last executing test programs: 2.950561762s ago: executing program 1 (id=2061): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x804}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) unshare(0x2060600) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x3f, 0x8, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c40)={r2, &(0x7f0000000b80), 0x0}, 0x20) link(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000780)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 2.796435893s ago: executing program 0 (id=2062): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1, 0x0, 0x8000000000000}, 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000f80)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe50a10a000700014002020c600e41b0000900ac000a0501000000160012000a00ff150048035c3b61c1d67f6f94007134cf6efb8007a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x40080) 2.582447677s ago: executing program 1 (id=2063): r0 = syz_open_dev$usbmon(&(0x7f00000003c0), 0xec90, 0x20040) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x30000004}) syz_open_dev$usbfs(&(0x7f0000000240), 0x10, 0x80100) 2.463199765s ago: executing program 0 (id=2064): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00'}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x190da) 2.152849326s ago: executing program 1 (id=2065): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14, r0, 0x3141e0b2751b0f9b, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x68c5}, 0x80) 1.956322849s ago: executing program 0 (id=2066): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) syz_io_uring_submit(0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0x800001c, @multicast1}, {0x0, 0x17c1, 0x8}}}}}, 0x0) 1.78923516s ago: executing program 1 (id=2067): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x1000) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x664001) 1.629498661s ago: executing program 0 (id=2068): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000c40)="c10e020022003505d25a806f8c6394f90435fc60040011000a740100053582c137153e37024801", 0x27}], 0x3b, 0x0, 0x31}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002e000b12d25a80648c2594f90124fc60100c03400a000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.182548511s ago: executing program 1 (id=2069): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = syz_io_uring_setup(0x517, &(0x7f0000000100)={0x0, 0x15d2, 0x0, 0x2000000, 0x100003a6}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0, 0x10, 0x1}) io_uring_enter(r4, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) close_range(r0, r1, 0x0) 1.060384979s ago: executing program 0 (id=2070): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00'}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x190da) 533.498464ms ago: executing program 0 (id=2071): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00000010000106fcffffff8000000000000000", @ANYRES32=0x0, @ANYBLOB="30200200090000001c0012800b0001006d616373656300000c0002800500030009"], 0x3c}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 0s ago: executing program 1 (id=2072): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000100)={0x1d, r3}, 0x10) dup3(r1, r2, 0x0) kernel console output (not intermixed with test programs): 15995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 602.155190][ T7328] r8:04004001 r7:00000000 r6:8366cc80 r5:ed969f20 r4:ed969e64 [ 602.155206][ T7328] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 602.155273][ T7328] r10:00000128 r9:85918c00 r8:85e39240 r7:04004001 r6:200002c0 r5:85e39241 [ 602.155292][ T7328] r4:00000003 [ 602.155307][ T7328] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 602.155370][ T7328] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 602.155386][ T7328] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 602.155433][ T7328] Exception stack(0xed969fa8 to 0xed969ff0) [ 602.155468][ T7328] 9fa0: 00000000 00000000 00000003 200002c0 04004001 00000000 [ 602.155499][ T7328] 9fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f240bc [ 602.155524][ T7328] 9fe0: 76f23ec0 76f23eb0 0001929c 00132320 [ 609.265905][ T7366] FAULT_INJECTION: forcing a failure. [ 609.265905][ T7366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.266529][ T7366] CPU: 1 UID: 0 PID: 7366 Comm: syz.0.1132 Not tainted syzkaller #0 PREEMPT [ 609.266638][ T7366] Hardware name: ARM-Versatile Express [ 609.266672][ T7366] Call trace: [ 609.266726][ T7366] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 609.266864][ T7366] r7:000000ad r6:00000000 r5:60000013 r4:8229586c [ 609.266889][ T7366] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 609.266953][ T7366] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 609.267010][ T7366] r5:8591a400 r4:8294fc90 [ 609.267026][ T7366] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 609.267104][ T7366] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 609.267166][ T7366] r8:00000000 r7:000000ad r6:00000005 r5:76f23b58 r4:76f23be0 [ 609.267185][ T7366] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 609.267240][ T7366] [<809997a8>] (should_fail_usercopy) from [<8026b2ec>] (restore_altstack+0x34/0xf8) [ 609.267397][ T7366] [<8026b2b8>] (restore_altstack) from [<8022aaa8>] (sys_rt_sigreturn+0x64/0x74) [ 609.267911][ T7366] r5:76f23b58 r4:edb11fb0 [ 609.267942][ T7366] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 609.268027][ T7366] Exception stack(0xedb11fa8 to 0xedb11ff0) [ 609.268163][ T7366] 1fa0: 00000001 76f23f20 00000001 76f23f20 00000001 00000000 [ 609.268406][ T7366] 1fc0: 00000001 76f23f20 00000005 00000004 00300000 00000000 00006364 76f240bc [ 609.268654][ T7366] 1fe0: 00000158 76f23ed0 000d7fdc 001302b4 [ 609.268759][ T7366] r5:76f23f20 r4:00000001 [ 609.465333][ T29] audit: type=1400 audit(609.340:255): avc: denied { write } for pid=7374 comm="syz.0.1133" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 611.076855][ T7385] random: crng reseeded on system resumption [ 612.622448][ T29] audit: type=1400 audit(612.500:256): avc: denied { ioctl } for pid=7401 comm="syz.0.1141" path="socket:[14521]" dev="sockfs" ino=14521 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 615.468945][ T7414] FAULT_INJECTION: forcing a failure. [ 615.468945][ T7414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 615.470916][ T7414] CPU: 1 UID: 0 PID: 7414 Comm: syz.0.1145 Not tainted syzkaller #0 PREEMPT [ 615.471363][ T7414] Hardware name: ARM-Versatile Express [ 615.472832][ T7414] Call trace: [ 615.473223][ T7414] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 615.473487][ T7414] r7:76f23b78 r6:00000000 r5:60000013 r4:8229586c [ 615.473570][ T7414] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 615.474174][ T7414] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 615.474390][ T7414] r5:844f8c00 r4:8294fc90 [ 615.475624][ T7414] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 615.475757][ T7414] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 615.475828][ T7414] r8:b5003587 r7:76f23b78 r6:76f23b58 r5:edb61f58 r4:76f23b58 [ 615.475847][ T7414] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 615.477953][ T7414] [<809997a8>] (should_fail_usercopy) from [<8026a0c8>] (copy_siginfo_to_user+0x1c/0xa4) [ 615.478061][ T7414] [<8026a0ac>] (copy_siginfo_to_user) from [<8022ae08>] (do_work_pending+0x350/0x4d0) [ 615.478155][ T7414] r9:00000001 r8:b5003587 r7:844f9430 r6:76f23b58 r5:edb61fb0 r4:844f8c00 [ 615.478180][ T7414] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 615.478231][ T7414] Exception stack(0xedb61fb0 to 0xedb61ff8) [ 615.478287][ T7414] 1fa0: 00000001 76f23f20 00000001 00000000 [ 615.478325][ T7414] 1fc0: 00000001 76f23f20 00000006 00000004 00300000 00000000 00006364 76f240bc [ 615.478357][ T7414] 1fe0: 00000158 76f23ed0 000d7fdc 001302b4 40000010 00000006 [ 615.478515][ T7414] r10:00000004 r9:844f8c00 r8:8020029c r7:00000004 r6:00000006 r5:76f23f20 [ 615.478546][ T7414] r4:00000001 [ 625.267116][ T7459] FAULT_INJECTION: forcing a failure. [ 625.267116][ T7459] name failslab, interval 1, probability 0, space 0, times 0 [ 625.270954][ T7459] CPU: 1 UID: 0 PID: 7459 Comm: syz.0.1156 Not tainted syzkaller #0 PREEMPT [ 625.271101][ T7459] Hardware name: ARM-Versatile Express [ 625.271129][ T7459] Call trace: [ 625.271178][ T7459] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 625.271306][ T7459] r7:00000d40 r6:00000000 r5:60000013 r4:8229586c [ 625.271327][ T7459] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 625.271382][ T7459] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 625.271438][ T7459] r5:85918c00 r4:82918c48 [ 625.271456][ T7459] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 625.271525][ T7459] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 625.271605][ T7459] r8:00000000 r7:00000d40 r6:00000022 r5:8528bffc r4:83001240 [ 625.271627][ T7459] [<8053a334>] (should_failslab) from [<80514fac>] (__kmalloc_noprof+0x9c/0x568) [ 625.271692][ T7459] [<80514f10>] (__kmalloc_noprof) from [<807e3c80>] (tomoyo_encode2+0x64/0xf0) [ 625.271782][ T7459] r10:00000fff r9:830a6000 r8:00000000 r7:83434cc0 r6:85e397a8 r5:8528bffc [ 625.271804][ T7459] r4:8528bfe5 [ 625.271821][ T7459] [<807e3c1c>] (tomoyo_encode2) from [<807e3d30>] (tomoyo_encode+0x24/0x30) [ 625.271947][ T7459] r9:830a6000 r8:00000000 r7:83434cc0 r6:85e397a8 r5:00001000 r4:8528bfe6 [ 625.271967][ T7459] [<807e3d0c>] (tomoyo_encode) from [<807e3dbc>] (tomoyo_realpath_from_path+0x80/0x17c) [ 625.272030][ T7459] r5:00001000 r4:8528b000 [ 625.272048][ T7459] [<807e3d3c>] (tomoyo_realpath_from_path) from [<807dfebc>] (tomoyo_path_number_perm+0xcc/0x22c) [ 625.272122][ T7459] r10:85918c00 r9:00000000 r8:85e39780 r7:41015500 r6:00000004 r5:81cd6ac0 [ 625.272146][ T7459] r4:85e397a8 r3:826c2240 [ 625.272164][ T7459] [<807dfdf0>] (tomoyo_path_number_perm) from [<807e479c>] (tomoyo_file_ioctl+0x1c/0x20) [ 625.272233][ T7459] r9:00000004 r8:85e39780 r7:76f22e60 r6:76f22e60 r5:41015500 r4:85e39780 [ 625.272251][ T7459] [<807e4780>] (tomoyo_file_ioctl) from [<80790a08>] (security_file_ioctl+0x64/0x1e4) [ 625.272321][ T7459] [<807909a4>] (security_file_ioctl) from [<80585448>] (sys_ioctl+0x4c/0xba0) [ 625.272394][ T7459] r7:76f22e60 r6:85e39781 r5:76f22e70 r4:41015500 [ 625.272412][ T7459] [<805853fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 625.272461][ T7459] Exception stack(0xedfc9fa8 to 0xedfc9ff0) [ 625.272506][ T7459] 9fa0: 00000004 76f22e70 00000004 41015500 76f22e60 76f21e00 [ 625.272541][ T7459] 9fc0: 00000004 76f22e70 76f21e70 00000036 00000003 76f22e60 00440000 00000000 [ 625.272568][ T7459] 9fe0: 00000000 76f21de8 002e8000 00131cec [ 625.272605][ T7459] r10:00000036 r9:85918c00 r8:8020029c r7:00000036 r6:76f21e70 r5:76f22e70 [ 625.272627][ T7459] r4:00000004 [ 625.275611][ T7459] ERROR: Out of memory at tomoyo_realpath_from_path. [ 625.540227][ T3704] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 625.690002][ T3704] usb 1-1: Using ep0 maxpacket: 8 [ 625.702404][ T3704] usb 1-1: unable to get BOS descriptor or descriptor too short [ 625.711750][ T3704] usb 1-1: config 1 interface 0 has no altsetting 0 [ 625.718698][ T3704] usb 1-1: New USB device found, idVendor=172f, idProduct=0034, bcdDevice= 0.40 [ 625.720447][ T3704] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 625.730115][ T3704] usb 1-1: Product: syz [ 625.731115][ T3704] usb 1-1: Manufacturer: syz [ 625.731887][ T3704] usb 1-1: SerialNumber: syz [ 625.977355][ T3704] usbhid 1-1:1.0: can't add hid device: -71 [ 625.979806][ T3704] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 625.990737][ T3704] usb 1-1: USB disconnect, device number 18 [ 627.824014][ T29] audit: type=1400 audit(627.700:257): avc: denied { associate } for pid=7479 comm="syz.1.1159" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 632.180515][ T3704] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 632.360748][ T3704] usb 2-1: Using ep0 maxpacket: 8 [ 632.422540][ T3704] usb 2-1: unable to get BOS descriptor or descriptor too short [ 632.437260][ T3704] usb 2-1: config 1 interface 0 has no altsetting 0 [ 632.452226][ T3704] usb 2-1: New USB device found, idVendor=172f, idProduct=0034, bcdDevice= 0.40 [ 632.453690][ T3704] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 632.454728][ T3704] usb 2-1: Product: syz [ 632.455649][ T3704] usb 2-1: Manufacturer: syz [ 632.456710][ T3704] usb 2-1: SerialNumber: syz [ 632.695098][ T3704] usbhid 2-1:1.0: can't add hid device: -71 [ 632.696577][ T3704] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 632.705331][ T3704] usb 2-1: USB disconnect, device number 26 [ 638.557615][ T7555] FAULT_INJECTION: forcing a failure. [ 638.557615][ T7555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 638.563786][ T7555] CPU: 0 UID: 0 PID: 7555 Comm: syz.1.1180 Not tainted syzkaller #0 PREEMPT [ 638.563979][ T7555] Hardware name: ARM-Versatile Express [ 638.564010][ T7555] Call trace: [ 638.564060][ T7555] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 638.564344][ T7555] r7:ee595e20 r6:00000000 r5:60000013 r4:8229586c [ 638.564427][ T7555] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 638.564525][ T7555] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 638.564580][ T7555] r5:853ee000 r4:8294fc90 [ 638.564597][ T7555] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 638.564668][ T7555] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 638.564735][ T7555] r8:20008084 r7:ee595e20 r6:200000c0 r5:00000000 r4:ee595f20 [ 638.564920][ T7555] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 638.565052][ T7555] [<809997a8>] (should_fail_usercopy) from [<8159961c>] (copy_msghdr_from_user+0x50/0x130) [ 638.565130][ T7555] [<815995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 638.565202][ T7555] r8:20008084 r7:00000000 r6:8366d180 r5:ee595f20 r4:ee595e64 [ 638.565223][ T7555] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 638.565312][ T7555] r10:00000128 r9:853ee000 r8:85e39e40 r7:20008084 r6:200000c0 r5:85e39e41 [ 638.565336][ T7555] r4:00000003 [ 638.565356][ T7555] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 638.565437][ T7555] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 638.565457][ T7555] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 638.565507][ T7555] Exception stack(0xee595fa8 to 0xee595ff0) [ 638.565561][ T7555] 5fa0: 00000000 00000000 00000003 200000c0 20008084 00000000 [ 638.565604][ T7555] 5fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 638.565638][ T7555] 5fe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 641.593061][ T29] audit: type=1400 audit(641.470:258): avc: denied { map } for pid=7563 comm="syz.1.1184" path="/proc/1465/net/pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 644.528902][ T7582] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=7582 comm=syz.1.1191 [ 644.673006][ T7584] FAULT_INJECTION: forcing a failure. [ 644.673006][ T7584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 644.673678][ T7584] CPU: 1 UID: 0 PID: 7584 Comm: syz.1.1192 Not tainted syzkaller #0 PREEMPT [ 644.673772][ T7584] Hardware name: ARM-Versatile Express [ 644.673802][ T7584] Call trace: [ 644.673865][ T7584] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 644.674121][ T7584] r7:ee349e20 r6:00000000 r5:60000013 r4:8229586c [ 644.674164][ T7584] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 644.674234][ T7584] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 644.674305][ T7584] r5:8591b000 r4:8294fc90 [ 644.674325][ T7584] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 644.674424][ T7584] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 644.674552][ T7584] r8:00008800 r7:ee349e20 r6:20000240 r5:00000000 r4:ee349f20 [ 644.674578][ T7584] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 644.674636][ T7584] [<809997a8>] (should_fail_usercopy) from [<8159961c>] (copy_msghdr_from_user+0x50/0x130) [ 644.674709][ T7584] [<815995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 644.674928][ T7584] r8:00008800 r7:00000000 r6:854ac280 r5:ee349f20 r4:ee349e64 [ 644.675047][ T7584] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 644.675171][ T7584] r10:00000128 r9:8591b000 r8:85d87600 r7:00008800 r6:20000240 r5:85d87601 [ 644.675201][ T7584] r4:00000003 [ 644.675256][ T7584] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 644.675331][ T7584] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 644.675352][ T7584] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 644.675410][ T7584] Exception stack(0xee349fa8 to 0xee349ff0) [ 644.675455][ T7584] 9fa0: 00000000 00000000 00000003 20000240 00008800 00000000 [ 644.675495][ T7584] 9fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 644.675522][ T7584] 9fe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 647.284561][ T29] audit: type=1400 audit(647.160:259): avc: denied { getattr } for pid=7598 comm="syz.0.1199" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 654.666847][ T7674] FAULT_INJECTION: forcing a failure. [ 654.666847][ T7674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 654.674059][ T7674] CPU: 0 UID: 0 PID: 7674 Comm: syz.1.1218 Not tainted syzkaller #0 PREEMPT [ 654.674331][ T7674] Hardware name: ARM-Versatile Express [ 654.674368][ T7674] Call trace: [ 654.674424][ T7674] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 654.674586][ T7674] r7:20000400 r6:00000000 r5:60000013 r4:8229586c [ 654.674609][ T7674] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 654.674707][ T7674] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 654.674896][ T7674] r5:839f4800 r4:8294fc90 [ 654.674927][ T7674] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 654.675003][ T7674] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 654.675080][ T7674] r8:00000000 r7:20000400 r6:860a9d40 r5:00000000 r4:dfa41f20 [ 654.675104][ T7674] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 654.675164][ T7674] [<809997a8>] (should_fail_usercopy) from [<808d86c4>] (_copy_from_iter+0x6c/0x7d8) [ 654.675236][ T7674] [<808d8658>] (_copy_from_iter) from [<816c96c8>] (netlink_sendmsg+0x18c/0x444) [ 654.675402][ T7674] r10:00000000 r9:00000000 r8:dfa41f30 r7:853b2c00 r6:00000014 r5:85eaacc0 [ 654.675433][ T7674] r4:dfa41f20 [ 654.675508][ T7674] [<816c953c>] (netlink_sendmsg) from [<8159692c>] (__sock_sendmsg+0x44/0x78) [ 654.675594][ T7674] r10:00000000 r9:dfa41dc4 r8:dfa41dc4 r7:00000000 r6:854a7180 r5:dfa41f20 [ 654.675616][ T7674] r4:00000000 [ 654.675633][ T7674] [<815968e8>] (__sock_sendmsg) from [<81597874>] (____sys_sendmsg+0x298/0x2cc) [ 654.675696][ T7674] r7:00000000 r6:854a7180 r5:04004020 r4:dfa41f20 [ 654.675715][ T7674] [<815975dc>] (____sys_sendmsg) from [<81599798>] (___sys_sendmsg+0x9c/0xd0) [ 654.675793][ T7674] r10:dfa41e24 r9:20000480 r8:04004020 r7:00000000 r6:854a7180 r5:dfa41f20 [ 654.675821][ T7674] r4:00000000 [ 654.675841][ T7674] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 654.675958][ T7674] r10:00000128 r9:839f4800 r8:84e23900 r7:04004020 r6:20000480 r5:84e23901 [ 654.675992][ T7674] r4:00000004 [ 654.676041][ T7674] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 654.676135][ T7674] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 654.676158][ T7674] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 654.676215][ T7674] Exception stack(0xdfa41fa8 to 0xdfa41ff0) [ 654.676263][ T7674] 1fa0: 00000000 00000000 00000004 20000480 04004020 00000000 [ 654.676303][ T7674] 1fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 654.676336][ T7674] 1fe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 655.005884][ T7676] FAULT_INJECTION: forcing a failure. [ 655.005884][ T7676] name failslab, interval 1, probability 0, space 0, times 0 [ 655.007573][ T7676] CPU: 0 UID: 0 PID: 7676 Comm: syz.1.1219 Not tainted syzkaller #0 PREEMPT [ 655.007709][ T7676] Hardware name: ARM-Versatile Express [ 655.007741][ T7676] Call trace: [ 655.007787][ T7676] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 655.007907][ T7676] r7:00000cc0 r6:00000000 r5:60000013 r4:8229586c [ 655.007929][ T7676] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 655.007987][ T7676] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 655.008047][ T7676] r5:839f4800 r4:82918c48 [ 655.008069][ T7676] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 655.008154][ T7676] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 655.008236][ T7676] r8:00000000 r7:00000cc0 r6:0000000a r5:00000009 r4:83001240 [ 655.008260][ T7676] [<8053a334>] (should_failslab) from [<8051c128>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 655.008323][ T7676] [<8051c088>] (__kmalloc_node_track_caller_noprof) from [<804ac738>] (kstrdup+0x38/0x64) [ 655.008405][ T7676] r10:00000003 r9:85998000 r8:828f57c0 r7:8031f2d4 r6:dfbade90 r5:00000009 [ 655.008426][ T7676] r4:00000cc0 [ 655.008445][ T7676] [<804ac700>] (kstrdup) from [<8031f2d4>] (__request_module+0xfc/0x2c0) [ 655.008520][ T7676] r7:839f4800 r6:81595b60 r5:00000002 r4:85ebc580 [ 655.008540][ T7676] [<8031f1d8>] (__request_module) from [<81595b60>] (__sock_create+0x144/0x228) [ 655.008615][ T7676] r3:00000000 r2:0000000b r1:8245a3b8 [ 655.008649][ T7676] r8:854a7400 r7:00000003 r6:8280ed68 r5:00000002 r4:0000000b [ 655.008672][ T7676] [<81595a1c>] (__sock_create) from [<81598500>] (__sys_socketpair+0x140/0x2ac) [ 655.008754][ T7676] r10:00000003 r9:839f4800 r8:00000000 r7:00000000 r6:0000000b r5:00000002 [ 655.008779][ T7676] r4:00000000 [ 655.008801][ T7676] [<815983c0>] (__sys_socketpair) from [<8159867c>] (sys_socketpair+0x10/0x14) [ 655.008877][ T7676] r10:00000120 r9:839f4800 r8:8020029c r7:00000120 r6:001302c8 r5:00000000 [ 655.008897][ T7676] r4:00000000 [ 655.008915][ T7676] [<8159866c>] (sys_socketpair) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 655.008966][ T7676] Exception stack(0xdfbadfa8 to 0xdfbadff0) [ 655.009008][ T7676] dfa0: 00000000 00000000 0000000b 00000002 00000003 200000c0 [ 655.009046][ T7676] dfc0: 00000000 00000000 001302c8 00000120 00300000 00000000 00006364 76f270bc [ 655.009086][ T7676] dfe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 656.784006][ T7692] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=7692 comm=syz.1.1226 [ 658.434903][ T7708] FAULT_INJECTION: forcing a failure. [ 658.434903][ T7708] name failslab, interval 1, probability 0, space 0, times 0 [ 658.437219][ T7708] CPU: 0 UID: 0 PID: 7708 Comm: syz.1.1231 Not tainted syzkaller #0 PREEMPT [ 658.437345][ T7708] Hardware name: ARM-Versatile Express [ 658.437369][ T7708] Call trace: [ 658.437410][ T7708] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 658.437530][ T7708] r7:00000c40 r6:00000000 r5:60000013 r4:8229586c [ 658.437628][ T7708] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 658.437686][ T7708] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 658.437787][ T7708] r5:839f2400 r4:82918c48 [ 658.437804][ T7708] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 658.437874][ T7708] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 658.437949][ T7708] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 658.437964][ T7708] [<8053a334>] (should_failslab) from [<80514fac>] (__kmalloc_noprof+0x9c/0x568) [ 658.438020][ T7708] [<80514f10>] (__kmalloc_noprof) from [<807e3d78>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 658.438104][ T7708] r10:839f2400 r9:83321000 r8:00000000 r7:8362c440 r6:8596df28 r5:00001000 [ 658.438123][ T7708] r4:00000000 [ 658.438289][ T7708] [<807e3d3c>] (tomoyo_realpath_from_path) from [<807dfebc>] (tomoyo_path_number_perm+0xcc/0x22c) [ 658.438363][ T7708] r10:839f2400 r9:00000000 r8:8596df00 r7:40045567 r6:00000004 r5:81cd6ac0 [ 658.438386][ T7708] r4:8596df28 r3:826c2240 [ 658.438400][ T7708] [<807dfdf0>] (tomoyo_path_number_perm) from [<807e479c>] (tomoyo_file_ioctl+0x1c/0x20) [ 658.438465][ T7708] r9:00000003 r8:8596df00 r7:00000001 r6:00000001 r5:40045567 r4:8596df00 [ 658.438481][ T7708] [<807e4780>] (tomoyo_file_ioctl) from [<80790a08>] (security_file_ioctl+0x64/0x1e4) [ 658.438567][ T7708] [<807909a4>] (security_file_ioctl) from [<80585448>] (sys_ioctl+0x4c/0xba0) [ 658.438636][ T7708] r7:00000001 r6:8596df01 r5:00000000 r4:40045567 [ 658.438652][ T7708] [<805853fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 658.438696][ T7708] Exception stack(0xe010dfa8 to 0xe010dff0) [ 658.438736][ T7708] dfa0: 00000000 00000000 00000003 40045567 00000001 00000000 [ 658.438768][ T7708] dfc0: 00000000 00000000 001302c8 00000036 00300000 00000000 00006364 76f270bc [ 658.438793][ T7708] dfe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 658.438830][ T7708] r10:00000036 r9:839f2400 r8:8020029c r7:00000036 r6:001302c8 r5:00000000 [ 658.438849][ T7708] r4:00000000 [ 658.511649][ T7708] ERROR: Out of memory at tomoyo_realpath_from_path. [ 658.814883][ T29] audit: type=1400 audit(658.690:260): avc: denied { accept } for pid=7714 comm="syz.1.1234" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 662.085641][ T7740] FAULT_INJECTION: forcing a failure. [ 662.085641][ T7740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 662.086066][ T7740] CPU: 1 UID: 0 PID: 7740 Comm: syz.0.1240 Not tainted syzkaller #0 PREEMPT [ 662.086165][ T7740] Hardware name: ARM-Versatile Express [ 662.086194][ T7740] Call trace: [ 662.086302][ T7740] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 662.086426][ T7740] r7:76f22e60 r6:00000000 r5:60000013 r4:8229586c [ 662.086448][ T7740] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 662.086538][ T7740] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 662.086676][ T7740] r5:85919800 r4:8294fc90 [ 662.086717][ T7740] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 662.086807][ T7740] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 662.087096][ T7740] r8:85d87b40 r7:76f22e60 r6:85073000 r5:76f22e60 r4:00000101 [ 662.087136][ T7740] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 662.087281][ T7740] [<809997a8>] (should_fail_usercopy) from [<8109e744>] (raw_ioctl_init+0x40/0x354) [ 662.087597][ T7740] [<8109e704>] (raw_ioctl_init) from [<810a0080>] (raw_ioctl+0x3e4/0x1238) [ 662.087749][ T7740] r10:85919800 r9:00000004 r8:85d87b40 r7:76f22e60 r6:76f22e60 r5:00000000 [ 662.087883][ T7740] r4:85073000 [ 662.087907][ T7740] [<8109fc9c>] (raw_ioctl) from [<8058552c>] (sys_ioctl+0x130/0xba0) [ 662.088068][ T7740] r10:85919800 r9:00000004 r8:85d87b40 r7:76f22e60 r6:85d87b41 r5:00000000 [ 662.088261][ T7740] r4:41015500 [ 662.088331][ T7740] [<805853fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 662.088418][ T7740] Exception stack(0xe01a1fa8 to 0xe01a1ff0) [ 662.088803][ T7740] 1fa0: 00000004 76f22e70 00000004 41015500 76f22e60 76f21e00 [ 662.088895][ T7740] 1fc0: 00000004 76f22e70 76f21e70 00000036 00000003 76f22e60 00440000 00000000 [ 662.088945][ T7740] 1fe0: 00000000 76f21de8 002e8000 00131cec [ 662.088991][ T7740] r10:00000036 r9:85919800 r8:8020029c r7:00000036 r6:76f21e70 r5:76f22e70 [ 662.089038][ T7740] r4:00000004 [ 663.058002][ T29] audit: type=1400 audit(662.930:261): avc: denied { nlmsg_tty_audit } for pid=7744 comm="syz.0.