last executing test programs: 37.891214529s ago: executing program 1 (id=1057): open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x10001, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="34000000000703000000000000000000000000000c00064000000000000000000900010073797a300000000008000540"], 0x34}}, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x1001, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001580)={0x26, 'hash\x00', 0x0, 0x0, 'blake2b-512\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_usb_connect(0x0, 0x24, &(0x7f0000000440)={{0x12, 0x1, 0x0, 0x6, 0xc0, 0x55, 0x8, 0x110a, 0x1450, 0x62cb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0xfe, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xa7, 0x0, 0x0, 0x67, 0xa0, 0x29}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r3, 0x550c, 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io$uac1(r4, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)='system_u:object_r:file_context_t:s0\x00', 0x24, 0x1) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='exfat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r2, 0x1261, 0x3) 36.332947201s ago: executing program 1 (id=1058): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0xa) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x0, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x248, 0x20a, 0x278, 0x248, 0x278, 0x3, 0x0, {[{{@ipv6={@private2, @empty, [], [], 'ipvlan0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@tcp={{0x30}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ipv6header={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) syz_init_net_socket$nfc_llcp(0x27, 0x942858ee2e737fbe, 0x1) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x24, 0x7, @val=@kprobe_multi=@addrs={0x0, 0x0, 0x0, 0x0}}, 0x30) sched_setaffinity(r0, 0x8, &(0x7f0000000380)=0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r5, 0x0, 0x0}, 0x10) 21.916916373s ago: executing program 0 (id=1060): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a01080000e0030000000e02000d00090001007300803000000000080002400000000214000000110001"], 0x50}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x20, 0x7, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000100}, 0x400c000) 21.697893314s ago: executing program 0 (id=1061): mknodat(0xffffffffffffff9c, &(0x7f0000001140)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xa8361b22ab55bef8, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000804) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x7, 0x4) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) 21.211464995s ago: executing program 0 (id=1062): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="120100005938d74010973077339600000001090212000100001e000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f00000010c0)={0x84, &(0x7f0000000080)=ANY=[@ANYBLOB="1f769a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 20.239095937s ago: executing program 0 (id=1063): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000300)={0x7, 0x7, 0x4}, &(0x7f0000000340)=0x28) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x4b4d, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2}, {0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 17.649451273s ago: executing program 1 (id=1064): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x71, 0x0, &(0x7f0000000040)) 17.550147951s ago: executing program 1 (id=1065): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, 0x0, 0x2c41, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) writev(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)='\b\x00\x00\x00', 0x4}], 0x1) 11.469758181s ago: executing program 0 (id=1066): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, 0x1, 0x7}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000030603000000000000006517912bfd3b0000000000000500010007000000225865c369c711b258e1f6f510f42699356406c004fedc7ea912a0b7e3c11bb16e6252550f9c98a6f91621a1c36729fc6a823eeb9849f87b2f133fd0aa88718bb0a6f96a03c62eeeab79630fb34d7624"], 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x34, r7, 0x701, 0x0, 0x0, {0xb}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) r8 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_SMBUS(r8, 0x720, &(0x7f0000000040)={0x1, 0x0, 0x7, &(0x7f0000000140)={0xc, "b7fc741714bd8325de9540e3cfc840d0b9358338de5fdb7ad189aa80277f6cd2e2"}}) 8.085656375s ago: executing program 1 (id=1067): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x5) socket$xdp(0x2c, 0x3, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f00000016c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r3, 0xc02464bb, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)={{0x14}, [@NFT_MSG_NEWRULE={0x88, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x3}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_COMPAT={0x24, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x5e}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}]}]}], {0x14}}, 0xb0}}, 0x0) dup2(r5, r4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 289.835416ms ago: executing program 1 (id=1068): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) mlock(&(0x7f00004ef000/0x4000)=nil, 0x4000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) 0s ago: executing program 0 (id=1069): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0x8, &(0x7f00000000c0)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x90}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) kernel console output (not intermixed with test programs): t:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 504.992335][ T31] audit: type=1400 audit(504.880:273): avc: denied { associate } for pid=6249 comm="syz.1.626" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 505.075599][ T31] audit: type=1400 audit(504.980:274): avc: denied { setopt } for pid=6249 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 505.083032][ T6251] FAULT_INJECTION: forcing a failure. [ 505.083032][ T6251] name failslab, interval 1, probability 0, space 0, times 0 [ 505.083676][ T6251] CPU: 0 UID: 0 PID: 6251 Comm: syz.0.624 Not tainted 6.12.0-rc2-syzkaller #0 [ 505.084103][ T6251] Hardware name: ARM-Versatile Express [ 505.084311][ T6251] Call trace: [ 505.084502][ T6251] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 505.084891][ T6251] r7:00000c40 r6:843e3da8 r5:60000013 r4:8203d394 [ 505.085184][ T6251] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 505.085556][ T6251] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 505.086038][ T6251] r5:00000000 r4:82718bdc [ 505.086318][ T6251] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 505.086675][ T6251] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 505.087161][ T6251] r6:843e3da8 r5:00001000 r4:82c016c0 [ 505.087472][ T6251] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 505.088620][ T6251] [<804cd510>] (__kmalloc_noprof) from [<80750f60>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 505.091994][ T6251] r10:849b1800 r9:82c9fc00 r8:00000000 r7:845ccbb0 r6:843e3da8 r5:00001000 [ 505.092483][ T6251] r4:00000000 [ 505.092670][ T6251] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 505.095522][ T6251] r10:849b1800 r9:00000000 r8:00000004 r7:00008933 r6:00000004 r5:81ad18e8 [ 505.097581][ T6251] r4:843e3da8 r3:824ba340 [ 505.098265][ T6251] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 505.099020][ T6251] r9:843e3d80 r8:00000004 r7:00000000 r6:00000000 r5:00008933 r4:843e3d80 [ 505.099476][ T6251] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 505.102166][ T6251] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 505.102689][ T6251] r7:00000000 r6:843e3d81 r5:00000000 r4:00008933 [ 505.102967][ T6251] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 505.103130][ T31] audit: type=1400 audit(504.990:275): avc: denied { connect } for pid=6249 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 505.103885][ T6251] Exception stack(0xee199fa8 to 0xee199ff0) [ 505.104187][ T6251] 9fa0: 00000000 00000000 00000004 00008933 00000000 00000000 [ 505.105063][ T6251] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76abf0bc [ 505.105407][ T6251] 9fe0: 76abeec0 76abeeb0 00018af8 00132ec0 [ 505.105688][ T6251] r10:00000036 r9:849b1800 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 505.109386][ T6251] r4:00000000 [ 505.154843][ T6251] ERROR: Out of memory at tomoyo_realpath_from_path. [ 505.162505][ T31] audit: type=1400 audit(505.060:276): avc: denied { ioctl } for pid=6240 comm="syz.0.624" path="socket:[9724]" dev="sockfs" ino=9724 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 505.163428][ T31] audit: type=1400 audit(505.070:277): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 505.164240][ T31] audit: type=1400 audit(505.070:278): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 505.164929][ T31] audit: type=1400 audit(505.070:279): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 505.166104][ T31] audit: type=1400 audit(505.070:280): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 506.702638][ T6257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6257 comm=syz.0.627 [ 506.703389][ T6257] FAULT_INJECTION: forcing a failure. [ 506.703389][ T6257] name failslab, interval 1, probability 0, space 0, times 0 [ 506.703881][ T6257] CPU: 0 UID: 0 PID: 6257 Comm: syz.0.627 Not tainted 6.12.0-rc2-syzkaller #0 [ 506.704255][ T6257] Hardware name: ARM-Versatile Express [ 506.704486][ T6257] Call trace: [ 506.704773][ T6257] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 506.705263][ T6257] r7:849b1800 r6:00000820 r5:60000013 r4:8203d394 [ 506.705564][ T6257] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 506.706082][ T6257] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 506.706459][ T6257] r5:00000000 r4:82718bdc [ 506.706666][ T6257] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 506.707050][ T6257] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 506.707432][ T6257] r6:00000820 r5:84843600 r4:82cac780 [ 506.707668][ T6257] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 506.708107][ T6257] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<8149758c>] (skb_clone+0x60/0x1c8) [ 506.708546][ T6257] r10:00000000 r9:000001a2 r8:84a00080 r7:84376400 r6:84843600 r5:84843600 [ 506.708887][ T6257] r4:00000820 [ 506.709077][ T6257] [<8149752c>] (skb_clone) from [<815a377c>] (__netlink_deliver_tap+0x1e8/0x24c) [ 506.709489][ T6257] r5:8419d680 r4:8419d000 [ 506.709697][ T6257] [<815a3594>] (__netlink_deliver_tap) from [<815a6874>] (netlink_unicast+0x280/0x29c) [ 506.710126][ T6257] r10:00000000 r9:00000000 r8:84888000 r7:84843600 r6:84a00080 r5:00000014 [ 506.710525][ T6257] r4:84376400 [ 506.710708][ T6257] [<815a65f4>] (netlink_unicast) from [<815a6a6c>] (netlink_sendmsg+0x1dc/0x43c) [ 506.711118][ T6257] r9:00000000 r8:00000000 r7:848d8c00 r6:00000014 r5:84843600 r4:ee119f38 [ 506.711545][ T6257] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 506.712236][ T6257] r10:00004000 r9:ee119dd4 r8:ee119dd4 r7:00000000 r6:845d5b80 r5:ee119f38 [ 506.712876][ T6257] r4:00000000 [ 506.713085][ T6257] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 506.713502][ T6257] r7:00000000 r6:00000000 r5:845d5b80 r4:ee119f38 [ 506.713790][ T6257] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 506.714221][ T6257] r10:ee119e34 r9:200026c0 r8:00004000 r7:00000000 r6:845d5b80 r5:ee119f38 [ 506.714559][ T6257] r4:00000000 [ 506.714757][ T6257] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 506.715170][ T6257] r10:00000128 r9:849b1800 r8:8020029c r7:00004000 r6:200026c0 r5:845d5b80 [ 506.715515][ T6257] r4:00000000 [ 506.715760][ T6257] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 506.716354][ T6257] Exception stack(0xee119fa8 to 0xee119ff0) [ 506.716740][ T6257] 9fa0: 00000000 00000000 00000003 200026c0 00004000 00000000 [ 506.717277][ T6257] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b220bc [ 506.717651][ T6257] 9fe0: 76b21ec0 76b21eb0 00018af8 00132ec0 [ 506.717979][ T6257] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 514.976953][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 514.977077][ T31] audit: type=1400 audit(514.880:300): avc: denied { append } for pid=6275 comm="syz.1.633" name="sequencer2" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 515.243485][ T31] audit: type=1400 audit(515.150:301): avc: denied { create } for pid=6279 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 515.437323][ T6282] FAULT_INJECTION: forcing a failure. [ 515.437323][ T6282] name failslab, interval 1, probability 0, space 0, times 0 [ 515.438016][ T6282] CPU: 1 UID: 0 PID: 6282 Comm: syz.1.636 Not tainted 6.12.0-rc2-syzkaller #0 [ 515.438384][ T6282] Hardware name: ARM-Versatile Express [ 515.438690][ T6282] Call trace: [ 515.438916][ T6282] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 515.439459][ T6282] r7:84ac4800 r6:00000cc0 r5:60000013 r4:8203d394 [ 515.439723][ T6282] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 515.440128][ T6282] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 515.440503][ T6282] r5:00000000 r4:82718bdc [ 515.440714][ T6282] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 515.441054][ T6282] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 515.441584][ T6282] r6:00000cc0 r5:00000002 r4:82c01240 [ 515.441962][ T6282] [<804e811c>] (should_failslab) from [<804cc5d4>] (__kmalloc_cache_noprof+0x4c/0x344) [ 515.442516][ T6282] [<804cc588>] (__kmalloc_cache_noprof) from [<802f960c>] (__request_module+0xe8/0x2c0) [ 515.443050][ T6282] r10:84ac4800 r9:00000000 r8:826f5ee4 r7:84ac4800 r6:814eff60 r5:00000002 [ 515.443425][ T6282] r4:00000000 [ 515.443633][ T6282] [<802f9524>] (__request_module) from [<814eff60>] (dev_load+0x68/0x8c) [ 515.444077][ T6282] r3:00400140 r2:dfa29e28 r1:820ad71c [ 515.444368][ T6282] r8:dfa29e38 r7:0000891c r6:00000000 r5:00000000 r4:dfa29e28 [ 515.444763][ T6282] [<814efef8>] (dev_load) from [<816b1214>] (devinet_ioctl+0x70/0x754) [ 515.445170][ T6282] r5:84888d00 r4:dfa29e28 [ 515.445414][ T6282] [<816b11a4>] (devinet_ioctl) from [<816b40a0>] (inet_ioctl+0x1b0/0x268) [ 515.445832][ T6282] r10:84ac4800 r9:81c800b8 r8:dfa29ecc r7:84888d00 r6:200000c0 r5:843f2400 [ 515.446198][ T6282] r4:0000891c [ 515.446425][ T6282] [<816b3ef0>] (inet_ioctl) from [<81484c90>] (sock_ioctl+0x450/0x608) [ 515.446819][ T6282] r7:845e4f00 r6:84888d00 r5:200000c0 r4:0000891c [ 515.447137][ T6282] [<81484840>] (sock_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 515.447563][ T6282] r9:843e3480 r8:00000004 r7:200000c0 r6:843e3481 r5:00000000 r4:0000891c [ 515.447927][ T6282] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 515.448368][ T6282] Exception stack(0xdfa29fa8 to 0xdfa29ff0) [ 515.448678][ T6282] 9fa0: 00000000 00000000 00000004 0000891c 200000c0 00000000 [ 515.449077][ T6282] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b810bc [ 515.449483][ T6282] 9fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 515.449796][ T6282] r10:00000036 r9:84ac4800 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 515.450158][ T6282] r4:00000000 [ 515.649999][ T31] audit: type=1400 audit(515.550:302): avc: denied { mount } for pid=6286 comm="syz.1.638" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 516.287562][ T31] audit: type=1400 audit(516.190:303): avc: denied { mounton } for pid=6286 comm="syz.1.638" path="/79/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 516.325026][ T31] audit: type=1400 audit(516.230:304): avc: denied { unmount } for pid=5316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 516.476024][ T6295] FAULT_INJECTION: forcing a failure. [ 516.476024][ T6295] name failslab, interval 1, probability 0, space 0, times 0 [ 516.476542][ T6295] CPU: 0 UID: 0 PID: 6295 Comm: syz.1.640 Not tainted 6.12.0-rc2-syzkaller #0 [ 516.476727][ T6295] Hardware name: ARM-Versatile Express [ 516.476875][ T6295] Call trace: [ 516.476996][ T6295] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 516.477208][ T6295] r7:82e43000 r6:00000cc0 r5:60000013 r4:8203d394 [ 516.477334][ T6295] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 516.477510][ T6295] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 516.477672][ T6295] r5:00000000 r4:82718bdc [ 516.477764][ T6295] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 516.477945][ T6295] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 516.478124][ T6295] r6:00000cc0 r5:20000180 r4:82ca8b40 [ 516.478229][ T6295] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 516.478471][ T6295] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<80524f34>] (getname_flags.part.0+0x28/0x18c) [ 516.478672][ T6295] r10:00000055 r9:200001c0 r8:00000000 r7:00004000 r6:8223783c r5:20000180 [ 516.478859][ T6295] r4:20000180 [ 516.479059][ T6295] [<80524f0c>] (getname_flags.part.0) from [<80529ff0>] (getname_flags+0x3c/0x50) [ 516.479272][ T6295] r9:200001c0 r8:00000000 r7:20000180 r6:ffffff9c r5:00004000 r4:20000180 [ 516.479424][ T6295] [<80529fb4>] (getname_flags) from [<8051d294>] (do_readlinkat+0x5c/0x16c) [ 516.479609][ T6295] r5:00004000 r4:00000000 [ 516.479702][ T6295] [<8051d238>] (do_readlinkat) from [<8051e0f4>] (sys_readlink+0x24/0x28) [ 516.479886][ T6295] r10:00000055 r9:82e43000 r8:8020029c r7:00000055 r6:00130e70 r5:00000000 [ 516.480106][ T6295] r4:00000000 [ 516.480220][ T6295] [<8051e0d0>] (sys_readlink) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 516.480490][ T6295] Exception stack(0xdfb4dfa8 to 0xdfb4dff0) [ 516.480638][ T6295] dfa0: 00000000 00000000 20000180 200001c0 000000fa 00000000 [ 516.480849][ T6295] dfc0: 00000000 00000000 00130e70 00000055 00000000 00006364 003d0f00 76b810bc [ 516.481032][ T6295] dfe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 516.604230][ T6299] FAULT_INJECTION: forcing a failure. [ 516.604230][ T6299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 516.605141][ T6299] CPU: 0 UID: 0 PID: 6299 Comm: syz.1.641 Not tainted 6.12.0-rc2-syzkaller #0 [ 516.605536][ T6299] Hardware name: ARM-Versatile Express [ 516.605889][ T6299] Call trace: [ 516.606206][ T6299] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 516.606619][ T6299] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 516.606885][ T6299] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 516.607257][ T6299] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 516.607604][ T6299] r5:00000000 r4:8274e1c4 [ 516.607810][ T6299] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 516.608193][ T6299] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 516.608594][ T6299] r6:00000000 r5:dfb31f68 r4:00000002 [ 516.608822][ T6299] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 516.609175][ T6299] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 516.609583][ T6299] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 516.609989][ T6299] r10:00000001 r9:805c30ac r8:00000002 r7:dfb31f68 r6:0000000f r5:76b80f30 [ 516.610322][ T6299] r4:82e45400 r3:dfb31e9f [ 516.610524][ T6299] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 516.610902][ T6299] r8:76b80f30 r7:dfb31f68 r6:82e45400 r5:0000000f r4:84874f00 [ 516.611185][ T6299] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 516.611669][ T6299] r10:00000003 r9:82e45400 r8:8020029c r7:00000000 r6:00000000 r5:84874f00 [ 516.612355][ T6299] r4:84874f03 [ 516.612558][ T6299] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 516.612913][ T6299] r7:00000003 r6:00000005 r5:76b80f30 r4:0000000f [ 516.613181][ T6299] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 516.613540][ T6299] Exception stack(0xdfb31fa8 to 0xdfb31ff0) [ 516.613822][ T6299] 1fa0: 0000000f 76b80f30 00000005 76b80f30 0000000f 00000000 [ 516.614171][ T6299] 1fc0: 0000000f 76b80f30 00000005 00000003 00000000 00006364 003d0f00 76b810bc [ 516.614517][ T6299] 1fe0: 00000158 76b80ed0 000d8408 00130d94 [ 516.730941][ T31] audit: type=1400 audit(516.630:305): avc: denied { setattr } for pid=6300 comm="syz.1.642" name="UDP-Lite" dev="sockfs" ino=8779 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 516.740203][ T31] audit: type=1400 audit(516.640:306): avc: denied { create } for pid=6300 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 516.754050][ T31] audit: type=1400 audit(516.660:307): avc: denied { create } for pid=6300 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 517.129095][ T31] audit: type=1400 audit(517.030:308): avc: denied { ioctl } for pid=6303 comm="syz.1.643" path="socket:[9801]" dev="sockfs" ino=9801 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 517.506368][ T31] audit: type=1400 audit(517.410:309): avc: denied { bind } for pid=6314 comm="syz.1.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 519.811039][ T6327] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6327 comm=syz.0.650 [ 519.982469][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 519.982563][ T31] audit: type=1400 audit(519.890:332): avc: denied { create } for pid=6326 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 520.317133][ T31] audit: type=1400 audit(520.220:333): avc: denied { create } for pid=6332 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 520.321241][ T31] audit: type=1400 audit(520.220:334): avc: denied { bind } for pid=6332 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 520.331027][ T31] audit: type=1400 audit(520.230:335): avc: denied { setopt } for pid=6332 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 520.596308][ T6337] tmpfs: Unknown parameter 'des' [ 520.608468][ T31] audit: type=1400 audit(520.500:336): avc: denied { create } for pid=6328 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 520.609462][ T31] audit: type=1400 audit(520.510:337): avc: denied { write } for pid=6328 comm="syz.0.651" path="socket:[8856]" dev="sockfs" ino=8856 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 520.748724][ T31] audit: type=1400 audit(520.650:338): avc: denied { ioctl } for pid=6332 comm="syz.1.653" path="socket:[8855]" dev="sockfs" ino=8855 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 520.802858][ T31] audit: type=1400 audit(520.700:339): avc: denied { ioctl } for pid=6328 comm="syz.0.651" path="socket:[8856]" dev="sockfs" ino=8856 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 521.074797][ T31] audit: type=1400 audit(520.980:340): avc: denied { write } for pid=6344 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 521.696689][ T6359] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6359 comm=syz.1.661 [ 523.426811][ T6363] FAULT_INJECTION: forcing a failure. [ 523.426811][ T6363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.427500][ T6363] CPU: 0 UID: 0 PID: 6363 Comm: syz.1.663 Not tainted 6.12.0-rc2-syzkaller #0 [ 523.427840][ T6363] Hardware name: ARM-Versatile Express [ 523.428073][ T6363] Call trace: [ 523.428200][ T6363] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 523.428562][ T6363] r7:dfbf1c2c r6:00000000 r5:60000013 r4:8203d394 [ 523.428799][ T6363] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 523.429124][ T6363] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 523.429454][ T6363] r5:00000000 r4:82718c30 [ 523.429586][ T6363] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 523.429837][ T6363] [<808e5130>] (should_fail_ex) from [<804e8218>] (should_fail_alloc_page+0x68/0x74) [ 523.430027][ T6363] r6:00000000 r5:00141cca r4:dfbf1c38 [ 523.430137][ T6363] [<804e81b0>] (should_fail_alloc_page) from [<804b8e04>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 523.430343][ T6363] [<804b8d7c>] (prepare_alloc_pages.constprop.0) from [<804bf53c>] (__alloc_pages_noprof+0xb4/0x112c) [ 523.430588][ T6363] r10:00001000 r9:00004000 r8:00141cca r7:84ac0000 r6:00000000 r5:0000008e [ 523.430797][ T6363] r4:00000000 r3:dfbf1c38 [ 523.430924][ T6363] [<804bf488>] (__alloc_pages_noprof) from [<804c0ba0>] (__folio_alloc_noprof+0x14/0x2c) [ 523.431164][ T6363] r10:00001000 r9:00004000 r8:845e7788 r7:00000004 r6:00101cca r5:0000008e [ 523.431375][ T6363] r4:00000000 [ 523.431627][ T6363] [<804c0b8c>] (__folio_alloc_noprof) from [<80440bd8>] (__filemap_get_folio+0xe0/0x3d8) [ 523.431959][ T6363] r5:0000008e r4:00000000 [ 523.432297][ T6363] [<80440af8>] (__filemap_get_folio) from [<806ca78c>] (fuse_write_begin+0x54/0x1f0) [ 523.432557][ T6363] r9:00004000 r8:845e7788 r7:843e36c0 r6:00004000 r5:845e7788 r4:00000004 [ 523.432760][ T6363] [<806ca738>] (fuse_write_begin) from [<8043bfb8>] (generic_perform_write+0xd4/0x2c8) [ 523.432974][ T6363] r7:00000000 r6:81ac9b58 r5:00001000 r4:806ca738 [ 523.433111][ T6363] [<8043bee4>] (generic_perform_write) from [<804434d8>] (__generic_file_write_iter+0x98/0xa4) [ 523.433332][ T6363] r10:82e66000 r9:00000000 r8:843e36c0 r7:dfbf1ed0 r6:843e36c0 r5:dfbf1e58 [ 523.433494][ T6363] r4:00000000 [ 523.433582][ T6363] [<80443440>] (__generic_file_write_iter) from [<80443548>] (generic_file_write_iter+0x64/0xfc) [ 523.433851][ T6363] r7:dfbf1ed0 r6:845e7700 r5:00056000 r4:dfbf1e58 [ 523.434141][ T6363] [<804434e4>] (generic_file_write_iter) from [<806ce26c>] (fuse_file_write_iter+0x31c/0x464) [ 523.435754][ T6363] r7:845e7680 r6:84ac0000 r5:dfbf1ed0 r4:dfbf1e58 [ 523.436233][ T6363] [<806cdf50>] (fuse_file_write_iter) from [<80513ee4>] (do_iter_readv_writev+0x118/0x1fc) [ 523.437110][ T6363] r10:00000006 r9:84ac0000 r8:00000001 r7:dfbf1f60 r6:00000000 r5:843e36c0 [ 523.438370][ T6363] r4:00000000 [ 523.438573][ T6363] [<80513dcc>] (do_iter_readv_writev) from [<805152e4>] (vfs_writev+0x134/0x3c0) [ 523.439007][ T6363] r10:00000092 r9:00000001 r8:84ac0000 r7:dfbf1f60 r6:843e36c0 r5:806cdf50 [ 523.439368][ T6363] r4:848db000 [ 523.439567][ T6363] [<805151b0>] (vfs_writev) from [<805155f4>] (do_writev+0x84/0x138) [ 523.439952][ T6363] r9:00000000 r8:00000000 r7:843e36c0 r6:843e36c3 r5:00000000 r4:84ac0000 [ 523.440346][ T6363] [<80515570>] (do_writev) from [<80516f20>] (sys_writev+0x14/0x18) [ 523.440722][ T6363] r9:84ac0000 r8:8020029c r7:00000092 r6:00130e70 r5:00000000 r4:00000000 [ 523.441073][ T6363] [<80516f0c>] (sys_writev) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 523.441527][ T6363] Exception stack(0xdfbf1fa8 to 0xdfbf1ff0) [ 523.441817][ T6363] 1fa0: 00000000 00000000 00000005 20000000 00000001 00000000 [ 523.442239][ T6363] 1fc0: 00000000 00000000 00130e70 00000092 00000000 00006364 003d0f00 76b810bc [ 523.442602][ T6363] 1fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 523.687863][ T31] audit: type=1400 audit(523.590:341): avc: denied { prog_load } for pid=6366 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 524.339706][ T6395] FAULT_INJECTION: forcing a failure. [ 524.339706][ T6395] name failslab, interval 1, probability 0, space 0, times 0 [ 524.340538][ T6395] CPU: 0 UID: 0 PID: 6395 Comm: syz.1.675 Not tainted 6.12.0-rc2-syzkaller #0 [ 524.340932][ T6395] Hardware name: ARM-Versatile Express [ 524.341140][ T6395] Call trace: [ 524.341397][ T6395] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 524.341935][ T6395] r7:00000d40 r6:848747a8 r5:60000013 r4:8203d394 [ 524.342262][ T6395] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 524.342599][ T6395] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 524.343004][ T6395] r5:00000000 r4:82718bdc [ 524.343494][ T6395] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 524.343981][ T6395] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 524.344486][ T6395] r6:848747a8 r5:00000018 r4:82c01240 [ 524.345056][ T6395] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 524.345487][ T6395] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 524.346228][ T6395] r10:00000fff r9:82c9fc00 r8:00000000 r7:8330eaa0 r6:848747a8 r5:83747ffd [ 524.346594][ T6395] r4:83747ff0 [ 524.346771][ T6395] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 524.347236][ T6395] r9:82c9fc00 r8:00000000 r7:8330eaa0 r6:848747a8 r5:00001000 r4:83747ff1 [ 524.347765][ T6395] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 524.348470][ T6395] r5:00001000 r4:83747000 [ 524.348676][ T6395] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 524.349085][ T6395] r10:84ac3000 r9:00000000 r8:00000003 r7:0000541b r6:00000004 r5:81ad18e8 [ 524.349511][ T6395] r4:848747a8 r3:824ba340 [ 524.349760][ T6395] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 524.350266][ T6395] r9:84874780 r8:00000003 r7:20000040 r6:20000040 r5:0000541b r4:84874780 [ 524.350689][ T6395] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 524.351838][ T6395] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 524.352384][ T6395] r7:20000040 r6:84874781 r5:00000000 r4:0000541b [ 524.352778][ T6395] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 524.353302][ T6395] Exception stack(0xdff49fa8 to 0xdff49ff0) [ 524.353654][ T6395] 9fa0: 00000000 00000000 00000003 0000541b 20000040 00000000 [ 524.353990][ T6395] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b810bc [ 524.354744][ T6395] 9fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 524.355097][ T6395] r10:00000036 r9:84ac3000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 524.355721][ T6395] r4:00000000 [ 524.357515][ T6395] ERROR: Out of memory at tomoyo_realpath_from_path. [ 525.142408][ T6406] sctp: [Deprecated]: syz.1.678 (pid 6406) Use of int in max_burst socket option deprecated. [ 525.142408][ T6406] Use struct sctp_assoc_value instead [ 525.225791][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 525.225896][ T31] audit: type=1400 audit(525.130:348): avc: denied { setopt } for pid=6405 comm="syz.1.