_syscall+0x6c/0x258 [ 977.694090][ T9266] el0_svc_common.constprop.0+0xac/0x230 [ 977.694131][ T9266] do_el0_svc_compat+0x40/0x68 [ 977.694189][ T9266] el0_svc_compat+0x4c/0x184 [ 977.694235][ T9266] el0t_32_sync_handler+0x88/0xac [ 977.694342][ T9266] el0t_32_sync+0x19c/0x1a0 [ 982.698262][ T30] audit: type=1400 audit(982.230:480): avc: denied { setattr } for pid=9316 comm="syz.0.1976" name="RDS" dev="sockfs" ino=22523 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 985.135244][ T30] audit: type=1400 audit(984.660:481): avc: denied { accept } for pid=9345 comm="syz.0.1988" path="socket:[23579]" dev="sockfs" ino=23579 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 988.140831][ T30] audit: type=1400 audit(987.670:482): avc: denied { map } for pid=9384 comm="syz.0.2002" path="/dev/userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 993.909758][ T9424] FAULT_INJECTION: forcing a failure. [ 993.909758][ T9424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 993.910174][ T9424] CPU: 1 UID: 0 PID: 9424 Comm: syz.2.2012 Not tainted syzkaller #0 PREEMPT [ 993.910308][ T9424] Hardware name: linux,dummy-virt (DT) [ 993.910369][ T9424] Call trace: [ 993.910423][ T9424] show_stack+0x18/0x24 (C) [ 993.910949][ T9424] dump_stack_lvl+0xdc/0xf4 [ 993.911040][ T9424] dump_stack+0x1c/0x28 [ 993.911152][ T9424] should_fail_ex+0x5a0/0x6ac [ 993.911247][ T9424] should_fail+0x14/0x20 [ 993.911352][ T9424] should_fail_usercopy+0x1c/0x28 [ 993.911457][ T9424] _inline_copy_from_user+0x34/0x134 [ 993.911568][ T9424] get_compat_msghdr+0x90/0x118 [ 993.911681][ T9424] ___sys_sendmsg+0x184/0x19c [ 993.911788][ T9424] __sys_sendmsg+0x114/0x19c [ 993.911904][ T9424] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 993.912031][ T9424] invoke_syscall+0x6c/0x258 [ 993.912121][ T9424] el0_svc_common.constprop.0+0xac/0x230 [ 993.912235][ T9424] do_el0_svc_compat+0x40/0x68 [ 993.912372][ T9424] el0_svc_compat+0x4c/0x184 [ 993.912476][ T9424] el0t_32_sync_handler+0x88/0xac [ 993.912567][ T9424] el0t_32_sync+0x19c/0x1a0 [ 998.424622][ T30] audit: type=1326 audit(997.950:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9478 comm="syz.0.2033" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1001.142688][ T30] audit: type=1400 audit(1000.670:484): avc: denied { mount } for pid=9507 comm="syz.0.2046" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1001.227410][ T30] audit: type=1400 audit(1000.750:485): avc: denied { write } for pid=9509 comm="syz.2.2047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1001.297748][ T30] audit: type=1400 audit(1000.820:486): avc: denied { unmount } for pid=7398 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1001.851791][ T9521] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2053'. [ 1002.294840][ T30] audit: type=1400 audit(1001.820:487): avc: denied { read } for pid=9526 comm="syz.2.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1006.423842][ T30] audit: type=1400 audit(1005.950:488): avc: denied { connect } for pid=9629 comm="syz.2.2102" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1008.767881][ T30] audit: type=1400 audit(1008.290:489): avc: denied { append } for pid=9641 comm="syz.0.2106" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1008.791633][ T30] audit: type=1400 audit(1008.320:490): avc: denied { map } for pid=9641 comm="syz.0.2106" path="/dev/loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1008.802346][ T30] audit: type=1400 audit(1008.330:491): avc: denied { execute } for pid=9641 comm="syz.0.2106" path="/dev/loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1018.488955][ T7536] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 1018.742165][ T7536] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 1018.744438][ T7536] usb 1-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 1018.748629][ T7536] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 1018.750832][ T7536] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 52, changing to 9 [ 1018.754624][ T7536] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8241, setting to 1024 [ 1018.827133][ T7536] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 1018.830497][ T7536] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 1018.833140][ T7536] usb 1-1: Product: syz [ 1018.834496][ T7536] usb 1-1: Manufacturer: syz [ 1018.928542][ T7536] cdc_wdm 1-1:1.0: skipping garbage [ 1018.929075][ T7536] cdc_wdm 1-1:1.0: skipping garbage [ 1018.964662][ T7536] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 1020.656824][ T30] audit: type=1400 audit(1020.180:492): avc: denied { execute } for pid=9656 comm="syz.2.2109" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1022.635975][ T30] audit: type=1400 audit(1022.160:493): avc: denied { read write } for pid=9658 comm="syz.0.2110" name="cdc-wdm0" dev="devtmpfs" ino=1614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:modem_device_t tclass=chr_file permissive=1 [ 1022.649000][ T30] audit: type=1400 audit(1022.170:494): avc: denied { open } for pid=9658 comm="syz.0.2110" path="/dev/cdc-wdm0" dev="devtmpfs" ino=1614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:modem_device_t tclass=chr_file permissive=1 [ 1022.955688][ T10] usb 1-1: USB disconnect, device number 10 [ 1025.533390][ T30] audit: type=1400 audit(1025.060:495): avc: denied { bind } for pid=9670 comm="syz.2.2112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1026.297582][ T9674] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1026.300562][ T9674] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1036.823498][ T30] audit: type=1400 audit(1036.350:496): avc: denied { read } for pid=9697 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1043.949647][ T9719] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2127'. [ 1047.698431][ T9735] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1047.709019][ T9735] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1048.027636][ T30] audit: type=1400 audit(1047.550:497): avc: denied { connect } for pid=9737 comm="syz.2.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1048.788051][ T9745] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1048.795250][ T9745] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1048.872728][ T9747] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2136'. [ 1048.990739][ T9750] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2138'. [ 1049.530404][ T9757] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2142'. [ 1049.759314][ T30] audit: type=1400 audit(1049.290:498): avc: denied { create } for pid=9760 comm="syz.0.2144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1050.734970][ T30] audit: type=1400 audit(1050.260:499): avc: denied { read write } for pid=9760 comm="syz.0.2144" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1050.787725][ T30] audit: type=1400 audit(1050.300:500): avc: denied { open } for pid=9760 comm="syz.0.2144" path="/380/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1051.533531][ T9786] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1051.539321][ T9786] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1066.522345][ T9846] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1066.529918][ T9846] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1071.789036][ T30] audit: type=1400 audit(1071.260:501): avc: denied { setopt } for pid=9853 comm="syz.0.2182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1080.269046][ T3465] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 1080.506658][ T3465] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 1080.508715][ T3465] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1080.510741][ T3465] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 1080.512949][ T3465] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1080.557719][ T3465] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 1080.559789][ T3465] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 1080.561426][ T3465] usb 1-1: Product: syz [ 1080.563939][ T3465] usb 1-1: Manufacturer: syz [ 1080.631180][ T3465] cdc_wdm 1-1:1.0: skipping garbage [ 1080.635371][ T3465] cdc_wdm 1-1:1.0: skipping garbage [ 1080.638504][ T3465] cdc_wdm 1-1:1.0: probe with driver cdc_wdm failed with error -22 [ 1094.519255][ T8830] usb 1-1: USB disconnect, device number 11 [ 1095.658689][ T9878] nbd0: detected capacity change from 0 to 4 [ 1096.131131][ T9880] block nbd0: shutting down sockets [ 1096.137781][ C1] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.138604][ C1] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.152448][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.153246][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.154791][ T9869] nbd0: unable to read partition table [ 