last executing test programs: 18.169320396s ago: executing program 0 (id=2732): sendmsg$NFC_CMD_START_POLL(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x24, 0x0, 0x1, 0x127, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0xc854}, 0x24000040) 18.007809473s ago: executing program 0 (id=2733): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000700)=ANY=[@ANYBLOB="12010000000000408c0d220000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000980)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x5, {[@main=@item_4={0x3, 0x0, 0x8, "c4a8bb72"}]}}, 0x0}, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, 0x0, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0x4805, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f00000002c0)={0x0, 0x6, 0x2e, "b6c1173c7d1664741bcdd10dbdb2cd7015e090580fd6ab5d072bd00127120646a1c4521f67a1f38dc143f529e503"}, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x20, 0x0, 0x4, {0x10, 0x40}}, 0x0, 0x0, &(0x7f0000000500)={0x40, 0xb, 0x2, "36d5"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 15.988426543s ago: executing program 0 (id=2734): socket$l2tp(0x2, 0x2, 0x73) r0 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000001900)={0x2, 0x4e22, @loopback}, 0x10) 9.813966279s ago: executing program 0 (id=2739): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_COPY(r0, 0x3b83, &(0x7f00000004c0)={0x28, 0x7, 0x0, r1, 0x1c, 0x3, 0x2}) ioctl$IOMMU_IOAS_UNMAP(r0, 0x3b86, 0x0) ioctl$IOMMU_IOAS_UNMAP$ALL(r0, 0x3b86, 0x0) ioctl$IOMMU_OPTION$IOMMU_OPTION_RLIMIT_MODE(r0, 0x3b87, 0x0) ioctl$IOMMU_DESTROY$stdev(r0, 0x3b80, 0x0) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000980)={0x48, 0x5, r1, 0x0, 0x0, 0x1}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x3ba0, &(0x7f0000000a40)={0x48, 0x7, r2, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x1000}) ioctl$IOMMU_TEST_OP_ACCESS_RW(r0, 0x3ba0, 0x0) ioctl$IOMMU_TEST_OP_DESTROY_ACCESS_PAGES(r0, 0x3ba0, 0x0) 7.04734761s ago: executing program 0 (id=2741): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = add_key$user(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0x1, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r3, 0x5760, 0x14) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r3, 0x100000000000f7) read$watch_queue(r2, &(0x7f0000000000)=""/1, 0x1) keyctl$revoke(0x3, r1) 6.357118647s ago: executing program 0 (id=2740): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41000}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) write(r1, &(0x7f00000001c0)="240000005800410f9c00f4f90085b3025cb1fddf08000100050100000800028001000000", 0x24) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000380), r0) sendmsg$NFC_CMD_LLC_SET_PARAMS(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002abd7000fedbdf251000000005000f0001000000060011001703000008000100", @ANYRESHEX=r0], 0x2c}, 0x1, 0x0, 0x0, 0x4008891}, 0x20008080) 1.196194373s ago: executing program 1 (id=2747): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0xf3e, 0x4) sendto$packet(r0, &(0x7f0000000240)='V', 0x1, 0x404c810, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0xf7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x58) 1.068982678s ago: executing program 1 (id=2748): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) 918.354564ms ago: executing program 1 (id=2749): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_START_POLL(r0, 0x0, 0x24000040) 755.34986ms ago: executing program 1 (id=2750): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x81, 0x0, &(0x7f00000010c0)) 159.764364ms ago: executing program 1 (id=2751): r0 = syz_open_dev$hiddev(&(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0x4805, 0x0) 0s ago: executing program 1 (id=2752): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r1) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r3 = userfaultfd(0x80001) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) bind$alg(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x0) vmsplice(r7, &(0x7f0000001440)=[{&(0x7f0000001a00)="ce", 0x1}], 0x1, 0x4) ioctl$UFFDIO_COPY(r3, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) read$FUSE(r6, &(0x7f0000009780)={0x2020}, 0x2020) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xd, 0x1}, {0xfff1, 0xffff}, {0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x80c2}, 0x2004c801) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=@getqdisc={0x24, 0x26, 0x1, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x2, 0xf}, {0x5, 0xf}, {0x7, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4880) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(0x0, 0x0, r8) kernel console output (not intermixed with test programs): audit: type=1400 audit(1101.670:546): avc: denied { connect } for pid=11300 comm="syz.0.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1105.743418][ T31] audit: type=1400 audit(1105.670:547): avc: denied { setopt } for pid=11310 comm="syz.0.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1105.754527][ T31] audit: type=1400 audit(1105.680:548): avc: denied { lock } for pid=11310 comm="syz.0.2269" path="socket:[27529]" dev="sockfs" ino=27529 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1105.850940][T11315] fuse: Bad value for 'user_id' [ 1105.852328][T11315] fuse: Bad value for 'user_id' [ 1108.795520][ T31] audit: type=1400 audit(1108.720:549): avc: denied { audit_write } for pid=11326 comm="syz.0.2274" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1109.205842][ T31] audit: type=1400 audit(1109.140:550): avc: denied { bind } for pid=11330 comm="syz.0.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1109.211305][ T31] audit: type=1400 audit(1109.140:551): avc: denied { listen } for pid=11330 comm="syz.0.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1109.224296][ T31] audit: type=1400 audit(1109.150:552): avc: denied { connect } for pid=11330 comm="syz.0.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1109.239645][ T31] audit: type=1400 audit(1109.170:553): avc: denied { accept } for pid=11330 comm="syz.0.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1111.521653][ T31] audit: type=1400 audit(1111.450:554): avc: denied { create } for pid=11351 comm="syz.0.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1111.890864][ T31] audit: type=1400 audit(1111.820:555): avc: denied { mount } for pid=11355 comm="syz.0.2284" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1112.928074][ T31] audit: type=1400 audit(1112.860:556): avc: denied { ioctl } for pid=11355 comm="syz.0.2284" path="socket:[27603]" dev="sockfs" ino=27603 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1114.015539][ T3812] usb 2-1: new low-speed USB device number 33 using dummy_hcd [ 1114.201213][ T3812] usb 2-1: config 1 interface 0 altsetting 251 endpoint 0x81 has invalid maxpacket 512, setting to 8 [ 1114.201526][ T3812] usb 2-1: config 1 interface 0 altsetting 251 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1114.201796][ T3812] usb 2-1: config 1 interface 0 has no altsetting 0 [ 1114.248059][ T3812] usb 2-1: string descriptor 0 read error: -22 [ 1114.248436][ T3812] usb 2-1: New USB device found, idVendor=09da, idProduct=0006, bcdDevice= 0.40 [ 1114.248668][ T3812] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1114.268586][T11363] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1114.270194][T11363] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1114.284171][ T3812] usbhid 2-1:1.0: can't add hid device: -22 [ 1114.284620][ T3812] usbhid 2-1:1.0: probe with driver usbhid failed with error -22 [ 1114.463389][ T31] audit: type=1400 audit(1114.390:557): avc: denied { setattr } for pid=11364 comm="syz.0.2286" name="UDP-Lite" dev="sockfs" ino=28446 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1115.152314][ T31] audit: type=1400 audit(1115.080:558): avc: denied { setattr } for pid=11368 comm="syz.0.2288" path="/proc/1373/net/vlan/config" dev="proc" ino=4026532979 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1115.256371][ T31] audit: type=1400 audit(1115.190:559): avc: denied { create } for pid=11368 comm="syz.0.2288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1115.267091][ T31] audit: type=1400 audit(1115.200:560): avc: denied { read } for pid=11368 comm="syz.0.2288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1115.852476][ T31] audit: type=1400 audit(1115.780:561): avc: denied { write } for pid=11375 comm="syz.0.2290" path="socket:[27641]" dev="sockfs" ino=27641 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1116.565604][ T3812] usb 2-1: USB disconnect, device number 33 [ 1116.697635][T11387] FAULT_INJECTION: forcing a failure. [ 1116.697635][T11387] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.698650][T11387] CPU: 1 UID: 0 PID: 11387 Comm: syz.1.2295 Not tainted syzkaller #0 PREEMPT [ 1116.698722][T11387] Hardware name: ARM-Versatile Express [ 1116.698737][T11387] Call trace: [ 1116.698758][T11387] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1116.698828][T11387] r7:84c0c800 r6:00000000 r5:60000013 r4:8226064c [ 1116.698838][T11387] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1116.698871][T11387] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1116.698905][T11387] r5:84c0c800 r4:82917c00 [ 1116.698964][T11387] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1116.699002][T11387] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1116.699044][T11387] r8:00000000 r7:84c0c800 r6:00000cc0 r5:20000000 r4:830a2a80 [ 1116.699056][T11387] [<8051f2a4>] (should_failslab) from [<80503920>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1116.699085][T11387] [<805038d4>] (kmem_cache_alloc_noprof) from [<80562c34>] (getname_flags.part.0+0x28/0x18c) [ 1116.699130][T11387] r10:00000142 r9:84c0c800 r8:8020029c r7:00000000 r6:82466858 r5:20000000 [ 1116.699143][T11387] r4:20000000 [ 1116.699151][T11387] [<80562c0c>] (getname_flags.part.0) from [<80567bd0>] (getname_flags+0x3c/0x50) [ 1116.699193][T11387] r9:84c0c800 r8:8020029c r7:ffffff9c r6:dfc15f58 r5:00000000 r4:20000000 [ 1116.699203][T11387] [<80567b94>] (getname_flags) from [<8055042c>] (do_sys_openat2+0x60/0xe0) [ 1116.699236][T11387] r5:20000000 r4:00000000 [ 1116.699245][T11387] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1116.699282][T11387] r7:00000142 r6:00130230 r5:20000000 r4:ffffff9c [ 1116.699291][T11387] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1116.699320][T11387] Exception stack(0xdfc15fa8 to 0xdfc15ff0) [ 1116.699343][T11387] 5fa0: 00000000 00000000 ffffff9c 20000000 00000002 00000000 [ 1116.699364][T11387] 5fc0: 00000000 00000000 00130230 00000142 002e0000 00000000 00006364 76fd50bc [ 1116.699381][T11387] 5fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1116.699395][T11387] r5:00000000 r4:00000000 [ 1116.783420][T11390] FAULT_INJECTION: forcing a failure. [ 1116.783420][T11390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1116.785512][T11390] CPU: 1 UID: 0 PID: 11390 Comm: syz.1.2297 Not tainted syzkaller #0 PREEMPT [ 1116.785638][T11390] Hardware name: ARM-Versatile Express [ 1116.785665][T11390] Call trace: [ 1116.785705][T11390] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1116.785806][T11390] r7:dfc15e20 r6:00000000 r5:60000013 r4:8226064c [ 1116.785846][T11390] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1116.785903][T11390] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1116.785965][T11390] r5:84c0d400 r4:8294f190 [ 1116.785985][T11390] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1116.786048][T11390] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1116.786116][T11390] r8:00040810 r7:dfc15e20 r6:20002a80 r5:00000000 r4:dfc15f20 [ 1116.786135][T11390] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1116.786189][T11390] [<80972940>] (should_fail_usercopy) from [<815467e0>] (copy_msghdr_from_user+0x50/0x130) [ 1116.786281][T11390] [<81546790>] (copy_msghdr_from_user) from [<81546938>] (___sys_sendmsg+0x78/0xd0) [ 1116.786350][T11390] r8:00040810 r7:00000000 r6:850db680 r5:dfc15f20 r4:dfc15e64 [ 1116.786369][T11390] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1116.786438][T11390] r10:00000128 r9:84c0d400 r8:8595ae40 r7:00040810 r6:20002a80 r5:8595ae41 [ 1116.786460][T11390] r4:00000004 [ 1116.786477][T11390] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1116.786539][T11390] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1116.786558][T11390] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1116.786612][T11390] Exception stack(0xdfc15fa8 to 0xdfc15ff0) [ 1116.786653][T11390] 5fa0: 00000000 00000000 00000004 20002a80 00040810 00000000 [ 1116.786692][T11390] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fd50bc [ 1116.786721][T11390] 5fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1117.269866][ T31] audit: type=1400 audit(1117.200:562): avc: denied { read } for pid=11385 comm="syz.0.2296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1117.891621][ T31] audit: type=1400 audit(1117.820:563): avc: denied { read } for pid=11385 comm="syz.0.2296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1118.091457][ T31] audit: type=1400 audit(1118.020:564): avc: denied { create } for pid=11400 comm="syz.1.2300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1118.294093][ T31] audit: type=1400 audit(1118.220:565): avc: denied { create } for pid=11402 comm="syz.1.2301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1118.301264][ T31] audit: type=1400 audit(1118.230:566): avc: denied { write } for pid=11402 comm="syz.1.2301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1119.479311][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 1119.480550][ T31] audit: type=1400 audit(1119.410:571): avc: denied { create } for pid=11428 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1119.496057][ T31] audit: type=1400 audit(1119.430:572): avc: denied { setopt } for pid=11428 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1119.543509][ T31] audit: type=1400 audit(1119.470:573): avc: denied { lock } for pid=11428 comm="syz.1.2311" path="socket:[28763]" dev="sockfs" ino=28763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1119.854331][T11435] FAULT_INJECTION: forcing a failure. [ 1119.854331][T11435] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.860652][T11435] CPU: 0 UID: 0 PID: 11435 Comm: syz.1.2313 Not tainted syzkaller #0 PREEMPT [ 1119.860813][T11435] Hardware name: ARM-Versatile Express [ 1119.860839][T11435] Call trace: [ 1119.860880][T11435] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1119.860994][T11435] r7:83896c00 r6:00000000 r5:60000013 r4:8226064c [ 1119.861015][T11435] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1119.861068][T11435] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1119.861127][T11435] r5:83896c00 r4:82917c00 [ 1119.861145][T11435] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1119.861205][T11435] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1119.861277][T11435] r8:00000000 r7:83896c00 r6:00000cc0 r5:ffffffff r4:832cb240 [ 1119.861295][T11435] [<8051f2a4>] (should_failslab) from [<805032b4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1119.861346][T11435] [<80503264>] (kmem_cache_alloc_node_noprof) from [<815518cc>] (__alloc_skb+0x138/0x160) [ 1119.861419][T11435] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:832cb240 r5:ffffffff [ 1119.861440][T11435] r4:828060c0 [ 1119.861456][T11435] [<81551794>] (__alloc_skb) from [<816711ec>] (netlink_alloc_large_skb+0x88/0xa0) [ 1119.861529][T11435] r8:00000000 r7:8493dc00 r6:00000020 r5:83479680 r4:00000140 [ 1119.861549][T11435] [<81671164>] (netlink_alloc_large_skb) from [<81671934>] (netlink_sendmsg+0x134/0x444) [ 1119.861607][T11435] r5:83479680 r4:dfc29f20 [ 1119.861625][T11435] [<81671800>] (netlink_sendmsg) from [<81543640>] (__sock_sendmsg+0x44/0x78) [ 1119.861717][T11435] r10:00000000 r9:dfc29dc4 r8:dfc29dc4 r7:00000000 r6:83479680 r5:dfc29f20 [ 1119.861738][T11435] r4:00000000 [ 1119.861755][T11435] [<815435fc>] (__sock_sendmsg) from [<81544994>] (____sys_sendmsg+0x298/0x2cc) [ 1119.861822][T11435] r7:00000000 r6:83479680 r5:04008004 r4:dfc29f20 [ 1119.861840][T11435] [<815446fc>] (____sys_sendmsg) from [<8154695c>] (___sys_sendmsg+0x9c/0xd0) [ 1119.861908][T11435] r10:dfc29e24 r9:20000440 r8:04008004 r7:00000000 r6:83479680 r5:dfc29f20 [ 1119.861930][T11435] r4:00000000 [ 1119.861947][T11435] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1119.862011][T11435] r10:00000128 r9:83896c00 r8:84fee000 r7:04008004 r6:20000440 r5:84fee001 [ 1119.862034][T11435] r4:00000003 [ 1119.862049][T11435] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1119.862109][T11435] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1119.862126][T11435] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1119.862172][T11435] Exception stack(0xdfc29fa8 to 0xdfc29ff0) [ 1119.862211][T11435] 9fa0: 00000000 00000000 00000003 20000440 04008004 00000000 [ 1119.862248][T11435] 9fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fd50bc [ 1119.862278][T11435] 9fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1120.679341][T11441] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11441 comm=syz.1.2314 [ 1122.117390][T11447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pid=11447 comm=syz.0.2317 [ 1122.120167][T11447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11447 comm=syz.0.2317 [ 1122.238581][T11447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11447 comm=syz.0.2317 [ 1122.241598][T11447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11447 comm=syz.0.2317 [ 1122.248881][ T31] audit: type=1400 audit(1122.180:574): avc: denied { setattr } for pid=11446 comm="syz.0.2317" path="socket:[28820]" dev="sockfs" ino=28820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1122.253713][T11447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=32 sclass=netlink_tcpdiag_socket pid=11447 comm=syz.0.2317 [ 1122.569540][T11455] FAULT_INJECTION: forcing a failure. [ 1122.569540][T11455] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.569900][T11455] CPU: 0 UID: 0 PID: 11455 Comm: syz.1.2319 Not tainted syzkaller #0 PREEMPT [ 1122.569994][T11455] Hardware name: ARM-Versatile Express [ 1122.570019][T11455] Call trace: [ 1122.570061][T11455] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1122.570272][T11455] r7:00000d40 r6:00000000 r5:60000013 r4:8226064c [ 1122.570443][T11455] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1122.570539][T11455] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1122.570634][T11455] r5:841fbc00 r4:82917c00 [ 1122.570705][T11455] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1122.570776][T11455] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1122.570852][T11455] r8:841fbc00 r7:00000d40 r6:84fee028 r5:0000001c r4:83001240 [ 1122.570873][T11455] [<8051f2a4>] (should_failslab) from [<80503ca4>] (__kmalloc_noprof+0x9c/0x458) [ 1122.570960][T11455] [<80503c08>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_encode2+0x64/0xf0) [ 1122.571040][T11455] r10:00000fff r9:8309e400 r8:00000000 r7:8341eb28 r6:84fee028 r5:84bd4ffc [ 1122.571113][T11455] r4:84bd4feb [ 1122.571147][T11455] [<807c3570>] (tomoyo_encode2) from [<807c3684>] (tomoyo_encode+0x24/0x30) [ 1122.571224][T11455] r9:8309e400 r8:00000000 r7:8341eb28 r6:84fee028 r5:00001000 r4:84bd4fec [ 1122.571247][T11455] [<807c3660>] (tomoyo_encode) from [<807c3710>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1122.571340][T11455] r5:00001000 r4:84bd4000 [ 1122.571377][T11455] [<807c3690>] (tomoyo_realpath_from_path) from [<807bf810>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1122.571452][T11455] r10:841fbc00 r9:00000000 r8:84fee000 r7:00001260 r6:00000004 r5:81cd6504 [ 1122.571481][T11455] r4:84fee028 r3:826c0200 [ 1122.571499][T11455] [<807bf744>] (tomoyo_path_number_perm) from [<807c40f0>] (tomoyo_file_ioctl+0x1c/0x20) [ 1122.571573][T11455] r9:00000003 r8:84fee000 r7:20000040 r6:20000040 r5:00001260 r4:84fee000 [ 1122.571617][T11455] [<807c40d4>] (tomoyo_file_ioctl) from [<80770944>] (security_file_ioctl+0x64/0x1e4) [ 1122.571691][T11455] [<807708e0>] (security_file_ioctl) from [<8056cd94>] (sys_ioctl+0x4c/0xba0) [ 1122.571759][T11455] r7:20000040 r6:84fee001 r5:00000000 r4:00001260 [ 1122.571782][T11455] [<8056cd48>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1122.571872][T11455] Exception stack(0xdfc61fa8 to 0xdfc61ff0) [ 1122.571950][T11455] 1fa0: 00000000 00000000 00000003 00001260 20000040 00000000 [ 1122.572006][T11455] 1fc0: 00000000 00000000 00130230 00000036 002e0000 00000000 00006364 76fd50bc [ 1122.572220][T11455] 1fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1122.572373][T11455] r10:00000036 r9:841fbc00 r8:8020029c r7:00000036 r6:00130230 r5:00000000 [ 1122.572433][T11455] r4:00000000 [ 1122.575818][T11455] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1122.838373][ T31] audit: type=1400 audit(1122.770:575): avc: denied { write } for pid=11456 comm="syz.0.2320" path="socket:[28850]" dev="sockfs" ino=28850 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1122.948792][ T31] audit: type=1400 audit(1122.880:576): avc: denied { getopt } for pid=11462 comm="syz.1.2323" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1123.380897][ T31] audit: type=1400 audit(1123.310:577): avc: denied { execute } for pid=11456 comm="syz.0.2320" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1125.452247][T11471] FAULT_INJECTION: forcing a failure. [ 1125.452247][T11471] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.452600][T11471] CPU: 0 UID: 0 PID: 11471 Comm: syz.1.2327 Not tainted syzkaller #0 PREEMPT [ 1125.452710][T11471] Hardware name: ARM-Versatile Express [ 1125.452738][T11471] Call trace: [ 1125.452778][T11471] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1125.452888][T11471] r7:00000d40 r6:00000000 r5:60000013 r4:8226064c [ 1125.452908][T11471] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1125.452978][T11471] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1125.453039][T11471] r5:841fb000 r4:82917c00 [ 1125.453054][T11471] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1125.453112][T11471] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1125.453181][T11471] r8:841fb000 r7:00000d40 r6:84fee7a8 r5:0000001d r4:83001240 [ 1125.453219][T11471] [<8051f2a4>] (should_failslab) from [<80503ca4>] (__kmalloc_noprof+0x9c/0x458) [ 1125.453738][T11471] [<80503c08>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_encode2+0x64/0xf0) [ 1125.454071][T11471] r10:00000fff r9:8309e400 r8:00000000 r7:834ee220 r6:84fee7a8 r5:84bd6ffc [ 1125.454157][T11471] r4:84bd6fea [ 1125.454299][T11471] [<807c3570>] (tomoyo_encode2) from [<807c3684>] (tomoyo_encode+0x24/0x30) [ 1125.454584][T11471] r9:8309e400 r8:00000000 r7:834ee220 r6:84fee7a8 r5:00001000 r4:84bd6feb [ 1125.454628][T11471] [<807c3660>] (tomoyo_encode) from [<807c3710>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1125.454725][T11471] r5:00001000 r4:84bd6000 [ 1125.454745][T11471] [<807c3690>] (tomoyo_realpath_from_path) from [<807bf810>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1125.454812][T11471] r10:841fb000 r9:00000000 r8:84fee780 r7:80089418 r6:00000004 r5:81cd6504 [ 1125.454836][T11471] r4:84fee7a8 r3:826c0200 [ 1125.454854][T11471] [<807bf744>] (tomoyo_path_number_perm) from [<807c40f0>] (tomoyo_file_ioctl+0x1c/0x20) [ 1125.454928][T11471] r9:00000003 r8:84fee780 r7:20000040 r6:20000040 r5:80089418 r4:84fee780 [ 1125.455008][T11471] [<807c40d4>] (tomoyo_file_ioctl) from [<80770944>] (security_file_ioctl+0x64/0x1e4) [ 1125.455068][T11471] [<807708e0>] (security_file_ioctl) from [<8056cd94>] (sys_ioctl+0x4c/0xba0) [ 1125.455131][T11471] r7:20000040 r6:84fee781 r5:00000000 r4:80089418 [ 1125.455148][T11471] [<8056cd48>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1125.455196][T11471] Exception stack(0xdfc71fa8 to 0xdfc71ff0) [ 1125.455235][T11471] 1fa0: 00000000 00000000 00000003 80089418 20000040 00000000 [ 1125.455275][T11471] 1fc0: 00000000 00000000 00130230 00000036 002e0000 00000000 00006364 76fd50bc [ 1125.455306][T11471] 1fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1125.455348][T11471] r10:00000036 r9:841fb000 r8:8020029c r7:00000036 r6:00130230 r5:00000000 [ 1125.455369][T11471] r4:00000000 [ 1125.488577][T11471] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1127.001383][T11493] fuse: Bad value for 'fd' [ 1127.411060][ T31] audit: type=1400 audit(1127.340:578): avc: denied { write } for pid=11481 comm="syz.1.2331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1129.480275][T11518] FAULT_INJECTION: forcing a failure. [ 1129.480275][T11518] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.482436][T11518] CPU: 1 UID: 0 PID: 11518 Comm: syz.1.2340 Not tainted syzkaller #0 PREEMPT [ 1129.482575][T11518] Hardware name: ARM-Versatile Express [ 1129.482606][T11518] Call trace: [ 1129.482646][T11518] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1129.482799][T11518] r7:00400cc0 r6:00000000 r5:60000013 r4:8226064c [ 1129.482822][T11518] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1129.482883][T11518] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1129.482981][T11518] r5:83b4b000 r4:82917c00 [ 1129.483001][T11518] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1129.483076][T11518] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1129.483158][T11518] r8:00400cc0 r7:00400cc0 r6:00000000 r5:83002000 r4:0000002a [ 1129.483178][T11518] [<8051f2a4>] (should_failslab) from [<80502484>] (__kvmalloc_node_noprof+0xe4/0x5a0) [ 1129.483233][T11518] [<805023a0>] (__kvmalloc_node_noprof) from [<8058cc7c>] (simple_xattr_alloc+0x30/0x5c) [ 1129.483374][T11518] r10:00000001 r9:dfca5e5c r8:830cf530 r7:84a21238 r6:8b701b00 r5:dfca5e5c [ 1129.483403][T11518] r4:00000016 [ 1129.483423][T11518] [<8058cc4c>] (simple_xattr_alloc) from [<8058cd70>] (simple_xattr_set+0x28/0x184) [ 1129.483499][T11518] r7:84a21238 r6:8b701b00 r5:dfca5e5c r4:8b701b00 [ 1129.483519][T11518] [<8058cd48>] (simple_xattr_set) from [<8049326c>] (shmem_xattr_handler_set+0x194/0x1a8) [ 1129.483597][T11518] r9:dfca5e5c r8:830cf530 r7:00000053 r6:830cf500 r5:84a21258 r4:8b701b00 [ 1129.483621][T11518] [<804930d8>] (shmem_xattr_handler_set) from [<8058af74>] (__vfs_setxattr+0xb4/0xc8) [ 1129.483696][T11518] r9:804930d8 r8:00000016 r7:8b701b00 r6:83532dd0 r5:8291edac r4:84a21258 [ 1129.483741][T11518] [<8058aec0>] (__vfs_setxattr) from [<8058b99c>] (__vfs_setxattr_noperm+0x7c/0x204) [ 1129.483812][T11518] r9:8291edac r8:8b701b00 r7:84a21258 r6:00000001 r5:dfca5e5c r4:83532dd0 [ 1129.483831][T11518] [<8058b920>] (__vfs_setxattr_noperm) from [<8058bc0c>] (__vfs_setxattr_locked+0xe8/0x118) [ 1129.483928][T11518] r10:dfca5dc0 r9:00000016 r8:84a21258 r7:8b701b00 r6:dfca5e5c r5:8291edac [ 1129.483955][T11518] r4:83532dd0 [ 1129.483974][T11518] [<8058bb24>] (__vfs_setxattr_locked) from [<8058bccc>] (vfs_setxattr+0x90/0x180) [ 1129.484037][T11518] r8:8291edac r7:dfca5e5c r6:83532dd0 r5:84a212d8 r4:dfca5e48 [ 1129.484054][T11518] [<8058bc3c>] (vfs_setxattr) from [<8058be50>] (do_setxattr+0x94/0x9c) [ 1129.484117][T11518] r10:000000e4 r9:83532dd0 r8:8291edac r7:8b701b00 r6:00000016 r5:dfca5e5c [ 1129.484141][T11518] r4:dfca5e48 [ 1129.484156][T11518] [<8058bdbc>] (do_setxattr) from [<8058c080>] (file_setxattr+0x58/0x78) [ 1129.484222][T11518] r9:83b4b000 r8:200007c0 r7:00000004 r6:dfca5e48 r5:8595a540 r4:00000000 [ 1129.484240][T11518] [<8058c028>] (file_setxattr) from [<8058c284>] (path_setxattrat+0x104/0x17c) [ 1129.484301][T11518] r7:00000004 r6:8595a540 r5:8595a541 r4:00000000 [ 1129.484318][T11518] [<8058c180>] (path_setxattrat) from [<8058c4fc>] (sys_fsetxattr+0x30/0x38) [ 1129.484383][T11518] r8:8020029c r7:000000e4 r6:00130230 r5:00000000 r4:00000001 [ 1129.484403][T11518] [<8058c4cc>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1129.484452][T11518] Exception stack(0xdfca5fa8 to 0xdfca5ff0) [ 1129.484491][T11518] 5fa0: 00000001 00000000 00000004 20000780 200007c0 00000016 [ 1129.484526][T11518] 5fc0: 00000001 00000000 00130230 000000e4 002e0000 00000000 00006364 76fd50bc [ 1129.484604][T11518] 5fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1129.647256][T11521] FAULT_INJECTION: forcing a failure. [ 1129.647256][T11521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1129.648800][T11521] CPU: 1 UID: 0 PID: 11521 Comm: syz.1.2341 Not tainted syzkaller #0 PREEMPT [ 1129.648906][T11521] Hardware name: ARM-Versatile Express [ 1129.648938][T11521] Call trace: [ 1129.648975][T11521] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1129.649083][T11521] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1129.649101][T11521] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1129.649157][T11521] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1129.649215][T11521] r5:841f8c00 r4:8294f190 [ 1129.649230][T11521] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1129.649289][T11521] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1129.649358][T11521] r8:76fd4f30 r7:00000000 r6:00000000 r5:dfca5f68 r4:00000002 [ 1129.649374][T11521] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1129.649427][T11521] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1129.649488][T11521] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1129.649561][T11521] r10:00000001 r9:8060860c r8:00000002 r7:dfca5f68 r6:0000000f r5:76fd4f30 [ 1129.649586][T11521] r4:841f8c00 r3:dfca5e9f [ 1129.649601][T11521] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1129.649668][T11521] r8:76fd4f30 r7:dfca5f68 r6:841f8c00 r5:0000000f r4:85b01000 [ 1129.649687][T11521] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1129.649759][T11521] r10:00000003 r9:841f8c00 r8:8020029c r7:00000000 r6:00000000 r5:85b01000 [ 1129.649781][T11521] r4:85b01003 [ 1129.649796][T11521] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1129.649861][T11521] r7:00000003 r6:00000004 r5:76fd4f30 r4:0000000f [ 1129.649877][T11521] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1129.649930][T11521] Exception stack(0xdfca5fa8 to 0xdfca5ff0) [ 1129.649970][T11521] 5fa0: 0000000f 76fd4f30 00000004 76fd4f30 0000000f 00000000 [ 1129.650007][T11521] 5fc0: 0000000f 76fd4f30 00000004 00000003 002e0000 00000000 00006364 76fd50bc [ 1129.650033][T11521] 5fe0: 00000158 76fd4ed0 000d80b8 00130154 [ 1130.157342][ T31] audit: type=1400 audit(1130.090:579): avc: denied { write } for pid=11526 comm="syz.1.2343" path="socket:[28986]" dev="sockfs" ino=28986 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1130.191090][T11527] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11527 comm=syz.1.2343 [ 1130.551250][ T31] audit: type=1400 audit(1130.480:580): avc: denied { block_suspend } for pid=11537 comm="syz.0.2347" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1130.717764][T11541] FAULT_INJECTION: forcing a failure. [ 1130.717764][T11541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1130.718107][T11541] CPU: 0 UID: 0 PID: 11541 Comm: syz.0.2348 Not tainted syzkaller #0 PREEMPT [ 1130.718206][T11541] Hardware name: ARM-Versatile Express [ 1130.718232][T11541] Call trace: [ 1130.718272][T11541] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1130.718368][T11541] r7:00000000 r6:00000000 r5:60000113 r4:8226064c [ 1130.718387][T11541] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1130.718438][T11541] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1130.718494][T11541] r5:84c0e000 r4:82917c54 [ 1130.718509][T11541] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1130.718627][T11541] [<80972700>] (should_fail_ex) from [<8051f3a0>] (should_fail_alloc_page+0x68/0x74) [ 1130.718724][T11541] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dfcc5df0 [ 1130.718767][T11541] [<8051f338>] (should_fail_alloc_page) from [<804ed650>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 1130.718893][T11541] [<804ed5bc>] (prepare_alloc_pages.constprop.0) from [<804f5b78>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 1130.718982][T11541] r10:dfcc5fb0 r9:00000000 r8:84c0e000 r7:00000040 r6:00140cca r5:84c0e000 [ 1130.719057][T11541] r4:00000000 r3:dfcc5df0 [ 1130.719142][T11541] [<804f5acc>] (__alloc_frozen_pages_noprof) from [<804f6c10>] (__folio_alloc_noprof+0x14/0x6c) [ 1130.719250][T11541] r10:dfcc5fb0 r9:873ce700 r8:00000000 r7:00000040 r6:76f71df8 r5:84c0e000 [ 1130.719314][T11541] r4:00001255 [ 1130.719413][T11541] [<804f6bfc>] (__folio_alloc_noprof) from [<804c774c>] (handle_mm_fault+0xcf8/0x14dc) [ 1130.719482][T11541] r5:84c0e000 r4:00001255 [ 1130.719499][T11541] [<804c6a54>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 1130.719744][T11541] r10:00000002 r9:84b9c680 r8:00000255 r7:84c0e000 r6:00000a07 r5:76f71df8 [ 1130.719811][T11541] r4:dfcc5fb0 [ 1130.719958][T11541] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 1130.720160][T11541] r10:00006364 r9:00000000 r8:80234128 r7:dfcc5fb0 r6:76f71df8 r5:00000a07 [ 1130.720252][T11541] r4:8281cef0 [ 1130.720361][T11541] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 1130.720562][T11541] Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) [ 1130.720949][T11541] 5fa0: 00189e80 20000000 0000006e 76f73e98 [ 1130.721029][T11541] 5fc0: 00023018 00000005 20000000 0000006e 00000005 00000000 00006364 76f740bc [ 1130.721102][T11541] 5fe0: 200001c0 76f71e08 0002245c 00013aa4 20000010 ffffffff [ 1130.721141][T11541] r8:826b7044 r7:84c0e000 r6:ffffffff r5:20000010 r4:00013aa4 [ 1130.721749][T11541] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1130.966425][ T96] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 1131.125388][ T96] usb 1-1: Using ep0 maxpacket: 32 [ 1131.130386][ T96] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1131.130905][ T96] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 1131.144377][ T96] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1131.144872][ T96] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1131.145088][ T96] usb 1-1: Product: syz [ 1131.145189][ T96] usb 1-1: Manufacturer: syz [ 1131.145281][ T96] usb 1-1: SerialNumber: syz [ 1131.373694][ T96] cdc_ncm 1-1:1.0: bind() failure [ 1131.376750][ T96] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 1131.376919][ T96] cdc_ncm 1-1:1.1: bind() failure [ 1131.400440][ T96] usb 1-1: USB disconnect, device number 32 [ 1131.457141][ T31] audit: type=1400 audit(1131.390:581): avc: denied { ioctl } for pid=11545 comm="syz.0.2350" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xf506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1131.481933][ T31] audit: type=1400 audit(1131.410:582): avc: denied { lock } for pid=11545 comm="syz.0.2350" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1131.645803][ T3812] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 1131.758528][T11553] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pid=11553 comm=syz.0.2351 [ 1131.806553][ T3812] usb 2-1: Using ep0 maxpacket: 32 [ 1131.821877][ T3812] usb 2-1: config 1 has an invalid descriptor of length 255, skipping remainder of the config [ 1131.823258][ T3812] usb 2-1: config 1 has 0 interfaces, different from the descriptor's value: 2 [ 1131.838351][ T3812] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1131.839369][ T3812] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1131.840242][ T3812] usb 2-1: Product: syz [ 1131.840895][ T3812] usb 2-1: Manufacturer: syz [ 1131.841520][ T3812] usb 2-1: SerialNumber: syz [ 1142.089084][ T7857] usb 2-1: USB disconnect, device number 34 [ 1144.856577][ T31] audit: type=1400 audit(1144.790:583): avc: denied { shutdown } for pid=11567 comm="syz.1.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1144.974324][T11571] FAULT_INJECTION: forcing a failure. [ 1144.974324][T11571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1144.974578][T11571] CPU: 1 UID: 0 PID: 11571 Comm: syz.1.2358 Not tainted syzkaller #0 PREEMPT [ 1144.974656][T11571] Hardware name: ARM-Versatile Express [ 1144.974670][T11571] Call trace: [ 1144.974692][T11571] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1144.974758][T11571] r7:20000bc0 r6:00000000 r5:60000013 r4:8226064c [ 1144.974768][T11571] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1144.974798][T11571] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1144.974827][T11571] r5:84c08c00 r4:8294f190 [ 1144.974835][T11571] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1144.974867][T11571] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1144.974901][T11571] r8:00000014 r7:20000bc0 r6:dfcc9d64 r5:00000004 r4:00000004 [ 1144.974909][T11571] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1144.974936][T11571] [<80972940>] (should_fail_usercopy) from [<8184879c>] (copy_from_sockptr_offset.constprop.0+0x5c/0x11c) [ 1144.974969][T11571] [<81848740>] (copy_from_sockptr_offset.constprop.0) from [<818490e8>] (do_ipv6_setsockopt+0x1c4/0x1270) [ 1144.975069][T11571] r8:00000014 r7:8184a1f4 r6:20000bc0 r5:00000032 r4:85b4c000 [ 1144.975079][T11571] [<81848f28>] (do_ipv6_setsockopt) from [<8184a1f4>] (ipv6_setsockopt+0x60/0xbc) [ 1144.975119][T11571] r10:00000126 r9:84c08c00 r8:00000014 r7:85b4c000 r6:00000014 r5:00000032 [ 1144.975156][T11571] r4:85b4c000 [ 1144.975165][T11571] [<8184a198>] (ipv6_setsockopt) from [<81855a5c>] (rawv6_setsockopt+0x6c/0x1dc) [ 1144.975198][T11571] r6:00000032 r5:00000029 r4:00000029 [ 1144.975206][T11571] [<818559f4>] (rawv6_setsockopt) from [<815477c8>] (sock_common_setsockopt+0x38/0x40) [ 1144.975239][T11571] r7:85142780 r6:00000032 r5:00000029 r4:818559f0 [ 1144.975248][T11571] [<81547794>] (sock_common_setsockopt) from [<81542e68>] (do_sock_setsockopt+0x70/0xc8) [ 1144.975276][T11571] r4:81547790 [ 1144.975284][T11571] [<81542df8>] (do_sock_setsockopt) from [<81546420>] (__sys_setsockopt+0x7c/0xc4) [ 1144.975319][T11571] r8:00000000 r7:85ae86c0 r6:85ae86c1 r5:00000032 r4:00000029 [ 1144.975328][T11571] [<815463a4>] (__sys_setsockopt) from [<81546484>] (sys_setsockopt+0x1c/0x24) [ 1144.975363][T11571] r8:8020029c r7:00000126 r6:00130230 r5:00000000 r4:00000014 [ 1144.975372][T11571] [<81546468>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1144.975399][T11571] Exception stack(0xdfcc9fa8 to 0xdfcc9ff0) [ 1144.975420][T11571] 9fa0: 00000014 00000000 00000003 00000029 00000032 20000bc0 [ 1144.975439][T11571] 9fc0: 00000014 00000000 00130230 00000126 002e0000 00000000 00006364 76fd50bc [ 1144.975453][T11571] 9fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1148.510581][T11587] FAULT_INJECTION: forcing a failure. [ 1148.510581][T11587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1148.530185][T11587] CPU: 1 UID: 0 PID: 11587 Comm: syz.0.2363 Not tainted syzkaller #0 PREEMPT [ 1148.530333][T11587] Hardware name: ARM-Versatile Express [ 1148.530358][T11587] Call