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 526.283086][ T6431] FAULT_INJECTION: forcing a failure. [ 526.283086][ T6431] name failslab, interval 1, probability 0, space 0, times 0 [ 526.285664][ T6431] CPU: 0 UID: 0 PID: 6431 Comm: syz.0.681 Not tainted 6.12.0-rc2-syzkaller #0 [ 526.288206][ T6431] Hardware name: ARM-Versatile Express [ 526.288516][ T6431] Call trace: [ 526.288815][ T6431] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 526.289369][ T6431] r7:00000c40 r6:848634a8 r5:60000013 r4:8203d394 [ 526.289693][ T6431] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 526.290444][ T6431] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 526.290873][ T6431] r5:00000000 r4:82718bdc [ 526.291090][ T6431] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 526.291722][ T6431] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 526.292450][ T6431] r6:848634a8 r5:00001000 r4:82c016c0 [ 526.292736][ T6431] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 526.293145][ T6431] [<804cd510>] (__kmalloc_noprof) from [<80750f60>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 526.293727][ T6431] r10:84ac0c00 r9:82c9fc00 r8:00000000 r7:83301550 r6:848634a8 r5:00001000 [ 526.294190][ T6431] r4:00000000 [ 526.294387][ T6431] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 526.294974][ T6431] r10:84ac0c00 r9:00000000 r8:00000003 r7:8010661b r6:00000004 r5:81ad18e8 [ 526.295303][ T6431] r4:848634a8 r3:824ba340 [ 526.295573][ T6431] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 526.296118][ T6431] r9:84863480 r8:00000003 r7:20000040 r6:20000040 r5:8010661b r4:84863480 [ 526.296946][ T6431] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 526.297347][ T6431] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 526.298201][ T6431] r7:20000040 r6:84863481 r5:00000000 r4:8010661b [ 526.298581][ T6431] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 526.300369][ T6431] Exception stack(0xe00d5fa8 to 0xe00d5ff0) [ 526.300756][ T6431] 5fa0: 00000000 00000000 00000003 8010661b 20000040 00000000 [ 526.301222][ T6431] 5fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76ae00bc [ 526.301695][ T6431] 5fe0: 76adfec0 76adfeb0 00018af8 00132ec0 [ 526.302144][ T6431] r10:00000036 r9:84ac0c00 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 526.302841][ T6431] r4:00000000 [ 526.309140][ T6431] ERROR: Out of memory at tomoyo_realpath_from_path. [ 527.506110][ T6448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6448 comm=syz.1.682 [ 528.600169][ T31] audit: type=1400 audit(528.500:349): avc: denied { ioctl } for pid=6456 comm="syz.0.684" path="socket:[9989]" dev="sockfs" ino=9989 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 528.693369][ T6459] FAULT_INJECTION: forcing a failure. [ 528.693369][ T6459] name failslab, interval 1, probability 0, space 0, times 0 [ 528.693983][ T6459] CPU: 0 UID: 0 PID: 6459 Comm: syz.0.685 Not tainted 6.12.0-rc2-syzkaller #0 [ 528.694323][ T6459] Hardware name: ARM-Versatile Express [ 528.694541][ T6459] Call trace: [ 528.694751][ T6459] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 528.695109][ T6459] r7:00000d40 r6:84863268 r5:60000013 r4:8203d394 [ 528.695360][ T6459] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 528.695681][ T6459] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 528.696005][ T6459] r5:00000000 r4:82718bdc [ 528.696228][ T6459] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 528.696577][ T6459] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 528.696929][ T6459] r6:84863268 r5:00000014 r4:82c01240 [ 528.697375][ T6459] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 528.698018][ T6459] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 528.698500][ T6459] r10:00000fff r9:840f3000 r8:00000000 r7:83301ee0 r6:84863268 r5:83744ffc [ 528.698797][ T6459] r4:83744ff3 [ 528.698950][ T6459] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 528.699271][ T6459] r9:840f3000 r8:00000000 r7:83301ee0 r6:84863268 r5:00001000 r4:83744ff4 [ 528.699533][ T6459] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 528.699871][ T6459] r5:00001000 r4:83744000 [ 528.700065][ T6459] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 528.700436][ T6459] r10:8376e000 r9:00000000 r8:00000003 r7:00005451 r6:00000004 r5:81ad18e8 [ 528.700707][ T6459] r4:84863268 r3:824ba340 [ 528.700884][ T6459] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 528.701212][ T6459] r9:84863240 r8:00000003 r7:00000000 r6:00000000 r5:00005451 r4:84863240 [ 528.701630][ T6459] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 528.702281][ T6459] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 528.702846][ T6459] r7:00000000 r6:84863241 r5:00000000 r4:00005451 [ 528.703221][ T6459] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.703548][ T6459] Exception stack(0xe002dfa8 to 0xe002dff0) [ 528.703766][ T6459] dfa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 528.704112][ T6459] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b220bc [ 528.704677][ T6459] dfe0: 76b21ec0 76b21eb0 00018af8 00132ec0 [ 528.705093][ T6459] r10:00000036 r9:8376e000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 528.705586][ T6459] r4:00000000 [ 528.709352][ T6459] ERROR: Out of memory at tomoyo_realpath_from_path. [ 528.739721][ T31] audit: type=1400 audit(528.640:350): avc: denied { write } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.740577][ T31] audit: type=1400 audit(528.640:351): avc: denied { remove_name } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.743262][ T31] audit: type=1400 audit(528.640:352): avc: denied { rename } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 528.744378][ T31] audit: type=1400 audit(528.640:353): avc: denied { add_name } for pid=2928 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.745104][ T31] audit: type=1400 audit(528.640:354): avc: denied { unlink } for pid=2928 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 528.747341][ T31] audit: type=1400 audit(528.650:355): avc: denied { create } for pid=2928 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 528.805862][ T6461] FAULT_INJECTION: forcing a failure. [ 528.805862][ T6461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 528.806515][ T6461] CPU: 1 UID: 0 PID: 6461 Comm: syz.0.686 Not tainted 6.12.0-rc2-syzkaller #0 [ 528.806842][ T6461] Hardware name: ARM-Versatile Express [ 528.807094][ T6461] Call trace: [ 528.807309][ T6461] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 528.807653][ T6461] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 528.807874][ T6461] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 528.808204][ T6461] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 528.808601][ T6461] r5:00000000 r4:8274e1c4 [ 528.808793][ T6461] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 528.809208][ T6461] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 528.809570][ T6461] r6:00000000 r5:e002df68 r4:00000002 [ 528.809804][ T6461] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 528.810170][ T6461] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 528.810544][ T6461] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 528.810928][ T6461] r10:00000001 r9:805c30ac r8:00000002 r7:e002df68 r6:0000000f r5:76b21f30 [ 528.811240][ T6461] r4:8376e000 r3:e002de9f [ 528.811504][ T6461] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 528.812295][ T6461] r8:76b21f30 r7:e002df68 r6:8376e000 r5:0000000f r4:84ab3b40 [ 528.812729][ T6461] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 528.813079][ T6461] r10:00000003 r9:8376e000 r8:8020029c r7:00000000 r6:00000000 r5:84ab3b40 [ 528.813389][ T6461] r4:84ab3b43 [ 528.813578][ T6461] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 528.813923][ T6461] r7:00000003 r6:00000007 r5:76b21f30 r4:0000000f [ 528.814178][ T6461] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.814527][ T6461] Exception stack(0xe002dfa8 to 0xe002dff0) [ 528.814805][ T6461] dfa0: 0000000f 76b21f30 00000007 76b21f30 0000000f 00000000 [ 528.815176][ T6461] dfc0: 0000000f 76b21f30 00000007 00000003 00000000 00006364 003d0f00 76b220bc [ 528.815515][ T6461] dfe0: 00000158 76b21ed0 000d8408 00130d94 [ 529.218643][ T31] audit: type=1400 audit(529.120:356): avc: denied { setattr } for pid=6464 comm="syz.0.688" name="SCTP" dev="sockfs" ino=9110 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 529.241048][ T31] audit: type=1400 audit(529.140:357): avc: denied { shutdown } for pid=6464 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 531.451191][ T6477] FAULT_INJECTION: forcing a failure. [ 531.451191][ T6477] name failslab, interval 1, probability 0, space 0, times 0 [ 531.456213][ T6477] CPU: 1 UID: 0 PID: 6477 Comm: syz.1.691 Not tainted 6.12.0-rc2-syzkaller #0 [ 531.457350][ T6477] Hardware name: ARM-Versatile Express [ 531.457606][ T6477] Call trace: [ 531.457848][ T6477] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 531.458385][ T6477] r7:00000d40 r6:84ab30e8 r5:60000013 r4:8203d394 [ 531.458670][ T6477] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 531.460922][ T6477] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 531.461378][ T6477] r5:00000000 r4:82718bdc [ 531.461664][ T6477] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 531.462112][ T6477] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 531.462533][ T6477] r6:84ab30e8 r5:00000011 r4:82c01240 [ 531.462794][ T6477] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 531.466330][ T6477] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 531.466773][ T6477] r10:00000fff r9:84afb800 r8:00000000 r7:830a8660 r6:84ab30e8 r5:84ea3ffc [ 531.467146][ T6477] r4:84ea3ff6 [ 531.467480][ T6477] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 531.467902][ T6477] r9:84afb800 r8:00000000 r7:830a8660 r6:84ab30e8 r5:00001000 r4:84ea3ff7 [ 531.468255][ T6477] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 531.468629][ T6477] r5:00001000 r4:84ea3000 [ 531.468834][ T6477] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 531.469245][ T6477] r10:83768000 r9:00000000 r8:00000005 r7:00008933 r6:00000004 r5:81ad18e8 [ 531.469570][ T6477] r4:84ab30e8 r3:824ba340 [ 531.469782][ T6477] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 531.470194][ T6477] r9:84ab30c0 r8:00000005 r7:00000000 r6:00000000 r5:00008933 r4:84ab30c0 [ 531.470520][ T6477] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 531.470908][ T6477] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 531.471378][ T6477] r7:00000000 r6:84ab30c1 r5:00000000 r4:00008933 [ 531.471752][ T6477] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 531.472174][ T6477] Exception stack(0xe00f1fa8 to 0xe00f1ff0) [ 531.472602][ T6477] 1fa0: 00000000 00000000 00000005 00008933 00000000 00000000 [ 531.473107][ T6477] 1fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b810bc [ 531.473523][ T6477] 1fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 531.473796][ T6477] r10:00000036 r9:83768000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 531.474207][ T6477] r4:00000000 [ 531.477333][ T6477] ERROR: Out of memory at tomoyo_realpath_from_path. [ 531.947533][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 531.947628][ T31] audit: type=1400 audit(531.850:359): avc: denied { ioctl } for pid=6480 comm="syz.0.692" path="socket:[9132]" dev="sockfs" ino=9132 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 532.072251][ T31] audit: type=1400 audit(531.970:360): avc: denied { create } for pid=6484 comm="syz.1.693" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 532.077788][ T31] audit: type=1400 audit(531.980:361): avc: denied { ioctl } for pid=6484 comm="syz.1.693" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10038 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 532.184972][ T31] audit: type=1400 audit(532.090:362): avc: denied { setopt } for pid=6480 comm="syz.0.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 532.186563][ T6481] lo: entered promiscuous mode [ 532.293781][ T31] audit: type=1400 audit(532.200:363): avc: denied { getopt } for pid=6480 comm="syz.0.