last executing test programs: 4m42.681321173s ago: executing program 0 (id=949): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0, r0}, 0x10) 4m42.311886813s ago: executing program 0 (id=951): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000000a300)) ioctl$SIOCSIFHWADDR(r1, 0x8b19, &(0x7f0000000000)={'wlan1\x00', @random='\rh\x00 \x00'}) 4m42.186186067s ago: executing program 0 (id=952): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000f70000000000fffffff5711214000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m41.919998557s ago: executing program 0 (id=954): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1b, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4a}, [@map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffff9}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_query, @map_idx={0x18, 0x1, 0x5, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x3c}]}, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000900)={'wlan1\x00', @random='\x00\x00\x00 \x00'}) 4m40.922072486s ago: executing program 0 (id=958): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m40.63472579s ago: executing program 0 (id=959): close(0x3) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) 3.249721375s ago: executing program 1 (id=1100): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 3.138919156s ago: executing program 1 (id=1101): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000500)=&(0x7f0000000240)) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000540)={0x0, 0x0, 0x0, &(0x7f00000002c0)=""/138, 0x0}) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r2}) preadv(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, r0, 0xe1cdc000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 2.980304636s ago: executing program 1 (id=1102): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file4/file6\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x0) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x10, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) landlock_restrict_self(r0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1/file4/file6\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file4/file7/file6\x00', 0x0) 2.8002528s ago: executing program 1 (id=1103): openat$adsp1(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x400000000000269, 0x4) recvmmsg(r1, &(0x7f0000000940)=[{{&(0x7f0000000380)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000400)=""/92, 0x5c}, {&(0x7f0000000480)=""/155, 0x9b}, {&(0x7f0000000540)=""/164, 0xa4}, {&(0x7f0000000600)=""/81, 0x51}, {&(0x7f0000000680)=""/223, 0xdf}, {&(0x7f0000000780)=""/15, 0xf}, {&(0x7f00000007c0)=""/145, 0x91}], 0x8, &(0x7f0000000900)=""/44, 0x2c}, 0x9}], 0x1, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000980)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r3, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x71, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000280)={r6}, 0x10) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r7, 0x0, 0x485, 0x0, 0x0) 129.803445ms ago: executing program 1 (id=1104): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x3}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a00010a000000000000000080"], 0x1c}}, 0x0) 0s ago: executing program 1 (id=1105): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eaf, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) kernel console output (not intermixed with test programs): 8): avc: denied { module_request } for pid=3115 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.625745][ T31] audit: type=1400 audit(80.530:89): avc: denied { sys_module } for pid=3114 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.303143][ T31] audit: type=1400 audit(81.210:90): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.386536][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.392569][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.605810][ T3115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.613516][ T3115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.335459][ T3114] hsr_slave_0: entered promiscuous mode [ 83.340127][ T3114] hsr_slave_1: entered promiscuous mode [ 83.561438][ T3115] hsr_slave_0: entered promiscuous mode [ 83.564073][ T3115] hsr_slave_1: entered promiscuous mode [ 83.565999][ T3115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.566455][ T3115] Cannot create hsr debugfs directory [ 83.859719][ T31] audit: type=1400 audit(83.760:91): avc: denied { create } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.869345][ T31] audit: type=1400 audit(83.770:92): avc: denied { write } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.884492][ T3114] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.905524][ T3114] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.924613][ T3114] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.952927][ T3114] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.095141][ T3115] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.107587][ T3115] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.117489][ T3115] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.126404][ T3115] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.741604][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.875626][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.463167][ T3115] veth0_vlan: entered promiscuous mode [ 87.483501][ T3115] veth1_vlan: entered promiscuous mode [ 87.527891][ T3115] veth0_macvtap: entered promiscuous mode [ 87.541698][ T3115] veth1_macvtap: entered promiscuous mode [ 87.613048][ T3115] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.613828][ T3115] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.614240][ T3115] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.614690][ T3115] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.736001][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 87.736094][ T31] audit: type=1400 audit(87.640:94): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.737481][ T31] audit: type=1400 audit(87.640:95): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.s6Hw1M/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.765735][ T31] audit: type=1400 audit(87.640:96): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.766732][ T31] audit: type=1400 audit(87.650:97): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.s6Hw1M/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 87.767571][ T31] audit: type=1400 audit(87.660:98): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.s6Hw1M/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2363 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 87.768416][ T31] audit: type=1400 audit(87.670:99): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.776776][ T31] audit: type=1400 audit(87.670:100): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.787326][ T31] audit: type=1400 audit(87.690:101): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.794098][ T31] audit: type=1400 audit(87.690:102): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.795094][ T31] audit: type=1400 audit(87.700:103): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 87.865571][ T3115] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.539644][ T3114] veth0_vlan: entered promiscuous mode [ 88.554178][ T3114] veth1_vlan: entered promiscuous mode [ 88.593064][ T3114] veth0_macvtap: entered promiscuous mode [ 88.598183][ T3114] veth1_macvtap: entered promiscuous mode [ 88.645401][ T3114] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.645747][ T3114] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.645958][ T3114] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.646200][ T3114] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.953074][ T3802] SELinux: Context system_u:object_r:usr_t:s0 is not valid (left unmapped). [ 94.522004][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 94.522138][ T31] audit: type=1400 audit(94.430:128): avc: denied { prog_load } for pid=3848 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.524452][ T31] audit: type=1400 audit(94.430:129): avc: denied { bpf } for pid=3848 comm="syz.1.15" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 94.533186][ T31] audit: type=1400 audit(94.430:130): avc: denied { map_create } for pid=3848 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.533957][ T31] audit: type=1400 audit(94.440:131): avc: denied { map_read map_write } for pid=3848 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.536281][ T31] audit: type=1400 audit(94.440:132): avc: denied { perfmon } for pid=3848 comm="syz.1.15" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 94.561339][ T31] audit: type=1400 audit(94.470:133): avc: denied { prog_run } for pid=3848 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.053468][ T31] audit: type=1400 audit(97.960:134): avc: denied { create } for pid=3860 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 98.082667][ T31] audit: type=1400 audit(97.990:135): avc: denied { ioctl } for pid=3860 comm="syz.0.19" path="socket:[2539]" dev="sockfs" ino=2539 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 98.962395][ T31] audit: type=1400 audit(98.870:136): avc: denied { create } for pid=3866 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 98.992361][ T31] audit: type=1400 audit(98.890:137): avc: denied { write } for pid=3866 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.391942][ T31] audit: type=1400 audit(103.290:138): avc: denied { create } for pid=3884 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.411080][ T31] audit: type=1400 audit(103.320:139): avc: denied { setopt } for pid=3884 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.415032][ T31] audit: type=1400 audit(103.320:140): avc: denied { connect } for pid=3884 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 103.923742][ T31] audit: type=1400 audit(103.830:141): avc: denied { write } for pid=3884 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 107.481511][ T31] audit: type=1400 audit(107.390:142): avc: denied { create } for pid=3891 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 107.501878][ T31] audit: type=1400 audit(107.410:143): avc: denied { create } for pid=3891 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 107.509301][ T31] audit: type=1400 audit(107.410:144): avc: denied { write } for pid=3891 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 107.518913][ T3892] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=257 sclass=netlink_tcpdiag_socket pid=3892 comm=syz.0.29 [ 110.303139][ T31] audit: type=1400 audit(110.210:145): avc: denied { read } for pid=3900 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 114.698326][ T31] audit: type=1400 audit(114.590:146): avc: denied { ioctl } for pid=3922 comm="syz.1.37" path="socket:[1014]" dev="sockfs" ino=1014 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.938210][ T31] audit: type=1400 audit(114.840:147): avc: denied { create } for pid=3922 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 114.961773][ T31] audit: type=1400 audit(114.870:148): avc: denied { create } for pid=3922 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 114.968220][ T31] audit: type=1400 audit(114.870:149): avc: denied { write } for pid=3922 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 115.029525][ T31] audit: type=1400 audit(114.930:150): avc: denied { ioctl } for pid=3922 comm="syz.1.37" path="socket:[2651]" dev="sockfs" ino=2651 ioctlcmd=0x541a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 115.689337][ T31] audit: type=1400 audit(115.590:151): avc: denied { ioctl } for pid=3931 comm="syz.1.40" path="socket:[1022]" dev="sockfs" ino=1022 ioctlcmd=0x9434 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 121.503387][ T31] audit: type=1400 audit(121.410:152): avc: denied { nlmsg_tty_audit } for pid=3957 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 121.512386][ T31] audit: type=1400 audit(121.420:153): avc: denied { setopt } for pid=3957 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.534472][ T31] audit: type=1400 audit(121.440:154): avc: denied { connect } for pid=3957 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.572232][ T31] audit: type=1400 audit(121.480:155): avc: denied { unlink } for pid=3953 comm="syz.1.45" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 126.764292][ T31] audit: type=1400 audit(126.670:156): avc: denied { bind } for pid=3988 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 126.970345][ T3973] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 131.090186][ T4010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4010 comm=syz.0.60 [ 133.232810][ T31] audit: type=1400 audit(133.140:157): avc: denied { create } for pid=4028 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.238257][ T31] audit: type=1400 audit(133.140:158): avc: denied { bind } for pid=4028 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.463952][ T4029] "syz.0.66" (4029) uses obsolete ecb(arc4) skcipher [ 133.468015][ T31] audit: type=1400 audit(133.370:159): avc: denied { setopt } for pid=4028 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.473613][ T31] audit: type=1400 audit(133.380:160): avc: denied { accept } for pid=4028 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.484571][ T31] audit: type=1400 audit(133.380:161): avc: denied { write } for pid=4028 comm="syz.0.66" path="socket:[2775]" dev="sockfs" ino=2775 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 133.488020][ T31] audit: type=1400 audit(133.390:162): avc: denied { read } for pid=4028 comm="syz.0.66" path="socket:[2775]" dev="sockfs" ino=2775 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 139.692552][ T4065] Zero length message leads to an empty skb [ 144.066175][ T31] audit: type=1400 audit(143.970:163): avc: denied { mount } for pid=4091 comm="syz.0.87" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 147.921530][ T4106] sctp: [Deprecated]: syz.1.91 (pid 4106) Use of int in maxseg socket option. [ 147.921530][ T4106] Use struct sctp_assoc_value instead [ 147.935390][ T31] audit: type=1400 audit(147.840:164): avc: denied { setopt } for pid=4102 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 150.003872][ T31] audit: type=1400 audit(149.910:165): avc: denied { ioctl } for pid=4117 comm="syz.1.97" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 150.323566][ T4124] FAULT_INJECTION: forcing a failure. [ 150.323566][ T4124] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 150.325051][ T4124] CPU: 0 UID: 0 PID: 4124 Comm: syz.1.100 Not tainted 6.12.0-rc2-syzkaller #0 [ 150.325720][ T4124] Hardware name: ARM-Versatile Express [ 150.326367][ T4124] Call trace: [ 150.327526][ T4124] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 150.329725][ T4124] r7:00000000 r6:00000000 r5:60000013 r4:8203d294 [ 150.330825][ T4124] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 150.331381][ T4124] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 150.331834][ T4124] r5:00000000 r4:8274e1c4 [ 150.332137][ T4124] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 150.333581][ T4124] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 150.335024][ T4124] r6:00000000 r5:e044df68 r4:00000002 [ 150.335356][ T4124] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 150.336134][ T4124] [<808e5394>] (should_fail_usercopy) from [<8054e6d4>] (simple_read_from_buffer+0x8c/0x134) [ 150.337127][ T4124] [<8054e648>] (simple_read_from_buffer) from [<805c31d4>] (proc_fail_nth_read+0xb8/0x100) [ 150.337686][ T4124] r10:00000001 r9:805c311c r8:00000002 r7:e044df68 r6:0000000f r5:76b52f30 [ 150.338053][ T4124] r4:840bd400 r3:e044de9f [ 150.338254][ T4124] [<805c311c>] (proc_fail_nth_read) from [<80515e4c>] (vfs_read+0x98/0x324) [ 150.338504][ T4124] r8:76b52f30 r7:e044df68 r6:840bd400 r5:0000000f r4:844029c0 [ 150.338757][ T4124] [<80515db4>] (vfs_read) from [<80516afc>] (ksys_read+0x78/0xf8) [ 150.339264][ T4124] r10:00000003 r9:840bd400 r8:8020029c r7:00000000 r6:00000000 r5:844029c0 [ 150.339758][ T4124] r4:844029c3 [ 150.339890][ T4124] [<80516a84>] (ksys_read) from [<80516b8c>] (sys_read+0x10/0x14) [ 150.340168][ T4124] r7:00000003 r6:00000006 r5:76b52f30 r4:0000000f [ 150.340364][ T4124] [<80516b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 150.340709][ T4124] Exception stack(0xe044dfa8 to 0xe044dff0) [ 150.341042][ T4124] dfa0: 0000000f 76b52f30 00000006 76b52f30 0000000f 00000000 [ 150.341345][ T4124] dfc0: 0000000f 76b52f30 00000006 00000003 00000000 00006364 003d0f00 76b530bc [ 150.341589][ T4124] dfe0: 00000158 76b52ed0 000d8408 00130d94 [ 150.440850][ T31] audit: type=1400 audit(150.350:166): avc: denied { create } for pid=4125 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 150.444433][ T31] audit: type=1400 audit(150.350:167): avc: denied { getopt } for pid=4125 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 151.079017][ T4132] FAULT_INJECTION: forcing a failure. [ 151.079017][ T4132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.079809][ T4132] CPU: 1 UID: 0 PID: 4132 Comm: syz.0.104 Not tainted 6.12.0-rc2-syzkaller #0 [ 151.080166][ T4132] Hardware name: ARM-Versatile Express [ 151.080429][ T4132] Call trace: [ 151.080687][ T4132] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 151.081452][ T4132] r7:84126fc0 r6:00000000 r5:60000013 r4:8203d294 [ 151.081904][ T4132] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 151.082512][ T4132] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 151.083418][ T4132] r5:00000000 r4:8274e1c4 [ 151.083854][ T4132] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 151.084402][ T4132] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 151.085266][ T4132] r6:00000000 r5:dfec1f48 r4:00000040 [ 151.085514][ T4132] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 151.085895][ T4132] [<808e5394>] (should_fail_usercopy) from [<8083a1dc>] (_copy_from_iter+0x68/0x7c8) [ 151.086356][ T4132] [<8083a174>] (_copy_from_iter) from [<815a6a9c>] (netlink_sendmsg+0x19c/0x43c) [ 151.086746][ T4132] r10:00000000 r9:00000000 r8:dfec1f48 r7:85193800 r6:00000040 r5:844a8d80 [ 151.087316][ T4132] r4:dfec1f38 [ 151.087515][ T4132] [<815a6900>] (netlink_sendmsg) from [<81483708>] (__sock_sendmsg+0x44/0x78) [ 151.087930][ T4132] r10:2004c000 r9:dfec1dd4 r8:dfec1dd4 r7:00000000 r6:833f7900 r5:dfec1f38 [ 151.088383][ T4132] r4:00000000 [ 151.088641][ T4132] [<814836c4>] (__sock_sendmsg) from [<8148470c>] (____sys_sendmsg+0x2ac/0x2cc) [ 151.089185][ T4132] r7:00000000 r6:00000000 r5:833f7900 r4:dfec1f38 [ 151.089512][ T4132] [<81484460>] (____sys_sendmsg) from [<81486674>] (___sys_sendmsg+0x9c/0xd0) [ 151.090207][ T4132] r10:dfec1e34 r9:200000c0 r8:2004c000 r7:00000000 r6:833f7900 r5:dfec1f38 [ 151.090662][ T4132] r4:00000000 [ 151.090860][ T4132] [<814865d8>] (___sys_sendmsg) from [<81486b8c>] (sys_sendmsg+0x78/0xbc) [ 151.091481][ T4132] r10:00000128 r9:84156000 r8:8020029c r7:2004c000 r6:200000c0 r5:833f7900 [ 151.092127][ T4132] r4:00000000 [ 151.092553][ T4132] [<81486b14>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 151.093207][ T4132] Exception stack(0xdfec1fa8 to 0xdfec1ff0) [ 151.093622][ T4132] 1fa0: 00000000 00000000 00000003 200000c0 2004c000 00000000 [ 151.094274][ T4132] 1fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76bb60bc [ 151.095365][ T4132] 1fe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 151.095647][ T4132] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 151.120161][ T31] audit: type=1400 audit(151.020:168): avc: denied { write } for pid=4127 comm="syz.1.102" name="pfkey" dev="proc" ino=4026532823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 151.315891][ T31] audit: type=1400 audit(151.220:169): avc: denied { name_bind } for pid=4134 comm="syz.1.106" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 151.322658][ T31] audit: type=1400 audit(151.220:170): avc: denied { node_bind } for pid=4134 comm="syz.1.106" saddr=::1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 151.335763][ T31] audit: type=1400 audit(151.240:171): avc: denied { getopt } for pid=4134 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 151.554122][ T4144] SELinux: Context u:object_r:app_data_file:s0:c512,c768 is not valid (left unmapped). [ 151.565646][ T31] audit: type=1400 audit(151.470:172): avc: denied { relabelto } for pid=4143 comm="syz.0.108" name="transactions" dev="debugfs" ino=1331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="u:object_r:app_data_file:s0:c512,c768" [ 151.572130][ T31] audit: type=1400 audit(151.470:173): avc: denied { associate } for pid=4143 comm="syz.0.108" name="transactions" dev="debugfs" ino=1331 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 srawcon="u:object_r:app_data_file:s0:c512,c768" [ 151.584999][ T31] audit: type=1400 audit(151.490:174): avc: denied { ioctl } for pid=4143 comm="syz.0.108" path="socket:[2986]" dev="sockfs" ino=2986 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 152.682106][ T4162] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 153.064224][ T4179] FAULT_INJECTION: forcing a failure. [ 153.064224][ T4179] name failslab, interval 1, probability 0, space 0, times 0 [ 153.065074][ T4179] CPU: 0 UID: 0 PID: 4179 Comm: syz.1.124 Not tainted 6.12.0-rc2-syzkaller #0 [ 153.065735][ T4179] Hardware name: ARM-Versatile Express [ 153.066124][ T4179] Call trace: [ 153.066368][ T4179] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 153.067285][ T4179] r7:84151800 r6:00000d40 r5:60000013 r4:8203d294 [ 153.067574][ T4179] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 153.068485][ T4179] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 153.069236][ T4179] r5:00000000 r4:82718bdc [ 153.069604][ T4179] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 153.070154][ T4179] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 153.070881][ T4179] r6:00000d40 r5:832ba800 r4:82ca86c0 [ 153.071244][ T4179] [<804e818c>] (should_failslab) from [<804cd298>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 153.071806][ T4179] [<804cd24c>] (kmem_cache_alloc_noprof) from [<80709710>] (security_inode_alloc+0x30/0x1e8) [ 153.072598][ T4179] r10:82f19400 r9:00000000 r8:00000000 r7:832ba908 r6:81a1cd84 r5:832ba800 [ 153.074021][ T4179] r4:832ba800 [ 153.074518][ T4179] [<807096e0>] (security_inode_alloc) from [<8053849c>] (inode_init_always+0x164/0x1b0) [ 153.075319][ T4179] r5:00000000 r4:832ba800 [ 153.075648][ T4179] [<80538338>] (inode_init_always) from [<8053a278>] (alloc_inode+0x3c/0xc8) [ 153.076349][ T4179] r10:0000016e r9:84402cc0 r8:00000000 r7:00000000 r6:81c4a180 r5:82f19400 [ 153.077143][ T4179] r4:832ba800 r3:00000000 [ 153.077862][ T4179] [<8053a23c>] (alloc_inode) from [<8053c130>] (new_inode_pseudo+0x10/0x14) [ 153.078386][ T4179] r7:00000000 r6:00000000 r5:e884df5c r4:832bb900 [ 153.079429][ T4179] [<8053c120>] (new_inode_pseudo) from [<814822e4>] (sock_alloc+0x20/0x70) [ 153.081359][ T4179] [<814822c4>] (sock_alloc) from [<814856f0>] (do_accept+0x8c/0x174) [ 153.081854][ T4179] r5:e884df5c r4:832bb900 [ 153.082328][ T4179] [<81485664>] (do_accept) from [<81485864>] (__sys_accept4+0x8c/0xf8) [ 153.083414][ T4179] r10:0000016e r9:84402cc0 r8:00000000 r7:00000000 r6:00080000 r5:00000006 [ 153.084631][ T4179] r4:84402cc1 [ 153.085065][ T4179] [<814857d8>] (__sys_accept4) from [<814858e0>] (sys_accept4+0x10/0x14) [ 153.086605][ T4179] r9:84151800 r8:8020029c r7:0000016e r6:00130e70 r5:00000000 r4:00000000 [ 153.089112][ T4179] [<814858d0>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 153.089607][ T4179] Exception stack(0xe884dfa8 to 0xe884dff0) [ 153.089946][ T4179] dfa0: 00000000 00000000 00000004 00000000 00000000 00080000 [ 153.090381][ T4179] dfc0: 00000000 00000000 00130e70 0000016e 00000000 00006364 003d0f00 76b530bc [ 153.090771][ T4179] dfe0: 76b52ec0 76b52eb0 00018af8 00132ec0 [ 153.542675][ T4190] FAULT_INJECTION: forcing a failure. [ 153.542675][ T4190] name failslab, interval 1, probability 0, space 0, times 0 [ 153.543580][ T4190] CPU: 1 UID: 0 PID: 4190 Comm: syz.0.129 Not tainted 6.12.0-rc2-syzkaller #0 [ 153.544043][ T4190] Hardware name: ARM-Versatile Express [ 153.544343][ T4190] Call trace: [ 153.544604][ T4190] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 153.545135][ T4190] r7:84155400 r6:00000dc0 r5:60000013 r4:8203d294 [ 153.545475][ T4190] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 153.545890][ T4190] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 153.546268][ T4190] r5:00000000 r4:82718bdc [ 153.546468][ T4190] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 153.546839][ T4190] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 153.547493][ T4190] r6:00000dc0 r5:8451d6c0 r4:82ca8600 [ 153.547741][ T4190] [<804e818c>] (should_failslab) from [<804cd298>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 153.548240][ T4190] [<804cd24c>] (kmem_cache_alloc_noprof) from [<8070e8cc>] (security_file_alloc+0x30/0x1dc) [ 153.548746][ T4190] r10:00000142 r9:84155400 r8:82605c00 r7:83cbb580 r6:000000c0 r5:8451d6c0 [ 153.549472][ T4190] r4:8451d6c0 [ 153.549712][ T4190] [<8070e89c>] (security_file_alloc) from [<805184bc>] (init_file+0x48/0xd0) [ 153.550421][ T4190] r5:000000c0 r4:8451d6c0 [ 153.550668][ T4190] [<80518474>] (init_file) from [<805185bc>] (alloc_empty_file+0x78/0x13c) [ 153.551528][ T4190] r7:83cbb580 r6:000000c0 r5:8451d6c0 r4:82237820 [ 153.551929][ T4190] [<80518544>] (alloc_empty_file) from [<8052aa30>] (path_openat+0x40/0x11a4) [ 153.552368][ T4190] r8:ea959e58 r7:ea959e58 r6:ea959f20 r5:84155400 r4:82f58000 [ 153.552716][ T4190] [<8052a9f0>] (path_openat) from [<8052bc30>] (do_filp_open+0x9c/0x138) [ 153.553156][ T4190] r10:00000142 r9:84155400 r8:00000000 r7:ea959e58 r6:ea959f20 r5:84155400 [ 153.553689][ T4190] r4:82f58000 [ 153.553893][ T4190] [<8052bb94>] (do_filp_open) from [<80512ee8>] (do_sys_openat2+0xbc/0xe4) [ 153.554299][ T4190] r8:8020029c r7:ffffff9c r6:00000004 r5:ea959f58 r4:82f58000 [ 153.557221][ T4190] [<80512e2c>] (do_sys_openat2) from [<805132f0>] (sys_openat+0x98/0xd4) [ 153.560418][ T4190] r7:00000142 r6:00000000 r5:76bb5ab0 r4:ffffff9c [ 153.560740][ T4190] [<80513258>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 153.563779][ T4190] Exception stack(0xea959fa8 to 0xea959ff0) [ 153.564167][ T4190] 9fa0: 000000c0 76bb5ab0 ffffff9c 76bb5ab0 000000c0 00000000 [ 153.564560][ T4190] 9fc0: 000000c0 76bb5ab0 00000000 00000142 00000000 00006364 003d0f00 76bb60bc [ 153.564956][ T4190] 9fe0: 81010101 76bb5a68 000d8408 00130cb8 [ 153.566529][ T4190] r5:76bb5ab0 r4:000000c0 [ 156.367433][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 156.367561][ T31] audit: type=1400 audit(156.270:196): avc: denied { write } for pid=4223 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.520879][ T31] audit: type=1400 audit(156.430:197): avc: denied { ioctl } for pid=4220 comm="syz.1.133" path="socket:[4143]" dev="sockfs" ino=4143 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 156.621555][ T4227] syz.0.135 uses obsolete (PF_INET,SOCK_PACKET) [ 156.667392][ T31] audit: type=1400 audit(156.570:198): avc: denied { setattr } for pid=4228 comm="syz.1.136" name="NETLINK" dev="sockfs" ino=4156 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 156.780662][ T31] audit: type=1400 audit(156.690:199): avc: denied { setattr } for pid=4230 comm="syz.1.137" name="PING" dev="sockfs" ino=3533 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 157.239963][ T31] audit: type=1400 audit(157.150:200): avc: denied { setopt } for pid=4240 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 157.247543][ T31] audit: type=1400 audit(157.150:201): avc: denied { map } for pid=4240 comm="syz.1.141" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 157.309502][ T31] audit: type=1400 audit(157.210:202): avc: denied { create } for pid=4240 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 157.585582][ T31] audit: type=1400 audit(157.490:203): avc: denied { create } for pid=4235 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 159.874069][ T31] audit: type=1400 audit(159.780:204): avc: denied { ioctl } for pid=4250 comm="syz.0.144" path="socket:[3606]" dev="sockfs" ino=3606 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.109431][ T31] audit: type=1400 audit(160.010:205): avc: denied { setopt } for pid=4258 comm="syz.1.146" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.415675][ T4271] FAULT_INJECTION: forcing a failure. [ 160.415675][ T4271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.416971][ T4271] CPU: 1 UID: 0 PID: 4271 Comm: syz.0.150 Not tainted 6.12.0-rc2-syzkaller #0 [ 160.417341][ T4271] Hardware name: ARM-Versatile Express [ 160.417579][ T4271] Call trace: [ 160.417799][ T4271] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 160.418205][ T4271] r7:00000000 r6:00000000 r5:60000013 r4:8203d294 [ 160.418505][ T4271] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 160.419141][ T4271] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 160.419667][ T4271] r5:00000000 r4:8274e1c4 [ 160.419909][ T4271] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 160.420400][ T4271] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 160.420889][ T4271] r6:00000000 r5:eae2df68 r4:00000002 [ 160.421271][ T4271] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 160.421695][ T4271] [<808e5394>] (should_fail_usercopy) from [<8054e6d4>] (simple_read_from_buffer+0x8c/0x134) [ 160.422363][ T4271] [<8054e648>] (simple_read_from_buffer) from [<805c31d4>] (proc_fail_nth_read+0xb8/0x100) [ 160.423166][ T4271] r10:00000001 r9:805c311c r8:00000002 r7:eae2df68 r6:0000000f r5:76bb5f30 [ 160.423496][ T4271] r4:84156000 r3:eae2de9f [ 160.424078][ T4271] [<805c311c>] (proc_fail_nth_read) from [<80515e4c>] (vfs_read+0x98/0x324) [ 160.424926][ T4271] r8:76bb5f30 r7:eae2df68 r6:84156000 r5:0000000f r4:84402300 [ 160.425260][ T4271] [<80515db4>] (vfs_read) from [<80516afc>] (ksys_read+0x78/0xf8) [ 160.426532][ T4271] r10:00000003 r9:84156000 r8:8020029c r7:00000000 r6:00000000 r5:84402300 [ 160.426878][ T4271] r4:84402303 [ 160.427395][ T4271] [<80516a84>] (ksys_read) from [<80516b8c>] (sys_read+0x10/0x14) [ 160.428529][ T4271] r7:00000003 r6:00000005 r5:76bb5f30 r4:0000000f [ 160.428883][ T4271] [<80516b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 160.429821][ T4271] Exception stack(0xeae2dfa8 to 0xeae2dff0) [ 160.430227][ T4271] dfa0: 0000000f 76bb5f30 00000005 76bb5f30 0000000f 00000000 [ 160.430679][ T4271] dfc0: 0000000f 76bb5f30 00000005 00000003 00000000 00006364 003d0f00 76bb60bc [ 160.431119][ T4271] dfe0: 00000158 76bb5ed0 000d8408 00130d94 [ 160.566900][ T4276] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4276 comm=syz.0.153 [ 162.528274][ T4318] capability: warning: `syz.1.168' uses deprecated v2 capabilities in a way that may be insecure [ 165.321959][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 165.322077][ T31] audit: type=1400 audit(165.230:209): avc: denied { create } for pid=4337 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 165.349940][ T31] audit: type=1400 audit(165.250:210): avc: denied { write } for pid=4337 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 168.765566][ T4376] SELinux: Context system_u:object_r:gpg_helper_exec_t:s0 is not valid (left unmapped). [ 168.768456][ T31] audit: type=1400 audit(168.670:211): avc: denied { relabelto } for pid=4375 comm="syz.1.181" name="memfd:@!!@)" dev="tmpfs" ino=1030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:gpg_helper_exec_t:s0" [ 168.770484][ T31] audit: type=1400 audit(168.670:212): avc: denied { associate } for pid=4375 comm="syz.1.181" name="memfd:@!!@)" dev="tmpfs" ino=1030 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:gpg_helper_exec_t:s0" [ 168.942612][ T31] audit: type=1400 audit(168.850:213): avc: denied { setattr } for pid=4375 comm="syz.1.181" name="memfd:@!!@)" dev="tmpfs" ino=1030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:gpg_helper_exec_t:s0" [ 168.951647][ T31] audit: type=1400 audit(168.860:214): avc: denied { ioctl } for pid=4375 comm="syz.1.181" path=2F6D656D66643A4021214029202864656C6574656429 dev="tmpfs" ino=1030 ioctlcmd=0x9416 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:gpg_helper_exec_t:s0" [ 171.940058][ T31] audit: type=1400 audit(171.840:215): avc: denied { write } for pid=4389 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 172.668119][ T4394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=4394 comm=syz.1.187 [ 174.428210][ T31] audit: type=1400 audit(174.330:216): avc: denied { accept } for pid=4407 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 176.188047][ T31] audit: type=1400 audit(176.090:217): avc: denied { setopt } for pid=4436 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 176.371829][ T4441] input: syz0 as /devices/virtual/input/input3 [ 177.017189][ T31] audit: type=1400 audit(176.920:218): avc: denied { write } for pid=4449 comm="syz.0.198" path="socket:[4604]" dev="sockfs" ino=4604 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.044976][ T4450] fuse: Bad value for 'group_id' [ 177.045615][ T4450] fuse: Bad value for 'group_id' [ 180.376264][ T31] audit: type=1400 audit(180.280:219): avc: denied { read write } for pid=4456 comm="syz.0.201" name="sequencer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 180.395657][ T31] audit: type=1400 audit(180.290:220): avc: denied { open } for pid=4456 comm="syz.0.201" path="/dev/sequencer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 180.444583][ T31] audit: type=1400 audit(180.340:221): avc: denied { ioctl } for pid=4456 comm="syz.0.201" path="/dev/sequencer" dev="devtmpfs" ino=728 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usr_t:s0" [ 184.635573][ T4473] fuse: Bad value for 'group_id' [ 184.636128][ T4473] fuse: Bad value for 'group_id' [ 185.005514][ T31] audit: type=1400 audit(184.910:222): avc: denied { create } for pid=4474 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 185.019619][ T31] audit: type=1400 audit(184.920:223): avc: denied { setopt } for pid=4474 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 185.020565][ T31] audit: type=1400 audit(184.930:224): avc: denied { ioctl } for pid=4474 comm="syz.0.208" path="socket:[3860]" dev="sockfs" ino=3860 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 187.237313][ T4485] fuse: Bad value for 'group_id' [ 187.237681][ T4485] fuse: Bad value for 'group_id' [ 187.844432][ T4488] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 188.826730][ T4498] fuse: Bad value for 'group_id' [ 188.827262][ T4498] fuse: Bad value for 'group_id' [ 191.361671][ T4511] fuse: Bad value for 'group_id' [ 191.364131][ T4511] fuse: Bad value for 'group_id' [ 191.537411][ T31] audit: type=1400 audit(191.440:225): avc: denied { write } for pid=4514 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 191.912561][ T31] audit: type=1400 audit(191.820:226): avc: denied { setattr } for pid=4518 comm="syz.0.226" path="socket:[3981]" dev="sockfs" ino=3981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 194.670510][ T4527] fuse: Bad value for 'group_id' [ 194.671053][ T4527] fuse: Bad value for 'group_id' [ 194.957994][ T31] audit: type=1400 audit(194.860:227): avc: denied { map } for pid=4530 comm="syz.0.230" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4011 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 194.969811][ T31] audit: type=1400 audit(194.860:228): avc: denied { read write } for pid=4530 comm="syz.0.230" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4011 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 195.052499][ T31] audit: type=1400 audit(194.960:229): avc: denied { ioctl } for pid=4532 comm="syz.0.231" path="socket:[4020]" dev="sockfs" ino=4020 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 195.284826][ T4537] fuse: Bad value for 'group_id' [ 195.285276][ T4537] fuse: Bad value for 'group_id' [ 195.402342][ T31] audit: type=1326 audit(195.310:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4538 comm="syz.0.234" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 195.911877][ T31] audit: type=1326 audit(195.820:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4538 comm="syz.0.234" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 196.424978][ T31] audit: type=1326 audit(196.330:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4538 comm="syz.0.234" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 196.935219][ T31] audit: type=1326 audit(196.840:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4538 comm="syz.0.234" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 197.455199][ T31] audit: type=1326 audit(197.360:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4538 comm="syz.0.234" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 200.327566][ T4551] FAULT_INJECTION: forcing a failure. [ 200.327566][ T4551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.328312][ T4551] CPU: 0 UID: 0 PID: 4551 Comm: syz.0.237 Not tainted 6.12.0-rc2-syzkaller #0 [ 200.329106][ T4551] Hardware name: ARM-Versatile Express [ 200.329398][ T4551] Call trace: [ 200.329747][ T4551] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 200.330235][ T4551] r7:00000000 r6:dfc55e30 r5:60000013 r4:8203d294 [ 200.330516][ T4551] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 200.330901][ T4551] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 200.332506][ T4551] r5:00000000 r4:8274e1c4 [ 200.332721][ T4551] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 200.333122][ T4551] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 200.333510][ T4551] r6:dfc55e30 r5:00000000 r4:dfc55f38 [ 200.333764][ T4551] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 200.334170][ T4551] [<808e5394>] (should_fail_usercopy) from [<814864f8>] (copy_msghdr_from_user+0x50/0x130) [ 200.334615][ T4551] [<814864a8>] (copy_msghdr_from_user) from [<81486650>] (___sys_sendmsg+0x78/0xd0) [ 200.335084][ T4551] r8:20000824 r7:00000000 r6:832ba000 r5:dfc55f38 r4:dfc55e74 [ 200.335403][ T4551] [<814865d8>] (___sys_sendmsg) from [<81486b8c>] (sys_sendmsg+0x78/0xbc) [ 200.335801][ T4551] r10:00000128 r9:840b9800 r8:8020029c r7:20000824 r6:00000000 r5:832ba000 [ 200.336178][ T4551] r4:00000000 [ 200.336369][ T4551] [<81486b14>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.336768][ T4551] Exception stack(0xdfc55fa8 to 0xdfc55ff0) [ 200.337122][ T4551] 5fa0: 00000000 00000000 00000005 00000000 20000824 00000000 [ 200.337510][ T4551] 5fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76bb60bc [ 200.337963][ T4551] 5fe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 200.338256][ T4551] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 200.435330][ T4553] fuse: Bad value for 'group_id' [ 200.435676][ T4553] fuse: Bad value for 'group_id' [ 200.511287][ T31] audit: type=1400 audit(200.420:235): avc: denied { mount } for pid=4554 comm="syz.0.239" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 201.081597][ T31] audit: type=1400 audit(200.990:236): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 201.196850][ T4564] fuse: Bad value for 'group_id' [ 201.197408][ T4564] fuse: Bad value for 'group_id' [ 201.471263][ T31] audit: type=1400 audit(201.380:237): avc: denied { create } for pid=4567 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 201.480921][ T31] audit: type=1400 audit(201.380:238): avc: denied { write } for pid=4567 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 207.367969][ T31] audit: type=1400 audit(207.270:239): avc: denied { connect } for pid=4621 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 207.373817][ T31] audit: type=1400 audit(207.280:240): avc: denied { name_connect } for pid=4621 comm="syz.0.264" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 207.379011][ T31] audit: type=1400 audit(207.280:241): avc: denied { listen } for pid=4621 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 209.307349][ T4609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.318299][ T4609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.288138][ T4609] hsr_slave_0: entered promiscuous mode [ 210.292137][ T4609] hsr_slave_1: entered promiscuous mode [ 210.293931][ T4609] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 210.294412][ T4609] Cannot create hsr debugfs directory [ 210.745737][ T31] audit: type=1400 audit(210.640:242): avc: denied { nlmsg_write } for pid=4883 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 210.874079][ T4609] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.985264][ T4609] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 211.092624][ T4609] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 211.191982][ T4609] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 211.416813][ T4609] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 211.440891][ T4609] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 211.465816][ T4609] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 211.480455][ T4609] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 211.853772][ T31] audit: type=1400 audit(211.760:243): avc: denied { ioctl } for pid=4962 comm="syz.0.277" path="socket:[5372]" dev="sockfs" ino=5372 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 212.731933][ T4609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.099650][ T31] audit: type=1400 audit(213.000:244): avc: denied { getopt } for pid=4984 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 213.124637][ T31] audit: type=1400 audit(213.030:245): avc: denied { setattr } for pid=4984 comm="syz.0.282" path="socket:[6180]" dev="sockfs" ino=6180 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 213.776423][ T31] audit: type=1400 audit(213.680:246): avc: denied { ioctl } for pid=4991 comm="syz.0.284" path="socket:[5401]" dev="sockfs" ino=5401 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 215.317098][ T5011] FAULT_INJECTION: forcing a failure. [ 