last executing test programs: 10.603379344s ago: executing program 1 (id=527): r0 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000400)="91ab9402118866d216e09d1ce5d8b27353a66b0bd14e31deb5c80e45f6a767b8e2fdf1b5a86bc152456da24cccb1aea841de65146bbfff0ab96a61f9330a5f3735834e28fbba63c4cbd9e042fd642659c0199c3d5b89e56e10a9350ff360e381cfd6280ec165cb53cfaef7d3f6a09ef5fd9df76d34e68400d9c5079c42eec8128a88a20aa4cfe6ca89c582ae110b9d34ca55bcd2bae896ab82381860d8f52b36fbaa75e05525e182851e2702e3c1782dd36229adef8b959a03b8109411ff2f70c0af60480f6e0347d2cc6f2538fe85ef26552b76e51d81e5f169c8c5cc97a94980647feda0", 0xe5}, {&(0x7f0000000300)="6065ba63d25bdbe3ada7793cfb91f49b86c549e12c84ebae884b2ff34124a11bf17064301c6598b79d52fd6ee86ae2ae53d3dc754c90b302c6189c88846b6908e7732766bd18567a22b06249d32df5b6ac6599d167461572f0bce8f32ba60f2e094cccdffb6e50da45889b051e8a5b6ffc2125737c4c76ffd2262cca6fd5550b620239f4f401590a3d64fed4cd7612796de6f80de60a3507add83dfd0c409740b08b68f966c2f210a66e65e111d92728665cd7cbead6603d", 0xffffff19}, {&(0x7f0000000640)="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", 0x1000}], 0x3, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010102, @remote}}}], 0x20}, 0x0) 10.483560531s ago: executing program 1 (id=528): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000ac0)}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') read$char_usb(r3, &(0x7f0000000740)=""/133, 0x85) 4.472578019s ago: executing program 0 (id=529): r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x10, 0xf}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x4, 0x6}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x9, 0x7}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0xc, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xf, 0xf9939adb6716afc8}}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x44) 4.312763888s ago: executing program 0 (id=530): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), r0) 4.312460288s ago: executing program 0 (id=531): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="8c0000000906010200000000000000000200ffff08000940000000390900020073797a310000000005000100070000005c0008801c0007801800018014000240"], 0x8c}, 0x1, 0x0, 0x0, 0x10000182}, 0x4000080) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000082}, 0x4000080) 2.731613097s ago: executing program 1 (id=532): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8000003d) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x0, 0x1000000d) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1, 0xc32a4cddd557707a) fallocate(r1, 0x0, 0x0, 0x9000f3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeed, 0x80010, r1, 0x5000) 2.640667682s ago: executing program 1 (id=533): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0x18, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x38}}, 0x0) 2.581937495s ago: executing program 1 (id=534): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 1.710554274s ago: executing program 0 (id=535): fanotify_init(0x40, 0x4d411e55b7b9955c) 1.708352485s ago: executing program 0 (id=536): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x8241, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\b\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000580), 0x0, 0xa2142) ioctl$HIDIOCGREPORTINFO(r1, 0xc00c4809, &(0x7f00000000c0)={0x3, 0x3, 0x5d71}) 444.44µs ago: executing program 0 (id=537): unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfffff000) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfffffffc, {0x0, 0x0, 0x4c, 0x0, 0xc3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0xffffa888}, 0x8810) 0s ago: executing program 1 (id=538): r0 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x4885, 0x100, 0x4, 0x1d}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0x0, 0x3, 0xf4}]}, 0x1, 0x1}, 0x1) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r3, 0x0, 0x0, 0x0, 0x322, 0x1, {0x1}}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): syzkaller login: [ 37.287018][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 37.288399][ T31] audit: type=1400 audit(37.210:58): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.289314][ T31] audit: type=1400 audit(37.210:59): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:15371' (ED25519) to the list of known hosts. [ 45.666818][ T31] audit: type=1400 audit(45.580:60): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 46.456414][ T31] audit: type=1400 audit(46.370:61): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 46.460870][ T31] audit: type=1400 audit(46.380:62): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 49.896499][ T31] audit: type=1400 audit(49.810:63): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.899359][ T31] audit: type=1400 audit(49.820:64): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.910374][ T3093] cgroup: Unknown subsys name 'net' [ 49.914978][ T31] audit: type=1400 audit(49.830:65): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.052303][ T3093] cgroup: Unknown subsys name 'cpuset' [ 50.058153][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 50.058909][ T3093] cgroup: Unknown subsys name 'rlimit' [ 50.343083][ T31] audit: type=1400 audit(50.260:66): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.346499][ T31] audit: type=1400 audit(50.260:67): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.352906][ T31] audit: type=1400 audit(50.270:68): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 50.554945][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 50.559641][ T31] audit: type=1400 audit(50.470:69): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 55.632949][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 57.016811][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 57.017286][ T31] audit: type=1400 audit(56.920:73): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 57.074585][ T31] audit: type=1400 audit(56.990:74): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.075046][ T31] audit: type=1400 audit(56.990:75): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.082041][ T31] audit: type=1400 audit(57.000:76): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 57.107014][ T31] audit: type=1400 audit(57.030:77): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 57.108770][ T31] audit: type=1400 audit(57.030:78): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 57.182425][ T31] audit: type=1400 audit(57.100:79): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 57.184250][ T31] audit: type=1400 audit(57.100:80): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 57.585045][ T31] audit: type=1400 audit(57.500:81): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 58.215452][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.221488][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.301441][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.310032][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.845523][ T3099] hsr_slave_0: entered promiscuous mode [ 58.850610][ T3099] hsr_slave_1: entered promiscuous mode [ 58.956975][ T3098] hsr_slave_0: entered promiscuous mode [ 58.958787][ T3098] hsr_slave_1: entered promiscuous mode [ 58.960212][ T3098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 58.960495][ T3098] Cannot create hsr debugfs directory [ 59.224325][ T31] audit: type=1400 audit(59.140:82): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.233140][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 59.241183][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 59.245000][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 59.259189][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 59.304249][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 59.313014][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 59.320660][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 59.327053][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 59.665044][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.734966][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.640751][ T3099] veth0_vlan: entered promiscuous mode [ 61.643547][ T3098] veth0_vlan: entered promiscuous mode [ 61.660945][ T3098] veth1_vlan: entered promiscuous mode [ 61.671798][ T3099] veth1_vlan: entered promiscuous mode [ 61.715504][ T3098] veth0_macvtap: entered promiscuous mode [ 61.725343][ T3098] veth1_macvtap: entered promiscuous mode [ 61.753926][ T3099] veth0_macvtap: entered promiscuous mode [ 61.772097][ T3099] veth1_macvtap: entered promiscuous mode [ 61.787733][ T3098] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.788207][ T3098] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.789396][ T3098] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.789454][ T3098] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.928206][ T3099] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.928722][ T3099] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.928829][ T3099] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.928939][ T3099] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.125627][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 62.227023][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 62.227579][ T31] audit: type=1400 audit(62.140:96): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 62.228006][ T31] audit: type=1400 audit(62.140:97): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 62.228326][ T31] audit: type=1400 audit(62.140:98): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 62.375929][ T31] audit: type=1400 audit(62.290:99): avc: denied { getopt } for pid=3781 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.110534][ T31] audit: type=1400 audit(63.030:100): avc: denied { create } for pid=3792 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.132354][ T31] audit: type=1400 audit(63.050:101): avc: denied { create } for pid=3792 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 63.146653][ T31] audit: type=1400 audit(63.060:102): avc: denied { ioctl } for pid=3792 comm="syz.0.4" path="socket:[1723]" dev="sockfs" ino=1723 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 63.149509][ T31] audit: type=1400 audit(63.070:103): avc: denied { write } for pid=3792 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 63.157663][ T31] audit: type=1400 audit(63.080:104): avc: denied { setopt } for pid=3792 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 63.160686][ T31] audit: type=1400 audit(63.080:105): avc: denied { connect } for pid=3792 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 67.798320][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 67.798825][ T31] audit: type=1400 audit(67.720:110): avc: denied { create } for pid=3808 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.823935][ T31] audit: type=1400 audit(67.740:111): avc: denied { ioctl } for pid=3808 comm="syz.0.8" path="socket:[2593]" dev="sockfs" ino=2593 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.850083][ T31] audit: type=1400 audit(67.770:112): avc: denied { write } for pid=3808 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 67.860460][ T31] audit: type=1400 audit(67.780:113): avc: denied { bind } for pid=3808 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 71.485944][ T31] audit: type=1400 audit(71.400:114): avc: denied { accept } for pid=3817 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 72.849800][ T31] audit: type=1400 audit(72.770:115): avc: denied { write } for pid=3828 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 80.650382][ T31] audit: type=1400 audit(80.570:116): avc: denied { create } for pid=3874 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 80.784348][ T3875] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 80.787882][ T31] audit: type=1400 audit(80.700:117): avc: denied { create } for pid=3874 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 80.799216][ T31] audit: type=1400 audit(80.720:118): avc: denied { create } for pid=3874 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 80.808126][ T31] audit: type=1400 audit(80.720:119): avc: denied { getopt } for pid=3874 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 80.808644][ T31] audit: type=1400 audit(80.720:120): avc: denied { lock } for pid=3874 comm="syz.0.23" path="socket:[1815]" dev="sockfs" ino=1815 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 82.507534][ T31] audit: type=1400 audit(82.430:121): avc: denied { execute } for pid=3896 comm="syz.0.32" path="/sys/kernel/profiling" dev="sysfs" ino=744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=file permissive=1 [ 86.447644][ T31] audit: type=1400 audit(86.370:122): avc: denied { create } for pid=3910 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.458783][ T31] audit: type=1400 audit(86.380:123): avc: denied { setopt } for pid=3910 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.462446][ T3915] batadv_slave_0: entered promiscuous mode [ 86.493546][ T31] audit: type=1400 audit(86.410:124): avc: denied { prog_load } for pid=3910 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.497162][ T31] audit: type=1400 audit(86.410:125): avc: denied { bpf } for pid=3910 comm="syz.1.36" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 86.499187][ T31] audit: type=1400 audit(86.420:126): avc: denied { perfmon } for pid=3910 comm="syz.1.36" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 86.533785][ T31] audit: type=1400 audit(86.450:127): avc: denied { prog_run } for pid=3910 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.543919][ T3910] batadv_slave_0: left promiscuous mode [ 86.859585][ T31] audit: type=1400 audit(86.780:128): avc: denied { getopt } for pid=3916 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 88.474969][ T31] audit: type=1400 audit(88.380:129): avc: denied { ioctl } for pid=3926 comm="syz.1.41" path="socket:[1889]" dev="sockfs" ino=1889 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.556898][ T31] audit: type=1400 audit(88.460:130): avc: denied { mounton } for pid=3926 comm="syz.1.41" path="/15/file0" dev="tmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 88.615460][ T31] audit: type=1400 audit(88.530:131): avc: denied { shutdown } for pid=3926 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.683923][ T3927] netlink: 24 bytes leftover after parsing attributes in process `syz.1.41'. [ 90.414119][ T3947] FAULT_INJECTION: forcing a failure. [ 90.414119][ T3947] name failslab, interval 1, probability 0, space 0, times 1 [ 90.415685][ T3947] CPU: 0 UID: 0 PID: 3947 Comm: syz.0.43 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 90.416190][ T3947] Hardware name: ARM-Versatile Express [ 90.416508][ T3947] Call trace: [ 90.417438][ T3947] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 90.419972][ T3947] r7:00000d40 r6:00000000 r5:60000013 r4:82257d54 [ 90.420396][ T3947] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 90.420916][ T3947] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 90.421040][ T3947] r5:85336c00 r4:8291bcc0 [ 90.421060][ T3947] [<80220048>] (dump_stack) from [<8095f6d8>] (should_fail_ex+0x1c4/0x228) [ 90.421207][ T3947] [<8095f514>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 90.421358][ T3947] r8:85336c00 r7:00000d40 r6:84d30028 r5:00000011 r4:83001240 [ 90.421382][ T3947] [<80525658>] (should_failslab) from [<8050a4b8>] (__kmalloc_noprof+0x9c/0x458) [ 90.421828][ T3947] [<8050a41c>] (__kmalloc_noprof) from [<807bc26c>] (tomoyo_encode2+0x64/0xf0) [ 90.422316][ T3947] r10:00000fff r9:85590400 r8:00000000 r7:84884d48 r6:84d30028 r5:854b0ffc [ 90.422491][ T3947] r4:854b0ff6 [ 90.422621][ T3947] [<807bc208>] (tomoyo_encode2) from [<807bc31c>] (tomoyo_encode+0x24/0x30) [ 90.422744][ T3947] r9:85590400 r8:00000000 r7:84884d48 r6:84d30028 r5:00001000 r4:854b0ff7 [ 90.422953][ T3947] [<807bc2f8>] (tomoyo_encode) from [<807bc3a8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 90.423066][ T3947] r5:00001000 r4:854b0000 [ 90.423088][ T3947] [<807bc328>] (tomoyo_realpath_from_path) from [<807b8758>] (tomoyo_check_open_permission+0x150/0x1c0) [ 90.423407][ T3947] r10:84d30000 r9:00000002 r8:84d894c0 r7:00020c01 r6:00000000 r5:84d30028 [ 90.423768][ T3947] r4:00000001 r3:00000001 [ 90.423887][ T3947] [<807b8608>] (tomoyo_check_open_permission) from [<807bd20c>] (tomoyo_file_open+0x34/0x38) [ 90.424078][ T3947] r9:00000000 r8:84d30028 r7:00000000 r6:83536000 r5:81ccd4d4 r4:84d30000 [ 90.424172][ T3947] [<807bd1d8>] (tomoyo_file_open) from [<8077a548>] (security_file_open+0x54/0x194) [ 90.424292][ T3947] r5:81ccd4d4 r4:84d30000 [ 90.424455][ T3947] [<8077a4f4>] (security_file_open) from [<8054c534>] (do_dentry_open+0xe8/0x630) [ 90.424634][ T3947] r5:81ccd4d4 r4:84d30000 [ 