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 532.313824][ T6480] lo: left promiscuous mode [ 532.592956][ T31] audit: type=1400 audit(532.490:364): avc: denied { read } for pid=6484 comm="syz.1.693" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10038 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 532.919060][ T6490] capability: warning: `syz.0.694' uses 32-bit capabilities (legacy support in use) [ 533.478731][ T6504] FAULT_INJECTION: forcing a failure. [ 533.478731][ T6504] name failslab, interval 1, probability 0, space 0, times 0 [ 533.479487][ T6504] CPU: 1 UID: 0 PID: 6504 Comm: syz.0.700 Not tainted 6.12.0-rc2-syzkaller #0 [ 533.479863][ T6504] Hardware name: ARM-Versatile Express [ 533.480160][ T6504] Call trace: [ 533.480407][ T6504] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 533.480834][ T6504] r7:00000d40 r6:84ab3e68 r5:60000013 r4:8203d394 [ 533.481129][ T6504] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 533.481647][ T6504] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 533.482242][ T6504] r5:00000000 r4:82718bdc [ 533.482612][ T6504] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 533.483172][ T6504] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 533.483614][ T6504] r6:84ab3e68 r5:00000025 r4:82c01240 [ 533.483865][ T6504] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 533.484305][ T6504] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 533.484722][ T6504] r10:00000fff r9:82c9e800 r8:00000000 r7:830ea6e8 r6:84ab3e68 r5:84ea6ffc [ 533.485051][ T6504] r4:84ea6fe2 [ 533.485253][ T6504] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 533.485646][ T6504] r9:82c9e800 r8:00000000 r7:830ea6e8 r6:84ab3e68 r5:00001000 r4:84ea6fe3 [ 533.485967][ T6504] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 533.486417][ T6504] r5:00001000 r4:84ea6000 [ 533.486637][ T6504] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 533.487110][ T6504] r10:849b5400 r9:00000000 r8:00000003 r7:c0485510 r6:00000004 r5:81ad18e8 [ 533.487482][ T6504] r4:84ab3e68 r3:824ba340 [ 533.487714][ T6504] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 533.488220][ T6504] r9:84ab3e40 r8:00000003 r7:00000000 r6:00000000 r5:c0485510 r4:84ab3e40 [ 533.488548][ T6504] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 533.488990][ T6504] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 533.489417][ T6504] r7:00000000 r6:84ab3e41 r5:00000000 r4:c0485510 [ 533.489714][ T6504] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 533.490109][ T6504] Exception stack(0xdff8dfa8 to 0xdff8dff0) [ 533.490409][ T6504] dfa0: 00000000 00000000 00000003 c0485510 00000000 00000000 [ 533.490788][ T6504] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b220bc [ 533.491166][ T6504] dfe0: 76b21ec0 76b21eb0 00018af8 00132ec0 [ 533.491469][ T6504] r10:00000036 r9:849b5400 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 533.492833][ T6504] r4:00000000 [ 533.503308][ T6504] ERROR: Out of memory at tomoyo_realpath_from_path. [ 534.012385][ T4263] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 534.162204][ T4263] usb 1-1: Using ep0 maxpacket: 32 [ 534.178707][ T4263] usb 1-1: unable to get BOS descriptor or descriptor too short [ 534.182368][ T4263] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 534.182821][ T4263] usb 1-1: can't read configurations, error -71 [ 534.356428][ T6518] FAULT_INJECTION: forcing a failure. [ 534.356428][ T6518] name failslab, interval 1, probability 0, space 0, times 0 [ 534.358830][ T6518] CPU: 0 UID: 0 PID: 6518 Comm: syz.0.704 Not tainted 6.12.0-rc2-syzkaller #0 [ 534.359416][ T6518] Hardware name: ARM-Versatile Express [ 534.359641][ T6518] Call trace: [ 534.359843][ T6518] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 534.360259][ T6518] r7:84ac3000 r6:00000cc0 r5:60000013 r4:8203d394 [ 534.360491][ T6518] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 534.360799][ T6518] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 534.361099][ T6518] r5:00000000 r4:82718bdc [ 534.361293][ T6518] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 534.361903][ T6518] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 534.362447][ T6518] r6:00000cc0 r5:ffffffff r4:82cac780 [ 534.362760][ T6518] [<804e811c>] (should_failslab) from [<804ccbbc>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 534.363242][ T6518] [<804ccb6c>] (kmem_cache_alloc_node_noprof) from [<81490f00>] (__alloc_skb+0x138/0x160) [ 534.363607][ T6518] r10:e06dde24 r9:00000000 r8:00000cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 534.363890][ T6518] r4:82606000 [ 534.364070][ T6518] [<81490dc8>] (__alloc_skb) from [<814990d4>] (alloc_skb_with_frags+0x44/0x1ec) [ 534.364425][ T6518] r8:802a6dd8 r7:e06dddac r6:00000000 r5:00001000 r4:00000000 [ 534.364760][ T6518] [<81499090>] (alloc_skb_with_frags) from [<8148a7d4>] (sock_alloc_send_pskb+0x1f4/0x228) [ 534.365131][ T6518] r10:e06dde24 r9:00000000 r8:802a6dd8 r7:e06dddac r6:84ac3000 r5:7fffffff [ 534.365427][ T6518] r4:84f78000 [ 534.365594][ T6518] [<8148a5e0>] (sock_alloc_send_pskb) from [<8182c93c>] (isotp_sendmsg+0x2b4/0x7fc) [ 534.365992][ T6518] r10:e06dde98 r9:00000003 r8:e06ddea8 r7:00000003 r6:84f78000 r5:84f7a000 [ 534.366335][ T6518] r4:00000000 [ 534.366510][ T6518] [<8182c688>] (isotp_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 534.366836][ T6518] r10:00000122 r9:84ac3000 r8:00000004 r7:845e4500 r6:845e4500 r5:e06dde98 [ 534.367130][ T6518] r4:00000000 [ 534.367293][ T6518] [<81483654>] (__sock_sendmsg) from [<81485cf0>] (__sys_sendto+0x108/0x14c) [ 534.367625][ T6518] r7:845e4500 r6:00000000 r5:00000000 r4:00000000 [ 534.367844][ T6518] [<81485be8>] (__sys_sendto) from [<81485d50>] (sys_sendto+0x1c/0x24) [ 534.368172][ T6518] r8:8020029c r7:00000122 r6:00130e70 r5:00000000 r4:00000000 [ 534.368425][ T6518] [<81485d34>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 534.368732][ T6518] Exception stack(0xe06ddfa8 to 0xe06ddff0) [ 534.368974][ T6518] dfa0: 00000000 00000000 00000004 20000e00 00000003 00000000 [ 534.369336][ T6518] dfc0: 00000000 00000000 00130e70 00000122 00000000 00006364 003d0f00 76b220bc [ 534.369665][ T6518] dfe0: 76b21ec0 76b21eb0 00018af8 00132ec0 [ 534.496313][ T31] audit: type=1400 audit(534.400:365): avc: denied { map } for pid=6519 comm="syz.0.705" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9201 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 534.497110][ T31] audit: type=1400 audit(534.400:366): avc: denied { write } for pid=6519 comm="syz.0.705" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9201 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 534.668767][ T6523] FAULT_INJECTION: forcing a failure. [ 534.668767][ T6523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 534.669528][ T6523] CPU: 0 UID: 0 PID: 6523 Comm: syz.0.706 Not tainted 6.12.0-rc2-syzkaller #0 [ 534.669821][ T6523] Hardware name: ARM-Versatile Express [ 534.670048][ T6523] Call trace: [ 534.670238][ T6523] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 534.670565][ T6523] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 534.670773][ T6523] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 534.671174][ T6523] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 534.671557][ T6523] r5:00000000 r4:8274e1c4 [ 534.671776][ T6523] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 534.672381][ T6523] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 534.672794][ T6523] r6:00000000 r5:e04d9f68 r4:00000002 [ 534.673001][ T6523] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 534.673305][ T6523] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 534.673791][ T6523] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 534.674191][ T6523] r10:00000001 r9:805c30ac r8:00000002 r7:e04d9f68 r6:0000000f r5:76b21f30 [ 534.674531][ T6523] r4:849b3c00 r3:e04d9e9f [ 534.674739][ T6523] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 534.675324][ T6523] r8:76b21f30 r7:e04d9f68 r6:849b3c00 r5:0000000f r4:848636c0 [ 534.675791][ T6523] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 534.676265][ T6523] r10:00000003 r9:849b3c00 r8:8020029c r7:00000000 r6:00000000 r5:848636c0 [ 534.676600][ T6523] r4:848636c3 [ 534.676763][ T6523] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 534.677092][ T6523] r7:00000003 r6:00000004 r5:76b21f30 r4:0000000f [ 534.677399][ T6523] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 534.677941][ T6523] Exception stack(0xe04d9fa8 to 0xe04d9ff0) [ 534.678298][ T6523] 9fa0: 0000000f 76b21f30 00000004 76b21f30 0000000f 00000000 [ 534.678743][ T6523] 9fc0: 0000000f 76b21f30 00000004 00000003 00000000 00006364 003d0f00 76b220bc [ 534.679078][ T6523] 9fe0: 00000158 76b21ed0 000d8408 00130d94 [ 534.707173][ T31] audit: type=1400 audit(534.600:367): avc: denied { create } for pid=6522 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 534.709885][ T31] audit: type=1400 audit(534.610:368): avc: denied { write } for pid=6522 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 537.277831][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 537.277956][ T31] audit: type=1400 audit(537.180:373): avc: denied { getopt } for pid=6578 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 537.299242][ T31] audit: type=1400 audit(537.200:374): avc: denied { connect } for pid=6578 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 538.289156][ T6592] FAULT_INJECTION: forcing a failure. [ 538.289156][ T6592] name failslab, interval 1, probability 0, space 0, times 0 [ 538.289619][ T6592] CPU: 0 UID: 0 PID: 6592 Comm: syz.1.735 Not tainted 6.12.0-rc2-syzkaller #0 [ 538.289807][ T6592] Hardware name: ARM-Versatile Express [ 538.290048][ T6592] Call trace: [ 538.290208][ T6592] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 538.290484][ T6592] r7:00000820 r6:83eb7358 r5:60000013 r4:8203d394 [ 538.290756][ T6592] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 538.291091][ T6592] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 538.291402][ T6592] r5:00000000 r4:82718bdc [ 538.291966][ T6592] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 538.292886][ T6592] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 538.293236][ T6592] r6:83eb7358 r5:00000017 r4:82c01240 [ 538.293442][ T6592] [<804e811c>] (should_failslab) from [<804ce260>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 538.293825][ T6592] [<804ce1c0>] (__kmalloc_node_track_caller_noprof) from [<8046cbc0>] (kmemdup_noprof+0x28/0x44) [ 538.294204][ T6592] r10:00000080 r9:84179004 r8:eaacdbc0 r7:840c2000 r6:83eb7358 r5:00000017 [ 538.294504][ T6592] r4:82ee3100 [ 538.294673][ T6592] [<8046cb98>] (kmemdup_noprof) from [<8072ffdc>] (sidtab_sid2str_get+0x54/0xa4) [ 538.294973][ T6592] r7:840c2000 r6:eaacdbc0 r5:eaacdbb8 r4:82ee3100 [ 538.295164][ T6592] [<8072ff88>] (sidtab_sid2str_get) from [<80737414>] (sidtab_entry_to_string+0x34/0x94) [ 538.295409][ T6592] r7:840c2000 r6:82ee3100 r5:eaacdbb8 r4:00000060 [ 538.295565][ T6592] [<807373e0>] (sidtab_entry_to_string) from [<8073758c>] (security_sid_to_context_core+0x118/0x17c) [ 538.295829][ T6592] r9:eaacdcfc r8:840c2000 r7:84179004 r6:eaacdbc0 r5:eaacdbb8 r4:00000060 [ 538.296069][ T6592] [<80737474>] (security_sid_to_context_core) from [<8073a388>] (security_sid_to_context+0x1c/0x24) [ 538.296363][ T6592] r8:84ac3000 r7:8071b7d0 r6:851d0580 r5:82f31000 r4:eaacdc68 [ 538.296538][ T6592] [<8073a36c>] (security_sid_to_context) from [<8071c9e8>] (avc_audit_post_callback+0x80/0x2f8) [ 538.296827][ T6592] [<8071c968>] (avc_audit_post_callback) from [<80742128>] (common_lsm_audit+0x16c/0x904) [ 538.297061][ T6592] r10:00000080 r9:eaacdcfc r8:8071c968 r7:8071b7d0 r6:851d0580 r5:82f31000 [ 538.297253][ T6592] r4:eaacdcfc [ 538.297350][ T6592] [<80741fbc>] (common_lsm_audit) from [<8071ce78>] (slow_avc_audit+0xbc/0x114) [ 538.297601][ T6592] r9:eaacdcfc r8:00000056 r7:00000060 r6:00000060 r5:00000060 r4:00000060 [ 538.297844][ T6592] [<8071cdbc>] (slow_avc_audit) from [<8071d764>] (avc_has_perm+0xd4/0xe4) [ 538.298057][ T6592] r5:00000000 r4:00000004 [ 538.298292][ T6592] [<8071d690>] (avc_has_perm) from [<80722ae8>] (sock_has_perm+0xd8/0x104) [ 538.298625][ T6592] r9:84ac3000 r8:00000004 r7:851d0580 r6:8224220c r5:850cdc00 r4:00000000 [ 538.299079][ T6592] [<80722a10>] (sock_has_perm) from [<80722b9c>] (selinux_socket_sendmsg+0x18/0x1c) [ 538.299429][ T6592] r9:eaacddd4 r8:eaacddd4 r7:00000000 r6:00033fe0 r5:eaacdf38 r4:845e4280 [ 538.299747][ T6592] [<80722b84>] (selinux_socket_sendmsg) from [<807163a4>] (security_socket_sendmsg+0x64/0x1e4) [ 538.300077][ T6592] [<80716340>] (security_socket_sendmsg) from [<81483670>] (__sock_sendmsg+0x1c/0x78) [ 538.300456][ T6592] r7:00000000 r6:845e4280 r5:eaacdf38 r4:eaacdf38 [ 538.300707][ T6592] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 538.301360][ T6592] r7:00000000 r6:00000000 r5:845e4280 r4:eaacdf38 [ 538.301631][ T6592] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 538.302318][ T6592] r10:eaacde34 r9:20000140 r8:00000080 r7:00000000 r6:845e4280 r5:eaacdf38 [ 538.302713][ T6592] r4:00000000 [ 538.303007][ T6592] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 538.303346][ T6592] r10:00000128 r9:84ac3000 r8:8020029c r7:00000080 r6:20000140 r5:845e4280 [ 538.303691][ T6592] r4:00000000 [ 538.303873][ T6592] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 538.304228][ T6592] Exception stack(0xeaacdfa8 to 0xeaacdff0) [ 538.304471][ T6592] dfa0: 00000000 00000000 00000003 20000140 00000080 00000000 [ 538.304793][ T6592] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b810bc [ 538.305109][ T6592] dfe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 538.305353][ T6592] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 538.312426][ T31] audit: type=1400 audit(538.190:375): avc: denied { write } for pid=6591 comm="syz.1.735" scontext=root:sysadm_r:sysadm_t tsid=96 tclass=kcm_socket permissive=1 [ 538.615081][ T31] audit: type=1400 audit(538.520:376): avc: denied { write } for pid=6585 comm="syz.0.733" path="socket:[11287]" dev="sockfs" ino=11287 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 538.959757][ T6603] lo: entered promiscuous mode [ 539.148326][ T6602] lo: left promiscuous mode [ 539.489839][ T31] audit: type=1400 audit(539.390:377): avc: denied { read } for pid=6612 comm="syz.1.743" path="socket:[10382]" dev="sockfs" ino=10382 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 540.179830][ T6619] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6619 comm=syz.0.745 [ 542.774777][ T31] audit: type=1400 audit(542.680:378): avc: denied { create } for pid=6629 comm="syz.1.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 542.787092][ T31] audit: type=1400 audit(542.690:379): avc: denied { write } for pid=6629 comm="syz.1.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 543.507293][ T31] audit: type=1400 audit(543.410:380): avc: denied { sys_module } for pid=6637 comm="syz.0.752" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 543.614975][ T6638] lo: entered promiscuous mode [ 543.963413][ T6637] lo: left promiscuous mode [ 544.015827][ T6656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6656 comm=syz.1.756 [ 544.639787][ T31] audit: type=1400 audit(544.540:381): avc: denied { accept } for pid=6660 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 544.645905][ T31] audit: type=1400 audit(544.540:382): avc: denied { write } for pid=6660 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 545.220333][ T31] audit: type=1400 audit(545.120:383): avc: denied { getopt } for pid=6662 comm="syz.0.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 545.327131][ T31] audit: type=1400 audit(545.230:384): avc: denied { create } for pid=6671 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 545.330209][ T31] audit: type=1400 audit(545.230:385): avc: denied { write } for pid=6671 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 545.583476][ T6678] lo: entered promiscuous mode [ 545.719036][ T6677] lo: left promiscuous mode [ 546.389210][ T31] audit: type=1400 audit(546.290:386): avc: denied { getopt } for pid=6687 comm="syz.0.