215.317098][ T5011] name failslab, interval 1, probability 0, space 0, times 0 [ 215.317779][ T5011] CPU: 1 UID: 0 PID: 5011 Comm: syz.0.288 Not tainted 6.12.0-rc2-syzkaller #0 [ 215.318184][ T5011] Hardware name: ARM-Versatile Express [ 215.318431][ T5011] Call trace: [ 215.318825][ T5011] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 215.319462][ T5011] r7:00000d40 r6:8547f4a8 r5:60000013 r4:8203d294 [ 215.319753][ T5011] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 215.320154][ T5011] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 215.320518][ T5011] r5:00000000 r4:82718bdc [ 215.320737][ T5011] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 215.321125][ T5011] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 215.321525][ T5011] r6:8547f4a8 r5:00000018 r4:82c01240 [ 215.321776][ T5011] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 215.322194][ T5011] [<804cd580>] (__kmalloc_noprof) from [<80750ed8>] (tomoyo_encode2+0x64/0xf0) [ 215.322617][ T5011] r10:00000fff r9:82f19400 r8:00000000 r7:84c0dcc0 r6:8547f4a8 r5:8493effd [ 215.322996][ T5011] r4:8493eff0 [ 215.323222][ T5011] [<80750e74>] (tomoyo_encode2) from [<80750f88>] (tomoyo_encode+0x24/0x30) [ 215.323616][ T5011] r9:82f19400 r8:00000000 r7:84c0dcc0 r6:8547f4a8 r5:00001000 r4:8493eff1 [ 215.323957][ T5011] [<80750f64>] (tomoyo_encode) from [<80751014>] (tomoyo_realpath_from_path+0x80/0x17c) [ 215.324379][ T5011] r5:00001000 r4:8493e000 [ 215.324621][ T5011] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 215.325082][ T5011] r10:84748000 r9:00000000 r8:00000003 r7:00005451 r6:00000004 r5:81ad1828 [ 215.325870][ T5011] r4:8547f4a8 r3:824ba340 [ 215.326106][ T5011] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 215.326568][ T5011] r9:8547f480 r8:00000003 r7:00000000 r6:00000000 r5:00005451 r4:8547f480 [ 215.326920][ T5011] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 215.327419][ T5011] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 215.327864][ T5011] r7:00000000 r6:8547f481 r5:00000000 r4:00005451 [ 215.328170][ T5011] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 215.328789][ T5011] Exception stack(0xe077dfa8 to 0xe077dff0) [ 215.329191][ T5011] dfa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 215.329600][ T5011] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76bb60bc [ 215.329978][ T5011] dfe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 215.330289][ T5011] r10:00000036 r9:84748000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 215.330626][ T5011] r4:00000000 [ 215.400555][ T5011] ERROR: Out of memory at tomoyo_realpath_from_path. [ 216.524767][ T31] audit: type=1400 audit(216.430:247): avc: denied { ioctl } for pid=5021 comm="syz.0.291" path="socket:[5468]" dev="sockfs" ino=5468 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 217.853623][ T4609] veth0_vlan: entered promiscuous mode [ 217.878211][ T4609] veth1_vlan: entered promiscuous mode [ 217.977171][ T4609] veth0_macvtap: entered promiscuous mode [ 218.001816][ T4609] veth1_macvtap: entered promiscuous mode [ 218.120997][ T4609] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.121888][ T4609] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.122442][ T4609] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.122977][ T4609] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.107840][ T5051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=5051 comm=syz.0.299 [ 219.647828][ T31] audit: type=1400 audit(219.550:248): avc: denied { create } for pid=5068 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 221.065838][ T5087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=5087 comm=syz.1.313 [ 221.835930][ T2964] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 221.853786][ T2964] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 221.867384][ T2964] bond0 (unregistering): Released all slaves [ 221.969848][ T2964] hsr_slave_0: left promiscuous mode [ 221.974453][ T2964] hsr_slave_1: left promiscuous mode [ 221.987543][ T2964] veth1_macvtap: left promiscuous mode [ 221.988371][ T2964] veth0_macvtap: left promiscuous mode [ 221.993936][ T2964] veth1_vlan: left promiscuous mode [ 221.995476][ T2964] veth0_vlan: left promiscuous mode [ 222.811742][ T5107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=5107 comm=syz.1.316 [ 223.021060][ T31] audit: type=1400 audit(222.930:249): avc: denied { write } for pid=5110 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 223.358888][ C0] hrtimer: interrupt took 495200 ns [ 223.780779][ T5126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=5126 comm=syz.0.328 [ 224.295574][ T5133] FAULT_INJECTION: forcing a failure. [ 224.295574][ T5133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.296283][ T5133] CPU: 1 UID: 0 PID: 5133 Comm: syz.0.331 Not tainted 6.12.0-rc2-syzkaller #0 [ 224.296828][ T5133] Hardware name: ARM-Versatile Express [ 224.297061][ T5133] Call trace: [ 224.297507][ T5133] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 224.298047][ T5133] r7:00000000 r6:00000000 r5:60000013 r4:8203d294 [ 224.298739][ T5133] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 224.299769][ T5133] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 224.300445][ T5133] r5:00000000 r4:8274e1c4 [ 224.300734][ T5133] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 224.301262][ T5133] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 224.301678][ T5133] r6:00000000 r5:eae15f68 r4:00000002 [ 224.302024][ T5133] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 224.302984][ T5133] [<808e5394>] (should_fail_usercopy) from [<8054e6d4>] (simple_read_from_buffer+0x8c/0x134) [ 224.303631][ T5133] [<8054e648>] (simple_read_from_buffer) from [<805c31d4>] (proc_fail_nth_read+0xb8/0x100) [ 224.304228][ T5133] r10:00000001 r9:805c311c r8:00000002 r7:eae15f68 r6:0000000f r5:76bb5f30 [ 224.304649][ T5133] r4:84150c00 r3:eae15e9f [ 224.304903][ T5133] [<805c311c>] (proc_fail_nth_read) from [<80515e4c>] (vfs_read+0x98/0x324) [ 224.305659][ T5133] r8:76bb5f30 r7:eae15f68 r6:84150c00 r5:0000000f r4:8547f180 [ 224.305977][ T5133] [<80515db4>] (vfs_read) from [<80516afc>] (ksys_read+0x78/0xf8) [ 224.306365][ T5133] r10:00000003 r9:84150c00 r8:8020029c r7:00000000 r6:00000000 r5:8547f180 [ 224.306792][ T5133] r4:8547f183 [ 224.307124][ T5133] [<80516a84>] (ksys_read) from [<80516b8c>] (sys_read+0x10/0x14) [ 224.307510][ T5133] r7:00000003 r6:00000006 r5:76bb5f30 r4:0000000f [ 224.307829][ T5133] [<80516b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 224.308294][ T5133] Exception stack(0xeae15fa8 to 0xeae15ff0) [ 224.308938][ T5133] 5fa0: 0000000f 76bb5f30 00000006 76bb5f30 0000000f 00000000 [ 224.309812][ T5133] 5fc0: 0000000f 76bb5f30 00000006 00000003 00000000 00006364 003d0f00 76bb60bc [ 224.310205][ T5133] 5fe0: 00000158 76bb5ed0 000d8408 00130d94 [ 226.114214][ T31] audit: type=1400 audit(226.020:250): avc: denied { getopt } for pid=5175 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 226.127012][ T5176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5176 comm=syz.1.348 [ 226.646455][ T31] audit: type=1400 audit(226.550:251): avc: denied { setattr } for pid=5188 comm="syz.0.354" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 227.887582][ T5222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5222 comm=syz.1.367 [ 230.386268][ T5264] FAULT_INJECTION: forcing a failure. [ 230.386268][ T5264] name failslab, interval 1, probability 0, space 0, times 0 [ 230.387181][ T5264] CPU: 0 UID: 0 PID: 5264 Comm: syz.1.386 Not tainted 6.12.0-rc2-syzkaller #0 [ 230.387583][ T5264] Hardware name: ARM-Versatile Express [ 230.387853][ T5264] Call trace: [ 230.388105][ T5264] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 230.388604][ T5264] r7:00000c40 r6:8538ac28 r5:60000013 r4:8203d294 [ 230.389187][ T5264] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 230.389652][ T5264] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 230.390076][ T5264] r5:00000000 r4:82718bdc [ 230.390329][ T5264] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 230.390750][ T5264] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 230.391264][ T5264] r6:8538ac28 r5:00001000 r4:82c016c0 [ 230.391536][ T5264] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 230.391977][ T5264] [<804cd580>] (__kmalloc_noprof) from [<80750fd0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 230.392470][ T5264] r10:835f8000 r9:82f18000 r8:00000000 r7:84c17b28 r6:8538ac28 r5:00001000 [ 230.392839][ T5264] r4:00000000 [ 230.393053][ T5264] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 230.393567][ T5264] r10:835f8000 r9:00000000 r8:00000003 r7:402c542c r6:00000004 r5:81ad1828 [ 230.393966][ T5264] r4:8538ac28 r3:824ba340 [ 230.394238][ T5264] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 230.394758][ T5264] r9:8538ac00 r8:00000003 r7:00000000 r6:00000000 r5:402c542c r4:8538ac00 [ 230.395175][ T5264] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 230.395600][ T5264] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 230.396055][ T5264] r7:00000000 r6:8538ac01 r5:00000000 r4:402c542c [ 230.396370][ T5264] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 230.396973][ T5264] Exception stack(0xeb601fa8 to 0xeb601ff0) [ 230.397484][ T5264] 1fa0: 00000000 00000000 00000003 402c542c 00000000 00000000 [ 230.398142][ T5264] 1fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 230.399288][ T5264] 1fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 230.399596][ T5264] r10:00000036 r9:835f8000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 230.400016][ T5264] r4:00000000 [ 230.449406][ T5264] ERROR: Out of memory at tomoyo_realpath_from_path. [ 232.071085][ T5299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5299 comm=syz.0.401 [ 232.091131][ T5299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5299 comm=syz.0.401 [ 232.252357][ T5305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=5305 comm=syz.0.403 [ 232.620015][ T5314] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5314 comm=syz.0.406 [ 233.683744][ T31] audit: type=1400 audit(233.590:252): avc: denied { setattr } for pid=5348 comm="syz.1.418" name="prev" dev="proc" ino=6848 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 233.820029][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 234.048282][ T8] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 234.049805][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 234.050251][ T8] usb 1-1: Product: syz [ 234.050471][ T8] usb 1-1: Manufacturer: syz [ 234.050664][ T8] usb 1-1: SerialNumber: syz [ 234.512703][ T5367] FAULT_INJECTION: forcing a failure. [ 234.512703][ T5367] name failslab, interval 1, probability 0, space 0, times 0 [ 234.515610][ T5367] CPU: 1 UID: 0 PID: 5367 Comm: syz.1.424 Not tainted 6.12.0-rc2-syzkaller #0 [ 234.516264][ T5367] Hardware name: ARM-Versatile Express [ 234.516699][ T5367] Call trace: [ 234.517179][ T5367] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 234.518414][ T5367] r7:00000c40 r6:8451db68 r5:60000013 r4:8203d294 [ 234.519094][ T5367] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 234.519453][ T5367] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 234.519789][ T5367] r5:00000000 r4:82718bdc [ 234.519981][ T5367] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 234.520331][ T5367] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 234.520679][ T5367] r6:8451db68 r5:00001000 r4:82c016c0 [ 234.520900][ T5367] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 234.521259][ T5367] [<804cd580>] (__kmalloc_noprof) from [<80750fd0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 234.521675][ T5367] r10:835fa400 r9:82f19400 r8:00000000 r7:84c0d908 r6:8451db68 r5:00001000 [ 234.521989][ T5367] r4:00000000 [ 234.522169][ T5367] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 234.522572][ T5367] r10:835fa400 r9:00000000 r8:00000006 r7:00008924 r6:00000004 r5:81ad1828 [ 234.522878][ T5367] r4:8451db68 r3:824ba340 [ 234.523110][ T5367] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 234.523498][ T5367] r9:8451db40 r8:00000006 r7:200000c0 r6:200000c0 r5:00008924 r4:8451db40 [ 234.523790][ T5367] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 234.524162][ T5367] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 234.524586][ T5367] r7:200000c0 r6:8451db41 r5:00000000 r4:00008924 [ 234.524852][ T5367] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 234.525311][ T5367] Exception stack(0xec3b5fa8 to 0xec3b5ff0) [ 234.525716][ T5367] 5fa0: 00000000 00000000 00000006 00008924 200000c0 00000000 [ 234.526073][ T5367] 5fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 234.526399][ T5367] 5fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 234.526674][ T5367] r10:00000036 r9:835fa400 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 234.527135][ T5367] r4:00000000 [ 234.529629][ T5367] ERROR: Out of memory at tomoyo_realpath_from_path. [ 234.746291][ T31] audit: type=1400 audit(234.650:253): avc: denied { lock } for pid=5370 comm="syz.1.426" path="socket:[6135]" dev="sockfs" ino=6135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 236.090321][ T31] audit: type=1400 audit(236.000:254): avc: denied { connect } for pid=5375 comm="syz.1.428" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 239.259536][ T31] audit: type=1400 audit(239.160:255): avc: denied { lock } for pid=5384 comm="syz.1.431" path="/dev/vhost-net" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.675767][ T5393] FAULT_INJECTION: forcing a failure. [ 239.675767][ T5393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.677721][ T5393] CPU: 0 UID: 0 PID: 5393 Comm: syz.1.435 Not tainted 6.12.0-rc2-syzkaller #0 [ 239.678068][ T5393] Hardware name: ARM-Versatile Express [ 239.678318][ T5393] Call trace: [ 239.678605][ T5393] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 239.679220][ T5393] r7:200000c0 r6:ec5b1d5c r5:60000013 r4:8203d294 [ 239.679504][ T5393] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 239.679882][ T5393] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 239.680262][ T5393] r5:00000000 r4:8274e1c4 [ 239.680476][ T5393] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 239.680844][ T5393] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 239.681221][ T5393] r6:ec5b1d5c r5:00000004 r4:00000004 [ 239.681553][ T5393] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 239.681921][ T5393] [<808e5394>] (should_fail_usercopy) from [<81775d70>] (copy_from_sockptr_offset.constprop.0+0x60/0x114) [ 239.683327][ T5393] [<81775d10>] (copy_from_sockptr_offset.constprop.0) from [<817766fc>] (do_ipv6_setsockopt+0x210/0x182c) [ 239.684204][ T5393] r8:200000c0 r7:0000002a r6:849c5400 r5:849c5858 r4:00000001 [ 239.684553][ T5393] [<817764f0>] (do_ipv6_setsockopt) from [<81777d78>] (ipv6_setsockopt+0x60/0xbc) [ 239.685023][ T5393] r10:00000126 r9:81487598 r8:8474a400 r7:00000084 r6:00000084 r5:0000002a [ 239.685361][ T5393] r4:849c5400 [ 239.685552][ T5393] [<81777d1c>] (ipv6_setsockopt) from [<818699a8>] (sctp_setsockopt+0x70/0x2680) [ 239.685978][ T5393] r6:00000029 r5:0000002a r4:81777d18 [ 239.686216][ T5393] [<8186993c>] (sctp_setsockopt) from [<81487598>] (sock_common_setsockopt+0x38/0x40) [ 239.686631][ T5393] r10:00000126 r9:8474a400 r8:8020029c r7:00000000 r6:832c0f00 r5:00000000 [ 239.686998][ T5393] r4:81869938 [ 239.687184][ T5393] [<81487564>] (sock_common_setsockopt) from [<81482bf4>] (do_sock_setsockopt+0xb0/0x17c) [ 239.687586][ T5393] r4:81487560 [ 239.687751][ T5393] [<81482b44>] (do_sock_setsockopt) from [<814860b8>] (sys_setsockopt+0x78/0xbc) [ 239.688216][ T5393] r6:832c0f00 r5:0000002a r4:00000029 [ 239.688463][ T5393] [<81486040>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 239.689191][ T5393] Exception stack(0xec5b1fa8 to 0xec5b1ff0) [ 239.689696][ T5393] 1fa0: 00000084 00000000 00000004 00000029 0000002a 200000c0 [ 239.690081][ T5393] 1fc0: 00000084 00000000 00130e70 00000126 00000000 00006364 003d0f00 76b890bc [ 239.690415][ T5393] 1fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 239.690683][ T5393] r7:00000126 r6:00130e70 r5:00000000 r4:00000084 [ 240.016376][ T31] audit: type=1400 audit(239.920:256): avc: denied { unmount } for pid=5400 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 240.621282][ T31] audit: type=1400 audit(240.530:257): avc: denied { bind } for pid=5412 comm="syz.1.445" lport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 240.622407][ T31] audit: type=1400 audit(240.530:258): avc: denied { name_bind } for pid=5412 comm="syz.1.445" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 240.623348][ T31] audit: type=1400 audit(240.530:259): avc: denied { node_bind } for pid=5412 comm="syz.1.445" saddr=fc01::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 240.648055][ T31] audit: type=1400 audit(240.550:260): avc: denied { remove_name } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 240.650367][ T31] audit: type=1400 audit(240.550:261): avc: denied { rename } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 241.750287][ T5426] FAULT_INJECTION: forcing a failure. [ 241.750287][ T5426] name failslab, interval 1, probability 0, space 0, times 0 [ 241.752090][ T5426] CPU: 0 UID: 0 PID: 5426 Comm: syz.1.450 Not tainted 6.12.0-rc2-syzkaller #0 [ 241.752645][ T5426] Hardware name: ARM-Versatile Express [ 241.752909][ T5426] Call trace: [ 241.753163][ T5426] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 241.753611][ T5426] r7:00000c40 r6:8538a7a8 r5:60000013 r4:8203d294 [ 241.753904][ T5426] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 241.754335][ T5426] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 241.755062][ T5426] r5:00000000 r4:82718bdc [ 241.755417][ T5426] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 241.756025][ T5426] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 241.756457][ T5426] r6:8538a7a8 r5:00001000 r4:82c016c0 [ 241.756718][ T5426] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 241.757199][ T5426] [<804cd580>] (__kmalloc_noprof) from [<80750fd0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 241.757666][ T5426] r10:8474d400 r9:82f19400 r8:00000000 r7:84c105d8 r6:8538a7a8 r5:00001000 [ 241.758025][ T5426] r4:00000000 [ 241.758248][ T5426] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 241.759250][ T5426] r10:8474d400 r9:00000000 r8:00000003 r7:0000891c r6:00000004 r5:81ad1828 [ 241.759981][ T5426] r4:8538a7a8 r3:824ba340 [ 241.760270][ T5426] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 241.760746][ T5426] r9:8538a780 r8:00000003 r7:20000000 r6:20000000 r5:0000891c r4:8538a780 [ 241.761145][ T5426] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 241.761618][ T5426] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 241.762060][ T5426] r7:20000000 r6:8538a781 r5:00000000 r4:0000891c [ 241.762370][ T5426] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 241.762779][ T5426] Exception stack(0xec74dfa8 to 0xec74dff0) [ 241.763139][ T5426] dfa0: 00000000 00000000 00000003 0000891c 20000000 00000000 [ 241.763546][ T5426] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 241.763940][ T5426] dfe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 241.764277][ T5426] r10:00000036 r9:8474d400 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 241.764686][ T5426] r4:00000000 [ 241.771903][ T5426] ERROR: Out of memory at tomoyo_realpath_from_path. [ 242.852633][ T5441] FAULT_INJECTION: forcing a failure. [ 242.852633][ T5441] name failslab, interval 1, probability 0, space 0, times 0 [ 242.853234][ T5441] CPU: 1 UID: 0 PID: 5441 Comm: syz.1.455 Not tainted 6.12.0-rc2-syzkaller #0 [ 242.853571][ T5441] Hardware name: ARM-Versatile Express [ 242.853795][ T5441] Call trace: [ 242.854001][ T5441] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 242.854342][ T5441] r7:00000c40 r6:8451d028 r5:60000013 r4:8203d294 [ 242.854569][ T5441] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 242.854882][ T5441] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 242.855240][ T5441] r5:00000000 r4:82718bdc [ 242.855427][ T5441] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 242.855740][ T5441] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 242.856067][ T5441] r6:8451d028 r5:00001000 r4:82c016c0 [ 242.856276][ T5441] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 242.856589][ T5441] [<804cd580>] (__kmalloc_noprof) from [<80750fd0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 242.857007][ T5441] r10:835f8000 r9:82c9fc00 r8:00000000 r7:83006aa0 r6:8451d028 r5:00001000 [ 242.857295][ T5441] r4:00000000 [ 242.857461][ T5441] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 242.857858][ T5441] r10:835f8000 r9:00000000 r8:00000003 r7:00005451 r6:00000004 r5:81ad1828 [ 242.858235][ T5441] r4:8451d028 r3:824ba340 [ 242.858448][ T5441] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 242.859372][ T5441] r9:8451d000 r8:00000003 r7:00000000 r6:00000000 r5:00005451 r4:8451d000 [ 242.859985][ T5441] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 242.860385][ T5441] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 242.860759][ T5441] r7:00000000 r6:8451d001 r5:00000000 r4:00005451 [ 242.861045][ T5441] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 242.861395][ T5441] Exception stack(0xec455fa8 to 0xec455ff0) [ 242.861655][ T5441] 5fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 242.862012][ T5441] 5fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 242.862352][ T5441] 5fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 242.862623][ T5441] r10:00000036 r9:835f8000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 242.862981][ T5441] r4:00000000 [ 242.871289][ T5441] ERROR: Out of memory at tomoyo_realpath_from_path. [ 243.096342][ T31] audit: type=1400 audit(243.000:262): avc: denied { getopt } for pid=5444 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 243.099927][ T31] audit: type=1400 audit(243.010:263): avc: denied { bind } for pid=5444 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 243.121595][ T31] audit: type=1400 audit(243.030:264): avc: denied { ioctl } for pid=5444 comm="syz.1.457" path="socket:[7380]" dev="sockfs" ino=7380 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 243.536384][ T9] usb 1-1: USB disconnect, device number 2 [ 243.709588][ T100] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 243.877545][ T100] usb 2-1: not running at top speed; connect to a high speed hub [ 243.893813][ T100] usb 2-1: config 1 interface 0 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 243.895986][ T100] usb 2-1: config 1 interface 0 has no altsetting 0 [ 243.914565][ T100] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 243.915147][ T100] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 243.915499][ T100] usb 2-1: Product: syz [ 243.915721][ T100] usb 2-1: Manufacturer: syz [ 243.915947][ T100] usb 2-1: SerialNumber: syz [ 244.187690][ T100] usb 2-1: USB disconnect, device number 2 [ 246.610361][ T5477] capability: warning: `syz.0.462' uses 32-bit capabilities (legacy support in use) [ 246.635292][ T31] audit: type=1400 audit(246.540:265): avc: denied { accept } for pid=5476 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 246.742649][ T31] audit: type=1400 audit(246.650:266): avc: denied { create } for pid=5480 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 247.200375][ T5489] FAULT_INJECTION: forcing a failure. [ 247.200375][ T5489] name failslab, interval 1, probability 0, space 0, times 0 [ 247.201126][ T5489] CPU: 0 UID: 0 PID: 5489 Comm: syz.0.465 Not tainted 6.12.0-rc2-syzkaller #0 [ 247.201500][ T5489] Hardware name: ARM-Versatile Express [ 247.201768][ T5489] Call trace: [ 247.202005][ T5489] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 247.202438][ T5489] r7:00000c40 r6:84bd7ce8 r5:60000013 r4:8203d294 [ 247.202707][ T5489] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 247.203128][ T5489] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 247.203484][ T5489] r5:00000000 r4:82718bdc [ 247.203658][ T5489] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 247.204049][ T5489] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 247.204437][ T5489] r6:84bd7ce8 r5:00001000 r4:82c016c0 [ 247.204750][ T5489] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 247.205195][ T5489] [<804cd580>] (__kmalloc_noprof) from [<80750fd0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 247.205739][ T5489] r10:835f8000 r9:85190c00 r8:00000000 r7:8309add0 r6:84bd7ce8 r5:00001000 [ 247.206164][ T5489] r4:00000000 [ 247.206349][ T5489] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 247.206799][ T5489] r10:835f8000 r9:00000000 r8:00000003 r7:00004b72 r6:00000004 r5:81ad1828 [ 247.207156][ T5489] r4:84bd7ce8 r3:824ba340 [ 247.207353][ T5489] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 247.207710][ T5489] r9:84bd7cc0 r8:00000003 r7:00000000 r6:00000000 r5:00004b72 r4:84bd7cc0 [ 247.208001][ T5489] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 247.208347][ T5489] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 247.209085][ T5489] r7:00000000 r6:84bd7cc1 r5:00000000 r4:00004b72 [ 247.209764][ T5489] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 247.210197][ T5489] Exception stack(0xec9cdfa8 to 0xec9cdff0) [ 247.210579][ T5489] dfa0: 00000000 00000000 00000003 00004b72 00000000 00000000 [ 247.211028][ T5489] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76bb60bc [ 247.211451][ T5489] dfe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 247.211845][ T5489] r10:00000036 r9:835f8000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 247.212274][ T5489] r4:00000000 [ 247.240900][ T5489] ERROR: Out of memory at tomoyo_realpath_from_path. [ 247.616765][ T5499] FAULT_INJECTION: forcing a failure. [ 247.616765][ T5499] name failslab, interval 1, probability 0, space 0, times 0 [ 247.623370][ T5499] CPU: 0 UID: 0 PID: 5499 Comm: syz.1.468 Not tainted 6.12.0-rc2-syzkaller #0 [ 247.624055][ T5499] Hardware name: ARM-Versatile Express [ 247.624265][ T5499] Call trace: [ 247.624482][ T5499] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 247.624880][ T5499] r7:00000d40 r6:84bd7028 r5:60000013 r4:8203d294 [ 247.625150][ T5499] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 247.625502][ T5499] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 247.625834][ T5499] r5:00000000 r4:82718bdc [ 247.626016][ T5499] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 247.626369][ T5499] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 247.626721][ T5499] r6:84bd7028 r5:0000001d r4:82c01240 [ 247.626966][ T5499] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 247.627679][ T5499] [<804cd580>] (__kmalloc_noprof) from [<80750ed8>] (tomoyo_encode2+0x64/0xf0) [ 247.628280][ T5499] r10:00000fff r9:82f18000 r8:00000000 r7:84c17b28 r6:84bd7028 r5:846d7ffc [ 247.629077][ T5499] r4:846d7fea [ 247.629309][ T5499] [<80750e74>] (tomoyo_encode2) from [<80750f88>] (tomoyo_encode+0x24/0x30) [ 247.629847][ T5499] r9:82f18000 r8:00000000 r7:84c17b28 r6:84bd7028 r5:00001000 r4:846d7feb [ 247.630313][ T5499] [<80750f64>] (tomoyo_encode) from [<80751014>] (tomoyo_realpath_from_path+0x80/0x17c) [ 247.630737][ T5499] r5:00001000 r4:846d7000 [ 247.630979][ T5499] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 247.631475][ T5499] r10:84748000 r9:00000000 r8:00000003 r7:402c542c r6:00000004 r5:81ad1828 [ 247.631815][ T5499] r4:84bd7028 r3:824ba340 [ 247.632029][ T5499] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 247.632460][ T5499] r9:84bd7000 r8:00000003 r7:00000000 r6:00000000 r5:402c542c r4:84bd7000 [ 247.632799][ T5499] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 247.633225][ T5499] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 247.633603][ T5499] r7:00000000 r6:84bd7001 r5:00000000 r4:402c542c [ 247.633878][ T5499] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 247.634286][ T5499] Exception