90.425070][ T3947] [<8054c44c>] (do_dentry_open) from [<8054e298>] (vfs_open+0x2c/0xe8) [ 90.425650][ T3947] r8:e48d1e58 r7:00000000 r6:84d30028 r5:829225e0 r4:84d30000 [ 90.425908][ T3947] [<8054e26c>] (vfs_open) from [<80566f70>] (path_openat+0x7e0/0x11a0) [ 90.426011][ T3947] r6:e48d1f20 r5:829225e0 r4:00020c01 [ 90.426031][ T3947] [<80566790>] (path_openat) from [<805679dc>] (do_filp_open+0xac/0x148) [ 90.426115][ T3947] r10:00000142 r9:8324d000 r8:00000001 r7:e48d1e58 r6:e48d1f20 r5:85336c00 [ 90.426137][ T3947] r4:ffffff9c [ 90.426155][ T3947] [<80567930>] (do_filp_open) from [<8054e79c>] (do_sys_openat2+0x90/0xe0) [ 90.426223][ T3947] r9:85336c00 r8:8020029c r7:ffffff9c r6:e48d1f58 r5:8324d000 r4:00000006 [ 90.426243][ T3947] [<8054e70c>] (do_sys_openat2) from [<8054ebc4>] (sys_openat+0x98/0xd4) [ 90.426335][ T3947] r7:00000142 r6:0012fee0 r5:20000000 r4:ffffff9c [ 90.426357][ T3947] [<8054eb2c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.426494][ T3947] Exception stack(0xe48d1fa8 to 0xe48d1ff0) [ 90.426762][ T3947] 1fa0: 00000000 00000000 ffffff9c 20000000 00020c01 00000000 [ 90.426824][ T3947] 1fc0: 00000000 00000000 0012fee0 00000142 002d0000 00000000 00006364 76ba30bc [ 90.426856][ T3947] 1fe0: 76ba2ec0 76ba2eb0 0001939c 00131f30 [ 90.426926][ T3947] r5:00000000 r4:00000000 [ 90.471638][ T3947] ERROR: Out of memory at tomoyo_realpath_from_path. [ 91.650678][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 91.651357][ T31] audit: type=1400 audit(91.570:139): avc: denied { create } for pid=3958 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 93.639546][ T31] audit: type=1400 audit(93.560:140): avc: denied { write } for pid=3964 comm="syz.1.48" name="psched" dev="proc" ino=4026532671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 93.654429][ T31] audit: type=1400 audit(93.570:141): avc: denied { setattr } for pid=3964 comm="syz.1.48" name="SMC" dev="sockfs" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 96.322629][ T31] audit: type=1400 audit(96.240:142): avc: denied { create } for pid=3987 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.496522][ T31] audit: type=1400 audit(96.410:143): avc: denied { shutdown } for pid=3991 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 96.509196][ T31] audit: type=1400 audit(96.430:144): avc: denied { getopt } for pid=3991 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 96.513373][ T31] audit: type=1400 audit(96.430:145): avc: denied { setopt } for pid=3991 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 96.661510][ T31] audit: type=1400 audit(96.580:146): avc: denied { setopt } for pid=3991 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 97.254127][ T31] audit: type=1400 audit(97.170:147): avc: denied { listen } for pid=3995 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.413991][ T31] audit: type=1400 audit(97.330:148): avc: denied { ioctl } for pid=3995 comm="syz.1.56" path="socket:[1954]" dev="sockfs" ino=1954 ioctlcmd=0x5401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.926998][ T31] audit: type=1400 audit(97.840:149): avc: denied { bind } for pid=3995 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 98.820435][ T31] audit: type=1400 audit(98.740:150): avc: denied { map_create } for pid=4007 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.872274][ T4011] FAULT_INJECTION: forcing a failure. [ 98.872274][ T4011] name failslab, interval 1, probability 0, space 0, times 0 [ 98.873779][ T4011] CPU: 1 UID: 0 PID: 4011 Comm: syz.0.58 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 98.873945][ T4011] Hardware name: ARM-Versatile Express [ 98.874127][ T4011] Call trace: [ 98.874294][ T4011] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 98.874862][ T4011] r7:83a98000 r6:00000000 r5:60000013 r4:82257d54 [ 98.874912][ T4011] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 98.874944][ T4011] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 98.874978][ T4011] r5:83a98000 r4:8291bcc0 [ 98.874986][ T4011] [<80220048>] (dump_stack) from [<8095f6d8>] (should_fail_ex+0x1c4/0x228) [ 98.875015][ T4011] [<8095f514>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 98.875050][ T4011] r8:00000000 r7:83a98000 r6:00000dc0 r5:85570480 r4:830a8540 [ 98.875059][ T4011] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 98.875086][ T4011] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<80779340>] (security_file_alloc+0x30/0x1dc) [ 98.875129][ T4011] r10:00000142 r9:83894000 r8:82805c40 r7:833d4e80 r6:00000002 r5:85570480 [ 98.875145][ T4011] r4:85570480 [ 98.875153][ T4011] [<80779310>] (security_file_alloc) from [<80553828>] (init_file+0x48/0x110) [ 98.875181][ T4011] r5:85570480 r4:85570480 [ 98.875189][ T4011] [<805537e0>] (init_file) from [<80553f70>] (alloc_empty_file+0x68/0x13c) [ 98.875218][ T4011] r7:833d4e80 r6:00000002 r5:85570480 r4:8245d828 [ 98.875226][ T4011] [<80553f08>] (alloc_empty_file) from [<805667d0>] (path_openat+0x40/0x11a0) [ 98.875258][ T4011] r8:dfb81e58 r7:dfb81e58 r6:dfb81f20 r5:83a98000 r4:00000004 [ 98.875266][ T4011] [<80566790>] (path_openat) from [<805679dc>] (do_filp_open+0xac/0x148) [ 98.875299][ T4011] r10:00000142 r9:83894000 r8:00000001 r7:dfb81e58 r6:dfb81f20 r5:83a98000 [ 98.875308][ T4011] r4:00000004 [ 98.875315][ T4011] [<80567930>] (do_filp_open) from [<8054e79c>] (do_sys_openat2+0x90/0xe0) [ 98.875347][ T4011] r9:83a98000 r8:8020029c r7:00000004 r6:dfb81f58 r5:83894000 r4:00000006 [ 98.875355][ T4011] [<8054e70c>] (do_sys_openat2) from [<8054ebc4>] (sys_openat+0x98/0xd4) [ 98.875395][ T4011] r7:00000142 r6:0012fee0 r5:20000000 r4:00000004 [ 98.875403][ T4011] [<8054eb2c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 98.875468][ T4011] Exception stack(0xdfb81fa8 to 0xdfb81ff0) [ 98.875567][ T4011] 1fa0: 00000000 00000000 00000004 20000000 00000002 00000000 [ 98.875593][ T4011] 1fc0: 00000000 00000000 0012fee0 00000142 002d0000 00000000 00006364 76ba30bc [ 98.875606][ T4011] 1fe0: 76ba2ec0 76ba2eb0 0001939c 00131f30 [ 98.875637][ T4011] r5:00000000 r4:00000000 [ 99.090469][ T31] audit: type=1400 audit(99.010:151): avc: denied { allowed } for pid=4015 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 99.106682][ T31] audit: type=1400 audit(99.020:152): avc: denied { create } for pid=4015 comm="syz.0.60" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.024734][ T31] audit: type=1400 audit(99.940:153): avc: denied { write } for pid=4020 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.120826][ T4023] FAULT_INJECTION: forcing a failure. [ 100.120826][ T4023] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 100.121424][ T4023] CPU: 0 UID: 0 PID: 4023 Comm: syz.1.63 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 100.121487][ T4023] Hardware name: ARM-Versatile Express [ 100.121596][ T4023] Call trace: [ 100.121661][ T4023] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 100.122116][ T4023] r7:dfa89e20 r6:00000000 r5:60000013 r4:82257d54 [ 100.122181][ T4023] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 100.122277][ T4023] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 100.122369][ T4023] r5:83a9b000 r4:82951710 [ 100.122441][ T4023] [<80220048>] (dump_stack) from [<8095f6d8>] (should_fail_ex+0x1c4/0x228) [ 100.122530][ T4023] [<8095f514>] (should_fail_ex) from [<8095f750>] (should_fail+0x14/0x18) [ 100.122634][ T4023] r8:00000001 r7:dfa89e20 r6:20000280 r5:00000000 r4:dfa89f20 [ 100.122720][ T4023] [<8095f73c>] (should_fail) from [<8095f770>] (should_fail_usercopy+0x1c/0x20) [ 100.122775][ T4023] [<8095f754>] (should_fail_usercopy) from [<8151c210>] (copy_msghdr_from_user+0x50/0x130) [ 100.122899][ T4023] [<8151c1c0>] (copy_msghdr_from_user) from [<8151c368>] (___sys_sendmsg+0x78/0xd0) [ 100.123051][ T4023] r8:00000001 r7:00000000 r6:848cb180 r5:dfa89f20 r4:dfa89e64 [ 100.123103][ T4023] [<8151c2f0>] (___sys_sendmsg) from [<8151c81c>] (__sys_sendmsg+0x8c/0xd8) [ 100.123200][ T4023] r10:00000128 r9:83a9b000 r8:84d30c00 r7:00000001 r6:20000280 r5:84d30c01 [ 100.123289][ T4023] r4:00000003 [ 100.123433][ T4023] [<8151c790>] (__sys_sendmsg) from [<8151c87c>] (sys_sendmsg+0x14/0x18) [ 100.123518][ T4023] r8:8020029c r7:00000128 r6:0012fee0 r5:00000000 r4:00000000 [ 100.123574][ T4023] [<8151c868>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 100.123656][ T4023] Exception stack(0xdfa89fa8 to 