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 546.923003][ T31] audit: type=1400 audit(546.830:387): avc: denied { listen } for pid=6694 comm="syz.0.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 546.928131][ T6695] FAULT_INJECTION: forcing a failure. [ 546.928131][ T6695] name failslab, interval 1, probability 0, space 0, times 0 [ 546.928755][ T6695] CPU: 1 UID: 0 PID: 6695 Comm: syz.0.765 Not tainted 6.12.0-rc2-syzkaller #0 [ 546.929081][ T6695] Hardware name: ARM-Versatile Express [ 546.929311][ T6695] Call trace: [ 546.929530][ T6695] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 546.929906][ T6695] r7:00000d40 r6:84ab3028 r5:60000013 r4:8203d394 [ 546.930150][ T6695] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 546.930481][ T6695] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 546.931292][ T6695] r5:00000000 r4:82718bdc [ 546.931799][ T6695] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 546.932307][ T6695] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 546.932866][ T6695] r6:84ab3028 r5:00000019 r4:82c01240 [ 546.933106][ T6695] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 546.933490][ T6695] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 546.934071][ T6695] r10:00000fff r9:82c9fc00 r8:00000000 r7:845cc550 r6:84ab3028 r5:84ea3ffd [ 546.934410][ T6695] r4:84ea3fef [ 546.934665][ T6695] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 546.935012][ T6695] r9:82c9fc00 r8:00000000 r7:845cc550 r6:84ab3028 r5:00001000 r4:84ea3ff0 [ 546.935532][ T6695] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 546.936016][ T6695] r5:00001000 r4:84ea3000 [ 546.936271][ T6695] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 546.936707][ T6695] r10:84d18c00 r9:00000000 r8:00000006 r7:00004b3b r6:00000004 r5:81ad18e8 [ 546.937129][ T6695] r4:84ab3028 r3:824ba340 [ 546.937404][ T6695] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 546.937931][ T6695] r9:84ab3000 r8:00000006 r7:00000000 r6:00000000 r5:00004b3b r4:84ab3000 [ 546.938264][ T6695] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 546.938694][ T6695] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 546.939110][ T6695] r7:00000000 r6:84ab3001 r5:00000000 r4:00004b3b [ 546.939383][ T6695] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 546.939804][ T6695] Exception stack(0xe888dfa8 to 0xe888dff0) [ 546.940109][ T6695] dfa0: 00000000 00000000 00000006 00004b3b 00000000 00000000 [ 546.940506][ T6695] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b220bc [ 546.941033][ T6695] dfe0: 76b21ec0 76b21eb0 00018af8 00132ec0 [ 546.941318][ T6695] r10:00000036 r9:84d18c00 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 546.942044][ T6695] r4:00000000 [ 546.944299][ T6695] ERROR: Out of memory at tomoyo_realpath_from_path. [ 547.268894][ T6697] lo: entered promiscuous mode [ 547.434326][ T6696] lo: left promiscuous mode [ 548.032958][ T6719] lo: entered promiscuous mode [ 548.152325][ T6718] lo: left promiscuous mode [ 548.239364][ T6728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6728 comm=syz.1.773 [ 548.260783][ T31] audit: type=1400 audit(548.160:388): avc: denied { getopt } for pid=6727 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 551.296004][ T6741] lo: entered promiscuous mode [ 551.486212][ T6740] lo: left promiscuous mode [ 552.003452][ T6759] FAULT_INJECTION: forcing a failure. [ 552.003452][ T6759] name failslab, interval 1, probability 0, space 0, times 0 [ 552.004272][ T6759] CPU: 0 UID: 0 PID: 6759 Comm: syz.0.783 Not tainted 6.12.0-rc2-syzkaller #0 [ 552.005008][ T6759] Hardware name: ARM-Versatile Express [ 552.005491][ T6759] Call trace: [ 552.005739][ T6759] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 552.006110][ T6759] r7:84ac0000 r6:00000cc0 r5:60000013 r4:8203d394 [ 552.006386][ T6759] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 552.006699][ T6759] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 552.007017][ T6759] r5:00000000 r4:82718bdc [ 552.007213][ T6759] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 552.007526][ T6759] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 552.007853][ T6759] r6:00000cc0 r5:ffffffff r4:82cac780 [ 552.008089][ T6759] [<804e811c>] (should_failslab) from [<804ccbbc>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 552.008454][ T6759] [<804ccb6c>] (kmem_cache_alloc_node_noprof) from [<81490f00>] (__alloc_skb+0x138/0x160) [ 552.008812][ T6759] r10:00000000 r9:ffffffed r8:00000cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 552.009092][ T6759] r4:82606000 [ 552.009275][ T6759] [<81490dc8>] (__alloc_skb) from [<815a6d3c>] (netlink_ack+0x70/0x21c) [ 552.009592][ T6759] r8:84184fc0 r7:84e1a9c0 r6:00000000 r5:814cd0f4 r4:00000024 [ 552.010017][ T6759] [<815a6ccc>] (netlink_ack) from [<815a6fd4>] (netlink_rcv_skb+0xec/0x120) [ 552.010409][ T6759] r10:00000000 r9:00000000 r8:84888000 r7:00000020 r6:84184fc0 r5:814cd0f4 [ 552.010696][ T6759] r4:84e1a9c0 [ 552.010886][ T6759] [<815a6ee8>] (netlink_rcv_skb) from [<814cbbcc>] (rtnetlink_rcv+0x18/0x1c) [ 552.011307][ T6759] r7:84e1a9c0 r6:84a00080 r5:00000020 r4:84376400 [ 552.011808][ T6759] [<814cbbb4>] (rtnetlink_rcv) from [<815a6790>] (netlink_unicast+0x19c/0x29c) [ 552.012524][ T6759] [<815a65f4>] (netlink_unicast) from [<815a6a6c>] (netlink_sendmsg+0x1dc/0x43c) [ 552.013273][ T6759] r9:00000000 r8:00000000 r7:851c3c00 r6:00000020 r5:84e1a9c0 r4:eb04de98 [ 552.013604][ T6759] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 552.013976][ T6759] r10:00000122 r9:84ac0000 r8:00000004 r7:8339e780 r6:8339e780 r5:eb04de98 [ 552.014298][ T6759] r4:00000000 [ 552.014481][ T6759] [<81483654>] (__sock_sendmsg) from [<81485cf0>] (__sys_sendto+0x108/0x14c) [ 552.014836][ T6759] r7:8339e780 r6:76b20e1c r5:00000000 r4:00000000 [ 552.015094][ T6759] [<81485be8>] (__sys_sendto) from [<81485d50>] (sys_sendto+0x1c/0x24) [ 552.015449][ T6759] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b20e1c [ 552.016362][ T6759] [<81485d34>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 552.017315][ T6759] Exception stack(0xeb04dfa8 to 0xeb04dff0) [ 552.017624][ T6759] dfa0: 76b20e1c 0000000c 00000004 76b20eb0 00000020 00000000 [ 552.018034][ T6759] dfc0: 76b20e1c 0000000c 00000000 00000122 00000004 00000000 76b20eb0 76b220bc [ 552.018409][ T6759] dfe0: 00000000 76b20df0 000d8408 00135358 [ 552.592516][ T6767] lo: entered promiscuous mode [ 552.713748][ T6766] lo: left promiscuous mode [ 555.252731][ T6787] lo: entered promiscuous mode [ 555.464092][ T6786] lo: left promiscuous mode [ 556.804809][ T31] audit: type=1400 audit(556.710:389): avc: denied { bind } for pid=6799 comm="syz.0.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 556.805943][ T31] audit: type=1400 audit(556.710:390): avc: denied { name_bind } for pid=6799 comm="syz.0.794" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 556.806379][ T31] audit: type=1400 audit(556.710:391): avc: denied { node_bind } for pid=6799 comm="syz.0.794" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 556.807286][ T31] audit: type=1400 audit(556.710:392): avc: denied { name_connect } for pid=6799 comm="syz.0.794" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 556.844075][ T31] audit: type=1400 audit(556.750:393): avc: denied { write } for pid=6799 comm="syz.0.794" path="socket:[10615]" dev="sockfs" ino=10615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 558.221084][ T6806] lo: entered promiscuous mode [ 558.431351][ T6805] lo: left promiscuous mode [ 559.933218][ T6828] lo: entered promiscuous mode [ 560.117837][ T6827] lo: left promiscuous mode [ 560.396604][ T31] audit: type=1400 audit(560.300:394): avc: denied { map } for pid=6837 comm="syz.0.804" path="socket:[11596]" dev="sockfs" ino=11596 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 560.828322][ T6843] lo: entered promiscuous mode [ 561.029712][ T6842] lo: left promiscuous mode [ 561.710072][ T6865] lo: entered promiscuous mode [ 561.834303][ T6864] lo: left promiscuous mode [ 561.909047][ T31] audit: type=1400 audit(561.810:395): avc: denied { getopt } for pid=6870 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 561.914256][ T6871] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6871 comm=syz.1.814 [ 562.300384][ T31] audit: type=1400 audit(562.200:396): avc: denied { ioctl } for pid=6877 comm="syz.1.817" path="socket:[10694]" dev="sockfs" ino=10694 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 562.544500][ T31] audit: type=1400 audit(562.450:397): avc: denied { read } for pid=6885 comm="syz.0.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 562.647494][ T6883] lo: entered promiscuous mode [ 562.654064][ T6882] lo: left promiscuous mode [ 562.737462][ T6889] FAULT_INJECTION: forcing a failure. [ 562.737462][ T6889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.738121][ T6889] CPU: 0 UID: 0 PID: 6889 Comm: syz.1.820 Not tainted 6.12.0-rc2-syzkaller #0 [ 562.738462][ T6889] Hardware name: ARM-Versatile Express [ 562.738911][ T6889] Call trace: [ 562.739227][ T6889] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 562.739717][ T6889] r7:20002a80 r6:ec589e30 r5:60000013 r4:8203d394 [ 562.739986][ T6889] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 562.740246][ T6889] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 562.740463][ T6889] r5:00000000 r4:8274e1c4 [ 562.740596][ T6889] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 562.740986][ T6889] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 562.741307][ T6889] r6:ec589e30 r5:00000000 r4:ec589f38 [ 562.741650][ T6889] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 562.742068][ T6889] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 562.742422][ T6889] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 562.742757][ T6889] r8:04008000 r7:00000000 r6:8339ec80 r5:ec589f38 r4:ec589e74 [ 562.743061][ T6889] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 562.743397][ T6889] r10:00000128 r9:84ac0000 r8:8020029c r7:04008000 r6:20002a80 r5:8339ec80 [ 562.743678][ T6889] r4:00000000 [ 562.743828][ T6889] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 562.744200][ T6889] Exception stack(0xec589fa8 to 0xec589ff0) [ 562.744553][ T6889] 9fa0: 00000000 00000000 00000005 20002a80 04008000 00000000 [ 562.744909][ T6889] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b810bc [ 562.745224][ T6889] 9fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 562.745486][ T6889] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 563.053876][ T6893] FAULT_INJECTION: forcing a failure. [ 563.053876][ T6893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 563.054681][ T6893] CPU: 1 UID: 0 PID: 6893 Comm: syz.0.819 Not tainted 6.12.0-rc2-syzkaller #0 [ 563.055142][ T6893] Hardware name: ARM-Versatile Express [ 563.055451][ T6893] Call trace: [ 563.055791][ T6893] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 563.056193][ T6893] r7:20000080 r6:0000000c r5:60000013 r4:8203d394 [ 563.056490][ T6893] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 563.057067][ T6893] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 563.057804][ T6893] r5:00000000 r4:8274e1c4 [ 563.058091][ T6893] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 563.058866][ T6893] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 563.059392][ T6893] r6:0000000c r5:ec5c1e74 r4:0000000c [ 563.059614][ T6893] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 563.059984][ T6893] [<808e5324>] (should_fail_usercopy) from [<814846f8>] (move_addr_to_kernel+0x3c/0xe4) [ 563.060484][ T6893] [<814846bc>] (move_addr_to_kernel) from [<8148640c>] (__copy_msghdr+0xe4/0x110) [ 563.061132][ T6893] r9:20000300 r8:b5403587 r7:20000300 r6:ec5c1e30 r5:ec5c1de0 r4:ec5c1f38 [ 563.061608][ T6893] [<81486328>] (__copy_msghdr) from [<81486508>] (copy_msghdr_from_user+0xd0/0x130) [ 563.062160][ T6893] r5:00000000 r4:ec5c1f38 [ 563.062350][ T6893] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 563.062835][ T6893] r8:20028890 r7:00000000 r6:845ea280 r5:ec5c1f38 r4:ec5c1e74 [ 563.063222][ T6893] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 563.063784][ T6893] r10:00000128 r9:84ac6000 r8:8020029c r7:20028890 r6:20000300 r5:845ea280 [ 563.064257][ T6893] r4:00000000 [ 563.064557][ T6893] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 563.064951][ T6893] Exception stack(0xec5c1fa8 to 0xec5c1ff0) [ 563.065340][ T6893] 1fa0: 00000000 00000000 00000003 20000300 20028890 00000000 [ 563.065802][ T6893] 1fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b010bc [ 563.066284][ T6893] 1fe0: 76b00ec0 76b00eb0 00018af8 00132ec0 [ 563.066604][ T6893] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 564.946143][ T31] audit: type=1400 audit(564.850:398): avc: denied { create } for pid=6924 comm="syz.0.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 567.676695][ T31] audit: type=1400 audit(567.580:399): avc: denied { create } for pid=6985 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 567.683228][ T31] audit: type=1400 audit(567.590:400): avc: denied { write } for pid=6985 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 567.689654][ T31] audit: type=1400 audit(567.590:401): avc: denied { ioctl } for pid=6985 comm="syz.0.853" path="socket:[10839]" dev="sockfs" ino=10839 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 567.690957][ T31] audit: type=1400 audit(567.590:402): avc: denied { setattr } for pid=6985 comm="syz.0.853" name="AF_VSOCK" dev="sockfs" ino=10839 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 567.697702][ T31] audit: type=1400 audit(567.600:403): avc: denied { create } for pid=6985 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 567.825242][ T31] audit: type=1400 audit(567.730:404): avc: denied { ioctl } for pid=6985 comm="syz.0.853" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 570.974449][ T7015] FAULT_INJECTION: forcing a failure. [ 570.974449][ T7015] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.975157][ T7015] CPU: 1 UID: 0 PID: 7015 Comm: syz.0.855 Not tainted 6.12.0-rc2-syzkaller #0 [ 570.975559][ T7015] Hardware name: ARM-Versatile Express [ 570.975807][ T7015] Call trace: [ 570.976074][ T7015] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 570.976500][ T7015] r7:fffffdfd r6:84888000 r5:60000013 r4:8203d394 [ 570.976763][ T7015] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 570.977122][ T7015] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 570.977494][ T7015] r5:00000000 r4:8274e1c4 [ 570.977700][ T7015] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 570.978149][ T7015] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 570.978573][ T7015] r6:84888000 r5:200000c0 r4:00008953 [ 570.978844][ T7015] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 570.979226][ T7015] [<808e5324>] (should_fail_usercopy) from [<81484cb8>] (sock_ioctl+0x478/0x608) [ 570.979588][ T7015] [<81484840>] (sock_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 570.980078][ T7015] r9:84863900 r8:00000004 r7:200000c0 r6:84863901 r5:00000000 r4:00008953 [ 570.980412][ T7015] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 570.981060][ T7015] Exception stack(0xeca2dfa8 to 0xeca2dff0) [ 570.981343][ T7015] dfa0: 00000000 00000000 00000004 00008953 200000c0 00000000 [ 570.981836][ T7015] dfc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76ae00bc [ 570.982450][ T7015] dfe0: 76adfec0 76adfeb0 00018af8 00132ec0 [ 570.982922][ T7015] r10:00000036 r9:82e45400 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 570.983391][ T7015] r4:00000000 [ 571.650731][ T31] audit: type=1400 audit(571.550:405): avc: denied { create } for pid=7034 comm="syz.1.