stack(0xec975fa8 to 0xec975ff0) [ 247.634699][ T5499] 5fa0: 00000000 00000000 00000003 402c542c 00000000 00000000 [ 247.635184][ T5499] 5fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 247.635592][ T5499] 5fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 247.635873][ T5499] r10:00000036 r9:84748000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 247.636230][ T5499] r4:00000000 [ 247.638015][ T5499] ERROR: Out of memory at tomoyo_realpath_from_path. [ 247.659849][ T3787] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 247.821207][ T3787] usb 1-1: Using ep0 maxpacket: 32 [ 247.853051][ T3787] usb 1-1: config 1 interface 0 altsetting 5 bulk endpoint 0x1 has invalid maxpacket 32 [ 247.853690][ T3787] usb 1-1: config 1 interface 0 altsetting 5 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 247.854159][ T3787] usb 1-1: config 1 interface 0 has no altsetting 0 [ 247.887505][ T3787] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 247.888106][ T3787] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 247.888434][ T3787] usb 1-1: Product: ӿ [ 247.889169][ T3787] usb 1-1: Manufacturer: ⠊ [ 247.889399][ T3787] usb 1-1: SerialNumber: ᐇ [ 247.907326][ T5492] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 248.410877][ T5492] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 248.424296][ T5492] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 248.459709][ T5492] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 248.461944][ T5492] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 248.559703][ T3787] usb 1-1: USB disconnect, device number 3 [ 248.713519][ T31] audit: type=1400 audit(248.620:267): avc: denied { audit_write } for pid=5507 comm="syz.1.471" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 248.719169][ T31] audit: type=1107 audit(248.620:268): pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='*9O!i<%Jx˜ZKtᜲ=Z*_YK5+Sn+ϱM?c*~XY`BZ!34ܨYùVFz|;S3A@O7r+&C&K VABZp#$SҔɮ9 ~f!L3]߃›6 XxRDžG]E$P3'}f' [ 251.186988][ T5569] FAULT_INJECTION: forcing a failure. [ 251.186988][ T5569] name failslab, interval 1, probability 0, space 0, times 0 [ 251.187763][ T5569] CPU: 0 UID: 0 PID: 5569 Comm: syz.0.490 Not tainted 6.12.0-rc2-syzkaller #0 [ 251.188156][ T5569] Hardware name: ARM-Versatile Express [ 251.188410][ T5569] Call trace: [ 251.188841][ T5569] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 251.189396][ T5569] r7:84748c00 r6:00000cc0 r5:60000013 r4:8203d294 [ 251.189732][ T5569] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 251.190122][ T5569] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 251.190504][ T5569] r5:00000000 r4:82718bdc [ 251.190736][ T5569] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 251.191176][ T5569] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 251.191603][ T5569] r6:00000cc0 r5:ffffffff r4:82ed9240 [ 251.191881][ T5569] [<804e818c>] (should_failslab) from [<804ccc2c>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 251.192331][ T5569] [<804ccbdc>] (kmem_cache_alloc_node_noprof) from [<81490f70>] (__alloc_skb+0x138/0x160) [ 251.192771][ T5569] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82ed9240 r5:ffffffff [ 251.193139][ T5569] r4:82606000 [ 251.193347][ T5569] [<81490e38>] (__alloc_skb) from [<815a642c>] (netlink_alloc_large_skb+0x88/0xa0) [ 251.193770][ T5569] r8:00000000 r7:846d8400 r6:00000053 r5:832c1b80 r4:00000180 [ 251.194088][ T5569] [<815a63a4>] (netlink_alloc_large_skb) from [<815a6a34>] (netlink_sendmsg+0x134/0x43c) [ 251.194513][ T5569] r5:832c1b80 r4:ecbcde68 [ 251.194746][ T5569] [<815a6900>] (netlink_sendmsg) from [<81483708>] (__sock_sendmsg+0x44/0x78) [ 251.195200][ T5569] r10:81c49f80 r9:20001880 r8:00000000 r7:832c1b80 r6:832c1b80 r5:ecbcde68 [ 251.195570][ T5569] r4:00000000 [ 251.195833][ T5569] [<814836c4>] (__sock_sendmsg) from [<814837dc>] (sock_write_iter+0xa0/0xfc) [ 251.196267][ T5569] r7:832c1b80 r6:84bd7540 r5:ecbcdf08 r4:ecbcdef0 [ 251.196535][ T5569] [<8148373c>] (sock_write_iter) from [<805169e0>] (vfs_write+0x3a8/0x44c) [ 251.196969][ T5569] r7:84748c00 r6:00000053 r5:84bd7540 r4:00000000 [ 251.197258][ T5569] [<80516638>] (vfs_write) from [<80516c54>] (ksys_write+0xc4/0xf8) [ 251.197648][ T5569] r10:00000004 r9:84748c00 r8:8020029c r7:00000053 r6:20001880 r5:84bd7540 [ 251.198159][ T5569] r4:84bd7541 [ 251.198463][ T5569] [<80516b90>] (ksys_write) from [<80516c98>] (sys_write+0x10/0x14) [ 251.199059][ T5569] r7:00000004 r6:00130e70 r5:00000000 r4:00000000 [ 251.199456][ T5569] [<80516c88>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 251.199942][ T5569] Exception stack(0xecbcdfa8 to 0xecbcdff0) [ 251.200251][ T5569] dfa0: 00000000 00000000 00000004 20001880 00000053 00000000 [ 251.200622][ T5569] dfc0: 00000000 00000000 00130e70 00000004 00000000 00006364 003d0f00 76bb60bc [ 251.201019][ T5569] dfe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 253.400703][ T31] audit: type=1400 audit(253.310:269): avc: denied { connect } for pid=5607 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 254.202765][ T31] audit: type=1400 audit(254.110:270): avc: denied { block_suspend } for pid=5616 comm="syz.0.510" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.352369][ T5630] FAULT_INJECTION: forcing a failure. [ 254.352369][ T5630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 254.354240][ T5630] CPU: 0 UID: 0 PID: 5630 Comm: syz.0.512 Not tainted 6.12.0-rc2-syzkaller #0 [ 254.356058][ T5630] Hardware name: ARM-Versatile Express [ 254.358086][ T5630] Call trace: [ 254.359453][ T5630] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 254.362637][ T5630] r7:200000c0 r6:eceedca0 r5:60000013 r4:8203d294 [ 254.364936][ T5630] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 254.373310][ T5630] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 254.373819][ T5630] r5:00000000 r4:8274e1c4 [ 254.374060][ T5630] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 254.374453][ T5630] [<808e51a0>] (should_fail_ex) from [<808e5390>] (should_fail+0x14/0x18) [ 254.374839][ T5630] r6:eceedca0 r5:00000084 r4:00000084 [ 254.375142][ T5630] [<808e537c>] (should_fail) from [<808e53b0>] (should_fail_usercopy+0x1c/0x20) [ 254.375501][ T5630] [<808e5394>] (should_fail_usercopy) from [<81775d70>] (copy_from_sockptr_offset.constprop.0+0x60/0x114) [ 254.376123][ T5630] [<81775d10>] (copy_from_sockptr_offset.constprop.0) from [<81775fc0>] (ipv6_mcast_join_leave+0x68/0xd8) [ 254.376563][ T5630] r8:00000000 r7:0000002a r6:0000002a r5:849c5400 r4:eceedc90 [ 254.376883][ T5630] [<81775f58>] (ipv6_mcast_join_leave) from [<81776d7c>] (do_ipv6_setsockopt+0x890/0x182c) [ 254.377278][ T5630] r6:849c5400 r5:849c5858 r4:00000001 [ 254.377504][ T5630] [<817764f0>] (do_ipv6_setsockopt) from [<81777d78>] (ipv6_setsockopt+0x60/0xbc) [ 254.377885][ T5630] r10:00000126 r9:81487598 r8:84154800 r7:00000084 r6:00000084 r5:0000002a [ 254.378200][ T5630] r4:849c5400 [ 254.378376][ T5630] [<81777d1c>] (ipv6_setsockopt) from [<818699a8>] (sctp_setsockopt+0x70/0x2680) [ 254.379184][ T5630] r6:00000029 r5:0000002a r4:81777d18 [ 254.379521][ T5630] [<8186993c>] (sctp_setsockopt) from [<81487598>] (sock_common_setsockopt+0x38/0x40) [ 254.380101][ T5630] r10:00000126 r9:84154800 r8:8020029c r7:00000000 r6:832c0500 r5:00000000 [ 254.380530][ T5630] r4:81869938 [ 254.380710][ T5630] [<81487564>] (sock_common_setsockopt) from [<81482bf4>] (do_sock_setsockopt+0xb0/0x17c) [ 254.381108][ T5630] r4:81487560 [ 254.381288][ T5630] [<81482b44>] (do_sock_setsockopt) from [<814860b8>] (sys_setsockopt+0x78/0xbc) [ 254.381666][ T5630] r6:832c0500 r5:0000002a r4:00000029 [ 254.381907][ T5630] [<81486040>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 254.382266][ T5630] Exception stack(0xeceedfa8 to 0xeceedff0) [ 254.384299][ T5630] dfa0: 00000084 00000000 00000004 00000029 0000002a 200000c0 [ 254.384714][ T5630] dfc0: 00000084 00000000 00130e70 00000126 00000000 00006364 003d0f00 76bb60bc [ 254.385141][ T5630] dfe0: 76bb5ec0 76bb5eb0 00018af8 00132ec0 [ 254.385429][ T5630] r7:00000126 r6:00130e70 r5:00000000 r4:00000084 [ 255.270104][ T8] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 255.469730][ T8] usb 1-1: invalid descriptor for config index 0: type = 0x2, length = 130 [ 255.470630][ T8] usb 1-1: can't read configurations, error -22 [ 255.609429][ T8] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 255.809739][ T8] usb 1-1: invalid descriptor for config index 0: type = 0x2, length = 130 [ 255.810341][ T8] usb 1-1: can't read configurations, error -22 [ 255.811970][ T8] usb usb1-port1: attempt power cycle [ 256.159596][ T8] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 256.206701][ T8] usb 1-1: invalid descriptor for config index 0: type = 0x2, length = 130 [ 256.207314][ T8] usb 1-1: can't read configurations, error -22 [ 256.321384][ T31] audit: type=1400 audit(256.230:271): avc: denied { getopt } for pid=5664 comm="syz.1.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 256.341285][ T8] usb 1-1: new low-speed USB device number 7 using dummy_hcd [ 256.366135][ T8] usb 1-1: invalid descriptor for config index 0: type = 0x2, length = 130 [ 256.366599][ T8] usb 1-1: can't read configurations, error -22 [ 256.367648][ T8] usb usb1-port1: unable to enumerate USB device [ 258.524938][ T5684] FAULT_INJECTION: forcing a failure. [ 258.524938][ T5684] name failslab, interval 1, probability 0, space 0, times 0 [ 258.525348][ T5684] CPU: 0 UID: 0 PID: 5684 Comm: syz.1.533 Not tainted 6.12.0-rc2-syzkaller #0 [ 258.525552][ T5684] Hardware name: ARM-Versatile Express [ 258.525658][ T5684] Call trace: [ 258.525786][ T5684] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 258.526022][ T5684] r7:00000d40 r6:84bd7da8 r5:60000013 r4:8203d294 [ 258.526178][ T5684] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 258.526377][ T5684] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 258.526631][ T5684] r5:00000000 r4:82718bdc [ 258.526819][ T5684] [<819b740c>] (dump_stack) from [<808e532c>] (should_fail_ex+0x18c/0x1dc) [ 258.527291][ T5684] [<808e51a0>] (should_fail_ex) from [<804e81f8>] (should_failslab+0x6c/0x94) [ 258.527645][ T5684] r6:84bd7da8 r5:0000001e r4:82c01240 [ 258.527865][ T5684] [<804e818c>] (should_failslab) from [<804cd61c>] (__kmalloc_noprof+0x9c/0x458) [ 258.528095][ T5684] [<804cd580>] (__kmalloc_noprof) from [<80750ed8>] (tomoyo_encode2+0x64/0xf0) [ 258.528303][ T5684] r10:00000fff r9:85180c00 r8:00000000 r7:831a57f8 r6:84bd7da8 r5:846d1ffd [ 258.528629][ T5684] r4:846d1fea [ 258.528857][ T5684] [<80750e74>] (tomoyo_encode2) from [<80750f88>] (tomoyo_encode+0x24/0x30) [ 258.529073][ T5684] r9:85180c00 r8:00000000 r7:831a57f8 r6:84bd7da8 r5:00001000 r4:846d1feb [ 258.529266][ T5684] [<80750f64>] (tomoyo_encode) from [<80751014>] (tomoyo_realpath_from_path+0x80/0x17c) [ 258.529489][ T5684] r5:00001000 r4:846d1000 [ 258.529607][ T5684] [<80750f94>] (tomoyo_realpath_from_path) from [<8074d114>] (tomoyo_path_number_perm+0xcc/0x22c) [ 258.529870][ T5684] r10:84748000 r9:00000000 r8:00000003 r7:00004b72 r6:00000004 r5:81ad1828 [ 258.530060][ T5684] r4:84bd7da8 r3:824ba340 [ 258.530238][ T5684] [<8074d048>] (tomoyo_path_number_perm) from [<807519e0>] (tomoyo_file_ioctl+0x1c/0x20) [ 258.530480][ T5684] r9:84bd7d80 r8:00000003 r7:00000000 r6:00000000 r5:00004b72 r4:84bd7d80 [ 258.530685][ T5684] [<807519c4>] (tomoyo_file_ioctl) from [<8070002c>] (security_file_ioctl+0x64/0x1e4) [ 258.531011][ T5684] [<806fffc8>] (security_file_ioctl) from [<8052f5e0>] (sys_ioctl+0x50/0xda8) [ 258.531247][ T5684] r7:00000000 r6:84bd7d81 r5:00000000 r4:00004b72 [ 258.531404][ T5684] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 258.531607][ T5684] Exception stack(0xed09dfa8 to 0xed09dff0) [ 258.531762][ T5684] dfa0: 00000000 00000000 00000003 00004b72 00000000 00000000 [ 258.531960][ T5684] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b890bc [ 258.532178][ T5684] dfe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 258.532298][ T5684] r10:00000036 r9:84748000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 258.532512][ T5684] r4:00000000 [ 258.536523][ T5684] ERROR: Out of memory at tomoyo_realpath_from_path. [ 262.472967][ T31] audit: type=1400 audit(262.380:272): avc: denied { create } for pid=5710 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 269.172296][ T5851] syz.1.602 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 273.290772][ T5911] syz.1.624[5911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.291252][ T5911] syz.1.624[5911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.292017][ T5911] syz.1.624[5911] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.987162][ T5926] syzkaller0: entered promiscuous mode [ 274.988182][ T5926] syzkaller0: entered allmulticast mode [ 275.053153][ T31] audit: type=1400 audit(274.960:273): avc: denied { relabelfrom } for pid=5925 comm="syz.1.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 275.070908][ T31] audit: type=1400 audit(274.960:274): avc: denied { relabelto } for pid=5925 comm="syz.1.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 301.569330][ T31] audit: type=1400 audit(301.470:275): avc: denied { connect } for pid=6003 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 304.359532][ T31] audit: type=1400 audit(304.260:276): avc: denied { create } for pid=6012 comm="syz.0.652" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 304.369293][ T31] audit: type=1400 audit(304.270:277): avc: denied { link } for pid=6012 comm="syz.0.652" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 304.455432][ T31] audit: type=1400 audit(304.360:278): avc: denied { rename } for pid=6012 comm="syz.0.652" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 304.609018][ T31] audit: type=1400 audit(304.500:279): avc: denied { unlink } for pid=3114 comm="syz-executor" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 310.582366][ T31] audit: type=1400 audit(310.490:280): avc: denied { accept } for pid=6036 comm="syz.0.660" lport=217 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 316.003138][ T6070] pim6reg1: entered promiscuous mode [ 316.003594][ T6070] pim6reg1: entered allmulticast mode [ 316.487837][ T6078] Driver unsupported XDP return value 0 on prog (id 27) dev N/A, expect packet loss! [ 345.411382][ T31] audit: type=1400 audit(345.320:281): avc: denied { bind } for pid=6311 comm="syz.1.742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 345.481183][ T31] audit: type=1400 audit(345.390:282): avc: denied { accept } for pid=6311 comm="syz.1.742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 351.348912][ T31] audit: type=1400 audit(351.250:283): avc: denied { setopt } for pid=6341 comm="syz.1.