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 664.060678][ T2885] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 664.210382][ T2885] usb 1-1: Using ep0 maxpacket: 8 [ 664.235233][ T2885] usb 1-1: unable to get BOS descriptor or descriptor too short [ 664.242272][ T2885] usb 1-1: config 1 interface 0 has no altsetting 0 [ 664.268391][ T2885] usb 1-1: New USB device found, idVendor=172f, idProduct=0034, bcdDevice= 0.40 [ 664.268768][ T2885] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 664.271795][ T2885] usb 1-1: Product: syz [ 664.272224][ T2885] usb 1-1: Manufacturer: syz [ 664.272435][ T2885] usb 1-1: SerialNumber: syz [ 664.555097][ T2885] usbhid 1-1:1.0: can't add hid device: -71 [ 664.555739][ T2885] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 664.571968][ T2885] usb 1-1: USB disconnect, device number 19 [ 667.082409][ T29] audit: type=1400 audit(666.950:262): avc: denied { name_bind } for pid=7787 comm="syz.0.1254" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 669.096098][ T7809] FAULT_INJECTION: forcing a failure. [ 669.096098][ T7809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 669.096361][ T7809] CPU: 1 UID: 0 PID: 7809 Comm: syz.0.1261 Not tainted syzkaller #0 PREEMPT [ 669.096447][ T7809] Hardware name: ARM-Versatile Express [ 669.096476][ T7809] Call trace: [ 669.096527][ T7809] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 669.096608][ T7809] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 669.096619][ T7809] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 669.096647][ T7809] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 669.096677][ T7809] r5:8591d400 r4:8294fc90 [ 669.096685][ T7809] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 669.096717][ T7809] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 669.096750][ T7809] r8:76f23f30 r7:00000000 r6:00000000 r5:ea589f68 r4:00000002 [ 669.096759][ T7809] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 669.096786][ T7809] [<809997a8>] (should_fail_usercopy) from [<805a6d98>] (simple_read_from_buffer+0x80/0x13c) [ 669.096830][ T7809] [<805a6d18>] (simple_read_from_buffer) from [<80624a8c>] (proc_fail_nth_read+0xb8/0x108) [ 669.097031][ T7809] r10:00000001 r9:806249d4 r8:00000002 r7:ea589f68 r6:0000000f r5:76f23f30 [ 669.097058][ T7809] r4:8591d400 r3:ea589e9f [ 669.097275][ T7809] [<806249d4>] (proc_fail_nth_read) from [<8056a574>] (vfs_read+0x98/0x324) [ 669.097339][ T7809] r8:76f23f30 r7:ea589f68 r6:8591d400 r5:0000000f r4:85d87600 [ 669.097392][ T7809] [<8056a4dc>] (vfs_read) from [<8056b284>] (ksys_read+0x74/0xe8) [ 669.097462][ T7809] r10:00000003 r9:8591d400 r8:8020029c r7:00000000 r6:00000000 r5:85d87600 [ 669.097513][ T7809] r4:85d87603 [ 669.097635][ T7809] [<8056b210>] (ksys_read) from [<8056b308>] (sys_read+0x10/0x14) [ 669.097799][ T7809] r7:00000003 r6:00000004 r5:76f23f30 r4:0000000f [ 669.097935][ T7809] [<8056b2f8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 669.098029][ T7809] Exception stack(0xea589fa8 to 0xea589ff0) [ 669.098346][ T7809] 9fa0: 0000000f 76f23f30 00000004 76f23f30 0000000f 00000000 [ 669.098368][ T7809] 9fc0: 0000000f 76f23f30 00000004 00000003 00300000 00000000 00006364 76f240bc [ 669.098407][ T7809] 9fe0: 00000158 76f23ed0 000d7fdc 001301ec [ 672.355572][ T7849] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7849 comm=syz.1.1277 [ 672.573849][ T7852] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7852 comm=syz.0.1274 [ 674.163869][ T7867] FAULT_INJECTION: forcing a failure. [ 674.163869][ T7867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 674.164710][ T7867] CPU: 1 UID: 0 PID: 7867 Comm: syz.1.1284 Not tainted syzkaller #0 PREEMPT [ 674.164834][ T7867] Hardware name: ARM-Versatile Express [ 674.164861][ T7867] Call trace: [ 674.164907][ T7867] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 674.165021][ T7867] r7:76f26b58 r6:00000000 r5:60000113 r4:8229586c [ 674.165125][ T7867] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 674.165334][ T7867] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 674.165642][ T7867] r5:85919800 r4:8294fc90 [ 674.165692][ T7867] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 674.165838][ T7867] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 674.165926][ T7867] r8:b5003587 r7:76f26b58 r6:76f26b38 r5:ea891f58 r4:76f26b38 [ 674.165948][ T7867] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 674.166035][ T7867] [<809997a8>] (should_fail_usercopy) from [<8026a0c8>] (copy_siginfo_to_user+0x1c/0xa4) [ 674.166123][ T7867] [<8026a0ac>] (copy_siginfo_to_user) from [<8022ae08>] (do_work_pending+0x350/0x4d0) [ 674.166210][ T7867] r9:fffffe00 r8:b5003587 r7:8591a030 r6:76f26b38 r5:ea891fb0 r4:85919800 [ 674.166267][ T7867] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 674.166418][ T7867] Exception stack(0xea891fb0 to 0xea891ff8) [ 674.166488][ T7867] 1fa0: 00000003 20000240 00008800 00000000 [ 674.166611][ T7867] 1fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 674.166660][ T7867] 1fe0: 76f26ec0 76f26eb0 0001929c 0013231c 60000010 00000003 [ 674.166697][ T7867] r10:00000128 r9:85919800 r8:8020029c r7:00000128 r6:001302c8 r5:00000000 [ 674.166761][ T7867] r4:00000000 [ 674.704134][ T29] audit: type=1400 audit(674.580:263): avc: denied { lock } for pid=7878 comm="syz.0.1289" path="socket:[15308]" dev="sockfs" ino=15308 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 674.957801][ T7881] fuse: Unknown parameter '00000000000000000000003' [ 678.707636][ T29] audit: type=1400 audit(678.580:264): avc: denied { accept } for pid=7916 comm="syz.0.1306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 682.595456][ T7951] FAULT_INJECTION: forcing a failure. [ 682.595456][ T7951] name failslab, interval 1, probability 0, space 0, times 0 [ 682.608946][ T7951] CPU: 0 UID: 0 PID: 7951 Comm: syz.0.1319 Not tainted syzkaller #0 PREEMPT [ 682.609174][ T7951] Hardware name: ARM-Versatile Express [ 682.609209][ T7951] Call trace: [ 682.609266][ T7951] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 682.609532][ T7951] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 682.609557][ T7951] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 682.609654][ T7951] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 682.609722][ T7951] r5:8591b000 r4:82918c48 [ 682.609742][ T7951] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 682.609811][ T7951] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 682.609907][ T7951] r8:00000034 r7:00000000 r6:00000dc0 r5:828f58f0 r4:83001240 [ 682.609932][ T7951] [<8053a334>] (should_failslab) from [<8051a52c>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 682.609996][ T7951] [<8051a4e0>] (__kmalloc_cache_noprof) from [<80270cbc>] (call_usermodehelper_setup+0x48/0xb8) [ 682.610073][ T7951] r10:00000003 r9:85290000 r8:828f57c0 r7:828f57c0 r6:85f0e6c0 r5:828f58f0 [ 682.610097][ T7951] r4:85f0e6c0 [ 682.610119][ T7951] [<80270c74>] (call_usermodehelper_setup) from [<8031f328>] (__request_module+0x150/0x2c0) [ 682.610202][ T7951] r7:8591b000 r6:85f0e9c0 r5:00000002 r4:85f0e6c0 [ 682.610225][ T7951] [<8031f1d8>] (__request_module) from [<81595b60>] (__sock_create+0x144/0x228) [ 682.610299][ T7951] r3:00000000 r2:0000000b r1:8245a3b8 [ 682.610334][ T7951] r8:854a6a00 r7:00000003 r6:8280ed68 r5:00000002 r4:0000000b [ 682.610361][ T7951] [<81595a1c>] (__sock_create) from [<81598500>] (__sys_socketpair+0x140/0x2ac) [ 682.610441][ T7951] r10:00000003 r9:8591b000 r8:00000000 r7:00000000 r6:0000000b r5:00000002 [ 682.610465][ T7951] r4:00000000 [ 682.610484][ T7951] [<815983c0>] (__sys_socketpair) from [<8159867c>] (sys_socketpair+0x10/0x14) [ 682.610592][ T7951] r10:00000120 r9:8591b000 r8:8020029c r7:00000120 r6:001302c8 r5:00000000 [ 682.610619][ T7951] r4:00000000 [ 682.610638][ T7951] [<8159866c>] (sys_socketpair) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 682.610693][ T7951] Exception stack(0xebcedfa8 to 0xebcedff0) [ 682.610738][ T7951] dfa0: 00000000 00000000 0000000b 00000002 00000003 200000c0 [ 682.610770][ T7951] dfc0: 00000000 00000000 001302c8 00000120 00300000 00000000 00006364 76f240bc [ 682.610797][ T7951] dfe0: 76f23ec0 76f23eb0 0001929c 00132320 [ 688.808490][ T29] audit: type=1400 audit(688.680:265): avc: denied { create } for pid=7997 comm="syz.0.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 690.454105][ T8028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8028 comm=syz.0.1346 [ 694.951592][ T8073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8073 comm=syz.0.1366 [ 695.283211][ T9] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 695.440694][ T9] usb 2-1: Using ep0 maxpacket: 8 [ 695.489747][ T9] usb 2-1: unable to get BOS descriptor or descriptor too short [ 695.512929][ T9] usb 2-1: config 181 has an invalid descriptor of length 0, skipping remainder of the config [ 695.514472][ T9] usb 2-1: config 181 has 0 interfaces, different from the descriptor's value: 1 [ 695.554362][ T9] usb 2-1: New USB device found, idVendor=172f, idProduct=003b, bcdDevice= 0.40 [ 695.556147][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 695.557493][ T9] usb 2-1: Product: syz [ 695.558269][ T9] usb 2-1: Manufacturer: syz [ 695.559039][ T9] usb 2-1: SerialNumber: syz [ 695.820677][ T8074] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 695.827980][ T8074] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 695.910313][ T29] audit: type=1400 audit(695.780:266): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.910813][ T29] audit: type=1400 audit(695.780:267): avc: denied { open } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.912824][ T29] audit: type=1400 audit(695.780:268): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 696.037823][ T9] usb 2-1: USB disconnect, device number 27 [ 696.063382][ T29] audit: type=1400 audit(695.940:269): avc: denied { read } for pid=8089 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 696.214026][ T29] audit: type=1400 audit(696.090:270): avc: denied { create } for pid=8097 comm="syz.0.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 696.242314][ T29] audit: type=1400 audit(696.120:271): avc: denied { setopt } for pid=8097 comm="syz.0.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 696.265988][ T29] audit: type=1400 audit(696.130:272): avc: denied { append } for pid=8098 comm="syz.1.1371" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 696.266481][ T29] audit: type=1400 audit(696.140:273): avc: denied { open } for pid=8098 comm="syz.1.1371" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 696.341489][ T29] audit: type=1400 audit(696.180:274): avc: denied { write } for pid=8097 comm="syz.0.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 696.341956][ T29] audit: type=1400 audit(696.190:275): avc: denied { ioctl } for pid=8097 comm="syz.0.1372" path="/dev/dsp1" dev="devtmpfs" ino=733 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 701.098765][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 701.104139][ T29] audit: type=1400 audit(700.970:298): avc: denied { ioctl } for pid=8133 comm="syz.0.1384" path="socket:[16728]" dev="sockfs" ino=16728 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 701.150772][ T29] audit: type=1400 audit(701.010:299): avc: denied { read } for pid=8133 comm="syz.0.1384" path="socket:[16728]" dev="sockfs" ino=16728 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 703.374722][ T8148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8148 comm=syz.0.1388 [ 703.771909][ T29] audit: type=1400 audit(703.640:300): avc: denied { setattr } for pid=8149 comm="syz.0.1389" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.412460][ T29] audit: type=1400 audit(704.290:301): avc: denied { create } for pid=8135 comm="syz.1.1385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 704.885470][ T8160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8160 comm=syz.0.1393 [ 707.181596][ T29] audit: type=1400 audit(707.060:302): avc: denied { mounton } for pid=8169 comm="syz.0.1398" path="/693/file0" dev="tmpfs" ino=3678 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 709.796728][ T29] audit: type=1400 audit(709.670:303): avc: denied { map } for pid=8169 comm="syz.0.1398" path="socket:[16786]" dev="sockfs" ino=16786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 709.807854][ T29] audit: type=1400 audit(709.680:304): avc: denied { read } for pid=8169 comm="syz.0.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 711.370391][ T29] audit: type=1400 audit(711.240:305): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 713.835365][ T29] audit: type=1400 audit(713.710:306): avc: denied { create } for pid=8193 comm="syz.0.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 713.871336][ T29] audit: type=1400 audit(713.750:307): avc: denied { name_bind } for pid=8193 comm="syz.0.1405" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 713.877819][ T29] audit: type=1400 audit(713.750:308): avc: denied { node_bind } for pid=8193 comm="syz.0.1405" saddr=255.255.255.255 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 713.923538][ T29] audit: type=1400 audit(713.800:309): avc: denied { write } for pid=8193 comm="syz.0.