last executing test programs: 3.631321678s ago: executing program 1 (id=1133): socket$kcm(0x10, 0x2, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000100), 0x1f, 0x0) syz_open_dev$dri(&(0x7f0000000100), 0x1f, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x12, 0xf, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r1, &(0x7f00000003c0), 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r1}, &(0x7f0000000440), &(0x7f0000000480)=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000000c0)={r1, &(0x7f00000005c0), 0x20000000}, 0x20) 3.19978916s ago: executing program 1 (id=1136): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000080), 0x0, 0x0) lgetxattr(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)=@known='user.incfs.metadata\x00', 0x0, 0x0) 2.989369406s ago: executing program 1 (id=1137): syz_open_dev$sndpcmp(&(0x7f0000002440), 0x0, 0x0) socket$inet(0x2, 0x2, 0x6) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000480)=0x102, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0xf3e, 0x62) semtimedop(0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f00000000c0)="3f0336082608123a2c001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c152bfdf9435e3ffe46", 0xe90c, 0xa0c4, &(0x7f0000000540)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 2.229769548s ago: executing program 0 (id=1140): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x8, 0x3, 0x360, 0x198, 0xffffffff, 0xffffffff, 0x198, 0xffffffff, 0x290, 0xffffffff, 0xffffffff, 0x290, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @dev, [], [], 'bond0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0x138, 0x198, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@rateest={{0x68}, {'batadv0\x00', 'veth0_to_batadv\x00', 0x3}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, {{@ipv6={@remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'hsr0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28}, {'^e'}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 2.225554868s ago: executing program 0 (id=1141): syz_usb_connect(0x5, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 2.060698863s ago: executing program 1 (id=1142): syz_usb_connect(0x5, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.616959775s ago: executing program 0 (id=1143): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000bf"], 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000380)=0x20001000, 0x4) r1 = syz_open_dev$sndctrl(&(0x7f0000000600), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000001340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r4 = dup(r3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x12, r4, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000240)={0x0, 0x1000000}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r7 = accept4$alg(r6, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) sendmmsg(r7, &(0x7f00000035c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000008c0)="89e62494ef80ce9d03e999b5169cd79c65", 0x11}], 0x1}}], 0x1, 0x20000040) io_submit(r8, 0x1, &(0x7f0000000580)=[&(0x7f00000000c0)={0x5000000, 0x0, 0xd, 0x0, 0x0, r7, &(0x7f0000000080)='=', 0x11}]) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/5, 0x1c000, 0x800}, 0x20) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 1.209505017s ago: executing program 1 (id=1144): sched_setscheduler(0x0, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="1c00000021006bcd210002006e04000081000010000000017aa60864", 0x1c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2539000020000365f507f62aa6172f7881"], 0x33fe0) 1.120940069s ago: executing program 0 (id=1145): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, 0x0) 831.860107ms ago: executing program 0 (id=1146): r0 = io_uring_setup(0x36ba, &(0x7f0000000480)={0x0, 0x0, 0x80, 0x0, 0x2fc}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffefffff6, 0x20031, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002700)=""/4118, 0x1000}], 0x0, 0x34}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) futex_waitv(&(0x7f0000000180)=[{0x0, &(0x7f0000000000), 0x2}, {0x3, &(0x7f0000000040)=0x3, 0x2}], 0x2, 0x0, 0x0, 0x0) futex(&(0x7f0000000140), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 637.125622ms ago: executing program 1 (id=1147): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x20) mount$fuse(0x0, 0x0, 0x0, 0x200008, &(0x7f00000004c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000000)={&(0x7f00001c4000/0x3000)=nil, &(0x7f0000000000/0xc00000)=nil, 0x3000, 0x0, 0x2}) 0s ago: executing program 0 (id=1148): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = gettid() r2 = epoll_create1(0x0) epoll_pwait2(r2, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) tkill(r1, 0x7) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r3, 0x1) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet_smc(0x2b, 0x1, 0x0) r6 = socket$nl_audit(0x10, 0x3, 0x9) r7 = dup3(r5, r6, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r7, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}, 0x4}, 0x10) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000000)=0x1, 0x4) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000140)) r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x4206, r8, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r9 = dup3(r0, r4, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000300)='veth0_to_hsr\x00', 0x10) accept4$inet(r9, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80800) kernel console output (not intermixed with test programs): o interface number 0 [ 247.355520][ T10] usb 2-1: config 3 interface 130 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 10 [ 247.359902][ T10] usb 2-1: config 3 interface 130 has no altsetting 0 [ 247.370714][ T10] usb 2-1: New USB device found, idVendor=07b8, idProduct=8189, bcdDevice=f0.e1 [ 247.371305][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 247.371635][ T10] usb 2-1: Product: ࡠ [ 247.371891][ T10] usb 2-1: Manufacturer: 㐉 [ 247.372102][ T10] usb 2-1: SerialNumber: 蚻甕轘䁙詭᧬纋碷ガ﵅ᶈ섐鹴ﳓ⼵䴥湌秝躑쭋ֻ헭驊瀲촙里虷ㆌ為社氊硪揶䆰樂構鎙뻏屘惉㆓鷊쌘틼簈뗀∆亢驦뱌뇏皔쭵䶄ન徉ᝎﭑ壆粭鿤겪藧貍ꍓ岌彣ᯗ寲ꂇ窌ᄩ᧬꜀ᬥꎠ쮦͸ [ 247.647297][ T10] usb 2-1: USB disconnect, device number 3 [ 257.603768][ T31] audit: type=1400 audit(257.530:211): avc: denied { create } for pid=4561 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 259.809244][ T31] audit: type=1400 audit(259.740:212): avc: denied { mount } for pid=4566 comm="syz.1.243" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 271.107683][ T31] audit: type=1400 audit(271.040:213): avc: denied { ioctl } for pid=4658 comm="syz.1.263" path="socket:[5273]" dev="sockfs" ino=5273 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 271.472779][ T4664] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4664 comm=syz.0.265 [ 274.351149][ T31] audit: type=1400 audit(274.280:214): avc: denied { bind } for pid=4680 comm="syz.1.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 275.134943][ T31] audit: type=1400 audit(275.060:215): avc: denied { setcheckreqprot } for pid=4685 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 294.209913][ T4765] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4765 comm=syz.0.288 [ 294.552805][ T31] audit: type=1400 audit(294.480:216): avc: denied { setattr } for pid=4769 comm="syz.0.290" name="UDP-Lite" dev="sockfs" ino=5352 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 294.618798][ T31] audit: type=1400 audit(294.550:217): avc: denied { create } for pid=4769 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 298.071407][ T4789] Zero length message leads to an empty skb [ 304.310922][ T31] audit: type=1400 audit(304.240:218): avc: denied { create } for pid=4812 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 315.351262][ T4880] veth0_macvtap: left promiscuous mode [ 315.445378][ T31] audit: type=1400 audit(315.370:219): avc: denied { name_bind } for pid=4879 comm="syz.1.324" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 315.797406][ T31] audit: type=1400 audit(315.730:220): avc: denied { read } for pid=4882 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 320.730402][ T4916] can: request_module (can-proto-4) failed. [ 320.856824][ T31] audit: type=1400 audit(320.780:221): avc: denied { listen } for pid=4915 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 320.947565][ T4909] FAULT_INJECTION: forcing a failure. [ 320.947565][ T4909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.948286][ T4909] CPU: 0 UID: 0 PID: 4909 Comm: syz.1.334 Not tainted 6.12.0-syzkaller #0 [ 320.948639][ T4909] Hardware name: ARM-Versatile Express [ 320.948847][ T4909] Call trace: [ 320.949034][ T4909] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 320.949427][ T4909] r7:84fa23a3 r6:00000000 r5:60000113 r4:820413b8 [ 320.949687][ T4909] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 320.950036][ T4909] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 320.950377][ T4909] r5:00000000 r4:82751908 [ 320.950601][ T4909] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 320.950958][ T4909] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 320.951328][ T4909] r6:00000000 r5:eaa25e78 r4:00000015 [ 320.951577][ T4909] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 320.951946][ T4909] [<808f19d4>] (should_fail_usercopy) from [<808439b8>] (_copy_from_iter+0x68/0x7c8) [ 320.952324][ T4909] [<80843950>] (_copy_from_iter) from [<81847ffc>] (isotp_sendmsg+0x25c/0x7fc) [ 320.952696][ T4909] r10:eaa25e68 r9:84fa23a3 r8:eaa25e78 r7:00000015 r6:84fa0000 r5:84fa2000 [ 320.952994][ T4909] r4:00000000 [ 320.953158][ T4909] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 320.953504][ T4909] r10:81c4a400 r9:20000080 r8:00000000 r7:8446a780 r6:8446a780 r5:eaa25e68 [ 320.953793][ T4909] r4:00000000 [ 320.953944][ T4909] [<814955cc>] (__sock_sendmsg) from [<814956e4>] (sock_write_iter+0xa0/0xfc) [ 320.954283][ T4909] r7:8446a780 r6:83fd6900 r5:eaa25f08 r4:eaa25ef0 [ 320.954544][ T4909] [<81495644>] (sock_write_iter) from [<8051def4>] (vfs_write+0x3a8/0x44c) [ 320.954885][ T4909] r7:83dea400 r6:00000015 r5:83fd6900 r4:00000000 [ 320.955123][ T4909] [<8051db4c>] (vfs_write) from [<8051e160>] (ksys_write+0xd0/0xe4) [ 320.955448][ T4909] r10:00000004 r9:83dea400 r8:8020029c r7:00000015 r6:20000080 r5:83fd6900 [ 320.955745][ T4909] r4:83fd6901 [ 320.955915][ T4909] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 320.956198][ T4909] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 320.957035][ T4909] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 320.958119][ T4909] Exception stack(0xeaa25fa8 to 0xeaa25ff0) [ 320.958415][ T4909] 5fa0: 00000000 00000000 00000003 20000080 00000015 00000000 [ 320.958744][ T4909] 5fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b560bc [ 320.959055][ T4909] 5fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 330.859181][ T31] audit: type=1400 audit(330.790:222): avc: denied { getopt } for pid=4967 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 331.065390][ T4970] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 331.065993][ T4970] audit: out of memory in audit_log_start [ 340.619929][ T31] audit: type=1400 audit(340.550:223): avc: denied { create } for pid=4994 comm="syz.1.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 342.798362][ T31] audit: type=1400 audit(342.730:224): avc: denied { create } for pid=5005 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 347.668592][ T5024] FAULT_INJECTION: forcing a failure. [ 347.668592][ T5024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.669237][ T5024] CPU: 1 UID: 0 PID: 5024 Comm: syz.0.366 Not tainted 6.12.0-syzkaller #0 [ 347.669582][ T5024] Hardware name: ARM-Versatile Express [ 347.669809][ T5024] Call trace: [ 347.670010][ T5024] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 347.670390][ T5024] r7:00000000 r6:76a7cf30 r5:60000013 r4:820413b8 [ 347.670645][ T5024] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 347.670986][ T5024] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 347.671337][ T5024] r5:00000000 r4:82751908 [ 347.671560][ T5024] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 347.671908][ T5024] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 347.672286][ T5024] r6:76a7cf30 r5:00000001 r4:00000001 [ 347.672517][ T5024] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 347.672939][ T5024] [<808f19d4>] (should_fail_usercopy) from [<8084f240>] (kstrtouint_from_user+0x60/0x134) [ 347.673314][ T5024] [<8084f1e0>] (kstrtouint_from_user) from [<805cdf64>] (proc_fail_nth_write+0x40/0xe8) [ 347.673715][ T5024] r8:eb161f68 r7:836c3000 r6:00000001 r5:8e4c0d80 r4:00000001 [ 347.673984][ T5024] [<805cdf24>] (proc_fail_nth_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 347.674315][ T5024] r5:8e4c0d80 r4:805cdf24 [ 347.674506][ T5024] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 347.674836][ T5024] r10:00000004 r9:836c3000 r8:8020029c r7:00000000 r6:00000002 r5:8e4c0d80 [ 347.675136][ T5024] r4:8e4c0d83 [ 347.675294][ T5024] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 347.675619][ T5024] r7:00000004 r6:00000005 r5:76a7cf30 r4:00000001 [ 347.675857][ T5024] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 347.676168][ T5024] Exception stack(0xeb161fa8 to 0xeb161ff0) [ 347.676643][ T5024] 1fa0: 00000001 76a7cf30 00000005 76a7cf30 00000001 00000000 [ 347.677231][ T5024] 1fc0: 00000001 76a7cf30 00000005 00000004 00000000 00006364 003d0f00 76a7d0bc [ 347.677753][ T5024] 1fe0: 00000158 76a7ced0 000d8998 001313ec [ 347.914839][ T5031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5031 comm=syz.0.371 [ 348.948704][ T5033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5033 comm=syz.0.371 [ 348.955477][ T5033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5033 comm=syz.0.371 [ 350.243420][ T5039] FAULT_INJECTION: forcing a failure. [ 350.243420][ T5039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.244933][ T5039] CPU: 1 UID: 0 PID: 5039 Comm: syz.1.373 Not tainted 6.12.0-syzkaller #0 [ 350.245513][ T5039] Hardware name: ARM-Versatile Express [ 350.245978][ T5039] Call trace: [ 350.247186][ T5039] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 350.249235][ T5039] r7:00000008 r6:20000100 r5:60000013 r4:820413b8 [ 350.249732][ T5039] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 350.250100][ T5039] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 350.250454][ T5039] r5:00000000 r4:82751908 [ 350.250666][ T5039] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 350.251042][ T5039] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 350.251427][ T5039] r6:20000100 r5:eb1e1ea4 r4:95e44000 [ 350.251660][ T5039] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 350.252046][ T5039] [<808f19d4>] (should_fail_usercopy) from [<81889a40>] (sctp_getsockopt+0x8ec/0x1c98) [ 350.252478][ T5039] [<81889154>] (sctp_getsockopt) from [<8149912c>] (sock_common_getsockopt+0x28/0x30) [ 350.252933][ T5039] r10:00000127 r9:20000180 r8:00000000 r7:8445cc80 r6:0000007b r5:00000084 [ 350.253284][ T5039] r4:81889154 [ 350.253474][ T5039] [<81499104>] (sock_common_getsockopt) from [<814961dc>] (do_sock_getsockopt+0x10c/0x29c) [ 350.253888][ T5039] r4:81499104 [ 350.254060][ T5039] [<814960d0>] (do_sock_getsockopt) from [<81497f88>] (__sys_getsockopt+0x94/0xcc) [ 350.254453][ T5039] r9:83dea400 r8:8e4c0b40 r7:eb1e1f50 r6:0000007b r5:eb1e1f58 r4:8e4c0b41 [ 350.254779][ T5039] [<81497ef4>] (__sys_getsockopt) from [<81497fdc>] (sys_getsockopt+0x1c/0x24) [ 350.255211][ T5039] r8:8020029c r7:00000127 r6:00131400 r5:00000000 r4:20000180 [ 350.255496][ T5039] [<81497fc0>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 350.256280][ T5039] Exception stack(0xeb1e1fa8 to 0xeb1e1ff0) [ 350.257052][ T5039] 1fa0: 20000180 00000000 00000004 00000084 0000007b 20000100 [ 350.257605][ T5039] 1fc0: 20000180 00000000 00131400 00000127 00000000 00006364 003d0f00 76b560bc [ 350.257964][ T5039] 1fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 350.937910][ T31] audit: type=1400 audit(350.870:225): avc: denied { getopt } for pid=5048 comm="syz.1.