trace: [ 1148.530396][T11587] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1148.530533][T11587] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1148.530552][T11587] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1148.530608][T11587] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1148.530663][T11587] r5:841fb000 r4:8294f190 [ 1148.530678][T11587] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1148.530733][T11587] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1148.530794][T11587] r8:76f73f30 r7:00000000 r6:00000000 r5:dfd1df68 r4:00000002 [ 1148.530811][T11587] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1148.530860][T11587] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1148.530917][T11587] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1148.530984][T11587] r10:00000001 r9:8060860c r8:00000002 r7:dfd1df68 r6:0000000f r5:76f73f30 [ 1148.531007][T11587] r4:841fb000 r3:dfd1de9f [ 1148.531022][T11587] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1148.531084][T11587] r8:76f73f30 r7:dfd1df68 r6:841fb000 r5:0000000f r4:84a09780 [ 1148.531101][T11587] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1148.531165][T11587] r10:00000003 r9:841fb000 r8:8020029c r7:00000000 r6:00000000 r5:84a09780 [ 1148.531184][T11587] r4:84a09783 [ 1148.531199][T11587] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1148.531258][T11587] r7:00000003 r6:00000004 r5:76f73f30 r4:0000000f [ 1148.531273][T11587] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1148.531318][T11587] Exception stack(0xdfd1dfa8 to 0xdfd1dff0) [ 1148.531356][T11587] dfa0: 0000000f 76f73f30 00000004 76f73f30 0000000f 00000000 [ 1148.531390][T11587] dfc0: 0000000f 76f73f30 00000004 00000003 002e0000 00000000 00006364 76f740bc [ 1148.531417][T11587] dfe0: 00000158 76f73ed0 000d80b8 00130154 [ 1148.786408][ T31] audit: type=1400 audit(1148.720:584): avc: denied { read } for pid=11588 comm="syz.0.2364" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1148.787598][ T31] audit: type=1400 audit(1148.720:585): avc: denied { open } for pid=11588 comm="syz.0.2364" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1149.070300][ T31] audit: type=1400 audit(1149.000:586): avc: denied { create } for pid=11590 comm="syz.0.2365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1149.325248][ T1803] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 1149.475304][ T1803] usb 1-1: Using ep0 maxpacket: 16 [ 1149.495826][ T1803] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1149.496112][ T1803] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1149.496411][ T1803] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1149.526165][ T1803] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1149.526415][ T1803] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1149.526690][ T1803] usb 1-1: Product: syz [ 1149.526842][ T1803] usb 1-1: Manufacturer: syz [ 1149.526923][ T1803] usb 1-1: SerialNumber: syz [ 1150.597829][ T31] audit: type=1400 audit(1150.530:587): avc: denied { map } for pid=11584 comm="syz.1.2362" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1150.598180][ T31] audit: type=1400 audit(1150.530:588): avc: denied { execute } for pid=11584 comm="syz.1.2362" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1152.995381][ T1803] usb 1-1: 0:2 : does not exist [ 1153.019294][ T1803] usb 1-1: USB disconnect, device number 33 [ 1156.556961][T11595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=11595 comm=syz.0.2366 [ 1156.771215][ T31] audit: type=1400 audit(1156.700:589): avc: denied { execute } for pid=11598 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1156.777357][ T31] audit: type=1400 audit(1156.700:590): avc: denied { execute_no_trans } for pid=11598 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1156.812985][ T31] audit: type=1400 audit(1156.740:591): avc: denied { mounton } for pid=11600 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1157.081402][ T8092] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1157.152403][ T8092] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1157.212630][ T8092] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1157.296394][ T8092] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1157.521149][ T8092] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1157.530044][ T8092] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1157.536728][ T8092] bond0 (unregistering): Released all slaves [ 1157.601982][ T8092] hsr_slave_0: left promiscuous mode [ 1157.603873][ T8092] hsr_slave_1: left promiscuous mode [ 1157.611712][ T8092] veth1_macvtap: left promiscuous mode [ 1157.616410][ T8092] veth0_macvtap: left promiscuous mode [ 1157.616702][ T8092] veth1_vlan: left promiscuous mode [ 1157.616871][ T8092] veth0_vlan: left promiscuous mode [ 1158.330163][ T31] audit: type=1400 audit(1158.260:592): avc: denied { write } for pid=11614 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1158.330573][ T31] audit: type=1400 audit(1158.260:593): avc: denied { open } for pid=11614 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1158.577127][ T31] audit: type=1400 audit(1158.510:594): avc: denied { search } for pid=11617 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1158.579638][ T31] audit: type=1400 audit(1158.510:595): avc: denied { search } for pid=11617 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1158.585717][ T31] audit: type=1400 audit(1158.510:596): avc: denied { search } for pid=11617 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1158.586367][ T31] audit: type=1400 audit(1158.510:597): avc: denied { search } for pid=11617 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1158.617631][ T31] audit: type=1400 audit(1158.550:598): avc: denied { read open } for pid=11619 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1159.221199][T11629] FAULT_INJECTION: forcing a failure. [ 1159.221199][T11629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1159.221410][T11629] CPU: 1 UID: 0 PID: 11629 Comm: syz.1.2368 Not tainted syzkaller #0 PREEMPT [ 1159.221461][T11629] Hardware name: ARM-Versatile Express [ 1159.221475][T11629] Call trace: [ 1159.221496][T11629] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1159.221556][T11629] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1159.221566][T11629] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1159.221594][T11629] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1159.221624][T11629] r5:841f8000 r4:8294f190 [ 1159.221633][T11629] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1159.221674][T11629] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1159.221710][T11629] r8:76fd4f30 r7:00000000 r6:00000000 r5:dfcc9f68 r4:00000002 [ 1159.221719][T11629] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1159.221775][T11629] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1159.222158][T11629] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1159.222203][T11629] r10:00000001 r9:8060860c r8:00000002 r7:dfcc9f68 r6:0000000f r5:76fd4f30 [ 1159.222269][T11629] r4:841f8000 r3:dfcc9e9f [ 1159.222573][T11629] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1159.222855][T11629] r8:76fd4f30 r7:dfcc9f68 r6:841f8000 r5:0000000f r4:85ae8cc0 [ 1159.222869][T11629] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1159.223484][T11629] r10:00000003 r9:841f8000 r8:8020029c r7:00000000 r6:00000000 r5:85ae8cc0 [ 1159.223605][T11629] r4:85ae8cc3 [ 1159.223651][T11629] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1159.223703][T11629] r7:00000003 r6:00000004 r5:76fd4f30 r4:0000000f [ 1159.223712][T11629] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1159.223872][T11629] Exception stack(0xdfcc9fa8 to 0xdfcc9ff0) [ 1159.224443][T11629] 9fa0: 0000000f 76fd4f30 00000004 76fd4f30 0000000f 00000000 [ 1159.224663][T11629] 9fc0: 0000000f 76fd4f30 00000004 00000003 002e0000 00000000 00006364 76fd50bc [ 1159.224801][T11629] 9fe0: 00000158 76fd4ed0 000d80b8 00130154 [ 1159.633018][T11600] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1159.647156][T11600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1160.523828][T11600] hsr_slave_0: entered promiscuous mode [ 1160.528079][T11600] hsr_slave_1: entered promiscuous mode [ 1160.922016][T11600] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1160.929480][T11600] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1160.940269][T11600] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1160.953137][T11600] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1161.876513][T11600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1164.535825][ T3812] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 1164.721683][ T3812] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 1164.722140][ T3812] usb 2-1: config 1 has no interface number 0 [ 1164.722479][ T3812] usb 2-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 1164.722683][ T3812] usb 2-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 1164.722867][ T3812] usb 2-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1164.741051][ T3812] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 1164.741343][ T3812] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1164.741513][ T3812] usb 2-1: Product: syz [ 1164.741661][ T3812] usb 2-1: Manufacturer: syz [ 1164.741808][ T3812] usb 2-1: SerialNumber: syz [ 1164.760636][T11716] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1164.978472][T11716] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1165.021254][ T3812] sierra_net 2-1:1.7 wwan0: register 'sierra_net' at usb-dummy_hcd.1-1, Sierra Wireless USB-to-WWAN Modem, 00:00:00:00:01:07 [ 1165.112101][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1165.112604][ T31] audit: type=1400 audit(1165.040:613): avc: denied { write } for pid=11715 comm="syz.1.2375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1165.141742][ T31] audit: type=1400 audit(1165.060:614): avc: denied { lock } for pid=11715 comm="syz.1.2375" path="socket:[30075]" dev="sockfs" ino=30075 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1165.211795][ T3812] sierra_net 2-1:1.7 wwan0: Submit SYNC failed -71 [ 1165.226938][ T3812] sierra_net 2-1:1.7 wwan0: Send SYNC failed, status -71 [ 1165.244116][ T3812] sierra_net 2-1:1.7 wwan0: Submit SYNC failed -71 [ 1165.266258][ T3812] sierra_net 2-1:1.7 wwan0: Send SYNC failed, status -71 [ 1165.317032][ T3812] usb 2-1: USB disconnect, device number 35 [ 1165.320479][ T3812] sierra_net 2-1:1.7 wwan0: unregister 'sierra_net' usb-dummy_hcd.1-1, Sierra Wireless USB-to-WWAN Modem [ 1165.376743][ T3812] sierra_net 2-1:1.7 wwan0 (unregistered): usb_control_msg failed, status -19 [ 1165.802870][T11600] veth0_vlan: entered promiscuous mode [ 1165.842103][T11600] veth1_vlan: entered promiscuous mode [ 1165.921679][T11600] veth0_macvtap: entered promiscuous mode [ 1165.932437][T11600] veth1_macvtap: entered promiscuous mode [ 1166.009589][T11599] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1166.009917][T11599] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1166.010071][T11599] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1166.010151][T11599] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1166.112242][ T31] audit: type=1400 audit(1166.040:615): avc: denied { mounton } for pid=11600 comm="syz-executor" path="/syzkaller.fjQnFq/syz-tmp" dev="vda" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1166.115415][ T31] audit: type=1400 audit(1166.040:616): avc: denied { mount } for pid=11600 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1166.129322][ T31] audit: type=1400 audit(1166.060:617): avc: denied { mount } for pid=11600 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1166.131668][ T31] audit: type=1400 audit(1166.060:618): avc: denied { mounton } for pid=11600 comm="syz-executor" path="/syzkaller.fjQnFq/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1166.133235][ T31] audit: type=1400 audit(1166.060:619): avc: denied { mounton } for pid=11600 comm="syz-executor" path="/syzkaller.fjQnFq/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=30180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1166.140275][ T31] audit: type=1400 audit(1166.070:620): avc: denied { unmount } for pid=11600 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1166.143987][ T31] audit: type=1400 audit(1166.070:621): avc: denied { mounton } for pid=11600 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1166.149542][ T31] audit: type=1400 audit(1166.080:622): avc: denied { mount } for pid=11600 comm="syz-executor" name="/" dev="gadgetfs" ino=996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1166.438708][ T1803] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 1166.639908][ T1803] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1166.640207][ T1803] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1023 [ 1166.710208][ T1803] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1166.710510][ T1803] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1166.710738][ T1803] usb 2-1: Product: syz [ 1166.710902][ T1803] usb 2-1: Manufacturer: 嶪ꆿ੘⸊爞婵ꤾ必ꐝ렠䙥率㛨珯뼰׉㠣烙顰餯┽⑱䴽࿪ሶ쿲덴謨羆ﻷ㋨␝䴬 ≟땪ᡑ㉝츰塧픈ޯ팀ᠦ엿飃進藶꒱䑣Ⲯ胆⛅婑䧠涒ₗ鎍連劸鯨樲Ⓨↆ鑌䛄썧ᨔ햣䂍鿮郫븓꒬⯻⎟㝸篡㹏³٣㺝쎪㜫늒橶 [ 1166.711062][ T1803] usb 2-1: SerialNumber: syz [ 1166.950688][ T1803] cdc_ncm 2-1:1.0: bind() failure [ 1166.953155][ T1803] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 1166.953338][ T1803] cdc_ncm 2-1:1.1: bind() failure [ 1166.958471][ T1803] usb 2-1: USB disconnect, device number 36 [ 1167.800212][T11795] FAULT_INJECTION: forcing a failure. [ 1167.800212][T11795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1167.801760][T11795] CPU: 0 UID: 0 PID: 11795 Comm: syz.1.2391 Not tainted syzkaller #0 PREEMPT [ 1167.801874][T11795] Hardware name: ARM-Versatile Express [ 1167.801901][T11795] Call trace: [ 1167.801942][T11795] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1167.802061][T11795] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1167.802082][T11795] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1167.802141][T11795] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1167.802205][T11795] r5:84159800 r4:8294f190 [ 1167.802222][T11795] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1167.802286][T11795] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1167.802362][T11795] r8:8020029c r7:00000000 r6:82466858 r5:20000000 r4:20000000 [ 1167.802380][T11795] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1167.802437][T11795] [<80972940>] (should_fail_usercopy) from [<80978a28>] (strncpy_from_user+0x20/0x1a0) [ 1167.802492][T11795] [<80978a08>] (strncpy_from_user) from [<80562c50>] (getname_flags.part.0+0x44/0x18c) [ 1167.802571][T11795] r10:00000142 r9:84159800 r8:8020029c r7:00000000 r6:82466858 r5:20000000 [ 1167.802593][T11795] r4:83223000 [ 1167.802610][T11795] [<80562c0c>] (getname_flags.part.0) from [<80567bd0>] (getname_flags+0x3c/0x50) [ 1167.802698][T11795] r9:84159800 r8:8020029c r7:ffffff9c r6:e02a5f58 r5:00000000 r4:20000000 [ 1167.802717][T11795] [<80567b94>] (getname_flags) from [<8055042c>] (do_sys_openat2+0x60/0xe0) [ 1167.802779][T11795] r5:20000000 r4:00000000 [ 1167.802796][T11795] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1167.802863][T11795] r7:00000142 r6:00130230 r5:20000000 r4:ffffff9c [ 1167.802881][T11795] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1167.802933][T11795] Exception stack(0xe02a5fa8 to 0xe02a5ff0) [ 1167.802975][T11795] 5fa0: 00000000 00000000 ffffff9c 20000000 00000002 00000000 [ 1167.803018][T11795] 5fc0: 00000000 00000000 00130230 00000142 002e0000 00000000 00006364 76fd50bc [ 1167.803050][T11795] 5fe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1167.803078][T11795] r5:00000000 r4:00000000 [ 1168.102331][T11807] FAULT_INJECTION: forcing a failure. [ 1168.102331][T11807] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.102604][T11807] CPU: 1 UID: 0 PID: 11807 Comm: syz.0.2394 Not tainted syzkaller #0 PREEMPT [ 1168.102681][T11807] Hardware name: ARM-Versatile Express [ 1168.102699][T11807] Call trace: [ 1168.102733][T11807] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1168.102795][T11807] r7:8415e000 r6:00000000 r5:60000013 r4:8226064c [ 1168.102805][T11807] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1168.102835][T11807] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1168.102865][T11807] r5:8415e000 r4:82917c00 [ 1168.102874][T11807] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1168.102906][T11807] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1168.102949][T11807] r8:00000000 r7:8415e000 r6:00000cc0 r5:ffffffff r4:832cb240 [ 1168.102958][T11807] [<8051f2a4>] (should_failslab) from [<805032b4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1168.102987][T11807] [<80503264>] (kmem_cache_alloc_node_noprof) from [<815518cc>] (__alloc_skb+0x138/0x160) [ 1168.103032][T11807] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:832cb240 r5:ffffffff [ 1168.103043][T11807] r4:828060c0 [ 1168.103051][T11807] [<81551794>] (__alloc_skb) from [<816711ec>] (netlink_alloc_large_skb+0x88/0xa0) [ 1168.103091][T11807] r8:00000000 r7:8585b400 r6:00000014 r5:8344ac80 r4:00000140 [ 1168.103153][T11807] [<81671164>] (netlink_alloc_large_skb) from [<81671934>] (netlink_sendmsg+0x134/0x444) [ 1168.103204][T11807] r5:8344ac80 r4:e02bdf20 [ 1168.103268][T11807] [<81671800>] (netlink_sendmsg) from [<81543640>] (__sock_sendmsg+0x44/0x78) [ 1168.103339][T11807] r10:00000000 r9:e02bddc4 r8:e02bddc4 r7:00000000 r6:8344ac80 r5:e02bdf20 [ 1168.103409][T11807] r4:00000000 [ 1168.103471][T11807] [<815435fc>] (__sock_sendmsg) from [<81544994>] (____sys_sendmsg+0x298/0x2cc) [ 1168.103547][T11807] r7:00000000 r6:8344ac80 r5:00040810 r4:e02bdf20 [ 1168.103690][T11807] [<815446fc>] (____sys_sendmsg) from [<8154695c>] (___sys_sendmsg+0x9c/0xd0) [ 1168.103756][T11807] r10:e02bde24 r9:20002a80 r8:00040810 r7:00000000 r6:8344ac80 r5:e02bdf20 [ 1168.103769][T11807] r4:00000000 [ 1168.103822][T11807] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1168.103897][T11807] r10:00000128 r9:8415e000 r8:85707300 r7:00040810 r6:20002a80 r5:85707301 [ 1168.103944][T11807] r4:00000004 [ 1168.103956][T11807] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1168.103990][T11807] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1168.103998][T11807] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1168.104086][T11807] Exception stack(0xe02bdfa8 to 0xe02bdff0) [ 1168.104165][T11807] dfa0: 00000000 00000000 00000004 20002a80 00040810 00000000 [ 1168.104213][T11807] dfc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f410bc [ 1168.104241][T11807] dfe0: 76f40ec0 76f40eb0 0001946c 00132280 [ 1172.235248][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1172.235578][ T31] audit: type=1400 audit(1172.160:628): avc: denied { bind } for pid=11824 comm="syz.0.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1173.245822][ T31] audit: type=1400 audit(1173.180:629): avc: denied { getopt } for pid=11837 comm="syz.0.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1174.050306][ T31] audit: type=1400 audit(1173.980:630): avc: denied { map } for pid=11845 comm="syz.0.2406" path="socket:[30353]" dev="sockfs" ino=30353 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1174.051957][ T31] audit: type=1400 audit(1173.980:631): avc: denied { accept } for pid=11845 comm="syz.0.2406" path="socket:[30353]" dev="sockfs" ino=30353 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1175.430381][ T31] audit: type=1400 audit(1175.360:632): avc: denied { read } for pid=11855 comm="syz.1.2408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1177.658761][T11878] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11878 comm=syz.1.2416 [ 1177.664217][ T31] audit: type=1400 audit(1177.590:633): avc: denied { map_create } for pid=11877 comm="syz.1.2416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1177.686991][ T31] audit: type=1400 audit(1177.620:634): avc: denied { read } for pid=11877 comm="syz.1.2416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1177.698075][ T31] audit: type=1400 audit(1177.630:635): avc: denied { prog_run } for pid=11877 comm="syz.1.2416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1177.926436][T11882] dummy0: entered allmulticast mode [ 1179.085584][ T1803] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 1179.296078][ T1803] usb 2-1: Using ep0 maxpacket: 32 [ 1179.422708][ T1803] usb 2-1: config 1 interface 0 has no altsetting 0 [ 1179.511418][ T1803] usb 2-1: New USB device found, idVendor=1e71, idProduct=200e, bcdDevice= 0.40 [ 1179.511584][ T1803] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1179.511733][ T1803] usb 2-1: Product: 젎乓㔧촐뵧꤃仪ꨝ⧮韑젿धḰ넒夾⧳ẩڈ䴡컲Ɜ챣쉧⎿ﶲ쓑秄꘬첫❠渺ﲼ༘虍ꊩ웇蔴⛽♡㇙Ꞟ啄쟔ᾗ䀹ヌ윪ಗ클৥ᐦ鐱峟䓄뙢ၮㆁ略햁倵훱傃۾턕陛햯獤믲킽峆윕ᆱ蚠繄ⶆ篯汣땚㫺䣙鴖菉ศﰂ૮侗㎂⇲偺ᒽ歷싂ꍻ懀丱弮볲療볜♥ⓓᰳ꬏뉡 [ 1179.511867][ T1803] usb 2-1: SerialNumber: ࠒ [ 1179.813211][ T31] audit: type=1400 audit(1179.740:636): avc: denied { listen } for pid=11883 comm="syz.1.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1179.851057][T11885] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1179.853621][T11885] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1179.921396][ T31] audit: type=1400 audit(1179.810:637): avc: denied { connect } for pid=11883 comm="syz.1.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1184.681134][ T1803] usbhid 2-1:1.0: can't add hid device: -32 [ 1184.682655][ T1803] usbhid 2-1:1.0: probe with driver usbhid failed with error -32 [ 1188.229209][T11894] FAULT_INJECTION: forcing a failure. [ 1188.229209][T11894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1188.229576][T11894] CPU: 1 UID: 0 PID: 11894 Comm: syz.0.2423 Not tainted syzkaller #0 PREEMPT [ 1188.229654][T11894] Hardware name: ARM-Versatile Express [ 1188.229703][T11894] Call trace: [ 1188.229803][T11894] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1188.229930][T11894] r7:e02f1e20 r6:00000000 r5:60000013 r4:8226064c [ 1188.229951][T11894] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1188.230004][T11894] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1188.230060][T11894] r5:84158c00 r4:8294f190 [ 1188.230092][T11894] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1188.230162][T11894] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1188.230253][T11894] r8:00000000 r7:e02f1e20 r6:20000000 r5:00000000 r4:e02f1f20 [ 1188.230275][T11894] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1188.230332][T11894] [<80972940>] (should_fail_usercopy) from [<815467e0>] (copy_msghdr_from_user+0x50/0x130) [ 1188.230395][T11894] [<81546790>] (copy_msghdr_from_user) from [<81546938>] (___sys_sendmsg+0x78/0xd0) [ 1188.230482][T11894] r8:00000000 r7:00000000 r6:85134780 r5:e02f1f20 r4:e02f1e64 [ 1188.230512][T11894] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1188.230578][T11894] r10:00000128 r9:84158c00 r8:84a096c0 r7:00000000 r6:20000000 r5:84a096c1 [ 1188.230601][T11894] r4:00000004 [ 1188.230616][T11894] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1188.230679][T11894] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1188.230696][T11894] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1188.230739][T11894] Exception stack(0xe02f1fa8 to 0xe02f1ff0) [ 1188.230777][T11894] 1fa0: 00000000 00000000 00000004 20000000 00000000 00000000 [ 1188.230812][T11894] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f410bc [ 1188.230842][T11894] 1fe0: 76f40ec0 76f40eb0 0001946c 00132280 [ 1188.376723][T11896] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11896 comm=syz.0.2424 [ 1188.891006][T11904] FAULT_INJECTION: forcing a failure. [ 1188.891006][T11904] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.893606][T11904] CPU: 0 UID: 0 PID: 11904 Comm: syz.0.2427 Not tainted syzkaller #0 PREEMPT [ 1188.893726][T11904] Hardware name: ARM-Versatile Express [ 1188.893752][T11904] Call trace: [ 1188.893790][T11904] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1188.893898][T11904] r7:00000d40 r6:00000000 r5:60000013 r4:8226064c [ 1188.893921][T11904] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1188.893979][T11904] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1188.894039][T11904] r5:84c15400 r4:82917c00 [ 1188.894058][T11904] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1188.894120][T11904] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1188.894192][T11904] r8:84c15400 r7:00000d40 r6:857073e8 r5:0000001c r4:83001240 [ 1188.894211][T11904] [<8051f2a4>] (should_failslab) from [<80503ca4>] (__kmalloc_noprof+0x9c/0x458) [ 1188.894261][T11904] [<80503c08>] (__kmalloc_noprof) from [<807c35d4>] (tomoyo_encode2+0x64/0xf0) [ 1188.894332][T11904] r10:00000fff r9:8309e400 r8:00000000 r7:8341e880 r6:857073e8 r5:84c19ffc [ 1188.894359][T11904] r4:84c19feb [ 1188.894377][T11904] [<807c3570>] (tomoyo_encode2) from [<807c3684>] (tomoyo_encode+0x24/0x30) [ 1188.894448][T11904] r9:8309e400 r8:00000000 r7:8341e880 r6:857073e8 r5:00001000 r4:84c19fec [ 1188.894466][T11904] [<807c3660>] (tomoyo_encode) from [<807c3710>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1188.894523][T11904] r5:00001000 r4:84c19000 [ 1188.894539][T11904] [<807c3690>] (tomoyo_realpath_from_path) from [<807bf810>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1188.894673][T11904] r10:84c15400 r9:00000000 r8:857073c0 r7:80081280 r6:00000004 r5:81cd6504 [ 1188.894700][T11904] r4:857073e8 r3:826c0200 [ 1188.894730][T11904] [<807bf744>] (tomoyo_path_number_perm) from [<807c40f0>] (tomoyo_file_ioctl+0x1c/0x20) [ 1188.894814][T11904] r9:00000003 r8:857073c0 r7:20000380 r6:20000380 r5:80081280 r4:857073c0 [ 1188.894837][T11904] [<807c40d4>] (tomoyo_file_ioctl) from [<80770944>] (security_file_ioctl+0x64/0x1e4) [ 1188.894899][T11904] [<807708e0>] (security_file_ioctl) from [<8056cd94>] (sys_ioctl+0x4c/0xba0) [ 1188.894964][T11904] r7:20000380 