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 714.086391][ T8196] FAULT_INJECTION: forcing a failure. [ 714.086391][ T8196] name failslab, interval 1, probability 0, space 0, times 0 [ 714.087154][ T8196] CPU: 0 UID: 0 PID: 8196 Comm: syz.0.1406 Not tainted syzkaller #0 PREEMPT [ 714.087295][ T8196] Hardware name: ARM-Versatile Express [ 714.087328][ T8196] Call trace: [ 714.087407][ T8196] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 714.087621][ T8196] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 714.087659][ T8196] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 714.087810][ T8196] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 714.087956][ T8196] r5:8321d400 r4:82918c48 [ 714.088074][ T8196] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 714.088269][ T8196] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 714.088449][ T8196] r8:8321d400 r7:00000000 r6:00000820 r5:84fc3300 r4:832cc240 [ 714.088591][ T8196] [<8053a334>] (should_failslab) from [<80519858>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 714.088785][ T8196] [<8051980c>] (kmem_cache_alloc_noprof) from [<815ab024>] (skb_clone+0x60/0x1c8) [ 714.089110][ T8196] r10:00000014 r9:853565c0 r8:84f70400 r7:84fc3300 r6:850ec6c0 r5:84fc3300 [ 714.089144][ T8196] r4:00000820 [ 714.089283][ T8196] [<815aafc4>] (skb_clone) from [<816c74f0>] (__netlink_deliver_tap+0x1f0/0x288) [ 714.089370][ T8196] r5:84f70464 r4:850ec000 [ 714.089595][ T8196] [<816c7300>] (__netlink_deliver_tap) from [<816c9518>] (netlink_unicast+0x360/0x384) [ 714.089720][ T8196] r10:00000014 r9:853b3584 r8:85290000 r7:84fc3300 r6:853565c0 r5:84f70464 [ 714.089746][ T8196] r4:84f70400 [ 714.089767][ T8196] [<816c91b8>] (netlink_unicast) from [<816c9708>] (netlink_sendmsg+0x1cc/0x444) [ 714.089897][ T8196] r10:00000000 r9:00000000 r8:00000000 r7:853b3400 r6:00000014 r5:84fc3300 [ 714.089970][ T8196] r4:ecb31f20 [ 714.090018][ T8196] [<816c953c>] (netlink_sendmsg) from [<8159692c>] (__sock_sendmsg+0x44/0x78) [ 714.090122][ T8196] r10:00000000 r9:ecb31dc4 r8:ecb31dc4 r7:00000000 r6:854a7180 r5:ecb31f20 [ 714.090147][ T8196] r4:00000000 [ 714.090166][ T8196] [<815968e8>] (__sock_sendmsg) from [<81597874>] (____sys_sendmsg+0x298/0x2cc) [ 714.090237][ T8196] r7:00000000 r6:854a7180 r5:04004020 r4:ecb31f20 [ 714.090261][ T8196] [<815975dc>] (____sys_sendmsg) from [<81599798>] (___sys_sendmsg+0x9c/0xd0) [ 714.090383][ T8196] r10:ecb31e24 r9:20000480 r8:04004020 r7:00000000 r6:854a7180 r5:ecb31f20 [ 714.090409][ T8196] r4:00000000 [ 714.090429][ T8196] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 714.090541][ T8196] r10:00000128 r9:8321d400 r8:85f8bb40 r7:04004020 r6:20000480 r5:85f8bb41 [ 714.090605][ T8196] r4:00000004 [ 714.090773][ T8196] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 714.090857][ T8196] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 714.090936][ T8196] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 714.091043][ T8196] Exception stack(0xecb31fa8 to 0xecb31ff0) [ 714.091103][ T8196] 1fa0: 00000000 00000000 00000004 20000480 04004020 00000000 [ 714.091281][ T8196] 1fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f240bc [ 714.091452][ T8196] 1fe0: 76f23ec0 76f23eb0 0001929c 00132320 [ 716.085175][ T8208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8208 comm=syz.1.1411 [ 717.115372][ T29] audit: type=1400 audit(716.990:310): avc: denied { map_create } for pid=8220 comm="syz.0.1415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 717.337939][ T29] audit: type=1400 audit(717.210:311): avc: denied { allowed } for pid=8220 comm="syz.0.1415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 717.353480][ T29] audit: type=1400 audit(717.230:312): avc: denied { create } for pid=8220 comm="syz.0.1415" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 717.361071][ T29] audit: type=1400 audit(717.230:313): avc: denied { map } for pid=8220 comm="syz.0.1415" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 717.366405][ T29] audit: type=1400 audit(717.230:314): avc: denied { read write } for pid=8220 comm="syz.0.1415" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16891 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 717.432333][ T29] audit: type=1400 audit(717.300:315): avc: denied { ioctl } for pid=8220 comm="syz.0.1415" path="socket:[17469]" dev="sockfs" ino=17469 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 717.804405][ T8225] FAULT_INJECTION: forcing a failure. [ 717.804405][ T8225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.808916][ T8225] CPU: 1 UID: 0 PID: 8225 Comm: syz.0.1416 Not tainted syzkaller #0 PREEMPT [ 717.809086][ T8225] Hardware name: ARM-Versatile Express [ 717.809117][ T8225] Call trace: [ 717.809170][ T8225] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 717.809359][ T8225] r7:ecdc5e20 r6:00000000 r5:60000013 r4:8229586c [ 717.809411][ T8225] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 717.809521][ T8225] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 717.809593][ T8225] r5:839f1800 r4:8294fc90 [ 717.809613][ T8225] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 717.809675][ T8225] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 717.809744][ T8225] r8:00000001 r7:ecdc5e20 r6:20000240 r5:00000000 r4:ecdc5f20 [ 717.809790][ T8225] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 717.809851][ T8225] [<809997a8>] (should_fail_usercopy) from [<8159961c>] (copy_msghdr_from_user+0x50/0x130) [ 717.809922][ T8225] [<815995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 717.809995][ T8225] r8:00000001 r7:00000000 r6:8366af00 r5:ecdc5f20 r4:ecdc5e64 [ 717.810014][ T8225] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 717.810108][ T8225] r10:00000128 r9:839f1800 r8:85d87a80 r7:00000001 r6:20000240 r5:85d87a81 [ 717.810212][ T8225] r4:00000004 [ 717.810279][ T8225] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 717.810361][ T8225] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 717.810383][ T8225] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 717.810439][ T8225] Exception stack(0xecdc5fa8 to 0xecdc5ff0) [ 717.810485][ T8225] 5fa0: 00000000 00000000 00000004 20000240 00000001 00000000 [ 717.810557][ T8225] 5fc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f240bc [ 717.810589][ T8225] 5fe0: 76f23ec0 76f23eb0 0001929c 00132320 [ 719.498746][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 719.505653][ T29] audit: type=1400 audit(719.370:318): avc: denied { create } for pid=8235 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 719.548925][ T29] audit: type=1400 audit(719.420:319): avc: denied { create } for pid=8235 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 720.394746][ T29] audit: type=1400 audit(720.270:320): avc: denied { ioctl } for pid=8244 comm="syz.1.1425" path="socket:[16972]" dev="sockfs" ino=16972 ioctlcmd=0x5567 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 721.049912][ T29] audit: type=1400 audit(720.920:321): avc: denied { getopt } for pid=8246 comm="syz.1.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 721.491868][ T29] audit: type=1400 audit(721.370:322): avc: denied { prog_load } for pid=8253 comm="syz.0.1427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 721.495010][ T29] audit: type=1400 audit(721.370:323): avc: denied { perfmon } for pid=8253 comm="syz.0.1427" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 721.500255][ T29] audit: type=1400 audit(721.370:324): avc: denied { prog_run } for pid=8253 comm="syz.0.1427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 724.115268][ T8260] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 724.118105][ T8260] audit: out of memory in audit_log_start [ 728.131051][ T8278] FAULT_INJECTION: forcing a failure. [ 728.131051][ T8278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.133365][ T8278] CPU: 0 UID: 0 PID: 8278 Comm: syz.1.1437 Not tainted syzkaller #0 PREEMPT [ 728.133507][ T8278] Hardware name: ARM-Versatile Express [ 728.133539][ T8278] Call trace: [ 728.133598][ T8278] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 728.133748][ T8278] r7:ecfbde20 r6:00000000 r5:60000013 r4:8229586c [ 728.133771][ T8278] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 728.133866][ T8278] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 728.134044][ T8278] r5:844fe000 r4:8294fc90 [ 728.134067][ T8278] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 728.134194][ T8278] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 728.134302][ T8278] r8:04000094 r7:ecfbde20 r6:20001b80 r5:00000000 r4:ecfbdf20 [ 728.134327][ T8278] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 728.134493][ T8278] [<809997a8>] (should_fail_usercopy) from [<8159961c>] (copy_msghdr_from_user+0x50/0x130) [ 728.134632][ T8278] [<815995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 728.134738][ T8278] r8:04000094 r7:00000000 r6:854a7900 r5:ecfbdf20 r4:ecfbde64 [ 728.134881][ T8278] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 728.134995][ T8278] r10:00000128 r9:844fe000 r8:85f8b480 r7:04000094 r6:20001b80 r5:85f8b481 [ 728.135035][ T8278] r4:00000003 [ 728.135057][ T8278] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 728.135138][ T8278] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 728.135169][ T8278] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 728.135230][ T8278] Exception stack(0xecfbdfa8 to 0xecfbdff0) [ 728.135275][ T8278] dfa0: 00000000 00000000 00000003 20001b80 04000094 00000000 [ 728.135325][ T8278] dfc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 728.135362][ T8278] dfe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 729.617451][ T29] audit: type=1400 audit(729.490:325): avc: denied { create } for pid=8279 comm="syz.1.1438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 731.804237][ T8296] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8296 comm=syz.1.1440 [ 732.791958][ T8300] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8300 comm=syz.1.1442 [ 734.968221][ T8310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8310 comm=syz.0.1445 [ 736.657760][ T8324] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8324 comm=syz.0.1450 [ 736.921633][ T29] audit: type=1400 audit(736.790:326): avc: denied { create } for pid=8327 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 736.934655][ T29] audit: type=1400 audit(736.810:327): avc: denied { bind } for pid=8327 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 736.944162][ T29] audit: type=1400 audit(736.820:328): avc: denied { accept } for pid=8327 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 736.947965][ T29] audit: type=1400 audit(736.820:329): avc: denied { write } for pid=8327 comm="syz.0.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 738.429164][ T8337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8337 comm=syz.1.1455 [ 738.921341][ T29] audit: type=1400 audit(738.800:330): avc: denied { ioctl } for pid=8342 comm="syz.1.1458" path="socket:[17128]" dev="sockfs" ino=17128 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 739.247615][ T8347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8347 comm=syz.1.1460 [ 739.616443][ T29] audit: type=1400 audit(739.490:331): avc: denied { create } for pid=8352 comm="syz.1.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 739.958682][ T8359] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8359 comm=syz.1.1465 [ 740.182872][ T8363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8363 comm=syz.1.1467 [ 740.610361][ T9] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 740.809798][ T9] usb 2-1: Using ep0 maxpacket: 8 [ 740.872598][ T9] usb 2-1: unable to get BOS descriptor or descriptor too short [ 740.882801][ T9] usb 2-1: config 1 interface 0 has no altsetting 0 [ 740.905512][ T9] usb 2-1: New USB device found, idVendor=172f, idProduct=0034, bcdDevice= 0.40 [ 740.905772][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 740.905955][ T9] usb 2-1: Product: syz [ 740.906044][ T9] usb 2-1: Manufacturer: syz [ 740.906068][ T9] usb 2-1: SerialNumber: syz [ 741.187085][ T9] usbhid 2-1:1.0: can't add hid device: -71 [ 741.187587][ T9] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 741.210358][ T9] usb 2-1: USB disconnect, device number 28 [ 741.486880][ T8390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8390 comm=syz.1.1473 [ 742.320630][ T29] audit: type=1400 audit(742.190:332): avc: denied { bind } for pid=8400 comm="syz.0.1477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 742.855394][ T29] audit: type=1400 audit(742.730:333): avc: denied { read } for pid=8400 comm="syz.0.1477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 743.217118][ T8409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8409 comm=syz.0.1479 [ 744.327783][ T8422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8422 comm=syz.1.1484 [ 744.528131][ T29] audit: type=1400 audit(744.400:334): avc: denied { ioctl } for pid=8416 comm="syz.0.1482" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17205 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 745.383135][ T8431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8431 comm=syz.1.1487 [ 745.727413][ T8435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8435 comm=syz.1.1489 [ 748.471746][ T8449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8449 comm=syz.1.1493 [ 748.988473][ T8457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8457 comm=syz.1.1495 [ 749.337765][ T8463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8463 comm=syz.0.1498 [ 749.648158][ T8469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8469 comm=syz.0.1501 [ 749.941970][ T29] audit: type=1400 audit(749.820:335): avc: denied { remount } for pid=8472 comm="syz.1.1502" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 750.223713][ T29] audit: type=1400 audit(750.100:336): avc: denied { create } for pid=8481 comm="syz.0.1508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 750.226806][ T29] audit: type=1400 audit(750.100:337): avc: denied { create } for pid=8481 comm="syz.0.1508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 751.064695][ T29] audit: type=1400 audit(750.940:338): avc: denied { setopt } for pid=8499 comm="syz.1.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 757.274808][ T29] audit: type=1400 audit(757.150:339): avc: denied { setopt } for pid=8507 comm="syz.0.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 758.683806][ T8525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8525 comm=syz.1.1525 [ 759.380568][ T29] audit: type=1400 audit(759.210:340): avc: denied { getopt } for pid=8528 comm="syz.1.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 759.381184][ T29] audit: type=1400 audit(759.230:341): avc: denied { accept } for pid=8528 comm="syz.1.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 762.635373][ T29] audit: type=1400 audit(762.510:342): avc: denied { create } for pid=8542 comm="syz.1.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 762.647645][ T29] audit: type=1400 audit(762.520:343): avc: denied { ioctl } for pid=8542 comm="syz.1.1532" path="socket:[17967]" dev="sockfs" ino=17967 ioctlcmd=0xf506 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 762.733108][ T29] audit: type=1400 audit(762.610:344): avc: denied { getopt } for pid=8542 comm="syz.1.