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 351.248430][ T31] audit: type=1400 audit(351.180:226): avc: denied { listen } for pid=5048 comm="syz.1.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 352.047556][ T5054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5054 comm=syz.1.378 [ 356.634659][ T31] audit: type=1400 audit(356.560:227): avc: denied { ioctl } for pid=5071 comm="syz.0.384" path="socket:[6268]" dev="sockfs" ino=6268 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 356.654167][ T31] audit: type=1400 audit(356.580:228): avc: denied { shutdown } for pid=5071 comm="syz.0.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 356.682967][ T31] audit: type=1400 audit(356.610:229): avc: denied { setattr } for pid=5071 comm="syz.0.384" name="NETLINK" dev="sockfs" ino=6268 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 357.050131][ T31] audit: type=1400 audit(356.980:230): avc: denied { map_read map_write } for pid=5076 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.134743][ T31] audit: type=1400 audit(358.060:231): avc: denied { connect } for pid=5089 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 358.510749][ T5090] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 359.237036][ T91] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 359.387129][ T91] usb 1-1: Using ep0 maxpacket: 8 [ 359.421310][ T91] usb 1-1: config 1 has an invalid interface number: 4 but max is 2 [ 359.421884][ T91] usb 1-1: config 1 has an invalid interface descriptor of length 3, skipping [ 359.422210][ T91] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 359.422572][ T91] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 359.422956][ T91] usb 1-1: config 1 has no interface number 1 [ 359.423314][ T91] usb 1-1: config 1 interface 4 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 359.423781][ T91] usb 1-1: config 1 interface 4 has no altsetting 0 [ 359.468822][ T91] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 359.469357][ T91] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 359.469776][ T91] usb 1-1: Product: ခ [ 359.469989][ T91] usb 1-1: Manufacturer: ࠧ [ 359.470175][ T91] usb 1-1: SerialNumber: 蔯ͅḳ歚预弬똳龉듰蔸ጤ檏脄ꓩ㎗蟉Ꮝ㕊츍箍螉蜥鷼쫹葀ꔑ鴄ꇞ﹥ퟰ࠹ᨐ琳⥞℥הּ䨷楦霪ᬢ干尚ꖍ䅒쿤岇蔋 [ 360.099295][ T5101] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 360.101838][ T5101] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 360.212518][ T31] audit: type=1400 audit(360.140:232): avc: denied { append } for pid=5100 comm="syz.0.393" name="pfkey" dev="proc" ino=4026532728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 360.253014][ T91] usb 1-1: 0:2 : does not exist [ 360.281100][ T91] usb 1-1: USB disconnect, device number 2 [ 360.317714][ T31] audit: type=1400 audit(360.230:233): avc: denied { create } for pid=5109 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 360.770488][ T5133] syz.1.397 uses obsolete (PF_INET,SOCK_PACKET) [ 361.090034][ T31] audit: type=1400 audit(361.020:234): avc: denied { accept } for pid=5128 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 361.810620][ T31] audit: type=1400 audit(361.740:235): avc: denied { create } for pid=5137 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 366.345003][ T31] audit: type=1400 audit(366.270:236): avc: denied { write } for pid=5155 comm="syz.1.404" name="icmp6" dev="proc" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 367.757327][ T31] audit: type=1400 audit(367.690:237): avc: denied { setopt } for pid=5159 comm="syz.1.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 367.770404][ T31] audit: type=1400 audit(367.700:238): avc: denied { read } for pid=5159 comm="syz.1.405" path="socket:[6411]" dev="sockfs" ino=6411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 383.012660][ T31] audit: type=1400 audit(382.940:239): avc: denied { ioctl } for pid=5204 comm="syz.0.415" path="socket:[6458]" dev="sockfs" ino=6458 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 396.161285][ T5257] FAULT_INJECTION: forcing a failure. [ 396.161285][ T5257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 396.161701][ T5257] CPU: 1 UID: 0 PID: 5257 Comm: syz.0.430 Not tainted 6.12.0-syzkaller #0 [ 396.161959][ T5257] Hardware name: ARM-Versatile Express [ 396.162072][ T5257] Call trace: [ 396.162168][ T5257] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 396.162369][ T5257] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 396.162510][ T5257] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 396.162669][ T5257] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 396.162846][ T5257] r5:00000000 r4:82751908 [ 396.162951][ T5257] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 396.163160][ T5257] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 396.163378][ T5257] r6:00000000 r5:ec8e9f68 r4:00000002 [ 396.163512][ T5257] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 396.163788][ T5257] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 396.164013][ T5257] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 396.164282][ T5257] r10:00000001 r9:805cc9a0 r8:00000002 r7:ec8e9f68 r6:0000000f r5:76b00f30 [ 396.164479][ T5257] r4:83de8c00 r3:ec8e9e9f [ 396.164581][ T5257] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 396.164803][ T5257] r8:76b00f30 r7:ec8e9f68 r6:83de8c00 r5:0000000f r4:937f1780 [ 396.164989][ T5257] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 396.165219][ T5257] r10:00000003 r9:83de8c00 r8:8020029c r7:00000000 r6:00000000 r5:937f1780 [ 396.165400][ T5257] r4:937f1783 [ 396.165532][ T5257] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 396.165764][ T5257] r7:00000003 r6:00000004 r5:76b00f30 r4:0000000f [ 396.165943][ T5257] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 396.166142][ T5257] Exception stack(0xec8e9fa8 to 0xec8e9ff0) [ 396.166493][ T5257] 9fa0: 0000000f 76b00f30 00000004 76b00f30 0000000f 00000000 [ 396.166825][ T5257] 9fc0: 0000000f 76b00f30 00000004 00000003 00000000 00006364 003d0f00 76b010bc [ 396.167155][ T5257] 9fe0: 00000158 76b00ed0 000d8998 00131324 [ 401.799883][ T31] audit: type=1400 audit(401.730:240): avc: denied { setattr } for pid=5268 comm="syz.0.435" name="NETLINK" dev="sockfs" ino=6607 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 404.970802][ T5272] SELinux: Context system_u:object_r:sound_device_t:s0 is not valid (left unmapped). [ 404.977041][ T31] audit: type=1400 audit(404.900:241): avc: denied { relabelfrom } for pid=5271 comm="syz.0.436" name="SCTP" dev="sockfs" ino=6113 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 404.978217][ T31] audit: type=1400 audit(404.900:242): avc: denied { relabelto } for pid=5271 comm="syz.0.436" name="SCTP" dev="sockfs" ino=6113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 trawcon="system_u:object_r:sound_device_t:s0" [ 404.997817][ T31] audit: type=1400 audit(404.930:243): avc: denied { shutdown } for pid=5271 comm="syz.0.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 409.182957][ T31] audit: type=1400 audit(409.110:244): avc: denied { read } for pid=5286 comm="syz.0.441" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 409.183955][ T31] audit: type=1400 audit(409.110:245): avc: denied { open } for pid=5286 comm="syz.0.441" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 409.228197][ T31] audit: type=1400 audit(409.160:246): avc: denied { ioctl } for pid=5286 comm="syz.0.441" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 409.229665][ T31] audit: type=1400 audit(409.160:247): avc: denied { set_context_mgr } for pid=5286 comm="syz.0.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 409.237939][ T5287] binder: BINDER_SET_CONTEXT_MGR already set [ 409.238483][ T5287] binder: 5286:5287 ioctl 40046207 0 returned -16 [ 409.250947][ T5287] binder: 5286:5287 ioctl 50009401 20000cc0 returned -22 [ 422.167268][ T31] audit: type=1400 audit(422.090:248): avc: denied { getopt } for pid=5318 comm="syz.0.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 422.866982][ T24] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 423.058561][ T24] usb 1-1: not running at top speed; connect to a high speed hub [ 423.069759][ T24] usb 1-1: config 1 interface 0 altsetting 1 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 423.070207][ T24] usb 1-1: config 1 interface 0 has no altsetting 0 [ 423.081929][ T24] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 423.082292][ T24] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 423.082573][ T24] usb 1-1: Product: Ѓ훟슊ᘄᲝ姩䟿ᢂ⋼酘ē쀖ᜡ㛀䕦瀮멧鴕晙耡獞锸몶ᓍB۝귫累쪜朰⢧ᮛ웎啙㦵但夛ĵ鵧큳ꟼ༬␔ [ 423.083013][ T24] usb 1-1: Manufacturer: 箦쾯ꕲ퓗槶緑➶൨ຝ馕훑⿪跭乺疒푊姙θ圍ᒊ듒阥ϥ뾕喦௺ൣᖆ혽꺴ꊉ柟ꋈ᛫韙惟⍩흪燐毀艜銢鴔柁⋱ၻ陵ꄾ䫳㧶♛❝硖ᤝ‒뗡⥁롆굱〹笔漖 [ 423.083648][ T24] usb 1-1: SerialNumber: 吃 [ 423.392627][ T5323] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 423.394868][ T5323] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 423.515107][ T24] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 423.524131][ T24] usb 1-1: USB disconnect, device number 3 [ 427.553622][ T31] audit: type=1400 audit(427.480:249): avc: denied { ioctl } for pid=5358 comm="syz.0.456" path="socket:[6715]" dev="sockfs" ino=6715 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 430.448368][ T5377] FAULT_INJECTION: forcing a failure. [ 430.448368][ T5377] name failslab, interval 1, probability 0, space 0, times 0 [ 430.448771][ T5377] CPU: 0 UID: 0 PID: 5377 Comm: syz.0.462 Not tainted 6.12.0-syzkaller #0 [ 430.448946][ T5377] Hardware name: ARM-Versatile Express [ 430.449038][ T5377] Call trace: [ 430.449206][ T5377] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 430.449422][ T5377] r7:00000c40 r6:8e4c0868 r5:60000013 r4:820413b8 [ 430.449555][ T5377] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 430.449744][ T5377] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 430.449937][ T5377] r5:00000000 r4:8271b79c [ 430.450044][ T5377] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 430.450273][ T5377] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 430.450490][ T5377] r6:8e4c0868 r5:00001000 r4:82c016c0 [ 430.450599][ T5377] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 430.450792][ T5377] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 430.451013][ T5377] r10:850a2400 r9:82f19400 r8:00000000 r7:83233bb0 r6:8e4c0868 r5:00001000 [ 430.451179][ T5377] r4:00000000 [ 430.451270][ T5377] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 430.451496][ T5377] r10:850a2400 r9:00000000 r8:8e4c0840 r7:00005450 r6:00000004 r5:81ad1efc [ 430.451678][ T5377] r4:8e4c0868 r3:824bb340 [ 430.451792][ T5377] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 430.452009][ T5377] r9:00000003 r8:8e4c0840 r7:00000000 r6:00000000 r5:00005450 r4:8e4c0840 [ 430.452178][ T5377] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 430.452462][ T5377] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 430.452650][ T5377] r7:00000000 r6:8e4c0841 r5:00000000 r4:00005450 [ 430.452787][ T5377] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 430.452970][ T5377] Exception stack(0xecd4dfa8 to 0xecd4dff0) [ 430.453117][ T5377] dfa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 430.453295][ T5377] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b010bc [ 430.453485][ T5377] dfe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 430.453685][ T5377] r10:00000036 r9:850a2400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 430.453849][ T5377] r4:00000000 [ 430.454144][ T5377] ERROR: Out of memory at tomoyo_realpath_from_path. [ 433.812139][ T5394] ======================================================= [ 433.812139][ T5394] WARNING: The mand mount option has been deprecated and [ 433.812139][ T5394] and is ignored by this kernel. Remove the mand [ 433.812139][ T5394] option from the mount to silence this warning. [ 433.812139][ T5394] ======================================================= [ 434.140097][ T5396] FAULT_INJECTION: forcing a failure. [ 434.140097][ T5396] name failslab, interval 1, probability 0, space 0, times 0 [ 434.140808][ T5396] CPU: 1 UID: 0 PID: 5396 Comm: syz.1.467 Not tainted 6.12.0-syzkaller #0 [ 434.141126][ T5396] Hardware name: ARM-Versatile Express [ 434.141350][ T5396] Call trace: [ 434.141544][ T5396] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 434.141919][ T5396] r7:00000d40 r6:937f1da8 r5:60000013 r4:820413b8 [ 434.142186][ T5396] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 434.142569][ T5396] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 434.142937][ T5396] r5:00000000 r4:8271b79c [ 434.143144][ T5396] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 434.143507][ T5396] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 434.143903][ T5396] r6:937f1da8 r5:0000001b r4:82c01240 [ 434.144133][ T5396] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 434.144549][ T5396] [<804d4614>] (__kmalloc_noprof) from [<8075b87c>] (tomoyo_encode2+0x64/0xf0) [ 434.144954][ T5396] r10:00000fff r9:82f18000 r8:00000000 r7:83004660 r6:937f1da8 r5:8535fffc [ 434.145275][ T5396] r4:8535ffec [ 434.145452][ T5396] [<8075b818>] (tomoyo_encode2) from [<8075b92c>] (tomoyo_encode+0x24/0x30) [ 434.145844][ T5396] r9:82f18000 r8:00000000 r7:83004660 r6:937f1da8 r5:00001000 r4:8535ffed [ 434.146219][ T5396] [<8075b908>] (tomoyo_encode) from [<8075b9b8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 434.146729][ T5396] r5:00001000 r4:8535f000 [ 434.147022][ T5396] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 434.147722][ T5396] r10:836c3000 r9:00000000 r8:937f1d80 r7:80111500 r6:00000004 r5:81ad1efc [ 434.148144][ T5396] r4:937f1da8 r3:824bb340 [ 434.148394][ T5396] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 434.148821][ T5396] r9:00000003 r8:937f1d80 r7:20001900 r6:20001900 r5:80111500 r4:937f1d80 [ 434.149140][ T5396] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 434.149521][ T5396] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 434.149918][ T5396] r7:20001900 r6:937f1d81 r5:00000000 r4:80111500 [ 434.150182][ T5396] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 434.150539][ T5396] Exception stack(0xed0d5fa8 to 0xed0d5ff0) [ 434.150794][ T5396] 5fa0: 00000000 00000000 00000003 80111500 20001900 00000000 [ 434.151162][ T5396] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b560bc [ 434.151517][ T5396] 5fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 434.151809][ T5396] r10:00000036 r9:836c3000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 434.152139][ T5396] r4:00000000 [ 434.207501][ T5396] ERROR: Out of memory at tomoyo_realpath_from_path. [ 434.517936][ T31] audit: type=1400 audit(434.450:250): avc: denied { connect } for pid=5398 comm="syz.1.