last executing test programs: 19m24.598320713s ago: executing program 1 (id=758): r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000e40), 0x400, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) ioctl$TIOCGLCKTRMIOS(r3, 0x5450, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = openat$tcp_congestion(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$int_in(r6, 0x5421, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$cgroup_pressure(r5, &(0x7f0000000000)='memory.pressure\x00', 0xe0, 0x0) bind$can_j1939(r1, &(0x7f00000000c0)={0x1d, r4, 0x0, {0x1, 0x0, 0x4}, 0x1}, 0x18) connect$can_j1939(r1, &(0x7f0000000640)={0x1d, r4, 0x0, {0x0, 0x0, 0x2}, 0xff}, 0x18) symlinkat(0x0, 0xffffffffffffff9c, 0x0) acct(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000011, 0x4c831, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r8, &(0x7f0000000140)={0x28, 0x0, 0x2710, @host}, 0x10) listen(r8, 0x0) r9 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r9, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) recvmmsg(r9, 0x0, 0x0, 0x102, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r7, 0x0, 0x4004800) sendfile(r1, r0, 0x0, 0x1000000000000a) 19m23.037479125s ago: executing program 1 (id=759): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000001b00)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001ac0)={&(0x7f00000018c0)={0x1c8, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_KEY={0x1b4, 0x30, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6a8dfec40f766f975166c01e28d38a89"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "b3ae580b070b3d71c279d52f880bcadd"}, @NL802154_KEY_ATTR_ID={0xb0, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x10, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x800}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x5c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x2}]}, @NL802154_KEY_ATTR_ID={0x6c, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xc0}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "fd7c58baa6f36cd04f4f8d60f720963162290d861b22e9b1b35ec5059e623bfa"}, @NL802154_KEY_ATTR_ID={0x24, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1ff}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6bcf1e0327a12c2a926a616e9f566d3e"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$NFC_CMD_ACTIVATE_TARGET(r0, &(0x7f0000001d40)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001cc0)={0x2c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4048000}, 0xf8e58d40fa915769) 19m22.125073503s ago: executing program 1 (id=760): setpgid(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) setpgid(0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x40000, 0x120) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x181241, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, 0x0, 0x0) fspick(r1, 0x0, 0x0) r3 = socket(0x1, 0x5, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) r5 = dup3(r4, r3, 0x0) write$FUSE_CREATE_OPEN(r5, &(0x7f0000000a80)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}}, 0xa0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x26e1, 0x0) close(r6) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x32, 0x0, 0xffffd000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_xfrm(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 19m20.585318973s ago: executing program 1 (id=764): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x94) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) (fail_nth: 4) 19m20.227407631s ago: executing program 1 (id=765): sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x268, 0x0, 0x5, 0x3, 0x0, 0x0, {0x3, 0x0, 0x1}, [{{0x254, 0x1, {{0x0, 0x8}, 0x4, 0x5, 0x6, 0xa17, 0x11, 'syz1\x00', "5d3100b550704084b7bb1dc4a945f4980550747ccddf575ca7e74722f858f6f2", "4d53f839df78e30068755f6bcf596ce1df1c71d5ac3a94f6ead19306660ab70a", [{0x9e1, 0x81, {0x1, 0x8}}, {0x3, 0x3, {0x1, 0xd0}}, {0x800, 0x6, {0x3, 0x5}}, {0x0, 0x2, {0x2, 0x2}}, {0x8, 0x7}, {0x6, 0x6, {0x3, 0x8}}, {0x81, 0x33, {0x3, 0x1c2}}, {0x7, 0xa814, {0x2, 0x4}}, {0x1, 0x9, {0x3}}, {0x7, 0x6, {0x2, 0x3ff}}, {0x6, 0x40, {0x3, 0x5}}, {0xfffd, 0xfffa, {0x2, 0x1}}, {0x5, 0x8, {0x3, 0x2}}, {0x3, 0x5, {0x0, 0x5}}, {0x6, 0x6975, {0x2, 0x646f}}, {0x1, 0x2, {0x2, 0x1ff}}, {0x3ff, 0x3, {0x3, 0x6}}, {0x3, 0x8, {0x0, 0xfdf}}, {0x5, 0x8, {0x2, 0x4}}, {0x8000, 0x6, {0x3, 0xffff7fff}}, {0x4, 0x62, {0x1, 0x1}}, {0x0, 0x8000, {0x2, 0x7}}, {0x7, 0x1, {0x1, 0x9}}, {0x4, 0x7fff, {0x1, 0x9}}, {0xce3, 0x7fff, {0x2}}, {0x5, 0x4, {0x0, 0x7}}, {0x3ff, 0x77d0, {0x1, 0x10000}}, {0x84a, 0x9, {0x1, 0x503fc7ad}}, {0x1, 0xffff, {0x2, 0xfffffff8}}, {0x17d, 0x7, {0x1, 0x6}}, {0x40, 0x7fff, {0x0, 0x88d1}}, {0xffff, 0x8, {0x0, 0x6}}, {0x4, 0xd, {0x0, 0x1}}, {0x301, 0x8, {0x2, 0x7}}, {0x4040, 0x3, {0x3, 0xef}}, {0x8000, 0x5, {0x2, 0x2}}, {0x8000, 0x2, {0x0, 0x4}}, {0x2, 0x7a, {0x1, 0x2}}, {0x401, 0x2, {0x2, 0x754e}}, {0x25, 0x6e0a, {0x3, 0x4}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x400c085}, 0x44) r0 = socket$inet6(0xa, 0x800, 0x37) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x4, 0x9, 0x80, 0x5, 0x61, @mcast2, @mcast1, 0x7800, 0x8049, 0x1, 0x40}}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000400)={@mcast2, r1}, 0x14) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000007c0)={0x1, 0x4}, 0x8) 19m19.016046285s ago: executing program 1 (id=766): r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000100)) 19m19.010186735s ago: executing program 32 (id=766): r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000100)) 26.347798551s ago: executing program 0 (id=2048): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x800, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x6c, r0}, 0x38) 11.305914856s ago: executing program 0 (id=2073): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1}, 0x50) 8.698971601s ago: executing program 0 (id=2080): r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x139d02, 0x9b) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={[&(0x7f0000000080)='(\x00', &(0x7f00000000c0)='$\x00']}, &(0x7f0000000140), 0x800) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x102) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)='system_u:object_r:var_log_t:s0\x00', 0x1f, 0x2) rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00') r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r2 = geteuid() r3 = getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x0, r2}, {0x2, 0x5, r3}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x5}], {0x4, 0x2}, [{0x8, 0x2, 0xee00}], {}, {0x20, 0xc}}, 0x54, 0x2) r6 = openat$null(0xffffff9c, &(0x7f0000000640), 0xa8040, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x8, 0x1) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_QUOTAON(r1, 0x0, r7, &(0x7f00000007c0)='./file0/../file0\x00') close(0xffffffffffffffff) mkdirat(r6, &(0x7f0000000800)='./file0\x00', 0x89) close(0xffffffffffffffff) symlinkat(&(0x7f0000000840)='./file0/../file0\x00', r6, &(0x7f0000000880)='./file0\x00') read$FUSE(r6, &(0x7f00000008c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) timer_create(0x2, &(0x7f0000002900)={0x0, 0xfffffff9, 0x2, @tid=r9}, &(0x7f0000002940)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000002980)={0xffffffff, 0x6, 0x1, 0xffff, 0x2e2}) close(r6) r10 = openat$cuse(0xffffff9c, &(0x7f00000029c0), 0x2, 0x0) write$FUSE_WRITE(r10, &(0x7f0000002a00)={0x18, 0x0, r8, {0xffff0001}}, 0x18) r11 = accept$inet6(r6, &(0x7f0000002a40), &(0x7f0000002a80)=0x1c) listen(r11, 0xdb69) 4.34651502s ago: executing program 0 (id=2088): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000000)={0x6, 'vlan0\x00', {}, 0x2}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)) getsockname(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000140), 0x4) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$FBIOPUT_CON2FBMAP(r2, 0x4610, &(0x7f00000001c0)={0x7, 0x1}) write$sequencer(r2, &(0x7f0000000200)=[@t={0x183, 0x2, 0xff, 0xd6}, @generic={0x80}, @raw={0xc, 0x1, "c71854f98975"}], 0x11) r3 = syz_open_dev$loop(0x0, 0xffffffff, 0x400) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x6, 0x0, 0x15, 0x11, "7edaec426c4d119c205822257cc5938b8d50470eb4e05930c0e853530a713deb8934293666f17f5c18853ef09539cac368f9956d79e95d3fc7ac6125eafcd902", "5b7afce649b35c0e4102c70fa12e536954d814daf365194d491244e41bf26e93", [0x37, 0x6]}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000003c0)={0x0, 'ip6gretap0\x00', {}, 0xfffa}) 3.665692761s ago: executing program 2 (id=2089): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008010}, 0x20000840) 3.039633548s ago: executing program 2 (id=2090): close(0x3) socket$alg(0x26, 0x5, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) 2.296366693s ago: executing program 2 (id=2091): r0 = socket$nl_generic(0x10, 0x3, 0x10) syncfs(r0) 1.764842424s ago: executing program 2 (id=2092): r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x139d02, 0x9b) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={[&(0x7f0000000080)='(\x00', &(0x7f00000000c0)='$\x00']}, &(0x7f0000000140), 0x800) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x102) symlinkat(&(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)='system_u:object_r:var_log_t:s0\x00', 0x1f, 0x2) rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00') r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x10, r0}, 0x18) r2 = geteuid() r3 = getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x0, r2}, {0x2, 0x5, r3}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x5}], {0x4, 0x2}, [{0x8, 0x2, 0xee00}], {}, {0x20, 0xc}}, 0x54, 0x2) r6 = openat$null(0xffffff9c, &(0x7f0000000640), 0xa8040, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x8, 0x1) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_QUOTAON(r1, 0x0, r7, &(0x7f00000007c0)='./file0/../file0\x00') close(0xffffffffffffffff) mkdirat(r6, &(0x7f0000000800)='./file0\x00', 0x89) close(0xffffffffffffffff) symlinkat(&(0x7f0000000840)='./file0/../file0\x00', r6, &(0x7f0000000880)='./file0\x00') read$FUSE(r6, &(0x7f00000008c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) timer_create(0x2, &(0x7f0000002900)={0x0, 0xfffffff9, 0x2, @tid=r9}, &(0x7f0000002940)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000002980)={0xffffffff, 0x6, 0x1, 0xffff, 0x2e2}) close(r6) r10 = openat$cuse(0xffffff9c, &(0x7f00000029c0), 0x2, 0x0) write$FUSE_WRITE(r10, &(0x7f0000002a00)={0x18, 0x0, r8, {0xffff0001}}, 0x18) r11 = accept$inet6(r6, &(0x7f0000002a40), &(0x7f0000002a80)=0x1c) listen(r11, 0xdb69) 1.235765026s ago: executing program 0 (id=2093): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x4, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xbf}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.069635535s ago: executing program 2 (id=2094): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) sendmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x4000800) recvmsg$unix(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x2102) sendmsg$inet(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000009c0)="4104f309671b", 0x6}], 0x1}, 0x20000010) 407.621455ms ago: executing program 0 (id=2095): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000140000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$unix(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 0s ago: executing program 2 (id=2096): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a80)={0x11, 0x3, &(0x7f0000000580)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @jmp={0x5, 0x1, 0x7, 0x8d435ea9f8bfb13f, 0x1, 0xfffffffffffffff0, 0x4}], 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0x36) kernel console output (not intermixed with test programs): e:[11682]" dev="pipefs" ino=11682 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 690.265150][ T30] audit: type=1400 audit(689.690:256): avc: denied { ioctl } for pid=5697 comm="syz.0.821" path="socket:[12418]" dev="sockfs" ino=12418 ioctlcmd=0x6687 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 690.387273][ T30] audit: type=1400 audit(689.810:257): avc: denied { ioctl } for pid=5697 comm="syz.0.821" path="socket:[12419]" dev="sockfs" ino=12419 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 690.442334][ T30] audit: type=1400 audit(689.860:258): avc: denied { setopt } for pid=5697 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 691.179409][ T30] audit: type=1400 audit(690.600:259): avc: denied { ioctl } for pid=5697 comm="syz.0.821" path="socket:[12420]" dev="sockfs" ino=12420 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 691.993510][ T30] audit: type=1400 audit(691.410:260): avc: denied { write } for pid=5697 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 692.566142][ T30] audit: type=1400 audit(691.960:261): avc: denied { shutdown } for pid=5697 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 693.256834][ T5712] FAULT_INJECTION: forcing a failure. [ 693.256834][ T5712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 693.257226][ T5712] CPU: 0 UID: 0 PID: 5712 Comm: syz.2.823 Not tainted syzkaller #0 PREEMPT [ 693.257292][ T5712] Hardware name: linux,dummy-virt (DT) [ 693.257326][ T5712] Call trace: [ 693.257353][ T5712] show_stack+0x18/0x24 (C) [ 693.257434][ T5712] dump_stack_lvl+0xdc/0xf4 [ 693.257555][ T5712] dump_stack+0x1c/0x28 [ 693.257656][ T5712] should_fail_ex+0x5a0/0x6ac [ 693.257751][ T5712] should_fail+0x14/0x20 [ 693.257845][ T5712] should_fail_usercopy+0x1c/0x28 [ 693.257892][ T5712] _inline_copy_from_user+0x34/0x134 [ 693.257941][ T5712] get_compat_msghdr+0x90/0x118 [ 693.258035][ T5712] ___sys_sendmsg+0x184/0x19c [ 693.258084][ T5712] __sys_sendmsg+0x114/0x19c [ 693.258166][ T5712] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 693.258211][ T5712] invoke_syscall+0x6c/0x258 [ 693.258255][ T5712] el0_svc_common.constprop.0+0xac/0x230 [ 693.258297][ T5712] do_el0_svc_compat+0x40/0x68 [ 693.258359][ T5712] el0_svc_compat+0x4c/0x184 [ 693.258407][ T5712] el0t_32_sync_handler+0x88/0xac [ 693.258472][ T5712] el0t_32_sync+0x19c/0x1a0 [ 693.723119][ T30] audit: type=1400 audit(693.150:262): avc: denied { write } for pid=5715 comm="syz.0.826" name="vlan0" dev="proc" ino=4026532861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 693.769344][ T30] audit: type=1400 audit(693.190:263): avc: denied { create } for pid=5715 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 694.514782][ T30] audit: type=1400 audit(693.940:264): avc: denied { read } for pid=5722 comm="syz.0.828" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 694.522404][ T30] audit: type=1400 audit(693.940:265): avc: denied { open } for pid=5722 comm="syz.0.828" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 703.737489][ T5771] FAULT_INJECTION: forcing a failure. [ 703.737489][ T5771] name failslab, interval 1, probability 0, space 0, times 0 [ 703.738128][ T5771] CPU: 0 UID: 0 PID: 5771 Comm: syz.2.845 Not tainted syzkaller #0 PREEMPT [ 703.738202][ T5771] Hardware name: linux,dummy-virt (DT) [ 703.738241][ T5771] Call trace: [ 703.738271][ T5771] show_stack+0x18/0x24 (C) [ 703.738369][ T5771] dump_stack_lvl+0xdc/0xf4 [ 703.738425][ T5771] dump_stack+0x1c/0x28 [ 703.738470][ T5771] should_fail_ex+0x5a0/0x6ac [ 703.738518][ T5771] should_failslab+0xbc/0x11c [ 703.738567][ T5771] kmem_cache_alloc_noprof+0x74/0x3b8 [ 703.738614][ T5771] alloc_empty_file+0x5c/0x16c [ 703.738662][ T5771] path_openat+0xd0/0x24b4 [ 703.738710][ T5771] do_filp_open+0x184/0x360 [ 703.738755][ T5771] do_sys_openat2+0xe0/0x160 [ 703.738796][ T5771] __arm64_compat_sys_openat+0x128/0x1b8 [ 703.738855][ T5771] invoke_syscall+0x6c/0x258 [ 703.738901][ T5771] el0_svc_common.constprop.0+0xac/0x230 [ 703.738944][ T5771] do_el0_svc_compat+0x40/0x68 [ 703.738986][ T5771] el0_svc_compat+0x4c/0x184 [ 703.739046][ T5771] el0t_32_sync_handler+0x88/0xac [ 703.739089][ T5771] el0t_32_sync+0x19c/0x1a0 [ 704.222094][ T30] audit: type=1400 audit(703.650:266): avc: denied { write } for pid=5773 comm="syz.2.846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 705.433874][ T30] audit: type=1400 audit(704.840:267): avc: denied { ioctl } for pid=5773 comm="syz.2.846" path="socket:[12561]" dev="sockfs" ino=12561 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 708.946610][ T5804] FAULT_INJECTION: forcing a failure. [ 708.946610][ T5804] name failslab, interval 1, probability 0, space 0, times 0 [ 708.947137][ T5804] CPU: 0 UID: 0 PID: 5804 Comm: syz.0.856 Not tainted syzkaller #0 PREEMPT [ 708.947206][ T5804] Hardware name: linux,dummy-virt (DT) [ 708.947239][ T5804] Call trace: [ 708.947266][ T5804] show_stack+0x18/0x24 (C) [ 708.947344][ T5804] dump_stack_lvl+0xdc/0xf4 [ 708.947397][ T5804] dump_stack+0x1c/0x28 [ 708.947441][ T5804] should_fail_ex+0x5a0/0x6ac [ 708.947486][ T5804] should_failslab+0xbc/0x11c [ 708.947532][ T5804] __kmalloc_cache_noprof+0x74/0x3d0 [ 708.947576][ T5804] call_usermodehelper_setup+0xa4/0x2b8 [ 708.947621][ T5804] __request_module+0x2f8/0x568 [ 708.947668][ T5804] tcp_ca_find_autoload+0xe0/0x210 [ 708.947715][ T5804] tcp_set_congestion_control+0xa4/0x7cc [ 708.947768][ T5804] mptcp_setsockopt+0x3bc/0x20a8 [ 708.947813][ T5804] sock_common_setsockopt+0x70/0xe0 [ 708.947865][ T5804] do_sock_setsockopt+0x17c/0x354 [ 708.948057][ T5804] __sys_setsockopt+0xcc/0x164 [ 708.948262][ T5804] __arm64_sys_setsockopt+0xa4/0x100 [ 708.948403][ T5804] invoke_syscall+0x6c/0x258 [ 708.948871][ T5804] el0_svc_common.constprop.0+0xac/0x230 [ 708.948977][ T5804] do_el0_svc_compat+0x40/0x68 [ 708.949260][ T5804] el0_svc_compat+0x4c/0x184 [ 708.949423][ T5804] el0t_32_sync_handler+0x88/0xac [ 708.949657][ T5804] el0t_32_sync+0x19c/0x1a0 [ 709.152000][ T5803] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1540 sclass=netlink_tcpdiag_socket pid=5803 comm=syz.2.857 [ 709.231955][ T30] audit: type=1400 audit(708.650:268): avc: denied { write } for pid=5801 comm="syz.2.857" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 709.605275][ T30] audit: type=1400 audit(709.030:269): avc: denied { write } for pid=5805 comm="syz.0.