1096.219360][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.219733][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.231855][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.238139][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.241931][ T9869] nbd0: unable to read partition table [ 1096.280260][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.280673][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.302626][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.325872][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.342505][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.343277][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.358629][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.359280][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.363787][ T9869] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1096.384021][ T9869] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1096.689516][ T6015] usb 1-1: new full-speed USB device number 12 using dummy_hcd [ 1096.972439][ T6015] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1097.008224][ T6015] usb 1-1: not running at top speed; connect to a high speed hub [ 1097.051123][ T6015] usb 1-1: config 7 has an invalid descriptor of length 112, skipping remainder of the config [ 1097.053617][ T6015] usb 1-1: config 7 interface 0 altsetting 0 has an endpoint descriptor with address 0x9B, changing to 0x8B [ 1097.055992][ T6015] usb 1-1: config 7 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 50, changing to 4 [ 1097.060714][ T6015] usb 1-1: config 7 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 47187, setting to 1023 [ 1097.063522][ T6015] usb 1-1: config 7 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1097.139734][ T6015] usb 1-1: New USB device found, idVendor=0489, idProduct=e0b5, bcdDevice=ae.2a [ 1097.147689][ T6015] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1097.149671][ T6015] usb 1-1: Product: syz [ 1097.150710][ T6015] usb 1-1: Manufacturer: syz [ 1097.151849][ T6015] usb 1-1: SerialNumber: syz [ 1097.511304][ T6015] usb 1-1: USB disconnect, device number 12 [ 1097.959012][ T9892] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2195'. [ 1098.424041][ T30] audit: type=1400 audit(1097.950:502): avc: denied { write } for pid=9897 comm="syz.2.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1098.428539][ T30] audit: type=1400 audit(1097.950:503): avc: denied { nlmsg_write } for pid=9897 comm="syz.2.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1100.762504][ T30] audit: type=1400 audit(1100.280:504): avc: denied { bind } for pid=9923 comm="syz.2.2208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1100.767019][ T30] audit: type=1400 audit(1100.290:505): avc: denied { name_bind } for pid=9923 comm="syz.2.2208" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1100.787599][ T30] audit: type=1400 audit(1100.290:506): avc: denied { node_bind } for pid=9923 comm="syz.2.2208" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1101.598314][ T30] audit: type=1400 audit(1101.120:507): avc: denied { getopt } for pid=9931 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1102.878792][ T9941] netlink: 88 bytes leftover after parsing attributes in process `syz.2.2214'. [ 1102.975837][ T6015] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 1103.082955][ T30] audit: type=1400 audit(1102.610:508): avc: denied { setopt } for pid=9943 comm="syz.2.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1103.191804][ T6015] usb 1-1: Using ep0 maxpacket: 8 [ 1103.240047][ T6015] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1103.240330][ T6015] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1103.240512][ T6015] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 1103.240887][ T6015] usb 1-1: New USB device found, idVendor=046d, idProduct=c293, bcdDevice= 0.00 [ 1103.240998][ T6015] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1103.272989][ T6015] usb 1-1: config 0 descriptor?? [ 1103.816813][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.817545][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.817981][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.818328][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.818626][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.818834][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.819060][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.819266][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.819478][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.819684][ T6015] hid-generic 0003:046D:C293.0001: unknown main item tag 0x0 [ 1103.841314][ T6015] hid-generic 0003:046D:C293.0001: hidraw0: USB HID v0.00 Device [HID 046d:c293] on usb-dummy_hcd.0-1/input0 [ 1104.004745][ T3406] usb 1-1: USB disconnect, device number 13 [ 1104.701570][ T9947] fido_id[9947]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 1110.194453][ T9967] netlink: 2064 bytes leftover after parsing attributes in process `syz.2.2223'. [ 1114.554064][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 1123.547476][T10005] netdevsim netdevsim2 netdevsim2: entered allmulticast mode [ 1126.135233][T10011] binder: 10008:10011 ioctl c0306201 0 returned -14 [ 1136.302482][T10029] batadv_slave_1: entered allmulticast mode [ 1145.554420][ T30] audit: type=1400 audit(1145.080:509): avc: denied { setopt } for pid=10051 comm="syz.2.2251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1145.570597][T10052] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2251'. [ 1146.050308][T10058] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1146.051837][T10058] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1146.058298][ T30] audit: type=1400 audit(1145.580:510): avc: denied { write } for pid=10057 comm="syz.2.2254" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1148.258988][ T10] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 1148.429051][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 1148.460568][ T10] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1148.467560][ T10] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1148.505267][ T10] usb 1-1: New USB device found, idVendor=05ac, idProduct=020f, bcdDevice= 0.22 [ 1148.511181][ T10] usb 1-1: New USB device strings: Mfr=1, Product=130, SerialNumber=131 [ 1148.513121][ T10] usb 1-1: Product: syz [ 1148.514265][ T10] usb 1-1: Manufacturer: syz [ 1148.515790][ T10] usb 1-1: SerialNumber: syz [ 1148.733271][ T30] audit: type=1400 audit(1148.260:511): avc: denied { execute } for pid=10072 comm="syz.2.2260" dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1148.755166][T10073] process 'syz.2.2260' launched '/dev/fd/3' with NULL argv: empty string added [ 1148.761135][ T30] audit: type=1400 audit(1148.290:512): avc: denied { execute_no_trans } for pid=10072 comm="syz.2.2260" path=2F6D656D66643A5B0BDB58AE5B35A990FF631F1AA9FDFAADD16D64E7E27F9BD55210F3B6FF54BFD1C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1148.850615][ T10] usb 1-1: USB disconnect, device number 14 [ 1149.357663][T10081] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1149.365096][T10081] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1149.542501][T10085] input: syz1 as /devices/virtual/input/input6 [ 1150.232937][T10096] input: syz0 as /devices/virtual/input/input7 [ 1168.021895][ T30] audit: type=1400 audit(1167.550:513): avc: denied { read write } for pid=10127 comm="syz.0.2281" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1168.024737][ T30] audit: type=1400 audit(1167.550:514): avc: denied { open } for pid=10127 comm="syz.0.2281" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1168.037790][ T30] audit: type=1400 audit(1167.560:515): avc: denied { ioctl } for pid=10127 comm="syz.0.2281" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1168.920536][T10138] syzkaller0: entered promiscuous mode [ 1168.921266][T10138] syzkaller0: entered allmulticast mode [ 1169.300398][ T30] audit: type=1400 audit(1168.830:516): avc: denied { append } for pid=10142 comm="syz.0.2288" name="ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1177.159080][ T30] audit: type=1400 audit(1176.680:517): avc: denied { create } for pid=10161 comm="syz.2.2296" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1177.871198][ T30] audit: type=1400 audit(1177.390:518): avc: denied { create } for pid=10155 comm="syz.0.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1177.884249][ T30] audit: type=1400 audit(1177.410:519): avc: denied { write } for pid=10155 comm="syz.0.