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 434.540801][ T31] audit: type=1400 audit(434.470:251): avc: denied { ioctl } for pid=5398 comm="syz.1.468" path="socket:[7280]" dev="sockfs" ino=7280 ioctlcmd=0x9408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 439.567717][ T31] audit: type=1400 audit(439.500:252): avc: denied { shutdown } for pid=5419 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 444.518959][ T31] audit: type=1400 audit(444.450:253): avc: denied { wake_alarm } for pid=5439 comm="syz.0.478" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 453.682503][ T31] audit: type=1400 audit(453.610:254): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 454.207078][ T5476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=5476 comm=syz.0.488 [ 458.043997][ T31] audit: type=1400 audit(457.970:255): avc: denied { nlmsg_read } for pid=5488 comm="syz.0.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 462.071949][ T5508] FAULT_INJECTION: forcing a failure. [ 462.071949][ T5508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.072738][ T5508] CPU: 0 UID: 0 PID: 5508 Comm: syz.1.497 Not tainted 6.12.0-syzkaller #0 [ 462.073038][ T5508] Hardware name: ARM-Versatile Express [ 462.073264][ T5508] Call trace: [ 462.073487][ T5508] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 462.073884][ T5508] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 462.075249][ T5508] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 462.077471][ T5508] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 462.077992][ T5508] r5:00000000 r4:82751908 [ 462.078226][ T5508] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 462.078592][ T5508] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 462.078956][ T5508] r6:00000000 r5:ed5a9f68 r4:00000002 [ 462.079296][ T5508] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 462.081236][ T5508] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 462.081677][ T5508] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 462.082083][ T5508] r10:00000001 r9:805cc9a0 r8:00000002 r7:ed5a9f68 r6:0000000f r5:76b55f30 [ 462.082381][ T5508] r4:850a0000 r3:ed5a9e9f [ 462.082589][ T5508] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 462.082970][ T5508] r8:76b55f30 r7:ed5a9f68 r6:850a0000 r5:0000000f r4:83fd6600 [ 462.083243][ T5508] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 462.083568][ T5508] r10:00000003 r9:850a0000 r8:8020029c r7:00000000 r6:00000000 r5:83fd6600 [ 462.083909][ T5508] r4:83fd6603 [ 462.084091][ T5508] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 462.084489][ T5508] r7:00000003 r6:00000004 r5:76b55f30 r4:0000000f [ 462.084790][ T5508] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 462.085151][ T5508] Exception stack(0xed5a9fa8 to 0xed5a9ff0) [ 462.085456][ T5508] 9fa0: 0000000f 76b55f30 00000004 76b55f30 0000000f 00000000 [ 462.085836][ T5508] 9fc0: 0000000f 76b55f30 00000004 00000003 00000000 00006364 003d0f00 76b560bc [ 462.086260][ T5508] 9fe0: 00000158 76b55ed0 000d8998 00131324 [ 462.731416][ T5514] capability: warning: `syz.1.499' uses 32-bit capabilities (legacy support in use) [ 466.603132][ T5538] FAULT_INJECTION: forcing a failure. [ 466.603132][ T5538] name failslab, interval 1, probability 0, space 0, times 0 [ 466.603614][ T5538] CPU: 1 UID: 0 PID: 5538 Comm: syz.0.506 Not tainted 6.12.0-syzkaller #0 [ 466.603866][ T5538] Hardware name: ARM-Versatile Express [ 466.604042][ T5538] Call trace: [ 466.604278][ T5538] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 466.604600][ T5538] r7:83de9800 r6:00400cc0 r5:60000013 r4:820413b8 [ 466.604811][ T5538] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 466.605099][ T5538] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 466.605393][ T5538] r5:00000000 r4:8271b79c [ 466.605577][ T5538] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 466.605879][ T5538] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 466.606280][ T5538] r6:00400cc0 r5:ffffffff r4:82e9d240 [ 466.607234][ T5538] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 466.607540][ T5538] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 466.607905][ T5538] r10:ed6d5ddc r9:00000000 r8:00400cc0 r7:00000000 r6:82e9d240 r5:ffffffff [ 466.608073][ T5538] r4:82606040 [ 466.608159][ T5538] [<814a2b70>] (__alloc_skb) from [<814ab060>] (alloc_skb_with_frags+0x44/0x1ec) [ 466.608415][ T5538] r8:802a7e50 r7:ed6d5d7c r6:00000000 r5:00001000 r4:00000003 [ 466.608578][ T5538] [<814ab01c>] (alloc_skb_with_frags) from [<8149c290>] (sock_alloc_send_pskb+0x1f4/0x228) [ 466.608786][ T5538] r10:ed6d5ddc r9:00000000 r8:802a7e50 r7:ed6d5d7c r6:83de9800 r5:7fffffff [ 466.608962][ T5538] r4:83d5ea00 [ 466.609058][ T5538] [<8149c09c>] (sock_alloc_send_pskb) from [<8176174c>] (unix_dgram_sendmsg+0x154/0x8b8) [ 466.609278][ T5538] r10:00000000 r9:83d5ea00 r8:83de9800 r7:00000000 r6:00000000 r5:832e4000 [ 466.609438][ T5538] r4:ed6d5e68 [ 466.609552][ T5538] [<817615f8>] (unix_dgram_sendmsg) from [<81761ef4>] (unix_seqpacket_sendmsg+0x44/0x84) [ 466.609769][ T5538] r10:81c4a400 r9:00000000 r8:00000000 r7:832e4000 r6:832e4000 r5:ed6d5e68 [ 466.609930][ T5538] r4:00000000 [ 466.610018][ T5538] [<81761eb0>] (unix_seqpacket_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 466.610228][ T5538] r5:ed6d5e68 r4:00000000 [ 466.610347][ T5538] [<814955cc>] (__sock_sendmsg) from [<814956e4>] (sock_write_iter+0xa0/0xfc) [ 466.610542][ T5538] r7:832e4000 r6:937f16c0 r5:ed6d5f08 r4:ed6d5ef0 [ 466.610675][ T5538] [<81495644>] (sock_write_iter) from [<8051def4>] (vfs_write+0x3a8/0x44c) [ 466.610860][ T5538] r7:83de9800 r6:00000000 r5:937f16c0 r4:00000000 [ 466.611002][ T5538] [<8051db4c>] (vfs_write) from [<8051e160>] (ksys_write+0xd0/0xe4) [ 466.611232][ T5538] r10:00000004 r9:83de9800 r8:8020029c r7:00000000 r6:00000000 r5:937f16c0 [ 466.611409][ T5538] r4:937f16c1 [ 466.611503][ T5538] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 466.611717][ T5538] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 466.611856][ T5538] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 466.612039][ T5538] Exception stack(0xed6d5fa8 to 0xed6d5ff0) [ 466.612178][ T5538] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 466.612445][ T5538] 5fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b010bc [ 466.612663][ T5538] 5fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 466.632611][ T31] audit: type=1400 audit(466.560:256): avc: denied { remove_name } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 466.634559][ T31] audit: type=1400 audit(466.560:257): avc: denied { rename } for pid=2904 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.249317][ T31] audit: type=1400 audit(470.180:258): avc: denied { ioctl } for pid=5554 comm="syz.1.510" path="socket:[7030]" dev="sockfs" ino=7030 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 490.389489][ T31] audit: type=1400 audit(490.320:259): avc: denied { create } for pid=5648 comm="syz.0.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 491.048978][ T5661] FAULT_INJECTION: forcing a failure. [ 491.048978][ T5661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.049426][ T5661] CPU: 0 UID: 0 PID: 5661 Comm: syz.0.532 Not tainted 6.12.0-syzkaller #0 [ 491.049639][ T5661] Hardware name: ARM-Versatile Express [ 491.049786][ T5661] Call trace: [ 491.049899][ T5661] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 491.050129][ T5661] r7:ed925e20 r6:200004c0 r5:60000013 r4:820413b8 [ 491.050262][ T5661] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 491.050468][ T5661] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 491.050652][ T5661] r5:00000000 r4:82751908 [ 491.050747][ T5661] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 491.051007][ T5661] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 491.051201][ T5661] r6:200004c0 r5:00000000 r4:ed925f20 [ 491.051337][ T5661] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 491.051553][ T5661] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 491.051820][ T5661] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 491.052118][ T5661] r8:00040010 r7:00000000 r6:8323d180 r5:ed925f20 r4:ed925e64 [ 491.052347][ T5661] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 491.052566][ T5661] r10:00000128 r9:850a3000 r8:8ec46840 r7:00040010 r6:200004c0 r5:8ec46841 [ 491.052770][ T5661] r4:00000005 [ 491.052872][ T5661] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 491.053069][ T5661] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 491.053236][ T5661] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 491.053433][ T5661] Exception stack(0xed925fa8 to 0xed925ff0) [ 491.053568][ T5661] 5fa0: 00000000 00000000 00000005 200004c0 00040010 00000000 [ 491.053750][ T5661] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 491.054109][ T5661] 5fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 494.457517][ T31] audit: type=1400 audit(494.380:260): avc: denied { getopt } for pid=5683 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 509.083642][ T5734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5734 comm=syz.0.553 [ 509.199577][ T31] audit: type=1400 audit(509.130:261): avc: denied { accept } for pid=5733 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 515.288167][ T5754] netlink: 'syz.1.558': attribute type 3 has an invalid length. [ 515.337835][ T31] audit: type=1400 audit(515.270:262): avc: denied { append } for pid=5753 comm="syz.1.558" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 516.603825][ T31] audit: type=1400 audit(516.530:263): avc: denied { listen } for pid=5757 comm="syz.1.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 522.861944][ T31] audit: type=1400 audit(522.790:264): avc: denied { listen } for pid=5792 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 523.274276][ T31] audit: type=1400 audit(523.200:265): avc: denied { setopt } for pid=5792 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 523.379624][ T31] audit: type=1400 audit(523.310:266): avc: denied { relabelfrom } for pid=5792 comm="syz.1.567" name="CAN_RAW" dev="sockfs" ino=8436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 523.380432][ T5793] SELinux: Context system_u:object_r:depmod_exec_t:s0 is not valid (left unmapped). [ 523.381930][ T31] audit: type=1400 audit(523.310:267): avc: denied { relabelto } for pid=5792 comm="syz.1.567" name="CAN_RAW" dev="sockfs" ino=8436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=can_socket permissive=1 trawcon="system_u:object_r:depmod_exec_t:s0" [ 524.299555][ T31] audit: type=1400 audit(524.230:268): avc: denied { read } for pid=5807 comm="syz.1.571" path="socket:[8445]" dev="sockfs" ino=8445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 524.318282][ T31] audit: type=1400 audit(524.250:269): avc: denied { accept } for pid=5807 comm="syz.1.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 524.972787][ T5806] FAULT_INJECTION: forcing a failure. [ 524.972787][ T5806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.973223][ T5806] CPU: 0 UID: 0 PID: 5806 Comm: syz.0.570 Not tainted 6.12.0-syzkaller #0 [ 524.973488][ T5806] Hardware name: ARM-Versatile Express [ 524.973695][ T5806] Call trace: [ 524.973854][ T5806] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 524.974587][ T5806] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 524.974830][ T5806] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 524.975139][ T5806] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 524.975441][ T5806] r5:00000000 r4:82751908 [ 524.975648][ T5806] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 524.975884][ T5806] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 524.976095][ T5806] r6:00000000 r5:ee06df68 r4:00000002 [ 524.976287][ T5806] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 524.976965][ T5806] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 524.977264][ T5806] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 524.977605][ T5806] r10:00000001 r9:805cc9a0 r8:00000002 r7:ee06df68 r6:0000000f r5:76b00f30 [ 524.977897][ T5806] r4:850a4800 r3:ee06de9f [ 524.978064][ T5806] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 524.978409][ T5806] r8:76b00f30 r7:ee06df68 r6:850a4800 r5:0000000f r4:945ee300 [ 524.978690][ T5806] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 524.979021][ T5806] r10:00000003 r9:850a4800 r8:8020029c r7:00000000 r6:00000000 r5:945ee300 [ 524.979322][ T5806] r4:945ee303 [ 524.979510][ T5806] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 524.979817][ T5806] r7:00000003 r6:00000004 r5:76b00f30 r4:0000000f [ 524.980055][ T5806] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 524.980433][ T5806] Exception stack(0xee06dfa8 to 0xee06dff0) [ 524.980694][ T5806] dfa0: 0000000f 76b00f30 00000004 76b00f30 0000000f 00000000 [ 524.981014][ T5806] dfc0: 0000000f 76b00f30 00000004 00000003 00000000 00006364 003d0f00 76b010bc [ 524.981323][ T5806] dfe0: 00000158 76b00ed0 000d8998 00131324 [ 528.820039][ T5832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=136 sclass=netlink_route_socket pid=5832 comm=syz.0.579 [ 528.838743][ T5829] FAULT_INJECTION: forcing a failure. [ 528.838743][ T5829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 528.839122][ T5829] CPU: 1 UID: 0 PID: 5829 Comm: syz.1.578 