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 762.927889][ T8545] FAULT_INJECTION: forcing a failure. [ 762.927889][ T8545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 762.940162][ T8545] CPU: 0 UID: 0 PID: 8545 Comm: syz.1.1533 Not tainted syzkaller #0 PREEMPT [ 762.940263][ T8545] Hardware name: ARM-Versatile Express [ 762.940281][ T8545] Call trace: [ 762.940308][ T8545] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 762.940387][ T8545] r7:00000000 r6:00000000 r5:60000113 r4:8229586c [ 762.940397][ T8545] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 762.940431][ T8545] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 762.940461][ T8545] r5:8591b000 r4:8294fc90 [ 762.940470][ T8545] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 762.940507][ T8545] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 762.940540][ T8545] r8:76f26f30 r7:00000000 r6:00000000 r5:ea89df68 r4:00000002 [ 762.940550][ T8545] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 762.940577][ T8545] [<809997a8>] (should_fail_usercopy) from [<805a6d98>] (simple_read_from_buffer+0x80/0x13c) [ 762.940609][ T8545] [<805a6d18>] (simple_read_from_buffer) from [<80624a8c>] (proc_fail_nth_read+0xb8/0x108) [ 762.940649][ T8545] r10:00000001 r9:806249d4 r8:00000002 r7:ea89df68 r6:0000000f r5:76f26f30 [ 762.940661][ T8545] r4:8591b000 r3:ea89de9f [ 762.940670][ T8545] [<806249d4>] (proc_fail_nth_read) from [<8056a574>] (vfs_read+0x98/0x324) [ 762.940703][ T8545] r8:76f26f30 r7:ea89df68 r6:8591b000 r5:0000000f r4:85f8bf00 [ 762.940712][ T8545] [<8056a4dc>] (vfs_read) from [<8056b284>] (ksys_read+0x74/0xe8) [ 762.940743][ T8545] r10:00000003 r9:8591b000 r8:8020029c r7:00000000 r6:00000000 r5:85f8bf00 [ 762.940753][ T8545] r4:85f8bf03 [ 762.940762][ T8545] [<8056b210>] (ksys_read) from [<8056b308>] (sys_read+0x10/0x14) [ 762.940789][ T8545] r7:00000003 r6:00000004 r5:76f26f30 r4:0000000f [ 762.940822][ T8545] [<8056b2f8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 762.940855][ T8545] Exception stack(0xea89dfa8 to 0xea89dff0) [ 762.940908][ T8545] dfa0: 0000000f 76f26f30 00000004 76f26f30 0000000f 00000000 [ 762.940931][ T8545] dfc0: 0000000f 76f26f30 00000004 00000003 00300000 00000000 00006364 76f270bc [ 762.940945][ T8545] dfe0: 00000158 76f26ed0 000d7fdc 001301ec [ 766.164970][ T29] audit: type=1400 audit(766.040:345): avc: denied { ioctl } for pid=8568 comm="syz.1.1543" path="socket:[18552]" dev="sockfs" ino=18552 ioctlcmd=0x4d76 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 766.757435][ T8576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8576 comm=syz.0.1546 [ 769.766963][ T29] audit: type=1400 audit(769.640:346): avc: denied { map } for pid=8593 comm="syz.1.1553" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 772.872479][ T8613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8613 comm=syz.0.1559 [ 775.408746][ T29] audit: type=1400 audit(775.280:347): avc: denied { map } for pid=8628 comm="syz.1.1566" path="socket:[18120]" dev="sockfs" ino=18120 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 775.411281][ T29] audit: type=1400 audit(775.280:348): avc: denied { read accept } for pid=8628 comm="syz.1.1566" path="socket:[18120]" dev="sockfs" ino=18120 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 775.415402][ T29] audit: type=1400 audit(775.290:349): avc: denied { accept } for pid=8628 comm="syz.1.1566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 775.947546][ T8639] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8639 comm=syz.0.1568 [ 776.425963][ T8646] FAULT_INJECTION: forcing a failure. [ 776.425963][ T8646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 776.432758][ T8646] CPU: 1 UID: 0 PID: 8646 Comm: syz.0.1571 Not tainted syzkaller #0 PREEMPT [ 776.432928][ T8646] Hardware name: ARM-Versatile Express [ 776.432953][ T8646] Call trace: [ 776.432992][ T8646] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 776.433112][ T8646] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 776.433130][ T8646] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 776.433181][ T8646] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 776.433229][ T8646] r5:8591c800 r4:8294fc90 [ 776.433244][ T8646] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 776.433301][ T8646] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 776.433358][ T8646] r8:ebb9deb8 r7:00000000 r6:00000001 r5:76f23f30 r4:00000001 [ 776.433373][ T8646] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 776.433419][ T8646] [<809997a8>] (should_fail_usercopy) from [<808e1444>] (kstrtouint_from_user+0x54/0x13c) [ 776.433472][ T8646] [<808e13f0>] (kstrtouint_from_user) from [<80625e3c>] (proc_fail_nth_write+0x40/0xf0) [ 776.433537][ T8646] r8:ebb9df68 r7:8591c800 r6:00000001 r5:85f8b840 r4:00000001 [ 776.433553][ T8646] [<80625dfc>] (proc_fail_nth_write) from [<8056ae70>] (vfs_write+0xac/0x44c) [ 776.433602][ T8646] r5:85f8b840 r4:80625dfc [ 776.433617][ T8646] [<8056adc4>] (vfs_write) from [<8056b380>] (ksys_write+0x74/0xe8) [ 776.433670][ T8646] r10:00000004 r9:8591c800 r8:8020029c r7:00000000 r6:00000002 r5:85f8b840 [ 776.433689][ T8646] r4:85f8b843 [ 776.433702][ T8646] [<8056b30c>] (ksys_write) from [<8056b404>] (sys_write+0x10/0x14) [ 776.433749][ T8646] r7:00000004 r6:00000005 r5:76f23f30 r4:00000001 [ 776.433764][ T8646] [<8056b3f4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 776.433804][ T8646] Exception stack(0xebb9dfa8 to 0xebb9dff0) [ 776.433838][ T8646] dfa0: 00000001 76f23f30 00000005 76f23f30 00000001 00000000 [ 776.433870][ T8646] dfc0: 00000001 76f23f30 00000005 00000004 00300000 00000000 00006364 76f240bc [ 776.433894][ T8646] dfe0: 00000158 76f23ed0 000d7fdc 001302b4 [ 778.667170][ T29] audit: type=1400 audit(778.540:350): avc: denied { ioctl } for pid=8653 comm="syz.1.1574" path="socket:[18145]" dev="sockfs" ino=18145 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 778.686745][ T29] audit: type=1400 audit(778.560:351): avc: denied { create } for pid=8653 comm="syz.1.1574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 778.692124][ T29] audit: type=1400 audit(778.570:352): avc: denied { getattr } for pid=8653 comm="syz.1.1574" name="KEY" dev="sockfs" ino=18146 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 780.520890][ T8665] FAULT_INJECTION: forcing a failure. [ 780.520890][ T8665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 780.521533][ T8665] CPU: 1 UID: 0 PID: 8665 Comm: syz.0.1579 Not tainted syzkaller #0 PREEMPT [ 780.521646][ T8665] Hardware name: ARM-Versatile Express [ 780.521690][ T8665] Call trace: [ 780.521754][ T8665] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 780.521978][ T8665] r7:ebacde20 r6:00000000 r5:60000013 r4:8229586c [ 780.522322][ T8665] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 780.522766][ T8665] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 780.522980][ T8665] r5:853ed400 r4:8294fc90 [ 780.523027][ T8665] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 780.523136][ T8665] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 780.523223][ T8665] r8:00048040 r7:ebacde20 r6:20000100 r5:00000000 r4:ebacdf20 [ 780.523454][ T8665] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 780.523789][ T8665] [<809997a8>] (should_fail_usercopy) from [<8159961c>] (copy_msghdr_from_user+0x50/0x130) [ 780.524133][ T8665] [<815995cc>] (copy_msghdr_from_user) from [<81599774>] (___sys_sendmsg+0x78/0xd0) [ 780.524259][ T8665] r8:00048040 r7:00000000 r6:8366a280 r5:ebacdf20 r4:ebacde64 [ 780.524280][ T8665] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 780.524356][ T8665] r10:00000128 r9:853ed400 r8:85d87c00 r7:00048040 r6:20000100 r5:85d87c01 [ 780.524425][ T8665] r4:00000003 [ 780.524444][ T8665] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 780.524518][ T8665] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 780.524538][ T8665] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 780.524651][ T8665] Exception stack(0xebacdfa8 to 0xebacdff0) [ 780.524866][ T8665] dfa0: 00000000 00000000 00000003 20000100 00048040 00000000 [ 780.524975][ T8665] dfc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f240bc [ 780.525049][ T8665] dfe0: 76f23ec0 76f23eb0 0001929c 00132320 [ 781.725864][ T29] audit: type=1400 audit(781.600:353): avc: denied { write } for pid=8675 comm="syz.1.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 782.021707][ T29] audit: type=1400 audit(781.900:354): avc: denied { append } for pid=8681 comm="syz.1.1586" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 787.380982][ T29] audit: type=1400 audit(787.250:355): avc: denied { setopt } for pid=8694 comm="syz.0.1591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 791.650551][ T29] audit: type=1400 audit(791.520:356): avc: denied { write } for pid=8705 comm="syz.0.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 792.788615][ T29] audit: type=1400 audit(792.660:357): avc: denied { write } for pid=8711 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 792.816592][ T29] audit: type=1400 audit(792.690:358): avc: denied { open } for pid=8711 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 792.842809][ T29] audit: type=1400 audit(792.720:359): avc: denied { search } for pid=8711 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.845449][ T29] audit: type=1400 audit(792.720:360): avc: denied { search } for pid=8711 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.848066][ T29] audit: type=1400 audit(792.720:361): avc: denied { search } for pid=8711 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.851389][ T29] audit: type=1400 audit(792.730:362): avc: denied { search } for pid=8711 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.886566][ T29] audit: type=1400 audit(792.760:363): avc: denied { read open } for pid=8717 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.893100][ T29] audit: type=1400 audit(792.770:364): avc: denied { getattr } for pid=8717 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.954828][ T29] audit: type=1400 audit(792.830:365): avc: denied { add_name } for pid=8711 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 792.958925][ T29] audit: type=1400 audit(792.830:366): avc: denied { create } for pid=8711 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 793.116640][ T8721] FAULT_INJECTION: forcing a failure. [ 793.116640][ T8721] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 793.117205][ T8721] CPU: 1 UID: 0 PID: 8721 Comm: syz.0.1601 Not tainted syzkaller #0 PREEMPT [ 793.117311][ T8721] Hardware name: ARM-Versatile Express [ 793.117338][ T8721] Call trace: [ 793.117383][ T8721] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 793.117491][ T8721] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 793.117509][ T8721] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 793.117562][ T8721] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 793.117613][ T8721] r5:8591c800 r4:8294fc90 [ 793.117693][ T8721] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 793.117822][ T8721] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 793.118042][ T8721] r8:df9d9eb8 r7:00000000 r6:00000001 r5:76f23f30 r4:00000001 [ 793.118111][ T8721] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 793.118199][ T8721] [<809997a8>] (should_fail_usercopy) from [<808e1444>] (kstrtouint_from_user+0x54/0x13c) [ 793.118347][ T8721] [<808e13f0>] (kstrtouint_from_user) from [<80625e3c>] (proc_fail_nth_write+0x40/0xf0) [ 793.118491][ T8721] r8:df9d9f68 r7:8591c800 r6:00000001 r5:85d87780 r4:00000001 [ 793.118671][ T8721] [<80625dfc>] (proc_fail_nth_write) from [<8056ae70>] (vfs_write+0xac/0x44c) [ 793.118768][ T8721] r5:85d87780 r4:80625dfc [ 793.118786][ T8721] [<8056adc4>] (vfs_write) from [<8056b380>] (ksys_write+0x74/0xe8) [ 793.118907][ T8721] r10:00000004 r9:8591c800 r8:8020029c r7:00000000 r6:00000002 r5:85d87780 [ 793.119063][ T8721] r4:85d87783 [ 793.119137][ T8721] [<8056b30c>] (ksys_write) from [<8056b404>] (sys_write+0x10/0x14) [ 793.119259][ T8721] r7:00000004 r6:00000005 r5:76f23f30 r4:00000001 [ 793.119466][ T8721] [<8056b3f4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 793.119637][ T8721] Exception stack(0xdf9d9fa8 to 0xdf9d9ff0) [ 793.119861][ T8721] 9fa0: 00000001 76f23f30 00000005 76f23f30 00000001 00000000 [ 793.119894][ T8721] 9fc0: 00000001 76f23f30 00000005 00000004 00300000 00000000 00006364 76f240bc [ 793.119959][ T8721] 9fe0: 00000158 76f23ed0 000d7fdc 001302b4 [ 796.016180][ T8753] FAULT_INJECTION: forcing a failure. [ 796.016180][ T8753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 796.018666][ T8753] CPU: 0 UID: 0 PID: 8753 Comm: syz.1.1612 Not tainted syzkaller #0 PREEMPT [ 796.018817][ T8753] Hardware name: ARM-Versatile Express [ 796.018854][ T8753] Call trace: [ 796.018922][ T8753] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 796.019063][ T8753] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 796.019092][ T8753] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 796.019167][ T8753] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 796.019239][ T8753] r5:853eb000 r4:8294fc90 [ 796.019259][ T8753] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 796.019396][ T8753] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 796.019477][ T8753] r8:76f26f30 r7:00000000 r6:00000000 r5:dfae1f68 r4:00000002 [ 796.019497][ T8753] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 796.019554][ T8753] [<809997a8>] (should_fail_usercopy) from [<805a6d98>] (simple_read_from_buffer+0x80/0x13c) [ 796.019617][ T8753] [<805a6d18>] (simple_read_from_buffer) from [<80624a8c>] (proc_fail_nth_read+0xb8/0x108) [ 796.019748][ T8753] r10:00000001 r9:806249d4 r8:00000002 r7:dfae1f68 r6:0000000f r5:76f26f30 [ 796.019777][ T8753] r4:853eb000 r3:dfae1e9f [ 796.019797][ T8753] [<806249d4>] (proc_fail_nth_read) from [<8056a574>] (vfs_read+0x98/0x324) [ 796.019875][ T8753] r8:76f26f30 r7:dfae1f68 r6:853eb000 r5:0000000f r4:85f8b900 [ 796.019909][ T8753] [<8056a4dc>] (vfs_read) from [<8056b284>] (ksys_read+0x74/0xe8) [ 796.019978][ T8753] r10:00000003 r9:853eb000 r8:8020029c r7:00000000 r6:00000000 r5:85f8b900 [ 796.020002][ T8753] r4:85f8b903 [ 796.020023][ T8753] [<8056b210>] (ksys_read) from [<8056b308>] (sys_read+0x10/0x14) [ 796.020091][ T8753] r7:00000003 r6:00000004 r5:76f26f30 r4:0000000f [ 796.020116][ T8753] [<8056b2f8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 796.020173][ T8753] Exception stack(0xdfae1fa8 to 0xdfae1ff0) [ 796.020223][ T8753] 1fa0: 0000000f 76f26f30 00000004 76f26f30 0000000f 00000000 [ 796.020264][ T8753] 1fc0: 0000000f 76f26f30 00000004 00000003 00300000 00000000 00006364 76f270bc [ 796.020297][ T8753] 1fe0: 00000158 76f26ed0 000d7fdc 001301ec [ 797.032177][ T8767] FAULT_INJECTION: forcing a failure. [ 797.032177][ T8767] name failslab, interval 1, probability 0, space 0, times 0 [ 797.032705][ T8767] CPU: 1 