0xdfa89ff0) [ 100.123750][ T4023] 9fa0: 00000000 00000000 00000003 20000280 00000001 00000000 [ 100.123889][ T4023] 9fc0: 00000000 00000000 0012fee0 00000128 002d0000 00000000 00006364 76bf10bc [ 100.123975][ T4023] 9fe0: 76bf0ec0 76bf0eb0 0001939c 00131f30 [ 100.141556][ T31] audit: type=1400 audit(100.060:154): avc: denied { ioctl } for pid=4015 comm="syz.0.60" path="socket:[1997]" dev="sockfs" ino=1997 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.420751][ T31] audit: type=1400 audit(100.340:155): avc: denied { setattr } for pid=4027 comm="syz.0.65" path="socket:[2006]" dev="sockfs" ino=2006 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 102.736193][ C0] hrtimer: interrupt took 575920 ns [ 103.618646][ T31] audit: type=1400 audit(103.540:156): avc: denied { getopt } for pid=4049 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.438155][ T31] audit: type=1400 audit(104.360:157): avc: denied { read } for pid=4038 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.651310][ T4052] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4052 comm=syz.0.71 [ 105.824302][ T31] audit: type=1400 audit(105.740:158): avc: denied { create } for pid=4070 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 105.841174][ T31] audit: type=1400 audit(105.760:159): avc: denied { append } for pid=4070 comm="syz.1.80" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 105.849251][ T31] audit: type=1400 audit(105.770:160): avc: denied { ioctl } for pid=4070 comm="syz.1.80" path="socket:[2948]" dev="sockfs" ino=2948 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 107.274289][ T31] audit: type=1400 audit(107.190:161): avc: denied { create } for pid=4089 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 107.292235][ T31] audit: type=1400 audit(107.210:162): avc: denied { bind } for pid=4089 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 107.294490][ T31] audit: type=1400 audit(107.210:163): avc: denied { connect } for pid=4089 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 108.470187][ T31] audit: type=1400 audit(108.390:164): avc: denied { create } for pid=4101 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 108.993680][ T31] audit: type=1400 audit(108.910:165): avc: denied { write } for pid=4101 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.452442][ T4111] fuse: Bad value for 'rootmode' [ 111.003604][ T31] audit: type=1400 audit(110.920:166): avc: denied { name_bind } for pid=4123 comm="syz.0.99" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 111.085868][ T31] audit: type=1400 audit(111.000:167): avc: denied { ioctl } for pid=4125 comm="syz.0.100" path="socket:[3033]" dev="sockfs" ino=3033 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 118.154210][ T31] audit: type=1400 audit(118.070:168): avc: denied { shutdown } for pid=4158 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 121.730546][ T31] audit: type=1400 audit(121.650:169): avc: denied { connect } for pid=4178 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 121.765292][ T31] audit: type=1400 audit(121.680:170): avc: denied { listen } for pid=4178 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.179094][ T31] audit: type=1400 audit(122.100:171): avc: denied { read } for pid=4187 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 122.202043][ T31] audit: type=1400 audit(122.120:172): avc: denied { setattr } for pid=4195 comm="syz.1.122" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.217959][ T31] audit: type=1400 audit(122.140:173): avc: denied { create } for pid=4195 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.225542][ T31] audit: type=1400 audit(122.140:174): avc: denied { accept } for pid=4195 comm="syz.1.122" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.230646][ T4188] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 122.232921][ T31] audit: type=1400 audit(122.150:175): avc: denied { create } for pid=4195 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 122.643901][ T4211] Zero length message leads to an empty skb [ 124.573222][ T31] audit: type=1400 audit(124.490:176): avc: denied { setattr } for pid=4218 comm="syz.0.128" name="pfkey" dev="proc" ino=4026532823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 126.079250][ T31] audit: type=1400 audit(126.000:177): avc: denied { getopt } for pid=4229 comm="syz.1.131" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.143702][ T31] audit: type=1400 audit(126.060:178): avc: granted { setsecparam } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 126.147111][ T31] audit: type=1400 audit(126.060:179): avc: granted { setsecparam } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 126.151313][ T31] audit: type=1400 audit(126.070:180): avc: granted { setsecparam } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 126.155612][ T31] audit: type=1400 audit(126.070:181): avc: granted { setsecparam } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 126.165034][ T31] audit: type=1400 audit(126.080:182): avc: granted { setsecparam } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 126.354405][ T31] audit: type=1400 audit(126.270:183): avc: denied { create } for pid=4232 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 130.441807][ T31] audit: type=1400 audit(130.360:184): avc: denied { ioctl } for pid=4254 comm="syz.1.138" path="socket:[4364]" dev="sockfs" ino=4364 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 130.686732][ T31] audit: type=1400 audit(130.600:185): avc: denied { setopt } for pid=4261 comm="syz.1.141" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.266632][ T31] audit: type=1400 audit(135.180:186): avc: denied { create } for pid=4291 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.270390][ T31] audit: type=1400 audit(135.190:187): avc: denied { shutdown } for pid=4291 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.281257][ T31] audit: type=1400 audit(135.200:188): avc: denied { setopt } for pid=4291 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.293631][ T31] audit: type=1400 audit(135.210:189): avc: denied { getopt } for pid=4291 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.300082][ T31] audit: type=1400 audit(135.220:190): avc: denied { accept } for pid=4291 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 135.320433][ T31] audit: type=1400 audit(135.240:191): avc: denied { ioctl } for pid=4291 comm="syz.0.151" path="socket:[4431]" dev="sockfs" ino=4431 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 137.744003][ T31] audit: type=1400 audit(137.660:192): avc: denied { setopt } for pid=4309 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 137.757981][ T31] audit: type=1400 audit(137.680:193): avc: denied { getopt } for pid=4309 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 137.782165][ T31] audit: type=1400 audit(137.700:194): avc: denied { listen } for pid=4309 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 143.441116][ T31] audit: type=1400 audit(143.360:195): avc: denied { map_read map_write } for pid=4344 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 145.701539][ T31] audit: type=1400 audit(145.620:196): avc: denied { write } for pid=4352 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 149.634378][ T31] audit: type=1400 audit(149.550:197): avc: denied { getopt } for pid=4383 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 150.458531][ T4392] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 150.459039][ T4392] audit: out of memory in audit_log_start [ 151.698077][ T31] audit: type=1400 audit(151.620:198): avc: denied { ioctl } for pid=4403 comm="syz.1.184" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3610 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 151.979070][ T31] audit: type=1400 audit(151.900:199): avc: denied { read } for pid=4408 comm="syz.1.186" path="socket:[4581]" dev="sockfs" ino=4581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 152.434107][ T4416] input: syz0 as /devices/virtual/input/input3 [ 153.230530][ T31] audit: type=1400 audit(153.150:200): avc: denied { setattr } for pid=4439 comm="syz.1.197" path="socket:[4620]" dev="sockfs" ino=4620 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 153.254840][ T31] audit: type=1400 audit(153.170:201): avc: denied { create } for pid=4439 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 158.213326][ T31] audit: type=1400 audit(158.130:202): avc: denied { create } for pid=4467 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 158.223455][ T31] audit: type=1400 audit(158.140:203): avc: denied { write } for pid=4467 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 158.225058][ T31] audit: type=1400 audit(158.140:204): avc: denied { nlmsg_read } for pid=4467 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 164.992531][ T31] audit: type=1400 audit(164.910:205): avc: denied { accept } for pid=4495 comm="syz.0.