Not tainted 6.12.0-syzkaller #0 [ 528.839357][ T5829] Hardware name: ARM-Versatile Express [ 528.839512][ T5829] Call trace: [ 528.839600][ T5829] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 528.839859][ T5829] r7:b5403587 r6:76b55bb8 r5:60000013 r4:820413b8 [ 528.839969][ T5829] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 528.840200][ T5829] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 528.840498][ T5829] r5:00000000 r4:82751908 [ 528.840594][ T5829] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 528.840826][ T5829] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 528.841041][ T5829] r6:76b55bb8 r5:00000000 r4:edfd9fb0 [ 528.841176][ T5829] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 528.841405][ T5829] [<808f19d4>] (should_fail_usercopy) from [<8020b5a4>] (restore_sigframe+0x94/0x210) [ 528.841649][ T5829] [<8020b510>] (restore_sigframe) from [<8020b924>] (sys_sigreturn+0x40/0x60) [ 528.841893][ T5829] r7:00000077 r6:00131400 r5:00000000 r4:edfd9fb0 [ 528.842062][ T5829] [<8020b8e4>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.842319][ T5829] Exception stack(0xedfd9fa8 to 0xedfd9ff0) [ 528.842475][ T5829] 9fa0: 00000000 00000000 00000011 200008c0 24024010 00000000 [ 528.842685][ T5829] 9fc0: 00000000 00000000 00131400 00000077 00000000 00006364 003d0f00 76b560bc [ 528.842906][ T5829] 9fe0: 76b55ec0 76b55bb8 000efd90 000efd98 [ 528.843072][ T5829] r5:00000000 r4:00000000 [ 532.069775][ T5847] FAULT_INJECTION: forcing a failure. [ 532.069775][ T5847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.070762][ T5847] CPU: 1 UID: 0 PID: 5847 Comm: syz.0.584 Not tainted 6.12.0-syzkaller #0 [ 532.071042][ T5847] Hardware name: ARM-Versatile Express [ 532.071176][ T5847] Call trace: [ 532.071278][ T5847] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 532.071529][ T5847] r7:ee2e9e20 r6:20000140 r5:60000013 r4:820413b8 [ 532.071716][ T5847] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 532.071927][ T5847] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 532.072148][ T5847] r5:00000000 r4:82751908 [ 532.072307][ T5847] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 532.072546][ T5847] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 532.072786][ T5847] r6:20000140 r5:00000000 r4:ee2e9f20 [ 532.072874][ T5847] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 532.073046][ T5847] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 532.073279][ T5847] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 532.073487][ T5847] r8:00008040 r7:00000000 r6:84431400 r5:ee2e9f20 r4:ee2e9e64 [ 532.073620][ T5847] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 532.073847][ T5847] r10:00000128 r9:850a6c00 r8:89e55e40 r7:00008040 r6:20000140 r5:89e55e41 [ 532.074065][ T5847] r4:00000004 [ 532.074172][ T5847] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 532.074369][ T5847] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 532.074564][ T5847] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 532.074798][ T5847] Exception stack(0xee2e9fa8 to 0xee2e9ff0) [ 532.074955][ T5847] 9fa0: 00000000 00000000 00000004 20000140 00008040 00000000 [ 532.075191][ T5847] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 532.075419][ T5847] 9fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 535.807748][ T31] audit: type=1400 audit(535.740:270): avc: denied { read } for pid=5870 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 536.377614][ T31] audit: type=1400 audit(536.300:271): avc: denied { shutdown } for pid=5870 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 540.995671][ T31] audit: type=1400 audit(540.920:272): avc: denied { shutdown } for pid=5875 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 546.769291][ T31] audit: type=1400 audit(546.700:273): avc: denied { execute } for pid=5910 comm="syz.0.600" path="/307/.pending_reads" dev="tmpfs" ino=1628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 547.188106][ T5914] FAULT_INJECTION: forcing a failure. [ 547.188106][ T5914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.197521][ T5914] CPU: 0 UID: 0 PID: 5914 Comm: syz.0.602 Not tainted 6.12.0-syzkaller #0 [ 547.198032][ T5914] Hardware name: ARM-Versatile Express [ 547.198259][ T5914] Call trace: [ 547.198454][ T5914] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 547.198952][ T5914] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 547.199195][ T5914] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 547.199521][ T5914] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 547.199869][ T5914] r5:00000000 r4:82751908 [ 547.200060][ T5914] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 547.200576][ T5914] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 547.200940][ T5914] r6:00000000 r5:ee629f68 r4:00000002 [ 547.201150][ T5914] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 547.201503][ T5914] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 547.201899][ T5914] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 547.202284][ T5914] r10:00000001 r9:805cc9a0 r8:00000002 r7:ee629f68 r6:0000000f r5:76b00f30 [ 547.202585][ T5914] r4:850a4800 r3:ee629e9f [ 547.202832][ T5914] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 547.203223][ T5914] r8:76b00f30 r7:ee629f68 r6:850a4800 r5:0000000f r4:945eef00 [ 547.203489][ T5914] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 547.203844][ T5914] r10:00000003 r9:850a4800 r8:8020029c r7:00000000 r6:00000000 r5:945eef00 [ 547.204183][ T5914] r4:945eef03 [ 547.204398][ T5914] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 547.204751][ T5914] r7:00000003 r6:00000005 r5:76b00f30 r4:0000000f [ 547.205028][ T5914] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 547.205384][ T5914] Exception stack(0xee629fa8 to 0xee629ff0) [ 547.205677][ T5914] 9fa0: 0000000f 76b00f30 00000005 76b00f30 0000000f 00000000 [ 547.206048][ T5914] 9fc0: 0000000f 76b00f30 00000005 00000003 00000000 00006364 003d0f00 76b010bc [ 547.206660][ T5914] 9fe0: 00000158 76b00ed0 000d8998 00131324 [ 551.059193][ T5936] FAULT_INJECTION: forcing a failure. [ 551.059193][ T5936] name failslab, interval 1, probability 0, space 0, times 0 [ 551.060066][ T5936] CPU: 1 UID: 0 PID: 5936 Comm: syz.1.607 Not tainted 6.12.0-syzkaller #0 [ 551.060503][ T5936] Hardware name: ARM-Versatile Express [ 551.060721][ T5936] Call trace: [ 551.060924][ T5936] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 551.061291][ T5936] r7:00000c40 r6:937f1ce8 r5:60000013 r4:820413b8 [ 551.061540][ T5936] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 551.061872][ T5936] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 551.062207][ T5936] r5:00000000 r4:8271b79c [ 551.062400][ T5936] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 551.062776][ T5936] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 551.063131][ T5936] r6:937f1ce8 r5:00001000 r4:82c016c0 [ 551.063337][ T5936] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 551.063678][ T5936] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 551.064064][ T5936] r10:836c4800 r9:82f18000 r8:00000000 r7:8302acc0 r6:937f1ce8 r5:00001000 [ 551.064419][ T5936] r4:00000000 [ 551.064595][ T5936] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 551.064984][ T5936] r10:836c4800 r9:00000000 r8:937f1cc0 r7:00005450 r6:00000004 r5:81ad1efc [ 551.065284][ T5936] r4:937f1ce8 r3:824bb340 [ 551.065485][ T5936] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 551.065863][ T5936] r9:00000003 r8:937f1cc0 r7:00000404 r6:00000404 r5:00005450 r4:937f1cc0 [ 551.066154][ T5936] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 551.067176][ T5936] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 551.067869][ T5936] r7:00000404 r6:937f1cc1 r5:00000000 r4:00005450 [ 551.068381][ T5936] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 551.068796][ T5936] Exception stack(0xee671fa8 to 0xee671ff0) [ 551.069137][ T5936] 1fa0: 00000000 00000000 00000003 00005450 00000404 00000000 [ 551.069775][ T5936] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b560bc [ 551.070594][ T5936] 1fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 551.070942][ T5936] r10:00000036 r9:836c4800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 551.071488][ T5936] r4:00000000 [ 551.157065][ T5936] ERROR: Out of memory at tomoyo_realpath_from_path. [ 556.217137][ T91] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 556.366906][ T91] usb 2-1: Using ep0 maxpacket: 16 [ 556.385256][ T91] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 556.385878][ T91] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 8 [ 556.386768][ T91] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 22 [ 556.387332][ T91] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 556.396732][ T91] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 556.431379][ T5953] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 556.439222][ T91] cdc_acm 2-1:1.0: Control and data interfaces are not separated! [ 557.149984][ T91] cdc_acm 2-1:1.0: ttyACM0: USB ACM device [ 557.420905][ T47] usb 2-1: USB disconnect, device number 4 [ 563.241957][ T31] audit: type=1400 audit(563.170:274): avc: denied { setopt } for pid=5996 comm="syz.0.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 563.242789][ T31] audit: type=1400 audit(563.170:275): avc: denied { write } for pid=5996 comm="syz.0.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 567.217758][ T6011] FAULT_INJECTION: forcing a failure. [ 567.217758][ T6011] name failslab, interval 1, probability 0, space 0, times 0 [ 567.218424][ T6011] CPU: 0 UID: 0 PID: 6011 Comm: syz.0.623 Not tainted 6.12.0-syzkaller #0 [ 567.218804][ T6011] Hardware name: ARM-Versatile Express [ 567.219042][ T6011] Call trace: [ 567.219241][ T6011] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 567.219653][ T6011] r7:83de0000 r6:00000cc0 r5:60000013 r4:820413b8 [ 567.221395][ T6011] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 567.222097][ T6011] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 567.222403][ T6011] r5:00000000 r4:8271b79c [ 567.222571][ T6011] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 567.222917][ T6011] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 567.223230][ T6011] r6:00000cc0 r5:ffffffff r4:82e9d240 [ 567.223419][ T6011] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 567.223765][ T6011] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 567.224105][ T6011] r10:ee995d3c r9:00000000 r8:00000cc0 r7:00000000 r6:82e9d240 r5:ffffffff [ 567.224439][ T6011] r4:82606040 [ 567.224595][ T6011] [<814a2b70>] (__alloc_skb) from [<814ab060>] (alloc_skb_with_frags+0x44/0x1ec) [ 567.224922][ T6011] r8:802a7e50 r7:ee995cc4 r6:00000000 r5:00001000 r4:00000000 [ 567.225187][ T6011] [<814ab01c>] (alloc_skb_with_frags) from [<8149c290>] (sock_alloc_send_pskb+0x1f4/0x228) [ 567.225533][ T6011] r10:ee995d3c r9:00000000 r8:802a7e50 r7:ee995cc4 r6:83de0000 r5:7fffffff [ 567.225818][ T6011] r4:8c508000 [ 567.225964][ T6011] [<8149c09c>] (sock_alloc_send_pskb) from [<81848054>] (isotp_sendmsg+0x2b4/0x7fc) [ 567.226889][ T6011] r10:ee995f20 r9:00000014 r8:ee995f30 r7:00000014 r6:8c508000 r5:8c50a000 [ 567.227393][ T6011] r4:00000000 [ 567.229401][ T6011] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 567.236908][ T6011] r10:00000000 r9:ee995dc4 r8:ee995dc4 r7:844ab900 r6:844ab900 r5:ee995f20 [ 567.237346][ T6011] r4:00000000 [ 567.237559][ T6011] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 567.237961][ T6011] r7:844ab900 r6:00000000 r5:00000080 r4:ee995f20 [ 567.238233][ T6011] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 567.238616][ T6011] r10:ee995e24 r9:20000380 r8:00000080 r7:00000000 r6:844ab900 r5:ee995f20 [ 567.238910][ T6011] r4:00000000 [ 567.239086][ T6011] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 567.239440][ T6011] r10:00000128 r9:83de0000 r8:8ec46e40 r7:00000080 r6:20000380 r5:8ec46e41 [ 567.239753][ T6011] r4:00000003 [ 567.239921][ T6011] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 567.240328][ T6011] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 567.240624][ T6011] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 567.241053][ T6011] Exception stack(0xee995fa8 to 0xee995ff0) [ 567.241307][ T6011] 5fa0: 00000000 00000000 00000003 20000380 00000080 00000000 [ 567.241797][ T6011] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 567.242116][ T6011] 5fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 583.406842][ T6084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6084 comm=syz.1.641 [ 588.446119][ T31] audit: type=1400 audit(588.370:276): avc: denied { create } for pid=6101 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 590.461320][ T31] audit: type=1400 audit(590.390:277): avc: denied { audit_write } for pid=6111 comm="syz.0.649" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 590.462208][ T31] audit: type=1107 audit(590.390:278): pid=6111 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 596.957750][ T6127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=6127 comm=syz.1.653 [ 597.795072][ T31] audit: type=1107 audit(597.720:279): pid=6131 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 601.299201][ T6137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6137 comm=syz.1.657 [ 608.093372][ T31] audit: type=1107 audit(608.020:280): pid=6160 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 611.202536][ T31] audit: type=1400 audit(611.130:281): avc: denied { watch } for pid=6174 comm="syz.0.666" path="/341" dev="tmpfs" ino=1801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 616.679716][ T31] audit: type=1400 audit(616.610:282): avc: denied { setopt } for pid=6192 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 616.759985][ T31] audit: type=1400 audit(616.690:283): avc: denied { getopt } for pid=6192 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 623.464748][ T6211] FAULT_INJECTION: forcing a failure. [ 623.464748][ T6211] name failslab, interval 1, probability 0, space 0, times 0 [ 623.465820][ T6211] CPU: 1 UID: 0 PID: 6211 Comm: syz.0.676 Not tainted 6.12.0-syzkaller #0 [ 623.466411][ T6211] Hardware name: ARM-Versatile Express [ 623.466862][ T6211] Call trace: [ 623.467252][ T6211] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 623.467932][ T6211] r7:00400cc0 r6:00000016 r5:60000013 r4:820413b8 [ 623.468223][ T6211] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 623.468802][ T6211] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 623.469474][ T6211] r5:00000000 r4:8271b79c [ 623.469889][ T6211] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 623.470795][ T6211] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 623.471710][ T6211] r6:00000016 r5:00000016 r4:82c02000 [ 623.472412][ T6211] [<804ef4d4>] (should_failslab) from [<804d5364>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 623.473400][ T6211] [<804d52c4>] (__kmalloc_node_track_caller_noprof) from [<804732b4>] (kstrdup+0x38/0x5c) [ 623.474407][ T6211] r10:00000001 r9:e0551e5c r8:82ed9130 r7:80556594 r6:00000016 r5:00400cc0 [ 623.475021][ T6211] r4:e0551e5c [ 623.475353][ T6211] [<8047327c>] (kstrdup) from [<80556594>] (simple_xattr_set+0x40/0x184) [ 623.476068][ T6211] r7:82e25c38 r6:8480fc00 r5:e0551e5c r4:852bdd00 [ 623.476665][ T6211] [<80556554>] (simple_xattr_set) from [<8046b20c>] (shmem_xattr_handler_set+0x194/0x1a8) [ 623.477343][ T6211] r9:e0551e5c r8:82ed9130 r7:0000012c r6:82ed9100 r5:82e25c58 r4:852bdd00 [ 623.477976][ T6211] [<8046b078>] (shmem_xattr_handler_set) from [<805547c4>] (__vfs_setxattr+0xb4/0xc8) [ 623.478755][ T6211] r9:8046b078 r8:000000ef r7:852bdd00 r6:83004770 r5:82722034 r4:82e25c58 [ 623.479330][ T6211] [<80554710>] (__vfs_setxattr) from [<805551ec>] (__vfs_setxattr_noperm+0x7c/0x204) [ 623.480196][ T6211] r9:82722034 r8:852bdd00 r7:82e25c58 r6:00000001 r5:e0551e5c r4:83004770 [ 623.480744][ T6211] [<80555170>] (__vfs_setxattr_noperm) from [<8055545c>] (__vfs_setxattr_locked+0xe8/0x118) [ 623.481642][ T6211] r10:e0551dc0 r9:000000ef r8:82e25c58 r7:852bdd00 r6:e0551e5c r5:82722034 [ 623.482468][ T6211] r4:83004770 [ 623.482887][ T6211] [<80555374>] (__vfs_setxattr_locked) from [<8055551c>] (vfs_setxattr+0x90/0x180) [ 623.483885][ T6211] r8:82722034 r7:e0551e5c r6:83004770 r5:82e25cd8 r4:e0551e48 [ 623.484622][ T6211] [<8055548c>] (vfs_setxattr) from [<805556a0>] (do_setxattr+0x94/0x9c) [ 623.485368][ T6211] r10:000000e4 r9:83004770 r8:82722034 r7:852bdd00 r6:000000ef r5:e0551e5c [ 623.486346][ T6211] r4:e0551e48 [ 623.486602][ T6211] [<8055560c>] (do_setxattr) from [<805558d4>] (file_setxattr+0x5c/0x7c) [ 623.487183][ T6211] r9:83708000 r8:200002c0 r7:00000006 r6:e0551e48 r5:945ee9c0 r4:00000000 [ 623.487599][ T6211] [<80555878>] (file_setxattr) from [<80555ae8>] (path_setxattrat+0x110/0x14c) [ 623.488528][ T6211] r7:00000006 r6:945ee9c0 r5:945ee9c1 r4:00000000 [ 623.489228][ T6211] [<805559d8>] (path_setxattrat) from [<80555d24>] (sys_fsetxattr+0x30/0x38) [ 623.490199][ T6211] r8:8020029c r7:000000e4 r6:00131400 r5:00000000 r4:00000001 [ 623.490861][ T6211] [<80555cf4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 623.491855][ T6211] Exception stack(0xe0551fa8 to 0xe0551ff0) [ 623.492452][ T6211] 1fa0: 00000001 00000000 00000006 20000280 200002c0 000000ef [ 623.493129][ T6211] 1fc0: 00000001 00000000 00131400 000000e4 00000000 00006364 003d0f00 76b010bc [ 623.493930][ T6211] 1fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 627.853991][ T31] audit: type=1400 audit(627.780:284): avc: denied { setopt } for pid=6229 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 628.338178][ T31] audit: type=1400 audit(628.270:285): avc: denied { listen } for pid=6229 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 630.477078][ T6260] FAULT_INJECTION: forcing a failure. [ 630.477078][ T6260] name failslab, interval 1, probability 0, space 0, times 0 [ 630.477600][ T6260] CPU: 0 UID: 0 PID: 6260 Comm: syz.0.685 Not tainted 6.12.0-syzkaller #0 [ 630.477944][ T6260] Hardware name: ARM-Versatile Express [ 630.478169][ T6260] Call trace: [ 630.478357][ T6260] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 630.478779][ T6260] r7:836c0000 r6:00000cc0 r5:60000013 r4:820413b8 [ 630.478987][ T6260] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 630.479326][ T6260] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 630.479678][ T6260] r5:00000000 r4:8271b79c [ 630.479879][ T6260] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 630.480274][ T6260] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 630.480641][ T6260] r6:00000cc0 r5:ffffffff r4:82e9d240 [ 630.480864][ T6260] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 630.481243][ T6260] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 630.481647][ T6260] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82e9d240 r5:ffffffff [ 630.481942][ T6260] r4:82606040 [ 630.482112][ T6260] [<814a2b70>] (__alloc_skb) from [<815baecc>] (netlink_alloc_large_skb+0x88/0xa0) [ 630.482496][ T6260] r8:00000000 r7:94bf0400 r6:00000014 r5:8446a000 r4:00000140 [ 630.482768][ T6260] [<815bae44>] (netlink_alloc_large_skb) from [<815bb4d4>] (netlink_sendmsg+0x134/0x43c) [ 630.483131][ T6260] r5:8446a000 r4:e06f1f20 [ 630.483405][ T6260] [<815bb3a0>] (netlink_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 630.483754][ T6260] r10:00000000 r9:e06f1dc4 r8:e06f1dc4 r7:8446a000 r6:8446a000 r5:e06f1f20 [ 630.484027][ T6260] r4:00000000 [ 630.484199][ T6260] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 630.484599][ T6260] r7:8446a000 r6:00000000 r5:00000000 r4:e06f1f20 [ 630.484840][ T6260] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 630.485193][ T6260] r10:e06f1e24 r9:200001c0 r8:00000000 r7:00000000 r6:8446a000 r5:e06f1f20 [ 630.485509][ T6260] r4:00000000 [ 630.485677][ T6260] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 630.486022][ T6260] r10:00000128 r9:836c0000 r8:945ee6c0 r7:00000000 r6:200001c0 r5:945ee6c1 [ 630.486990][ T6260] r4:00000003 [ 630.487246][ T6260] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 630.487590][ T6260] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 630.487857][ T6260] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 630.488134][ T6260] Exception stack(0xe06f1fa8 to 0xe06f1ff0) [ 630.488424][ T6260] 1fa0: 00000000 00000000 00000003 200001c0 00000000 00000000 [ 630.488741][ T6260] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 630.489073][ T6260] 1fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 631.661765][ T6265] FAULT_INJECTION: forcing a failure. [ 631.661765][ T6265] name failslab, interval 1, probability 0, space 0, times 0 [ 631.662408][ T6265] CPU: 0 UID: 0 PID: 6265 Comm: syz.0.686 Not tainted 6.12.0-syzkaller #0 [ 631.662757][ T6265] Hardware name: ARM-Versatile Express [ 631.662977][ T6265] Call trace: [ 631.663178][ T6265] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 631.663559][ T6265] r7:83debc00 r6:00000dc0 r5:60000013 r4:820413b8 [ 631.663808][ T6265] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 631.664138][ T6265] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 631.664534][ T6265] r5:00000000 r4:8271b79c [ 631.664772][ T6265] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 631.665163][ T6265] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 631.665578][ T6265] r6:00000dc0 r5:e4739f20 r4:82c01240 [ 631.665826][ T6265] [<804ef4d4>] (should_failslab) from [<804d36d8>] (__kmalloc_cache_noprof+0x4c/0x344) [ 631.666402][ T6265] [<804d368c>] (__kmalloc_cache_noprof) from [<816861a8>] (tcp_sendmsg_fastopen+0x94/0x188) [ 631.667256][ T6265] r10:00000000 r9:e4739f20 r8:00000000 r7:e4739cec r6:00000000 r5:e4739f20 [ 631.668155][ T6265] r4:84ef6b40 [ 631.668517][ T6265] [<81686114>] (tcp_sendmsg_fastopen) from [<81686b74>] (tcp_sendmsg_locked+0x8d8/0xd44) [ 631.668949][ T6265] r8:84ef6b40 r7:24048000 r6:00000000 r5:e4739f20 r4:00000000 [ 631.669250][ T6265] [<8168629c>] (tcp_sendmsg_locked) from [<81687010>] (tcp_sendmsg+0x30/0x44) [ 631.669661][ T6265] r10:00000000 r9:e4739dc4 r8:e4739dc4 r7:8446bb80 r6:00000000 r5:e4739f20 [ 631.669995][ T6265] r4:84ef6b40 [ 631.670181][ T6265] [<81686fe0>] (tcp_sendmsg) from [<81764c24>] (inet6_sendmsg+0x40/0x4c) [ 631.670580][ T6265] r7:8446bb80 r6:84ef6b40 r5:00000000 r4:e4739f20 [ 631.670848][ T6265] [<81764be4>] (inet6_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 631.671226][ T6265] r7:8446bb80 r6:8446bb80 r5:e4739f20 r4:00000000 [ 631.671503][ T6265] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 631.671981][ T6265] r7:8446bb80 r6:00000000 r5:24048000 r4:e4739f20 [ 631.672303][ T6265] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 631.672697][ T6265] r10:e4739e24 r9:20000180 r8:24048000 r7:00000000 r6:8446bb80 r5:e4739f20 [ 631.673023][ T6265] r4:00000000 [ 631.673200][ T6265] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 631.673603][ T6265] r10:00000128 r9:83debc00 r8:945ee6c0 r7:24048000 r6:20000180 r5:945ee6c1 [ 631.673925][ T6265] r4:00000004 [ 631.674110][ T6265] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 631.674499][ T6265] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 631.674802][ T6265] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 631.675158][ T6265] Exception stack(0xe4739fa8 to 0xe4739ff0) [ 631.675428][ T6265] 9fa0: 00000000 00000000 00000004 20000180 24048000 00000000 [ 631.675784][ T6265] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76abf0bc [ 631.676126][ T6265] 9fe0: 76abeec0 76abeeb0 00018af0 00133450 [ 635.591893][ T31] audit: type=1400 audit(635.520:286): avc: denied { bind } for pid=6287 comm="syz.0.694" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 635.768638][ T31] audit: type=1400 audit(635.700:287): avc: denied { read } for pid=6290 comm="syz.0.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 636.205341][ T6298] FAULT_INJECTION: forcing a failure. [ 636.205341][ T6298] name failslab, interval 1, probability 0, space 0, times 0 [ 636.205955][ T6298] CPU: 0 UID: 0 PID: 6298 Comm: syz.0.696 Not tainted 6.12.0-syzkaller #0 [ 636.206267][ T6298] Hardware name: ARM-Versatile Express [ 636.206592][ T6298] Call trace: [ 636.206855][ T6298] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 636.207254][ T6298] r7:83dea400 r6:00000820 r5:60000013 r4:820413b8 [ 636.207607][ T6298] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 636.207931][ T6298] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 636.208304][ T6298] r5:00000000 r4:8271b79c [ 636.208572][ T6298] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 636.209032][ T6298] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 636.209367][ T6298] r6:00000820 r5:8ee54300 r4:82e9d240 [ 636.209610][ T6298] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 636.209923][ T6298] [<804d42e0>] (kmem_cache_alloc_noprof) from [<814a9338>] (skb_clone+0x60/0x1c8) [ 636.210231][ T6298] r10:000001a2 r9:843b8c40 r8:83fc3800 r7:8ee54300 r6:8493f6c0 r5:8ee54300 [ 636.210487][ T6298] r4:00000820 [ 636.210622][ T6298] [<814a92d8>] (skb_clone) from [<815b8174>] (__netlink_deliver_tap+0x1f4/0x28c) [ 636.210917][ T6298] r5:00000014 r4:8493f000 [ 636.211072][ T6298] [<815b7f80>] (__netlink_deliver_tap) from [<815bb384>] (netlink_unicast+0x280/0x29c) [ 636.211382][ T6298] r10:00000000 r9:00000000 r8:84f38000 r7:8ee54300 r6:843b8c40 r5:00000014 [ 636.211634][ T6298] r4:83fc3800 [ 636.211757][ T6298] [<815bb104>] (netlink_unicast) from [<815bb57c>] (netlink_sendmsg+0x1dc/0x43c) [ 636.212104][ T6298] r9:00000000 r8:00000000 r7:94bf1800 r6:00000014 r5:8ee54300 r4:ea8bdf20 [ 636.212405][ T6298] [<815bb3a0>] (netlink_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 636.212771][ T6298] r10:00000000 r9:ea8bddc4 r8:ea8bddc4 r7:8446aa00 r6:8446aa00 r5:ea8bdf20 [ 636.213054][ T6298] r4:00000000 [ 636.213196][ T6298] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 636.213575][ T6298] r7:8446aa00 r6:00000000 r5:00040000 r4:ea8bdf20 [ 636.213871][ T6298] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 636.214197][ T6298] r10:ea8bde24 r9:200000c0 r8:00040000 r7:00000000 r6:8446aa00 r5:ea8bdf20 [ 636.214528][ T6298] r4:00000000 [ 636.214670][ T6298] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 636.215025][ T6298] r10:00000128 r9:83dea400 r8:945eed80 r7:00040000 r6:200000c0 r5:945eed81 [ 636.215343][ T6298] r4:00000003 [ 636.215497][ T6298] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 636.215832][ T6298] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 636.216094][ T6298] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 636.216804][ T6298] Exception stack(0xea8bdfa8 to 0xea8bdff0) [ 636.217389][ T6298] dfa0: 00000000 00000000 00000003 200000c0 00040000 00000000 [ 636.217785][ T6298] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 636.218147][ T6298] dfe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 639.955038][ T6318] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=34 sclass=netlink_audit_socket pid=6318 comm=syz.0.702 [ 640.058613][ T31] audit: type=1400 audit(639.990:288): avc: denied { bind } for pid=6319 comm="syz.0.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 640.078631][ T31] audit: type=1400 audit(640.010:289): avc: denied { getopt } for pid=6319 comm="syz.0.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 644.214974][ T31] audit: type=1400 audit(644.140:290): avc: denied { accept } for pid=6348 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 654.123639][ T31] audit: type=1400 audit(654.050:291): avc: denied { setopt } for pid=6402 comm="syz.0.