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 709.615601][ T5807] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5807 comm=syz.0.858 [ 709.688767][ T5807] netlink: 8 bytes leftover after parsing attributes in process `syz.0.858'. [ 709.695183][ T5807] netlink: 8 bytes leftover after parsing attributes in process `syz.0.858'. [ 715.948148][ T5854] FAULT_INJECTION: forcing a failure. [ 715.948148][ T5854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.965764][ T5854] CPU: 1 UID: 0 PID: 5854 Comm: syz.0.875 Not tainted syzkaller #0 PREEMPT [ 715.966011][ T5854] Hardware name: linux,dummy-virt (DT) [ 715.966063][ T5854] Call trace: [ 715.966108][ T5854] show_stack+0x18/0x24 (C) [ 715.966241][ T5854] dump_stack_lvl+0xdc/0xf4 [ 715.966326][ T5854] dump_stack+0x1c/0x28 [ 715.966401][ T5854] should_fail_ex+0x5a0/0x6ac [ 715.966475][ T5854] should_fail+0x14/0x20 [ 715.966540][ T5854] should_fail_usercopy+0x1c/0x28 [ 715.966607][ T5854] _copy_from_iter+0x178/0x1020 [ 715.966687][ T5854] proc_sys_call_handler+0x248/0x3fc [ 715.966770][ T5854] proc_sys_write+0x14/0x20 [ 715.966854][ T5854] vfs_write+0x4b0/0xb88 [ 715.966930][ T5854] ksys_write+0xec/0x1d8 [ 715.966998][ T5854] __arm64_sys_write+0x6c/0x9c [ 715.967067][ T5854] invoke_syscall+0x6c/0x258 [ 715.967143][ T5854] el0_svc_common.constprop.0+0xac/0x230 [ 715.967213][ T5854] do_el0_svc_compat+0x40/0x68 [ 715.967283][ T5854] el0_svc_compat+0x4c/0x184 [ 715.967358][ T5854] el0t_32_sync_handler+0x88/0xac [ 715.967468][ T5854] el0t_32_sync+0x19c/0x1a0 [ 717.664719][ T30] audit: type=1400 audit(717.090:270): avc: denied { lock } for pid=5864 comm="syz.2.881" path="socket:[12728]" dev="sockfs" ino=12728 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 719.736741][ T5879] FAULT_INJECTION: forcing a failure. [ 719.736741][ T5879] name failslab, interval 1, probability 0, space 0, times 0 [ 719.737748][ T5879] CPU: 0 UID: 0 PID: 5879 Comm: syz.0.888 Not tainted syzkaller #0 PREEMPT [ 719.737848][ T5879] Hardware name: linux,dummy-virt (DT) [ 719.737885][ T5879] Call trace: [ 719.737911][ T5879] show_stack+0x18/0x24 (C) [ 719.738002][ T5879] dump_stack_lvl+0xdc/0xf4 [ 719.738056][ T5879] dump_stack+0x1c/0x28 [ 719.738106][ T5879] should_fail_ex+0x5a0/0x6ac [ 719.738154][ T5879] should_failslab+0xbc/0x11c [ 719.738206][ T5879] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 719.738294][ T5879] __alloc_skb+0x208/0x2f0 [ 719.738384][ T5879] netlink_alloc_large_skb+0xac/0xd8 [ 719.738462][ T5879] netlink_sendmsg+0x4ac/0xa54 [ 719.738511][ T5879] __sock_sendmsg+0xc8/0x168 [ 719.738568][ T5879] sock_write_iter+0x1cc/0x300 [ 719.738617][ T5879] vfs_write+0x7bc/0xb88 [ 719.738670][ T5879] ksys_write+0x18c/0x1d8 [ 719.738717][ T5879] __arm64_sys_write+0x6c/0x9c [ 719.738764][ T5879] invoke_syscall+0x6c/0x258 [ 719.738829][ T5879] el0_svc_common.constprop.0+0xac/0x230 [ 719.738877][ T5879] do_el0_svc_compat+0x40/0x68 [ 719.738923][ T5879] el0_svc_compat+0x4c/0x184 [ 719.738975][ T5879] el0t_32_sync_handler+0x88/0xac [ 719.739024][ T5879] el0t_32_sync+0x19c/0x1a0 [ 726.026444][ T30] audit: type=1400 audit(725.450:271): avc: denied { map_read map_write } for pid=5908 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 727.155889][ T30] audit: type=1400 audit(726.580:272): avc: denied { mount } for pid=5908 comm="syz.0.898" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 730.225185][ T5930] FAULT_INJECTION: forcing a failure. [ 730.225185][ T5930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 730.226205][ T5930] CPU: 0 UID: 0 PID: 5930 Comm: syz.0.903 Not tainted syzkaller #0 PREEMPT [ 730.226420][ T5930] Hardware name: linux,dummy-virt (DT) [ 730.226506][ T5930] Call trace: [ 730.226567][ T5930] show_stack+0x18/0x24 (C) [ 730.226737][ T5930] dump_stack_lvl+0xdc/0xf4 [ 730.226870][ T5930] dump_stack+0x1c/0x28 [ 730.226978][ T5930] should_fail_ex+0x5a0/0x6ac [ 730.227083][ T5930] should_fail+0x14/0x20 [ 730.227174][ T5930] should_fail_usercopy+0x1c/0x28 [ 730.227258][ T5930] _copy_from_iter+0x178/0x1020 [ 730.227357][ T5930] netlink_sendmsg+0x5e8/0xa54 [ 730.227458][ T5930] __sock_sendmsg+0xc8/0x168 [ 730.227567][ T5930] ____sys_sendmsg+0x500/0x764 [ 730.227689][ T5930] ___sys_sendmsg+0x11c/0x19c [ 730.227841][ T5930] __sys_sendmsg+0x114/0x19c [ 730.227942][ T5930] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 730.228200][ T5930] invoke_syscall+0x6c/0x258 [ 730.230114][ T5930] el0_svc_common.constprop.0+0xac/0x230 [ 730.230617][ T5930] do_el0_svc_compat+0x40/0x68 [ 730.230761][ T5930] el0_svc_compat+0x4c/0x184 [ 730.230971][ T5930] el0t_32_sync_handler+0x88/0xac [ 730.231089][ T5930] el0t_32_sync+0x19c/0x1a0 [ 731.208310][ T30] audit: type=1400 audit(730.630:273): avc: denied { lock } for pid=5933 comm="syz.0.905" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11997 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 738.985928][ T5978] FAULT_INJECTION: forcing a failure. [ 738.985928][ T5978] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 738.989234][ T5978] CPU: 1 UID: 0 PID: 5978 Comm: syz.0.919 Not tainted syzkaller #0 PREEMPT [ 738.989370][ T5978] Hardware name: linux,dummy-virt (DT) [ 738.989441][ T5978] Call trace: [ 738.989499][ T5978] show_stack+0x18/0x24 (C) [ 738.989717][ T5978] dump_stack_lvl+0xdc/0xf4 [ 738.989830][ T5978] dump_stack+0x1c/0x28 [ 738.989968][ T5978] should_fail_ex+0x5a0/0x6ac [ 738.990071][ T5978] should_fail+0x14/0x20 [ 738.990160][ T5978] should_fail_usercopy+0x1c/0x28 [ 738.990254][ T5978] simple_read_from_buffer+0x84/0x214 [ 738.990363][ T5978] proc_fail_nth_read+0x160/0x21c [ 738.990473][ T5978] vfs_read+0x18c/0xa28 [ 738.990569][ T5978] ksys_read+0xec/0x1d8 [ 738.990666][ T5978] __arm64_sys_read+0x6c/0x9c [ 738.990770][ T5978] invoke_syscall+0x6c/0x258 [ 738.990881][ T5978] el0_svc_common.constprop.0+0xac/0x230 [ 738.990979][ T5978] do_el0_svc_compat+0x40/0x68 [ 738.991077][ T5978] el0_svc_compat+0x4c/0x184 [ 738.991192][ T5978] el0t_32_sync_handler+0x88/0xac [ 738.991294][ T5978] el0t_32_sync+0x19c/0x1a0 [ 739.628029][ T5983] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 739.654451][ T5983] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 743.314003][ T30] audit: type=1400 audit(742.740:274): avc: denied { shutdown } for pid=6003 comm="syz.0.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 743.336068][ T30] audit: type=1400 audit(742.760:275): avc: denied { setattr } for pid=6003 comm="syz.0.929" name="PACKET" dev="sockfs" ino=12941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 743.367640][ T30] audit: type=1400 audit(742.790:276): avc: denied { setopt } for pid=6003 comm="syz.0.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 747.217491][ T6029] FAULT_INJECTION: forcing a failure. [ 747.217491][ T6029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 747.218226][ T6029] CPU: 0 UID: 0 PID: 6029 Comm: syz.2.940 Not tainted syzkaller #0 PREEMPT [ 747.218332][ T6029] Hardware name: linux,dummy-virt (DT) [ 747.218391][ T6029] Call trace: [ 747.218439][ T6029] show_stack+0x18/0x24 (C) [ 747.218571][ T6029] dump_stack_lvl+0xdc/0xf4 [ 747.218659][ T6029] dump_stack+0x1c/0x28 [ 747.218736][ T6029] should_fail_ex+0x5a0/0x6ac [ 747.218933][ T6029] should_fail+0x14/0x20 [ 747.219112][ T6029] should_fail_usercopy+0x1c/0x28 [ 747.219240][ T6029] _inline_copy_from_user+0x34/0x134 [ 747.219358][ T6029] get_compat_msghdr+0x90/0x118 [ 747.219462][ T6029] ___sys_sendmsg+0x184/0x19c [ 747.219618][ T6029] __sys_sendmsg+0x114/0x19c [ 747.219816][ T6029] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 747.219962][ T6029] invoke_syscall+0x6c/0x258 [ 747.220114][ T6029] el0_svc_common.constprop.0+0xac/0x230 [ 747.220255][ T6029] do_el0_svc_compat+0x40/0x68 [ 747.220331][ T6029] el0_svc_compat+0x4c/0x184 [ 747.220446][ T6029] el0t_32_sync_handler+0x88/0xac [ 747.220525][ T6029] el0t_32_sync+0x19c/0x1a0 [ 747.716080][ T30] audit: type=1401 audit(747.140:277): op=setxattr invalid_context="system_u:object_r:hald_var_run_t:s0" [ 748.158574][ T6037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6037 comm=syz.2.943 [ 749.154593][ T6047] FAULT_INJECTION: forcing a failure. [ 749.154593][ T6047] name failslab, interval 1, probability 0, space 0, times 0 [ 749.182152][ T6047] CPU: 1 UID: 0 PID: 6047 Comm: syz.2.949 Not tainted syzkaller #0 PREEMPT [ 749.182425][ T6047] Hardware name: linux,dummy-virt (DT) [ 749.182513][ T6047] Call trace: [ 749.182577][ T6047] show_stack+0x18/0x24 (C) [ 749.182734][ T6047] dump_stack_lvl+0xdc/0xf4 [ 749.182833][ T6047] dump_stack+0x1c/0x28 [ 749.182936][ T6047] should_fail_ex+0x5a0/0x6ac [ 749.183037][ T6047] should_failslab+0xbc/0x11c [ 749.183145][ T6047] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 749.183242][ T6047] __alloc_skb+0x208/0x2f0 [ 749.183340][ T6047] netlink_alloc_large_skb+0xac/0xd8 [ 749.183438][ T6047] netlink_sendmsg+0x4ac/0xa54 [ 749.183516][ T6047] __sock_sendmsg+0xc8/0x168 [ 749.183565][ T6047] ____sys_sendmsg+0x500/0x764 [ 749.183610][ T6047] ___sys_sendmsg+0x11c/0x19c [ 749.183649][ T6047] __sys_sendmsg+0x114/0x19c [ 749.183689][ T6047] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 749.183734][ T6047] invoke_syscall+0x6c/0x258 [ 749.183776][ T6047] el0_svc_common.constprop.0+0xac/0x230 [ 749.183817][ T6047] do_el0_svc_compat+0x40/0x68 [ 749.183858][ T6047] el0_svc_compat+0x4c/0x184 [ 749.183902][ T6047] el0t_32_sync_handler+0x88/0xac [ 749.183943][ T6047] el0t_32_sync+0x19c/0x1a0 [ 751.024892][ T6057] kernel profiling enabled (shift: 17) [ 751.981864][ T30] audit: type=1400 audit(751.380:278): avc: denied { ioctl } for pid=6061 comm="syz.2.955" path="socket:[12238]" dev="sockfs" ino=12238 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 753.606665][ T6070] fuse: Bad value for 'fd' [ 759.893811][ T6100] fuse: Bad value for 'fd' [ 760.554250][ T30] audit: type=1400 audit(759.980:279): avc: denied { ioctl } for pid=6101 comm="syz.2.964" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 763.417172][ T6119] FAULT_INJECTION: forcing a failure. [ 763.417172][ T6119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 763.418194][ T6119] CPU: 1 UID: 0 PID: 6119 Comm: syz.0.969 Not tainted syzkaller #0 PREEMPT [ 763.418316][ T6119] Hardware name: linux,dummy-virt (DT) [ 763.418382][ T6119] Call trace: [ 763.418489][ T6119] show_stack+0x18/0x24 (C) [ 763.418660][ T6119] dump_stack_lvl+0xdc/0xf4 [ 763.418838][ T6119] dump_stack+0x1c/0x28 [ 763.418946][ T6119] should_fail_ex+0x5a0/0x6ac [ 763.419046][ T6119] should_fail+0x14/0x20 [ 763.419159][ T6119] should_fail_usercopy+0x1c/0x28 [ 763.419253][ T6119] _inline_copy_from_user+0x34/0x134 [ 763.419355][ T6119] get_compat_msghdr+0x90/0x118 [ 763.419442][ T6119] ___sys_sendmsg+0x184/0x19c [ 763.419700][ T6119] __sys_sendmsg+0x114/0x19c [ 763.419874][ T6119] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 763.419992][ T6119] invoke_syscall+0x6c/0x258 [ 763.420096][ T6119] el0_svc_common.constprop.0+0xac/0x230 [ 763.420188][ T6119] do_el0_svc_compat+0x40/0x68 [ 763.420274][ T6119] el0_svc_compat+0x4c/0x184 [ 763.420371][ T6119] el0t_32_sync_handler+0x88/0xac [ 763.420559][ T6119] el0t_32_sync+0x19c/0x1a0 [ 764.095909][ T30] audit: type=1400 audit(763.520:280): avc: denied { nlmsg_write } for pid=6122 comm="syz.2.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 771.370459][ T30] audit: type=1400 audit(770.790:281): avc: denied { bind } for pid=6169 comm="syz.2.991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 774.993888][ T6197] FAULT_INJECTION: forcing a failure. [ 774.993888][ T6197] name failslab, interval 1, probability 0, space 0, times 0 [ 774.994663][ T6197] CPU: 1 UID: 0 PID: 6197 Comm: syz.2.1004 Not tainted syzkaller #0 PREEMPT [ 774.994793][ T6197] Hardware name: linux,dummy-virt (DT) [ 774.994882][ T6197] Call trace: [ 774.994940][ T6197] show_stack+0x18/0x24 (C) [ 774.995100][ T6197] dump_stack_lvl+0xdc/0xf4 [ 774.995490][ T6197] dump_stack+0x1c/0x28 [ 774.995809][ T6197] should_fail_ex+0x5a0/0x6ac [ 774.996099][ T6197] should_failslab+0xbc/0x11c [ 774.996368][ T6197] kmem_cache_alloc_noprof+0x74/0x3b8 [ 774.996678][ T6197] security_file_alloc+0x28/0x1ec [ 774.996806][ T6197] init_file+0x8c/0x40c [ 774.997172][ T6197] alloc_empty_file+0x70/0x16c [ 774.997440][ T6197] path_openat+0xd0/0x24b4 [ 774.997667][ T6197] do_filp_open+0x184/0x360 [ 774.997958][ T6197] do_sys_openat2+0xe0/0x160 [ 774.998213][ T6197] __arm64_compat_sys_openat+0x128/0x1b8 [ 774.998495][ T6197] invoke_syscall+0x6c/0x258 [ 774.998760][ T6197] el0_svc_common.constprop.0+0xac/0x230 [ 774.998882][ T6197] do_el0_svc_compat+0x40/0x68 [ 774.999015][ T6197] el0_svc_compat+0x4c/0x184 [ 774.999176][ T6197] el0t_32_sync_handler+0x88/0xac [ 774.999355][ T6197] el0t_32_sync+0x19c/0x1a0 [ 778.641846][ T30] audit: type=1400 audit(778.060:282): avc: denied { create } for pid=6211 comm="syz.0.1011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 785.131352][ T30] audit: type=1400 audit(784.550:283): avc: denied { accept } for pid=6249 comm="syz.2.