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 571.653274][ T31] audit: type=1400 audit(571.560:406): avc: denied { setopt } for pid=7034 comm="syz.1.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 572.058953][ T31] audit: type=1400 audit(571.960:407): avc: denied { node_bind } for pid=7048 comm="syz.1.876" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 572.064797][ T7049] FAULT_INJECTION: forcing a failure. [ 572.064797][ T7049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 572.065355][ T7049] CPU: 1 UID: 0 PID: 7049 Comm: syz.1.876 Not tainted 6.12.0-rc2-syzkaller #0 [ 572.065623][ T7049] Hardware name: ARM-Versatile Express [ 572.065827][ T7049] Call trace: [ 572.066019][ T7049] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 572.066248][ T7049] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 572.066469][ T7049] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 572.066736][ T7049] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 572.066991][ T7049] r5:00000000 r4:8274e1c4 [ 572.067163][ T7049] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 572.067553][ T7049] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 572.067753][ T7049] r6:00000000 r5:ec8f5f68 r4:00000002 [ 572.067886][ T7049] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 572.068150][ T7049] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 572.068482][ T7049] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 572.068891][ T7049] r10:00000001 r9:805c30ac r8:00000002 r7:ec8f5f68 r6:0000000f r5:76b80f30 [ 572.069085][ T7049] r4:83872400 r3:ec8f5e9f [ 572.069230][ T7049] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 572.069474][ T7049] r8:76b80f30 r7:ec8f5f68 r6:83872400 r5:0000000f r4:84ab3b40 [ 572.069640][ T7049] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 572.069893][ T7049] r10:00000003 r9:83872400 r8:8020029c r7:00000000 r6:00000000 r5:84ab3b40 [ 572.070082][ T7049] r4:84ab3b43 [ 572.070210][ T7049] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 572.070484][ T7049] r7:00000003 r6:00000004 r5:76b80f30 r4:0000000f [ 572.070637][ T7049] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 572.070851][ T7049] Exception stack(0xec8f5fa8 to 0xec8f5ff0) [ 572.071054][ T7049] 5fa0: 0000000f 76b80f30 00000004 76b80f30 0000000f 00000000 [ 572.071261][ T7049] 5fc0: 0000000f 76b80f30 00000004 00000003 00000000 00006364 003d0f00 76b810bc [ 572.071531][ T7049] 5fe0: 00000158 76b80ed0 000d8408 00130d94 [ 573.437091][ T7078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7078 comm=syz.0.889 [ 574.855094][ T31] audit: type=1400 audit(574.760:408): avc: denied { execute } for pid=7090 comm="syz.1.894" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 576.318111][ T31] audit: type=1400 audit(576.220:409): avc: denied { execmem } for pid=7108 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 576.803334][ T31] audit: type=1400 audit(576.710:410): avc: denied { create } for pid=7119 comm="syz.1.902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 577.425614][ T7129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7129 comm=syz.1.903 [ 579.866219][ T7152] syz.0.908 uses obsolete (PF_INET,SOCK_PACKET) [ 580.185675][ T31] audit: type=1400 audit(580.090:411): avc: denied { name_connect } for pid=7157 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 581.488885][ T7171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7171 comm=syz.0.917 [ 581.998984][ T7181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7181 comm=syz.0.922 [ 583.453588][ T7190] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7190 comm=syz.0.926 [ 583.523082][ T7192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7192 comm=syz.1.927 [ 584.422382][ T7208] FAULT_INJECTION: forcing a failure. [ 584.422382][ T7208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 584.423083][ T7208] CPU: 1 UID: 0 PID: 7208 Comm: syz.1.932 Not tainted 6.12.0-rc2-syzkaller #0 [ 584.423425][ T7208] Hardware name: ARM-Versatile Express [ 584.423640][ T7208] Call trace: [ 584.423873][ T7208] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 584.424282][ T7208] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 584.424543][ T7208] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 584.424889][ T7208] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 584.425256][ T7208] r5:00000000 r4:8274e1c4 [ 584.425449][ T7208] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 584.425806][ T7208] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 584.426200][ T7208] r6:00000000 r5:ed4b5f68 r4:00000002 [ 584.426456][ T7208] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 584.426840][ T7208] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 584.427258][ T7208] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 584.427714][ T7208] r10:00000001 r9:805c30ac r8:00000002 r7:ed4b5f68 r6:0000000f r5:76b80f30 [ 584.428077][ T7208] r4:8378bc00 r3:ed4b5e9f [ 584.428312][ T7208] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 584.428713][ T7208] r8:76b80f30 r7:ed4b5f68 r6:8378bc00 r5:0000000f r4:84ab3540 [ 584.429004][ T7208] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 584.429370][ T7208] r10:00000003 r9:8378bc00 r8:8020029c r7:00000000 r6:00000000 r5:84ab3540 [ 584.429697][ T7208] r4:84ab3543 [ 584.429887][ T7208] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 584.430261][ T7208] r7:00000003 r6:00000008 r5:76b80f30 r4:0000000f [ 584.430530][ T7208] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 584.430872][ T7208] Exception stack(0xed4b5fa8 to 0xed4b5ff0) [ 584.431150][ T7208] 5fa0: 0000000f 76b80f30 00000008 76b80f30 0000000f 00000000 [ 584.432415][ T7208] 5fc0: 0000000f 76b80f30 00000008 00000003 00000000 00006364 003d0f00 76b810bc [ 584.433060][ T7208] 5fe0: 00000158 76b80ed0 000d8408 00130d94 [ 584.544574][ T7213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7213 comm=syz.1.933 [ 585.181192][ T31] audit: type=1400 audit(585.080:412): avc: denied { create } for pid=7225 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 585.298377][ T7228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7228 comm=syz.0.938 [ 586.601049][ T7237] FAULT_INJECTION: forcing a failure. [ 586.601049][ T7237] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 586.603414][ T7237] CPU: 0 UID: 0 PID: 7237 Comm: syz.0.941 Not tainted 6.12.0-rc2-syzkaller #0 [ 586.603956][ T7237] Hardware name: ARM-Versatile Express [ 586.604250][ T7237] Call trace: [ 586.604490][ T7237] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 586.604901][ T7237] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 586.605181][ T7237] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 586.605663][ T7237] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 586.606275][ T7237] r5:00000000 r4:8274e1c4 [ 586.606531][ T7237] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 586.607064][ T7237] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 586.607498][ T7237] r6:00000000 r5:ed5e9f68 r4:00000002 [ 586.607726][ T7237] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 586.608140][ T7237] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 586.608539][ T7237] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 586.608934][ T7237] r10:00000001 r9:805c30ac r8:00000002 r7:ed5e9f68 r6:0000000f r5:76b21f30 [ 586.609271][ T7237] r4:849b3c00 r3:ed5e9e9f [ 586.609483][ T7237] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 586.609855][ T7237] r8:76b21f30 r7:ed5e9f68 r6:849b3c00 r5:0000000f r4:84863000 [ 586.610199][ T7237] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 586.610578][ T7237] r10:00000003 r9:849b3c00 r8:8020029c r7:00000000 r6:00000000 r5:84863000 [ 586.610883][ T7237] r4:84863003 [ 586.611071][ T7237] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 586.611395][ T7237] r7:00000003 r6:00000005 r5:76b21f30 r4:0000000f [ 586.611989][ T7237] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 586.612466][ T7237] Exception stack(0xed5e9fa8 to 0xed5e9ff0) [ 586.612779][ T7237] 9fa0: 0000000f 76b21f30 00000005 76b21f30 0000000f 00000000 [ 586.613154][ T7237] 9fc0: 0000000f 76b21f30 00000005 00000003 00000000 00006364 003d0f00 76b220bc [ 586.613477][ T7237] 9fe0: 00000158 76b21ed0 000d8408 00130d94 [ 586.982686][ T2907] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 587.142877][ T2907] usb 1-1: config 1 interface 0 altsetting 188 endpoint 0x81 has an invalid bInterval 90, changing to 10 [ 587.143544][ T2907] usb 1-1: config 1 interface 0 altsetting 188 endpoint 0x81 has invalid maxpacket 1088, setting to 1024 [ 587.144231][ T2907] usb 1-1: config 1 interface 0 altsetting 188 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 587.146424][ T2907] usb 1-1: config 1 interface 0 has no altsetting 0 [ 587.156205][ T2907] usb 1-1: New USB device found, idVendor=05ac, idProduct=027f, bcdDevice= 0.40 [ 587.159209][ T2907] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 587.163223][ T2907] usb 1-1: Product: 쯗췽悿壧ꄕꌩㆮ濡ﲉ뼴춣瑼萙⌇龹㨇ᦚ擐⋊☓︳欉쥠쥥准妊죳绚캻眡ᮄ婡誈埅뷰坫힎놱亭檧䢸豆㦌䁢錾짮ꦚ㩋ត⍜읚吝授㖃鋝뫧㕘늯ᎏ藅 [ 587.164833][ T2907] usb 1-1: Manufacturer:   [ 587.165153][ T2907] usb 1-1: SerialNumber: ܍屐빻꙳晅 [ 587.176509][ T7239] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 587.605239][ T7239] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 587.610514][ T7239] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 587.652374][ T2907] usbhid 1-1:1.0: can't add hid device: -71 [ 587.653075][ T2907] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 587.657845][ T2907] usb 1-1: USB disconnect, device number 6 [ 587.711053][ T7259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7259 comm=syz.0.943 [ 587.795438][ T31] audit: type=1400 audit(587.700:413): avc: denied { accept } for pid=7260 comm="syz.0.944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 588.325980][ T7262] dlm: non-version read from control device 0 [ 588.489374][ T31] audit: type=1400 audit(588.390:414): avc: denied { mount } for pid=7263 comm="syz.1.945" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 588.500240][ T31] audit: type=1400 audit(588.400:415): avc: denied { name_bind } for pid=7263 comm="syz.1.945" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 588.610301][ T31] audit: type=1400 audit(588.510:416): avc: denied { ioctl } for pid=7265 comm="syz.1.946" path="socket:[11215]" dev="sockfs" ino=11215 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 590.432575][ T7274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7274 comm=syz.0.948 [ 592.565824][ T7286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7286 comm=syz.1.953 [ 592.929985][ T7294] FAULT_INJECTION: forcing a failure. [ 592.929985][ T7294] name failslab, interval 1, probability 0, space 0, times 0 [ 592.930606][ T7294] CPU: 0 UID: 0 PID: 7294 Comm: syz.1.957 Not tainted 6.12.0-rc2-syzkaller #0 [ 592.930919][ T7294] Hardware name: ARM-Versatile Express [ 592.931151][ T7294] Call trace: [ 592.931429][ T7294] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 592.932175][ T7294] r7:84ac5400 r6:00000820 r5:60000013 r4:8203d394 [ 592.932596][ T7294] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 592.933266][ T7294] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 592.933859][ T7294] r5:00000000 r4:82718bdc [ 592.934175][ T7294] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 592.934574][ T7294] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 592.934940][ T7294] r6:00000820 r5:84e1a3c0 r4:82cac780 [ 592.935168][ T7294] [<804e811c>] (should_failslab) from [<804cd228>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 592.935579][ T7294] [<804cd1dc>] (kmem_cache_alloc_noprof) from [<8149758c>] (skb_clone+0x60/0x1c8) [ 592.935982][ T7294] r10:00000000 r9:000001a2 r8:8439a2c0 r7:851b7400 r6:84e1a3c0 r5:84e1a3c0 [ 592.936610][ T7294] r4:00000820 [ 592.936787][ T7294] [<8149752c>] (skb_clone) from [<815a377c>] (__netlink_deliver_tap+0x1e8/0x24c) [ 592.937152][ T7294] r5:84c51680 r4:84c51000 [ 592.937376][ T7294] [<815a3594>] (__netlink_deliver_tap) from [<815a6874>] (netlink_unicast+0x280/0x29c) [ 592.937812][ T7294] r10:00000000 r9:00000000 r8:84888d00 r7:84e1a3c0 r6:8439a2c0 r5:0000003c [ 592.938180][ T7294] r4:851b7400 [ 592.938376][ T7294] [<815a65f4>] (netlink_unicast) from [<815a6a6c>] (netlink_sendmsg+0x1dc/0x43c) [ 592.938775][ T7294] r9:00000000 r8:00000000 r7:851c0c00 r6:0000003c r5:84e1a3c0 r4:ed259f38 [ 592.939143][ T7294] [<815a6890>] (netlink_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 592.939571][ T7294] r10:00000800 r9:ed259dd4 r8:ed259dd4 r7:00000000 r6:845e5400 r5:ed259f38 [ 592.939941][ T7294] r4:00000000 [ 592.940159][ T7294] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 592.940554][ T7294] r7:00000000 r6:00000000 r5:845e5400 r4:ed259f38 [ 592.940801][ T7294] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 592.941170][ T7294] r10:ed259e34 r9:20000100 r8:00000800 r7:00000000 r6:845e5400 r5:ed259f38 [ 592.941548][ T7294] r4:00000000 [ 592.941802][ T7294] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 592.942607][ T7294] r10:00000128 r9:84ac5400 r8:8020029c r7:00000800 r6:20000100 r5:845e5400 [ 592.942919][ T7294] r4:00000000 [ 592.943092][ T7294] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 592.943444][ T7294] Exception stack(0xed259fa8 to 0xed259ff0) [ 592.943696][ T7294] 9fa0: 00000000 00000000 00000003 20000100 00000800 00000000 [ 592.944028][ T7294] 9fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b810bc [ 592.945316][ T7294] 9fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 592.945676][ T7294] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 593.027854][ T7296] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7296 comm=syz.1.958 [ 593.140604][ T31] audit: type=1400 audit(593.040:417): avc: denied { setopt } for pid=7297 comm="syz.1.