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 657.689028][ T31] audit: type=1400 audit(657.620:292): avc: denied { lock } for pid=6418 comm="syz.0.727" path="socket:[10363]" dev="sockfs" ino=10363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 657.759550][ T31] audit: type=1400 audit(657.690:293): avc: granted { setsecparam } for pid=6418 comm="syz.0.727" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 657.949297][ T31] audit: type=1107 audit(657.880:294): pid=6425 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 659.267892][ T6427] FAULT_INJECTION: forcing a failure. [ 659.267892][ T6427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 659.268579][ T6427] CPU: 1 UID: 0 PID: 6427 Comm: syz.1.726 Not tainted 6.12.0-syzkaller #0 [ 659.268920][ T6427] Hardware name: ARM-Versatile Express [ 659.269132][ T6427] Call trace: [ 659.269331][ T6427] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 659.269741][ T6427] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 659.269996][ T6427] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 659.270337][ T6427] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 659.270771][ T6427] r5:00000000 r4:82751908 [ 659.270983][ T6427] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 659.271371][ T6427] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 659.271758][ T6427] r6:00000000 r5:eacbdf68 r4:00000002 [ 659.271999][ T6427] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 659.272433][ T6427] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 659.272881][ T6427] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 659.273306][ T6427] r10:00000001 r9:805cc9a0 r8:00000002 r7:eacbdf68 r6:0000000f r5:76ad1f30 [ 659.273649][ T6427] r4:836c5400 r3:eacbde9f [ 659.273868][ T6427] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 659.274258][ T6427] r8:76ad1f30 r7:eacbdf68 r6:836c5400 r5:0000000f r4:84839f00 [ 659.274582][ T6427] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 659.274948][ T6427] r10:00000003 r9:836c5400 r8:8020029c r7:00000000 r6:00000000 r5:84839f00 [ 659.275290][ T6427] r4:84839f03 [ 659.275480][ T6427] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 659.275846][ T6427] r7:00000003 r6:00000005 r5:76ad1f30 r4:0000000f [ 659.276114][ T6427] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 659.276772][ T6427] Exception stack(0xeacbdfa8 to 0xeacbdff0) [ 659.277284][ T6427] dfa0: 0000000f 76ad1f30 00000005 76ad1f30 0000000f 00000000 [ 659.277723][ T6427] dfc0: 0000000f 76ad1f30 00000005 00000003 00000000 00006364 003d0f00 76ad20bc [ 659.278139][ T6427] dfe0: 00000158 76ad1ed0 000d8998 00131324 [ 666.720197][ T31] audit: type=1107 audit(666.650:295): pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 672.819226][ T31] audit: type=1400 audit(672.750:296): avc: denied { name_bind } for pid=6474 comm="syz.1.739" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 672.821241][ T31] audit: type=1400 audit(672.750:297): avc: denied { node_bind } for pid=6474 comm="syz.1.739" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 672.858477][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 673.486749][ T31] audit: type=1107 audit(673.410:298): pid=6477 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='E{~DZ齄ifort1_d@4k]n{U+E >AjFwgqVcA!iTB L(|zӉ1j\ˎLH1z?4,XH(iBm' [ 677.348175][ T6498] FAULT_INJECTION: forcing a failure. [ 677.348175][ T6498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 677.348922][ T6498] CPU: 1 UID: 0 PID: 6498 Comm: syz.1.746 Not tainted 6.12.0-syzkaller #0 [ 677.349305][ T6498] Hardware name: ARM-Versatile Express [ 677.349618][ T6498] Call trace: [ 677.349826][ T6498] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 677.350251][ T6498] r7:b5403587 r6:76b55ca0 r5:60000013 r4:820413b8 [ 677.350550][ T6498] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 677.350910][ T6498] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 677.351282][ T6498] r5:00000000 r4:82751908 [ 677.351504][ T6498] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 677.351891][ T6498] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 677.352300][ T6498] r6:76b55ca0 r5:00000000 r4:eaf09f0c [ 677.352561][ T6498] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 677.352925][ T6498] [<808f19d4>] (should_fail_usercopy) from [<8020b3a8>] (restore_vfp_context+0x3c/0xe0) [ 677.353354][ T6498] [<8020b36c>] (restore_vfp_context) from [<8020b70c>] (restore_sigframe+0x1fc/0x210) [ 677.353763][ T6498] r6:76b55ca0 r5:00000000 r4:eaf09fb0 [ 677.354002][ T6498] [<8020b510>] (restore_sigframe) from [<8020b924>] (sys_sigreturn+0x40/0x60) [ 677.354403][ T6498] r7:00000077 r6:00131400 r5:00000000 r4:eaf09fb0 [ 677.354702][ T6498] [<8020b8e4>] (sys_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 677.355071][ T6498] Exception stack(0xeaf09fa8 to 0xeaf09ff0) [ 677.355352][ T6498] 9fa0: 00000000 00000000 fffffffc 20000540 00000014 00000000 [ 677.355695][ T6498] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b560bc [ 677.355952][ T6498] 9fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 677.356141][ T6498] r5:00000000 r4:00000000 [ 682.949037][ T6518] fuse: Bad value for 'user_id' [ 682.949538][ T6518] fuse: Bad value for 'user_id' [ 687.182145][ T6540] FAULT_INJECTION: forcing a failure. [ 687.182145][ T6540] name failslab, interval 1, probability 0, space 0, times 0 [ 687.182826][ T6540] CPU: 1 UID: 0 PID: 6540 Comm: syz.1.756 Not tainted 6.12.0-syzkaller #0 [ 687.183101][ T6540] Hardware name: ARM-Versatile Express [ 687.183308][ T6540] Call trace: [ 687.183496][ T6540] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 687.183830][ T6540] r7:00400cc0 r6:00000016 r5:60000013 r4:820413b8 [ 687.184053][ T6540] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 687.184375][ T6540] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 687.184691][ T6540] r5:00000000 r4:8271b79c [ 687.184849][ T6540] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 687.185157][ T6540] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 687.185478][ T6540] r6:00000016 r5:00000016 r4:82c02000 [ 687.185676][ T6540] [<804ef4d4>] (should_failslab) from [<804d5364>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 687.186023][ T6540] [<804d52c4>] (__kmalloc_node_track_caller_noprof) from [<804732b4>] (kstrdup+0x38/0x5c) [ 687.186626][ T6540] r10:00000001 r9:eb271e5c r8:82ed9130 r7:80556594 r6:00000016 r5:00400cc0 [ 687.187001][ T6540] r4:eb271e5c [ 687.187292][ T6540] [<8047327c>] (kstrdup) from [<80556594>] (simple_xattr_set+0x40/0x184) [ 687.187756][ T6540] r7:83ca7238 r6:82cb0c40 r5:eb271e5c r4:93ff4240 [ 687.188059][ T6540] [<80556554>] (simple_xattr_set) from [<8046b20c>] (shmem_xattr_handler_set+0x194/0x1a8) [ 687.188596][ T6540] r9:eb271e5c r8:82ed9130 r7:00000053 r6:82ed9100 r5:83ca7258 r4:93ff4240 [ 687.189026][ T6540] [<8046b078>] (shmem_xattr_handler_set) from [<805547c4>] (__vfs_setxattr+0xb4/0xc8) [ 687.189547][ T6540] r9:8046b078 r8:00000016 r7:93ff4240 r6:8302a908 r5:82722034 r4:83ca7258 [ 687.189902][ T6540] [<80554710>] (__vfs_setxattr) from [<805551ec>] (__vfs_setxattr_noperm+0x7c/0x204) [ 687.192603][ T6540] r9:82722034 r8:93ff4240 r7:83ca7258 r6:00000001 r5:eb271e5c r4:8302a908 [ 687.193271][ T6540] [<80555170>] (__vfs_setxattr_noperm) from [<8055545c>] (__vfs_setxattr_locked+0xe8/0x118) [ 687.193753][ T6540] r10:eb271dc0 r9:00000016 r8:83ca7258 r7:93ff4240 r6:eb271e5c r5:82722034 [ 687.194270][ T6540] r4:8302a908 [ 687.194532][ T6540] [<80555374>] (__vfs_setxattr_locked) from [<8055551c>] (vfs_setxattr+0x90/0x180) [ 687.194996][ T6540] r8:82722034 r7:eb271e5c r6:8302a908 r5:83ca72d8 r4:eb271e48 [ 687.195293][ T6540] [<8055548c>] (vfs_setxattr) from [<805556a0>] (do_setxattr+0x94/0x9c) [ 687.195917][ T6540] r10:000000e4 r9:8302a908 r8:82722034 r7:93ff4240 r6:00000016 r5:eb271e5c [ 687.196517][ T6540] r4:eb271e48 [ 687.196732][ T6540] [<8055560c>] (do_setxattr) from [<805558d4>] (file_setxattr+0x5c/0x7c) [ 687.197515][ T6540] r9:83d3d400 r8:200001c0 r7:00000003 r6:eb271e48 r5:937f1180 r4:00000000 [ 687.197887][ T6540] [<80555878>] (file_setxattr) from [<80555ae8>] (path_setxattrat+0x110/0x14c) [ 687.198352][ T6540] r7:00000003 r6:937f1180 r5:937f1181 r4:00000000 [ 687.198637][ T6540] [<805559d8>] (path_setxattrat) from [<80555d24>] (sys_fsetxattr+0x30/0x38) [ 687.199017][ T6540] r8:8020029c r7:000000e4 r6:00131400 r5:00000000 r4:00000001 [ 687.199351][ T6540] [<80555cf4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 687.199700][ T6540] Exception stack(0xeb271fa8 to 0xeb271ff0) [ 687.200000][ T6540] 1fa0: 00000001 00000000 00000003 20000180 200001c0 00000016 [ 687.200515][ T6540] 1fc0: 00000001 00000000 00131400 000000e4 00000000 00006364 003d0f00 76b560bc [ 687.201096][ T6540] 1fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 689.658587][ T31] audit: type=1400 audit(689.590:299): avc: denied { nlmsg_write } for pid=6550 comm="syz.1.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 693.141750][ T6566] fuse: Bad value for 'fd' [ 693.178919][ T6566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=6566 comm=syz.0.762 [ 694.978920][ T6579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=6579 comm=syz.0.767 [ 699.001681][ T6585] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=514 sclass=netlink_audit_socket pid=6585 comm=syz.1.769 [ 708.900494][ T6625] FAULT_INJECTION: forcing a failure. [ 708.900494][ T6625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.904326][ T6625] CPU: 1 UID: 0 PID: 6625 Comm: syz.0.779 Not tainted 6.12.0-syzkaller #0 [ 708.906295][ T6625] Hardware name: ARM-Versatile Express [ 708.906548][ T6625] Call trace: [ 708.906710][ T6625] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 708.907527][ T6625] r7:eb639e20 r6:200003c0 r5:60000013 r4:820413b8 [ 708.909495][ T6625] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 708.912374][ T6625] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 708.914973][ T6625] r5:00000000 r4:82751908 [ 708.916601][ T6625] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 708.917302][ T6625] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 708.917857][ T6625] r6:200003c0 r5:00000000 r4:eb639f20 [ 708.918149][ T6625] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 708.920162][ T6625] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 708.921786][ T6625] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 708.925820][ T6625] r8:04004886 r7:00000000 r6:84430a00 r5:eb639f20 r4:eb639e64 [ 708.926568][ T6625] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 708.926893][ T6625] r10:00000128 r9:850a2400 r8:937f1b40 r7:04004886 r6:200003c0 r5:937f1b41 [ 708.927188][ T6625] r4:00000003 [ 708.927307][ T6625] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 708.927484][ T6625] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 708.927647][ T6625] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 708.927867][ T6625] Exception stack(0xeb639fa8 to 0xeb639ff0) [ 708.928124][ T6625] 9fa0: 00000000 00000000 00000003 200003c0 04004886 00000000 [ 708.928421][ T6625] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b010bc [ 708.928783][ T6625] 9fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 712.977304][ T31] audit: type=1400 audit(712.900:300): avc: denied { create } for pid=6638 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 716.132080][ T6669] FAULT_INJECTION: forcing a failure. [ 716.132080][ T6669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.132638][ T6669] CPU: 1 UID: 0 PID: 6669 Comm: syz.0.789 Not tainted 6.12.0-syzkaller #0 [ 716.132900][ T6669] Hardware name: ARM-Versatile Express [ 716.133103][ T6669] Call trace: [ 716.133283][ T6669] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 716.133627][ T6669] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 716.133847][ T6669] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 716.134128][ T6669] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 716.134409][ T6669] r5:00000000 r4:82751908 [ 716.134604][ T6669] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 716.134889][ T6669] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 716.135177][ T6669] r6:00000000 r5:dfaedf68 r4:00000002 [ 716.135341][ T6669] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 716.135656][ T6669] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 716.135987][ T6669] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 716.136593][ T6669] r10:00000001 r9:805cc9a0 r8:00000002 r7:dfaedf68 r6:0000000f r5:76b00f30 [ 716.137132][ T6669] r4:83dea400 r3:dfaede9f [ 716.137353][ T6669] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 716.138697][ T6669] r8:76b00f30 r7:dfaedf68 r6:83dea400 r5:0000000f r4:937f1900 [ 716.139032][ T6669] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 716.139523][ T6669] r10:00000003 r9:83dea400 r8:8020029c r7:00000000 r6:00000000 r5:937f1900 [ 716.140414][ T6669] r4:937f1903 [ 716.140594][ T6669] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 716.140914][ T6669] r7:00000003 r6:00000005 r5:76b00f30 r4:0000000f [ 716.141158][ T6669] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 716.141486][ T6669] Exception stack(0xdfaedfa8 to 0xdfaedff0) [ 716.141739][ T6669] dfa0: 0000000f 76b00f30 00000005 76b00f30 0000000f 00000000 [ 716.142059][ T6669] dfc0: 0000000f 76b00f30 00000005 00000003 00000000 00006364 003d0f00 76b010bc [ 716.142370][ T6669] dfe0: 00000158 76b00ed0 000d8998 00131324 [ 716.518384][ T31] audit: type=1400 audit(716.450:301): avc: denied { connect } for pid=6673 comm="syz.0.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 716.537051][ T31] audit: type=1400 audit(716.460:302): avc: denied { name_connect } for pid=6673 comm="syz.0.791" dest=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 717.904482][ T6680] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=537 sclass=netlink_audit_socket pid=6680 comm=syz.0.792 [ 720.341170][ T6686] FAULT_INJECTION: forcing a failure. [ 720.341170][ T6686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 720.342189][ T6686] CPU: 0 UID: 0 PID: 6686 Comm: syz.0.796 Not tainted 6.12.0-syzkaller #0 [ 720.343061][ T6686] Hardware name: ARM-Versatile Express [ 720.343608][ T6686] Call trace: [ 720.343878][ T6686] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 720.344602][ T6686] r7:850a6c00 r6:8ba51000 r5:60000013 r4:820413b8 [ 720.345192][ T6686] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 720.345948][ T6686] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 720.346644][ T6686] r5:00000000 r4:82751908 [ 720.347104][ T6686] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 720.348099][ T6686] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 720.348867][ T6686] r6:8ba51000 r5:00000043 r4:00001800 [ 720.349253][ T6686] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 720.350086][ T6686] [<808f19d4>] (should_fail_usercopy) from [<809d2fbc>] (vcs_write+0x13c/0x758) [ 720.350913][ T6686] [<809d2e80>] (vcs_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 720.351703][ T6686] r10:81b26a5c r9:200019c0 r8:dfaf1f68 r7:850a6c00 r6:00000043 r5:842f19c0 [ 720.352390][ T6686] r4:809d2e80 [ 720.352637][ T6686] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 720.353175][ T6686] r10:00000004 r9:850a6c00 r8:8020029c r7:00000000 r6:00000000 r5:842f19c0 [ 720.353784][ T6686] r4:842f19c1 [ 720.354095][ T6686] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 720.354945][ T6686] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 720.355676][ T6686] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 720.356463][ T6686] Exception stack(0xdfaf1fa8 to 0xdfaf1ff0) [ 720.356897][ T6686] 1fa0: 00000000 00000000 00000003 200019c0 00000043 00000000 [ 720.357353][ T6686] 1fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b010bc [ 720.357762][ T6686] 1fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 724.920021][ T31] audit: type=1400 audit(724.850:303): avc: denied { name_bind } for pid=6705 comm="syz.0.800" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 728.770002][ T6726] FAULT_INJECTION: forcing a failure. [ 728.770002][ T6726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.770742][ T6726] CPU: 0 UID: 0 PID: 6726 Comm: syz.0.804 Not tainted 6.12.0-syzkaller #0 [ 728.771079][ T6726] Hardware name: ARM-Versatile Express [ 728.771319][ T6726] Call trace: [ 728.771547][ T6726] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 