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1189.115185][ T30] audit: type=1400 audit(1188.630:520): avc: denied { unlink } for pid=8025 comm="syz-executor" name="file0" dev="tmpfs" ino=2047 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1192.432138][T10281] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2313'. [ 1206.418633][T10302] nbd2: detected capacity change from 0 to 4 [ 1208.799043][ T49] block nbd2: Receive control failed (result -104) [ 1216.796724][ T30] audit: type=1400 audit(1216.320:521): avc: denied { read } for pid=10326 comm="syz.0.2330" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1216.799856][ T30] audit: type=1400 audit(1216.330:522): avc: denied { open } for pid=10326 comm="syz.0.2330" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1216.804270][ T30] audit: type=1400 audit(1216.330:523): avc: denied { ioctl } for pid=10326 comm="syz.0.2330" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1236.793002][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 30 seconds [ 1247.407902][ T7536] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 1247.588260][ T7536] usb 1-1: Using ep0 maxpacket: 16 [ 1247.614390][ T7536] usb 1-1: config index 0 descriptor too short (expected 16456, got 72) [ 1247.614976][ T7536] usb 1-1: config 0 has an invalid interface number: 125 but max is 1 [ 1247.615734][ T7536] usb 1-1: config 0 has an invalid interface number: 125 but max is 1 [ 1247.620025][ T7536] usb 1-1: config 0 has an invalid interface number: 125 but max is 1 [ 1247.620438][ T7536] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 1247.620625][ T7536] usb 1-1: config 0 has no interface number 0 [ 1247.620913][ T7536] usb 1-1: config 0 interface 125 altsetting 4 endpoint 0x4 has invalid maxpacket 21760, setting to 64 [ 1247.621077][ T7536] usb 1-1: config 0 interface 125 altsetting 4 endpoint 0xB has invalid wMaxPacketSize 0 [ 1247.621221][ T7536] usb 1-1: config 0 interface 125 altsetting 4 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1247.621555][ T7536] usb 1-1: config 0 interface 125 altsetting 1 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1247.621690][ T7536] usb 1-1: config 0 interface 125 has no altsetting 2 [ 1247.654915][ T7536] usb 1-1: New USB device found, idVendor=050d, idProduct=0002, bcdDevice=23.27 [ 1247.655361][ T7536] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1247.659569][ T7536] usb 1-1: Product: syz [ 1247.661415][ T7536] usb 1-1: Manufacturer: syz [ 1247.662791][ T7536] usb 1-1: SerialNumber: syz [ 1247.691298][ T7536] usb 1-1: config 0 descriptor?? [ 1247.719926][ T7536] usb 1-1: selecting invalid altsetting 2 [ 1256.429417][T10356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1256.452464][T10356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1258.004686][ T3465] usb 1-1: USB disconnect, device number 15 [ 1258.754565][T10356] hsr_slave_0: entered promiscuous mode [ 1258.772436][T10356] hsr_slave_1: entered promiscuous mode [ 1258.774571][T10356] debugfs: 'hsr0' already exists in 'hsr' [ 1258.787914][T10356] Cannot create hsr debugfs directory [ 1259.830828][T10356] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1259.861426][T10356] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1259.913629][T10356] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1259.958378][ T30] audit: type=1400 audit(1259.480:524): avc: denied { read } for pid=10390 comm="syz.0.2343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1259.959528][T10356] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1261.722094][T10356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1266.873810][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 60 seconds [ 1268.832813][T10356] veth0_vlan: entered promiscuous mode [ 1268.891927][T10356] veth1_vlan: entered promiscuous mode [ 1269.070988][T10356] veth0_macvtap: entered promiscuous mode [ 1269.133585][T10356] veth1_macvtap: entered promiscuous mode [ 1269.528594][T10209] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1269.532798][T10209] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1269.534152][T10209] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1269.558712][T10227] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.150886][T10451] autofs4:pid:10451:validate_dev_ioctl: invalid path supplied for cmd(0xc018937a) [ 1279.909753][ T30] audit: type=1400 audit(1279.440:525): avc: denied { name_bind } for pid=10472 comm="syz.3.2359" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1280.773285][ T30] audit: type=1400 audit(1280.300:526): avc: denied { name_bind } for pid=10479 comm="syz.3.2362" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1296.951143][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 90 seconds [ 1297.366053][T10522] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2379'. [ 1299.316856][ T30] audit: type=1400 audit(1298.840:527): avc: denied { mounton } for pid=10532 comm="syz.0.2384" path="/proc/1140/task" dev="proc" ino=27385 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1300.385932][T10549] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2391'. [ 1301.803080][ T30] audit: type=1400 audit(1301.330:528): avc: denied { create } for pid=10566 comm="syz.3.2398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1302.625370][ T30] audit: type=1326 audit(1302.150:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1302.628020][ T30] audit: type=1326 audit(1302.150:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1302.631016][ T30] audit: type=1326 audit(1302.160:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1302.651619][ T30] audit: type=1326 audit(1302.180:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1302.655638][ T30] audit: type=1326 audit(1302.180:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1302.665425][ T30] audit: type=1326 audit(1302.190:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1302.675540][ T30] audit: type=1326 audit(1302.200:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10575 comm="syz.3.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1308.751434][ T30] audit: type=1400 audit(1308.280:536): avc: denied { unmount } for pid=10356 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1313.252206][T10617] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1313.253761][T10617] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1320.687943][ T30] audit: type=1400 audit(1320.220:537): avc: denied { set_context_mgr } for pid=10641 comm="syz.3.2431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1320.708280][T10642] binder: 10641:10642 BC_CLEAR_FREEZE_NOTIFICATION freeze notification cookie mismatch 0000000000000000 != 000000000000756d [ 1320.709657][T10642] binder: 10641:10642 ioctl c0306201 20000380 returned -22 [ 1323.868573][ T3465] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 1324.027664][ T3465] usb 1-1: Using ep0 maxpacket: 8 [ 1324.073815][ T3465] usb 1-1: New USB device found, idVendor=110a, idProduct=1450, bcdDevice=62.cb [ 1324.075841][ T3465] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1324.081003][ T3465] usb 1-1: Product: syz [ 1324.083369][ T3465] usb 1-1: Manufacturer: syz [ 1324.085621][ T3465] usb 1-1: SerialNumber: syz [ 1324.652727][ T3465] mxuport 1-1:254.0: mxuport_recv_ctrl_urb - usb_control_msg failed (-71) [ 1324.655318][ T3465] mxuport 1-1:254.0: probe with driver mxuport failed with error -5 [ 1324.689455][ T3465] usb 1-1: USB disconnect, device number 16 [ 1327.039483][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 120 seconds [ 1337.839857][ T30] audit: type=1400 audit(1337.370:538): avc: denied { connect } for pid=10685 comm="syz.3.2451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1337.843809][ T30] audit: type=1400 audit(1337.370:539): avc: denied { bind } for pid=10685 comm="syz.3.2451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1345.468767][ T8364] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 1345.682779][ T8364] usb 1-1: Using ep0 maxpacket: 8 [ 1345.775852][ T8364] usb 1-1: New USB device found, idVendor=0c45, idProduct=613a, bcdDevice=c4.6d [ 1345.776867][ T8364] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1345.777202][ T8364] usb 1-1: Product: syz [ 1345.777368][ T8364] usb 1-1: Manufacturer: syz [ 1345.777522][ T8364] usb 1-1: SerialNumber: syz [ 1345.819022][ T8364] usb 1-1: config 0 descriptor?? [ 1348.447746][T10723] infiniband syz!: set down [ 1348.448224][T10723] infiniband syz!: added team_slave_0 [ 1348.567800][T10723] RDS/IB: syz!: added [ 1348.568876][T10723] smc: adding ib device syz! with port count 1 [ 1348.569533][T10723] smc: ib device syz! port 1 has pnetid [ 1355.653752][T10732] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1355.659916][T10732] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1356.132455][ T3406] usb 1-1: USB disconnect, device number 17 [ 1356.149844][T10736] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1356.154786][T10736] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1357.108340][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 150 seconds [ 1357.993965][T10750] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2478'. [ 1359.668338][T10761] PKCS8: Unsupported PKCS#8 version [ 1363.904487][T10768] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1372.184736][T10787] binder: 10786:10787 ioctl 4018620d 0 returned -22 [ 1372.211892][T10787] binder: 10786:10787 ioctl c0306201 0 returned -14 [ 1373.689048][ T30] audit: type=1400 audit(1373.210:540): avc: denied { setopt } for pid=10788 comm="syz.3.