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 168.152210][ T4504] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4504 comm=syz.0.221 [ 176.274469][ T31] audit: type=1400 audit(176.190:206): avc: denied { name_bind } for pid=4594 comm="syz.1.231" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 176.321026][ T31] audit: type=1400 audit(176.240:207): avc: denied { write } for pid=4594 comm="syz.1.231" path="socket:[4759]" dev="sockfs" ino=4759 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 176.461158][ T31] audit: type=1400 audit(176.380:208): avc: denied { nlmsg_read } for pid=4599 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 183.119135][ T31] audit: type=1400 audit(183.040:209): avc: denied { ioctl } for pid=4639 comm="syz.0.246" path="socket:[4043]" dev="sockfs" ino=4043 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 192.267529][ T31] audit: type=1400 audit(192.190:210): avc: denied { bind } for pid=4684 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 192.273150][ T31] audit: type=1400 audit(192.190:211): avc: denied { accept } for pid=4684 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 211.999328][ T4783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4783 comm=syz.0.284 [ 223.375273][ T31] audit: type=1400 audit(223.290:212): avc: denied { shutdown } for pid=4827 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 224.868565][ T4833] syz.0.296 uses obsolete (PF_INET,SOCK_PACKET) [ 224.868818][ T31] audit: type=1400 audit(224.790:213): avc: denied { shutdown } for pid=4832 comm="syz.0.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.873163][ T31] audit: type=1400 audit(224.790:214): avc: denied { ioctl } for pid=4832 comm="syz.0.296" path="socket:[5386]" dev="sockfs" ino=5386 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 225.202735][ T31] audit: type=1400 audit(225.120:215): avc: denied { read } for pid=4844 comm="syz.0.301" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 225.203434][ T31] audit: type=1400 audit(225.120:216): avc: denied { open } for pid=4844 comm="syz.0.301" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.856658][ T31] audit: type=1400 audit(228.770:217): avc: denied { ioctl } for pid=4866 comm="syz.0.309" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 234.481736][ T4897] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4897 comm=syz.0.320 [ 237.505199][ T31] audit: type=1400 audit(237.420:218): avc: denied { write } for pid=4903 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 239.021518][ T31] audit: type=1400 audit(238.940:219): avc: denied { map } for pid=4912 comm="syz.1.326" path="socket:[5510]" dev="sockfs" ino=5510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 239.522493][ T31] audit: type=1400 audit(239.440:220): avc: denied { write } for pid=4920 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 241.194751][ T31] audit: type=1400 audit(241.110:221): avc: denied { ioctl } for pid=4916 comm="syz.1.328" path="socket:[6210]" dev="sockfs" ino=6210 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 249.190688][ T4978] fuse: Bad value for 'rootmode' [ 249.213380][ T4978] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=4978 comm=syz.1.345 [ 249.427339][ T4980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4980 comm=syz.0.346 [ 249.443699][ T4980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4980 comm=syz.0.346 [ 250.551548][ T31] audit: type=1400 audit(250.470:222): avc: denied { create } for pid=4983 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 250.647879][ T31] audit: type=1400 audit(250.570:223): avc: denied { setopt } for pid=4983 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 251.253516][ T31] audit: type=1400 audit(251.170:224): avc: denied { bind } for pid=4983 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 253.514922][ T31] audit: type=1400 audit(253.430:225): avc: denied { getopt } for pid=5006 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 256.142085][ T31] audit: type=1400 audit(256.060:226): avc: denied { create } for pid=5020 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 256.150802][ T31] audit: type=1400 audit(256.070:227): avc: denied { write } for pid=5020 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 256.330931][ T31] audit: type=1400 audit(256.250:228): avc: denied { lock } for pid=5024 comm="syz.0.362" path="socket:[6368]" dev="sockfs" ino=6368 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 257.505334][ T31] audit: type=1400 audit(257.420:229): avc: denied { bind } for pid=5032 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 257.507690][ T31] audit: type=1400 audit(257.430:230): avc: denied { name_bind } for pid=5032 comm="syz.0.365" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 257.508093][ T31] audit: type=1400 audit(257.430:231): avc: denied { node_bind } for pid=5032 comm="syz.0.365" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 257.513605][ T31] audit: type=1400 audit(257.430:232): avc: denied { connect } for pid=5032 comm="syz.0.365" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 257.514089][ T31] audit: type=1400 audit(257.430:233): avc: denied { name_connect } for pid=5032 comm="syz.0.365" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 259.985131][ T5052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5052 comm=syz.0.372 [ 260.130912][ T31] audit: type=1400 audit(260.050:234): avc: denied { setopt } for pid=5055 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 260.901639][ T31] audit: type=1400 audit(260.820:235): avc: denied { create } for pid=5068 comm="syz.0.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 262.400336][ T5086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=279 sclass=netlink_route_socket pid=5086 comm=syz.1.384 [ 262.496469][ T31] audit: type=1400 audit(262.410:236): avc: denied { setopt } for pid=5087 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 262.562018][ T31] audit: type=1400 audit(262.480:237): avc: denied { create } for pid=5092 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 262.577752][ T31] audit: type=1400 audit(262.500:238): avc: denied { write } for pid=5092 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 264.618632][ T4570] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 264.788755][ T4570] usb 1-1: unable to get BOS descriptor or descriptor too short [ 264.793282][ T4570] usb 1-1: not running at top speed; connect to a high speed hub [ 264.800265][ T4570] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 264.800767][ T4570] usb 1-1: config 1 has 0 interfaces, different from the descriptor's value: 3 [ 264.812068][ T4570] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 264.812395][ T4570] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 264.812472][ T4570] usb 1-1: Product: syz [ 264.812559][ T4570] usb 1-1: Manufacturer: syz [ 264.812626][ T4570] usb 1-1: SerialNumber: syz [ 266.585689][ T5116] FAULT_INJECTION: forcing a failure. [ 266.585689][ T5116] name failslab, interval 1, probability 0, space 0, times 0 [ 266.587320][ T5116] CPU: 1 UID: 0 PID: 5116 Comm: syz.1.391 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 266.587396][ T5116] Hardware name: ARM-Versatile Express [ 266.587424][ T5116] Call trace: [ 266.587476][ T5116] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 266.587638][ T5116] r7:84520000 r6:00000000 r5:60000013 r4:82257d54 [ 266.587672][ T5116] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 266.587727][ T5116] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 266.587783][ T5116] r5:84520000 r4:8291bcc0 [ 266.587802][ T5116] [<80220048>] (dump_stack) from [<8095f6d8>] (should_fail_ex+0x1c4/0x228) [ 266.587893][ T5116] [<8095f514>] (should_fail_ex) from [<805256c4>] (should_failslab+0x6c/0x94) [ 266.587994][ T5116] r8:00000000 r7:84520000 r6:00000d40 r5:848c98d8 r4:830a8600 [ 266.588023][ T5116] [<80525658>] (should_failslab) from [<8050a134>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 266.588079][ T5116] [<8050a0e8>] (kmem_cache_alloc_noprof) from [<80774184>] (security_inode_alloc+0x30/0x1e8) [ 266.588146][ T5116] r10:848c99e0 r9:00000000 r8:00000000 r7:00000c40 r6:8309d800 r5:848c98d8 [ 266.588167][ T5116] r4:848c98d8 [ 266.588182][ T5116] [<80774154>] (security_inode_alloc) from [<80574edc>] (inode_init_always_gfp+0x188/0x1dc) [ 266.588262][ T5116] r5:00000000 r4:848c98d8 [ 266.588301][ T5116] [<80574d54>] (inode_init_always_gfp) from [<80578554>] (alloc_inode+0x40/0xcc) [ 266.588378][ T5116] r10:8309d800 r9:81c20700 r8:84fb0060 r7:830af250 r6:81c20644 r5:8309d800 [ 266.588402][ T5116] r4:848c98d8 r3:84520000 [ 266.588428][ T5116] [<80578514>] (alloc_inode) from [<8058ed6c>] (path_from_stashed+0xdc/0x308) [ 266.588512][ T5116] r7:830af250 r6:dfd51e84 r5:81c20700 r4:84fb0060 [ 266.588565][ T5116] [<8058ec90>] (path_from_stashed) from [<805a1770>] (open_namespace+0x44/0xbc) [ 266.588641][ T5116] r10:84520000 r9:00000003 r8:85643cc0 r7:848d9b80 r6:84520000 r5:00000000 [ 266.588662][ T5116] r4:0000894c [ 266.588680][ T5116] [<805a172c>] (open_namespace) from [<805a1804>] (open_related_ns+0x1c/0x20) [ 266.588747][ T5116] r6:84fb0000 r5:00000000 r4:0000894c [ 266.588768][ T5116] [<805a17e8>] (open_related_ns) from [<8151ab1c>] (sock_ioctl+0x37c/0x600) [ 266.588833][ T5116] [<8151a7a0>] (sock_ioctl) from [<8056b450>] (sys_ioctl+0x138/0xd84) [ 266.588894][ T5116] r9:00000003 r8:85643cc0 r7:00000000 r6:85643cc1 r5:00000000 r4:0000894c [ 266.588912][ T5116] [<8056b318>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 266.588962][ T5116] Exception stack(0xdfd51fa8 to 0xdfd51ff0) [ 266.589013][ T5116] 1fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 266.589071][ T5116] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76bf10bc [ 266.589122][ T5116] 1fe0: 76bf0ec0 76bf0eb0 0001939c 00131f30 [ 266.589182][ T5116] r10:00000036 r9:84520000 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 266.589206][ T5116] r4:00000000 [ 278.556984][ T4570] usb 1-1: USB disconnect, device number 2 [ 278.960692][ T31] audit: type=1400 audit(278.880:239): avc: denied { read } for pid=5174 comm="syz.0.410" dev="sockfs" ino=5860 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 279.898761][ T31] audit: type=1400 audit(279.820:240): avc: denied { read } for pid=5197 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 280.084776][ T31] audit: type=1400 audit(280.000:241): avc: denied { setopt } for pid=5205 comm="syz.0.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 295.056612][ T31] audit: type=1400 audit(294.970:242): avc: denied { setopt } for pid=5289 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 295.420055][ T31] audit: type=1400 audit(295.340:243): avc: denied { name_connect } for pid=5298 comm="syz.1.450" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 296.768025][ T5305] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 300.948016][ T5312] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.968680][ T5312] mmap: syz.0.454 (5312) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 316.042203][ T5330] input: syz0 as /devices/virtual/input/input4 [ 316.307640][ T31] audit: type=1400 audit(316.230:244): avc: denied { map } for pid=5340 comm="syz.1.462" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 316.311680][ T31] audit: type=1400 audit(316.230:245): avc: denied { read write } for pid=5340 comm="syz.1.462" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 317.337335][ T4580] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 317.497220][ T4580] usb 1-1: Using ep0 maxpacket: 8 [ 317.523740][ T4580] usb 1-1: config 16 has an invalid descriptor of length 0, skipping remainder of the config [ 317.524780][ T4580] usb 1-1: config 16 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 317.525037][ T4580] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 317.525166][ T4580] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 317.550444][ T4580] usbtmc 1-1:16.0: bulk endpoints not found [ 317.752799][ T4580] usb 1-1: USB disconnect, device number 3 [ 318.667843][ T5370] syzkaller1: entered promiscuous mode [ 318.677656][ T5370] syzkaller1: entered allmulticast mode [ 324.209203][ T31] audit: type=1326 audit(324.130:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7fc00000 [ 325.162702][ T31] audit: type=1326 audit(325.080:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.477" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef168 code=0x7fc00000 [ 325.426892][ T31] audit: type=1400 audit(325.340:248): avc: denied { bind } for pid=5401 comm="syz.0.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 325.430078][ T31] audit: type=1400 audit(325.340:249): avc: denied { name_bind } for pid=5401 comm="syz.0.478" src=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 325.432866][ T31] audit: type=1400 audit(325.340:250): avc: denied { node_bind } for pid=5401 comm="syz.0.478" src=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 325.435935][ T31] audit: type=1400 audit(325.350:251): avc: denied { setopt } for pid=5401 comm="syz.0.478" lport=28196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 325.733130][ T31] audit: type=1400 audit(325.650:252): avc: denied { nlmsg_write } for pid=5403 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 326.047860][ T31] audit: type=1400 audit(325.960:253): avc: denied { mount } for pid=5405 comm="syz.0.480" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 326.352162][ T4575] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 326.536546][ T4575] usb 1-1: Using ep0 maxpacket: 32 [ 326.552950][ T4575] usb 1-1: New USB device found, idVendor=041e, idProduct=400b, bcdDevice=3e.e7 [ 326.553198][ T4575] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 326.557760][ T4575] usb 1-1: config 0 descriptor?? [ 331.336985][ T4578] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 331.504430][ T4578] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 331.506903][ T4578] usb 2-1: config 0 interface 0 has no altsetting 0 [ 331.515539][ T4578] usb 2-1: New USB device found, idVendor=10fd, idProduct=1513, bcdDevice=7e.ce [ 331.517360][ T4578] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 331.517978][ T4578] usb 2-1: Product: syz [ 331.518391][ T4578] usb 2-1: Manufacturer: syz [ 331.518866][ T4578] usb 2-1: SerialNumber: syz [ 331.521242][ T4578] usb 2-1: config 0 descriptor?? [ 340.857598][ T4569] usb 1-1: USB disconnect, device number 4 [ 341.739684][ T4581] usb 2-1: USB disconnect, device number 2 [ 342.382648][ T31] audit: type=1400 audit(342.300:254): avc: denied { read } for pid=5444 comm="syz.1.485" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 342.385301][ T31] audit: type=1400 audit(342.300:255): avc: denied { open } for pid=5444 comm="syz.1.485" path="/236/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 342.399267][ T5451] block device autoloading is deprecated and will be removed. [ 342.428130][ T31] audit: type=1400 audit(342.350:256): avc: denied { ioctl } for pid=5444 comm="syz.1.485" path="/236/file0/file0" dev="fuse" ino=64 ioctlcmd=0x915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 347.376974][ T4569] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 347.536903][ T4569] usb 1-1: config 229 has an invalid descriptor of length 254, skipping remainder of the config [ 347.537289][ T4569] usb 1-1: config 229 has 0 interfaces, different from the descriptor's value: 1 [ 347.557157][ T4569] usb 1-1: New USB device found, idVendor=14aa, idProduct=022b, bcdDevice=56.19 [ 347.557536][ T4569] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 347.557624][ T4569] usb 1-1: Product: syz [ 347.557722][ T4569] usb 1-1: Manufacturer: syz [ 347.557808][ T4569] usb 1-1: SerialNumber: syz [ 348.822584][ T5464] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 348.824902][ T5464] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 349.027183][ T4569] usb 1-1: USB disconnect, device number 5 [ 349.206574][ T4581] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 349.361309][ T4581] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 349.362709][ T4581] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 