728.771930][ T6726] r7:dfaf1e20 r6:20000340 r5:60000013 r4:820413b8 [ 728.772198][ T6726] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 728.772609][ T6726] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 728.772969][ T6726] r5:00000000 r4:82751908 [ 728.773166][ T6726] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 728.773563][ T6726] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 728.773931][ T6726] r6:20000340 r5:00000000 r4:dfaf1f20 [ 728.774166][ T6726] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 728.774550][ T6726] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 728.774955][ T6726] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 728.775374][ T6726] r8:00000000 r7:00000000 r6:84431180 r5:dfaf1f20 r4:dfaf1e64 [ 728.775685][ T6726] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 728.776080][ T6726] r10:00000128 r9:8370c800 r8:937f1300 r7:00000000 r6:20000340 r5:937f1301 [ 728.776882][ T6726] r4:00000004 [ 728.777199][ T6726] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 728.777888][ T6726] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 728.778308][ T6726] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 728.778861][ T6726] Exception stack(0xdfaf1fa8 to 0xdfaf1ff0) [ 728.779151][ T6726] 1fa0: 00000000 00000000 00000004 20000340 00000000 00000000 [ 728.779490][ T6726] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76ae00bc [ 728.779806][ T6726] 1fe0: 76adfec0 76adfeb0 00018af0 00133450 [ 732.701666][ T6737] FAULT_INJECTION: forcing a failure. [ 732.701666][ T6737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.711136][ T6737] CPU: 0 UID: 0 PID: 6737 Comm: syz.0.806 Not tainted 6.12.0-syzkaller #0 [ 732.711713][ T6737] Hardware name: ARM-Versatile Express [ 732.711969][ T6737] Call trace: [ 732.712201][ T6737] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 732.712652][ T6737] r7:00000000 r6:00000000 r5:60000113 r4:820413b8 [ 732.712941][ T6737] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 732.713283][ T6737] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 732.713640][ T6737] r5:00000000 r4:82751908 [ 732.713854][ T6737] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 732.714213][ T6737] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 732.714578][ T6737] r6:00000000 r5:dfc89f68 r4:00000002 [ 732.714822][ T6737] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 732.715180][ T6737] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 732.715592][ T6737] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 732.716004][ T6737] r10:00000001 r9:805cc9a0 r8:00000002 r7:dfc89f68 r6:0000000f r5:76adff30 [ 732.716731][ T6737] r4:834b8c00 r3:dfc89e9f [ 732.717038][ T6737] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 732.717552][ T6737] r8:76adff30 r7:dfc89f68 r6:834b8c00 r5:0000000f r4:8ec46d80 [ 732.717868][ T6737] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 732.718244][ T6737] r10:00000003 r9:834b8c00 r8:8020029c r7:00000000 r6:00000000 r5:8ec46d80 [ 732.718773][ T6737] r4:8ec46d83 [ 732.718954][ T6737] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 732.719309][ T6737] r7:00000003 r6:00000005 r5:76adff30 r4:0000000f [ 732.719571][ T6737] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 732.719915][ T6737] Exception stack(0xdfc89fa8 to 0xdfc89ff0) [ 732.720294][ T6737] 9fa0: 0000000f 76adff30 00000005 76adff30 0000000f 00000000 [ 732.720654][ T6737] 9fc0: 0000000f 76adff30 00000005 00000003 00000000 00006364 003d0f00 76ae00bc [ 732.721002][ T6737] 9fe0: 00000158 76adfed0 000d8998 00131324 [ 739.538192][ T31] audit: type=1400 audit(739.470:304): avc: denied { shutdown } for pid=6780 comm="syz.1.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 740.133236][ T6784] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6784 comm=syz.0.818 [ 741.931403][ T31] audit: type=1400 audit(741.860:305): avc: denied { setattr } for pid=6789 comm="syz.0.820" path="socket:[10785]" dev="sockfs" ino=10785 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 742.261402][ T31] audit: type=1400 audit(742.190:306): avc: denied { bind } for pid=6800 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 742.807253][ T31] audit: type=1400 audit(742.740:307): avc: denied { name_connect } for pid=6800 comm="syz.0.821" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 745.244388][ T6811] fuse: Unknown parameter '0x00000000000000030x0000000000000003' [ 760.178505][ T31] audit: type=1400 audit(760.110:308): avc: denied { read } for pid=6865 comm="syz.1.836" path="socket:[10866]" dev="sockfs" ino=10866 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 766.801408][ T31] audit: type=1400 audit(766.730:309): avc: denied { write } for pid=6895 comm="syz.0.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 771.157479][ T6927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=6927 comm=syz.0.855 [ 778.117552][ T6947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6947 comm=syz.0.860 [ 784.162565][ T31] audit: type=1400 audit(784.090:310): avc: denied { lock } for pid=6954 comm="syz.0.863" path="socket:[12042]" dev="sockfs" ino=12042 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 789.510151][ T6989] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6989 comm=syz.0.872 [ 792.847730][ T7009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7009 comm=syz.0.877 [ 792.971940][ T31] audit: type=1400 audit(792.900:311): avc: denied { create } for pid=7010 comm="syz.0.879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 793.199108][ T31] audit: type=1400 audit(793.130:312): avc: denied { getopt } for pid=7011 comm="syz.1.878" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 804.167843][ T7065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5131 sclass=netlink_route_socket pid=7065 comm=syz.0.890 [ 810.557780][ T7089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7089 comm=syz.1.897 [ 810.620898][ T7089] ptrace attach of "/syz-executor exec"[7090] was attempted by "/syz-executor exec"[7089] [ 812.726658][ C1] hrtimer: interrupt took 563600 ns [ 821.060664][ T7148] FAULT_INJECTION: forcing a failure. [ 821.060664][ T7148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 821.061178][ T7148] CPU: 0 UID: 0 PID: 7148 Comm: syz.1.916 Not tainted 6.12.0-syzkaller #0 [ 821.061483][ T7148] Hardware name: ARM-Versatile Express [ 821.061795][ T7148] Call trace: [ 821.062001][ T7148] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 821.062349][ T7148] r7:e0545e20 r6:20000200 r5:60000013 r4:820413b8 [ 821.062569][ T7148] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 821.062873][ T7148] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 821.063166][ T7148] r5:00000000 r4:82751908 [ 821.063335][ T7148] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 821.063636][ T7148] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 821.063919][ T7148] r6:20000200 r5:00000000 r4:e0545f20 [ 821.064102][ T7148] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 821.064464][ T7148] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 821.064806][ T7148] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 821.065124][ T7148] r8:200440d4 r7:00000000 r6:8445cc80 r5:e0545f20 r4:e0545e64 [ 821.065365][ T7148] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 821.065681][ T7148] r10:00000128 r9:834be000 r8:842f1840 r7:200440d4 r6:20000200 r5:842f1841 [ 821.065935][ T7148] r4:00000003 [ 821.066080][ T7148] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 821.067079][ T7148] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 821.067723][ T7148] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 821.068410][ T7148] Exception stack(0xe0545fa8 to 0xe0545ff0) [ 821.068708][ T7148] 5fa0: 00000000 00000000 00000003 20000200 200440d4 00000000 [ 821.069080][ T7148] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b560bc [ 821.069412][ T7148] 5fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 824.907437][ T31] audit: type=1400 audit(824.830:313): avc: denied { write } for pid=7163 comm="syz.0.920" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 844.387287][ T7247] binder: 7246:7247 ioctl 400c620e 20000400 returned -22 [ 845.328154][ T7250] block nbd0: shutting down sockets [ 854.540346][ T7298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7298 comm=syz.0.952 [ 855.947042][ T31] audit: type=1400 audit(855.870:314): avc: denied { map } for pid=7307 comm="syz.0.955" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 863.870539][ T31] audit: type=1400 audit(863.800:315): avc: denied { nlmsg_write } for pid=7346 comm="syz.0.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 864.447655][ T7355] SELinux: Context system_u:object_r:lost_found_t:s0 is not valid (left unmapped). [ 864.450906][ T31] audit: type=1400 audit(864.380:316): avc: denied { relabelto } for pid=7354 comm="syz.0.968" name="renderD128" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:lost_found_t:s0" [ 864.452585][ T31] audit: type=1400 audit(864.380:317): avc: denied { associate } for pid=7354 comm="syz.0.968" name="renderD128" dev="devtmpfs" ino=614 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:lost_found_t:s0" [ 870.022412][ T7396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7396 comm=syz.0.980 [ 870.236688][ T31] audit: type=1400 audit(870.160:318): avc: denied { read } for pid=7397 comm="syz.0.981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 871.119970][ T7408] capability: warning: `syz.0.985' uses deprecated v2 capabilities in a way that may be insecure [ 874.121823][ T7416] FAULT_INJECTION: forcing a failure. [ 874.121823][ T7416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 874.122468][ T7416] CPU: 0 UID: 0 PID: 7416 Comm: syz.1.988 Not tainted 6.12.0-syzkaller #0 [ 874.122782][ T7416] Hardware name: ARM-Versatile Express [ 874.122993][ T7416] Call trace: [ 874.123191][ T7416] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 874.123537][ T7416] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 874.123786][ T7416] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 874.124072][ T7416] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 874.124413][ T7416] r5:00000000 r4:82751908 [ 874.124595][ T7416] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 874.124915][ T7416] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 874.125240][ T7416] r6:00000000 r5:ec2a5f68 r4:00000002 [ 874.125443][ T7416] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 874.125786][ T7416] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 874.126148][ T7416] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 874.126914][ T7416] r10:00000001 r9:805cc9a0 r8:00000002 r7:ec2a5f68 r6:0000000f r5:76b55f30 [ 874.127405][ T7416] r4:850a6c00 r3:ec2a5e9f [ 874.127751][ T7416] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 874.128141][ T7416] r8:76b55f30 r7:ec2a5f68 r6:850a6c00 r5:0000000f r4:8cccd000 [ 874.128637][ T7416] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 874.129239][ T7416] r10:00000003 r9:850a6c00 r8:8020029c r7:00000000 r6:00000000 r5:8cccd000 [ 874.129590][ T7416] r4:8cccd003 [ 874.129937][ T7416] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 874.130326][ T7416] r7:00000003 r6:00000004 r5:76b55f30 r4:0000000f [ 874.130667][ T7416] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 874.131084][ T7416] Exception stack(0xec2a5fa8 to 0xec2a5ff0) [ 874.131612][ T7416] 5fa0: 0000000f 76b55f30 00000004 76b55f30 0000000f 00000000 [ 874.132121][ T7416] 5fc0: 0000000f 76b55f30 00000004 00000003 00000000 00006364 003d0f00 76b560bc [ 874.132627][ T7416] 5fe0: 00000158 76b55ed0 000d8998 00131324 [ 877.509898][ T31] audit: type=1400 audit(877.440:319): avc: denied { read } for pid=7432 comm="syz.0.995" name="renderD128" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:lost_found_t:s0" [ 877.520558][ T31] audit: type=1400 audit(877.450:320): avc: denied { open } for pid=7432 comm="syz.0.995" path="/dev/dri/renderD128" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:lost_found_t:s0" [ 877.539379][ T31] audit: type=1400 audit(877.470:321): avc: denied { ioctl } for pid=7432 comm="syz.0.995" path="/dev/dri/renderD128" dev="devtmpfs" ino=614 ioctlcmd=0x64aa scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:lost_found_t:s0" [ 881.130504][ T7453] FAULT_INJECTION: forcing a failure. [ 881.130504][ T7453] name failslab, interval 1, probability 0, space 0, times 0 [ 881.131076][ T7453] CPU: 1 UID: 0 PID: 7453 Comm: syz.0.1002 Not tainted 6.12.0-syzkaller #0 [ 881.131314][ T7453] Hardware name: ARM-Versatile Express [ 881.131503][ T7453] Call trace: [ 881.131691][ T7453] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 881.132032][ T7453] r7:00000d40 r6:937f1b68 r5:60000013 r4:820413b8 [ 881.132507][ T7453] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 881.132829][ T7453] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 881.133156][ T7453] r5:00000000 r4:8271b79c [ 881.133368][ T7453] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 881.133752][ T7453] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 881.134103][ T7453] r6:937f1b68 r5:0000001a r4:82c01240 [ 881.134328][ T7453] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 881.134698][ T7453] [<804d4614>] (__kmalloc_noprof) from [<8075b87c>] (tomoyo_encode2+0x64/0xf0) [ 881.135068][ T7453] r10:00000fff r9:82c9f000 r8:00000000 r7:830077f8 r6:937f1b68 r5:8535affc [ 881.135373][ T7453] r4:8535afed [ 881.135553][ T7453] [<8075b818>] (tomoyo_encode2) from [<8075b92c>] (tomoyo_encode+0x24/0x30) [ 881.135909][ T7453] r9:82c9f000 r8:00000000 r7:830077f8 r6:937f1b68 r5:00001000 r4:8535afee [ 881.136422][ T7453] [<8075b908>] (tomoyo_encode) from [<8075b9b8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 881.136930][ T7453] r5:00001000 r4:8535a000 [ 881.137147][ T7453] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 881.137720][ T7453] r10:83708000 r9:00000000 r8:937f1b40 r7:00005451 r6:00000004 r5:81ad1efc [ 881.138054][ T7453] r4:937f1b68 r3:824bb340 [ 881.138253][ T7453] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 881.138661][ T7453] r9:00000003 r8:937f1b40 r7:00000000 r6:00000000 r5:00005451 r4:937f1b40 [ 881.138977][ T7453] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 881.139373][ T7453] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 881.139779][ T7453] r7:00000000 r6:937f1b41 r5:00000000 r4:00005451 [ 881.141548][ T7453] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 881.141926][ T7453] Exception stack(0xecc21fa8 to 0xecc21ff0) [ 881.142202][ T7453] 1fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 881.142563][ T7453] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b010bc [ 881.142918][ T7453] 1fe0: 76b00ec0 76b00eb0 00018af0 00133450 [ 881.143215][ T7453] r10:00000036 r9:83708000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 881.143591][ T7453] r4:00000000 [ 881.197398][ T7453] ERROR: Out of memory at tomoyo_realpath_from_path. [ 890.178488][ T7495] SELinux: policydb version 415415833 does not match my version range 15-33 [ 890.179813][ T7495] SELinux: failed to load policy [ 890.187001][ T31] audit: type=1400 audit(890.110:322): avc: denied { load_policy } for pid=7494 comm="syz.0.1013" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 894.057373][ T7514] SELinux: Context system_u:object_r:hald_cache_t:s0 is not valid (left unmapped). [ 894.058629][ T31] audit: type=1400 audit(893.990:323): avc: denied { relabelto } for pid=7512 comm="syz.0.1017" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 894.059436][ T31] audit: type=1400 audit(893.990:324): avc: denied { associate } for pid=7512 comm="syz.0.1017" name="rtc0" dev="devtmpfs" ino=699 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_cache_t:s0" [ 896.513375][ T31] audit: type=1400 audit(896.440:325): avc: denied { write } for pid=7518 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 898.073326][ T7538] fuse: Bad value for 'fd' [ 898.534584][ T31] audit: type=1400 audit(898.460:326): avc: denied { accept } for pid=7537 comm="syz.1.