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 593.146854][ T31] audit: type=1400 audit(593.050:418): avc: denied { ioctl } for pid=7297 comm="syz.1.959" path="socket:[12364]" dev="sockfs" ino=12364 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 593.261178][ T7302] FAULT_INJECTION: forcing a failure. [ 593.261178][ T7302] name failslab, interval 1, probability 0, space 0, times 0 [ 593.263495][ T7302] CPU: 1 UID: 0 PID: 7302 Comm: syz.0.960 Not tainted 6.12.0-rc2-syzkaller #0 [ 593.263896][ T7302] Hardware name: ARM-Versatile Express [ 593.264088][ T7302] Call trace: [ 593.264231][ T7302] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 593.264509][ T7302] r7:00000820 r6:00000050 r5:60000013 r4:8203d394 [ 593.264681][ T7302] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 593.264894][ T7302] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 593.265174][ T7302] r5:00000000 r4:82718bdc [ 593.265365][ T7302] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 593.265661][ T7302] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 593.265936][ T7302] r6:00000050 r5:00000050 r4:82c01300 [ 593.266118][ T7302] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 593.266374][ T7302] [<804cd510>] (__kmalloc_noprof) from [<8185f2dc>] (sctp_bind_addrs_to_raw+0x7c/0x17c) [ 593.266682][ T7302] r10:84a93834 r9:84a93800 r8:84bb6480 r7:00000000 r6:00000050 r5:00000820 [ 593.267012][ T7302] r4:84a93830 [ 593.267162][ T7302] [<8185f260>] (sctp_bind_addrs_to_raw) from [<81853f50>] (sctp_make_init+0x70/0x404) [ 593.267400][ T7302] r10:81873d68 r9:84a93800 r8:84bb6480 r7:00000000 r6:00000001 r5:00000820 [ 593.267591][ T7302] r4:84a93800 [ 593.267689][ T7302] [<81853ee0>] (sctp_make_init) from [<81848160>] (sctp_sf_do_prm_asoc+0x4c/0xdc) [ 593.267906][ T7302] r10:81873d68 r9:84a93800 r8:ed731c3c r7:00000000 r6:00000001 r5:84a93800 [ 593.268197][ T7302] r4:ed731c3c [ 593.268375][ T7302] [<81848114>] (sctp_sf_do_prm_asoc) from [<8184a64c>] (sctp_do_sm+0xa8/0x1848) [ 593.268666][ T7302] r7:00000000 r6:00000004 r5:81c7fad4 r4:81848114 [ 593.268858][ T7302] [<8184a5a4>] (sctp_do_sm) from [<8186f548>] (sctp_primitive_ASSOCIATE+0x3c/0x44) [ 593.269149][ T7302] r10:ed731de0 r9:84bb6480 r8:849b5400 r7:00000001 r6:85035600 r5:83fc6300 [ 593.269355][ T7302] r4:84a93800 [ 593.269455][ T7302] [<8186f50c>] (sctp_primitive_ASSOCIATE) from [<81863560>] (sctp_sendmsg_to_asoc+0x234/0x684) [ 593.269707][ T7302] [<8186332c>] (sctp_sendmsg_to_asoc) from [<8186c554>] (sctp_sendmsg+0x60c/0x910) [ 593.269937][ T7302] r10:00000000 r9:84bb6480 r8:00000001 r7:00000001 r6:85035600 r5:ed731e98 [ 593.270180][ T7302] r4:83fc6300 [ 593.270353][ T7302] [<8186bf48>] (sctp_sendmsg) from [<816b4ff8>] (inet_sendmsg+0x40/0x4c) [ 593.270702][ T7302] r10:00000122 r9:849b5400 r8:00000003 r7:845e4280 r6:83fc6300 r5:00000001 [ 593.271035][ T7302] r4:ed731e98 [ 593.271200][ T7302] [<816b4fb8>] (inet_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 593.272001][ T7302] r7:845e4280 r6:845e4280 r5:ed731e98 r4:00000000 [ 593.272608][ T7302] [<81483654>] (__sock_sendmsg) from [<81485cf0>] (__sys_sendto+0x108/0x14c) [ 593.272982][ T7302] r7:845e4280 r6:20000140 r5:00000000 r4:00000000 [ 593.273174][ T7302] [<81485be8>] (__sys_sendto) from [<81485d50>] (sys_sendto+0x1c/0x24) [ 593.273419][ T7302] r8:8020029c r7:00000122 r6:00130e70 r5:0000001c r4:20000140 [ 593.273592][ T7302] [<81485d34>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 593.273923][ T7302] Exception stack(0xed731fa8 to 0xed731ff0) [ 593.274175][ T7302] 1fa0: 20000140 0000001c 00000003 200000c0 00000001 00000000 [ 593.274380][ T7302] 1fc0: 20000140 0000001c 00130e70 00000122 00000000 00006364 003d0f00 76b220bc [ 593.274590][ T7302] 1fe0: 76b21ec0 76b21eb0 00018af8 00132ec0 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 593.985147][ T7309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7309 comm=syz.0.963 [ 594.297869][ T7311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7311 comm=syz.0.964 [ 594.308131][ T7311] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7311 comm=syz.0.964 [ 594.322447][ T7311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=7311 comm=syz.0.964 [ 597.158426][ T7326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7326 comm=syz.0.968 [ 597.366953][ T31] audit: type=1400 audit(597.270:419): avc: denied { map } for pid=7327 comm="syz.0.969" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 597.415325][ T31] audit: type=1400 audit(597.320:420): avc: denied { setattr } for pid=7327 comm="syz.0.969" name="[io_uring]" dev="anon_inodefs" ino=12418 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 597.945402][ T7341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7341 comm=syz.0.973 [ 598.137919][ T31] audit: type=1400 audit(598.040:421): avc: denied { ioctl } for pid=7344 comm="syz.0.975" path="socket:[12446]" dev="sockfs" ino=12446 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 598.407144][ T7352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7352 comm=syz.0.978 [ 598.534993][ T31] audit: type=1400 audit(598.440:422): avc: denied { create } for pid=7353 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 598.545817][ T31] audit: type=1400 audit(598.450:423): avc: denied { write } for pid=7353 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 598.549631][ T7355] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7355 comm=syz.1.979 [ 599.183997][ T31] audit: type=1400 audit(599.090:424): avc: denied { write } for pid=7358 comm="syz.1.981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 601.260454][ T31] audit: type=1400 audit(601.160:425): avc: denied { ioctl } for pid=7368 comm="syz.1.984" path="socket:[12494]" dev="sockfs" ino=12494 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 601.476061][ T31] audit: type=1400 audit(601.380:426): avc: denied { read } for pid=7368 comm="syz.1.984" path="socket:[12494]" dev="sockfs" ino=12494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 601.502765][ T31] audit: type=1400 audit(601.410:427): avc: denied { shutdown } for pid=7368 comm="syz.1.984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 601.596409][ T7373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7373 comm=syz.1.985 [ 601.893709][ T6262] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 601.932713][ T4263] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 602.052279][ T6262] usb 1-1: Using ep0 maxpacket: 16 [ 602.089140][ T6262] usb 1-1: New USB device found, idVendor=054c, idProduct=0038, bcdDevice=16.f5 [ 602.090459][ T6262] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 602.090735][ T6262] usb 1-1: Product: syz [ 602.090924][ T6262] usb 1-1: Manufacturer: syz [ 602.091184][ T6262] usb 1-1: SerialNumber: syz [ 602.098499][ T6262] usb 1-1: config 0 descriptor?? [ 602.098555][ T4263] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xB5, changing to 0x85 [ 602.099327][ T4263] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 602.099759][ T4263] usb 2-1: New USB device found, idVendor=05ac, idProduct=022a, bcdDevice= 0.00 [ 602.100262][ T4263] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 602.109543][ T6262] visor 1-1:0.0: Sony Clie 3.5 converter detected [ 602.120947][ T4263] usb 2-1: config 0 descriptor?? [ 602.530983][ T6262] usb 1-1: clie_3_5_startup: get interface number failed: -71 [ 602.533176][ T6262] visor 1-1:0.0: probe with driver visor failed with error -71 [ 602.540535][ T6262] usb 1-1: USB disconnect, device number 7 [ 602.574105][ T4263] appletouch 2-1:0.0: Geyser mode initialized. [ 602.577103][ T4263] input: appletouch as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/input/input7 [ 602.660263][ T31] audit: type=1400 audit(602.560:428): avc: denied { mounton } for pid=7400 comm="syz.0.988" path="/proc/1324/task" dev="proc" ino=12514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 602.664282][ T31] audit: type=1400 audit(602.560:429): avc: denied { mount } for pid=7400 comm="syz.0.988" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 602.777959][ T6262] usb 2-1: USB disconnect, device number 3 [ 602.799785][ T6262] appletouch 2-1:0.0: input: appletouch disconnected [ 612.362899][ T2907] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 612.522380][ T2907] usb 2-1: Using ep0 maxpacket: 16 [ 612.549471][ T2907] usb 2-1: New USB device found, idVendor=1235, idProduct=0010, bcdDevice=a7.38 [ 612.550042][ T2907] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 612.550396][ T2907] usb 2-1: Product: syz [ 612.550592][ T2907] usb 2-1: Manufacturer: syz [ 612.550900][ T2907] usb 2-1: SerialNumber: syz [ 612.558961][ T2907] usb 2-1: config 0 descriptor?? [ 612.577494][ T2907] usb 2-1: selecting invalid altsetting 1 [ 612.610418][ T2907] snd-usb-audio 2-1:0.0: probe with driver snd-usb-audio failed with error -22 [ 612.776283][ T6262] usb 2-1: USB disconnect, device number 4 [ 613.054769][ T31] audit: type=1400 audit(612.960:430): avc: denied { bind } for pid=7428 comm="syz.0.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 613.065044][ T31] audit: type=1400 audit(612.970:431): avc: denied { connect } for pid=7428 comm="syz.0.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 613.085767][ T31] audit: type=1400 audit(612.990:432): avc: denied { accept } for pid=7428 comm="syz.0.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 614.039357][ T31] audit: type=1400 audit(613.940:433): avc: denied { prog_run } for pid=7451 comm="syz.1.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 631.314519][ T31] audit: type=1400 audit(631.220:434): avc: denied { read } for pid=7458 comm="syz.0.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 633.078389][ T7468] netlink: 'syz.1.998': attribute type 3 has an invalid length. [ 639.550237][ T31] audit: type=1400 audit(639.450:435): avc: denied { map_read map_write } for pid=7469 comm="syz.0.999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 639.626345][ T7474] netlink: 40 bytes leftover after parsing attributes in process `syz.0.999'. [ 640.237530][ T31] audit: type=1400 audit(640.140:436): avc: denied { map } for pid=7471 comm="syz.1.1000" path="socket:[13496]" dev="sockfs" ino=13496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 641.636710][ T31] audit: type=1400 audit(642.537:437): avc: denied { bind } for pid=7476 comm="syz.1.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 642.002211][ T4263] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 642.152123][ T4263] usb 2-1: Using ep0 maxpacket: 8 [ 642.160738][ T4263] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 642.161392][ T4263] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 642.162536][ T4263] usb 2-1: New USB device found, idVendor=046a, idProduct=0027, bcdDevice= 0.00 [ 642.162855][ T4263] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 642.165501][ T4263] usb 2-1: config 0 descriptor?? [ 642.616219][ T4263] cherry 0003:046A:0027.0001: unknown main item tag 0x0 [ 642.617012][ T4263] cherry 0003:046A:0027.0001: unknown main item tag 0xe [ 642.618023][ T4263] cherry 0003:046A:0027.0001: unknown main item tag 0x5 [ 642.618397][ T4263] cherry 0003:046A:0027.0001: unknown main item tag 0x4 [ 642.618941][ T4263] cherry 0003:046A:0027.0001: ignoring exceeding usage max [ 642.620712][ T4263] cherry 0003:046A:0027.0001: usage index exceeded [ 642.621099][ T4263] cherry 0003:046A:0027.0001: item 0 0 2 0 parsing failed [ 642.623276][ T4263] cherry 0003:046A:0027.0001: probe with driver cherry failed with error -22 [ 642.810897][ T3836] usb 2-1: USB disconnect, device number 5 [ 653.772955][ T2908] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 653.974904][ T2908] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 653.977642][ T2908] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 653.980788][ T2908] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 653.988731][ T2908] usb 1-1: New USB device found, idVendor=1b1c, idProduct=1d00, bcdDevice= 0.00 [ 654.011977][ T2908] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 654.048344][ T2908] usb 1-1: config 0 descriptor?? [ 654.581068][ T2908] corsair-cpro 0003:1B1C:1D00.0002: unknown main item tag 0x0 [ 654.593644][ T2908] corsair-cpro 0003:1B1C:1D00.0002: unknown main item tag 0x0 [ 654.597778][ T2908] corsair-cpro 0003:1B1C:1D00.0002: unknown main item tag 0x0 [ 654.601086][ T2908] corsair-cpro 0003:1B1C:1D00.0002: unknown main item tag 0x0 [ 654.612155][ T2908] corsair-cpro 0003:1B1C:1D00.0002: unknown main item tag 0x0 [ 654.622780][ T2908] corsair-cpro 0003:1B1C:1D00.0002: hidraw0: USB HID v0.00 Device [HID 1b1c:1d00] on usb-dummy_hcd.0-1/input0 [ 654.714910][ T2908] corsair-cpro 0003:1B1C:1D00.0002: probe with driver corsair-cpro failed with error -38 [ 654.773541][ T2908] usb 1-1: USB disconnect, device number 8 [ 657.654213][ T31] audit: type=1400 audit(658.557:438): avc: denied { getopt } for pid=7502 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 671.380452][ T31] audit: type=1400 audit(672.277:439): avc: denied { create } for pid=7537 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 671.439475][ T7543] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1010'. [ 671.445524][ T7543] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1010'. [ 672.630032][ T3836] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 672.892782][ T3836] usb 1-1: Using ep0 maxpacket: 8 [ 672.911109][ T3836] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 672.913979][ T3836] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 672.915933][ T3836] usb 1-1: Product: syz [ 672.916298][ T3836] usb 1-1: Manufacturer: syz [ 672.916488][ T3836] usb 1-1: SerialNumber: syz [ 672.927038][ T3836] usb 1-1: config 0 descriptor?? [ 683.184351][ T2908] usb 1-1: USB disconnect, device number 9 [ 683.312944][ T54] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 683.484213][ T54] usb 2-1: too many configurations: 65, using maximum allowed: 8 [ 683.572134][ T54] usb 2-1: New USB device found, idVendor=046d, idProduct=08c1, bcdDevice=ee.8d [ 683.572641][ T54] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 683.606431][ T31] audit: type=1400 audit(684.507:440): avc: denied { create } for pid=7572 comm="syz.0.1015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 683.808972][ T6262] usb 2-1: USB disconnect, device number 6 [ 698.994791][ T31] audit: type=1400 audit(699.897:441): avc: denied { bind } for pid=7603 comm="syz.0.