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1373.850431][T10800] Failed to initialize the IGMP autojoin socket (err -2) [ 1387.199110][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 180 seconds [ 1388.346584][T10831] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2508'. [ 1393.149770][T10850] input: syz1 as /devices/virtual/input/input9 [ 1402.103765][T10872] input: syz0 as /devices/virtual/input/input10 [ 1404.554616][T10874] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2524'. [ 1404.684215][ T30] audit: type=1400 audit(1404.210:541): avc: denied { map } for pid=10875 comm="syz.3.2525" path="socket:[27963]" dev="sockfs" ino=27963 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1404.688504][ T30] audit: type=1400 audit(1404.210:542): avc: denied { read accept } for pid=10875 comm="syz.3.2525" path="socket:[27963]" dev="sockfs" ino=27963 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1406.677482][T10878] trusted_key: encrypted_key: insufficient parameters specified [ 1416.570953][T10897] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1416.575530][T10897] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1417.271537][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 210 seconds [ 1422.503900][T10908] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1422.510857][T10908] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1424.721902][T10913] netlink: 32 bytes leftover after parsing attributes in process `syz.3.2539'. [ 1428.207448][T10926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1428.209970][T10926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1433.497870][ T6015] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 1433.824450][ T6015] usb 1-1: config 17 has an invalid descriptor of length 0, skipping remainder of the config [ 1433.825427][ T6015] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 1433.825561][ T6015] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1434.224580][ T6015] usb 1-1: USB disconnect, device number 18 [ 1436.548895][ T10] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 1436.758610][ T10] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 1436.762079][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1436.781878][ T10] usb 1-1: config 0 descriptor?? [ 1436.815687][ T10] cp210x 1-1:0.0: cp210x converter detected [ 1437.273810][ T10] usb 1-1: cp210x converter now attached to ttyUSB0 [ 1437.289083][ T10] usb 1-1: USB disconnect, device number 19 [ 1437.329349][ T10] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 1437.371253][ T10] cp210x 1-1:0.0: device disconnected [ 1440.057893][ T7536] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 1440.227447][ T7536] usb 1-1: Using ep0 maxpacket: 16 [ 1440.250133][ T7536] usb 1-1: config 1 interface 0 altsetting 12 bulk endpoint 0x82 has invalid maxpacket 32 [ 1440.250632][ T7536] usb 1-1: config 1 interface 0 altsetting 12 bulk endpoint 0x3 has invalid maxpacket 1023 [ 1440.253272][ T7536] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1440.279275][ T7536] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1440.279714][ T7536] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1440.282562][ T7536] usb 1-1: Product: syz [ 1440.283200][ T7536] usb 1-1: Manufacturer: syz [ 1440.283365][ T7536] usb 1-1: SerialNumber: syz [ 1440.311396][T10990] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1440.320654][T10990] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1440.603997][ T7536] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1441.657812][ T7536] usb 1-1: USB disconnect, device number 20 [ 1442.332114][T10227] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1442.493031][T10227] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1442.770848][T10227] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1442.955148][T10227] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1444.562720][T10227] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1444.629794][T10227] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1444.705101][T10227] bond0 (unregistering): Released all slaves [ 1444.825530][T10227] bond1 (unregistering): Released all slaves [ 1445.607846][T10996] Failed to initialize the IGMP autojoin socket (err -2) [ 1445.898410][T10227] hsr_slave_0: left promiscuous mode [ 1445.902327][T10227] hsr_slave_1: left promiscuous mode [ 1445.932759][T10227] veth1_macvtap: left promiscuous mode [ 1445.933925][T10227] veth0_macvtap: left promiscuous mode [ 1445.938802][T10227] veth1_vlan: left promiscuous mode [ 1445.944103][T10227] veth0_vlan: left promiscuous mode [ 1447.363444][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 240 seconds [ 1447.922104][T11016] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2582'. [ 1451.231001][T10996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1451.282095][T10996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1451.760193][ T30] audit: type=1400 audit(1451.190:543): avc: denied { create } for pid=11036 comm="syz.3.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1451.872316][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1451.874781][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1451.875192][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1451.875487][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1451.875866][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1452.137774][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1452.139713][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1452.143299][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1452.172513][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1452.189301][T11046] netlink: 'syz.3.2588': attribute type 3 has an invalid length. [ 1455.011172][T10996] hsr_slave_0: entered promiscuous mode [ 1455.031406][T10996] hsr_slave_1: entered promiscuous mode [ 1455.053800][T10996] debugfs: 'hsr0' already exists in 'hsr' [ 1455.054572][T10996] Cannot create hsr debugfs directory [ 1457.103386][T10996] netdevsim netdevsim0 netdevsim0: renamed from eth5 [ 1457.193637][T10996] netdevsim netdevsim0 netdevsim1: renamed from eth6 [ 1457.303282][T10996] netdevsim netdevsim0 netdevsim2: renamed from eth7 [ 1457.372405][T10996] netdevsim netdevsim0 netdevsim3: renamed from eth8 [ 1457.420534][ T30] audit: type=1400 audit(1456.950:544): avc: denied { write } for pid=11056 comm="syz.3.2589" path="socket:[28296]" dev="sockfs" ino=28296 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1468.023072][ T30] audit: type=1400 audit(1467.540:545): avc: denied { write } for pid=11119 comm="syz.3.2595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1468.982873][T10996] veth0_vlan: entered promiscuous mode [ 1469.098673][T10996] veth1_vlan: entered promiscuous mode [ 1469.449833][T10996] veth0_macvtap: entered promiscuous mode [ 1469.473661][T10996] veth1_macvtap: entered promiscuous mode [ 1469.832967][T10996] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 1469.959861][T10996] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 1469.990173][T10996] wireguard: wg0: Could not create IPv4 socket [ 1470.029216][T10996] wireguard: wg1: Could not create IPv4 socket [ 1470.235396][T10996] wireguard: wg2: Could not create IPv4 socket [ 1471.459194][T10556] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 1471.688950][T10556] usb 1-1: Using ep0 maxpacket: 32 [ 1471.738161][T10556] usb 1-1: config 0 has an invalid interface number: 184 but max is 0 [ 1471.738945][T10556] usb 1-1: config 0 has no interface number 0 [ 1471.739200][T10556] usb 1-1: config 0 interface 184 has no altsetting 0 [ 1471.784976][T10556] usb 1-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 1471.785567][T10556] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1471.789293][T10556] usb 1-1: Product: syz [ 1471.789979][T10556] usb 1-1: Manufacturer: syz [ 1471.790138][T10556] usb 1-1: SerialNumber: syz [ 1471.860503][T10556] usb 1-1: config 0 descriptor?? [ 1472.011166][T10556] smsc75xx v1.0.0 [ 1473.093578][T10556] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): EEPROM read operation timeout [ 1473.347237][T10556] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1473.347869][T10556] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 1473.348253][T10556] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_reset [ 1473.348537][T10556] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): smsc75xx_reset error -71 [ 1473.350349][T10556] smsc75xx 1-1:0.184: probe with driver smsc75xx failed with error -71 [ 1473.391647][T10556] usb 1-1: USB disconnect, device number 21 [ 1474.448194][T11153] lo speed is unknown, defaulting to 1000 [ 1474.451647][T11153] lo speed is unknown, defaulting to 1000 [ 1474.456943][T11153] lo speed is unknown, defaulting to 1000 [ 1474.497946][T11153] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1474.632841][T11153] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -2 [ 1474.933721][T11153] lo speed is unknown, defaulting to 1000 [ 1474.983484][T11153] lo speed is unknown, defaulting to 1000 [ 1477.430036][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 270 seconds [ 1487.922837][ T30] audit: type=1400 audit(1487.450:546): avc: denied { bind } for pid=11204 comm="syz.0.