UID: 0 PID: 8767 Comm: syz.1.1618 Not tainted syzkaller #0 PREEMPT [ 797.032816][ T8767] Hardware name: ARM-Versatile Express [ 797.032849][ T8767] Call trace: [ 797.032911][ T8767] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 797.033137][ T8767] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 797.033169][ T8767] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 797.033239][ T8767] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 797.033302][ T8767] r5:85918c00 r4:82918c48 [ 797.033319][ T8767] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 797.033391][ T8767] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 797.033467][ T8767] r8:85918c00 r7:00000000 r6:00000cc0 r5:ffffffff r4:832cc240 [ 797.033487][ T8767] [<8053a334>] (should_failslab) from [<8051a0e8>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 797.033557][ T8767] [<8051a098>] (kmem_cache_alloc_node_noprof) from [<815a49c8>] (__alloc_skb+0x90/0x198) [ 797.033649][ T8767] r10:00000000 r9:00000000 r8:00000cc0 r7:832cc240 r6:00000000 r5:ffffffff [ 797.033674][ T8767] r4:00000000 [ 797.033693][ T8767] [<815a4938>] (__alloc_skb) from [<816c8eb0>] (netlink_alloc_large_skb+0x8c/0xa4) [ 797.033771][ T8767] r8:00000000 r7:853f7000 r6:00000014 r5:8366b400 r4:00000140 [ 797.033794][ T8767] [<816c8e24>] (netlink_alloc_large_skb) from [<816c9670>] (netlink_sendmsg+0x134/0x444) [ 797.033858][ T8767] r5:8366b400 r4:dfcedf20 [ 797.033879][ T8767] [<816c953c>] (netlink_sendmsg) from [<8159692c>] (__sock_sendmsg+0x44/0x78) [ 797.033965][ T8767] r10:00000000 r9:dfceddc4 r8:dfceddc4 r7:00000000 r6:8366b400 r5:dfcedf20 [ 797.033988][ T8767] r4:00000000 [ 797.034007][ T8767] [<815968e8>] (__sock_sendmsg) from [<81597874>] (____sys_sendmsg+0x298/0x2cc) [ 797.034077][ T8767] r7:00000000 r6:8366b400 r5:04000094 r4:dfcedf20 [ 797.034100][ T8767] [<815975dc>] (____sys_sendmsg) from [<81599798>] (___sys_sendmsg+0x9c/0xd0) [ 797.034186][ T8767] r10:dfcede24 r9:20001b80 r8:04000094 r7:00000000 r6:8366b400 r5:dfcedf20 [ 797.034208][ T8767] r4:00000000 [ 797.034226][ T8767] [<815996fc>] (___sys_sendmsg) from [<81599c30>] (__sys_sendmsg+0x8c/0xe0) [ 797.034295][ T8767] r10:00000128 r9:85918c00 r8:85d87cc0 r7:04000094 r6:20001b80 r5:85d87cc1 [ 797.034320][ T8767] r4:00000003 [ 797.034338][ T8767] [<81599ba4>] (__sys_sendmsg) from [<81599c98>] (sys_sendmsg+0x14/0x18) [ 797.034406][ T8767] r8:8020029c r7:00000128 r6:001302c8 r5:00000000 r4:00000000 [ 797.034639][ T8767] [<81599c84>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 797.034871][ T8767] Exception stack(0xdfcedfa8 to 0xdfcedff0) [ 797.034928][ T8767] dfa0: 00000000 00000000 00000003 20001b80 04000094 00000000 [ 797.034987][ T8767] dfc0: 00000000 00000000 001302c8 00000128 00300000 00000000 00006364 76f270bc [ 797.035015][ T8767] dfe0: 76f26ec0 76f26eb0 0001929c 00132320 [ 797.510866][ T3705] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 797.660089][ T3705] usb 1-1: Using ep0 maxpacket: 8 [ 797.668575][ T3705] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 797.672915][ T3705] usb 1-1: config 0 has no interfaces? [ 797.687134][ T3705] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 797.688521][ T3705] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 797.693523][ T3705] usb 1-1: Product: syz [ 797.695565][ T3705] usb 1-1: Manufacturer: syz [ 797.697389][ T3705] usb 1-1: SerialNumber: syz [ 797.705955][ T3705] usb 1-1: config 0 descriptor?? [ 798.154462][ T7605] usb 1-1: USB disconnect, device number 20 [ 798.523766][ T8803] FAULT_INJECTION: forcing a failure. [ 798.523766][ T8803] name failslab, interval 1, probability 0, space 0, times 0 [ 798.532534][ T8803] CPU: 0 UID: 0 PID: 8803 Comm: syz.0.1629 Not tainted syzkaller #0 PREEMPT [ 798.532712][ T8803] Hardware name: ARM-Versatile Express [ 798.532750][ T8803] Call trace: [ 798.532804][ T8803] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 798.532926][ T8803] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 798.532948][ T8803] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 798.533005][ T8803] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 798.533064][ T8803] r5:8591c800 r4:82918c48 [ 798.533100][ T8803] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 798.533169][ T8803] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 798.533239][ T8803] r8:00000080 r7:00000000 r6:00000cc0 r5:00000009 r4:83001300 [ 798.533258][ T8803] [<8053a334>] (should_failslab) from [<8051a52c>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 798.533322][ T8803] [<8051a4e0>] (__kmalloc_cache_noprof) from [<8109e88c>] (raw_ioctl_init+0x188/0x354) [ 798.533407][ T8803] r10:8591c800 r9:82498730 r8:85e38c40 r7:85f81400 r6:85912800 r5:00000009 [ 798.533427][ T8803] r4:00000000 [ 798.533444][ T8803] [<8109e704>] (raw_ioctl_init) from [<810a0080>] (raw_ioctl+0x3e4/0x1238) [ 798.533511][ T8803] r10:8591c800 r9:00000004 r8:85f8b240 r7:76f22e60 r6:76f22e60 r5:00000000 [ 798.533533][ T8803] r4:85912800 [ 798.533550][ T8803] [<8109fc9c>] (raw_ioctl) from [<8058552c>] (sys_ioctl+0x130/0xba0) [ 798.533631][ T8803] r10:8591c800 r9:00000004 r8:85f8b240 r7:76f22e60 r6:85f8b241 r5:00000000 [ 798.533652][ T8803] r4:41015500 [ 798.533670][ T8803] [<805853fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 798.533717][ T8803] Exception stack(0xdfd2dfa8 to 0xdfd2dff0) [ 798.533757][ T8803] dfa0: 00000004 76f22e70 00000004 41015500 76f22e60 76f21e00 [ 798.533790][ T8803] dfc0: 00000004 76f22e70 76f21e70 00000036 00000003 76f22e60 00440000 00000000 [ 798.533814][ T8803] dfe0: 00000000 76f21de8 002e8000 00131cec [ 798.533851][ T8803] r10:00000036 r9:8591c800 r8:8020029c r7:00000036 r6:76f21e70 r5:76f22e70 [ 798.533872][ T8803] r4:00000004 [ 799.229154][ T8812] FAULT_INJECTION: forcing a failure. [ 799.229154][ T8812] name failslab, interval 1, probability 0, space 0, times 0 [ 799.232606][ T8812] CPU: 0 UID: 0 PID: 8812 Comm: syz.1.1633 Not tainted syzkaller #0 PREEMPT [ 799.232735][ T8812] Hardware name: ARM-Versatile Express [ 799.232773][ T8812] Call trace: [ 799.232828][ T8812] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 799.232950][ T8812] r7:00000000 r6:00000000 r5:60000013 r4:8229586c [ 799.232973][ T8812] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 799.233032][ T8812] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 799.233088][ T8812] r5:853ea400 r4:82918c48 [ 799.233117][ T8812] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 799.233185][ T8812] [<80999568>] (should_fail_ex) from [<8053a3a0>] (should_failslab+0x6c/0x94) [ 799.233258][ T8812] r8:853ea400 r7:00000000 r6:00000cc0 r5:ffffffff r4:832cc240 [ 799.233276][ T8812] [<8053a334>] (should_failslab) from [<8051a0e8>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 799.233342][ T8812] [<8051a098>] (kmem_cache_alloc_node_noprof) from [<815a49c8>] (__alloc_skb+0x90/0x198) [ 799.233423][ T8812] r10:dfd29e2c r9:00000000 r8:00000cc0 r7:832cc240 r6:00000000 r5:ffffffff [ 799.233447][ T8812] r4:00000000 [ 799.233464][ T8812] [<815a4938>] (__alloc_skb) from [<815ad4dc>] (alloc_skb_with_frags+0x44/0x1ec) [ 799.233532][ T8812] r8:802c0eb0 r7:dfd29db4 r6:00000000 r5:00001000 r4:00000000 [ 799.233551][ T8812] [<815ad498>] (alloc_skb_with_frags) from [<8159d4d8>] (sock_alloc_send_pskb+0x1f4/0x228) [ 799.233618][ T8812] r10:dfd29e2c r9:00000000 r8:802c0eb0 r7:dfd29db4 r6:853ea400 r5:7fffffff [ 799.233639][ T8812] r4:858f8000 [ 799.233659][ T8812] [<8159d2e4>] (sock_alloc_send_pskb) from [<8196e804>] (isotp_sendmsg+0x2ac/0x81c) [ 799.233743][ T8812] r10:dfd29e98 r9:00000028 r8:dfd29ea8 r7:00000028 r6:858f8000 r5:858fa000 [ 799.233765][ T8812] r4:00000000 [ 799.233787][ T8812] [<8196e558>] (isotp_sendmsg) from [<8159692c>] (__sock_sendmsg+0x44/0x78) [ 799.233871][ T8812] r10:00000122 r9:85f8b300 r8:85f8b301 r7:76f25e1c r6:854a7b80 r5:dfd29e98 [ 799.233893][ T8812] r4:00000000 [ 799.233911][ T8812] [<815968e8>] (__sock_sendmsg) from [<81598f8c>] (__sys_sendto+0x110/0x160) [ 799.233973][ T8812] r7:76f25e1c r6:854a7b80 r5:00000000 r4:00000000 [ 799.233992][ T8812] [<81598e7c>] (__sys_sendto) from [<81598ff8>] (sys_sendto+0x1c/0x24) [ 799.234087][ T8812] r9:853ea400 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f25e1c [ 799.234124][ T8812] [<81598fdc>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 799.234177][ T8812] Exception stack(0xdfd29fa8 to 0xdfd29ff0) [ 799.234328][ T8812] 9fa0: 76f25e1c 0000000c 00000006 76f25eb0 00000028 00000000 [ 799.234368][ T8812] 9fc0: 76f25e1c 0000000c 00000000 00000122 00000006 00000000 76f25eb0 76f270bc [ 799.234396][ T8812] 9fe0: 00000000 76f25df0 000d7fdc 001347b8 [ 802.818935][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 802.821278][ T29] audit: type=1400 audit(802.690:377): avc: denied { checkpoint_restore } for pid=8832 comm="syz.1.1640" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 802.837913][ T29] audit: type=1400 audit(802.710:378): avc: denied { create } for pid=8832 comm="syz.1.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 803.601449][ T9] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 803.754882][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 803.774908][ T9] usb 1-1: unable to get BOS descriptor or descriptor too short [ 803.785943][ T9] usb 1-1: config 1 interface 0 altsetting 188 endpoint 0x81 has an invalid bInterval 175, changing to 11 [ 803.788295][ T9] usb 1-1: config 1 interface 0 altsetting 188 endpoint 0x81 has invalid maxpacket 26060, setting to 1024 [ 803.790637][ T9] usb 1-1: config 1 interface 0 has no altsetting 0 [ 803.811271][ T9] usb 1-1: New USB device found, idVendor=172f, idProduct=0634, bcdDevice= 0.40 [ 803.816103][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 803.817278][ T9] usb 1-1: Product: syz [ 803.817932][ T9] usb 1-1: Manufacturer: syz [ 803.818608][ T9] usb 1-1: SerialNumber: syz [ 804.084735][ T9] usbhid 1-1:1.0: can't add hid device: -71 [ 804.086819][ T9] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 804.096808][ T9] usb 1-1: USB disconnect, device number 21 [ 805.420063][ T29] audit: type=1400 audit(805.280:379): avc: denied { execmem } for pid=8860 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 807.663966][ T8884] FAULT_INJECTION: forcing a failure. [ 807.663966][ T8884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 807.664503][ T8884] CPU: 1 UID: 0 PID: 8884 Comm: syz.0.1650 Not tainted syzkaller #0 PREEMPT [ 807.664615][ T8884] Hardware name: ARM-Versatile Express [ 807.664645][ T8884] Call trace: [ 807.664730][ T8884] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 807.664865][ T8884] r7:200001c0 r6:00000000 r5:60000113 r4:8229586c [ 807.664905][ T8884] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 807.664971][ T8884] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 807.665029][ T8884] r5:853ee000 r4:8294fc90 [ 807.665047][ T8884] [<8021ee40>] (dump_stack) from [<8099972c>] (should_fail_ex+0x1c4/0x228) [ 807.665123][ T8884] [<80999568>] (should_fail_ex) from [<809997a4>] (should_fail+0x14/0x18) [ 807.665187][ T8884] r8:00000000 r7:200001c0 r6:85fa23bb r5:00000000 r4:00000000 [ 807.665203][ T8884] [<80999790>] (should_fail) from [<809997c4>] (should_fail_usercopy+0x1c/0x20) [ 807.665257][ T8884] [<809997a8>] (should_fail_usercopy) from [<808d86c4>] (_copy_from_iter+0x6c/0x7d8) [ 807.665321][ T8884] [<808d8658>] (_copy_from_iter) from [<8196e7ac>] (isotp_sendmsg+0x254/0x81c) [ 807.665401][ T8884] r10:ea4f5e68 r9:85fa23bb r8:ea4f5e78 r7:00000025 r6:85fa0000 r5:85fa2000 [ 807.665425][ T8884] r4:00000000 [ 807.665444][ T8884] [<8196e558>] (isotp_sendmsg) from [<8159692c>] (__sock_sendmsg+0x44/0x78) [ 807.665530][ T8884] r10:81e4b140 r9:200001c0 r8:00000000 r7:854a6780 r6:854a6780 r5:ea4f5e68 [ 807.665557][ T8884] r4:00000000 [ 807.665577][ T8884] [<815968e8>] (__sock_sendmsg) from [<81596a18>] (sock_write_iter+0xb8/0x104) [ 807.665647][ T8884] r7:854a6780 r6:85f8b0c0 r5:ea4f5f08 r4:ea4f5ef0 [ 807.665665][ T8884] [<81596960>] (sock_write_iter) from [<8056b168>] (vfs_write+0x3a4/0x44c) [ 807.665735][ T8884] r7:853ee000 r6:00000025 r5:85f8b0c0 r4:00004007 [ 807.665757][ T8884] [<8056adc4>] (vfs_write) from [<8056b3d4>] (ksys_write+0xc8/0xe8) [ 807.665827][ T8884] r10:00000004 r9:853ee000 r8:8020029c r7:00000025 r6:200001c0 r5:85f8b0c0 [ 807.665877][ T8884] r4:85f8b0c1 [ 807.665901][ T8884] [<8056b30c>] (ksys_write) from [<8056b404>] (sys_write+0x10/0x14) [ 807.665965][ T8884] r7:00000004 r6:001302c8 r5:00000000 r4:00000000 [ 807.665987][ T8884] [<8056b3f4>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 807.666039][ T8884] Exception stack(0xea4f5fa8 to 0xea4f5ff0) [ 807.666102][ T8884] 5fa0: 00000000 00000000 00000004 200001c0 00000025 00000000 [ 807.666162][ T8884] 5fc0: 00000000 00000000 001302c8 00000004 00300000 00000000 00006364 76f030bc [ 807.666199][ T8884] 5fe0: 76f02ec0 76f02eb0 0001929c 00132320 [ 811.130553][ T3705] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 811.280663][ T3705] usb 1-1: Using ep0 maxpacket: 16 [ 811.295007][ T3705] usb 1-1: unable to get BOS descriptor or descriptor too short [ 811.305055][ T3705] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 811.306404][ T3705] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 811.322612][ T3705] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 811.323838][ T3705] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 811.324815][ T3705] usb 1-1: Product: syz [ 811.326059][ T3705] usb 1-1: Manufacturer: syz [ 811.326859][ T3705] usb 1-1: SerialNumber: syz [ 811.611163][ T3705] usb 1-1: 0:2 : does not exist [ 811.645665][ T3705] usb 1-1: 5:0: failed to get current value for ch 0 (-22) [ 811.677811][ T3705] usb 1-1: 5:0: cannot get min/max values for control 2 (id 5) [ 811.695010][ T3705] usb 1-1: 5:0: cannot get min/max values for control 3 (id 5) [ 811.715173][ T3705] usb 1-1: 5:0: failed to get current value for ch 1 (-22) [ 811.766006][ T3705] usb 1-1: 5:0: cannot get min/max values for control 3 (id 5) [ 811.776372][ T3705] usb 1-1: 5:0: cannot get min/max values for control 2 (id 5) [ 811.784824][ T3705] usb 1-1: USB disconnect, device number 22 [ 814.451426][ T8973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8973 comm=syz.0.1669 [ 814.641709][ T8976] fuse: Bad value for 'fd' [ 815.414637][ T29] audit: type=1400 audit(815.290:380): avc: denied { write } for pid=8983 comm="syz.1.