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 786.788302][ T6264] FAULT_INJECTION: forcing a failure. [ 786.788302][ T6264] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.794580][ T6264] CPU: 0 UID: 0 PID: 6264 Comm: syz.2.1037 Not tainted syzkaller #0 PREEMPT [ 786.794735][ T6264] Hardware name: linux,dummy-virt (DT) [ 786.794812][ T6264] Call trace: [ 786.794885][ T6264] show_stack+0x18/0x24 (C) [ 786.795054][ T6264] dump_stack_lvl+0xdc/0xf4 [ 786.795166][ T6264] dump_stack+0x1c/0x28 [ 786.795252][ T6264] should_fail_ex+0x5a0/0x6ac [ 786.795344][ T6264] should_fail+0x14/0x20 [ 786.795429][ T6264] should_fail_usercopy+0x1c/0x28 [ 786.795517][ T6264] _inline_copy_from_user+0x34/0x134 [ 786.795617][ T6264] get_compat_msghdr+0x90/0x118 [ 786.795702][ T6264] ___sys_sendmsg+0x184/0x19c [ 786.795790][ T6264] __sys_sendmsg+0x114/0x19c [ 786.795872][ T6264] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 786.795943][ T6264] invoke_syscall+0x6c/0x258 [ 786.796019][ T6264] el0_svc_common.constprop.0+0xac/0x230 [ 786.796093][ T6264] do_el0_svc_compat+0x40/0x68 [ 786.796162][ T6264] el0_svc_compat+0x4c/0x184 [ 786.796236][ T6264] el0t_32_sync_handler+0x88/0xac [ 786.796305][ T6264] el0t_32_sync+0x19c/0x1a0 [ 788.617713][ T6280] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2573 sclass=netlink_tcpdiag_socket pid=6280 comm=syz.0.1045 [ 790.884580][ T30] audit: type=1400 audit(790.310:284): avc: denied { validate_trans } for pid=6293 comm="syz.0.1052" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 791.126052][ T6296] FAULT_INJECTION: forcing a failure. [ 791.126052][ T6296] name failslab, interval 1, probability 0, space 0, times 0 [ 791.126882][ T6296] CPU: 1 UID: 0 PID: 6296 Comm: syz.2.1053 Not tainted syzkaller #0 PREEMPT [ 791.126999][ T6296] Hardware name: linux,dummy-virt (DT) [ 791.127061][ T6296] Call trace: [ 791.127125][ T6296] show_stack+0x18/0x24 (C) [ 791.127269][ T6296] dump_stack_lvl+0xdc/0xf4 [ 791.127518][ T6296] dump_stack+0x1c/0x28 [ 791.127673][ T6296] should_fail_ex+0x5a0/0x6ac [ 791.127861][ T6296] should_failslab+0xbc/0x11c [ 791.128312][ T6296] kmem_cache_alloc_noprof+0x74/0x3b8 [ 791.128626][ T6296] alloc_empty_file+0x5c/0x16c [ 791.128730][ T6296] path_openat+0xd0/0x24b4 [ 791.128820][ T6296] do_filp_open+0x184/0x360 [ 791.128910][ T6296] do_sys_openat2+0xe0/0x160 [ 791.128997][ T6296] __arm64_compat_sys_openat+0x128/0x1b8 [ 791.129749][ T6296] invoke_syscall+0x6c/0x258 [ 791.129866][ T6296] el0_svc_common.constprop.0+0xac/0x230 [ 791.129979][ T6296] do_el0_svc_compat+0x40/0x68 [ 791.130075][ T6296] el0_svc_compat+0x4c/0x184 [ 791.130170][ T6296] el0t_32_sync_handler+0x88/0xac [ 791.130251][ T6296] el0t_32_sync+0x19c/0x1a0 [ 792.341519][ T3404] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 792.654362][ T3404] usb 1-1: not running at top speed; connect to a high speed hub [ 792.723317][ T3404] usb 1-1: config 1 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 792.725203][ T3404] usb 1-1: config 1 interface 0 altsetting 5 endpoint 0x81 has invalid maxpacket 1007, setting to 64 [ 792.728044][ T3404] usb 1-1: config 1 interface 0 has no altsetting 0 [ 792.837971][ T3404] usb 1-1: New USB device found, idVendor=056a, idProduct=00da, bcdDevice= 0.40 [ 792.841434][ T3404] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 792.843655][ T3404] usb 1-1: Product: 稌䴍 [ 792.845103][ T3404] usb 1-1: Manufacturer: 쾺뵃ջꁅ嬈ﲥꙞ뎨呧睤覵헩ጠ輸氄༞应᫜槼ڡ铘죑䵌ⰸ뎭銎쒌帒۫끬偏蕿볺価㱖똺줾Ɱ➔钟뫸욱鑂놩⠇❁ᴺ郺鉅㎏虯≻嶘搈⾮⯒ϰ辏⨍楞 [ 792.848032][ T3404] usb 1-1: SerialNumber: 烅狺΃ᚅ壠뚃堾⋎䔝襃ᘥ뒮綠碙ដ蝦㋎㓅漠猚햸棙䤴㾻ᝀ鬽玵ᡷ㱻⌃牺힐☉ꮞ뜧躹世든䋌问ᇿ炕ꂇ쥠権윸媴촢土伳磁䳜ᚐ딀씻Ṇ땓ᴒ톟ꯁ旅䫃淈ョ䝻畠坊志件ᨣ [ 792.974056][ T6306] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 793.636006][ T6306] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 793.675429][ T6306] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 793.803865][ T6306] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 793.837884][ T6306] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 793.983392][ T6306] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 793.997872][ T6306] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 794.436810][ T6306] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 794.453871][ T6306] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 794.792496][ T3404] usbhid 1-1:1.0: can't add hid device: -71 [ 794.795002][ T3404] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 795.044282][ T3404] usb 1-1: USB disconnect, device number 3 [ 795.908813][ T6316] SELinux: Context is not valid (left unmapped). [ 795.912835][ T30] audit: type=1400 audit(795.330:285): avc: denied { relabelfrom } for pid=6310 comm="syz.2.1060" name="RAWv6" dev="sockfs" ino=14724 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 795.983033][ T30] audit: type=1400 audit(795.390:286): avc: denied { relabelto } for pid=6310 comm="syz.2.1060" name="RAWv6" dev="sockfs" ino=14724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=rawip_socket permissive=1 trawcon="" [ 798.071632][ T6326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 798.083222][ T6326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 798.128507][ T6326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 798.159618][ T6326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 798.238977][ T6326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 798.256620][ T6326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 798.283705][ T30] audit: type=1400 audit(797.710:287): avc: denied { lock } for pid=6325 comm="syz.0.1066" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 798.378661][ T6326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 798.421059][ T30] audit: type=1400 audit(797.830:288): avc: denied { read } for pid=6325 comm="syz.0.1066" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 798.424106][ T30] audit: type=1400 audit(797.850:289): avc: denied { open } for pid=6325 comm="syz.0.1066" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 798.447988][ T6326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 798.828571][ T6326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 798.834077][ T6326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 799.157556][ T30] audit: type=1400 audit(798.580:290): avc: denied { create } for pid=6332 comm="syz.2.1068" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 799.193730][ T30] audit: type=1400 audit(798.600:291): avc: denied { setattr } for pid=6332 comm="syz.2.1068" name="file0" dev="tmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 799.335108][ T30] audit: type=1400 audit(798.760:292): avc: denied { unlink } for pid=5399 comm="syz-executor" name="file0" dev="tmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 800.237536][ T6340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 800.301208][ T6340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 800.403107][ T6340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 800.425142][ T6340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 800.503175][ T6340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 800.522524][ T6340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 800.622668][ T6340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 800.638733][ T6340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 800.924609][ T6340] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 800.927325][ T6340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 801.847592][ T30] audit: type=1400 audit(801.270:293): avc: denied { create } for pid=6346 comm="syz.2.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 803.166388][ T6356] FAULT_INJECTION: forcing a failure. [ 803.166388][ T6356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 803.169120][ T6356] CPU: 1 UID: 0 PID: 6356 Comm: syz.2.1078 Not tainted syzkaller #0 PREEMPT [ 803.169250][ T6356] Hardware name: linux,dummy-virt (DT) [ 803.169326][ T6356] Call trace: [ 803.169384][ T6356] show_stack+0x18/0x24 (C) [ 803.169593][ T6356] dump_stack_lvl+0xdc/0xf4 [ 803.169703][ T6356] dump_stack+0x1c/0x28 [ 803.169790][ T6356] should_fail_ex+0x5a0/0x6ac [ 803.169886][ T6356] should_fail+0x14/0x20 [ 803.169969][ T6356] should_fail_usercopy+0x1c/0x28 [ 803.170058][ T6356] simple_read_from_buffer+0x84/0x214 [ 803.170151][ T6356] proc_fail_nth_read+0x160/0x21c [ 803.170296][ T6356] vfs_read+0x18c/0xa28 [ 803.170392][ T6356] ksys_read+0xec/0x1d8 [ 803.170480][ T6356] __arm64_sys_read+0x6c/0x9c [ 803.170568][ T6356] invoke_syscall+0x6c/0x258 [ 803.170662][ T6356] el0_svc_common.constprop.0+0xac/0x230 [ 803.170754][ T6356] do_el0_svc_compat+0x40/0x68 [ 803.170853][ T6356] el0_svc_compat+0x4c/0x184 [ 803.170950][ T6356] el0t_32_sync_handler+0x88/0xac [ 803.171045][ T6356] el0t_32_sync+0x19c/0x1a0 [ 803.389101][ T4201] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 803.636098][ T4201] usb 1-1: not running at top speed; connect to a high speed hub [ 803.681860][ T4201] usb 1-1: config 1 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 803.682566][ T4201] usb 1-1: config 1 interface 0 altsetting 5 endpoint 0x81 has invalid maxpacket 1007, setting to 64 [ 803.683205][ T4201] usb 1-1: config 1 interface 0 has no altsetting 0 [ 803.805541][ T4201] usb 1-1: New USB device found, idVendor=056a, idProduct=00da, bcdDevice= 0.40 [ 803.806060][ T4201] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 803.806315][ T4201] usb 1-1: Product: 稌䴍 [ 803.806448][ T4201] usb 1-1: Manufacturer: 쾺뵃ջꁅ嬈ﲥꙞ뎨呧睤覵헩ጠ輸氄༞应᫜槼ڡ铘죑䵌ⰸ뎭銎쒌帒۫끬偏蕿볺価㱖똺줾Ɱ➔钟뫸욱鑂놩⠇❁ᴺ郺鉅㎏虯≻嶘搈⾮⯒ϰ辏⨍楞 [ 803.806501][ T4201] usb 1-1: SerialNumber: 烅狺΃ᚅ壠뚃堾⋎䔝襃ᘥ뒮綠碙ដ蝦㋎㓅漠猚햸棙䤴㾻ᝀ鬽玵ᡷ㱻⌃牺힐☉ꮞ뜧躹世든䋌问ᇿ炕ꂇ쥠権윸媴촢土伳磁䳜ᚐ딀씻Ṇ땓ᴒ톟ꯁ旅䫃淈ョ䝻畠坊志件ᨣ [ 803.853807][ T6355] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 804.552040][ T6355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 804.579163][ T6355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 804.733078][ T6355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 804.781660][ T6355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 804.822873][ T6355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 804.825680][ T6355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 805.221437][ T6355] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 805.233487][ T6355] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 805.512759][ T4201] usbhid 1-1:1.0: can't add hid device: -71 [ 805.515639][ T4201] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 805.713625][ T4201] usb 1-1: USB disconnect, device number 4 [ 806.907546][ T6373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6373 comm=syz.2.1085 [ 811.133528][ T6404] veth0_macvtap: left promiscuous mode [ 812.732353][ T6416] FAULT_INJECTION: forcing a failure. [ 812.732353][ T6416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 812.734079][ T6416] CPU: 0 UID: 0 PID: 6416 Comm: syz.0.1102 Not tainted syzkaller #0 PREEMPT [ 812.734155][ T6416] Hardware name: linux,dummy-virt (DT) [ 812.734189][ T6416] Call trace: [ 812.734216][ T6416] show_stack+0x18/0x24 (C) [ 812.734321][ T6416] dump_stack_lvl+0xdc/0xf4 [ 812.734409][ T6416] dump_stack+0x1c/0x28 [ 812.734455][ T6416] should_fail_ex+0x5a0/0x6ac [ 812.734501][ T6416] should_fail+0x14/0x20 [ 812.734540][ T6416] should_fail_usercopy+0x1c/0x28 [ 812.734580][ T6416] simple_read_from_buffer+0x84/0x214 [ 812.734626][ T6416] proc_fail_nth_read+0x160/0x21c [ 812.734673][ T6416] vfs_read+0x18c/0xa28 [ 812.734716][ T6416] ksys_read+0xec/0x1d8 [ 812.734757][ T6416] __arm64_sys_read+0x6c/0x9c [ 812.734798][ T6416] invoke_syscall+0x6c/0x258 [ 812.734852][ T6416] el0_svc_common.constprop.0+0xac/0x230 [ 812.734895][ T6416] do_el0_svc_compat+0x40/0x68 [ 812.734935][ T6416] el0_svc_compat+0x4c/0x184 [ 812.734980][ T6416] el0t_32_sync_handler+0x88/0xac [ 812.735021][ T6416] el0t_32_sync+0x19c/0x1a0 [ 813.198782][ T30] audit: type=1400 audit(812.620:294): avc: denied { connect } for pid=6420 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 817.569366][ T30] audit: type=1400 audit(816.990:295): avc: denied { getopt } for pid=6435 comm="syz.2.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 819.347296][ T30] audit: type=1400 audit(818.770:296): avc: denied { setattr } for pid=6444 comm="syz.0.1113" name="" dev="pipefs" ino=14957 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 820.137554][ T6451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=6451 comm=syz.2.1115 [ 821.295824][ T30] audit: type=1400 audit(820.720:297): avc: denied { create } for pid=6454 comm="syz.2.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 823.302678][ T6466] FAULT_INJECTION: forcing a failure. [ 823.302678][ T6466] name failslab, interval 1, probability 0, space 0, times 0 [ 823.303337][ T6466] CPU: 1 UID: 0 PID: 6466 Comm: syz.2.1122 Not tainted syzkaller #0 PREEMPT [ 823.303410][ T6466] Hardware name: linux,dummy-virt (DT) [ 823.303443][ T6466] Call trace: [ 823.303470][ T6466] show_stack+0x18/0x24 (C) [ 823.303554][ T6466] dump_stack_lvl+0xdc/0xf4 [ 823.303608][ T6466] dump_stack+0x1c/0x28 [ 823.303653][ T6466] should_fail_ex+0x5a0/0x6ac [ 823.303698][ T6466] should_failslab+0xbc/0x11c [ 823.303753][ T6466] __kvmalloc_node_noprof+0x148/0x634 [ 823.303966][ T6466] proc_sys_call_handler+0x21c/0x3fc [ 823.304106][ T6466] proc_sys_write+0x14/0x20 [ 823.304218][ T6466] vfs_write+0x4b0/0xb88 [ 823.304480][ T6466] ksys_write+0xec/0x1d8 [ 823.304536][ T6466] __arm64_sys_write+0x6c/0x9c [ 823.304728][ T6466] invoke_syscall+0x6c/0x258 [ 823.304971][ T6466] el0_svc_common.constprop.0+0xac/0x230 [ 823.305030][ T6466] do_el0_svc_compat+0x40/0x68 [ 823.305386][ T6466] el0_svc_compat+0x4c/0x184 [ 823.305438][ T6466] el0t_32_sync_handler+0x88/0xac [ 823.305480][ T6466] el0t_32_sync+0x19c/0x1a0 [ 827.796169][ T6479] FAULT_INJECTION: forcing a failure. [ 827.796169][ T6479] name failslab, interval 1, probability 0, space 0, times 0 [ 827.800642][ T6479] CPU: 0 UID: 0 PID: 6479 Comm: syz.0.1127 Not tainted syzkaller #0 PREEMPT [ 827.800831][ T6479] Hardware name: linux,dummy-virt (DT) [ 827.800904][ T6479] Call trace: [ 827.800961][ T6479] show_stack+0x18/0x24 (C) [ 827.801161][ T6479] dump_stack_lvl+0xdc/0xf4 [ 827.801285][ T6479] dump_stack+0x1c/0x28 [ 827.801384][ T6479] should_fail_ex+0x5a0/0x6ac [ 827.801500][ T6479] should_failslab+0xbc/0x11c [ 827.801600][ T6479] __kmalloc_noprof+0xd0/0x4d0 [ 827.801703][ T6479] tomoyo_realpath_from_path+0x90/0x534 [ 827.801804][ T6479] tomoyo_path_number_perm+0x200/0x438 [ 827.801902][ T6479] tomoyo_file_ioctl+0x1c/0x28 [ 827.801989][ T6479] security_file_ioctl_compat+0x8c/0x19c [ 827.802096][ T6479] __arm64_compat_sys_ioctl+0x98/0x234 [ 827.802198][ T6479] invoke_syscall+0x6c/0x258 [ 827.802289][ T6479] el0_svc_common.constprop.0+0xac/0x230 [ 827.802382][ T6479] do_el0_svc_compat+0x40/0x68 [ 827.802466][ T6479] el0_svc_compat+0x4c/0x184 [ 827.802561][ T6479] el0t_32_sync_handler+0x88/0xac [ 827.802654][ T6479] el0t_32_sync+0x19c/0x1a0 [ 827.818233][ T6479] ERROR: Out of memory at tomoyo_realpath_from_path. [ 829.198140][ T30] audit: type=1400 audit(828.620:298): avc: denied { mount } for pid=6477 comm="syz.2.1126" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 830.467228][ T30] audit: type=1400 audit(829.890:299): avc: denied { read write } for pid=6492 comm="syz.0.1132" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 830.497156][ T30] audit: type=1400 audit(829.910:300): avc: denied { open } for pid=6492 comm="syz.0.1132" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 830.572501][ T6493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6493 comm=syz.0.1132 [ 831.181419][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.183850][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.185024][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.185938][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.186822][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.189088][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.191850][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.193325][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.194447][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.195558][ T3462] hid-generic 0003:0003:03B5.0001: unknown main item tag 0x0 [ 831.915163][ T3462] hid-generic 0003:0003:03B5.0001: hidraw0: USB HID v0.04 Device [syz1] on syz1 [ 832.702674][ T30] audit: type=1400 audit(832.120:301): avc: denied { wake_alarm } for pid=6497 comm="syz.0.1135" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 834.554364][ T6509] FAULT_INJECTION: forcing a failure. [ 834.554364][ T6509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 834.555242][ T6509] CPU: 0 UID: 0 PID: 6509 Comm: syz.2.1137 Not tainted syzkaller #0 PREEMPT [ 834.555378][ T6509] Hardware name: linux,dummy-virt (DT) [ 834.555456][ T6509] Call trace: [ 834.555517][ T6509] show_stack+0x18/0x24 (C) [ 834.555676][ T6509] dump_stack_lvl+0xdc/0xf4 [ 834.555788][ T6509] dump_stack+0x1c/0x28 [ 834.556037][ T6509] should_fail_ex+0x5a0/0x6ac [ 834.556174][ T6509] should_fail+0x14/0x20 [ 834.556603][ T6509] should_fail_usercopy+0x1c/0x28 [ 834.557400][ T6509] simple_read_from_buffer+0x84/0x214 [ 834.557665][ T6509] proc_fail_nth_read+0x160/0x21c [ 834.557771][ T6509] vfs_read+0x18c/0xa28 [ 834.557875][ T6509] ksys_read+0xec/0x1d8 [ 834.557959][ T6509] __arm64_sys_read+0x6c/0x9c [ 834.558082][ T6509] invoke_syscall+0x6c/0x258 [ 834.558332][ T6509] el0_svc_common.constprop.0+0xac/0x230 [ 834.558586][ T6509] do_el0_svc_compat+0x40/0x68 [ 834.558896][ T6509] el0_svc_compat+0x4c/0x184 [ 834.559052][ T6509] el0t_32_sync_handler+0x88/0xac [ 834.559158][ T6509] el0t_32_sync+0x19c/0x1a0 [ 834.898107][ T6498] fido_id[6498]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 835.865349][ T6513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=6513 comm=syz.2.1138 [ 835.951106][ T30] audit: type=1400 audit(835.360:302): avc: denied { execute } for pid=6510 comm="syz.2.1138" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="hugetlbfs" ino=14110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 840.519249][ T6533] FAULT_INJECTION: forcing a failure. [ 840.519249][ T6533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 840.582211][ T6533] CPU: 0 UID: 0 PID: 6533 Comm: syz.2.1145 Not tainted syzkaller #0 PREEMPT [ 840.582481][ T6533] Hardware name: linux,dummy-virt (DT) [ 840.582549][ T6533] Call trace: [ 840.582608][ T6533] show_stack+0x18/0x24 (C) [ 840.582780][ T6533] dump_stack_lvl+0xdc/0xf4 [ 840.582898][ T6533] dump_stack+0x1c/0x28 [ 840.582995][ T6533] should_fail_ex+0x5a0/0x6ac [ 840.583109][ T6533] should_fail+0x14/0x20 [ 840.583201][ T6533] should_fail_usercopy+0x1c/0x28 [ 840.583289][ T6533] _inline_copy_from_user+0x34/0x134 [ 840.583391][ T6533] get_compat_msghdr+0x90/0x118 [ 840.583482][ T6533] ___sys_sendmsg+0x184/0x19c [ 840.583577][ T6533] __sys_sendmsg+0x114/0x19c [ 840.583668][ T6533] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 840.583759][ T6533] invoke_syscall+0x6c/0x258 [ 840.583856][ T6533] el0_svc_common.constprop.0+0xac/0x230 [ 840.583954][ T6533] do_el0_svc_compat+0x40/0x68 [ 840.584046][ T6533] el0_svc_compat+0x4c/0x184 [ 840.584165][ T6533] el0t_32_sync_handler+0x88/0xac [ 840.584260][ T6533] el0t_32_sync+0x19c/0x1a0 [ 845.709163][ T30] audit: type=1400 audit(845.130:303): avc: denied { write } for pid=6552 comm="syz.0.