349.365189][ T4581] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 358.985495][ T4581] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 358.987511][ T4581] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 358.988674][ T4581] usb 2-1: Product: syz [ 358.995243][ T4581] usb 2-1: can't set config #1, error -71 [ 359.001345][ T4581] usb 2-1: USB disconnect, device number 3 [ 359.331888][ T31] audit: type=1400 audit(359.250:257): avc: denied { listen } for pid=5510 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 359.580018][ T4578] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 359.738789][ T4578] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 359.740350][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 359.742835][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 359.743597][ T4578] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 359.744592][ T4578] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 359.745243][ T4578] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.749017][ T4578] usb 1-1: config 0 descriptor?? [ 360.170529][ T4578] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 360.175308][ T4578] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 360.940197][ T4569] usb 1-1: USB disconnect, device number 6 [ 361.607248][ T31] audit: type=1400 audit(361.520:258): avc: denied { connect } for pid=5540 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.609365][ T31] audit: type=1400 audit(361.530:259): avc: denied { setopt } for pid=5540 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.622815][ T31] audit: type=1400 audit(361.540:260): avc: denied { bind } for pid=5540 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.638505][ T31] audit: type=1400 audit(361.560:261): avc: denied { write } for pid=5540 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.653578][ T31] audit: type=1400 audit(361.570:262): avc: denied { read } for pid=5540 comm="syz.0.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 363.009652][ T5551] ip6tnl1: entered promiscuous mode [ 363.120522][ T31] audit: type=1400 audit(363.030:263): avc: denied { name_bind } for pid=5554 comm="syz.0.506" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 364.731398][ T54] block nbd0: Receive control failed (result -32) [ 366.656711][ T4569] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 366.786783][ T4578] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 366.813714][ T4569] usb 2-1: config 0 has an invalid interface number: 44 but max is 0 [ 366.813992][ T4569] usb 2-1: config 0 has no interface number 0 [ 366.827414][ T4569] usb 2-1: New USB device found, idVendor=04cb, idProduct=012d, bcdDevice=aa.5d [ 366.828144][ T4569] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 366.829255][ T4569] usb 2-1: Product: syz [ 366.829965][ T4569] usb 2-1: Manufacturer: syz [ 366.830657][ T4569] usb 2-1: SerialNumber: syz [ 366.887567][ T4569] usb 2-1: config 0 descriptor?? [ 367.089817][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 367.090235][ T4578] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 367.090322][ T4578] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 367.100330][ T4569] usb 2-1: USB disconnect, device number 4 [ 367.104639][ T4578] usb 1-1: config 0 descriptor?? [ 367.443180][ T4578] usbhid 1-1:0.0: can't add hid device: -71 [ 367.443733][ T4578] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 367.479672][ T4578] usb 1-1: USB disconnect, device number 7 [ 367.836779][ T4576] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 367.985434][ T4578] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 368.049151][ T4576] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 368.049393][ T4576] usb 2-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 368.049440][ T4576] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 368.049490][ T4576] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 52, changing to 9 [ 368.049550][ T4576] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8241, setting to 1024 [ 368.091388][ T4576] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 368.091649][ T4576] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 368.091723][ T4576] usb 2-1: Product: syz [ 368.091759][ T4576] usb 2-1: Manufacturer: syz [ 368.157627][ T4576] cdc_wdm 2-1:1.0: skipping garbage [ 368.157858][ T4576] cdc_wdm 2-1:1.0: skipping garbage [ 368.160599][ T4576] cdc_wdm 2-1:1.0: cdc-wdm0: USB WDM device [ 368.208475][ T4578] usb 1-1: Using ep0 maxpacket: 32 [ 368.228692][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 368.228925][ T4578] usb 1-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice= 0.40 [ 368.228975][ T4578] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 368.289113][ T4578] usb 1-1: config 0 descriptor?? [ 368.313895][ T4578] ldusb 1-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 368.336790][ T4578] ldusb 1-1:0.0: LD USB Device #1 now attached to major 180 minor 1 [ 368.717338][ T4578] usb 1-1: USB disconnect, device number 8 [ 368.719586][ T4578] ldusb 1-1:0.0: LD USB Device #1 now disconnected [ 369.120614][ T31] audit: type=1400 audit(369.040:264): avc: denied { create } for pid=5633 comm="syz.0.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 369.135215][ T31] audit: type=1400 audit(369.040:265): avc: denied { ioctl } for pid=5633 comm="syz.0.518" path="socket:[7391]" dev="sockfs" ino=7391 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 369.149614][ T5634] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 369.151414][ T5633] netdevsim netdevsim0 netdevsim0: left promiscuous mode [ 370.132162][ T4580] usb 2-1: USB disconnect, device number 5 [ 382.557515][ T31] audit: type=1400 audit(382.470:266): avc: denied { watch watch_reads } for pid=5684 comm="syz.1.532" path="/258" dev="tmpfs" ino=1345 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 382.571500][ T31] audit: type=1400 audit(382.490:267): avc: denied { execute } for pid=5684 comm="syz.1.532" path="/258/bus" dev="tmpfs" ino=1350 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 382.629260][ T31] audit: type=1400 audit(382.550:268): avc: denied { write } for pid=5686 comm="syz.1.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 384.071677][ T4578] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 384.340718][ T4578] usb 1-1: Using ep0 maxpacket: 16 [ 384.353464][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 384.355710][ T4578] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 384.355869][ T4578] usb 1-1: New USB device found, idVendor=05ac, idProduct=8241, bcdDevice= 0.00 [ 384.355980][ T4578] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.362532][ T4578] usb 1-1: config 0 descriptor?? [ 384.853960][ T4578] appleir 0003:05AC:8241.0002: unknown main item tag 0x0 [ 384.854941][ T4578] appleir 0003:05AC:8241.0002: unknown main item tag 0x0 [ 384.855055][ T4578] appleir 0003:05AC:8241.0002: unknown main item tag 0x0 [ 384.855154][ T4578] appleir 0003:05AC:8241.0002: unknown main item tag 0x0 [ 384.855246][ T4578] appleir 0003:05AC:8241.0002: unknown main item tag 0x0 [ 384.855656][ T4578] appleir 0003:05AC:8241.0002: No inputs registered, leaving [ 384.860308][ T4578] appleir 0003:05AC:8241.0002: hiddev0,hidraw0: USB HID v0.00 Device [HID 05ac:8241] on usb-dummy_hcd.0-1/input0 [ 385.177360][ T4578] usb 1-1: USB disconnect, device number 9 [ 385.324376][ T5717] 8<--- cut here --- [ 385.325056][ T5717] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 385.330239][ T31] audit: type=1400 audit(385.250:269): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 385.330517][ T31] audit: type=1400 audit(385.250:270): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 385.330647][ T31] audit: type=1400 audit(385.250:271): avc: denied { write } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 385.330771][ T31] audit: type=1400 audit(385.250:272): avc: denied { add_name } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 385.330889][ T31] audit: type=1400 audit(385.250:273): avc: denied { create } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 385.344665][ T5717] [0000000e] *pgd=85b50003, *pmd=df22f003 [ 385.351347][ T5717] Internal error: Oops: 205 [#1] SMP ARM [ 385.353977][ T5717] Modules linked in: [ 385.354581][ T5717] CPU: 1 UID: 0 PID: 5717 Comm: syz.1.538 