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1488.576054][T11207] input: syz0 as /devices/virtual/input/input17 [ 1500.565783][T11229] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2625'. [ 1500.793103][T11231] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2626'. [ 1501.071647][T11233] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1501.085468][T11233] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1504.345245][T11245] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2632'. [ 1507.509028][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 300 seconds [ 1510.480730][ T30] audit: type=1326 audit(1510.010:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1510.482718][ T30] audit: type=1326 audit(1510.010:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1510.495832][ T30] audit: type=1326 audit(1510.020:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1510.511050][ T30] audit: type=1326 audit(1510.040:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1510.512409][ T30] audit: type=1326 audit(1510.040:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1510.514954][ T30] audit: type=1326 audit(1510.040:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1510.516615][ T30] audit: type=1326 audit(1510.040:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1510.530664][ T30] audit: type=1326 audit(1510.060:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1510.532678][ T30] audit: type=1326 audit(1510.060:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1510.534119][ T30] audit: type=1326 audit(1510.060:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11250 comm="syz.3.2634" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1516.623033][T11257] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2635'. [ 1517.111411][T11265] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1517.114019][T11265] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1517.332544][T11267] input: syz0 as /devices/virtual/input/input18 [ 1532.698501][T11289] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2648'. [ 1533.120947][T11291] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2649'. [ 1537.591772][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 330 seconds [ 1537.678214][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 1537.680364][ T30] audit: type=1400 audit(1537.200:572): avc: denied { setopt } for pid=11308 comm="syz.0.2657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1538.390116][T11313] binder: 11312:11313 ioctl c0306201 20000080 returned -14 [ 1538.401889][ T30] audit: type=1400 audit(1537.930:573): avc: denied { write } for pid=11312 comm="syz.0.2659" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1538.402134][T11313] binder: 11312:11313 tried to acquire reference to desc 0, got 1 instead [ 1538.409732][T11313] binder: 11312:11313 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 1538.411232][T11313] binder: 11312:11313 unknown command 0 [ 1538.411952][T11313] binder: 11312:11313 ioctl c0306201 20000180 returned -22 [ 1539.110186][T11319] syzkaller0: entered promiscuous mode [ 1539.110841][T11319] syzkaller0: entered allmulticast mode [ 1551.434320][ T30] audit: type=1326 audit(1550.960:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1551.444623][ T30] audit: type=1326 audit(1550.970:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1551.445039][ T30] audit: type=1326 audit(1550.970:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1551.445233][ T30] audit: type=1326 audit(1550.970:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=174 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1551.445353][ T30] audit: type=1326 audit(1550.970:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 1551.445533][ T30] audit: type=1326 audit(1550.970:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11356 comm="syz.3.2671" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 1562.861795][T11481] input: syz0 as /devices/virtual/input/input21 [ 1567.682854][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 360 seconds [ 1579.330810][T11606] FAULT_INJECTION: forcing a failure. [ 1579.330810][T11606] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1579.332597][T11606] CPU: 1 UID: 0 PID: 11606 Comm: syz.0.2773 Not tainted syzkaller #0 PREEMPT [ 1579.332711][T11606] Hardware name: linux,dummy-virt (DT) [ 1579.332743][T11606] Call trace: [ 1579.332804][T11606] show_stack+0x18/0x24 (C) [ 1579.332899][T11606] dump_stack_lvl+0xdc/0xf4 [ 1579.332952][T11606] dump_stack+0x1c/0x28 [ 1579.333029][T11606] should_fail_ex+0x5a0/0x6ac [ 1579.333121][T11606] should_fail+0x14/0x20 [ 1579.333236][T11606] should_fail_usercopy+0x1c/0x28 [ 1579.333319][T11606] _inline_copy_from_user+0x34/0x134 [ 1579.333378][T11606] get_compat_msghdr+0x90/0x118 [ 1579.333427][T11606] ___sys_sendmsg+0x184/0x19c [ 1579.333471][T11606] __sys_sendmsg+0x114/0x19c [ 1579.333523][T11606] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1579.333596][T11606] invoke_syscall+0x6c/0x258 [ 1579.333683][T11606] el0_svc_common.constprop.0+0xac/0x230 [ 1579.333726][T11606] do_el0_svc_compat+0x40/0x68 [ 1579.333782][T11606] el0_svc_compat+0x4c/0x184 [ 1579.333855][T11606] el0t_32_sync_handler+0x88/0xac [ 1579.333896][T11606] el0t_32_sync+0x19c/0x1a0 [ 1583.611583][ T30] audit: type=1326 audit(1583.140:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1584.170001][ T30] audit: type=1326 audit(1583.700:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1584.729937][ T30] audit: type=1326 audit(1584.260:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1585.254297][ T30] audit: type=1326 audit(1584.780:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1585.780521][ T30] audit: type=1326 audit(1585.310:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1586.331025][ T30] audit: type=1326 audit(1585.860:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1586.874603][ T30] audit: type=1326 audit(1586.400:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1587.452397][ T30] audit: type=1326 audit(1586.980:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1587.989882][ T30] audit: type=1326 audit(1587.520:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1588.519331][ T30] audit: type=1326 audit(1588.050:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1588.915343][ T30] audit: type=1400 audit(1588.440:590): avc: denied { ioctl } for pid=11646 comm="syz.3.2788" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1589.045471][ T30] audit: type=1326 audit(1588.570:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1589.143767][ T30] audit: type=1400 audit(1588.670:592): avc: denied { map } for pid=11648 comm="syz.3.2789" path="socket:[30272]" dev="sockfs" ino=30272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1589.151047][ T30] audit: type=1400 audit(1588.670:593): avc: denied { read accept } for pid=11648 comm="syz.3.2789" path="socket:[30272]" dev="sockfs" ino=30272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1589.555102][ T30] audit: type=1326 audit(1589.080:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1590.099157][ T30] audit: type=1326 audit(1589.620:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1590.606034][ T30] audit: type=1326 audit(1590.130:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1591.135412][ T30] audit: type=1326 audit(1590.640:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1591.628803][ T30] audit: type=1326 audit(1591.160:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1592.170824][ T30] audit: type=1326 audit(1591.700:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11627 comm="syz.0.2783" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 1594.701493][T11697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11697 comm=syz.3.2807 [ 1595.073742][T11703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11703 comm=syz.0.2810 [ 1595.472897][T11709] FAULT_INJECTION: forcing a failure. [ 1595.472897][T11709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1595.475642][T11709] CPU: 1 UID: 0 PID: 11709 Comm: syz.3.2813 Not tainted syzkaller #0 PREEMPT [ 1595.475799][T11709] Hardware name: linux,dummy-virt (DT) [ 