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 845.716013][ T30] audit: type=1400 audit(845.140:304): avc: denied { ioctl } for pid=6552 comm="syz.0.1153" path="socket:[15161]" dev="sockfs" ino=15161 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 845.829182][ T30] audit: type=1400 audit(845.250:305): avc: denied { setopt } for pid=6552 comm="syz.0.1153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 852.108257][ T6585] FAULT_INJECTION: forcing a failure. [ 852.108257][ T6585] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.146083][ T6585] CPU: 1 UID: 0 PID: 6585 Comm: syz.0.1162 Not tainted syzkaller #0 PREEMPT [ 852.146372][ T6585] Hardware name: linux,dummy-virt (DT) [ 852.146437][ T6585] Call trace: [ 852.146491][ T6585] show_stack+0x18/0x24 (C) [ 852.146649][ T6585] dump_stack_lvl+0xdc/0xf4 [ 852.146751][ T6585] dump_stack+0x1c/0x28 [ 852.146835][ T6585] should_fail_ex+0x5a0/0x6ac [ 852.146922][ T6585] should_fail+0x14/0x20 [ 852.146999][ T6585] should_fail_usercopy+0x1c/0x28 [ 852.147085][ T6585] _inline_copy_from_user+0x34/0x134 [ 852.147177][ T6585] get_compat_msghdr+0x90/0x118 [ 852.147255][ T6585] ___sys_sendmsg+0x184/0x19c [ 852.147337][ T6585] __sys_sendmsg+0x114/0x19c [ 852.147414][ T6585] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 852.147494][ T6585] invoke_syscall+0x6c/0x258 [ 852.147573][ T6585] el0_svc_common.constprop.0+0xac/0x230 [ 852.147651][ T6585] do_el0_svc_compat+0x40/0x68 [ 852.147729][ T6585] el0_svc_compat+0x4c/0x184 [ 852.147814][ T6585] el0t_32_sync_handler+0x88/0xac [ 852.147895][ T6585] el0t_32_sync+0x19c/0x1a0 [ 855.624272][ T6600] FAULT_INJECTION: forcing a failure. [ 855.624272][ T6600] name failslab, interval 1, probability 0, space 0, times 0 [ 855.624946][ T6600] CPU: 0 UID: 0 PID: 6600 Comm: syz.2.1166 Not tainted syzkaller #0 PREEMPT [ 855.625054][ T6600] Hardware name: linux,dummy-virt (DT) [ 855.625104][ T6600] Call trace: [ 855.625145][ T6600] show_stack+0x18/0x24 (C) [ 855.625266][ T6600] dump_stack_lvl+0xdc/0xf4 [ 855.625351][ T6600] dump_stack+0x1c/0x28 [ 855.625423][ T6600] should_fail_ex+0x5a0/0x6ac [ 855.625495][ T6600] should_failslab+0xbc/0x11c [ 855.625569][ T6600] __kmalloc_noprof+0xd0/0x4d0 [ 855.625641][ T6600] tomoyo_realpath_from_path+0x90/0x534 [ 855.625720][ T6600] tomoyo_path_number_perm+0x200/0x438 [ 855.625798][ T6600] tomoyo_file_ioctl+0x1c/0x28 [ 855.625873][ T6600] security_file_ioctl_compat+0x8c/0x19c [ 855.625953][ T6600] __arm64_compat_sys_ioctl+0x98/0x234 [ 855.626105][ T6600] invoke_syscall+0x6c/0x258 [ 855.626213][ T6600] el0_svc_common.constprop.0+0xac/0x230 [ 855.626417][ T6600] do_el0_svc_compat+0x40/0x68 [ 855.626532][ T6600] el0_svc_compat+0x4c/0x184 [ 855.626626][ T6600] el0t_32_sync_handler+0x88/0xac [ 855.626703][ T6600] el0t_32_sync+0x19c/0x1a0 [ 855.627600][ T6600] ERROR: Out of memory at tomoyo_realpath_from_path. [ 859.809312][ T6620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 859.917215][ T6620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.593748][ T30] audit: type=1400 audit(863.020:306): avc: denied { mounton } for pid=6639 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 863.684745][ T30] audit: type=1400 audit(863.100:307): avc: denied { execute } for pid=6638 comm="syz.2.1180" path="/186/freezer.self_freezing" dev="tmpfs" ino=979 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 864.343302][ T985] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 864.879211][ T985] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 865.061262][ T30] audit: type=1400 audit(864.480:308): avc: denied { create } for pid=6643 comm="syz.2.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 865.487998][ T985] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 865.993283][ T985] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 867.654419][ T30] audit: type=1400 audit(867.080:309): avc: denied { read } for pid=3162 comm="dhcpcd" name="n22" dev="tmpfs" ino=3613 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.671161][ T30] audit: type=1400 audit(867.090:310): avc: denied { open } for pid=3162 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=3613 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.701531][ T30] audit: type=1400 audit(867.100:311): avc: denied { getattr } for pid=3162 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=3613 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 869.017203][ T30] audit: type=1400 audit(868.440:312): avc: denied { map } for pid=6657 comm="syz.2.1184" path="socket:[15462]" dev="sockfs" ino=15462 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 869.103902][ T30] audit: type=1400 audit(868.530:313): avc: denied { write } for pid=6657 comm="syz.2.1184" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 871.326101][ T985] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 871.443008][ T985] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 871.546861][ T985] bond0 (unregistering): Released all slaves [ 872.372363][ T985] hsr_slave_0: left promiscuous mode [ 872.462710][ T985] hsr_slave_1: left promiscuous mode [ 872.904924][ T985] veth1_vlan: left promiscuous mode [ 872.907028][ T985] veth0_vlan: left promiscuous mode [ 875.330738][ T30] audit: type=1400 audit(874.730:314): avc: denied { create } for pid=6672 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 875.331669][ T30] audit: type=1400 audit(874.750:315): avc: denied { write } for pid=6672 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=3634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 875.332139][ T30] audit: type=1400 audit(874.750:316): avc: denied { append } for pid=6672 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=3634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.428495][ T30] audit: type=1400 audit(876.850:317): avc: denied { unlink } for pid=6679 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=3634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.462578][ T30] audit: type=1400 audit(880.890:318): avc: denied { bind } for pid=6684 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 881.474800][ T30] audit: type=1400 audit(880.900:319): avc: denied { getopt } for pid=6684 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 893.443783][ T6639] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 893.477511][ T6639] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 894.891923][ T30] audit: type=1400 audit(894.320:320): avc: denied { execute } for pid=6739 comm="syz.2.1197" path="/dev/mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 895.567977][ T6745] FAULT_INJECTION: forcing a failure. [ 895.567977][ T6745] name failslab, interval 1, probability 0, space 0, times 0 [ 895.621518][ T6745] CPU: 0 UID: 0 PID: 6745 Comm: syz.2.1198 Not tainted syzkaller #0 PREEMPT [ 895.621657][ T6745] Hardware name: linux,dummy-virt (DT) [ 895.621692][ T6745] Call trace: [ 895.621718][ T6745] show_stack+0x18/0x24 (C) [ 895.621805][ T6745] dump_stack_lvl+0xdc/0xf4 [ 895.621867][ T6745] dump_stack+0x1c/0x28 [ 895.621912][ T6745] should_fail_ex+0x5a0/0x6ac [ 895.621957][ T6745] should_failslab+0xbc/0x11c [ 895.622002][ T6745] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 [ 895.622047][ T6745] sock_alloc_inode+0x24/0x170 [ 895.622096][ T6745] alloc_inode+0x58/0x1b4 [ 895.622144][ T6745] sock_alloc+0x3c/0x238 [ 895.622187][ T6745] do_accept+0xdc/0x3e8 [ 895.622226][ T6745] __sys_accept4+0xc8/0x158 [ 895.622265][ T6745] __arm64_sys_accept4+0x88/0xcc [ 895.622304][ T6745] invoke_syscall+0x6c/0x258 [ 895.622348][ T6745] el0_svc_common.constprop.0+0xac/0x230 [ 895.622390][ T6745] do_el0_svc_compat+0x40/0x68 [ 895.622431][ T6745] el0_svc_compat+0x4c/0x184 [ 895.622476][ T6745] el0t_32_sync_handler+0x88/0xac [ 895.622518][ T6745] el0t_32_sync+0x19c/0x1a0 [ 901.742163][ T6639] hsr_slave_0: entered promiscuous mode [ 901.746926][ T6639] hsr_slave_1: entered promiscuous mode [ 901.758771][ T6639] debugfs: 'hsr0' already exists in 'hsr' [ 901.772330][ T6639] Cannot create hsr debugfs directory [ 909.495502][ T6639] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 909.527443][ T6639] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 909.617095][ T6639] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 909.697760][ T6639] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 915.784234][ T6639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 927.367853][ T6870] fuse: Unknown parameter 'grou00000000000000000000' [ 936.537411][ T6907] fuse: Unknown parameter 'grou00000000000000000000' [ 937.257856][ T6639] veth0_vlan: entered promiscuous mode [ 937.325297][ T6639] veth1_vlan: entered promiscuous mode [ 937.715767][ T6639] veth0_macvtap: entered promiscuous mode [ 937.896662][ T6639] veth1_macvtap: entered promiscuous mode [ 938.716971][ T54] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 938.728012][ T54] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 938.733752][ T54] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 938.735976][ T54] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 939.865383][ T30] audit: type=1400 audit(939.280:321): avc: denied { unmount } for pid=6639 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 943.855336][ T6924] fuse: Unknown parameter 'group_i00000000000000000000' [ 948.994593][ T6944] fuse: Unknown parameter 'group_i00000000000000000000' [ 954.935479][ T6965] fuse: Unknown parameter 'group_i00000000000000000000' [ 959.384665][ T6983] fuse: Unknown parameter 'group_id00000000000000000000' [ 964.785045][ T7002] fuse: Unknown parameter 'group_id00000000000000000000' [ 969.831622][ T7025] fuse: Unknown parameter 'group_id00000000000000000000' [ 974.468897][ T7044] fuse: Bad value for 'user_id' [ 974.469404][ T7044] fuse: Bad value for 'user_id' [ 976.637156][ T7051] FAULT_INJECTION: forcing a failure. [ 976.637156][ T7051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 976.638026][ T7051] CPU: 0 UID: 0 PID: 7051 Comm: syz.2.1280 Not tainted syzkaller #0 PREEMPT [ 976.638161][ T7051] Hardware name: linux,dummy-virt (DT) [ 976.638303][ T7051] Call trace: [ 976.638376][ T7051] show_stack+0x18/0x24 (C) [ 976.638560][ T7051] dump_stack_lvl+0xdc/0xf4 [ 976.638674][ T7051] dump_stack+0x1c/0x28 [ 976.638822][ T7051] should_fail_ex+0x5a0/0x6ac [ 976.638923][ T7051] should_fail+0x14/0x20 [ 976.639091][ T7051] should_fail_usercopy+0x1c/0x28 [ 976.639332][ T7051] _inline_copy_from_user+0x34/0x134 [ 976.640040][ T7051] get_compat_msghdr+0x90/0x118 [ 976.640678][ T7051] ___sys_sendmsg+0x184/0x19c [ 976.640820][ T7051] __sys_sendmsg+0x114/0x19c [ 976.640918][ T7051] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 976.641018][ T7051] invoke_syscall+0x6c/0x258 [ 976.641110][ T7051] el0_svc_common.constprop.0+0xac/0x230 [ 976.641204][ T7051] do_el0_svc_compat+0x40/0x68 [ 976.641294][ T7051] el0_svc_compat+0x4c/0x184 [ 976.641386][ T7051] el0t_32_sync_handler+0x88/0xac [ 976.641504][ T7051] el0t_32_sync+0x19c/0x1a0 [ 979.246252][ T7063] fuse: Bad value for 'user_id' [ 979.247151][ T7063] fuse: Bad value for 'user_id' [ 982.766223][ T7079] fuse: Bad value for 'user_id' [ 982.770433][ T7079] fuse: Bad value for 'user_id' [ 986.273592][ T7094] FAULT_INJECTION: forcing a failure. [ 986.273592][ T7094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.277172][ T7094] CPU: 1 UID: 0 PID: 7094 Comm: syz.2.1300 Not tainted syzkaller #0 PREEMPT [ 986.277297][ T7094] Hardware name: linux,dummy-virt (DT) [ 986.277332][ T7094] Call trace: [ 986.277371][ T7094] show_stack+0x18/0x24 (C) [ 986.277527][ T7094] dump_stack_lvl+0xdc/0xf4 [ 986.277620][ T7094] dump_stack+0x1c/0x28 [ 986.277703][ T7094] should_fail_ex+0x5a0/0x6ac [ 986.277798][ T7094] should_fail+0x14/0x20 [ 986.277897][ T7094] should_fail_usercopy+0x1c/0x28 [ 986.277985][ T7094] simple_read_from_buffer+0x84/0x214 [ 986.278087][ T7094] proc_fail_nth_read+0x160/0x21c [ 986.278147][ T7094] vfs_read+0x18c/0xa28 [ 986.278198][ T7094] ksys_read+0xec/0x1d8 [ 986.278336][ T7094] __arm64_sys_read+0x6c/0x9c [ 986.278390][ T7094] invoke_syscall+0x6c/0x258 [ 986.278438][ T7094] el0_svc_common.constprop.0+0xac/0x230 [ 986.278480][ T7094] do_el0_svc_compat+0x40/0x68 [ 986.278522][ T7094] el0_svc_compat+0x4c/0x184 [ 986.278569][ T7094] el0t_32_sync_handler+0x88/0xac [ 986.278614][ T7094] el0t_32_sync+0x19c/0x1a0 [ 986.983217][ T7099] fuse: Bad value for 'fd' [ 990.224531][ T7111] netlink: 14 bytes leftover after parsing attributes in process `syz.2.1306'. [ 991.443374][ T7111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7111 comm=syz.2.1306 [ 992.797770][ T7123] fuse: Bad value for 'fd' [ 998.473162][ T7148] fuse: Bad value for 'fd' [ 999.448977][ T7154] FAULT_INJECTION: forcing a failure. [ 999.448977][ T7154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 999.463834][ T7154] CPU: 0 UID: 0 PID: 7154 Comm: syz.0.1321 Not tainted syzkaller #0 PREEMPT [ 999.463956][ T7154] Hardware name: linux,dummy-virt (DT) [ 999.463994][ T7154] Call trace: [ 999.464021][ T7154] show_stack+0x18/0x24 (C) [ 999.464137][ T7154] dump_stack_lvl+0xdc/0xf4 [ 999.464193][ T7154] dump_stack+0x1c/0x28 [ 999.464239][ T7154] should_fail_ex+0x5a0/0x6ac [ 999.464285][ T7154] should_fail+0x14/0x20 [ 999.464326][ T7154] should_fail_usercopy+0x1c/0x28 [ 999.464367][ T7154] _inline_copy_from_user+0x34/0x134 [ 999.464450][ T7154] get_compat_msghdr+0x90/0x118 [ 999.464525][ T7154] ___sys_sendmsg+0x184/0x19c [ 999.464572][ T7154] __sys_sendmsg+0x114/0x19c [ 999.464679][ T7154] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 999.464733][ T7154] invoke_syscall+0x6c/0x258 [ 999.464788][ T7154] el0_svc_common.constprop.0+0xac/0x230 [ 999.464851][ T7154] do_el0_svc_compat+0x40/0x68 [ 999.464945][ T7154] el0_svc_compat+0x4c/0x184 [ 999.465110][ T7154] el0t_32_sync_handler+0x88/0xac [ 999.465226][ T7154] el0t_32_sync+0x19c/0x1a0 [ 1002.002630][ T30] audit: type=1400 audit(1001.430:322): avc: denied { ioctl } for pid=7165 comm="syz.2.1325" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x9424 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1003.671343][ T30] audit: type=1400 audit(1003.100:323): avc: denied { ioctl } for pid=7170 comm="syz.2.1328" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1003.682261][ T30] audit: type=1400 audit(1003.100:324): avc: denied { set_context_mgr } for pid=7170 comm="syz.2.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1003.728331][ T30] audit: type=1400 audit(1003.150:325): avc: denied { map } for pid=7170 comm="syz.2.1328" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1003.748484][ T7171] binder: 7170:7171 BC_REQUEST_DEATH_NOTIFICATION invalid ref 2 [ 1003.753586][ T7171] binder: 7170:7171 ERROR: BC_REGISTER_LOOPER called without request [ 1003.755795][ T7171] binder: 7170:7171 got reply transaction with no transaction stack [ 1003.762239][ T7171] binder: 7170:7171 transaction reply to 0:0 failed 3/29201/-71, code 0 size 88-24 line 3054 [ 1003.767925][ T7171] binder: 7170:7171 ioctl 7001 0 returned -22 [ 1003.778964][ T7171] binder: 7170:7171 ioctl c0109414 20000680 returned -22 [ 1003.835610][ T3462] binder: undelivered TRANSACTION_ERROR: 29201 [ 1004.133695][ T7164] FAULT_INJECTION: forcing a failure. [ 1004.133695][ T7164] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1004.136630][ T7164] CPU: 1 UID: 0 PID: 7164 Comm: syz.0.1326 Not tainted syzkaller #0 PREEMPT [ 1004.136717][ T7164] Hardware name: linux,dummy-virt (DT) [ 1004.136751][ T7164] Call trace: [ 1004.136781][ T7164] show_stack+0x18/0x24 (C) [ 1004.136874][ T7164] dump_stack_lvl+0xdc/0xf4 [ 1004.136930][ T7164] dump_stack+0x1c/0x28 [ 1004.136977][ T7164] should_fail_ex+0x5a0/0x6ac [ 1004.137025][ T7164] should_fail_alloc_page+0x70/0xb8 [ 1004.137074][ T7164] prepare_alloc_pages+0x1a8/0x560 [ 1004.137131][ T7164] __alloc_frozen_pages_noprof+0x144/0x1f20 [ 1004.137176][ T7164] alloc_pages_mpol+0xfc/0x400 [ 1004.137220][ T7164] alloc_frozen_pages_noprof+0x178/0x1ec [ 1004.137263][ T7164] alloc_pages_noprof+0x14/0x114 [ 1004.137303][ T7164] anon_pipe_write+0x798/0x12bc [ 1004.137348][ T7164] vfs_write+0x7bc/0xb88 [ 1004.137391][ T7164] ksys_write+0x18c/0x1d8 [ 1004.137433][ T7164] __arm64_sys_write+0x6c/0x9c [ 1004.137474][ T7164] invoke_syscall+0x6c/0x258 [ 1004.137517][ T7164] el0_svc_common.constprop.0+0xac/0x230 [ 1004.137559][ T7164] do_el0_svc_compat+0x40/0x68 [ 1004.137600][ T7164] el0_svc_compat+0x4c/0x184 [ 1004.137645][ T7164] el0t_32_sync_handler+0x88/0xac [ 1004.137687][ T7164] el0t_32_sync+0x19c/0x1a0 [ 1004.203746][ T7173] fuse: Bad value for 'fd' [ 1004.595128][ T30] audit: type=1400 audit(1004.020:326): avc: denied { setopt } for pid=7174 comm="syz.0.