r6:857073c1 r5:00000000 r4:80081280 [ 1188.894982][T11904] [<8056cd48>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1188.895035][T11904] Exception stack(0xdfd89fa8 to 0xdfd89ff0) [ 1188.895074][T11904] 9fa0: 00000000 00000000 00000003 80081280 20000380 00000000 [ 1188.895141][T11904] 9fc0: 00000000 00000000 00130230 00000036 002e0000 00000000 00006364 76f410bc [ 1188.895211][T11904] 9fe0: 76f40ec0 76f40eb0 0001946c 00132280 [ 1188.895255][T11904] r10:00000036 r9:84c15400 r8:8020029c r7:00000036 r6:00130230 r5:00000000 [ 1188.895275][T11904] r4:00000000 [ 1188.930100][T11904] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1189.935780][ T96] usb 2-1: USB disconnect, device number 37 [ 1190.305556][T11909] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pid=11909 comm=syz.1.2429 [ 1190.321379][ T31] audit: type=1400 audit(1190.250:638): avc: denied { setattr } for pid=11912 comm="syz.0.2430" name="KCM" dev="sockfs" ino=30513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1190.417234][ T31] audit: type=1400 audit(1190.350:639): avc: denied { accept } for pid=11912 comm="syz.0.2430" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1190.430048][ T31] audit: type=1400 audit(1190.360:640): avc: denied { setopt } for pid=11912 comm="syz.0.2430" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1190.598617][T11918] FAULT_INJECTION: forcing a failure. [ 1190.598617][T11918] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.600101][T11918] CPU: 0 UID: 0 PID: 11918 Comm: syz.1.2432 Not tainted syzkaller #0 PREEMPT [ 1190.600220][T11918] Hardware name: ARM-Versatile Express [ 1190.600246][T11918] Call trace: [ 1190.600286][T11918] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1190.600392][T11918] r7:8415d400 r6:00000000 r5:60000013 r4:8226064c [ 1190.600414][T11918] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1190.600472][T11918] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1190.600536][T11918] r5:8415d400 r4:82917c00 [ 1190.600555][T11918] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1190.600624][T11918] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1190.600708][T11918] r8:00000000 r7:8415d400 r6:00400dc0 r5:854ba680 r4:830020c0 [ 1190.600727][T11918] [<8051f2a4>] (should_failslab) from [<80502cd4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 1190.600782][T11918] [<80502c88>] (__kmalloc_cache_noprof) from [<8073a774>] (fuse_file_alloc+0x30/0xec) [ 1190.600865][T11918] r10:85707300 r9:00000000 r8:84a4bc00 r7:00000001 r6:824666d0 r5:854ba680 [ 1190.600892][T11918] r4:854ba680 [ 1190.600912][T11918] [<8073a744>] (fuse_file_alloc) from [<8073a90c>] (fuse_file_open+0xb8/0x230) [ 1190.600992][T11918] r9:00000000 r8:84a4bc00 r7:00000000 r6:00000000 r5:00000001 r4:854ba680 [ 1190.601013][T11918] [<8073a854>] (fuse_file_open) from [<8073abe0>] (fuse_open+0x84/0x2fc) [ 1190.601079][T11918] r10:85707300 r9:854ba680 r8:00000000 r7:85707300 r6:00000000 r5:00000000 [ 1190.601100][T11918] r4:8504a000 [ 1190.601119][T11918] [<8073ab5c>] (fuse_open) from [<8054e194>] (do_dentry_open+0x2c0/0x4d0) [ 1190.601199][T11918] r10:85707300 r9:00000000 r8:85707328 r7:8073ab5c r6:8504a000 r5:00000000 [ 1190.601221][T11918] r4:85707300 [ 1190.601238][T11918] [<8054ded4>] (do_dentry_open) from [<8054fefc>] (vfs_open+0x2c/0xe8) [ 1190.601306][T11918] r9:00000000 r8:df91de58 r7:00000000 r6:85707328 r5:8291edac r4:85707300 [ 1190.601325][T11918] [<8054fed0>] (vfs_open) from [<805689e8>] (path_openat+0x30c/0x1150) [ 1190.601383][T11918] r6:df91df20 r5:8291edac r4:00000000 [ 1190.601401][T11918] [<805686dc>] (path_openat) from [<805698d8>] (do_filp_open+0xac/0x148) [ 1190.601465][T11918] r10:00000142 r9:83226000 r8:00000001 r7:df91de58 r6:df91df20 r5:8415d400 [ 1190.601486][T11918] r4:ffffff9c [ 1190.601503][T11918] [<8056982c>] (do_filp_open) from [<8055045c>] (do_sys_openat2+0x90/0xe0) [ 1190.601572][T11918] r9:8415d400 r8:8020029c r7:ffffff9c r6:df91df58 r5:83226000 r4:00000006 [ 1190.601593][T11918] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1190.601661][T11918] r7:00000142 r6:00130230 r5:20000000 r4:ffffff9c [ 1190.601689][T11918] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1190.601741][T11918] Exception stack(0xdf91dfa8 to 0xdf91dff0) [ 1190.601782][T11918] dfa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 1190.601821][T11918] dfc0: 00000000 00000000 00130230 00000142 002e0000 00000000 00006364 76fd50bc [ 1190.601850][T11918] dfe0: 76fd4ec0 76fd4eb0 0001946c 00132280 [ 1190.601879][T11918] r5:00000000 r4:00000000 [ 1191.286932][ T31] audit: type=1400 audit(1191.210:641): avc: denied { listen } for pid=11931 comm="syz.1.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1191.509475][T11755] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.590762][T11755] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.666890][T11755] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.737288][T11755] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1192.039616][T11755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1192.042837][T11755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1192.047220][T11755] bond0 (unregistering): Released all slaves [ 1192.120201][T11755] hsr_slave_0: left promiscuous mode [ 1192.136028][T11755] hsr_slave_1: left promiscuous mode [ 1192.148206][T11755] veth1_macvtap: left promiscuous mode [ 1192.149143][T11755] veth0_macvtap: left promiscuous mode [ 1192.152222][T11755] veth1_vlan: left promiscuous mode [ 1192.153930][T11755] veth0_vlan: left promiscuous mode [ 1192.340576][T11947] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11947 comm=syz.0.2440 [ 1192.432587][T11755] dummy0 (unregistering): left allmulticast mode [ 1192.640521][ T31] audit: type=1400 audit(1192.560:642): avc: denied { connect } for pid=11951 comm="syz.0.2442" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1193.700089][T11935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1193.716837][T11935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1194.667692][T11935] hsr_slave_0: entered promiscuous mode [ 1194.669965][T11935] hsr_slave_1: entered promiscuous mode [ 1194.674172][T11935] debugfs: 'hsr0' already exists in 'hsr' [ 1194.677638][T11935] Cannot create hsr debugfs directory [ 1195.379704][T11935] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1195.389765][T11935] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1195.398789][T11935] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1195.407817][T11935] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1196.374288][T11935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1199.391335][T11935] veth0_vlan: entered promiscuous mode [ 1199.427577][T11935] veth1_vlan: entered promiscuous mode [ 1199.533950][T11935] veth0_macvtap: entered promiscuous mode [ 1199.550320][T11935] veth1_macvtap: entered promiscuous mode [ 1199.662743][T11755] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1199.663305][T11755] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1199.663417][T11755] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1199.663494][T11755] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1203.079722][ T31] audit: type=1400 audit(1203.010:643): avc: denied { accept } for pid=12091 comm="syz.1.2448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1203.393432][T12102] FAULT_INJECTION: forcing a failure. [ 1203.393432][T12102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1203.396858][T12102] CPU: 0 UID: 0 PID: 12102 Comm: syz.1.2452 Not tainted syzkaller #0 PREEMPT [ 1203.397005][T12102] Hardware name: ARM-Versatile Express [ 1203.397033][T12102] Call trace: [ 1203.397072][T12102] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1203.397194][T12102] r7:20000bc0 r6:00000000 r5:60000013 r4:8226064c [ 1203.397214][T12102] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1203.397274][T12102] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1203.397336][T12102] r5:83b50000 r4:8294f190 [ 1203.397352][T12102] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1203.397418][T12102] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1203.397490][T12102] r8:00000014 r7:20000bc0 r6:dfab9de8 r5:00000014 r4:00000014 [ 1203.397508][T12102] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1203.397562][T12102] [<80972940>] (should_fail_usercopy) from [<8184879c>] (copy_from_sockptr_offset.constprop.0+0x5c/0x11c) [ 1203.397632][T12102] [<81848740>] (copy_from_sockptr_offset.constprop.0) from [<81849ae8>] (do_ipv6_setsockopt+0xbc4/0x1270) [ 1203.397703][T12102] r8:00000014 r7:dfab9de8 r6:00000000 r5:00000032 r4:83d1fc00 [ 1203.397722][T12102] [<81848f28>] (do_ipv6_setsockopt) from [<8184a1f4>] (ipv6_setsockopt+0x60/0xbc) [ 1203.397923][T12102] r10:00000126 r9:83b50000 r8:00000014 r7:83d1fc00 r6:00000014 r5:00000032 [ 1203.397947][T12102] r4:83d1fc00 [ 1203.397966][T12102] [<8184a198>] (ipv6_setsockopt) from [<81855a5c>] (rawv6_setsockopt+0x6c/0x1dc) [ 1203.398031][T12102] r6:00000032 r5:00000029 r4:00000029 [ 1203.398048][T12102] [<818559f4>] (rawv6_setsockopt) from [<815477c8>] (sock_common_setsockopt+0x38/0x40) [ 1203.398114][T12102] r7:8349c000 r6:00000032 r5:00000029 r4:818559f0 [ 1203.398132][T12102] [<81547794>] (sock_common_setsockopt) from [<81542e68>] (do_sock_setsockopt+0x70/0xc8) [ 1203.398186][T12102] r4:81547790 [ 1203.398203][T12102] [<81542df8>] (do_sock_setsockopt) from [<81546420>] (__sys_setsockopt+0x7c/0xc4) [ 1203.398265][T12102] r8:00000000 r7:858fab40 r6:858fab41 r5:00000032 r4:00000029 [ 1203.398284][T12102] [<815463a4>] (__sys_setsockopt) from [<81546484>] (sys_setsockopt+0x1c/0x24) [ 1203.398348][T12102] r8:8020029c r7:00000126 r6:00130230 r5:00000000 r4:00000014 [ 1203.398370][T12102] [<81546468>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1203.398425][T12102] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 1203.398465][T12102] 9fa0: 00000014 00000000 00000003 00000029 00000032 20000bc0 [ 1203.398503][T12102] 9fc0: 00000014 00000000 00130230 00000126 002e0000 00000000 00006364 76fc40bc [ 1203.398533][T12102] 9fe0: 76fc3ec0 76fc3eb0 0001946c 00132280 [ 1204.503046][T12121] FAULT_INJECTION: forcing a failure. [ 1204.503046][T12121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1204.503256][T12121] CPU: 1 UID: 0 PID: 12121 Comm: syz.0.2456 Not tainted syzkaller #0 PREEMPT [ 1204.503307][T12121] Hardware name: ARM-Versatile Express [ 1204.503321][T12121] Call trace: [ 1204.503342][T12121] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1204.503420][T12121] r7:20000080 r6:00000000 r5:60000013 r4:8226064c [ 1204.503439][T12121] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1204.503494][T12121] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1204.503528][T12121] r5:84c0e000 r4:8294f190 [ 1204.503536][T12121] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1204.503569][T12121] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1204.503605][T12121] r8:00000000 r7:20000080 r6:8412e6c0 r5:00000000 r4:dfaa1f20 [ 1204.503614][T12121] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1204.503643][T12121] [<80972940>] (should_fail_usercopy) from [<808b6278>] (_copy_from_iter+0x6c/0x7d8) [ 1204.503700][T12121] [<808b620c>] (_copy_from_iter) from [<8167198c>] (netlink_sendmsg+0x18c/0x444) [ 1204.503774][T12121] r10:00000000 r9:00000000 r8:dfaa1f30 r7:8493f800 r6:00000014 r5:84ef0b40 [ 1204.503795][T12121] r4:dfaa1f20 [ 1204.503980][T12121] [<81671800>] (netlink_sendmsg) from [<81543640>] (__sock_sendmsg+0x44/0x78) [ 1204.504290][T12121] r10:00000000 r9:dfaa1dc4 r8:dfaa1dc4 r7:00000000 r6:83476c80 r5:dfaa1f20 [ 1204.504320][T12121] r4:00000000 [ 1204.504533][T12121] [<815435fc>] (__sock_sendmsg) from [<81544994>] (____sys_sendmsg+0x298/0x2cc) [ 1204.504972][T12121] r7:00000000 r6:83476c80 r5:00000800 r4:dfaa1f20 [ 1204.505023][T12121] [<815446fc>] (____sys_sendmsg) from [<8154695c>] (___sys_sendmsg+0x9c/0xd0) [ 1204.505095][T12121] r10:dfaa1e24 r9:20000100 r8:00000800 r7:00000000 r6:83476c80 r5:dfaa1f20 [ 1204.505111][T12121] r4:00000000 [ 1204.505119][T12121] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1204.505154][T12121] r10:00000128 r9:84c0e000 r8:85b010c0 r7:00000800 r6:20000100 r5:85b010c1 [ 1204.505163][T12121] r4:00000004 [ 1204.505171][T12121] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1204.505203][T12121] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1204.505212][T12121] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1204.505237][T12121] Exception stack(0xdfaa1fa8 to 0xdfaa1ff0) [ 1204.505259][T12121] 1fa0: 00000000 00000000 00000004 20000100 00000800 00000000 [ 1204.505277][T12121] 1fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76f410bc [ 1204.505362][T12121] 1fe0: 76f40ec0 76f40eb0 0001946c 00132280 [ 1207.122143][ T31] audit: type=1400 audit(1207.050:644): avc: denied { create } for pid=12168 comm="syz.1.