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 898.768468][ T7543] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=7543 comm=syz.0.1027 [ 900.317800][ T31] audit: type=1400 audit(900.250:327): avc: denied { map } for pid=7546 comm="syz.1.1028" path="socket:[13134]" dev="sockfs" ino=13134 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 910.400099][ T7594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=7594 comm=syz.0.1043 [ 910.479656][ T7594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7594 comm=syz.0.1043 [ 913.176201][ T7606] netlink: 'syz.1.1049': attribute type 1 has an invalid length. [ 913.218416][ T7606] netlink: 'syz.1.1049': attribute type 1 has an invalid length. [ 913.218708][ T7606] netlink: 'syz.1.1049': attribute type 1 has an invalid length. [ 913.218951][ T7606] netlink: 'syz.1.1049': attribute type 1 has an invalid length. [ 913.219189][ T7606] netlink: 'syz.1.1049': attribute type 1 has an invalid length. [ 943.362773][ T7748] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=7748 comm=syz.1.1089 [ 944.429687][ T7754] FAULT_INJECTION: forcing a failure. [ 944.429687][ T7754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 944.430346][ T7754] CPU: 0 UID: 0 PID: 7754 Comm: syz.1.1091 Not tainted 6.12.0-syzkaller #0 [ 944.430676][ T7754] Hardware name: ARM-Versatile Express [ 944.430920][ T7754] Call trace: [ 944.431138][ T7754] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 944.431560][ T7754] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 944.431784][ T7754] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 944.432133][ T7754] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 944.432518][ T7754] r5:00000000 r4:82751908 [ 944.432707][ T7754] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 944.433052][ T7754] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 944.433393][ T7754] r6:00000000 r5:edb11f68 r4:00000002 [ 944.433619][ T7754] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 944.433976][ T7754] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 944.434371][ T7754] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 944.434795][ T7754] r10:00000001 r9:805cc9a0 r8:00000002 r7:edb11f68 r6:0000000f r5:76b55f30 [ 944.435106][ T7754] r4:83de0000 r3:edb11e9f [ 944.435301][ T7754] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 944.435681][ T7754] r8:76b55f30 r7:edb11f68 r6:83de0000 r5:0000000f r4:8da2bd80 [ 944.435956][ T7754] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 944.436318][ T7754] r10:00000003 r9:83de0000 r8:8020029c r7:00000000 r6:00000000 r5:8da2bd80 [ 944.436986][ T7754] r4:8da2bd83 [ 944.437185][ T7754] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 944.437654][ T7754] r7:00000003 r6:00000004 r5:76b55f30 r4:0000000f [ 944.438065][ T7754] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 944.438450][ T7754] Exception stack(0xedb11fa8 to 0xedb11ff0) [ 944.438761][ T7754] 1fa0: 0000000f 76b55f30 00000004 76b55f30 0000000f 00000000 [ 944.439140][ T7754] 1fc0: 0000000f 76b55f30 00000004 00000003 00000000 00006364 003d0f00 76b560bc [ 944.439504][ T7754] 1fe0: 00000158 76b55ed0 000d8998 00131324 [ 945.298629][ T7759] fuse: Bad value for 'fd' [ 945.914740][ T31] audit: type=1400 audit(945.840:328): avc: denied { block_suspend } for pid=7764 comm="syz.0.1096" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 946.008910][ T31] audit: type=1400 audit(945.930:329): avc: denied { execute } for pid=7764 comm="syz.0.1096" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 948.218712][ T7783] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 959.602189][ T2930] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 959.684087][ T2930] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 959.749736][ T2930] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 959.805088][ T2930] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 960.198501][ T2930] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 960.211114][ T2930] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 960.219414][ T2930] bond0 (unregistering): Released all slaves [ 960.305747][ T2930] hsr_slave_0: left promiscuous mode [ 960.338250][ T2930] hsr_slave_1: left promiscuous mode [ 960.349423][ T2930] veth1_macvtap: left promiscuous mode [ 960.349954][ T2930] veth0_macvtap: left promiscuous mode [ 960.350292][ T2930] veth1_vlan: left promiscuous mode [ 960.350649][ T2930] veth0_vlan: left promiscuous mode [ 963.300597][ T7824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 963.319456][ T7824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 964.718815][ T7824] hsr_slave_0: entered promiscuous mode [ 964.721880][ T7824] hsr_slave_1: entered promiscuous mode [ 965.343729][ T7824] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 965.357942][ T7824] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 965.369313][ T7824] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 965.378815][ T7824] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 966.423261][ T7824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 970.545743][ T7824] veth0_vlan: entered promiscuous mode [ 970.570798][ T7824] veth1_vlan: entered promiscuous mode [ 970.634152][ T7824] veth0_macvtap: entered promiscuous mode [ 970.661438][ T7824] veth1_macvtap: entered promiscuous mode [ 970.751689][ T7824] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 970.752307][ T7824] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 970.752683][ T7824] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 970.753074][ T7824] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 970.895835][ T31] audit: type=1400 audit(970.820:330): avc: denied { mounton } for pid=7824 comm="syz-executor" path="/syzkaller.YYj8Zu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=15854 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 970.930259][ T31] audit: type=1400 audit(970.850:331): avc: denied { mount } for pid=7824 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 970.931263][ T31] audit: type=1400 audit(970.850:332): avc: denied { mounton } for pid=7824 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 971.843739][ T31] audit: type=1400 audit(971.770:333): avc: denied { accept } for pid=8266 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 975.448757][ T8297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=8297 comm=syz.1.1124 [ 976.044174][ T31] audit: type=1400 audit(975.970:334): avc: denied { create } for pid=8305 comm="syz.0.1129" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 976.059039][ T31] audit: type=1400 audit(975.990:335): avc: denied { map } for pid=8305 comm="syz.0.1129" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15918 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 976.067107][ T31] audit: type=1400 audit(975.990:336): avc: denied { read write } for pid=8305 comm="syz.0.1129" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15918 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 976.242111][ T8308] syzkaller0: entered promiscuous mode [ 976.242602][ T8308] syzkaller0: entered allmulticast mode [ 976.249431][ T8308] PF_CAN: dropped non conform CAN XL skbuff: dev type 65534, len 16735 [ 976.444876][ T31] audit: type=1400 audit(976.370:337): avc: denied { write } for pid=8313 comm="syz.0.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 977.098204][ T8261] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 977.288679][ T8261] usb 1-1: config 0 has an invalid interface number: 37 but max is 0 [ 977.289227][ T8261] usb 1-1: config 0 has no interface number 0 [ 977.289611][ T8261] usb 1-1: config 0 interface 37 altsetting 0 endpoint 0xE has an invalid bInterval 0, changing to 10 [ 977.290113][ T8261] usb 1-1: config 0 interface 37 altsetting 0 endpoint 0xE has invalid wMaxPacketSize 0 [ 977.316904][ T8261] usb 1-1: New USB device found, idVendor=045e, idProduct=0284, bcdDevice=fc.45 [ 977.317477][ T8261] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 977.318154][ T8261] usb 1-1: Product: syz [ 977.318587][ T8261] usb 1-1: Manufacturer: syz [ 977.319268][ T8261] usb 1-1: SerialNumber: syz [ 977.329347][ T8261] usb 1-1: config 0 descriptor?? [ 977.352843][ T8261] xbox_remote_probe: Unexpected endpoint_in [ 977.551754][ T95] usb 1-1: USB disconnect, device number 4 [ 978.688803][ T31] audit: type=1400 audit(978.610:338): avc: denied { create } for pid=8384 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 978.714544][ T31] audit: type=1400 audit(978.630:339): avc: denied { map } for pid=8384 comm="syz.0.1143" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.715671][ T31] audit: type=1400 audit(978.630:340): avc: denied { execute } for pid=8384 comm="syz.0.1143" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.889943][ T31] audit: type=1400 audit(978.820:341): avc: denied { setopt } for pid=8384 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 978.946076][ T31] audit: type=1400 audit(978.870:342): avc: denied { bind } for pid=8384 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 978.957332][ T31] audit: type=1400 audit(978.870:343): avc: denied { name_bind } for pid=8384 comm="syz.0.1143" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 980.270709][ T8393] ------------[ cut here ]------------ [ 980.271070][ T8393] WARNING: CPU: 0 PID: 8393 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 980.271414][ T8393] Modules linked in: [ 980.272008][ T8393] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 980.272596][ T8393] CPU: 0 UID: 0 PID: 8393 Comm: syz.1.1147 Not tainted 6.12.0-syzkaller #0 [ 980.272911][ T8393] Hardware name: ARM-Versatile Express [ 980.274151][ T8393] Call trace: [ 980.274416][ T8393] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 980.275091][ T8393] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 980.275866][ T8393] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 980.276889][ T8393] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 980.277612][ T8393] r5:00000000 r4:82874d18 [ 980.277841][ T8393] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 980.278188][ T8393] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 980.278536][ T8393] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 980.278794][ T8393] r7:80492e7c [ 980.278961][ T8393] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 980.279305][ T8393] [<802427b4>] (__warn) from [<80242ab4>] (warn_slowpath_fmt+0x178/0x1f4) [ 980.279688][ T8393] r8:00000009 r7:82059090 r6:ee3b9d24 r5:834bc800 r4:00000000 [ 980.279980][ T8393] [<80242940>] (warn_slowpath_fmt) from [<80492e7c>] (kunmap_local_indexed+0x20c/0x224) [ 980.280431][ T8393] r10:ffefde20 r9:83d79e00 r8:20000000 r7:00000000 r6:00000003 r5:834bc800 [ 980.280799][ T8393] r4:ffefd000 [ 980.280959][ T8393] [<80492c70>] (kunmap_local_indexed) from [<8050cd58>] (move_pages+0x7e8/0x149c) [ 980.281370][ T8393] r7:00000000 r6:84147ba0 r5:dee096dc r4:ffefb000 [ 980.281618][ T8393] [<8050c570>] (move_pages) from [<8058b378>] (userfaultfd_ioctl+0x111c/0x2080) [ 980.281990][ T8393] r10:83d79e00 r9:ee3b9e98 r8:00000001 r7:201c7000 r6:00000000 r5:20000000 [ 980.282299][ T8393] r4:8fe71000 [ 980.282465][ T8393] [<8058a25c>] (userfaultfd_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 980.282866][ T8393] r10:834bc800 r9:00000003 r8:937f1900 r7:20000000 r6:937f1901 r5:00000000 [ 980.283267][ T8393] r4:c028aa05 [ 980.283442][ T8393] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 980.283806][ T8393] Exception stack(0xee3b9fa8 to 0xee3b9ff0) [ 980.284059][ T8393] 9fa0: 00000000 00000000 00000003 c028aa05 20000000 00000000 [ 980.284664][ T8393] 9fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b560bc [ 980.284979][ T8393] 9fe0: 76b55ec0 76b55eb0 00018af0 00133450 [ 980.285228][ T8393] r10:00000036 r9:834bc800 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 980.285593][ T8393] r4:00000000 [ 980.287647][ T8393] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:07:10 Registers: info registers vcpu 0 CPU#0 R00=83f59c40 R01=00000038 R02=eaf65000 R03=00000000 R04=8287745b R05=83f59c40 R06=809f5e5c R07=82877463 R08=8287741c R09=00000048 R10=00000001 R11=ee3b99d8 R12=00000002 R13=ee3b99cc R14=8275b574 R15=809f5eb4 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00400cc0 R02=ffffffff R03=819e31e4 R04=824c05d8 R05=82c02300 R06=00400cc0 R07=ffffffff R08=80473878 R09=00000000 R10=00000126 R11=df979c5c R12=df979c08 R13=df979c30 R14=804d32cc R15=819d76d4 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005127e9 s17=00000000 d08=00000000005127e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=fc6a09e3 s33=b8f0e2a5 d16=b8f0e2a5fc6a09e3 s34=c6409fbc s35=adba70d1 d17=adba70d1c6409fbc s36=52af3ff2 s37=7b91da63 d18=7b91da6352af3ff2 s38=c6169131 s39=0d088a35 d19=0d088a35c6169131 s40=496be76a s41=c09e2cf8 d20=c09e2cf8496be76a s42=0700dd4e s43=15c986ce d21=15c986ce0700dd4e s44=55814938 s45=2b522de8 d22=2b522de855814938 s46=09d092c3 s47=37f9c972 d23=37f9c97209d092c3 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00180000 d26=00180000003c0000 s54=00240000 s55=00080000 d27=0008000000240000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ff9e0000 d29=ff9e000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000700 s63=ffae0000 d31=ffae000000000700 FPSCR: 00000000