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1004.605470][ T30] audit: type=1400 audit(1004.030:327): avc: denied { setopt } for pid=7174 comm="syz.0.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1005.437971][ T30] audit: type=1400 audit(1004.860:328): avc: denied { relabelfrom } for pid=7177 comm="syz.0.1331" name="NETLINK" dev="sockfs" ino=17441 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1005.469103][ T7179] SELinux: Context system_u:object_r:kmsg_device_t:s0 is not valid (left unmapped). [ 1005.477354][ T30] audit: type=1400 audit(1004.900:329): avc: denied { relabelto } for pid=7177 comm="syz.0.1331" name="NETLINK" dev="sockfs" ino=17441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_generic_socket permissive=1 trawcon="system_u:object_r:kmsg_device_t:s0" [ 1009.434898][ T30] audit: type=1400 audit(1008.840:330): avc: denied { ioctl } for pid=7190 comm="syz.0.1334" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x54a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1009.874244][ T7193] trusted_key: syz.2.1335 sent an empty control message without MSG_MORE. [ 1010.446017][ T7194] fuse: Bad value for 'rootmode' [ 1012.984572][ T7199] fuse: Bad value for 'fd' [ 1014.644317][ T7204] FAULT_INJECTION: forcing a failure. [ 1014.644317][ T7204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1014.647483][ T7204] CPU: 1 UID: 0 PID: 7204 Comm: syz.0.1339 Not tainted syzkaller #0 PREEMPT [ 1014.647650][ T7204] Hardware name: linux,dummy-virt (DT) [ 1014.647719][ T7204] Call trace: [ 1014.647780][ T7204] show_stack+0x18/0x24 (C) [ 1014.647939][ T7204] dump_stack_lvl+0xdc/0xf4 [ 1014.648048][ T7204] dump_stack+0x1c/0x28 [ 1014.648151][ T7204] should_fail_ex+0x5a0/0x6ac [ 1014.648245][ T7204] should_fail+0x14/0x20 [ 1014.648331][ T7204] should_fail_usercopy+0x1c/0x28 [ 1014.648453][ T7204] _inline_copy_from_user+0x34/0x134 [ 1014.648581][ T7204] get_compat_msghdr+0x90/0x118 [ 1014.648682][ T7204] ___sys_sendmsg+0x184/0x19c [ 1014.648779][ T7204] __sys_sendmsg+0x114/0x19c [ 1014.648883][ T7204] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1014.649052][ T7204] invoke_syscall+0x6c/0x258 [ 1014.649171][ T7204] el0_svc_common.constprop.0+0xac/0x230 [ 1014.649264][ T7204] do_el0_svc_compat+0x40/0x68 [ 1014.649354][ T7204] el0_svc_compat+0x4c/0x184 [ 1014.649456][ T7204] el0t_32_sync_handler+0x88/0xac [ 1014.649579][ T7204] el0t_32_sync+0x19c/0x1a0 [ 1019.366907][ T7222] FAULT_INJECTION: forcing a failure. [ 1019.366907][ T7222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1019.367401][ T7222] CPU: 0 UID: 0 PID: 7222 Comm: syz.0.1346 Not tainted syzkaller #0 PREEMPT [ 1019.367465][ T7222] Hardware name: linux,dummy-virt (DT) [ 1019.367501][ T7222] Call trace: [ 1019.367531][ T7222] show_stack+0x18/0x24 (C) [ 1019.367610][ T7222] dump_stack_lvl+0xdc/0xf4 [ 1019.367664][ T7222] dump_stack+0x1c/0x28 [ 1019.367709][ T7222] should_fail_ex+0x5a0/0x6ac [ 1019.367754][ T7222] should_fail+0x14/0x20 [ 1019.367794][ T7222] should_fail_usercopy+0x1c/0x28 [ 1019.367839][ T7222] simple_read_from_buffer+0x84/0x214 [ 1019.367887][ T7222] proc_fail_nth_read+0x160/0x21c [ 1019.367982][ T7222] vfs_read+0x18c/0xa28 [ 1019.368125][ T7222] ksys_read+0xec/0x1d8 [ 1019.368171][ T7222] __arm64_sys_read+0x6c/0x9c [ 1019.368258][ T7222] invoke_syscall+0x6c/0x258 [ 1019.368401][ T7222] el0_svc_common.constprop.0+0xac/0x230 [ 1019.368556][ T7222] do_el0_svc_compat+0x40/0x68 [ 1019.368614][ T7222] el0_svc_compat+0x4c/0x184 [ 1019.368665][ T7222] el0t_32_sync_handler+0x88/0xac [ 1019.368754][ T7222] el0t_32_sync+0x19c/0x1a0 [ 1019.598069][ T7223] fuse: Bad value for 'fd' [ 1020.584733][ T4201] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1021.031630][ T4201] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 1021.032729][ T4201] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1021.032909][ T4201] usb 1-1: Product: syz [ 1021.033022][ T4201] usb 1-1: Manufacturer: syz [ 1021.033135][ T4201] usb 1-1: SerialNumber: syz [ 1021.819308][ T7225] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1021.916398][ T7225] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1022.445564][ T7225] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1022.469137][ T7225] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1023.144247][ T4201] rtl8150 1-1:1.0: eth5: rtl8150 is detected [ 1023.318851][ T3462] usb 1-1: USB disconnect, device number 5 [ 1024.383103][ T6786] udevd[6786]: setting mode of /dev/bus/usb/001/005 to 020664 failed: No such file or directory [ 1024.394456][ T6786] udevd[6786]: setting owner of /dev/bus/usb/001/005 to uid=0, gid=0 failed: No such file or directory [ 1026.283670][ T7242] fuse: Invalid rootmode [ 1030.697372][ T7253] FAULT_INJECTION: forcing a failure. [ 1030.697372][ T7253] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.698269][ T7253] CPU: 0 UID: 0 PID: 7253 Comm: syz.0.1356 Not tainted syzkaller #0 PREEMPT [ 1030.698405][ T7253] Hardware name: linux,dummy-virt (DT) [ 1030.698477][ T7253] Call trace: [ 1030.698534][ T7253] show_stack+0x18/0x24 (C) [ 1030.698786][ T7253] dump_stack_lvl+0xdc/0xf4 [ 1030.699004][ T7253] dump_stack+0x1c/0x28 [ 1030.699208][ T7253] should_fail_ex+0x5a0/0x6ac [ 1030.699530][ T7253] should_failslab+0xbc/0x11c [ 1030.699792][ T7253] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1030.700002][ T7253] security_file_alloc+0x28/0x1ec [ 1030.700203][ T7253] init_file+0x8c/0x40c [ 1030.700352][ T7253] alloc_empty_file+0x70/0x16c [ 1030.700473][ T7253] path_openat+0xd0/0x24b4 [ 1030.700572][ T7253] do_filp_open+0x184/0x360 [ 1030.700695][ T7253] do_sys_openat2+0xe0/0x160 [ 1030.700875][ T7253] __arm64_compat_sys_open+0x10c/0x194 [ 1030.700977][ T7253] invoke_syscall+0x6c/0x258 [ 1030.701074][ T7253] el0_svc_common.constprop.0+0xac/0x230 [ 1030.701169][ T7253] do_el0_svc_compat+0x40/0x68 [ 1030.701263][ T7253] el0_svc_compat+0x4c/0x184 [ 1030.701362][ T7253] el0t_32_sync_handler+0x88/0xac [ 1030.701456][ T7253] el0t_32_sync+0x19c/0x1a0 [ 1031.602932][ T7257] fuse: Invalid rootmode [ 1031.644413][ T30] audit: type=1400 audit(1031.070:331): avc: denied { read } for pid=7254 comm="syz.0.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1033.958476][ T7266] FAULT_INJECTION: forcing a failure. [ 1033.958476][ T7266] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.982195][ T7266] CPU: 0 UID: 0 PID: 7266 Comm: syz.0.1362 Not tainted syzkaller #0 PREEMPT [ 1033.982461][ T7266] Hardware name: linux,dummy-virt (DT) [ 1033.982535][ T7266] Call trace: [ 1033.982594][ T7266] show_stack+0x18/0x24 (C) [ 1033.982794][ T7266] dump_stack_lvl+0xdc/0xf4 [ 1033.982914][ T7266] dump_stack+0x1c/0x28 [ 1033.983013][ T7266] should_fail_ex+0x5a0/0x6ac [ 1033.983192][ T7266] should_failslab+0xbc/0x11c [ 1033.983326][ T7266] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1033.983424][ T7266] getname_flags.part.0+0x48/0x3d4 [ 1033.983582][ T7266] getname_flags+0x78/0xc4 [ 1033.983682][ T7266] do_sys_openat2+0xa4/0x160 [ 1033.983783][ T7266] __arm64_compat_sys_openat+0x128/0x1b8 [ 1033.983891][ T7266] invoke_syscall+0x6c/0x258 [ 1033.983985][ T7266] el0_svc_common.constprop.0+0xac/0x230 [ 1033.984091][ T7266] do_el0_svc_compat+0x40/0x68 [ 1033.984186][ T7266] el0_svc_compat+0x4c/0x184 [ 1033.984285][ T7266] el0t_32_sync_handler+0x88/0xac [ 1033.984378][ T7266] el0t_32_sync+0x19c/0x1a0 [ 1037.384956][ T30] audit: type=1400 audit(1036.810:332): avc: denied { ioctl } for pid=7276 comm="syz.2.1367" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1038.771495][ T7284] fuse: Invalid rootmode [ 1043.063450][ T7294] FAULT_INJECTION: forcing a failure. [ 1043.063450][ T7294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1043.066456][ T7294] CPU: 0 UID: 0 PID: 7294 Comm: syz.0.1372 Not tainted syzkaller #0 PREEMPT [ 1043.066629][ T7294] Hardware name: linux,dummy-virt (DT) [ 1043.066682][ T7294] Call trace: [ 1043.066725][ T7294] show_stack+0x18/0x24 (C) [ 1043.066868][ T7294] dump_stack_lvl+0xdc/0xf4 [ 1043.066954][ T7294] dump_stack+0x1c/0x28 [ 1043.067029][ T7294] should_fail_ex+0x5a0/0x6ac [ 1043.067106][ T7294] should_fail+0x14/0x20 [ 1043.067173][ T7294] should_fail_usercopy+0x1c/0x28 [ 1043.067239][ T7294] _inline_copy_from_user+0x34/0x12c [ 1043.067317][ T7294] kstrtouint_from_user+0xb8/0x180 [ 1043.067391][ T7294] proc_fail_nth_write+0x8c/0x1f0 [ 1043.067471][ T7294] vfs_write+0x1d8/0xb88 [ 1043.067545][ T7294] ksys_write+0xec/0x1d8 [ 1043.067615][ T7294] __arm64_sys_write+0x6c/0x9c [ 1043.067686][ T7294] invoke_syscall+0x6c/0x258 [ 1043.067764][ T7294] el0_svc_common.constprop.0+0xac/0x230 [ 1043.067843][ T7294] do_el0_svc_compat+0x40/0x68 [ 1043.067912][ T7294] el0_svc_compat+0x4c/0x184 [ 1043.067986][ T7294] el0t_32_sync_handler+0x88/0xac [ 1043.068059][ T7294] el0t_32_sync+0x19c/0x1a0 [ 1043.171460][ T7296] FAULT_INJECTION: forcing a failure. [ 1043.171460][ T7296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1043.171859][ T7296] CPU: 1 UID: 0 PID: 7296 Comm: syz.2.1373 Not tainted syzkaller #0 PREEMPT [ 1043.171929][ T7296] Hardware name: linux,dummy-virt (DT) [ 1043.171961][ T7296] Call trace: [ 1043.171987][ T7296] show_stack+0x18/0x24 (C) [ 1043.172065][ T7296] dump_stack_lvl+0xdc/0xf4 [ 1043.172119][ T7296] dump_stack+0x1c/0x28 [ 1043.172164][ T7296] should_fail_ex+0x5a0/0x6ac [ 1043.172208][ T7296] should_fail+0x14/0x20 [ 1043.172248][ T7296] should_fail_usercopy+0x1c/0x28 [ 1043.172289][ T7296] simple_read_from_buffer+0x84/0x214 [ 1043.172377][ T7296] proc_fail_nth_read+0x160/0x21c [ 1043.172520][ T7296] vfs_read+0x18c/0xa28 [ 1043.172598][ T7296] ksys_read+0xec/0x1d8 [ 1043.172746][ T7296] __arm64_sys_read+0x6c/0x9c [ 1043.172986][ T7296] invoke_syscall+0x6c/0x258 [ 1043.173114][ T7296] el0_svc_common.constprop.0+0xac/0x230 [ 1043.173436][ T7296] do_el0_svc_compat+0x40/0x68 [ 1043.173612][ T7296] el0_svc_compat+0x4c/0x184 [ 1043.173801][ T7296] el0t_32_sync_handler+0x88/0xac [ 1043.173928][ T7296] el0t_32_sync+0x19c/0x1a0 [ 1043.834727][ T7299] fuse: Unknown parameter '00000000000000000000' [ 1048.611341][ T3462] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1048.771460][ T3462] usb 1-1: device descriptor read/64, error -71 [ 1048.806949][ T7314] fuse: Unknown parameter '00000000000000000000' [ 1049.103055][ T3462] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1049.322573][ T3462] usb 1-1: device descriptor read/64, error -71 [ 1049.438331][ T3462] usb usb1-port1: attempt power cycle [ 1049.840788][ T3462] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 1049.870722][ T3462] usb 1-1: device descriptor read/8, error -71 [ 1050.121066][ T3462] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 1050.148587][ T3462] usb 1-1: device descriptor read/8, error -71 [ 1050.265719][ T3462] usb usb1-port1: unable to enumerate USB device [ 1052.797954][ T30] audit: type=1400 audit(1052.220:333): avc: denied { write } for pid=7316 comm="syz.2.1381" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1057.114224][ T7327] fuse: Unknown parameter '00000000000000000000' [ 1069.177723][ T7363] FAULT_INJECTION: forcing a failure. [ 1069.177723][ T7363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1069.223243][ T7363] CPU: 1 UID: 0 PID: 7363 Comm: syz.0.1397 Not tainted syzkaller #0 PREEMPT [ 1069.223496][ T7363] Hardware name: linux,dummy-virt (DT) [ 1069.223565][ T7363] Call trace: [ 1069.223621][ T7363] show_stack+0x18/0x24 (C) [ 1069.223784][ T7363] dump_stack_lvl+0xdc/0xf4 [ 1069.223893][ T7363] dump_stack+0x1c/0x28 [ 1069.223984][ T7363] should_fail_ex+0x5a0/0x6ac [ 1069.224077][ T7363] should_fail+0x14/0x20 [ 1069.224179][ T7363] should_fail_usercopy+0x1c/0x28 [ 1069.224266][ T7363] simple_read_from_buffer+0x84/0x214 [ 1069.224364][ T7363] proc_fail_nth_read+0x160/0x21c [ 1069.224510][ T7363] vfs_read+0x18c/0xa28 [ 1069.224611][ T7363] ksys_read+0xec/0x1d8 [ 1069.224701][ T7363] __arm64_sys_read+0x6c/0x9c [ 1069.224804][ T7363] invoke_syscall+0x6c/0x258 [ 1069.224917][ T7363] el0_svc_common.constprop.0+0xac/0x230 [ 1069.225010][ T7363] do_el0_svc_compat+0x40/0x68 [ 1069.225125][ T7363] el0_svc_compat+0x4c/0x184 [ 1069.225235][ T7363] el0t_32_sync_handler+0x88/0xac [ 1069.225329][ T7363] el0t_32_sync+0x19c/0x1a0 [ 1069.628280][ T30] audit: type=1400 audit(1069.050:334): avc: denied { ioctl } for pid=7364 comm="syz.0.1399" path="socket:[17757]" dev="sockfs" ino=17757 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1072.647463][ T7375] FAULT_INJECTION: forcing a failure. [ 1072.647463][ T7375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1072.663045][ T7375] CPU: 0 UID: 0 PID: 7375 Comm: syz.0.1403 Not tainted syzkaller #0 PREEMPT [ 1072.663316][ T7375] Hardware name: linux,dummy-virt (DT) [ 1072.663389][ T7375] Call trace: [ 1072.663449][ T7375] show_stack+0x18/0x24 (C) [ 1072.663714][ T7375] dump_stack_lvl+0xdc/0xf4 [ 1072.663829][ T7375] dump_stack+0x1c/0x28 [ 1072.663928][ T7375] should_fail_ex+0x5a0/0x6ac [ 1072.664029][ T7375] should_fail+0x14/0x20 [ 1072.664126][ T7375] should_fail_usercopy+0x1c/0x28 [ 1072.664217][ T7375] strncpy_from_user+0x34/0x2d8 [ 1072.664318][ T7375] getname_flags.part.0+0x7c/0x3d4 [ 1072.664455][ T7375] getname_flags+0x78/0xc4 [ 1072.664558][ T7375] user_path_at+0x2c/0x70 [ 1072.664653][ T7375] bpf_obj_get_user+0x9c/0x32c [ 1072.664760][ T7375] __sys_bpf+0x1368/0x29c8 [ 1072.664870][ T7375] __arm64_sys_bpf+0x70/0xa4 [ 1072.664971][ T7375] invoke_syscall+0x6c/0x258 [ 1072.665071][ T7375] el0_svc_common.constprop.0+0xac/0x230 [ 1072.665170][ T7375] do_el0_svc_compat+0x40/0x68 [ 1072.665267][ T7375] el0_svc_compat+0x4c/0x184 [ 1072.665372][ T7375] el0t_32_sync_handler+0x88/0xac [ 1072.665480][ T7375] el0t_32_sync+0x19c/0x1a0 [ 1073.296908][ T7377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7377 comm=syz.0.1404 [ 1076.039037][ T7394] fuse: Unknown parameter 'user00000000000000000000' [ 1080.291093][ T30] audit: type=1400 audit(1079.700:335): avc: denied { bind } for pid=7402 comm="syz.0.1415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1080.517709][ T30] audit: type=1400 audit(1079.940:336): avc: denied { accept } for pid=7402 comm="syz.0.1415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1081.778767][ T7407] FAULT_INJECTION: forcing a failure. [ 1081.778767][ T7407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1081.868049][ T7409] fuse: Unknown parameter 'user_i00000000000000000000' [ 1081.877946][ T7407] CPU: 1 UID: 0 PID: 7407 Comm: syz.2.1416 Not tainted syzkaller #0 PREEMPT [ 1081.878219][ T7407] Hardware name: linux,dummy-virt (DT) [ 1081.878303][ T7407] Call trace: [ 1081.878370][ T7407] show_stack+0x18/0x24 (C) [ 1081.878549][ T7407] dump_stack_lvl+0xdc/0xf4 [ 1081.878670][ T7407] dump_stack+0x1c/0x28 [ 1081.878763][ T7407] should_fail_ex+0x5a0/0x6ac [ 1081.878869][ T7407] should_fail+0x14/0x20 [ 1081.878957][ T7407] should_fail_usercopy+0x1c/0x28 [ 1081.879048][ T7407] _copy_from_iter+0x178/0x1020 [ 1081.879156][ T7407] netlink_sendmsg+0x5e8/0xa54 [ 1081.879254][ T7407] __sock_sendmsg+0xc8/0x168 [ 1081.879356][ T7407] __sys_sendto+0x1d8/0x270 [ 1081.879443][ T7407] __arm64_sys_sendto+0xc0/0x134 [ 1081.879592][ T7407] invoke_syscall+0x6c/0x258 [ 1081.879699][ T7407] el0_svc_common.constprop.0+0xac/0x230 [ 1081.879797][ T7407] do_el0_svc_compat+0x40/0x68 [ 1081.879898][ T7407] el0_svc_compat+0x4c/0x184 [ 1081.879998][ T7407] el0t_32_sync_handler+0x88/0xac [ 1081.880089][ T7407] el0t_32_sync+0x19c/0x1a0 [ 1083.386216][ T7412] FAULT_INJECTION: forcing a failure. [ 1083.386216][ T7412] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1083.386931][ T7412] CPU: 1 UID: 0 PID: 7412 Comm: syz.2.1419 Not tainted syzkaller #0 PREEMPT [ 1083.387063][ T7412] Hardware name: linux,dummy-virt (DT) [ 1083.387132][ T7412] Call trace: [ 1083.387192][ T7412] show_stack+0x18/0x24 (C) [ 1083.387353][ T7412] dump_stack_lvl+0xdc/0xf4 [ 1083.387856][ T7412] dump_stack+0x1c/0x28 [ 1083.388097][ T7412] should_fail_ex+0x5a0/0x6ac [ 1083.388308][ T7412] should_fail+0x14/0x20 [ 1083.388641][ T7412] should_fail_usercopy+0x1c/0x28 [ 1083.388740][ T7412] _inline_copy_from_user+0x34/0x134 [ 1083.388997][ T7412] get_compat_msghdr+0x90/0x118 [ 1083.389249][ T7412] ___sys_sendmsg+0x184/0x19c [ 1083.389414][ T7412] __sys_sendmsg+0x114/0x19c [ 1083.389892][ T7412] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1083.389995][ T7412] invoke_syscall+0x6c/0x258 [ 1083.390101][ T7412] el0_svc_common.constprop.0+0xac/0x230 [ 1083.390197][ T7412] do_el0_svc_compat+0x40/0x68 [ 1083.390285][ T7412] el0_svc_compat+0x4c/0x184 [ 1083.390373][ T7412] el0t_32_sync_handler+0x88/0xac [ 1083.390463][ T7412] el0t_32_sync+0x19c/0x1a0 [ 1085.104655][ T30] audit: type=1400 audit(1084.530:337): avc: denied { connect } for pid=7413 comm="syz.2.1420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1086.822791][ T7424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7424 comm=syz.0.1424 [ 1086.936303][ T7424] netlink: 11 bytes leftover after parsing attributes in process `syz.0.1424'. [ 1089.247022][ T7431] FAULT_INJECTION: forcing a failure. [ 1089.247022][ T7431] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.247857][ T7431] CPU: 1 UID: 0 PID: 7431 Comm: syz.0.1426 Not tainted syzkaller #0 PREEMPT [ 1089.247981][ T7431] Hardware name: linux,dummy-virt (DT) [ 1089.248049][ T7431] Call trace: [ 1089.248115][ T7431] show_stack+0x18/0x24 (C) [ 1089.248273][ T7431] dump_stack_lvl+0xdc/0xf4 [ 1089.248515][ T7431] dump_stack+0x1c/0x28 [ 1089.248683][ T7431] should_fail_ex+0x5a0/0x6ac [ 1089.248847][ T7431] should_failslab+0xbc/0x11c [ 1089.249063][ T7431] __kmalloc_noprof+0xd0/0x4d0 [ 1089.249172][ T7431] tomoyo_realpath_from_path+0x90/0x534 [ 1089.249271][ T7431] tomoyo_path_number_perm+0x200/0x438 [ 1089.249387][ T7431] tomoyo_file_ioctl+0x1c/0x28 [ 1089.249712][ T7431] security_file_ioctl_compat+0x8c/0x19c [ 1089.249849][ T7431] __arm64_compat_sys_ioctl+0x98/0x234 [ 1089.249957][ T7431] invoke_syscall+0x6c/0x258 [ 1089.250055][ T7431] el0_svc_common.constprop.0+0xac/0x230 [ 1089.250154][ T7431] do_el0_svc_compat+0x40/0x68 [ 1089.250251][ T7431] el0_svc_compat+0x4c/0x184 [ 1089.250358][ T7431] el0t_32_sync_handler+0x88/0xac [ 1089.250453][ T7431] el0t_32_sync+0x19c/0x1a0 [ 1089.332363][ T7431] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1094.745003][ T7453] FAULT_INJECTION: forcing a failure. [ 1094.745003][ T7453] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.745872][ T7453] CPU: 1 UID: 0 PID: 7453 Comm: syz.2.1433 Not tainted syzkaller #0 PREEMPT [ 1094.746008][ T7453] Hardware name: linux,dummy-virt (DT) [ 1094.746076][ T7453] Call trace: [ 1094.746135][ T7453] show_stack+0x18/0x24 (C) [ 1094.746294][ T7453] dump_stack_lvl+0xdc/0xf4 [ 1094.746409][ T7453] dump_stack+0x1c/0x28 [ 1094.746607][ T7453] should_fail_ex+0x5a0/0x6ac [ 1094.746921][ T7453] should_failslab+0xbc/0x11c [ 1094.747105][ T7453] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1094.747277][ T7453] alloc_empty_file+0x5c/0x16c [ 1094.747394][ T7453] path_openat+0xd0/0x24b4 [ 1094.747502][ T7453] do_filp_open+0x184/0x360 [ 1094.747736][ T7453] do_sys_openat2+0xe0/0x160 [ 1094.747848][ T7453] __arm64_compat_sys_openat+0x128/0x1b8 [ 1094.747948][ T7453] invoke_syscall+0x6c/0x258 [ 1094.748089][ T7453] el0_svc_common.constprop.0+0xac/0x230 [ 1094.748362][ T7453] do_el0_svc_compat+0x40/0x68 [ 1094.748760][ T7453] el0_svc_compat+0x4c/0x184 [ 1094.749002][ T7453] el0t_32_sync_handler+0x88/0xac [ 1094.749120][ T7453] el0t_32_sync+0x19c/0x1a0 [ 1095.716747][ T7455] FAULT_INJECTION: forcing a failure. [ 1095.716747][ T7455] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.721786][ T7455] CPU: 0 UID: 0 PID: 7455 Comm: syz.0.1435 Not tainted syzkaller #0 PREEMPT [ 1095.721917][ T7455] Hardware name: linux,dummy-virt (DT) [ 1095.721952][ T7455] Call trace: [ 1095.721979][ T7455] show_stack+0x18/0x24 (C) [ 1095.722063][ T7455] dump_stack_lvl+0xdc/0xf4 [ 1095.722129][ T7455] dump_stack+0x1c/0x28 [ 1095.722173][ T7455] should_fail_ex+0x5a0/0x6ac [ 1095.722220][ T7455] should_failslab+0xbc/0x11c [ 1095.722269][ T7455] __kmalloc_cache_noprof+0x74/0x3d0 [ 1095.722316][ T7455] fuse_alloc_forget+0x40/0x54 [ 1095.722363][ T7455] fuse_lookup_name+0x154/0x630 [ 1095.722407][ T7455] fuse_lookup+0x190/0x394 [ 1095.722450][ T7455] lookup_one_qstr_excl+0x13c/0x19c [ 1095.722500][ T7455] do_rmdir+0x1bc/0x2c0 [ 1095.722551][ T7455] __arm64_sys_rmdir+0x98/0xfc [ 1095.722602][ T7455] invoke_syscall+0x6c/0x258 [ 1095.722647][ T7455] el0_svc_common.constprop.0+0xac/0x230 [ 1095.722690][ T7455] do_el0_svc_compat+0x40/0x68 [ 1095.722733][ T7455] el0_svc_compat+0x4c/0x184 [ 1095.722779][ T7455] el0t_32_sync_handler+0x88/0xac [ 1095.722822][ T7455] el0t_32_sync+0x19c/0x1a0 [ 1099.927618][ T7464] FAULT_INJECTION: forcing a failure. [ 1099.927618][ T7464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1099.967799][ T7464] CPU: 0 UID: 0 PID: 7464 Comm: syz.2.1439 Not tainted syzkaller #0 PREEMPT [ 1099.968012][ T7464] Hardware name: linux,dummy-virt (DT) [ 1099.968085][ T7464] Call trace: [ 1099.968139][ T7464] show_stack+0x18/0x24 (C) [ 1099.968226][ T7464] dump_stack_lvl+0xdc/0xf4 [ 1099.968280][ T7464] dump_stack+0x1c/0x28 [ 1099.968324][ T7464] should_fail_ex+0x5a0/0x6ac [ 1099.968372][ T7464] should_fail+0x14/0x20 [ 1099.968411][ T7464] should_fail_usercopy+0x1c/0x28 [ 1099.968539][ T7464] _inline_copy_from_user+0x34/0x134 [ 1099.968640][ T7464] get_compat_msghdr+0x90/0x118 [ 1099.968685][ T7464] ___sys_sendmsg+0x184/0x19c [ 1099.968731][ T7464] __sys_sendmsg+0x114/0x19c [ 1099.968771][ T7464] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1099.968813][ T7464] invoke_syscall+0x6c/0x258 [ 1099.968860][ T7464] el0_svc_common.constprop.0+0xac/0x230 [ 1099.968903][ T7464] do_el0_svc_compat+0x40/0x68 [ 1099.968944][ T7464] el0_svc_compat+0x4c/0x184 [ 1099.968992][ T7464] el0t_32_sync_handler+0x88/0xac [ 1099.969036][ T7464] el0t_32_sync+0x19c/0x1a0 [ 1100.993435][ T7466] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2049 sclass=netlink_tcpdiag_socket pid=7466 comm=syz.0.1440 [ 1103.122112][ T30] audit: type=1400 audit(1102.550:338): avc: denied { getopt } for pid=7471 comm="syz.2.1443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1106.543376][ T7479] could not allocate digest TFM handle sha1-ssse3 [ 1109.973338][ T7493] FAULT_INJECTION: forcing a failure. [ 1109.973338][ T7493] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.978602][ T7493] CPU: 0 UID: 0 PID: 7493 Comm: syz.0.1451 Not tainted syzkaller #0 PREEMPT [ 1109.978756][ T7493] Hardware name: linux,dummy-virt (DT) [ 1109.978829][ T7493] Call trace: [ 1109.978888][ T7493] show_stack+0x18/0x24 (C) [ 1109.979049][ T7493] dump_stack_lvl+0xdc/0xf4 [ 1109.979165][ T7493] dump_stack+0x1c/0x28 [ 1109.979256][ T7493] should_fail_ex+0x5a0/0x6ac [ 1109.979350][ T7493] should_failslab+0xbc/0x11c [ 1109.979455][ T7493] __kmalloc_cache_noprof+0x74/0x3d0 [ 1109.979628][ T7493] snd_pcm_oss_change_params_locked+0x180/0x28f4 [ 1109.979766][ T7493] snd_pcm_oss_make_ready+0xac/0x164 [ 1109.979866][ T7493] snd_pcm_oss_sync+0x174/0x64c [ 1109.979963][ T7493] snd_pcm_oss_release+0x1dc/0x250 [ 1109.980061][ T7493] __fput+0x2c8/0x954 [ 1109.980173][ T7493] fput_close_sync+0xdc/0x230 [ 1109.980274][ T7493] __arm64_sys_close+0x6c/0xbc [ 1109.980413][ T7493] invoke_syscall+0x6c/0x258 [ 1109.980545][ T7493] el0_svc_common.constprop.0+0xac/0x230 [ 1109.980673][ T7493] do_el0_svc_compat+0x40/0x68 [ 1109.980768][ T7493] el0_svc_compat+0x4c/0x184 [ 1109.980872][ T7493] el0t_32_sync_handler+0x88/0xac [ 1109.980970][ T7493] el0t_32_sync+0x19c/0x1a0 [ 1110.946368][ T7494] FAULT_INJECTION: forcing a failure. [ 1110.946368][ T7494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1110.948997][ T7494] CPU: 0 UID: 0 PID: 7494 Comm: syz.2.1450 Not tainted syzkaller #0 PREEMPT [ 1110.949097][ T7494] Hardware name: linux,dummy-virt (DT) [ 1110.949134][ T7494] Call trace: [ 1110.949161][ T7494] show_stack+0x18/0x24 (C) [ 1110.949256][ T7494] dump_stack_lvl+0xdc/0xf4 [ 1110.949311][ T7494] dump_stack+0x1c/0x28 [ 1110.949356][ T7494] should_fail_ex+0x5a0/0x6ac [ 1110.949403][ T7494] should_fail+0x14/0x20 [ 1110.949442][ T7494] should_fail_usercopy+0x1c/0x28 [ 1110.949520][ T7494] simple_read_from_buffer+0x84/0x214 [ 1110.949575][ T7494] proc_fail_nth_read+0x160/0x21c [ 1110.949666][ T7494] vfs_read+0x18c/0xa28 [ 1110.949731][ T7494] ksys_read+0xec/0x1d8 [ 1110.949777][ T7494] __arm64_sys_read+0x6c/0x9c [ 1110.949823][ T7494] invoke_syscall+0x6c/0x258 [ 1110.949886][ T7494] el0_svc_common.constprop.0+0xac/0x230 [ 1110.949930][ T7494] do_el0_svc_compat+0x40/0x68 [ 1110.949972][ T7494] el0_svc_compat+0x4c/0x184 [ 1110.950018][ T7494] el0t_32_sync_handler+0x88/0xac [ 1110.950060][ T7494] el0t_32_sync+0x19c/0x1a0 [ 1111.461874][ T30] audit: type=1400 audit(1110.880:339): avc: denied { unmount } for pid=6639 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1115.827376][ T30] audit: type=1400 audit(1115.250:340): avc: denied { map } for pid=7512 comm="syz.0.1456" path="/dev/full" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 [ 1115.854145][ T30] audit: type=1400 audit(1115.280:341): avc: denied { execute } for pid=7512 comm="syz.0.1456" path="/dev/full" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 [ 1118.222436][ T7524] SELinux: syz.0.1460 (7524) set checkreqprot to 1. This is no longer supported. [ 1118.226564][ T30] audit: type=1400 audit(1117.640:342): avc: denied { setcheckreqprot } for pid=7523 comm="syz.0.1460" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1120.877741][ T7530] fuse: Bad value for 'fd' [ 1123.196893][ T30] audit: type=1400 audit(1122.620:343): avc: denied { mount } for pid=7532 comm="syz.0.1463" name="/" dev="autofs" ino=18034 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1125.760570][ T30] audit: type=1400 audit(1125.150:344): avc: denied { unmount } for pid=6639 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1130.064303][ T7555] fuse: Bad value for 'fd' [ 1132.288321][ T7558] FAULT_INJECTION: forcing a failure. [ 1132.288321][ T7558] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.296046][ T7558] CPU: 0 UID: 0 PID: 7558 Comm: syz.0.1469 Not tainted syzkaller #0 PREEMPT [ 1132.296254][ T7558] Hardware name: linux,dummy-virt (DT) [ 1132.296328][ T7558] Call trace: [ 1132.296386][ T7558] show_stack+0x18/0x24 (C) [ 1132.296576][ T7558] dump_stack_lvl+0xdc/0xf4 [ 1132.296690][ T7558] dump_stack+0x1c/0x28 [ 1132.296789][ T7558] should_fail_ex+0x5a0/0x6ac [ 1132.296892][ T7558] should_failslab+0xbc/0x11c [ 1132.296989][ T7558] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1132.297087][ T7558] security_file_alloc+0x28/0x1ec [ 1132.297186][ T7558] init_file+0x8c/0x40c [ 1132.297285][ T7558] alloc_empty_file+0x70/0x16c [ 1132.297380][ T7558] path_openat+0xd0/0x24b4 [ 1132.297480][ T7558] do_filp_open+0x184/0x360 [ 1132.297581][ T7558] do_sys_openat2+0xe0/0x160 [ 1132.297673][ T7558] __arm64_compat_sys_open+0x10c/0x194 [ 1132.297775][ T7558] invoke_syscall+0x6c/0x258 [ 1132.297870][ T7558] el0_svc_common.constprop.0+0xac/0x230 [ 1132.297964][ T7558] do_el0_svc_compat+0x40/0x68 [ 1132.298060][ T7558] el0_svc_compat+0x4c/0x184 [ 1132.298164][ T7558] el0t_32_sync_handler+0x88/0xac [ 1132.298257][ T7558] el0t_32_sync+0x19c/0x1a0 [ 1133.743042][ T7564] FAULT_INJECTION: forcing a failure. [ 1133.743042][ T7564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1133.743605][ T7564] CPU: 1 UID: 0 PID: 7564 Comm: syz.2.1471 Not tainted syzkaller #0 PREEMPT [ 1133.743672][ T7564] Hardware name: linux,dummy-virt (DT) [ 1133.743704][ T7564] Call trace: [ 1133.743733][ T7564] show_stack+0x18/0x24 (C) [ 1133.743812][ T7564] dump_stack_lvl+0xdc/0xf4 [ 1133.743877][ T7564] dump_stack+0x1c/0x28 [ 1133.743921][ T7564] should_fail_ex+0x5a0/0x6ac [ 1133.743995][ T7564] should_fail+0x14/0x20 [ 1133.744100][ T7564] should_fail_usercopy+0x1c/0x28 [ 1133.744180][ T7564] _inline_copy_from_user+0x34/0x134 [ 1133.744256][ T7564] get_compat_msghdr+0x90/0x118 [ 1133.744363][ T7564] ___sys_sendmsg+0x184/0x19c [ 1133.744608][ T7564] __sys_sendmsg+0x114/0x19c [ 1133.744728][ T7564] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1133.744865][ T7564] invoke_syscall+0x6c/0x258 [ 1133.744951][ T7564] el0_svc_common.constprop.0+0xac/0x230 [ 1133.745048][ T7564] do_el0_svc_compat+0x40/0x68 [ 1133.745309][ T7564] el0_svc_compat+0x4c/0x184 [ 1133.745426][ T7564] el0t_32_sync_handler+0x88/0xac [ 1133.745516][ T7564] el0t_32_sync+0x19c/0x1a0 [ 1134.665373][ T7567] FAULT_INJECTION: forcing a failure. [ 1134.665373][ T7567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1134.665840][ T7567] CPU: 1 UID: 0 PID: 7567 Comm: syz.0.1473 Not tainted syzkaller #0 PREEMPT [ 1134.665904][ T7567] Hardware name: linux,dummy-virt (DT) [ 1134.665935][ T7567] Call trace: [ 1134.665962][ T7567] show_stack+0x18/0x24 (C) [ 1134.666038][ T7567] dump_stack_lvl+0xdc/0xf4 [ 1134.666100][ T7567] dump_stack+0x1c/0x28 [ 1134.666145][ T7567] should_fail_ex+0x5a0/0x6ac [ 1134.666190][ T7567] should_fail+0x14/0x20 [ 1134.666229][ T7567] should_fail_usercopy+0x1c/0x28 [ 1134.666269][ T7567] _inline_copy_from_user+0x34/0x134 [ 1134.666315][ T7567] get_compat_msghdr+0x90/0x118 [ 1134.666356][ T7567] ___sys_sendmsg+0x184/0x19c [ 1134.666398][ T7567] __sys_sendmsg+0x114/0x19c [ 1134.666494][ T7567] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1134.666540][ T7567] invoke_syscall+0x6c/0x258 [ 1134.666666][ T7567] el0_svc_common.constprop.0+0xac/0x230 [ 1134.666822][ T7567] do_el0_svc_compat+0x40/0x68 [ 1134.666870][ T7567] el0_svc_compat+0x4c/0x184 [ 1134.667517][ T7567] el0t_32_sync_handler+0x88/0xac [ 1134.667726][ T7567] el0t_32_sync+0x19c/0x1a0 [ 1136.421172][ T30] audit: type=1400 audit(1135.840:345): avc: denied { getopt } for pid=7571 comm="syz.2.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1136.662598][ T7574] FAULT_INJECTION: forcing a failure. [ 1136.662598][ T7574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1136.663634][ T7574] CPU: 1 UID: 0 PID: 7574 Comm: syz.0.1476 Not tainted syzkaller #0 PREEMPT [ 1136.663798][ T7574] Hardware name: linux,dummy-virt (DT) [ 1136.663878][ T7574] Call trace: [ 1136.663949][ T7574] show_stack+0x18/0x24 (C) [ 1136.664141][ T7574] dump_stack_lvl+0xdc/0xf4 [ 1136.664254][ T7574] dump_stack+0x1c/0x28 [ 1136.664347][ T7574] should_fail_ex+0x5a0/0x6ac [ 1136.664474][ T7574] should_fail+0x14/0x20 [ 1136.664565][ T7574] should_fail_usercopy+0x1c/0x28 [ 1136.664649][ T7574] _inline_copy_from_user+0x38/0x130 [ 1136.664744][ T7574] __arm64_sys_mount+0x178/0x3dc [ 1136.664837][ T7574] invoke_syscall+0x6c/0x258 [ 1136.664925][ T7574] el0_svc_common.constprop.0+0xac/0x230 [ 1136.665031][ T7574] do_el0_svc_compat+0x40/0x68 [ 1136.665119][ T7574] el0_svc_compat+0x4c/0x184 [ 1136.665213][ T7574] el0t_32_sync_handler+0x88/0xac [ 1136.665302][ T7574] el0t_32_sync+0x19c/0x1a0 [ 1143.343502][ T7597] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7597 comm=syz.0.1483 [ 1145.771308][ T30] audit: type=1400 audit(1145.180:346): avc: denied { kexec_image_load } for pid=7603 comm="syz.0.