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 699.049745][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 707.532463][ T31] audit: type=1400 audit(708.427:442): avc: denied { write } for pid=7625 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 707.536795][ T31] audit: type=1400 audit(708.427:443): avc: denied { open } for pid=7625 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 707.567397][ T31] audit: type=1400 audit(708.427:444): avc: denied { getattr } for pid=7625 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 707.568405][ T31] audit: type=1400 audit(708.427:445): avc: denied { ioctl } for pid=7625 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 707.569221][ T31] audit: type=1400 audit(708.467:446): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 707.629822][ T31] audit: type=1400 audit(708.527:447): avc: denied { search } for pid=7625 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 707.664091][ T31] audit: type=1400 audit(708.567:448): avc: denied { read } for pid=7626 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 707.665705][ T31] audit: type=1400 audit(708.567:449): avc: denied { open } for pid=7626 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 707.667761][ T31] audit: type=1400 audit(708.567:450): avc: denied { getattr } for pid=7626 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 707.749334][ T31] audit: type=1400 audit(708.647:451): avc: denied { write } for pid=7625 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 713.691460][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 713.693289][ T31] audit: type=1400 audit(714.587:454): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.694164][ T31] audit: type=1400 audit(714.587:455): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.698929][ T31] audit: type=1400 audit(714.587:456): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.772644][ T31] audit: type=1400 audit(714.617:457): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 713.773629][ T31] audit: type=1400 audit(714.617:458): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 713.774302][ T31] audit: type=1400 audit(714.617:459): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 716.242982][ T31] audit: type=1400 audit(717.137:460): avc: denied { module_request } for pid=7634 comm="syz.1.1027" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 716.369652][ T31] audit: type=1400 audit(717.267:461): avc: denied { map_create } for pid=7630 comm="syz.0.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 716.385315][ T31] audit: type=1400 audit(717.287:462): avc: denied { prog_load } for pid=7630 comm="syz.0.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 716.418982][ T31] audit: type=1400 audit(717.317:463): avc: denied { map_read map_write } for pid=7630 comm="syz.0.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 716.570048][ T7635] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1027'. [ 719.166210][ T31] audit: type=1400 audit(720.067:464): avc: denied { create } for pid=7641 comm="syz.1.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 719.178883][ T31] audit: type=1400 audit(720.077:465): avc: denied { setopt } for pid=7641 comm="syz.1.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 719.266113][ T31] audit: type=1400 audit(720.167:466): avc: denied { bind } for pid=7641 comm="syz.1.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 723.519627][ T31] audit: type=1400 audit(724.417:467): avc: denied { prog_run } for pid=7648 comm="syz.0.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 724.302710][ T7655] netlink: 'syz.0.1032': attribute type 3 has an invalid length. [ 724.303320][ T7655] netlink: 'syz.0.1032': attribute type 1 has an invalid length. [ 724.303640][ T7655] netlink: 224 bytes leftover after parsing attributes in process `syz.0.1032'. [ 728.813480][ T7661] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1034'. [ 730.812509][ T31] audit: type=1400 audit(731.697:468): avc: denied { read } for pid=7664 comm="syz.1.1036" name="usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.813897][ T31] audit: type=1400 audit(731.697:469): avc: denied { open } for pid=7664 comm="syz.1.1036" path="/dev/usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.817771][ T31] audit: type=1400 audit(731.717:470): avc: denied { ioctl } for pid=7664 comm="syz.1.1036" path="/dev/usbmon0" dev="devtmpfs" ino=698 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.610906][ T31] audit: type=1400 audit(746.507:471): avc: denied { create } for pid=7670 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 750.661170][ T31] audit: type=1400 audit(751.557:472): avc: denied { create } for pid=7696 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 751.313357][ T7698] netlink: 'syz.1.1042': attribute type 4 has an invalid length. [ 753.980595][ T7702] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1041'. [ 753.992884][ T7702] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1041'. [ 758.631969][ T31] audit: type=1400 audit(759.507:473): avc: denied { nlmsg_write } for pid=7708 comm="syz.1.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 758.636729][ T7709] netlink: 104 bytes leftover after parsing attributes in process `syz.1.1045'. [ 758.636835][ T31] audit: type=1400 audit(759.537:474): avc: denied { nlmsg_read } for pid=7708 comm="syz.1.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 763.298892][ T31] audit: type=1400 audit(764.197:475): avc: denied { write } for pid=7718 comm="syz.1.1049" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 763.542096][ T3715] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 763.705282][ T3715] usb 2-1: config 1 interface 0 has no altsetting 0 [ 763.730589][ T3715] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 763.731101][ T3715] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 763.731383][ T3715] usb 2-1: Product: syz [ 763.732013][ T3715] usb 2-1: Manufacturer: syz [ 763.732263][ T3715] usb 2-1: SerialNumber: syz [ 764.422212][ T3715] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 7 if 0 alt 253 proto 1 vid 0x0525 pid 0xA4A8 [ 764.598820][ T6262] usb 2-1: USB disconnect, device number 7 [ 764.625402][ T6262] usblp0: removed [ 765.533884][ T7738] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1050'. [ 765.534444][ T7738] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1050'. [ 765.535081][ T7738] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1050'. [ 765.535774][ T7738] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1050'. [ 769.250387][ T31] audit: type=1400 audit(770.147:476): avc: denied { write } for pid=7750 comm="syz.1.1056" name="udplite6" dev="proc" ino=4026533028 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 770.027604][ T54] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 770.282333][ T54] usb 2-1: Using ep0 maxpacket: 8 [ 770.304100][ T54] usb 2-1: config 254 has an invalid interface number: 167 but max is 0 [ 770.304708][ T54] usb 2-1: config 254 has no interface number 0 [ 770.353508][ T54] usb 2-1: New USB device found, idVendor=110a, idProduct=1450, bcdDevice=62.cb [ 770.354919][ T54] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 770.355350][ T54] usb 2-1: Product: syz [ 770.358373][ T54] usb 2-1: Manufacturer: syz [ 770.372324][ T54] usb 2-1: SerialNumber: syz [ 770.842268][ T54] mxuport 2-1:254.167: mxuport_recv_ctrl_urb - usb_control_msg failed (-32) [ 770.843217][ T54] mxuport 2-1:254.167: probe with driver mxuport failed with error -5 [ 770.866971][ T54] usb 2-1: USB disconnect, device number 8 [ 774.703287][ T3836] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 774.872255][ T3836] usb 1-1: Using ep0 maxpacket: 8 [ 774.880672][ T3836] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 774.881144][ T3836] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 774.881565][ T3836] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 774.882442][ T3836] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 774.882796][ T3836] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 774.883166][ T3836] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 774.883609][ T3836] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 775.113487][ T3836] usb 1-1: GET_CAPABILITIES returned 0 [ 775.114001][ T3836] usbtmc 1-1:16.0: can't read capabilities [ 785.348541][ T6262] usb 1-1: USB disconnect, device number 10 [ 785.728867][ T7792] process 'syz.0.1061' launched './file2' with NULL argv: empty string added [ 785.737199][ T31] audit: type=1400 audit(786.627:477): avc: denied { execute_no_trans } for pid=7791 comm="syz.0.1061" path="/520/file2" dev="tmpfs" ino=2764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 786.342727][ T2907] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 786.504502][ T2907] usb 1-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 786.505088][ T2907] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 786.510928][ T2907] usb 1-1: config 0 descriptor?? [ 786.961300][ T2907] usb 1-1: Cannot set MAC address [ 786.962815][ T2907] MOSCHIP usb-ethernet driver 1-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 786.984179][ T2907] usb 1-1: USB disconnect, device number 11 [ 789.677396][ T31] audit: type=1400 audit(790.577:478): avc: denied { getopt } for pid=7812 comm="syz.1.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 789.781382][ T31] audit: type=1400 audit(790.677:479): avc: denied { bpf } for pid=7814 comm="syz.1.1065" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 792.225502][ T10] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 792.234811][ T10] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 795.889633][ T31] audit: type=1400 audit(796.787:480): avc: denied { create } for pid=7824 comm="syz.0.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 798.144474][ T31] audit: type=1400 audit(799.047:481): avc: denied { perfmon } for pid=7824 comm="syz.0.1066" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 798.326327][ T7827] i2c i2c-0: readbytes: invalid block length (255) [ 807.037180][ T31] audit: type=1400 audit(807.937:482): avc: denied { create } for pid=7833 comm="syz.1.1068" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 807.039532][ T31] audit: type=1400 audit(807.937:483): avc: denied { ioctl } for pid=7833 comm="syz.1.1068" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=12856 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 807.314329][ T7834] ------------[ cut here ]------------ [ 807.314992][ T7834] WARNING: CPU: 1 PID: 7834 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 807.315746][ T7834] Modules linked in: [ 807.316852][ T7834] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 807.317765][ T7834] CPU: 1 UID: 0 PID: 7834 Comm: syz.1.1068 Not tainted 6.12.0-rc2-syzkaller #0 [ 807.318523][ T7834] Hardware name: ARM-Versatile Express [ 807.318797][ T7834] Call trace: [ 807.319376][ T7834] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 807.320145][ T7834] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 807.320850][ T7834] [<81998edc>] (show_stack) from [<819b7384>] (dump_stack_lvl+0x54/0x7c) [ 807.321224][ T7834] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 807.322259][ T7834] r5:00000000 r4:82870d18 [ 807.322750][ T7834] [<819b73ac>] (dump_stack) from [<81999a20>] (panic+0x120/0x374) [ 807.323287][ T7834] [<81999900>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 807.323636][ T7834] r3:8260c5c4 r2:00000001 r1:82025774 r0:8202d1dc [ 807.324319][ T7834] r7:8048c614 [ 807.324599][ T7834] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 807.325003][ T7834] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 807.325381][ T7834] r8:00000009 r7:82054dd8 r6:dfa59d24 r5:849b6000 r4:00000000 [ 807.325695][ T7834] [<80242350>] (warn_slowpath_fmt) from [<8048c614>] (kunmap_local_indexed+0x20c/0x224) [ 807.326146][ T7834] r10:ffedc0a8 r9:840d6100 r8:20508000 r7:fffffffe r6:00000003 r5:849b6000 [ 807.326947][ T7834] r4:ffedc000 [ 807.327160][ T7834] [<8048c408>] (kunmap_local_indexed) from [<80505a48>] (move_pages+0x7e8/0x149c) [ 807.327755][ T7834] r7:fffffffe r6:00000000 r5:84e23810 r4:ffeda840 [ 807.328580][ T7834] [<80505260>] (move_pages) from [<80581c70>] (userfaultfd_ioctl+0x114c/0x2080) [ 807.329246][ T7834] r10:840d6100 r9:dfa59e98 r8:00000001 r7:20c16000 r6:00000000 r5:20000080 [ 807.329594][ T7834] r4:843eb000 [ 807.329799][ T7834] [<80580b24>] (userfaultfd_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 807.330394][ T7834] r10:849b6000 r9:84ab3000 r8:00000003 r7:20000080 r6:84ab3001 r5:00000000 [ 807.330740][ T7834] r4:c028aa05 [ 807.330957][ T7834] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 807.331431][ T7834] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 807.332027][ T7834] 9fa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 807.332588][ T7834] 9fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b810bc [ 807.333026][ T7834] 9fe0: 76b80ec0 76b80eb0 00018af8 00132ec0 [ 807.333608][ T7834] r10:00000036 r9:849b6000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 807.333981][ T7834] r4:00000000 [ 807.336080][ T7834] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:18:36 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=dfab5e88 R03=8520a400 R04=dfab5e58 R05=dfab5e58 R06=833002a8 R07=00000000 R08=80808080 R09=8351501b R10=8520a404 R11=dfab5d34 R12=dfab5d10 R13=dfab5cf8 R14=80525ad4 R15=80543068 PSR=20000013 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=840c9040 R01=00000061 R02=eb9cb000 R03=00000000 R04=82873447 R05=840c9040 R06=809e85e4 R07=82873479 R08=8287341c R09=0000005e R10=00000001 R11=dfa59a40 R12=00000002 R13=dfa59a34 R14=82757e24 R15=809e863c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000