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 815.418036][ T8984] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=8984 comm=syz.1.1674 [ 815.441807][ T29] audit: type=1400 audit(815.320:381): avc: denied { module_load } for pid=8983 comm="syz.1.1674" path=2F6D656D66643A120E1240B95F7EF59742D6D56CF95B51D36F3E65C274E0D55607A29EFBAFFCD930812A3D986A6E1EF621DE0754622A2119767A3B827831D08FB19841B4A730395DB7AEE73B6DA499974FF8448D446A54CFD1972E76E07A91ED44F7B0B9BEFA1EC66AC48D9581B6E19A62FA2B846D1A38C326E8A369EF19E743AC97660F713ABFE21AD2AD95E3267E5CE4CC195370B8BBAC973B61A7BB08EE0536C86B7939925D597644D42F1C202864656C6574656429 dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 815.857677][ T8987] fuse: Bad value for 'fd' [ 816.095546][ T29] audit: type=1400 audit(815.970:382): avc: denied { setopt } for pid=8989 comm="syz.0.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 816.152645][ T29] audit: type=1400 audit(816.020:383): avc: denied { accept } for pid=8989 comm="syz.0.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 816.467593][ T29] audit: type=1400 audit(816.340:384): avc: denied { write } for pid=9001 comm="syz.0.1678" name="fib_triestat" dev="proc" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 819.633278][ T29] audit: type=1400 audit(819.510:385): avc: denied { execute } for pid=9006 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 819.651753][ T29] audit: type=1400 audit(819.510:386): avc: denied { execute_no_trans } for pid=9006 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 819.725250][ T29] audit: type=1400 audit(819.600:387): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 819.838937][ T1318] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 819.944027][ T1318] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 820.026229][ T1318] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 820.119346][ T1318] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 820.656033][ T1318] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 820.676519][ T1318] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 820.694637][ T1318] bond0 (unregistering): Released all slaves [ 820.808828][ T1318] hsr_slave_0: left promiscuous mode [ 820.827890][ T1318] hsr_slave_1: left promiscuous mode [ 820.872670][ T1318] veth1_macvtap: left promiscuous mode [ 820.880907][ T1318] veth0_macvtap: left promiscuous mode [ 820.882570][ T1318] veth1_vlan: left promiscuous mode [ 820.883890][ T1318] veth0_vlan: left promiscuous mode [ 824.506040][ T9009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 824.521273][ T9009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 825.396873][ T8984] Invalid ELF header magic: != ELF [ 826.678022][ T9009] hsr_slave_0: entered promiscuous mode [ 826.685274][ T9009] hsr_slave_1: entered promiscuous mode [ 826.692512][ T9009] debugfs: 'hsr0' already exists in 'hsr' [ 826.692906][ T9009] Cannot create hsr debugfs directory [ 828.643389][ T9009] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 828.675107][ T9009] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 828.732535][ T9009] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 828.781801][ T9009] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 830.222352][ T29] audit: type=1400 audit(830.100:388): avc: denied { map } for pid=9345 comm="syz.1.1683" path="/proc/2005/net/icmp6" dev="proc" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 830.403133][ T9348] can: request_module (can-proto-5) failed. [ 830.981932][ T9009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 833.598955][ T29] audit: type=1400 audit(833.470:389): avc: denied { mount } for pid=9379 comm="syz.1.1686" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 837.262811][ T9009] veth0_vlan: entered promiscuous mode [ 837.282903][ T9009] veth1_vlan: entered promiscuous mode [ 837.536995][ T9009] veth0_macvtap: entered promiscuous mode [ 837.621402][ T9009] veth1_macvtap: entered promiscuous mode [ 837.914389][ T6868] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 837.915285][ T6868] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 837.915406][ T6868] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 837.915491][ T6868] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 838.153749][ T29] audit: type=1400 audit(838.030:390): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/syzkaller.mK8T2v/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 838.163446][ T29] audit: type=1400 audit(838.040:391): avc: denied { mount } for pid=9009 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 838.187036][ T29] audit: type=1400 audit(838.060:392): avc: denied { mount } for pid=9009 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 838.230995][ T29] audit: type=1400 audit(838.100:393): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/syzkaller.mK8T2v/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 838.235033][ T29] audit: type=1400 audit(838.110:394): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/syzkaller.mK8T2v/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=20247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 838.294026][ T29] audit: type=1400 audit(838.170:395): avc: denied { unmount } for pid=9009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 838.308389][ T29] audit: type=1400 audit(838.180:396): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 838.321992][ T29] audit: type=1400 audit(838.200:397): avc: denied { mount } for pid=9009 comm="syz-executor" name="/" dev="gadgetfs" ino=2256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 838.330093][ T29] audit: type=1400 audit(838.200:398): avc: denied { mount } for pid=9009 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 838.342738][ T29] audit: type=1400 audit(838.220:399): avc: denied { mounton } for pid=9009 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 838.693143][ T9422] fuse: Bad value for 'fd' [ 839.016776][ T9424] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1687'. [ 839.602073][ T9432] syz.0.1690 uses obsolete (PF_INET,SOCK_PACKET) [ 840.466782][ T9445] syzkaller1: entered promiscuous mode [ 840.475197][ T9445] syzkaller1: entered allmulticast mode [ 844.921127][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 844.923214][ T29] audit: type=1400 audit(844.780:404): avc: denied { unmount } for pid=9009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 845.176387][ T9487] input: syz0 as /devices/virtual/input/input6 [ 845.710966][ T42] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 845.869038][ T42] usb 1-1: config index 0 descriptor too short (expected 39, got 27) [ 845.870473][ T42] usb 1-1: config 0 interface 0 altsetting 251 endpoint 0x9 has invalid wMaxPacketSize 0 [ 845.870679][ T42] usb 1-1: config 0 interface 0 has no altsetting 0 [ 845.892812][ T42] usb 1-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=99.0b [ 845.893219][ T42] usb 1-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 845.893401][ T42] usb 1-1: Product: syz [ 845.893479][ T42] usb 1-1: Manufacturer: syz [ 845.893569][ T42] usb 1-1: SerialNumber: syz [ 845.903113][ T42] usb 1-1: config 0 descriptor?? [ 845.932721][ T42] hub 1-1:0.0: bad descriptor, ignoring hub [ 845.933619][ T42] hub 1-1:0.0: probe with driver hub failed with error -5 [ 845.951660][ T42] usb 1-1: selecting invalid altsetting 0 [ 846.252702][ T42] usb 1-1: USB disconnect, device number 23 [ 846.610144][ T42] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 846.783264][ T42] usb 1-1: config index 0 descriptor too short (expected 39, got 27) [ 846.783885][ T42] usb 1-1: config 0 interface 0 altsetting 251 endpoint 0x9 has invalid wMaxPacketSize 0 [ 846.786706][ T42] usb 1-1: config 0 interface 0 has no altsetting 0 [ 846.795285][ T42] usb 1-1: New USB device found, idVendor=045e, idProduct=0283, bcdDevice=99.0b [ 846.795584][ T42] usb 1-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 846.795731][ T42] usb 1-1: Product: syz [ 846.795766][ T42] usb 1-1: Manufacturer: syz [ 846.795781][ T42] usb 1-1: SerialNumber: syz [ 846.801803][ T42] usb 1-1: config 0 descriptor?? [ 846.812064][ T42] hub 1-1:0.0: bad descriptor, ignoring hub [ 846.812317][ T42] hub 1-1:0.0: probe with driver hub failed with error -5 [ 846.814782][ T42] usb 1-1: selecting invalid altsetting 0 [ 846.956348][ T6867] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.014344][ T6867] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.112581][ T6867] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.141637][ T4757] usb 1-1: USB disconnect, device number 24 [ 847.207991][ T6867] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.624168][ T6867] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 847.640282][ T6867] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 847.643961][ T6867] bond0 (unregistering): Released all slaves [ 847.772713][ T6867] hsr_slave_0: left promiscuous mode [ 847.782047][ T6867] hsr_slave_1: left promiscuous mode [ 847.811890][ T6867] veth1_macvtap: left promiscuous mode [ 847.812329][ T6867] veth0_macvtap: left promiscuous mode [ 847.812959][ T6867] veth1_vlan: left promiscuous mode [ 847.813596][ T6867] veth0_vlan: left promiscuous mode [ 849.050737][ T9] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 849.242551][ T9] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 849.243508][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 849.248904][ T9] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 849.250175][ T9] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 849.250730][ T9] usb 1-1: Manufacturer: syz [ 849.256802][ T9] usb 1-1: config 0 descriptor?? [ 849.482243][ T9] rc_core: IR keymap rc-hauppauge not found [ 849.485913][ T9] Registered IR keymap rc-empty [ 849.490465][ T9] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 849.497021][ T9] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input7 [ 849.540565][ T9] usb 1-1: USB disconnect, device number 25 [ 849.745816][ T29] audit: type=1400 audit(849.620:405): avc: denied { read } for pid=9654 comm="syz.0.1705" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 849.751150][ T29] audit: type=1400 audit(849.620:406): avc: denied { open } for pid=9654 comm="syz.0.1705" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 849.755941][ T29] audit: type=1400 audit(849.630:407): avc: denied { ioctl } for pid=9654 comm="syz.0.1705" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 849.764811][ T29] audit: type=1400 audit(849.640:408): avc: denied { set_context_mgr } for pid=9654 comm="syz.0.1705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 849.792387][ T29] audit: type=1400 audit(849.670:409): avc: denied { map } for pid=9654 comm="syz.0.1705" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 849.833962][ T29] audit: type=1400 audit(849.690:410): avc: denied { call } for pid=9654 comm="syz.0.1705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 850.404905][ T29] audit: type=1400 audit(850.280:411): avc: denied { read } for pid=9709 comm="syz.0.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 850.875016][ T9719] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1709'. [ 850.897425][ T29] audit: type=1400 audit(850.770:412): avc: denied { name_bind } for pid=9718 comm="syz.0.1709" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 851.083580][ T9730] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 851.084310][ T9730] IPv6: NLM_F_CREATE should be set when creating new route [ 851.145215][ T9527] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 851.150963][ T9527] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 852.511288][ T9527] hsr_slave_0: entered promiscuous mode [ 852.515470][ T9527] hsr_slave_1: entered promiscuous mode [ 853.417410][ T9527] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 853.435422][ T9527] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 853.455040][ T9527] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 853.476570][ T9527] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 854.749175][ T9527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 859.226878][ T9527] veth0_vlan: entered promiscuous mode [ 859.269257][ T9527] veth1_vlan: entered promiscuous mode [ 859.386616][ T9527] veth0_macvtap: entered promiscuous mode [ 859.401870][ T9527] veth1_macvtap: entered promiscuous mode [ 859.514816][ T59] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.515693][ T59] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.516932][ T59] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.527733][ T59] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 861.424858][ T29] audit: type=1400 audit(861.300:413): avc: denied { read } for pid=10117 comm="syz.1.1713" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 861.428374][ T29] audit: type=1400 audit(861.300:414): avc: denied { open } for pid=10117 comm="syz.1.1713" path="/1/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 861.437330][ T29] audit: type=1400 audit(861.310:415): avc: denied { ioctl } for pid=10117 comm="syz.1.1713" path="/1/file0/file0" dev="fuse" ino=64 ioctlcmd=0x4d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 862.082602][ T59] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.085772][ T59] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.086479][ T59] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.086626][ T59] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.286561][T10130] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1715'. [ 867.924137][T10177] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1727'. [ 868.056314][ T29] audit: type=1400 audit(867.930:416): avc: denied { bind } for pid=10176 comm="syz.0.1727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 868.073365][ T29] audit: type=1400 audit(867.940:417): avc: denied { nlmsg_write } for pid=10176 comm="syz.0.1727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 868.075771][ T29] audit: type=1400 audit(867.950:418): avc: denied { read } for pid=10176 comm="syz.0.1727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 868.820319][ T29] audit: type=1400 audit(868.690:419): avc: denied { mounton } for pid=10189 comm="syz.0.1733" path="/proc/78/cgroup" dev="proc" ino=21178 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 869.496598][ T29] audit: type=1400 audit(869.370:420): avc: denied { mount } for pid=10207 comm="syz.0.1741" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 869.521312][ T29] audit: type=1400 audit(869.390:421): avc: denied { unmount } for pid=9009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 870.746785][ T29] audit: type=1400 audit(870.620:422): avc: denied { setopt } for pid=10221 comm="syz.1.