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1151.388173][ T30] audit: type=1400 audit(1150.810:347): avc: denied { bind } for pid=7620 comm="syz.0.1489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1151.856806][ T30] audit: type=1400 audit(1151.270:348): avc: denied { accept } for pid=7620 comm="syz.0.1489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1154.988648][ T7634] FAULT_INJECTION: forcing a failure. [ 1154.988648][ T7634] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.995685][ T7633] FAULT_INJECTION: forcing a failure. [ 1154.995685][ T7633] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.996044][ T7633] CPU: 1 UID: 0 PID: 7633 Comm: syz.2.1493 Not tainted syzkaller #0 PREEMPT [ 1154.996116][ T7633] Hardware name: linux,dummy-virt (DT) [ 1154.996152][ T7633] Call trace: [ 1154.996178][ T7633] show_stack+0x18/0x24 (C) [ 1154.996257][ T7633] dump_stack_lvl+0xdc/0xf4 [ 1154.996310][ T7633] dump_stack+0x1c/0x28 [ 1154.996354][ T7633] should_fail_ex+0x5a0/0x6ac [ 1154.996399][ T7633] should_failslab+0xbc/0x11c [ 1154.996497][ T7633] __kmalloc_noprof+0xd0/0x4d0 [ 1154.996545][ T7633] tomoyo_encode2+0xa8/0x2c0 [ 1154.996609][ T7633] tomoyo_encode+0x28/0x40 [ 1154.996766][ T7633] tomoyo_realpath_from_path+0x114/0x534 [ 1154.996879][ T7633] tomoyo_path_perm+0x210/0x338 [ 1154.997080][ T7633] tomoyo_inode_getattr+0x1c/0x28 [ 1154.997319][ T7633] security_inode_getattr+0xc4/0x1cc [ 1154.997480][ T7633] vfs_statx+0xd0/0x2c8 [ 1154.997573][ T7633] __do_compat_sys_newstat+0xac/0x114 [ 1154.997708][ T7633] __arm64_compat_sys_newstat+0x50/0x70 [ 1154.997773][ T7633] invoke_syscall+0x6c/0x258 [ 1154.997889][ T7633] el0_svc_common.constprop.0+0xac/0x230 [ 1154.997992][ T7633] do_el0_svc_compat+0x40/0x68 [ 1154.998147][ T7633] el0_svc_compat+0x4c/0x184 [ 1154.998199][ T7633] el0t_32_sync_handler+0x88/0xac [ 1154.998241][ T7633] el0t_32_sync+0x19c/0x1a0 [ 1155.040998][ T7633] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1155.052253][ T7634] CPU: 1 UID: 0 PID: 7634 Comm: syz.0.1494 Not tainted syzkaller #0 PREEMPT [ 1155.052389][ T7634] Hardware name: linux,dummy-virt (DT) [ 1155.052466][ T7634] Call trace: [ 1155.052499][ T7634] show_stack+0x18/0x24 (C) [ 1155.052587][ T7634] dump_stack_lvl+0xdc/0xf4 [ 1155.052640][ T7634] dump_stack+0x1c/0x28 [ 1155.052683][ T7634] should_fail_ex+0x5a0/0x6ac [ 1155.052728][ T7634] should_failslab+0xbc/0x11c [ 1155.052773][ T7634] __kmalloc_noprof+0xd0/0x4d0 [ 1155.052815][ T7634] sk_prot_alloc+0x164/0x1e4 [ 1155.052861][ T7634] sk_alloc+0x3c/0x91c [ 1155.052902][ T7634] __netlink_create+0x6c/0x264 [ 1155.052948][ T7634] netlink_create+0x2e4/0x668 [ 1155.052990][ T7634] __sock_create+0x268/0x634 [ 1155.053035][ T7634] __sys_socket+0x11c/0x1cc [ 1155.053078][ T7634] __arm64_sys_socket+0x6c/0xa0 [ 1155.053130][ T7634] invoke_syscall+0x6c/0x258 [ 1155.053171][ T7634] el0_svc_common.constprop.0+0xac/0x230 [ 1155.053212][ T7634] do_el0_svc_compat+0x40/0x68 [ 1155.053251][ T7634] el0_svc_compat+0x4c/0x184 [ 1155.053295][ T7634] el0t_32_sync_handler+0x88/0xac [ 1155.053336][ T7634] el0t_32_sync+0x19c/0x1a0 [ 1156.250849][ T30] audit: type=1400 audit(1155.660:349): avc: denied { getopt } for pid=7638 comm="syz.0.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1157.401880][ T30] audit: type=1400 audit(1156.820:350): avc: denied { create } for pid=7644 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1157.414050][ T30] audit: type=1400 audit(1156.840:351): avc: denied { write } for pid=7644 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1157.431807][ T30] audit: type=1400 audit(1156.860:352): avc: denied { ioctl } for pid=7644 comm="syz.0.1499" path="socket:[19022]" dev="sockfs" ino=19022 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1158.288847][ T7650] FAULT_INJECTION: forcing a failure. [ 1158.288847][ T7650] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.307591][ T7650] CPU: 0 UID: 0 PID: 7650 Comm: syz.2.1500 Not tainted syzkaller #0 PREEMPT [ 1158.307739][ T7650] Hardware name: linux,dummy-virt (DT) [ 1158.307774][ T7650] Call trace: [ 1158.307800][ T7650] show_stack+0x18/0x24 (C) [ 1158.307892][ T7650] dump_stack_lvl+0xdc/0xf4 [ 1158.307946][ T7650] dump_stack+0x1c/0x28 [ 1158.307989][ T7650] should_fail_ex+0x5a0/0x6ac [ 1158.308035][ T7650] should_failslab+0xbc/0x11c [ 1158.308089][ T7650] __kmalloc_noprof+0xd0/0x4d0 [ 1158.308134][ T7650] tomoyo_realpath_from_path+0x90/0x534 [ 1158.308182][ T7650] tomoyo_path_number_perm+0x200/0x438 [ 1158.308226][ T7650] tomoyo_file_ioctl+0x1c/0x28 [ 1158.308270][ T7650] security_file_ioctl_compat+0x8c/0x19c [ 1158.308321][ T7650] __arm64_compat_sys_ioctl+0x98/0x234 [ 1158.308369][ T7650] invoke_syscall+0x6c/0x258 [ 1158.308413][ T7650] el0_svc_common.constprop.0+0xac/0x230 [ 1158.308489][ T7650] do_el0_svc_compat+0x40/0x68 [ 1158.308531][ T7650] el0_svc_compat+0x4c/0x184 [ 1158.308576][ T7650] el0t_32_sync_handler+0x88/0xac [ 1158.308624][ T7650] el0t_32_sync+0x19c/0x1a0 [ 1158.321801][ T7650] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1158.890945][ T30] audit: type=1400 audit(1158.300:353): avc: denied { getopt } for pid=7644 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1160.603960][ T30] audit: type=1400 audit(1160.030:354): avc: denied { lock } for pid=7655 comm="syz.0.1501" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1162.108301][ T10] usb 1-1: new full-speed USB device number 10 using dummy_hcd [ 1162.366695][ T10] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1162.368054][ T10] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1162.400038][ T10] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1162.410481][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1162.410993][ T10] usb 1-1: SerialNumber: syz [ 1163.202062][ T10] usb 1-1: USB disconnect, device number 10 [ 1174.255825][ T7705] fuse: Unknown parameter 'fd0x0000000000000003' [ 1174.792531][ T30] audit: type=1400 audit(1174.210:355): avc: denied { setattr } for pid=7706 comm="syz.0.1516" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1177.608230][ T30] audit: type=1400 audit(1177.030:356): avc: denied { map } for pid=7713 comm="syz.0.1519" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1177.613668][ T30] audit: type=1400 audit(1177.030:357): avc: denied { execute } for pid=7713 comm="syz.0.1519" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1178.294540][ T30] audit: type=1400 audit(1177.720:358): avc: denied { name_bind } for pid=7715 comm="syz.2.1518" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1180.035689][ T7721] batadv_slave_1: entered promiscuous mode [ 1180.894713][ T7720] batadv_slave_1: left promiscuous mode [ 1181.415995][ T7727] fuse: Unknown parameter 'fd0x0000000000000003' [ 1185.288616][ T7738] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1185.402765][ T7738] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1187.073449][ T7743] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=7743 comm=syz.0.1530 [ 1187.995759][ T7746] fuse: Unknown parameter 'fd0x0000000000000003' [ 1190.277912][ T7751] FAULT_INJECTION: forcing a failure. [ 1190.277912][ T7751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1190.298899][ T7751] CPU: 0 UID: 0 PID: 7751 Comm: syz.0.1532 Not tainted syzkaller #0 PREEMPT [ 1190.299180][ T7751] Hardware name: linux,dummy-virt (DT) [ 1190.299252][ T7751] Call trace: [ 1190.299309][ T7751] show_stack+0x18/0x24 (C) [ 1190.299471][ T7751] dump_stack_lvl+0xdc/0xf4 [ 1190.299643][ T7751] dump_stack+0x1c/0x28 [ 1190.299761][ T7751] should_fail_ex+0x5a0/0x6ac [ 1190.299868][ T7751] should_fail+0x14/0x20 [ 1190.299955][ T7751] should_fail_usercopy+0x1c/0x28 [ 1190.300039][ T7751] _inline_copy_from_user+0x34/0x134 [ 1190.300133][ T7751] get_compat_msghdr+0x90/0x118 [ 1190.300218][ T7751] ___sys_sendmsg+0x184/0x19c [ 1190.300328][ T7751] __sys_sendmsg+0x114/0x19c [ 1190.300508][ T7751] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1190.300649][ T7751] invoke_syscall+0x6c/0x258 [ 1190.300743][ T7751] el0_svc_common.constprop.0+0xac/0x230 [ 1190.300843][ T7751] do_el0_svc_compat+0x40/0x68 [ 1190.300927][ T7751] el0_svc_compat+0x4c/0x184 [ 1190.301016][ T7751] el0t_32_sync_handler+0x88/0xac [ 1190.301108][ T7751] el0t_32_sync+0x19c/0x1a0 [ 1191.514145][ T30] audit: type=1400 audit(1190.940:359): avc: denied { append } for pid=7753 comm="syz.2.1534" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1193.505159][ T7761] FAULT_INJECTION: forcing a failure. [ 1193.505159][ T7761] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.511670][ T7761] CPU: 0 UID: 0 PID: 7761 Comm: syz.2.1535 Not tainted syzkaller #0 PREEMPT [ 1193.511911][ T7761] Hardware name: linux,dummy-virt (DT) [ 1193.511983][ T7761] Call trace: [ 1193.512043][ T7761] show_stack+0x18/0x24 (C) [ 1193.512222][ T7761] dump_stack_lvl+0xdc/0xf4 [ 1193.512439][ T7761] dump_stack+0x1c/0x28 [ 1193.512578][ T7761] should_fail_ex+0x5a0/0x6ac [ 1193.512685][ T7761] should_failslab+0xbc/0x11c [ 1193.512787][ T7761] __kmalloc_noprof+0xd0/0x4d0 [ 1193.512923][ T7761] tomoyo_realpath_from_path+0x90/0x534 [ 1193.513033][ T7761] tomoyo_path_number_perm+0x200/0x438 [ 1193.513140][ T7761] tomoyo_file_ioctl+0x1c/0x28 [ 1193.513239][ T7761] security_file_ioctl_compat+0x8c/0x19c [ 1193.513344][ T7761] __arm64_compat_sys_ioctl+0x98/0x234 [ 1193.513448][ T7761] invoke_syscall+0x6c/0x258 [ 1193.513572][ T7761] el0_svc_common.constprop.0+0xac/0x230 [ 1193.513674][ T7761] do_el0_svc_compat+0x40/0x68 [ 1193.513770][ T7761] el0_svc_compat+0x4c/0x184 [ 1193.513876][ T7761] el0t_32_sync_handler+0x88/0xac [ 1193.513974][ T7761] el0t_32_sync+0x19c/0x1a0 [ 1193.584953][ T7761] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1196.115935][ T7769] FAULT_INJECTION: forcing a failure. [ 1196.115935][ T7769] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.131059][ T7769] CPU: 1 UID: 0 PID: 7769 Comm: syz.0.1538 Not tainted syzkaller #0 PREEMPT [ 1196.131218][ T7769] Hardware name: linux,dummy-virt (DT) [ 1196.131254][ T7769] Call trace: [ 1196.131282][ T7769] show_stack+0x18/0x24 (C) [ 1196.131365][ T7769] dump_stack_lvl+0xdc/0xf4 [ 1196.131421][ T7769] dump_stack+0x1c/0x28 [ 1196.131467][ T7769] should_fail_ex+0x5a0/0x6ac [ 1196.131516][ T7769] should_failslab+0xbc/0x11c [ 1196.131568][ T7769] __kmalloc_noprof+0xd0/0x4d0 [ 1196.131615][ T7769] tomoyo_encode2+0xa8/0x2c0 [ 1196.131666][ T7769] tomoyo_encode+0x28/0x40 [ 1196.131711][ T7769] tomoyo_realpath_from_path+0x114/0x534 [ 1196.131757][ T7769] tomoyo_path_number_perm+0x200/0x438 [ 1196.131802][ T7769] tomoyo_path_chown+0x150/0x170 [ 1196.131849][ T7769] security_path_chown+0xdc/0x228 [ 1196.131894][ T7769] chown_common+0x2d4/0x4bc [ 1196.131938][ T7769] do_fchownat+0x134/0x164 [ 1196.131980][ T7769] __arm64_sys_fchownat+0xa4/0x100 [ 1196.132023][ T7769] invoke_syscall+0x6c/0x258 [ 1196.132068][ T7769] el0_svc_common.constprop.0+0xac/0x230 [ 1196.132123][ T7769] do_el0_svc_compat+0x40/0x68 [ 1196.132165][ T7769] el0_svc_compat+0x4c/0x184 [ 1196.132212][ T7769] el0t_32_sync_handler+0x88/0xac [ 1196.132254][ T7769] el0t_32_sync+0x19c/0x1a0 [ 1196.141938][ T7769] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1197.234370][ T30] audit: type=1400 audit(1196.660:360): avc: denied { map } for pid=7770 comm="syz.2.1539" path="/sys/fs/cgroup" dev="sysfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 1197.238457][ T30] audit: type=1400 audit(1196.660:361): avc: denied { execute } for pid=7770 comm="syz.2.1539" path="/sys/fs/cgroup" dev="sysfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 1198.060727][ T7773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7773 comm=syz.2.1539 [ 1199.618385][ T30] audit: type=1400 audit(1198.990:362): avc: denied { open } for pid=7775 comm="syz.0.1540" path="/dev/ttyq4" dev="devtmpfs" ino=371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1199.816224][ T7777] FAULT_INJECTION: forcing a failure. [ 1199.816224][ T7777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1199.884574][ T7777] CPU: 0 UID: 0 PID: 7777 Comm: syz.2.1541 Not tainted syzkaller #0 PREEMPT [ 1199.884902][ T7777] Hardware name: linux,dummy-virt (DT) [ 1199.884981][ T7777] Call trace: [ 1199.885052][ T7777] show_stack+0x18/0x24 (C) [ 1199.885252][ T7777] dump_stack_lvl+0xdc/0xf4 [ 1199.885366][ T7777] dump_stack+0x1c/0x28 [ 1199.885474][ T7777] should_fail_ex+0x5a0/0x6ac [ 1199.885571][ T7777] should_fail+0x14/0x20 [ 1199.885661][ T7777] should_fail_usercopy+0x1c/0x28 [ 1199.885755][ T7777] simple_read_from_buffer+0x84/0x214 [ 1199.885864][ T7777] proc_fail_nth_read+0x160/0x21c [ 1199.885973][ T7777] vfs_read+0x18c/0xa28 [ 1199.886089][ T7777] ksys_read+0xec/0x1d8 [ 1199.886185][ T7777] __arm64_sys_read+0x6c/0x9c [ 1199.886276][ T7777] invoke_syscall+0x6c/0x258 [ 1199.886367][ T7777] el0_svc_common.constprop.0+0xac/0x230 [ 1199.886455][ T7777] do_el0_svc_compat+0x40/0x68 [ 1199.886537][ T7777] el0_svc_compat+0x4c/0x184 [ 1199.886624][ T7777] el0t_32_sync_handler+0x88/0xac [ 1199.886708][ T7777] el0t_32_sync+0x19c/0x1a0 [ 1202.531024][ T30] audit: type=1400 audit(1201.920:363): avc: denied { create } for pid=7779 comm="syz.0.1543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1202.531629][ T30] audit: type=1400 audit(1201.930:364): avc: denied { ioctl } for pid=7779 comm="syz.0.1543" path="socket:[19204]" dev="sockfs" ino=19204 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1217.569430][ T30] audit: type=1400 audit(1216.990:365): avc: denied { block_suspend } for pid=7821 comm="syz.2.1552" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1219.491821][ T30] audit: type=1400 audit(1218.910:366): avc: denied { create } for pid=7830 comm="syz.0.1554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1225.356296][ T30] audit: type=1400 audit(1224.780:367): avc: denied { read } for pid=7849 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1227.097665][ T30] audit: type=1400 audit(1226.520:368): avc: denied { write } for pid=7852 comm="syz.2.1562" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1232.864976][ T7868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1232.874092][ T7868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1239.964489][ T7873] SELinux: Context system_u:object_r:etc_aliases_t:s0 is not valid (left unmapped). [ 1240.036720][ T30] audit: type=1400 audit(1239.430:369): avc: denied { relabelto } for pid=7871 comm="syz.0.1566" name="cgroup.procs" dev="cgroup" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1240.208625][ T30] audit: type=1400 audit(1239.630:370): avc: denied { associate } for pid=7871 comm="syz.0.1566" name="cgroup.procs" dev="cgroup" ino=156 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:etc_aliases_t:s0" [ 1248.592507][ T7891] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7891 comm=syz.0.1575 [ 1256.306335][ T7915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7915 comm=syz.0.1583 [ 1262.737162][ T7930] netlink: 11 bytes leftover after parsing attributes in process `syz.0.1588'. [ 1264.042546][ T7933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7933 comm=syz.0.1589 [ 1267.496495][ T7940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17154 sclass=netlink_route_socket pid=7940 comm=syz.0.1592 [ 1281.282936][ T7972] netlink: 14 bytes leftover after parsing attributes in process `syz.2.1603'. [ 1281.338890][ T7972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7972 comm=syz.2.1603 [ 1285.983243][ T7987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7987 comm=syz.2.1610 [ 1291.476550][ T8005] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8005 comm=syz.2.1617 [ 1297.583198][ T8019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8019 comm=syz.2.1624 [ 1347.781236][ T30] audit: type=1400 audit(1347.200:371): avc: denied { search } for pid=8145 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1347.787410][ T30] audit: type=1400 audit(1347.210:372): avc: denied { search } for pid=8145 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=525 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1347.788655][ T30] audit: type=1400 audit(1347.210:373): avc: denied { search } for pid=8145 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=688 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1347.789265][ T30] audit: type=1400 audit(1347.210:374): avc: denied { search } for pid=8145 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1348.067950][ T30] audit: type=1400 audit(1347.490:375): avc: denied { read open } for pid=8150 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1348.071749][ T30] audit: type=1400 audit(1347.490:376): avc: denied { getattr } for pid=8150 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1348.691525][ T30] audit: type=1400 audit(1348.100:377): avc: denied { add_name } for pid=8145 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1351.177577][ T30] audit: type=1400 audit(1350.600:378): avc: denied { remove_name } for pid=8156 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=5316 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1359.846069][ T8182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8182 comm=syz.2.1697 [ 1385.032266][ T8252] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8252 