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1207.126672][ T31] audit: type=1400 audit(1207.060:645): avc: denied { read } for pid=12168 comm="syz.1.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1207.144195][ T31] audit: type=1400 audit(1207.070:646): avc: denied { create } for pid=12168 comm="syz.1.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1207.316550][T12169] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=12169 comm=syz.1.2461 [ 1207.346030][ T31] audit: type=1400 audit(1207.280:647): avc: denied { audit_read } for pid=12168 comm="syz.1.2461" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1207.467195][ T31] audit: type=1400 audit(1207.400:648): avc: denied { shutdown } for pid=12176 comm="syz.1.2463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1207.717133][ T31] audit: type=1400 audit(1207.650:649): avc: denied { lock } for pid=12183 comm="syz.1.2467" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1207.895558][ T31] audit: type=1400 audit(1207.820:650): avc: denied { getopt } for pid=12188 comm="syz.0.2468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1211.755895][ T96] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 1211.925279][ T96] usb 2-1: Using ep0 maxpacket: 16 [ 1211.942006][ T96] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1211.942280][ T96] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1211.942581][ T96] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1211.967298][ T96] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1211.967590][ T96] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1211.967812][ T96] usb 2-1: Product: syz [ 1211.967992][ T96] usb 2-1: Manufacturer: syz [ 1211.968133][ T96] usb 2-1: SerialNumber: syz [ 1215.388170][ T96] usb 2-1: 0:2 : does not exist [ 1215.412261][ T96] usb 2-1: USB disconnect, device number 38 [ 1216.166322][ T31] audit: type=1400 audit(1216.100:651): avc: denied { write } for pid=12253 comm="syz.1.2480" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1219.521410][T12303] FAULT_INJECTION: forcing a failure. [ 1219.521410][T12303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1219.521806][T12303] CPU: 0 UID: 0 PID: 12303 Comm: syz.0.2486 Not tainted syzkaller #0 PREEMPT [ 1219.521920][T12303] Hardware name: ARM-Versatile Express [ 1219.521950][T12303] Call trace: [ 1219.522078][T12303] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1219.522211][T12303] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1219.522284][T12303] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1219.522378][T12303] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1219.522456][T12303] r5:83b56c00 r4:8294f190 [ 1219.522608][T12303] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1219.522781][T12303] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1219.522905][T12303] r8:76f40f30 r7:00000000 r6:00000000 r5:dfb6df68 r4:00000002 [ 1219.522961][T12303] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1219.523120][T12303] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1219.523244][T12303] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1219.523359][T12303] r10:00000001 r9:8060860c r8:00000002 r7:dfb6df68 r6:0000000f r5:76f40f30 [ 1219.523464][T12303] r4:83b56c00 r3:dfb6de9f [ 1219.523491][T12303] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1219.523651][T12303] r8:76f40f30 r7:dfb6df68 r6:83b56c00 r5:0000000f r4:858fa3c0 [ 1219.523736][T12303] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1219.523929][T12303] r10:00000003 r9:83b56c00 r8:8020029c r7:00000000 r6:00000000 r5:858fa3c0 [ 1219.524439][T12303] r4:858fa3c3 [ 1219.524820][T12303] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1219.524937][T12303] r7:00000003 r6:00000005 r5:76f40f30 r4:0000000f [ 1219.524961][T12303] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1219.525016][T12303] Exception stack(0xdfb6dfa8 to 0xdfb6dff0) [ 1219.525124][T12303] dfa0: 0000000f 76f40f30 00000005 76f40f30 0000000f 00000000 [ 1219.525170][T12303] dfc0: 0000000f 76f40f30 00000005 00000003 002e0000 00000000 00006364 76f410bc [ 1219.525199][T12303] dfe0: 00000158 76f40ed0 000d80b8 00130154 [ 1219.659033][T12305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12305 comm=syz.0.2488 [ 1221.245197][ T10] usb 1-1: new low-speed USB device number 34 using dummy_hcd [ 1221.430954][ T10] usb 1-1: No LPM exit latency info found, disabling LPM. [ 1221.453652][ T10] usb 1-1: config 16 has an invalid interface number: 135 but max is 0 [ 1221.454122][ T10] usb 1-1: config 16 has no interface number 0 [ 1221.454264][ T10] usb 1-1: config 16 interface 135 altsetting 253 endpoint 0xB has invalid maxpacket 64, setting to 8 [ 1221.454433][ T10] usb 1-1: config 16 interface 135 altsetting 253 endpoint 0x3 has invalid maxpacket 16, setting to 8 [ 1221.454526][ T10] usb 1-1: config 16 interface 135 altsetting 253 has a duplicate endpoint with address 0xB, skipping [ 1221.455696][ T10] usb 1-1: config 16 interface 135 altsetting 253 endpoint 0x6 has invalid maxpacket 512, setting to 8 [ 1221.455777][ T10] usb 1-1: config 16 interface 135 altsetting 253 endpoint 0xC has invalid maxpacket 1024, setting to 8 [ 1221.455824][ T10] usb 1-1: config 16 interface 135 altsetting 253 has a duplicate endpoint with address 0x3, skipping [ 1221.455895][ T10] usb 1-1: config 16 interface 135 altsetting 253 has a duplicate endpoint with address 0xB, skipping [ 1221.455996][ T10] usb 1-1: config 16 interface 135 has no altsetting 0 [ 1222.431624][T12319] FAULT_INJECTION: forcing a failure. [ 1222.431624][T12319] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.433615][T12319] CPU: 1 UID: 0 PID: 12319 Comm: syz.1.2493 Not tainted syzkaller #0 PREEMPT [ 1222.433739][T12319] Hardware name: ARM-Versatile Express [ 1222.433764][T12319] Call trace: [ 1222.433845][T12319] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1222.433972][T12319] r7:84166c00 r6:00000000 r5:60000013 r4:8226064c [ 1222.433991][T12319] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1222.434038][T12319] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1222.434113][T12319] r5:84166c00 r4:82917c00 [ 1222.434127][T12319] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1222.434203][T12319] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1222.434339][T12319] r8:00000000 r7:84166c00 r6:00000cc0 r5:8291b180 r4:830a2cc0 [ 1222.434375][T12319] [<8051f2a4>] (should_failslab) from [<80503920>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 1222.434464][T12319] [<805038d4>] (kmem_cache_alloc_noprof) from [<80555d9c>] (alloc_empty_file+0x54/0x13c) [ 1222.434555][T12319] r10:00000142 r9:838d4000 r8:82805cc0 r7:8380f780 r6:00000002 r5:8291b180 [ 1222.434575][T12319] r4:82466838 [ 1222.434589][T12319] [<80555d48>] (alloc_empty_file) from [<8056871c>] (path_openat+0x40/0x1150) [ 1222.434649][T12319] r8:dfb75e58 r7:dfb75e58 r6:dfb75f20 r5:84166c00 r4:ffffff9c [ 1222.434665][T12319] [<805686dc>] (path_openat) from [<805698d8>] (do_filp_open+0xac/0x148) [ 1222.434722][T12319] r10:00000142 r9:838d4000 r8:00000001 r7:dfb75e58 r6:dfb75f20 r5:84166c00 [ 1222.434796][T12319] r4:ffffff9c [ 1222.434811][T12319] [<8056982c>] (do_filp_open) from [<8055045c>] (do_sys_openat2+0x90/0xe0) [ 1222.434871][T12319] r9:84166c00 r8:8020029c r7:ffffff9c r6:dfb75f58 r5:838d4000 r4:00000006 [ 1222.434886][T12319] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1222.434948][T12319] r7:00000142 r6:00130230 r5:20000000 r4:ffffff9c [ 1222.434963][T12319] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1222.435034][T12319] Exception stack(0xdfb75fa8 to 0xdfb75ff0) [ 1222.435070][T12319] 5fa0: 00000000 00000000 ffffff9c 20000000 00000002 00000000 [ 1222.435101][T12319] 5fc0: 00000000 00000000 00130230 00000142 002e0000 00000000 00006364 76fc40bc [ 1222.435153][T12319] 5fe0: 76fc3ec0 76fc3eb0 0001946c 00132280 [ 1222.435184][T12319] r5:00000000 r4:00000000 [ 1223.612862][T12333] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12333 comm=syz.1.2499 [ 1223.716439][ T31] audit: type=1400 audit(1223.650:652): avc: denied { map } for pid=12334 comm="syz.1.2500" path="socket:[32445]" dev="sockfs" ino=32445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1223.718814][ T31] audit: type=1400 audit(1223.650:653): avc: denied { read } for pid=12334 comm="syz.1.2500" path="socket:[32445]" dev="sockfs" ino=32445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1223.797526][T12338] fuse: Bad value for 'group_id' [ 1223.798451][T12338] fuse: Bad value for 'group_id' [ 1229.900641][T12358] FAULT_INJECTION: forcing a failure. [ 1229.900641][T12358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1229.902094][T12358] CPU: 1 UID: 0 PID: 12358 Comm: syz.1.2507 Not tainted syzkaller #0 PREEMPT [ 1229.902200][T12358] Hardware name: ARM-Versatile Express [ 1229.902223][T12358] Call trace: [ 1229.902306][T12358] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1229.902418][T12358] r7:200003c0 r6:00000000 r5:60000013 r4:8226064c [ 1229.902462][T12358] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1229.902514][T12358] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1229.902634][T12358] r5:84160c00 r4:8294f190 [ 1229.902655][T12358] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1229.902767][T12358] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1229.902836][T12358] r8:00000000 r7:200003c0 r6:8412efc0 r5:00000000 r4:dfbd5f20 [ 1229.902852][T12358] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1229.902954][T12358] [<80972940>] (should_fail_usercopy) from [<808b6278>] (_copy_from_iter+0x6c/0x7d8) [ 1229.903048][T12358] [<808b620c>] (_copy_from_iter) from [<8167198c>] (netlink_sendmsg+0x18c/0x444) [ 1229.903127][T12358] r10:00000000 r9:00000000 r8:dfbd5f30 r7:85a48000 r6:00000020 r5:84ef0e40 [ 1229.903146][T12358] r4:dfbd5f20 [ 1229.903192][T12358] [<81671800>] (netlink_sendmsg) from [<81543640>] (__sock_sendmsg+0x44/0x78) [ 1229.903310][T12358] r10:00000000 r9:dfbd5dc4 r8:dfbd5dc4 r7:00000000 r6:85131400 r5:dfbd5f20 [ 1229.903335][T12358] r4:00000000 [ 1229.903377][T12358] [<815435fc>] (__sock_sendmsg) from [<81544994>] (____sys_sendmsg+0x298/0x2cc) [ 1229.903445][T12358] r7:00000000 r6:85131400 r5:04008004 r4:dfbd5f20 [ 1229.903459][T12358] [<815446fc>] (____sys_sendmsg) from [<8154695c>] (___sys_sendmsg+0x9c/0xd0) [ 1229.903558][T12358] r10:dfbd5e24 r9:20000440 r8:04008004 r7:00000000 r6:85131400 r5:dfbd5f20 [ 1229.903581][T12358] r4:00000000 [ 1229.903623][T12358] [<815468c0>] (___sys_sendmsg) from [<81546df4>] (__sys_sendmsg+0x8c/0xe0) [ 1229.903729][T12358] r10:00000128 r9:84160c00 r8:84a09f00 r7:04008004 r6:20000440 r5:84a09f01 [ 1229.903748][T12358] r4:00000003 [ 1229.903762][T12358] [<81546d68>] (__sys_sendmsg) from [<81546e5c>] (sys_sendmsg+0x14/0x18) [ 1229.903875][T12358] r8:8020029c r7:00000128 r6:00130230 r5:00000000 r4:00000000 [ 1229.903923][T12358] [<81546e48>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1229.903981][T12358] Exception stack(0xdfbd5fa8 to 0xdfbd5ff0) [ 1229.904048][T12358] 5fa0: 00000000 00000000 00000003 20000440 04008004 00000000 [ 1229.904082][T12358] 5fc0: 00000000 00000000 00130230 00000128 002e0000 00000000 00006364 76fc40bc [ 1229.904108][T12358] 5fe0: 76fc3ec0 76fc3eb0 0001946c 00132280 [ 1231.037200][ T10] usb 1-1: Dual-Role OTG device on HNP port [ 1231.038123][ T10] usb 1-1: can't set HNP mode: -71 [ 1231.172559][ T31] audit: type=1400 audit(1231.100:654): avc: denied { map_read map_write } for pid=12365 comm="syz.1.2511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1231.899758][ T31] audit: type=1400 audit(1231.830:655): avc: denied { mount } for pid=12378 comm="syz.0.2515" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1231.928382][ T31] audit: type=1400 audit(1231.860:656): avc: denied { unmount } for pid=11600 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1232.028706][T12382] fuse: Bad value for 'user_id' [ 1232.035219][T12382] fuse: Bad value for 'user_id' [ 1232.257236][ T31] audit: type=1400 audit(1232.190:657): avc: denied { associate } for pid=12383 comm="syz.0.2517" name="162" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1232.264044][ T31] audit: type=1400 audit(1232.190:658): avc: denied { setattr } for pid=12383 comm="syz.0.2517" name="NFC_LLCP" dev="sockfs" ino=32514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1233.040552][T12396] FAULT_INJECTION: forcing a failure. [ 1233.040552][T12396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1233.041051][T12396] CPU: 1 UID: 0 PID: 12396 Comm: syz.0.2521 Not tainted syzkaller #0 PREEMPT [ 1233.041136][T12396] Hardware name: ARM-Versatile Express [ 1233.041158][T12396] Call trace: [ 1233.041194][T12396] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1233.041289][T12396] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1233.041306][T12396] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1233.041356][T12396] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1233.041410][T12396] r5:84162400 r4:8294f190 [ 1233.041424][T12396] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1233.041480][T12396] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1233.041545][T12396] r8:76f40f30 r7:00000000 r6:00000000 r5:dfbb9f68 r4:00000002 [ 1233.041560][T12396] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1233.041610][T12396] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1233.041667][T12396] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1233.041743][T12396] r10:00000001 r9:8060860c r8:00000002 r7:dfbb9f68 r6:0000000f r5:76f40f30 [ 1233.041765][T12396] r4:84162400 r3:dfbb9e9f [ 1233.041780][T12396] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1233.041843][T12396] r8:76f40f30 r7:dfbb9f68 r6:84162400 r5:0000000f r4:84a090c0 [ 1233.041859][T12396] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1233.041925][T12396] r10:00000003 r9:84162400 r8:8020029c r7:00000000 r6:00000000 r5:84a090c0 [ 1233.041944][T12396] r4:84a090c3 [ 1233.041959][T12396] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1233.042020][T12396] r7:00000003 r6:00000008 r5:76f40f30 r4:0000000f [ 1233.042035][T12396] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1233.042080][T12396] Exception stack(0xdfbb9fa8 to 0xdfbb9ff0) [ 1233.042115][T12396] 9fa0: 0000000f 76f40f30 00000008 76f40f30 0000000f 00000000 [ 1233.042150][T12396] 9fc0: 0000000f 76f40f30 00000008 00000003 002e0000 00000000 00006364 76f410bc [ 1233.042175][T12396] 9fe0: 00000158 76f40ed0 000d80b8 00130154 [ 1234.065923][ T31] audit: type=1400 audit(1233.990:659): avc: denied { create } for pid=12403 comm="syz.0.