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 870.751945][ T29] audit: type=1400 audit(870.620:423): avc: denied { write } for pid=10221 comm="syz.1.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 879.326690][ T29] audit: type=1400 audit(879.200:424): avc: denied { mounton } for pid=10330 comm="syz.1.1798" path="/proc/81" dev="proc" ino=21930 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 879.406909][ T29] audit: type=1400 audit(879.280:425): avc: denied { read } for pid=10332 comm="syz.0.1799" laddr=172.20.20.10 lport=6 faddr=172.20.20.187 fport=20005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 883.376665][ T29] audit: type=1400 audit(883.240:426): avc: denied { getopt } for pid=10381 comm="syz.0.1823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 892.080428][ T29] audit: type=1400 audit(891.950:427): avc: denied { bind } for pid=10498 comm="syz.1.1870" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 899.578137][ T29] audit: type=1400 audit(899.450:428): avc: denied { map } for pid=10590 comm="syz.1.1909" path="socket:[22793]" dev="sockfs" ino=22793 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 899.591501][ T29] audit: type=1400 audit(899.460:429): avc: denied { read } for pid=10590 comm="syz.1.1909" path="socket:[22793]" dev="sockfs" ino=22793 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 911.457534][ T29] audit: type=1400 audit(911.330:430): avc: denied { lock } for pid=10699 comm="syz.1.1951" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 912.232444][ T29] audit: type=1400 audit(912.110:431): avc: denied { create } for pid=10710 comm="syz.0.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 912.244493][ T29] audit: type=1400 audit(912.120:432): avc: denied { connect } for pid=10710 comm="syz.0.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 912.255400][ T29] audit: type=1400 audit(912.130:433): avc: denied { bind } for pid=10710 comm="syz.0.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 912.287007][ T29] audit: type=1400 audit(912.160:434): avc: denied { write } for pid=10710 comm="syz.0.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 912.467973][ T29] audit: type=1400 audit(912.340:435): avc: denied { map_read map_write } for pid=10713 comm="syz.1.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 913.449862][ T29] audit: type=1400 audit(913.320:436): avc: denied { create } for pid=10719 comm="syz.0.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 915.250141][ T29] audit: type=1400 audit(915.120:437): avc: denied { create } for pid=10742 comm="syz.1.1969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 915.250703][ T29] audit: type=1400 audit(915.120:438): avc: denied { write } for pid=10742 comm="syz.1.1969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 916.571570][T10751] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 919.290115][T10755] faux_driver vgem: [drm] Unknown color mode 181; guessing buffer size. [ 920.223268][T10760] bond0: (slave bond_slave_0): Releasing backup interface [ 920.241420][T10760] bond0: (slave bond_slave_1): Releasing backup interface [ 920.247123][T10760] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 921.546640][T10766] sch_tbf: burst 22 is lower than device lo mtu (81) ! [ 921.587740][T10766] sch_tbf: burst 22 is lower than device lo mtu (81) ! [ 934.380064][T10773] bridge_slave_1: entered promiscuous mode [ 935.370561][T10775] netlink: 'syz.0.1981': attribute type 3 has an invalid length. [ 937.237160][T10777] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10777 comm=syz.0.1981 [ 937.240992][ T29] audit: type=1400 audit(937.110:439): avc: denied { nlmsg_write } for pid=10774 comm="syz.0.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 937.258014][T10777] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=10777 comm=syz.0.1981 [ 937.723588][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 937.728101][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.728975][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.730126][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.730993][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.731858][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.734014][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 937.735318][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.738572][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.739870][T10731] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 937.757843][T10731] hid-generic 0000:0000:0000.0001: hidraw0: HID v8.00 Device [syz0] on syz1 [ 942.276053][T10844] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 942.532868][T10847] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2007'. [ 943.374188][ T29] audit: type=1326 audit(943.230:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.417210][ T29] audit: type=1326 audit(943.280:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.435571][ T29] audit: type=1326 audit(943.310:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 943.453250][ T29] audit: type=1326 audit(943.320:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.490415][ T29] audit: type=1326 audit(943.360:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=180 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.493929][ T29] audit: type=1326 audit(943.360:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.494474][ T29] audit: type=1326 audit(943.360:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10866 comm="syz.1.2008" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 943.540657][T10870] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2009'. [ 943.600299][T10870] bond_slave_0: entered promiscuous mode [ 943.604446][T10870] bond_slave_1: entered promiscuous mode [ 943.622606][T10870] 8021q: adding VLAN 0 to HW filter on device macvtap0 [ 943.641583][T10870] bond_slave_0: left promiscuous mode [ 943.641909][T10870] bond_slave_1: left promiscuous mode [ 943.797851][T10876] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 944.730490][T10887] netlink: 16150 bytes leftover after parsing attributes in process `syz.0.2014'. [ 945.222219][T10891] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 945.740906][T10901] netlink: 64 bytes leftover after parsing attributes in process `syz.1.2018'. [ 946.217788][ T29] audit: type=1326 audit(946.090:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.1.2019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 946.218967][ T29] audit: type=1326 audit(946.090:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.1.2019" exe="/syz-executor" sig=0 arch=40000028 syscall=397 compat=0 ip=0x132320 code=0x7ffc0000 [ 946.225630][ T29] audit: type=1326 audit(946.090:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.1.2019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 948.211392][T10912] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 949.618001][T10924] netlink: 'syz.0.2027': attribute type 9 has an invalid length. [ 949.624571][T10924] netlink: 16166 bytes leftover after parsing attributes in process `syz.0.2027'. [ 949.712892][T10925] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 950.147346][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 950.150280][ T29] audit: type=1400 audit(950.020:451): avc: denied { create } for pid=10928 comm="syz.1.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 950.150733][ T29] audit: type=1326 audit(950.020:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.156087][ T29] audit: type=1326 audit(950.020:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.173712][ T29] audit: type=1326 audit(950.050:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.178817][ T29] audit: type=1326 audit(950.050:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.193173][ T29] audit: type=1326 audit(950.070:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.194807][ T29] audit: type=1326 audit(950.070:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.205905][ T29] audit: type=1326 audit(950.080:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.230862][ T29] audit: type=1326 audit(950.100:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 950.235042][ T29] audit: type=1326 audit(950.110:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10931 comm="syz.0.2030" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 951.818062][T10948] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 968.070306][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 968.071530][ T29] audit: type=1400 audit(967.930:468): avc: denied { load_policy } for pid=10996 comm="syz.1.2049" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 968.112966][T10997] SELinux: failed to load policy [ 969.503779][T11011] SELinux: failed to load policy [ 970.076655][T11016] netlink: 8 bytes leftover after parsing attributes in process `'. [ 970.768926][T11012] Process accounting resumed [ 971.960215][T11026] SELinux: failed to load policy [ 972.405345][T11028] SELinux: policydb version 1307887389 does not match my version range 15-35 [ 972.411734][T11028] SELinux: failed to load policy [ 972.806151][T11034] netlink: 'syz.0.2062': attribute type 7 has an invalid length. [ 973.025366][ T29] audit: type=1400 audit(972.900:469): avc: denied { block_suspend } for pid=11035 comm="syz.1.2063" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 973.432900][T11043] SELinux: failed to load policy [ 973.803886][ T29] audit: type=1326 audit(973.680:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 973.823332][ T29] audit: type=1326 audit(973.680:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x132320 code=0x7ffc0000 [ 973.917473][ T29] audit: type=1326 audit(973.790:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 973.990653][ T29] audit: type=1326 audit(973.830:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x132320 code=0x7ffc0000 [ 974.033112][ T29] audit: type=1326 audit(973.870:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 974.070391][ T29] audit: type=1326 audit(973.920:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=371 compat=0 ip=0x132320 code=0x7ffc0000 [ 974.072451][ T29] audit: type=1326 audit(973.940:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11047 comm="syz.1.2067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 974.737223][T11058] SELinux: failed to load policy [ 975.854641][T11065] ------------[ cut here ]------------ [ 975.855343][T11065] WARNING: kernel/sched/core.c:10569 at sched_mm_cid_fork+0x34c/0x45c, CPU#1: kworker/u8:4/11065 [ 975.873429][T11065] Modules linked in: [ 975.874576][T11065] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 975.875162][T11065] CPU: 1 UID: 0 PID: 11065 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT [ 975.875550][T11065] Hardware name: ARM-Versatile Express [ 975.875753][T11065] Call trace: [ 975.875909][T11065] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 975.876248][T11065] r7:82283ab8 r6:860a6c00 r5:00000000 r4:8229586c [ 975.876456][T11065] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 975.876794][T11065] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 975.877089][T11065] r5:00000000 r4:82a7bd14 [ 975.877609][T11065] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 975.878315][T11065] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 975.878725][T11065] r7:80295b38 [ 975.878932][T11065] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 975.879230][T11065] r3:8280c704 r2:00000001 r1:8227c020 r0:82283ab8 [ 975.879772][T11065] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 975.880292][T11065] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 975.880875][T11065] r8:00000009 r7:822866ac r6:e8389e8c r5:860a6c00 r4:00000000 [ 975.881181][T11065] [<8025233c>] (warn_slowpath_fmt) from [<80295b38>] (sched_mm_cid_fork+0x34c/0x45c) [ 975.881708][T11065] r10:85bc7c58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:860a6c00 r5:85bc7c00 [ 975.882003][T11065] r4:00000000 [ 975.882151][T11065] [<802957ec>] (sched_mm_cid_fork) from [<80295c58>] (sched_mm_cid_after_execve+0x10/0x14) [ 975.882536][T11065] r10:85bc7c58 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:fffffffc r5:85bc7c00 [ 975.882924][T11065] r4:860a6c00 [ 975.883188][T11065] [<80295c48>] (sched_mm_cid_after_execve) from [<805739d4>] (bprm_execve+0x14c/0x540) [ 975.883679][T11065] [<80573888>] (bprm_execve) from [<80575120>] (kernel_execve+0xf8/0x190) [ 975.884023][T11065] r10:00000000 r9:00000000 r8:828f58f0 r7:85cc5400 r6:838e6000 r5:85bc7c00 [ 975.884367][T11065] r4:00000000 [ 975.884523][T11065] [<80575028>] (kernel_execve) from [<80270e80>] (call_usermodehelper_exec_async+0xf0/0x160) [ 975.884907][T11065] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:85cc5900 r4:83837d00 [ 975.885210][T11065] [<80270d90>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 975.885656][T11065] Exception stack(0xe8389fb0 to 0xe8389ff8) [ 975.885942][T11065] 9fa0: 00000000 00000000 00000000 00000000 [ 975.886266][T11065] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 975.886534][T11065] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 975.887412][T11065] r7:00000000 r6:00000000 r5:80270d90 r4:85cc5900 [ 975.890967][T11065] Rebooting in 86400 seconds..