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 385.355029][ T5717] Hardware name: ARM-Versatile Express [ 385.355446][ T5717] PC is at io_ring_buffers_peek+0x24/0x258 [ 385.355794][ T5717] LR is at io_buffers_peek+0x68/0x8c [ 385.356389][ T5717] pc : [<808896c0>] lr : [<80889e04>] psr: 20000013 [ 385.356851][ T5717] sp : dfb79d90 ip : dfb79dd8 fp : dfb79dd4 [ 385.357383][ T5717] r10: 00000362 r9 : 00000000 r8 : 85b43b40 [ 385.357860][ T5717] r7 : 85481a0c r6 : 85481a00 r5 : dfb79e14 r4 : 858f0000 [ 385.359490][ T5717] r3 : 00000001 r2 : 85481a0c r1 : dfb79e14 r0 : 858f0000 [ 385.367413][ T5717] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 385.374204][ T5717] Control: 30c5387d Table: 85582880 DAC: 00000000 [ 385.376682][ T5717] Register r0 information: slab io_kiocb start 858f0000 pointer offset 0 size 192 [ 385.393149][ T5717] Register r1 information: 2-page vmalloc region starting at 0xdfb78000 allocated at kernel_clone+0xac/0x3e4 [ 385.400362][ T5717] Register r2 information: slab kmalloc-256 start 85481a00 pointer offset 12 size 256 [ 385.406838][ T5717] Register r3 information: non-paged memory [ 385.416111][ T5717] Register r4 information: slab io_kiocb start 858f0000 pointer offset 0 size 192 [ 385.422817][ T5717] Register r5 information: 2-page vmalloc region starting at 0xdfb78000 allocated at kernel_clone+0xac/0x3e4 [ 385.436149][ T5717] Register r6 information: slab kmalloc-256 start 85481a00 pointer offset 0 size 256 [ 385.443042][ T5717] Register r7 information: slab kmalloc-256 start 85481a00 pointer offset 12 size 256 [ 385.456146][ T5717] Register r8 information: slab kmalloc-64 start 85b43b40 pointer offset 0 size 64 [ 385.457788][ T5717] Register r9 information: NULL pointer [ 385.458166][ T5717] Register r10 information: non-paged memory [ 385.458528][ T5717] Register r11 information: 2-page vmalloc region starting at 0xdfb78000 allocated at kernel_clone+0xac/0x3e4 [ 385.459951][ T5717] Register r12 information: 2-page vmalloc region starting at 0xdfb78000 allocated at kernel_clone+0xac/0x3e4 [ 385.460625][ T5717] Process syz.1.538 (pid: 5717, stack limit = 0xdfb78000) [ 385.461068][ T5717] Stack: (0xdfb79d90 to 0xdfb7a000) [ 385.461483][ T5717] 9d80: 81a4c394 8030cb14 84430100 00000001 [ 385.461622][ T31] audit: type=1400 audit(385.260:274): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 385.462606][ T31] audit: type=1400 audit(385.270:275): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 385.465079][ T5717] 9da0: 00010000 85481a0c 00000000 858f0000 dfb79e14 85481a00 85481a0c 00000000 [ 385.465536][ T5717] 9dc0: 80000001 00000362 dfb79dec dfb79dd8 80889e04 808896a8 83562500 858f0000 [ 385.467013][ T5717] 9de0: dfb79e54 dfb79df0 80893334 80889da8 00000000 dfb79dd8 85481a00 e621fe64 [ 385.468619][ T5717] 9e00: 00010001 00000001 84430128 00000000 00000000 85481a0c 00000000 00000000 [ 385.469106][ T5717] 9e20: 00010001 e621fe64 dfb79e54 858f0000 81cf0ca0 00000000 00000000 00000000 [ 385.469992][ T5717] 9e40: 80000001 84520000 dfb79e7c dfb79e58 80882314 8089308c 858f0000 80000001 [ 385.470446][ T5717] 9e60: 0000001b 81cf0b5c 85587600 00000000 dfb79ebc dfb79e80 80886de4 808822d4 [ 385.471217][ T5717] 9e80: 858f0240 858f0300 858f03c0 81cf0ca0 858f0540 84430000 858f006c 858f0000 [ 385.472072][ T5717] 9ea0: 85780000 00000000 00000000 84520000 dfb79f14 dfb79ec0 808878fc 80886da8 [ 385.472974][ T5717] 9ec0: 8088e2b8 81a4c338 dfb79f24 dfb79ed8 00000800 00000800 81cf0b5c 00000800 [ 385.473915][ T5717] 9ee0: 84430000 e621fe64 85587540 00000000 84430000 00003516 85587540 00000000 [ 385.475081][ T5717] 9f00: 84520000 00000000 dfb79fa4 dfb79f18 808883a4 808876fc ecac8b10 84430040 [ 385.475544][ T5717] 9f20: 00000000 00000000 81a50110 81a4ffe0 dfb79f54 dfb79f40 8026b438 8029ce24 [ 385.476479][ T5717] 9f40: dfb79fb0 40000000 dfb79f84 dfb79f58 802229dc 8026b3f4 00000000 8281d05c [ 385.477940][ T5717] 9f60: dfb79fb0 0014c490 ecac8b10 80222930 00000000 e621fe64 dfb79fac 00000000 [ 385.478630][ T5717] 9f80: 00000000 002e630c 000001aa 8020029c 84520000 000001aa 00000000 dfb79fa8 [ 385.480037][ T5717] 9fa0: 80200060 80888278 00000000 00000000 00000003 00003516 00000000 00000000 [ 385.480495][ T5717] 9fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76bf10bc [ 385.480959][ T5717] 9fe0: 76bf0ec0 76bf0eb0 0001939c 00131f30 60000010 00000003 00000000 00000000 [ 385.481810][ T5717] Call trace: [ 385.482101][ T5717] [<8088969c>] (io_ring_buffers_peek) from [<80889e04>] (io_buffers_peek+0x68/0x8c) [ 385.482789][ T5717] r10:00000362 r9:80000001 r8:00000000 r7:85481a0c r6:85481a00 r5:dfb79e14 [ 385.483728][ T5717] r4:858f0000 [ 385.483998][ T5717] [<80889d9c>] (io_buffers_peek) from [<80893334>] (io_recv+0x2b4/0x46c) [ 385.484508][ T5717] r5:858f0000 r4:83562500 [ 385.485281][ T5717] [<80893080>] (io_recv) from [<80882314>] (__io_issue_sqe+0x4c/0x1c0) [ 385.485784][ T5717] r10:84520000 r9:80000001 r8:00000000 r7:00000000 r6:00000000 r5:81cf0ca0 [ 385.486993][ T5717] r4:858f0000 [ 385.487525][ T5717] [<808822c8>] (__io_issue_sqe) from [<80886de4>] (io_issue_sqe+0x48/0x59c) [ 385.488768][ T5717] r9:00000000 r8:85587600 r7:81cf0b5c r6:0000001b r5:80000001 r4:858f0000 [ 385.489175][ T5717] [<80886d9c>] (io_issue_sqe) from [<808878fc>] (io_submit_sqes+0x20c/0x938) [ 385.489618][ T5717] r10:84520000 r9:00000000 r8:00000000 r7:85780000 r6:858f0000 r5:858f006c [ 385.490052][ T5717] r4:84430000 [ 385.490295][ T5717] [<808876f0>] (io_submit_sqes) from [<808883a4>] (sys_io_uring_enter+0x138/0x780) [ 385.491464][ T5717] r10:00000000 r9:84520000 r8:00000000 r7:85587540 r6:00003516 r5:84430000 [ 385.492599][ T5717] r4:00000000 [ 385.493009][ T5717] [<8088826c>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 385.493817][ T5717] Exception stack(0xdfb79fa8 to 0xdfb79ff0) [ 385.494152][ T5717] 9fa0: 00000000 00000000 00000003 00003516 00000000 00000000 [ 385.494994][ T5717] 9fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76bf10bc [ 385.495457][ T5717] 9fe0: 76bf0ec0 76bf0eb0 0001939c 00131f30 [ 385.496156][ T5717] r10:000001aa r9:84520000 r8:8020029c r7:000001aa r6:002e630c r5:00000000 [ 385.497054][ T5717] r4:00000000 [ 385.497815][ T5717] Code: e1a08002 e5912000 e50b2030 e1a05001 (e1d920be) [ 385.500386][ T5717] ---[ end trace 0000000000000000 ]--- [ 385.609875][ T5717] Kernel panic - not syncing: Fatal exception [ 385.612493][ T5717] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:02:53 Registers: info registers vcpu 0 CPU#0 R00=854b6000 R01=00000000 R02=00015180 R03=8033c2e8 R04=00023ab1 R05=80000000 R06=ec4d1a48 R07=ec4d1a88 R08=00000000 R09=00000000 R10=00000001 R11=ec4d1be4 R12=00000001 R13=ec4d1b08 R14=82824680 R15=807adb50 PSR=800f0013 N--- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=00000000 s03=00000000 d01=0000000000000000 s04=ef0cee00 s05=ef0cee00 d02=ef0cee00ef0cee00 s06=08040200 s07=80402000 d03=8040200008040200 s08=00000c00 s09=c0200c03 d04=c0200c0300000c00 s10=08040201 s11=80402000 d05=8040200008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=845792c8 R01=0000ec60 R02=00000001 R03=000021b9 R04=845792c8 R05=dddd8f00 R06=dddd8f00 R07=00000000 R08=00002151 R09=00000000 R10=00000001 R11=df805bdc R12=df805b58 R13=df805c00 R14=81a5bff4 R15=81723bac PSR=60010013 -ZC- A S svc32 s00=94080000 s01=04800203 d00=0480020394080000 s02=a4200800 s03=0006026c d01=0006026ca4200800 s04=ffffff02 s05=980303ff d02=980303ffffffff02 s06=0208000b s07=000ba003 d03=000ba0030208000b s08=a8030008 s09=0008000b d04=0008000ba8030008 s10=000bb003 s11=80828408 d05=80828408000bb003 s12=56b40280 s13=08060601 d06=0806060156b40280 s14=01000000 s15=000b8002 d07=000b800201000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000800 s33=56b60008 d16=56b6000800000800 s34=08000601 s35=ffff0201 d17=ffff020108000601 s36=0003ffff s37=6cc60008 d18=6cc600080003ffff s38=08000600 s39=06080020 d19=0608002008000600 s40=03180800 s41=ff020b80 d20=ff020b8003180800 s42=03ffffff s43=000b8803 d21=000b880303ffffff s44=90030008 s45=0980020b d22=0980020b90030008 s46=02098003 s47=80030280 d23=8003028002098003 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=daa9049f s53=a98f2041 d26=a98f2041daa9049f s54=8f65f15c s55=ce738e43 d27=ce738e438f65f15c s56=edb7367a s57=bcd876c8 d28=bcd876c8edb7367a s58=e2f7c245 s59=e8f0ebd1 d29=e8f0ebd1e2f7c245 s60=9215739c s61=c81ea9ac d30=c81ea9ac9215739c s62=4e616f58 s63=c633debd d31=c633debd4e616f58 FPSCR: 00000000