1595.475854][T11709] Call trace: [ 1595.475930][T11709] show_stack+0x18/0x24 (C) [ 1595.476103][T11709] dump_stack_lvl+0xdc/0xf4 [ 1595.476220][T11709] dump_stack+0x1c/0x28 [ 1595.476345][T11709] should_fail_ex+0x5a0/0x6ac [ 1595.476433][T11709] should_fail+0x14/0x20 [ 1595.476510][T11709] should_fail_usercopy+0x1c/0x28 [ 1595.476585][T11709] _inline_copy_from_user+0x34/0x134 [ 1595.476688][T11709] get_compat_msghdr+0x90/0x118 [ 1595.476770][T11709] ___sys_sendmsg+0x184/0x19c [ 1595.476851][T11709] __sys_sendmsg+0x114/0x19c [ 1595.476937][T11709] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1595.477021][T11709] invoke_syscall+0x6c/0x258 [ 1595.477107][T11709] el0_svc_common.constprop.0+0xac/0x230 [ 1595.477240][T11709] do_el0_svc_compat+0x40/0x68 [ 1595.477332][T11709] el0_svc_compat+0x4c/0x184 [ 1595.477416][T11709] el0t_32_sync_handler+0x88/0xac [ 1595.477501][T11709] el0t_32_sync+0x19c/0x1a0 [ 1595.755856][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1595.760632][ T30] audit: type=1400 audit(1595.280:602): avc: denied { lock } for pid=11712 comm="syz.3.2815" path="socket:[31531]" dev="sockfs" ino=31531 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1596.040754][T11717] FAULT_INJECTION: forcing a failure. [ 1596.040754][T11717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1596.044371][T11717] CPU: 1 UID: 0 PID: 11717 Comm: syz.3.2817 Not tainted syzkaller #0 PREEMPT [ 1596.044577][T11717] Hardware name: linux,dummy-virt (DT) [ 1596.044631][T11717] Call trace: [ 1596.044679][T11717] show_stack+0x18/0x24 (C) [ 1596.044819][T11717] dump_stack_lvl+0xdc/0xf4 [ 1596.044925][T11717] dump_stack+0x1c/0x28 [ 1596.045008][T11717] should_fail_ex+0x5a0/0x6ac [ 1596.045092][T11717] should_fail+0x14/0x20 [ 1596.045203][T11717] should_fail_usercopy+0x1c/0x28 [ 1596.045285][T11717] _inline_copy_from_user+0x34/0x134 [ 1596.045374][T11717] get_compat_msghdr+0x90/0x118 [ 1596.045469][T11717] ___sys_sendmsg+0x184/0x19c [ 1596.045557][T11717] __sys_sendmsg+0x114/0x19c [ 1596.045630][T11717] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1596.045712][T11717] invoke_syscall+0x6c/0x258 [ 1596.045802][T11717] el0_svc_common.constprop.0+0xac/0x230 [ 1596.045880][T11717] do_el0_svc_compat+0x40/0x68 [ 1596.045957][T11717] el0_svc_compat+0x4c/0x184 [ 1596.046044][T11717] el0t_32_sync_handler+0x88/0xac [ 1596.046158][T11717] el0t_32_sync+0x19c/0x1a0 [ 1597.185689][T11728] FAULT_INJECTION: forcing a failure. [ 1597.185689][T11728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1597.187348][T11728] CPU: 0 UID: 0 PID: 11728 Comm: syz.3.2822 Not tainted syzkaller #0 PREEMPT [ 1597.187503][T11728] Hardware name: linux,dummy-virt (DT) [ 1597.187562][T11728] Call trace: [ 1597.187616][T11728] show_stack+0x18/0x24 (C) [ 1597.187776][T11728] dump_stack_lvl+0xdc/0xf4 [ 1597.187883][T11728] dump_stack+0x1c/0x28 [ 1597.187974][T11728] should_fail_ex+0x5a0/0x6ac [ 1597.188068][T11728] should_fail+0x14/0x20 [ 1597.188155][T11728] should_fail_usercopy+0x1c/0x28 [ 1597.188240][T11728] _inline_copy_from_user+0x34/0x134 [ 1597.188338][T11728] get_compat_msghdr+0x90/0x118 [ 1597.188436][T11728] ___sys_sendmsg+0x184/0x19c [ 1597.188531][T11728] __sys_sendmsg+0x114/0x19c [ 1597.188617][T11728] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1597.188743][T11728] invoke_syscall+0x6c/0x258 [ 1597.188840][T11728] el0_svc_common.constprop.0+0xac/0x230 [ 1597.188931][T11728] do_el0_svc_compat+0x40/0x68 [ 1597.189018][T11728] el0_svc_compat+0x4c/0x184 [ 1597.189211][T11728] el0t_32_sync_handler+0x88/0xac [ 1597.189303][T11728] el0t_32_sync+0x19c/0x1a0 [ 1597.540832][ T49] block nbd0: Receive control failed (result -32) [ 1597.541745][T11703] block nbd0: shutting down sockets [ 1597.748888][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 390 seconds [ 1600.143915][T11753] FAULT_INJECTION: forcing a failure. [ 1600.143915][T11753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1600.148891][T11753] CPU: 0 UID: 0 PID: 11753 Comm: syz.3.2828 Not tainted syzkaller #0 PREEMPT [ 1600.149136][T11753] Hardware name: linux,dummy-virt (DT) [ 1600.149229][T11753] Call trace: [ 1600.149274][T11753] show_stack+0x18/0x24 (C) [ 1600.149422][T11753] dump_stack_lvl+0xdc/0xf4 [ 1600.149515][T11753] dump_stack+0x1c/0x28 [ 1600.149603][T11753] should_fail_ex+0x5a0/0x6ac [ 1600.149695][T11753] should_fail+0x14/0x20 [ 1600.149779][T11753] should_fail_usercopy+0x1c/0x28 [ 1600.149863][T11753] simple_read_from_buffer+0x84/0x214 [ 1600.149952][T11753] proc_fail_nth_read+0x160/0x21c [ 1600.150046][T11753] vfs_read+0x18c/0xa28 [ 1600.150133][T11753] ksys_read+0xec/0x1d8 [ 1600.150218][T11753] __arm64_sys_read+0x6c/0x9c [ 1600.150295][T11753] invoke_syscall+0x6c/0x258 [ 1600.150379][T11753] el0_svc_common.constprop.0+0xac/0x230 [ 1600.150465][T11753] do_el0_svc_compat+0x40/0x68 [ 1600.150546][T11753] el0_svc_compat+0x4c/0x184 [ 1600.150624][T11753] el0t_32_sync_handler+0x88/0xac [ 1600.150718][T11753] el0t_32_sync+0x19c/0x1a0 [ 1601.788136][T11768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11768 comm=syz.0.2833 [ 1601.980627][T11770] FAULT_INJECTION: forcing a failure. [ 1601.980627][T11770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1601.981457][T11770] CPU: 1 UID: 0 PID: 11770 Comm: syz.0.2834 Not tainted syzkaller #0 PREEMPT [ 1601.981641][T11770] Hardware name: linux,dummy-virt (DT) [ 1601.981738][T11770] Call trace: [ 1601.981790][T11770] show_stack+0x18/0x24 (C) [ 1601.981940][T11770] dump_stack_lvl+0xdc/0xf4 [ 1601.982046][T11770] dump_stack+0x1c/0x28 [ 1601.982132][T11770] should_fail_ex+0x5a0/0x6ac [ 1601.982220][T11770] should_fail+0x14/0x20 [ 1601.982372][T11770] should_fail_usercopy+0x1c/0x28 [ 1601.982469][T11770] _copy_from_iter+0x178/0xfec [ 1601.982568][T11770] copy_page_from_iter+0x12c/0x19c [ 1601.982670][T11770] anon_pipe_write+0x7b4/0x12bc [ 1601.982765][T11770] vfs_write+0x7bc/0xb88 [ 1601.982852][T11770] ksys_write+0x18c/0x1d8 [ 1601.982937][T11770] __arm64_sys_write+0x6c/0x9c [ 1601.983022][T11770] invoke_syscall+0x6c/0x258 [ 1601.983139][T11770] el0_svc_common.constprop.0+0xac/0x230 [ 1601.983230][T11770] do_el0_svc_compat+0x40/0x68 [ 1601.983314][T11770] el0_svc_compat+0x4c/0x184 [ 1601.983402][T11770] el0t_32_sync_handler+0x88/0xac [ 1601.983599][T11770] el0t_32_sync+0x19c/0x1a0 [ 1604.925880][T11799] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11799 comm=syz.3.2846 [ 1605.053551][T11803] FAULT_INJECTION: forcing a failure. [ 1605.053551][T11803] name failslab, interval 1, probability 0, space 0, times 0 [ 1605.057756][T11803] CPU: 0 UID: 0 PID: 11803 Comm: syz.0.2848 Not tainted syzkaller #0 PREEMPT [ 1605.057932][T11803] Hardware name: linux,dummy-virt (DT) [ 1605.057988][T11803] Call trace: [ 1605.058027][T11803] show_stack+0x18/0x24 (C) [ 1605.058161][T11803] dump_stack_lvl+0xdc/0xf4 [ 1605.058247][T11803] dump_stack+0x1c/0x28 [ 1605.058320][T11803] should_fail_ex+0x5a0/0x6ac [ 1605.058396][T11803] should_failslab+0xbc/0x11c [ 1605.058488][T11803] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 [ 1605.058565][T11803] sock_alloc_inode+0x24/0x170 [ 1605.058652][T11803] alloc_inode+0x58/0x1b4 [ 1605.058738][T11803] sock_alloc+0x3c/0x238 [ 1605.058812][T11803] __sock_create+0xb8/0x634 [ 1605.058948][T11803] __sys_socket+0x11c/0x1cc [ 1605.059065][T11803] __arm64_sys_socket+0x6c/0xa0 [ 1605.059145][T11803] invoke_syscall+0x6c/0x258 [ 1605.059221][T11803] el0_svc_common.constprop.0+0xac/0x230 [ 1605.059294][T11803] do_el0_svc_compat+0x40/0x68 [ 1605.059372][T11803] el0_svc_compat+0x4c/0x184 [ 1605.059456][T11803] el0t_32_sync_handler+0x88/0xac [ 1605.059565][T11803] el0t_32_sync+0x19c/0x1a0 [ 1605.091107][T11803] socket: no more sockets [ 1606.075005][T11816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11816 comm=syz.3.2854 [ 1606.710957][T11828] FAULT_INJECTION: forcing a failure. [ 1606.710957][T11828] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.713762][T11828] CPU: 0 UID: 0 PID: 11828 Comm: syz.0.2859 Not tainted syzkaller #0 PREEMPT [ 1606.713845][T11828] Hardware name: linux,dummy-virt (DT) [ 1606.713902][T11828] Call trace: [ 1606.713925][T11828] show_stack+0x18/0x24 (C) [ 1606.714005][T11828] dump_stack_lvl+0xdc/0xf4 [ 1606.714054][T11828] dump_stack+0x1c/0x28 [ 1606.714092][T11828] should_fail_ex+0x5a0/0x6ac [ 1606.714131][T11828] should_failslab+0xbc/0x11c [ 1606.714205][T11828] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1606.714297][T11828] security_inode_alloc+0x28/0x1f4 [ 1606.714381][T11828] inode_init_always_gfp+0x9d4/0xdc8 [ 1606.714478][T11828] alloc_inode+0x70/0x1b4 [ 1606.714566][T11828] sock_alloc+0x3c/0x238 [ 1606.714675][T11828] __sock_create+0xb8/0x634 [ 1606.714769][T11828] __sys_socket+0x11c/0x1cc [ 1606.714852][T11828] __arm64_sys_socket+0x6c/0xa0 [ 1606.714950][T11828] invoke_syscall+0x6c/0x258 [ 1606.715029][T11828] el0_svc_common.constprop.0+0xac/0x230 [ 1606.715107][T11828] do_el0_svc_compat+0x40/0x68 [ 1606.715188][T11828] el0_svc_compat+0x4c/0x184 [ 1606.715279][T11828] el0t_32_sync_handler+0x88/0xac [ 1606.715363][T11828] el0t_32_sync+0x19c/0x1a0 [ 1606.733664][T11828] socket: no more sockets [ 1607.049846][T11830] FAULT_INJECTION: forcing a failure. [ 1607.049846][T11830] name failslab, interval 1, probability 0, space 0, times 0 [ 1607.052525][T11830] CPU: 0 UID: 0 PID: 11830 Comm: syz.0.2860 Not tainted syzkaller #0 PREEMPT [ 1607.052665][T11830] Hardware name: linux,dummy-virt (DT) [ 1607.052733][T11830] Call trace: [ 1607.052779][T11830] show_stack+0x18/0x24 (C) [ 1607.052932][T11830] dump_stack_lvl+0xdc/0xf4 [ 1607.053041][T11830] dump_stack+0x1c/0x28 [ 1607.053134][T11830] should_fail_ex+0x5a0/0x6ac [ 1607.053280][T11830] should_failslab+0xbc/0x11c [ 1607.053377][T11830] __kmalloc_noprof+0xd0/0x4d0 [ 1607.053488][T11830] tomoyo_realpath_from_path+0x90/0x534 [ 1607.053588][T11830] tomoyo_path_number_perm+0x200/0x438 [ 1607.053678][T11830] tomoyo_file_ioctl+0x1c/0x28 [ 1607.053771][T11830] security_file_ioctl_compat+0x8c/0x19c [ 1607.053872][T11830] __arm64_compat_sys_ioctl+0x98/0x234 [ 1607.053972][T11830] invoke_syscall+0x6c/0x258 [ 1607.054061][T11830] el0_svc_common.constprop.0+0xac/0x230 [ 1607.054155][T11830] do_el0_svc_compat+0x40/0x68 [ 1607.054243][T11830] el0_svc_compat+0x4c/0x184 [ 1607.054335][T11830] el0t_32_sync_handler+0x88/0xac [ 1607.054443][T11830] el0t_32_sync+0x19c/0x1a0 [ 1607.112711][T11830] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1607.436004][T11841] FAULT_INJECTION: forcing a failure. [ 1607.436004][T11841] name failslab, interval 1, probability 0, space 0, times 0 [ 1607.438842][T11841] CPU: 0 UID: 0 PID: 11841 Comm: syz.0.2864 Not tainted syzkaller #0 PREEMPT [ 1607.438956][T11841] Hardware name: linux,dummy-virt (DT) [ 1607.438985][T11841] Call trace: [ 1607.439015][T11841] show_stack+0x18/0x24 (C) [ 1607.439094][T11841] dump_stack_lvl+0xdc/0xf4 [ 1607.439142][T11841] dump_stack+0x1c/0x28 [ 1607.439181][T11841] should_fail_ex+0x5a0/0x6ac [ 1607.439220][T11841] should_failslab+0xbc/0x11c [ 1607.439261][T11841] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1607.439301][T11841] security_inode_alloc+0x28/0x1f4 [ 1607.439340][T11841] inode_init_always_gfp+0x9d4/0xdc8 [ 1607.439382][T11841] alloc_inode+0x70/0x1b4 [ 1607.439429][T11841] sock_alloc+0x3c/0x238 [ 1607.439474][T11841] __sock_create+0xb8/0x634 [ 1607.439511][T11841] __sys_socket+0x11c/0x1cc [ 1607.439550][T11841] __arm64_sys_socket+0x6c/0xa0 [ 1607.439590][T11841] invoke_syscall+0x6c/0x258 [ 1607.439628][T11841] el0_svc_common.constprop.0+0xac/0x230 [ 1607.439666][T11841] do_el0_svc_compat+0x40/0x68 [ 1607.439703][T11841] el0_svc_compat+0x4c/0x184 [ 1607.439742][T11841] el0t_32_sync_handler+0x88/0xac [ 1607.439779][T11841] el0t_32_sync+0x19c/0x1a0 [ 1607.448126][T11841] socket: no more sockets [ 1608.760981][T11856] FAULT_INJECTION: forcing a failure. [ 1608.760981][T11856] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.763836][T11856] CPU: 0 UID: 0 PID: 11856 Comm: syz.3.2869 Not tainted syzkaller #0 PREEMPT [ 1608.763976][T11856] Hardware name: linux,dummy-virt (DT) [ 1608.764037][T11856] Call trace: [ 1608.764085][T11856] show_stack+0x18/0x24 (C) [ 1608.764229][T11856] dump_stack_lvl+0xdc/0xf4 [ 1608.764343][T11856] dump_stack+0x1c/0x28 [ 1608.764456][T11856] should_fail_ex+0x5a0/0x6ac [ 1608.764550][T11856] should_failslab+0xbc/0x11c [ 1608.764642][T11856] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1608.764738][T11856] security_inode_alloc+0x28/0x1f4 [ 1608.764822][T11856] inode_init_always_gfp+0x9d4/0xdc8 [ 1608.764918][T11856] alloc_inode+0x70/0x1b4 [ 1608.765001][T11856] sock_alloc+0x3c/0x238 [ 1608.765097][T11856] __sock_create+0xb8/0x634 [ 1608.765232][T11856] __sys_socket+0x11c/0x1cc [ 1608.765321][T11856] __arm64_sys_socket+0x6c/0xa0 [ 1608.765409][T11856] invoke_syscall+0x6c/0x258 [ 1608.765512][T11856] el0_svc_common.constprop.0+0xac/0x230 [ 1608.765600][T11856] do_el0_svc_compat+0x40/0x68 [ 1608.765690][T11856] el0_svc_compat+0x4c/0x184 [ 1608.765781][T11856] el0t_32_sync_handler+0x88/0xac [ 1608.765862][T11856] el0t_32_sync+0x19c/0x1a0 [ 1608.785565][T11856] socket: no more sockets [ 1609.365443][ T30] audit: type=1400 audit(1608.890:603): avc: denied { create } for pid=11861 comm="syz.3.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1609.389207][ T30] audit: type=1400 audit(1608.920:604): avc: denied { write } for pid=11861 comm="syz.3.2872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1611.678846][T11879] FAULT_INJECTION: forcing a failure. [ 1611.678846][T11879] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.680876][T11879] CPU: 1 UID: 0 PID: 11879 Comm: syz.0.2876 Not tainted syzkaller #0 PREEMPT [ 1611.681033][T11879] Hardware name: linux,dummy-virt (DT) [ 1611.681093][T11879] Call trace: [ 1611.681138][T11879] show_stack+0x18/0x24 (C) [ 1611.681458][T11879] dump_stack_lvl+0xdc/0xf4 [ 1611.681579][T11879] dump_stack+0x1c/0x28 [ 1611.681831][T11879] should_fail_ex+0x5a0/0x6ac [ 1611.681966][T11879] should_failslab+0xbc/0x11c [ 1611.682090][T11879] __kmalloc_noprof+0xd0/0x4d0 [ 1611.682245][T11879] tomoyo_realpath_from_path+0x90/0x534 [ 1611.682364][T11879] tomoyo_path_number_perm+0x200/0x438 [ 1611.682507][T11879] tomoyo_file_ioctl+0x1c/0x28 [ 1611.682622][T11879] security_file_ioctl_compat+0x8c/0x19c [ 1611.682762][T11879] __arm64_compat_sys_ioctl+0x98/0x234 [ 1611.682866][T11879] invoke_syscall+0x6c/0x258 [ 1611.682949][T11879] el0_svc_common.constprop.0+0xac/0x230 [ 1611.683041][T11879] do_el0_svc_compat+0x40/0x68 [ 1611.683121][T11879] el0_svc_compat+0x4c/0x184 [ 1611.683260][T11879] el0t_32_sync_handler+0x88/0xac [ 1611.683412][T11879] el0t_32_sync+0x19c/0x1a0 [ 1611.684094][T11879] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1614.167745][ T3465] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 1614.567908][ T3465] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1614.568505][ T3465] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1614.568961][ T3465] usb 1-1: Product: syz [ 1614.569140][ T3465] usb 1-1: Manufacturer: syz [ 1614.569344][ T3465] usb 1-1: SerialNumber: syz [ 1616.505603][T11905] FAULT_INJECTION: forcing a failure. [ 1616.505603][T11905] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.506009][T11905] CPU: 1 UID: 0 PID: 11905 Comm: syz.3.2884 Not tainted syzkaller #0 PREEMPT [ 1616.506111][T11905] Hardware name: linux,dummy-virt (DT) [ 1616.506158][T11905] Call trace: [ 1616.506183][T11905] show_stack+0x18/0x24 (C) [ 1616.506270][T11905] dump_stack_lvl+0xdc/0xf4 [ 1616.506324][T11905] dump_stack+0x1c/0x28 [ 1616.506369][T11905] should_fail_ex+0x5a0/0x6ac [ 1616.506422][T11905] should_failslab+0xbc/0x11c [ 1616.506466][T11905] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1616.506512][T11905] getname_flags.part.0+0x48/0x3d4 [ 1616.506557][T11905] getname_flags+0x78/0xc4 [ 1616.506600][T11905] do_readlinkat+0xa4/0x2c0 [ 1616.506703][T11905] __arm64_sys_readlink+0x6c/0xa8 [ 1616.506756][T11905] invoke_syscall+0x6c/0x258 [ 1616.506799][T11905] el0_svc_common.constprop.0+0xac/0x230 [ 1616.506838][T11905] do_el0_svc_compat+0x40/0x68 [ 1616.506876][T11905] el0_svc_compat+0x4c/0x184 [ 1616.506919][T11905] el0t_32_sync_handler+0x88/0xac [ 1616.506959][T11905] el0t_32_sync+0x19c/0x1a0 [ 1621.213299][ T30] audit: type=1400 audit(1620.740:605): avc: denied { mounton } for pid=11918 comm="syz.3.2889" path="/proc/602/cgroup" dev="proc" ino=31883 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 1621.230113][ T30] audit: type=1400 audit(1620.760:606): avc: denied { write } for pid=11918 comm="syz.3.