comm=syz.2.1725 [ 1457.335358][ T8441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=8441 comm=syz.0.1801 [ 1463.659166][ T8459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=8459 comm=syz.2.1808 [ 1471.569220][ T8485] FAULT_INJECTION: forcing a failure. [ 1471.569220][ T8485] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1471.604942][ T8485] CPU: 1 UID: 0 PID: 8485 Comm: syz.2.1819 Not tainted syzkaller #0 PREEMPT [ 1471.605213][ T8485] Hardware name: linux,dummy-virt (DT) [ 1471.605293][ T8485] Call trace: [ 1471.605355][ T8485] show_stack+0x18/0x24 (C) [ 1471.605527][ T8485] dump_stack_lvl+0xdc/0xf4 [ 1471.605641][ T8485] dump_stack+0x1c/0x28 [ 1471.605733][ T8485] should_fail_ex+0x5a0/0x6ac [ 1471.605814][ T8485] should_fail+0x14/0x20 [ 1471.605901][ T8485] should_fail_usercopy+0x1c/0x28 [ 1471.605973][ T8485] _inline_copy_from_user+0x34/0x12c [ 1471.606056][ T8485] kstrtouint_from_user+0xb8/0x180 [ 1471.606137][ T8485] proc_fail_nth_write+0x8c/0x1f0 [ 1471.606222][ T8485] vfs_write+0x1d8/0xb88 [ 1471.606299][ T8485] ksys_write+0xec/0x1d8 [ 1471.606372][ T8485] __arm64_sys_write+0x6c/0x9c [ 1471.606446][ T8485] invoke_syscall+0x6c/0x258 [ 1471.606522][ T8485] el0_svc_common.constprop.0+0xac/0x230 [ 1471.606597][ T8485] do_el0_svc_compat+0x40/0x68 [ 1471.606669][ T8485] el0_svc_compat+0x4c/0x184 [ 1471.606747][ T8485] el0t_32_sync_handler+0x88/0xac [ 1471.606829][ T8485] el0t_32_sync+0x19c/0x1a0 [ 1486.193968][ T8523] FAULT_INJECTION: forcing a failure. [ 1486.193968][ T8523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.194367][ T8523] CPU: 1 UID: 0 PID: 8523 Comm: syz.2.1830 Not tainted syzkaller #0 PREEMPT [ 1486.194434][ T8523] Hardware name: linux,dummy-virt (DT) [ 1486.194469][ T8523] Call trace: [ 1486.194499][ T8523] show_stack+0x18/0x24 (C) [ 1486.194581][ T8523] dump_stack_lvl+0xdc/0xf4 [ 1486.194635][ T8523] dump_stack+0x1c/0x28 [ 1486.194679][ T8523] should_fail_ex+0x5a0/0x6ac [ 1486.194725][ T8523] should_fail+0x14/0x20 [ 1486.194804][ T8523] should_fail_usercopy+0x1c/0x28 [ 1486.194890][ T8523] simple_read_from_buffer+0x84/0x214 [ 1486.195052][ T8523] proc_fail_nth_read+0x160/0x21c [ 1486.195630][ T8523] vfs_read+0x18c/0xa28 [ 1486.195739][ T8523] ksys_read+0xec/0x1d8 [ 1486.195869][ T8523] __arm64_sys_read+0x6c/0x9c [ 1486.195987][ T8523] invoke_syscall+0x6c/0x258 [ 1486.196045][ T8523] el0_svc_common.constprop.0+0xac/0x230 [ 1486.196089][ T8523] do_el0_svc_compat+0x40/0x68 [ 1486.196132][ T8523] el0_svc_compat+0x4c/0x184 [ 1486.196187][ T8523] el0t_32_sync_handler+0x88/0xac [ 1486.196303][ T8523] el0t_32_sync+0x19c/0x1a0 [ 1532.581178][ T30] audit: type=1400 audit(1532.000:379): avc: denied { read } for pid=8638 comm="syz.2.1873" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1532.633749][ T30] audit: type=1400 audit(1532.060:380): avc: denied { ioctl } for pid=8638 comm="syz.2.1873" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1538.663156][ T8665] FAULT_INJECTION: forcing a failure. [ 1538.663156][ T8665] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.669287][ T8665] CPU: 0 UID: 0 PID: 8665 Comm: syz.2.1882 Not tainted syzkaller #0 PREEMPT [ 1538.669408][ T8665] Hardware name: linux,dummy-virt (DT) [ 1538.669445][ T8665] Call trace: [ 1538.669475][ T8665] show_stack+0x18/0x24 (C) [ 1538.669603][ T8665] dump_stack_lvl+0xdc/0xf4 [ 1538.669709][ T8665] dump_stack+0x1c/0x28 [ 1538.669758][ T8665] should_fail_ex+0x5a0/0x6ac [ 1538.669805][ T8665] should_failslab+0xbc/0x11c [ 1538.669860][ T8665] kmem_cache_alloc_node_noprof+0x7c/0x3b8 [ 1538.669906][ T8665] __alloc_skb+0x208/0x2f0 [ 1538.669952][ T8665] netlink_alloc_large_skb+0xac/0xd8 [ 1538.670063][ T8665] netlink_sendmsg+0x4ac/0xa54 [ 1538.670157][ T8665] __sock_sendmsg+0xc8/0x168 [ 1538.670209][ T8665] __sys_sendto+0x1d8/0x270 [ 1538.670248][ T8665] __arm64_sys_sendto+0xc0/0x134 [ 1538.670288][ T8665] invoke_syscall+0x6c/0x258 [ 1538.670330][ T8665] el0_svc_common.constprop.0+0xac/0x230 [ 1538.670372][ T8665] do_el0_svc_compat+0x40/0x68 [ 1538.670523][ T8665] el0_svc_compat+0x4c/0x184 [ 1538.670577][ T8665] el0t_32_sync_handler+0x88/0xac [ 1538.670620][ T8665] el0t_32_sync+0x19c/0x1a0 [ 1539.881426][ T8656] netlink: 120 bytes leftover after parsing attributes in process `syz.0.1880'. [ 1540.050742][ T30] audit: type=1400 audit(1539.460:381): avc: denied { connect } for pid=8654 comm="syz.0.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1547.301527][ T8690] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8690 comm=syz.2.1892 [ 1548.844804][ T30] audit: type=1400 audit(1548.270:382): avc: denied { setattr } for pid=8693 comm="syz.2.1894" name="CAN_J1939" dev="sockfs" ino=22596 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1560.794048][ T8727] FAULT_INJECTION: forcing a failure. [ 1560.794048][ T8727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1560.794903][ T8727] CPU: 1 UID: 0 PID: 8727 Comm: syz.2.1905 Not tainted syzkaller #0 PREEMPT [ 1560.795034][ T8727] Hardware name: linux,dummy-virt (DT) [ 1560.795115][ T8727] Call trace: [ 1560.795174][ T8727] show_stack+0x18/0x24 (C) [ 1560.795332][ T8727] dump_stack_lvl+0xdc/0xf4 [ 1560.795439][ T8727] dump_stack+0x1c/0x28 [ 1560.795714][ T8727] should_fail_ex+0x5a0/0x6ac [ 1560.795881][ T8727] should_fail+0x14/0x20 [ 1560.796092][ T8727] should_fail_usercopy+0x1c/0x28 [ 1560.796290][ T8727] simple_read_from_buffer+0x84/0x214 [ 1560.796505][ T8727] proc_fail_nth_read+0x160/0x21c [ 1560.796642][ T8727] vfs_read+0x18c/0xa28 [ 1560.796953][ T8727] ksys_read+0xec/0x1d8 [ 1560.797062][ T8727] __arm64_sys_read+0x6c/0x9c [ 1560.797189][ T8727] invoke_syscall+0x6c/0x258 [ 1560.797411][ T8727] el0_svc_common.constprop.0+0xac/0x230 [ 1560.797684][ T8727] do_el0_svc_compat+0x40/0x68 [ 1560.797802][ T8727] el0_svc_compat+0x4c/0x184 [ 1560.797998][ T8727] el0t_32_sync_handler+0x88/0xac [ 1560.798200][ T8727] el0t_32_sync+0x19c/0x1a0 [ 1568.529285][ T30] audit: type=1400 audit(1567.940:383): avc: denied { setattr } for pid=8745 comm="syz.0.1912" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1603.123167][ T8828] FAULT_INJECTION: forcing a failure. [ 1603.123167][ T8828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1603.136755][ T8828] CPU: 0 UID: 0 PID: 8828 Comm: syz.0.1938 Not tainted syzkaller #0 PREEMPT [ 1603.137012][ T8828] Hardware name: linux,dummy-virt (DT) [ 1603.137090][ T8828] Call trace: [ 1603.137154][ T8828] show_stack+0x18/0x24 (C) [ 1603.137330][ T8828] dump_stack_lvl+0xdc/0xf4 [ 1603.137443][ T8828] dump_stack+0x1c/0x28 [ 1603.137538][ T8828] should_fail_ex+0x5a0/0x6ac [ 1603.137632][ T8828] should_fail+0x14/0x20 [ 1603.137720][ T8828] should_fail_usercopy+0x1c/0x28 [ 1603.137826][ T8828] _inline_copy_from_user+0x38/0x130 [ 1603.137938][ T8828] move_addr_to_kernel+0x44/0x10c [ 1603.138041][ T8828] __sys_sendto+0x15c/0x270 [ 1603.138132][ T8828] __arm64_sys_sendto+0xc0/0x134 [ 1603.138225][ T8828] invoke_syscall+0x6c/0x258 [ 1603.138320][ T8828] el0_svc_common.constprop.0+0xac/0x230 [ 1603.138419][ T8828] do_el0_svc_compat+0x40/0x68 [ 1603.138509][ T8828] el0_svc_compat+0x4c/0x184 [ 1603.138607][ T8828] el0t_32_sync_handler+0x88/0xac [ 1603.138699][ T8828] el0t_32_sync+0x19c/0x1a0 [ 1629.375990][ T8892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=8892 comm=syz.0.1962 [ 1658.487451][ T985] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.004992][ T985] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.372099][ T985] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.703712][ T985] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.802220][ T985] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1666.897058][ T985] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1666.955145][ T985] bond0 (unregistering): Released all slaves [ 1667.645476][ T985] hsr_slave_0: left promiscuous mode [ 1667.668400][ T985] hsr_slave_1: left promiscuous mode [ 1667.808653][ T985] veth0_macvtap: left promiscuous mode [ 1667.823889][ T985] veth1_vlan: left promiscuous mode [ 1667.826592][ T985] veth0_vlan: left promiscuous mode [ 1687.138811][ T8955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1687.323651][ T8955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1696.296816][ T8955] hsr_slave_0: entered promiscuous mode [ 1696.317503][ T8955] hsr_slave_1: entered promiscuous mode [ 1704.163271][ T8955] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1704.279384][ T8955] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1704.467857][ T8955] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1704.682183][ T8955] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1711.268097][ T8955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1722.405419][ T9126] FAULT_INJECTION: forcing a failure. [ 1722.405419][ T9126] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.405943][ T9126] CPU: 1 UID: 0 PID: 9126 Comm: syz.0.2021 Not tainted syzkaller #0 PREEMPT [ 1722.406050][ T9126] Hardware name: linux,dummy-virt (DT) [ 1722.406098][ T9126] Call trace: [ 1722.406127][ T9126] show_stack+0x18/0x24 (C) [ 1722.406208][ T9126] dump_stack_lvl+0xdc/0xf4 [ 1722.406262][ T9126] dump_stack+0x1c/0x28 [ 1722.406305][ T9126] should_fail_ex+0x5a0/0x6ac [ 1722.406351][ T9126] should_failslab+0xbc/0x11c [ 1722.406398][ T9126] kmem_cache_alloc_noprof+0x74/0x3b8 [ 1722.406532][ T9126] alloc_empty_file+0x5c/0x16c [ 1722.406641][ T9126] path_openat+0xd0/0x24b4 [ 1722.406715][ T9126] do_filp_open+0x184/0x360 [ 1722.406819][ T9126] do_open_execat+0xac/0x300 [ 1722.406994][ T9126] alloc_bprm+0x28/0x594 [ 1722.407158][ T9126] do_execveat_common.isra.0+0x158/0x470 [ 1722.407230][ T9126] __arm64_compat_sys_execveat+0xd0/0x154 [ 1722.407288][ T9126] invoke_syscall+0x6c/0x258 [ 1722.407336][ T9126] el0_svc_common.constprop.0+0xac/0x230 [ 1722.407403][ T9126] do_el0_svc_compat+0x40/0x68 [ 1722.407465][ T9126] el0_svc_compat+0x4c/0x184 [ 1722.407579][ T9126] el0t_32_sync_handler+0x88/0xac [ 1722.407654][ T9126] el0t_32_sync+0x19c/0x1a0 [ 1729.615731][ T30] audit: type=1400 audit(1729.040:384): avc: denied { ioctl } for pid=9141 comm="syz.0.2023" path="/dev/uhid" dev="devtmpfs" ino=713 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1735.578179][ T8955] veth0_vlan: entered promiscuous mode [ 1735.711356][ T8955] veth1_vlan: entered promiscuous mode [ 1736.163139][ T8955] veth0_macvtap: entered promiscuous mode [ 1736.254627][ T8955] veth1_macvtap: entered promiscuous mode [ 1737.016788][ T8543] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1737.023987][ T8543] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1737.027509][ T8543] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1737.035930][ T8543] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1737.988324][ T30] audit: type=1400 audit(1737.410:385): avc: denied { mounton } for pid=8955 comm="syz-executor" path="/syzkaller.ooNd64/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1763.176442][ T30] audit: type=1400 audit(1762.600:386): avc: denied { relabelfrom } for pid=9258 comm="syz.2.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1763.177467][ T30] audit: type=1400 audit(1762.600:387): avc: denied { relabelto } for pid=9258 comm="syz.2.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1767.379518][ T9274] fuse: Unknown parameter 'group_id00000000000000000000' [ 1769.604605][ T9283] fuse: Unknown parameter 'group_id00000000000000000000' [ 1773.354430][ T9297] fuse: Unknown parameter 'group_id00000000000000000000' [ 1777.780738][ T9316] ------------[ cut here ]------------ [ 1777.781113][ T9316] verifier bug: not inlined functions bpf_probe_read_user#112 is missing func(1) [ 1777.785099][ T9316] WARNING: CPU: 0 PID: 9316 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 1777.786763][ T9316] Modules linked in: [ 1777.787428][ T9316] CPU: 0 UID: 0 PID: 9316 Comm: syz.0.2095 Not tainted syzkaller #0 PREEMPT [ 1777.787860][ T9316] Hardware name: linux,dummy-virt (DT) [ 1777.788166][ T9316] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1777.788549][ T9316] pc : do_misc_fixups+0xa938/0xcf04 [ 1777.788792][ T9316] lr : do_misc_fixups+0xa938/0xcf04 [ 1777.789083][ T9316] sp : ffff8000a2027450 [ 1777.789259][ T9316] x29: ffff8000a2027450 x28: ffff000017558000 x27: ffff00001755e130 [ 1777.789878][ T9316] x26: ffff00001755e148 x25: ffff000017558000 x24: 0000000000000000 [ 1777.790788][ T9316] x23: ffff00001755e128 x22: 1ffff00011aa4612 x21: ffff80008d523090 [ 1777.792033][ T9316] x20: ffff800085585480 x19: ffff80008556d4a0 x18: 0000000000000000 [ 1777.792644][ T9316] x17: 0000000000000000 x16: ffff00006a08a4c4 x15: 0000000000000000 [ 1777.793274][ T9316] x14: 00000000000016f0 x13: 0000000000000000 x12: ffff700014404df3 [ 1777.793855][ T9316] x11: 1ffff00014404df2 x10: ffff700014404df2 x9 : dfff800000000000 [ 1777.794360][ T9316] x8 : ffff8000a2026f98 x7 : ffff8000a20270c0 x6 : ffff8000a2027010 [ 1777.794732][ T9316] x5 : ffff8000a2026ff8 x4 : 0000000000000000 x3 : 1fffe0000d41313e [ 1777.795075][ T9316] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000015ba0000 [ 1777.795426][ T9316] Call trace: [ 1777.795618][ T9316] do_misc_fixups+0xa938/0xcf04 (P) [ 1777.795843][ T9316] bpf_check+0x3c84/0x9508 [ 1777.796186][ T9316] bpf_prog_load+0xe2c/0x1b74 [ 1777.796373][ T9316] __sys_bpf+0x9c4/0x29c8 [ 1777.796583][ T9316] __arm64_sys_bpf+0x70/0xa4 [ 1777.796924][ T9316] invoke_syscall+0x6c/0x258 [ 1777.797111][ T9316] el0_svc_common.constprop.0+0xac/0x230 [ 1777.797307][ T9316] do_el0_svc_compat+0x40/0x68 [ 1777.797536][ T9316] el0_svc_compat+0x4c/0x184 [ 1777.797726][ T9316] el0t_32_sync_handler+0x88/0xac [ 1777.797901][ T9316] el0t_32_sync+0x19c/0x1a0 [ 1777.798198][ T9316] irq event stamp: 190 [ 1777.798373][ T9316] hardirqs last enabled at (189): [] finish_task_switch.isra.0+0x1a8/0x854 [ 1777.798723][ T9316] hardirqs last disabled at (190): [] el1_brk64+0x1c/0x48 [ 1777.799006][ T9316] softirqs last enabled at (38): [] fpsimd_restore_current_state+0x44/0x6bc [ 1777.799318][ T9316] softirqs last disabled at (36): [] fpsimd_restore_current_state+0x14/0x6bc [ 1777.799897][ T9316] ---[ end trace 0000000000000000 ]--- VM DIAGNOSIS: 12:05:14 Registers: info registers vcpu 0 CPU#0 PC=ffff800080350f60 X00=00000000000003c0 X01=00000000ffffed20 X02=0000000000000000 X03=ffff800080350f08 X04=ffff700014404d85 X05=ffff8000a2026c20 X06=ffff700014404d84 X07=0000000000000001 X08=ffff8000a2026c27 X09=dfff800000000000 X10=ffff700014404d84 X11=1ffff00014404d84 X12=ffff700014404d85 X13=3231363461613131 X14=000000000000000f X15=0000000000000007 X16=3030303030303020 X17=3030303030303030 X18=0000000000000000 X19=1ffff00014404db9 X20=ffff8000a2026dc0 X21=ffff8000a2026dc8 X22=ffff800087220ca0 X23=1ffff00014404d80 X24=ffff8000a2026c20 X25=00000000ffffed20 X26=000000000000000d X27=00000000ffffed20 X28=1fffe0000d4114b5 X29=ffff8000a2026ba0 X30=ffff800080350f08 SP=ffff8000a2026ba0 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0a0a0a0a0a0a0a0a:0a0a0a0a0a0a0a0a Q01=617379733a746f00:00293128636e7566 Q02=7369203231312372:6573755f64616572 Q03=00000000000000ff:ff00000000000000 Q04=0000000000000000:0000000ff0000000 Q05=705f66706220736e:6f6974636e756620 Q06=636e75662064656e:696c6e6920746f6e Q07=5f65626f72705f66:706220736e6f6974 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffa476940:0000fffffa476940 Q17=ffffff80ffffffd8:0000fffffa476910 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085443b0c X00=ffff800085443b08 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002633b59 X04=00000000667514a2 X05=0000000000040000 X06=ffff00001319e5a0 X07=6e6aad6998d86f90 X08=0000000000000000 X09=ffff8000897e5000 X10=ffff00001319e550 X11=0000000000000000 X12=000000000000009c X13=0000000000000000 X14=00000000000016f0 X15=ffff00001319dac8 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff8000873534f0 X20=ffff00001319dac0 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873534c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873534f0 X28=ffff8000854de6b0 X29=ffff8000a1007010 X30=ffff800080439f54 SP=ffff8000a1007010 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=7369203231312372:6573755f64616572 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6f6974636e756620:64656e696c6e6920 Q06=636e75662064656e:696c6e6920746f6e Q07=5f65626f72705f66:706220736e6f6974 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe5139840:0000ffffe5139840 Q17=ffffff80ffffffd0:0000ffffe5139810 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000