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 355.992663][ T6331] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.010884][ T6331] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.615177][ T6331] hsr_slave_0: entered promiscuous mode [ 358.630498][ T6331] hsr_slave_1: entered promiscuous mode [ 358.632925][ T6331] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 358.633348][ T6331] Cannot create hsr debugfs directory [ 359.027513][ T31] audit: type=1400 audit(358.930:284): avc: denied { map } for pid=6433 comm="syz.1.757" path="socket:[9678]" dev="sockfs" ino=9678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 359.028500][ T31] audit: type=1400 audit(358.930:285): avc: denied { read } for pid=6433 comm="syz.1.757" path="socket:[9678]" dev="sockfs" ino=9678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 359.772518][ T6331] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.000192][ T6331] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.135253][ T6331] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.411838][ T6331] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 361.264349][ T6239] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 361.292337][ T6239] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 361.312426][ T6239] bond0 (unregistering): Released all slaves [ 361.382508][ T6239] hsr_slave_0: left promiscuous mode [ 361.394060][ T6239] hsr_slave_1: left promiscuous mode [ 361.411282][ T6239] veth1_macvtap: left promiscuous mode [ 361.411968][ T6239] veth0_macvtap: left promiscuous mode [ 361.412350][ T6239] veth1_vlan: left promiscuous mode [ 361.412623][ T6239] veth0_vlan: left promiscuous mode [ 362.453391][ T6331] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 362.483129][ T6331] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 362.511048][ T6331] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 362.545563][ T6331] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 364.082702][ T6331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.469618][ T6331] veth0_vlan: entered promiscuous mode [ 371.513365][ T6331] veth1_vlan: entered promiscuous mode [ 371.639634][ T6331] veth0_macvtap: entered promiscuous mode [ 371.652089][ T6331] veth1_macvtap: entered promiscuous mode [ 371.784925][ T6331] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.785462][ T6331] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.785810][ T6331] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.786148][ T6331] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.969636][ T31] audit: type=1400 audit(371.870:286): avc: denied { mounton } for pid=6331 comm="syz-executor" path="/syzkaller.GlkgKU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=9718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 373.715299][ T6719] input: syz0 as /devices/virtual/input/input6 [ 391.267615][ T31] audit: type=1400 audit(391.160:287): avc: denied { bind } for pid=6789 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 391.272897][ T31] audit: type=1400 audit(391.160:288): avc: denied { name_bind } for pid=6789 comm="syz.1.778" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 391.273905][ T31] audit: type=1400 audit(391.170:289): avc: denied { node_bind } for pid=6789 comm="syz.1.778" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 394.736995][ T6796] netlink: 4 bytes leftover after parsing attributes in process `syz.0.780'. [ 395.406543][ T6807] netlink: 12 bytes leftover after parsing attributes in process `syz.0.784'. [ 398.293835][ T6810] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 399.357554][ T6822] netlink: 8 bytes leftover after parsing attributes in process `syz.1.790'. [ 401.544781][ T31] audit: type=1400 audit(401.450:290): avc: denied { mounton } for pid=6819 comm="syz.0.789" path="/proc/48/task" dev="proc" ino=9869 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 402.229695][ T31] audit: type=1400 audit(402.130:291): avc: denied { read } for pid=6829 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 410.437604][ T6848] random: crng reseeded on system resumption [ 410.476097][ T6848] Restarting kernel threads ... done. [ 424.533765][ T31] audit: type=1400 audit(424.440:292): avc: denied { write } for pid=6865 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 424.676216][ T6874] netlink: 'syz.0.806': attribute type 5 has an invalid length. [ 425.452794][ T31] audit: type=1400 audit(425.360:293): avc: denied { name_bind } for pid=6877 comm="syz.0.807" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 426.148300][ T6886] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 426.151089][ T6886] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 426.152127][ T6886] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 435.745933][ T31] audit: type=1400 audit(435.650:294): avc: denied { write } for pid=6939 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 435.749283][ T31] audit: type=1400 audit(435.650:295): avc: denied { nlmsg_write } for pid=6939 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 441.282812][ T6983] netlink: 'syz.1.831': attribute type 1 has an invalid length. [ 441.285612][ T6983] netlink: 24 bytes leftover after parsing attributes in process `syz.1.831'. [ 453.349511][ T31] audit: type=1400 audit(453.250:296): avc: denied { read } for pid=7009 comm="syz.0.838" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 456.665298][ T7013] syzkaller0: entered promiscuous mode [ 456.665805][ T7013] syzkaller0: entered allmulticast mode [ 468.286364][ T31] audit: type=1400 audit(468.190:297): avc: denied { lock } for pid=7087 comm="syz.1.859" path="socket:[10169]" dev="sockfs" ino=10169 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 470.248275][ T31] audit: type=1400 audit(470.150:298): avc: denied { execute } for pid=7127 comm="syz.1.872" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 472.626051][ T31] audit: type=1400 audit(472.530:299): avc: denied { create } for pid=7179 comm="syz.0.889" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 472.637600][ T31] audit: type=1400 audit(472.540:300): avc: denied { link } for pid=7179 comm="syz.0.889" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 472.655239][ T31] audit: type=1400 audit(472.560:301): avc: denied { unlink } for pid=7179 comm="syz.0.889" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 472.657343][ T31] audit: type=1400 audit(472.560:302): avc: denied { rename } for pid=7179 comm="syz.0.889" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 482.051716][ T7273] syzkaller0: entered promiscuous mode [ 482.052374][ T7273] syzkaller0: entered allmulticast mode [ 484.363367][ T7307] syzkaller0: entered promiscuous mode [ 484.363989][ T7307] syzkaller0: entered allmulticast mode [ 510.519471][ T6188] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 510.686500][ T6188] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 510.687166][ T6188] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 510.687670][ T6188] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 510.688050][ T6188] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 510.694183][ T6188] usb 2-1: config 0 descriptor?? [ 510.912975][ T6188] usbhid 2-1:0.0: can't add hid device: -71 [ 510.914074][ T6188] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 510.920502][ T6188] usb 2-1: USB disconnect, device number 3 [ 520.683434][ T2964] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.723901][ T2964] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.777599][ T2964] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.855535][ T2964] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 521.351184][ T2964] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 521.426508][ T2964] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 521.496726][ T2964] bond0 (unregistering): Released all slaves [ 521.839395][ T2964] hsr_slave_0: left promiscuous mode [ 521.869875][ T2964] hsr_slave_1: left promiscuous mode [ 521.887476][ T2964] veth1_macvtap: left promiscuous mode [ 521.887998][ T2964] veth0_macvtap: left promiscuous mode [ 521.894089][ T2964] veth1_vlan: left promiscuous mode [ 521.894678][ T2964] veth0_vlan: left promiscuous mode [ 522.399633][ T6202] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 522.564536][ T6202] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 522.565270][ T6202] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 522.565748][ T6202] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 522.566379][ T6202] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 522.566880][ T6202] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 522.578346][ T6202] usb 2-1: config 0 descriptor?? [ 523.073022][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.074042][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.074465][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.074849][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.075276][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.075652][ T6202] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 523.077803][ T6202] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 523.095916][ T6202] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 524.364608][ T7461] usb 2-1: string descriptor 0 read error: -2 [ 524.489341][ T6202] usb 2-1: reset high-speed USB device number 4 using dummy_hcd [ 524.569559][ T31] audit: type=1400 audit(524.440:303): avc: denied { nlmsg_read } for pid=7460 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 524.636737][ T6202] usb 2-1: device descriptor read/64, error -32 [ 525.516545][ T6188] usb 2-1: USB disconnect, device number 4 [ 528.896581][ T7441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 528.914078][ T7441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 531.832935][ T7441] hsr_slave_0: entered promiscuous mode [ 531.835667][ T7441] hsr_slave_1: entered promiscuous mode [ 533.511425][ T7441] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 533.546155][ T7441] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 533.570891][ T7441] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 533.592158][ T7441] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 535.944483][ T7441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 543.232344][ T7441] veth0_vlan: entered promiscuous mode [ 543.262690][ T7441] veth1_vlan: entered promiscuous mode [ 543.390925][ T7441] veth0_macvtap: entered promiscuous mode [ 543.423283][ T7441] veth1_macvtap: entered promiscuous mode [ 543.554670][ T7441] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 543.555528][ T7441] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 543.556106][ T7441] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 543.556727][ T7441] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 543.724019][ T31] audit: type=1400 audit(543.630:304): avc: denied { mount } for pid=7441 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 543.725245][ T31] audit: type=1400 audit(543.630:305): avc: denied { mounton } for pid=7441 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 557.879861][ T6154] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 558.048298][ T6154] usb 2-1: config 0 has an invalid interface number: 13 but max is 0 [ 558.050196][ T6154] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 558.050784][ T6154] usb 2-1: config 0 has no interface number 0 [ 558.051563][ T6154] usb 2-1: config 0 interface 13 altsetting 0 endpoint 0x8 has invalid maxpacket 512, setting to 64 [ 558.052038][ T6154] usb 2-1: config 0 interface 13 altsetting 0 endpoint 0xD has invalid wMaxPacketSize 0 [ 558.052556][ T6154] usb 2-1: config 0 interface 13 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 5 [ 558.067574][ T6154] usb 2-1: New USB device found, idVendor=06cd, idProduct=011a, bcdDevice=51.76 [ 558.068101][ T6154] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 558.069288][ T6154] usb 2-1: Product: syz [ 558.069596][ T6154] usb 2-1: Manufacturer: syz [ 558.069873][ T6154] usb 2-1: SerialNumber: syz [ 558.078189][ T6154] usb 2-1: config 0 descriptor?? [ 558.087736][ T6154] keyspan 2-1:0.13: Keyspan - (without firmware) converter detected [ 558.287156][ T6274] usb 2-1: USB disconnect, device number 5 [ 558.294150][ T6274] keyspan 2-1:0.13: device disconnected [ 559.775820][ T31] audit: type=1400 audit(559.680:306): avc: denied { read append } for pid=7962 comm="syz.1.999" name="file0" dev="tmpfs" ino=2331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 559.779559][ T31] audit: type=1400 audit(559.680:307): avc: denied { open } for pid=7962 comm="syz.1.999" path="/451/file0" dev="tmpfs" ino=2331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 565.779456][ T6188] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 565.930404][ T6188] usb 2-1: Using ep0 maxpacket: 32 [ 565.939128][ T6188] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 565.953961][ T6188] usb 2-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 565.956091][ T6188] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 565.956401][ T6188] usb 2-1: Product: syz [ 565.956594][ T6188] usb 2-1: Manufacturer: syz [ 565.956811][ T6188] usb 2-1: SerialNumber: syz [ 565.970925][ T6188] usb 2-1: config 0 descriptor?? [ 565.993457][ T6188] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 566.283241][ T6154] usb 2-1: USB disconnect, device number 6 [ 566.770300][ T8014] netlink: 'syz.1.1008': attribute type 9 has an invalid length. [ 568.311324][ T6147] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 568.632399][ T6147] usb 2-1: New USB device found, idVendor=1a86, idProduct=7522, bcdDevice=35.36 [ 568.637434][ T6147] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 568.642078][ T6147] usb 2-1: Product: syz [ 568.645634][ T6147] usb 2-1: Manufacturer: syz [ 568.649076][ T6147] usb 2-1: SerialNumber: syz [ 568.651674][ T6147] usb 2-1: config 0 descriptor?? [ 568.669204][ T6147] ch341 2-1:0.0: ch341-uart converter detected [ 569.369753][ T6147] usb 2-1: failed to send control message: -71 [ 569.370453][ T6147] ch341-uart ttyUSB0: probe with driver ch341-uart failed with error -71 [ 569.381869][ T6147] usb 2-1: USB disconnect, device number 7 [ 569.384700][ T6147] ch341 2-1:0.0: device disconnected [ 572.900257][ T6274] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 573.166651][ T6274] usb 2-1: Using ep0 maxpacket: 8 [ 573.276462][ T6274] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 573.277050][ T6274] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 573.280786][ T6274] usb 2-1: New USB device found, idVendor=04d8, idProduct=f372, bcdDevice= 0.00 [ 573.284614][ T6274] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 573.290679][ T6274] usb 2-1: config 0 descriptor?? [ 573.795925][ T6274] hid-led 0003:04D8:F372.0002: hidraw0: USB HID v0.00 Device [HID 04d8:f372] on usb-dummy_hcd.1-1/input0 [ 573.903413][ T6274] hid-led 0003:04D8:F372.0002: Greynut Luxafor initialized [ 573.937602][ T6125] usb 2-1: USB disconnect, device number 8 [ 573.951321][ T6149] leds luxafor0:blue:led5: Setting an LED's brightness failed (-38) [ 573.960790][ T6149] leds luxafor0:green:led5: Setting an LED's brightness failed (-38) [ 573.962204][ T6149] leds luxafor0:red:led5: Setting an LED's brightness failed (-38) [ 573.966004][ T6149] leds luxafor0:blue:led4: Setting an LED's brightness failed (-38) [ 573.967789][ T6149] leds luxafor0:green:led4: Setting an LED's brightness failed (-38) [ 573.972566][ T6149] leds luxafor0:red:led4: Setting an LED's brightness failed (-38) [ 573.980396][ T6149] leds luxafor0:blue:led3: Setting an LED's brightness failed (-38) [ 573.981608][ T6149] leds luxafor0:green:led3: Setting an LED's brightness failed (-38) [ 573.992928][ T6149] leds luxafor0:red:led3: Setting an LED's brightness failed (-38) [ 573.999507][ T6149] leds luxafor0:blue:led2: Setting an LED's brightness failed (-38) [ 574.004335][ T6149] leds luxafor0:green:led2: Setting an LED's brightness failed (-38) [ 574.014082][ T6147] leds luxafor0:red:led2: Setting an LED's brightness failed (-38) [ 574.017311][ T6147] leds luxafor0:blue:led1: Setting an LED's brightness failed (-38) [ 574.024650][ T6147] leds luxafor0:green:led1: Setting an LED's brightness failed (-38) [ 574.026063][ T6147] leds luxafor0:red:led1: Setting an LED's brightness failed (-38) [ 574.027074][ T6147] leds luxafor0:blue:led0: Setting an LED's brightness failed (-38) [ 574.032630][ T6149] leds luxafor0:green:led0: Setting an LED's brightness failed (-38) [ 574.043247][ T6149] leds luxafor0:red:led0: Setting an LED's brightness failed (-38) [ 585.023475][ T8119] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1021'. [ 614.071180][ T8168] netlink: 277 bytes leftover after parsing attributes in process `syz.1.1033'. [ 615.275351][ T31] audit: type=1400 audit(615.180:308): avc: denied { bind } for pid=8169 comm="syz.1.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 617.670135][ T6274] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 617.939550][ T6274] usb 2-1: Using ep0 maxpacket: 8 [ 617.981807][ T6274] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 617.984033][ T6274] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has invalid wMaxPacketSize 0 [ 617.987524][ T6274] usb 2-1: config 0 interface 0 has no altsetting 0 [ 617.989400][ T6274] usb 2-1: New USB device found, idVendor=056a, idProduct=00c4, bcdDevice= 0.00 [ 617.989643][ T6274] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 617.993605][ T6274] usb 2-1: config 0 descriptor?? [ 618.465747][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.470514][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.477094][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.479982][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.480406][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.481035][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.481668][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.482049][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.482423][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.482821][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.483213][ T6274] wacom 0003:056A:00C4.0003: unknown main item tag 0x0 [ 618.491458][ T6274] wacom 0003:056A:00C4.0003: hidraw0: USB HID v0.00 Device [HID 056a:00c4] on usb-dummy_hcd.1-1/input0 [ 618.619832][ T6147] usb 2-1: USB disconnect, device number 9 [ 620.035903][ T6274] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 620.189935][ T6274] usb 2-1: Using ep0 maxpacket: 16 [ 620.206440][ T6274] usb 2-1: config 0 has an invalid interface number: 29 but max is 0 [ 620.207156][ T6274] usb 2-1: config 0 has no interface number 0 [ 620.207459][ T6274] usb 2-1: config 0 interface 29 altsetting 0 bulk endpoint 0xA has invalid maxpacket 16 [ 620.208033][ T6274] usb 2-1: config 0 interface 29 altsetting 0 endpoint 0x82 has invalid maxpacket 1104, setting to 1024 [ 620.209258][ T6274] usb 2-1: config 0 interface 29 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1024 [ 620.222411][ T6274] usb 2-1: New USB device found, idVendor=050d, idProduct=2102, bcdDevice=70.d0 [ 620.223207][ T6274] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 620.223609][ T6274] usb 2-1: Product: syz [ 620.223987][ T6274] usb 2-1: Manufacturer: syz [ 620.224236][ T6274] usb 2-1: SerialNumber: syz [ 620.227610][ T6274] usb 2-1: config 0 descriptor?? [ 620.234630][ T8204] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 620.235830][ T8204] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 633.984573][ T6274] usb 2-1: USB disconnect, device number 10 [ 634.087005][ T31] audit: type=1400 audit(633.990:309): avc: denied { bind } for pid=8218 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 637.014430][ T31] audit: type=1400 audit(636.920:310): avc: denied { wake_alarm } for pid=8231 comm="syz.1.1047" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 639.333127][ T8238] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1049'. [ 648.565847][ T31] audit: type=1400 audit(648.470:311): avc: denied { bind } for pid=8248 comm="syz.1.1053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.106256][ T8260] sch_tbf: burst 4823 is lower than device lo mtu (65550) ! [ 664.134345][ T31] audit: type=1400 audit(664.040:312): avc: denied { setopt } for pid=8259 comm="syz.1.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 669.877613][ T31] audit: type=1400 audit(669.780:313): avc: denied { mounton } for pid=8274 comm="syz.1.1060" path="/512/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 673.179284][ T31] audit: type=1400 audit(673.050:314): avc: denied { name_bind } for pid=8285 comm="syz.1.1064" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 679.643395][ T8293] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1067'. [ 679.644902][ T8293] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1067'. [ 679.814091][ T8297] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1069'. [ 686.739445][ T6274] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 686.899468][ T6274] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 686.900079][ T6274] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 686.900469][ T6274] usb 2-1: config 1 has no interface number 0 [ 686.900774][ T6274] usb 2-1: config 1 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 686.901282][ T6274] usb 2-1: Duplicate descriptor for config 1 interface 1 altsetting 0, skipping [ 686.901771][ T6274] usb 2-1: config 1 interface 1 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 686.926142][ T6274] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 686.926694][ T6274] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 686.927059][ T6274] usb 2-1: Product: syz [ 686.927290][ T6274] usb 2-1: Manufacturer: syz [ 686.927516][ T6274] usb 2-1: SerialNumber: syz [ 687.774019][ T6274] cdc_ncm 2-1:1.1: bind() failure [ 687.781448][ T6274] usb 2-1: USB disconnect, device number 11 [ 687.915476][ T31] audit: type=1400 audit(687.820:315): avc: denied { execute } for pid=8321 comm="syz.1.1074" name="file0" dev="tmpfs" ino=2720 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 715.733684][ T31] audit: type=1400 audit(715.640:316): avc: denied { create } for pid=8352 comm="syz.1.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 716.215628][ T31] audit: type=1400 audit(716.120:317): avc: denied { create } for pid=8355 comm="syz.1.1085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 721.693937][ T31] audit: type=1400 audit(721.600:318): avc: denied { unmount } for pid=4609 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 760.237223][ T31] audit: type=1400 audit(760.140:319): avc: denied { nlmsg_read } for pid=8407 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 767.943324][ T31] audit: type=1400 audit(767.850:320): avc: denied { create } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 767.946990][ T31] audit: type=1400 audit(767.850:321): avc: denied { setopt } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 767.958432][ T31] audit: type=1400 audit(767.860:322): avc: denied { bind } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 767.963125][ T31] audit: type=1400 audit(767.870:323): avc: denied { write } for pid=8421 comm="syz.1.1103" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 767.964132][ T31] audit: type=1400 audit(767.870:324): avc: denied { connect } for pid=8421 comm="syz.1.1103" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 768.480845][ T31] audit: type=1400 audit(768.380:325): avc: denied { shutdown } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 768.483074][ T31] audit: type=1400 audit(768.390:326): avc: denied { getopt } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 768.483927][ T31] audit: type=1400 audit(768.390:327): avc: denied { name_connect } for pid=8421 comm="syz.1.1103" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 770.676500][ T8428] ------------[ cut here ]------------ [ 770.677209][ T8428] WARNING: CPU: 1 PID: 8428 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 770.677713][ T8428] Modules linked in: [ 770.680064][ T8428] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 770.681972][ T8428] CPU: 1 UID: 0 PID: 8428 Comm: syz.1.1105 Not tainted 6.12.0-rc2-syzkaller #0 [ 770.682909][ T8428] Hardware name: ARM-Versatile Express [ 770.683312][ T8428] Call trace: [ 770.683578][ T8428] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 770.684192][ T8428] r7:00000000 r6:826228c4 r5:00000000 r4:8203d294 [ 770.684636][ T8428] [<81998f3c>] (show_stack) from [<819b73e4>] (dump_stack_lvl+0x54/0x7c) [ 770.685072][ T8428] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 770.685514][ T8428] r5:00000000 r4:82870d18 [ 770.685762][ T8428] [<819b740c>] (dump_stack) from [<81999a80>] (panic+0x120/0x374) [ 770.686192][ T8428] [<81999960>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 770.686608][ T8428] r3:8260c5c4 r2:00000001 r1:82025674 r0:8202d0dc [ 770.687080][ T8428] r7:8048c684 [ 770.687303][ T8428] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 770.687709][ T8428] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 770.688151][ T8428] r8:00000009 r7:82054cd8 r6:dfab9d24 r5:8568b000 r4:00000000 [ 770.688483][ T8428] [<80242350>] (warn_slowpath_fmt) from [<8048c684>] (kunmap_local_indexed+0x20c/0x224) [ 770.689412][ T8428] r10:ffedc0a8 r9:841d2d00 r8:20508000 r7:fffffffe r6:00000003 r5:8568b000 [ 770.690096][ T8428] r4:ffedc000 [ 770.690384][ T8428] [<8048c478>] (kunmap_local_indexed) from [<80505ab8>] (move_pages+0x7e8/0x149c) [ 770.690874][ T8428] r7:fffffffe r6:00000000 r5:845db810 r4:ffeda840 [ 770.691241][ T8428] [<805052d0>] (move_pages) from [<80581ce0>] (userfaultfd_ioctl+0x114c/0x2080) [ 770.691681][ T8428] r10:841d2d00 r9:dfab9e98 r8:00000001 r7:20c16000 r6:00000000 r5:20000080 [ 770.692116][ T8428] r4:85476000 [ 770.692312][ T8428] [<80580b94>] (userfaultfd_ioctl) from [<8052f6c4>] (sys_ioctl+0x134/0xda8) [ 770.692757][ T8428] r10:8568b000 r9:847226c0 r8:00000003 r7:20000080 r6:847226c1 r5:00000000 [ 770.693137][ T8428] r4:c028aa05 [ 770.693449][ T8428] [<8052f590>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 770.694170][ T8428] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 770.694696][ T8428] 9fa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 770.695233][ T8428] 9fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b890bc [ 770.695656][ T8428] 9fe0: 76b88ec0 76b88eb0 00018af8 00132ec0 [ 770.696034][ T8428] r10:00000036 r9:8568b000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 770.696446][ T8428] r4:00000000 [ 770.698556][ T8428] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:26:19 Registers: info registers vcpu 0 CPU#0 R00=85075840 R01=00000001 R02=00000030 R03=00000000 R04=0000004e R05=00000001 R06=ec3b1e70 R07=ec3b1dd4 R08=ec3b1dd4 R09=ec3b1d14 R10=ffffffff R11=ec3b1cfc R12=ec3b1d00 R13=ec3b1cd0 R14=81993c48 R15=8198f240 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83f3d840 R01=20000093 R02=00000000 R03=000008f0 R04=83f3d840 R05=20000093 R06=00000f01 R07=00000001 R08=00000000 R09=00000064 R10=00000001 R11=dfab9a84 R12=dfab9a88 R13=dfab9a78 R14=809ecb6c R15=819c4768 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000