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1621.245890][ T30] audit: type=1400 audit(1620.770:607): avc: denied { remount } for pid=11918 comm="syz.3.2889" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1621.247746][T11919] ======================================================= [ 1621.247746][T11919] WARNING: The mand mount option has been deprecated and [ 1621.247746][T11919] and is ignored by this kernel. Remove the mand [ 1621.247746][T11919] option from the mount to silence this warning. [ 1621.247746][T11919] ======================================================= [ 1624.095837][ T3465] usb 1-1: USB disconnect, device number 22 [ 1626.714548][ T3406] usb 1-1: new full-speed USB device number 23 using dummy_hcd [ 1626.878732][ T3406] usb 1-1: device descriptor read/64, error -71 [ 1627.142521][ T3406] usb 1-1: new full-speed USB device number 24 using dummy_hcd [ 1627.298402][ T3406] usb 1-1: device descriptor read/64, error -71 [ 1627.430292][ T3406] usb usb1-port1: attempt power cycle [ 1627.830368][ T11] block nbd2: Possible stuck request 0000000014bb5d3a: control (read@0,2048B). Runtime 420 seconds [ 1627.833410][ T3406] usb 1-1: new full-speed USB device number 25 using dummy_hcd [ 1627.871771][ T3406] usb 1-1: device descriptor read/8, error -71 [ 1628.138296][ T3406] usb 1-1: new full-speed USB device number 26 using dummy_hcd [ 1628.164563][ T3406] usb 1-1: device descriptor read/8, error -71 [ 1628.270631][ T3406] usb usb1-port1: unable to enumerate USB device [ 1630.119968][T11951] FAULT_INJECTION: forcing a failure. [ 1630.119968][T11951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1630.122307][T11951] CPU: 1 UID: 0 PID: 11951 Comm: syz.3.2902 Not tainted syzkaller #0 PREEMPT [ 1630.122475][T11951] Hardware name: linux,dummy-virt (DT) [ 1630.122548][T11951] Call trace: [ 1630.122598][T11951] show_stack+0x18/0x24 (C) [ 1630.122755][T11951] dump_stack_lvl+0xdc/0xf4 [ 1630.122859][T11951] dump_stack+0x1c/0x28 [ 1630.122979][T11951] should_fail_ex+0x5a0/0x6ac [ 1630.123073][T11951] should_fail+0x14/0x20 [ 1630.123172][T11951] should_fail_usercopy+0x1c/0x28 [ 1630.123260][T11951] _inline_copy_from_user+0x34/0x134 [ 1630.123355][T11951] get_compat_msghdr+0x90/0x118 [ 1630.123438][T11951] ___sys_sendmsg+0x184/0x19c [ 1630.123535][T11951] __sys_sendmsg+0x114/0x19c [ 1630.123620][T11951] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1630.123727][T11951] invoke_syscall+0x6c/0x258 [ 1630.123817][T11951] el0_svc_common.constprop.0+0xac/0x230 [ 1630.123900][T11951] do_el0_svc_compat+0x40/0x68 [ 1630.123988][T11951] el0_svc_compat+0x4c/0x184 [ 1630.124112][T11951] el0t_32_sync_handler+0x88/0xac [ 1630.124201][T11951] el0t_32_sync+0x19c/0x1a0 [ 1632.470787][T11963] FAULT_INJECTION: forcing a failure. [ 1632.470787][T11963] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.473974][T11963] CPU: 0 UID: 0 PID: 11963 Comm: syz.3.2905 Not tainted syzkaller #0 PREEMPT [ 1632.474124][T11963] Hardware name: linux,dummy-virt (DT) [ 1632.474185][T11963] Call trace: [ 1632.474234][T11963] show_stack+0x18/0x24 (C) [ 1632.474410][T11963] dump_stack_lvl+0xdc/0xf4 [ 1632.474521][T11963] dump_stack+0x1c/0x28 [ 1632.474605][T11963] should_fail_ex+0x5a0/0x6ac [ 1632.474698][T11963] should_failslab+0xbc/0x11c [ 1632.474790][T11963] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1632.474885][T11963] getname_flags.part.0+0x48/0x3d4 [ 1632.474980][T11963] getname_flags+0x78/0xc4 [ 1632.475065][T11963] do_readlinkat+0xa4/0x2c0 [ 1632.475153][T11963] __arm64_sys_readlink+0x6c/0xa8 [ 1632.475229][T11963] invoke_syscall+0x6c/0x258 [ 1632.475309][T11963] el0_svc_common.constprop.0+0xac/0x230 [ 1632.475391][T11963] do_el0_svc_compat+0x40/0x68 [ 1632.475489][T11963] el0_svc_compat+0x4c/0x184 [ 1632.475576][T11963] el0t_32_sync_handler+0x88/0xac [ 1632.475661][T11963] el0t_32_sync+0x19c/0x1a0 [ 1636.763058][ T30] audit: type=1400 audit(1636.290:608): avc: denied { ioctl } for pid=11990 comm="syz.3.2916" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7008 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1638.903845][T12017] FAULT_INJECTION: forcing a failure. [ 1638.903845][T12017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1638.917270][T12017] CPU: 0 UID: 0 PID: 12017 Comm: syz.0.2925 Not tainted syzkaller #0 PREEMPT [ 1638.917406][T12017] Hardware name: linux,dummy-virt (DT) [ 1638.917436][T12017] Call trace: [ 1638.917459][T12017] show_stack+0x18/0x24 (C) [ 1638.917556][T12017] dump_stack_lvl+0xdc/0xf4 [ 1638.917605][T12017] dump_stack+0x1c/0x28 [ 1638.917644][T12017] should_fail_ex+0x5a0/0x6ac [ 1638.917694][T12017] should_fail+0x14/0x20 [ 1638.917730][T12017] should_fail_usercopy+0x1c/0x28 [ 1638.917765][T12017] _inline_copy_from_user+0x34/0x134 [ 1638.917809][T12017] get_compat_msghdr+0x90/0x118 [ 1638.917845][T12017] ___sys_sendmsg+0x184/0x19c [ 1638.917884][T12017] __sys_sendmsg+0x114/0x19c [ 1638.917919][T12017] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1638.917959][T12017] invoke_syscall+0x6c/0x258 [ 1638.918000][T12017] el0_svc_common.constprop.0+0xac/0x230 [ 1638.918038][T12017] do_el0_svc_compat+0x40/0x68 [ 1638.918075][T12017] el0_svc_compat+0x4c/0x184 [ 1638.918116][T12017] el0t_32_sync_handler+0x88/0xac [ 1638.918155][T12017] el0t_32_sync+0x19c/0x1a0 [ 1639.991173][ T33] INFO: task udevd:3134 blocked for more than 430 seconds. [ 1640.007677][ T33] Not tainted syzkaller #0 [ 1640.008445][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1640.009000][ T33] task:udevd state:D stack:0 pid:3134 tgid:3134 ppid:1 task_flags:0x400140 flags:0x00000008 [ 1640.009747][ T33] Call trace: [ 1640.009842][ T33] __switch_to+0x208/0x4ec (T) [ 1640.010007][ T33] __schedule+0xd58/0x3180 [ 1640.010097][ T33] schedule+0xd0/0x344 [ 1640.010192][ T33] schedule_preempt_disabled+0x18/0x2c [ 1640.010287][ T33] __mutex_lock+0x72c/0xffc [ 1640.010375][ T33] mutex_lock_nested+0x24/0x30 [ 1640.010483][ T33] bdev_open+0x2c4/0xa84 [ 1640.010588][ T33] blkdev_open+0x1d4/0x324 [ 1640.010681][ T33] do_dentry_open+0x6a4/0x103c [ 1640.010814][ T33] vfs_open+0x5c/0x2fc [ 1640.010902][ T33] path_openat+0x1490/0x24b4 [ 1640.010989][ T33] do_filp_open+0x184/0x360 [ 1640.011092][ T33] do_sys_openat2+0xe0/0x160 [ 1640.011263][ T33] __arm64_sys_openat+0x12c/0x1bc [ 1640.011374][ T33] invoke_syscall+0x6c/0x258 [ 1640.011471][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1640.011559][ T33] do_el0_svc+0x40/0x58 [ 1640.011644][ T33] el0_svc+0x50/0x1a0 [ 1640.011740][ T33] el0t_64_sync_handler+0xa0/0xe4 [ 1640.011830][ T33] el0t_64_sync+0x198/0x19c [ 1640.012249][ T33] INFO: task syz.2.2321:10302 blocked for more than 430 seconds. [ 1640.012340][ T33] Not tainted syzkaller #0 [ 1640.012405][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1640.012460][ T33] task:syz.2.2321 state:D stack:0 pid:10302 tgid:10301 ppid:8025 task_flags:0x400140 flags:0x00400011 [ 1640.012646][ T33] Call trace: [ 1640.012742][ T33] __switch_to+0x208/0x4ec (T) [ 1640.012964][ T33] __schedule+0xd58/0x3180 [ 1640.013073][ T33] schedule+0xd0/0x344 [ 1640.013236][ T33] schedule_preempt_disabled+0x18/0x2c [ 1640.013344][ T33] __mutex_lock+0x72c/0xffc [ 1640.013448][ T33] mutex_lock_nested+0x24/0x30 [ 1640.013575][ T33] bdev_release+0x104/0x510 [ 1640.013693][ T33] blkdev_release+0x14/0x24 [ 1640.013793][ T33] __fput+0x2c8/0x954 [ 1640.013883][ T33] ____fput+0x14/0x20 [ 1640.013974][ T33] task_work_run+0x128/0x210 [ 1640.014101][ T33] do_notify_resume+0x1d8/0x260 [ 1640.014213][ T33] el0_svc_compat+0x104/0x184 [ 1640.014401][ T33] el0t_32_sync_handler+0x88/0xac [ 1640.014509][ T33] el0t_32_sync+0x19c/0x1a0 [ 1640.014937][ T33] INFO: lockdep is turned off. [ 1640.015885][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 1640.026328][ T33] CPU: 1 UID: 0 PID: 33 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1640.027118][ T33] Hardware name: linux,dummy-virt (DT) [ 1640.027467][ T33] Call trace: [ 1640.027743][ T33] show_stack+0x18/0x24 (C) [ 1640.028127][ T33] dump_stack_lvl+0x38/0xf4 [ 1640.028540][ T33] dump_stack+0x1c/0x28 [ 1640.028885][ T33] vpanic+0x550/0x5e0 [ 1640.029322][ T33] nmi_panic+0x0/0x18c [ 1640.029712][ T33] watchdog+0x4d8/0xd98 [ 1640.030049][ T33] kthread+0x348/0x5fc [ 1640.030379][ T33] ret_from_fork+0x10/0x20 [ 1640.031310][ T33] SMP: stopping secondary CPUs [ 1640.034264][ T33] Kernel Offset: disabled [ 1640.034681][ T33] CPU features: 0x20800,01001a00,10002000,0400421b [ 1640.035159][ T33] Memory Limit: none [ 1640.036996][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:26:37 Registers: info registers vcpu 0 CPU#0 PC=ffff80008095e00c X00=fffffdffc06cf9b4 X01=0000000000000004 X02=fffffdffc06cfb74 X03=ffff8000807c4c8c X04=ffff7fbff80d9f6f X05=fffffdffc06cfb74 X06=fffffdffc06cf9b4 X07=0000000000000001 X08=fffffdffc06cf9b7 X09=dfff800000000000 X10=ffff7fbff83dda7e X11=1fffffbff80d628e X12=ffff7fbff80d61ff X13=0000000000000000 X14=00000000000016f0 X15=0000000000000000 X16=ffff00006a08a4c4 X17=0000000000000000 X18=0000000000000000 X19=ffff8000a8207408 X20=fffffdffc06b08c0 X21=0000000000000005 X22=ffff8000a8207360 X23=ffff80008710e6a8 X24=1ffff00015040e80 X25=0000000000000001 X26=dfff800000000000 X27=ffff8000a82073c8 X28=000000000000001b X29=ffff8000a82071c0 X30=ffff8000807c4c8c SP=ffff8000a82072d0 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008543fccc X00=ffff80008543fcc8 X01=ffff800083dfbb60 X02=0000000000000000 X03=ffff800080412680 X04=ffff700011a3c569 X05=ffff80008d1e2b40 X06=ffff700011a3c568 X07=0000000000000001 X08=ffff80008d1e2b43 X09=dfff800000000000 X10=ffff700011a3c568 X11=1ffff00011a3c568 X12=ffff700011a3c569 X13=0000000000000001 X14=00000000000016f0 X15=ffff000015130008 X16=ffff00006a0ad4c4 X17=0000000000000000 X18=0000000000000000 X19=0000000000000667 X20=ffff80008d1e2b40 X21=ffff8000a1d37c90 X22=dfff800000000000 X23=ffff800080af92bc X24=1ffff000143a6f92 X25=000000000004fb80 X26=ffff800080af92bc X27=0000000000000000 X28=ffff0000141a3c80 X29=ffff8000a1d37b80 X30=ffff800083dfbb78 SP=ffff8000a1d37b80 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000