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1235.094044][ T31] audit: type=1400 audit(1235.020:660): avc: denied { connect } for pid=12408 comm="syz.0.2527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1235.746826][ T31] audit: type=1400 audit(1235.630:661): avc: denied { lock } for pid=12415 comm="syz.0.2529" path="socket:[32855]" dev="sockfs" ino=32855 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1237.402043][T12426] FAULT_INJECTION: forcing a failure. [ 1237.402043][T12426] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.403791][T12426] CPU: 1 UID: 0 PID: 12426 Comm: syz.0.2532 Not tainted syzkaller #0 PREEMPT [ 1237.403951][T12426] Hardware name: ARM-Versatile Express [ 1237.403979][T12426] Call trace: [ 1237.404019][T12426] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1237.404135][T12426] r7:84165400 r6:00000000 r5:60000013 r4:8226064c [ 1237.404157][T12426] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1237.404216][T12426] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1237.404276][T12426] r5:84165400 r4:82917c00 [ 1237.404294][T12426] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1237.404360][T12426] [<80972700>] (should_fail_ex) from [<8051f310>] (should_failslab+0x6c/0x94) [ 1237.404437][T12426] r8:00000000 r7:84165400 r6:00400dc0 r5:857fe200 r4:830020c0 [ 1237.404456][T12426] [<8051f2a4>] (should_failslab) from [<80502cd4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 1237.404511][T12426] [<80502c88>] (__kmalloc_cache_noprof) from [<8073a814>] (fuse_file_alloc+0xd0/0xec) [ 1237.404609][T12426] r10:84a093c0 r9:00000000 r8:85947780 r7:00000001 r6:824666d0 r5:857fe200 [ 1237.404632][T12426] r4:85947780 [ 1237.404653][T12426] [<8073a744>] (fuse_file_alloc) from [<8073a90c>] (fuse_file_open+0xb8/0x230) [ 1237.404740][T12426] r9:00000000 r8:84a34e00 r7:00000000 r6:00000000 r5:00000001 r4:857fe200 [ 1237.404763][T12426] [<8073a854>] (fuse_file_open) from [<8073abe0>] (fuse_open+0x84/0x2fc) [ 1237.404837][T12426] r10:84a093c0 r9:857fe200 r8:00000000 r7:84a093c0 r6:00000000 r5:00000000 [ 1237.404861][T12426] r4:85070780 [ 1237.404878][T12426] [<8073ab5c>] (fuse_open) from [<8054e194>] (do_dentry_open+0x2c0/0x4d0) [ 1237.405055][T12426] r10:84a093c0 r9:00000000 r8:84a093e8 r7:8073ab5c r6:85070780 r5:00000000 [ 1237.405087][T12426] r4:84a093c0 [ 1237.405106][T12426] [<8054ded4>] (do_dentry_open) from [<8054fefc>] (vfs_open+0x2c/0xe8) [ 1237.405182][T12426] r9:00000000 r8:dfc59e58 r7:00000000 r6:84a093e8 r5:8291edac r4:84a093c0 [ 1237.405719][T12426] [<8054fed0>] (vfs_open) from [<805689e8>] (path_openat+0x30c/0x1150) [ 1237.405847][T12426] r6:dfc59f20 r5:8291edac r4:00000000 [ 1237.405870][T12426] [<805686dc>] (path_openat) from [<805698d8>] (do_filp_open+0xac/0x148) [ 1237.406008][T12426] r10:00000142 r9:838d4000 r8:00000001 r7:dfc59e58 r6:dfc59f20 r5:84165400 [ 1237.406037][T12426] r4:ffffff9c [ 1237.406057][T12426] [<8056982c>] (do_filp_open) from [<8055045c>] (do_sys_openat2+0x90/0xe0) [ 1237.406157][T12426] r9:84165400 r8:8020029c r7:ffffff9c r6:dfc59f58 r5:838d4000 r4:00000006 [ 1237.406201][T12426] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1237.406279][T12426] r7:00000142 r6:00130230 r5:20000000 r4:ffffff9c [ 1237.406301][T12426] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1237.406386][T12426] Exception stack(0xdfc59fa8 to 0xdfc59ff0) [ 1237.406437][T12426] 9fa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 1237.406482][T12426] 9fc0: 00000000 00000000 00130230 00000142 002e0000 00000000 00006364 76f410bc [ 1237.406533][T12426] 9fe0: 76f40ec0 76f40eb0 0001946c 00132280 [ 1237.406564][T12426] r5:00000000 r4:00000000 [ 1240.508106][T12445] FAULT_INJECTION: forcing a failure. [ 1240.508106][T12445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1240.525983][T12445] CPU: 1 UID: 0 PID: 12445 Comm: syz.1.2539 Not tainted syzkaller #0 PREEMPT [ 1240.526192][T12445] Hardware name: ARM-Versatile Express [ 1240.526238][T12445] Call trace: [ 1240.526285][T12445] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1240.526419][T12445] r7:00000000 r6:00000000 r5:60070113 r4:8226064c [ 1240.526441][T12445] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1240.526496][T12445] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1240.526554][T12445] r5:83b53c00 r4:8294f190 [ 1240.526572][T12445] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1240.526633][T12445] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1240.526706][T12445] r8:8020029c r7:00000000 r6:82466858 r5:0018597c r4:0018597c [ 1240.526725][T12445] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1240.526783][T12445] [<80972940>] (should_fail_usercopy) from [<80978a28>] (strncpy_from_user+0x20/0x1a0) [ 1240.526836][T12445] [<80978a08>] (strncpy_from_user) from [<80562c50>] (getname_flags.part.0+0x44/0x18c) [ 1240.526913][T12445] r10:00000142 r9:83b53c00 r8:8020029c r7:00000000 r6:82466858 r5:0018597c [ 1240.526944][T12445] r4:838d5000 [ 1240.526961][T12445] [<80562c0c>] (getname_flags.part.0) from [<80567bd0>] (getname_flags+0x3c/0x50) [ 1240.527042][T12445] r9:83b53c00 r8:8020029c r7:ffffff9c r6:dfc5df58 r5:00000000 r4:0018597c [ 1240.527097][T12445] [<80567b94>] (getname_flags) from [<8055042c>] (do_sys_openat2+0x60/0xe0) [ 1240.527161][T12445] r5:0018597c r4:00000000 [ 1240.527179][T12445] [<805503cc>] (do_sys_openat2) from [<80550884>] (sys_openat+0x98/0xd4) [ 1240.527242][T12445] r7:00000142 r6:00000000 r5:0018597c r4:ffffff9c [ 1240.527264][T12445] [<805507ec>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1240.527320][T12445] Exception stack(0xdfc5dfa8 to 0xdfc5dff0) [ 1240.527363][T12445] dfa0: 00000002 0018597c ffffff9c 0018597c 00000002 00000000 [ 1240.527401][T12445] dfc0: 00000002 0018597c 00000000 00000142 00000000 00000000 00006364 76fc40bc [ 1240.527429][T12445] dfe0: 200001c0 76fc1dd8 000d80b8 00130078 [ 1240.527454][T12445] r5:0018597c r4:00000002 [ 1243.618220][T12468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1 sclass=netlink_audit_socket pid=12468 comm=syz.1.2546 [ 1244.058735][T12473] FAULT_INJECTION: forcing a failure. [ 1244.058735][T12473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1244.059082][T12473] CPU: 0 UID: 0 PID: 12473 Comm: syz.1.2548 Not tainted syzkaller #0 PREEMPT [ 1244.059178][T12473] Hardware name: ARM-Versatile Express [ 1244.059210][T12473] Call trace: [ 1244.059255][T12473] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1244.059361][T12473] r7:00000000 r6:00000000 r5:60000013 r4:8226064c [ 1244.059383][T12473] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1244.059438][T12473] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1244.059581][T12473] r5:841d1800 r4:8294f190 [ 1244.059619][T12473] [<8021fb9c>] (dump_stack) from [<809728c4>] (should_fail_ex+0x1c4/0x228) [ 1244.059729][T12473] [<80972700>] (should_fail_ex) from [<8097293c>] (should_fail+0x14/0x18) [ 1244.059884][T12473] r8:76fc3f30 r7:00000000 r6:00000000 r5:df955f68 r4:00000002 [ 1244.059930][T12473] [<80972928>] (should_fail) from [<8097295c>] (should_fail_usercopy+0x1c/0x20) [ 1244.059991][T12473] [<80972940>] (should_fail_usercopy) from [<8058e6cc>] (simple_read_from_buffer+0x80/0x13c) [ 1244.060385][T12473] [<8058e64c>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 1244.061003][T12473] r10:00000001 r9:8060860c r8:00000002 r7:df955f68 r6:0000000f r5:76fc3f30 [ 1244.061459][T12473] r4:841d1800 r3:df955e9f [ 1244.061484][T12473] [<8060860c>] (proc_fail_nth_read) from [<8055351c>] (vfs_read+0x98/0x324) [ 1244.061674][T12473] r8:76fc3f30 r7:df955f68 r6:841d1800 r5:0000000f r4:830d76c0 [ 1244.061778][T12473] [<80553484>] (vfs_read) from [<8055422c>] (ksys_read+0x74/0xe8) [ 1244.061885][T12473] r10:00000003 r9:841d1800 r8:8020029c r7:00000000 r6:00000000 r5:830d76c0 [ 1244.061909][T12473] r4:830d76c3 [ 1244.062065][T12473] [<805541b8>] (ksys_read) from [<805542b0>] (sys_read+0x10/0x14) [ 1244.062189][T12473] r7:00000003 r6:00000004 r5:76fc3f30 r4:0000000f [ 1244.062227][T12473] [<805542a0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1244.062283][T12473] Exception stack(0xdf955fa8 to 0xdf955ff0) [ 1244.062866][T12473] 5fa0: 0000000f 76fc3f30 00000004 76fc3f30 0000000f 00000000 [ 1244.063553][T12473] 5fc0: 0000000f 76fc3f30 00000004 00000003 002e0000 00000000 00006364 76fc40bc [ 1244.063932][T12473] 5fe0: 00000158 76fc3ed0 000d80b8 00130154 [ 1245.608936][ T31] audit: type=1400 audit(1245.540:662): avc: denied { connect } for pid=12479 comm="syz.0.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1245.708273][ T31] audit: type=1400 audit(1245.640:663): avc: denied { mounton } for pid=12494 comm="syz.1.2554" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1245.725928][T12496] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 1248.277594][T12507] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=12507 comm=syz.1.2559 [ 1248.486206][T12514] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=770 sclass=netlink_tcpdiag_socket pid=12514 comm=syz.0.2560 [ 1249.197726][ C1] vkms_vblank_simulate: vblank timer overrun [ 1249.936416][T12525] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=12525 comm=syz.1.2565 [ 1251.416482][ T31] audit: type=1400 audit(1251.350:664): avc: denied { ioctl } for pid=12526 comm="syz.1.2566" path="socket:[33839]" dev="sockfs" ino=33839 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1251.837249][ T31] audit: type=1400 audit(1251.770:665): avc: denied { relabelfrom } for pid=12530 comm="syz.0.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1251.840444][ T31] audit: type=1400 audit(1251.770:666): avc: denied { relabelto } for pid=12530 comm="syz.0.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1251.935816][T12531] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 1252.651454][T12535] random: crng reseeded on system resumption [ 1255.223498][ T31] audit: type=1400 audit(1255.150:667): avc: denied { mounton } for pid=12554 comm="syz.0.2578" path="/proc/235/task" dev="proc" ino=33892 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1255.988734][T12561] netlink: 'syz.0.2580': attribute type 21 has an invalid length. [ 1256.049073][T12561] netlink: 128 bytes leftover after parsing attributes in process `syz.0.2580'. [ 1256.685643][ T3812] usb 1-1: new high-speed USB device number 36 using dummy_hcd [ 1256.901159][ T3812] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1256.902392][ T3812] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1256.905424][ T3812] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1256.927953][ T3812] usb 1-1: config 0 descriptor?? [ 1257.466071][ T3812] keytouch 0003:0926:3333.0003: fixing up Keytouch IEC report descriptor [ 1257.480614][ T3812] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.0003/input/input10 [ 1257.553864][ T3812] keytouch 0003:0926:3333.0003: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 1258.209480][ T3813] usb 1-1: USB disconnect, device number 36 [ 1258.391676][ T31] audit: type=1400 audit(1258.320:668): avc: denied { ioctl } for pid=12565 comm="syz.1.2582" path="socket:[33093]" dev="sockfs" ino=33093 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1259.268268][T12576] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2586'. [ 1259.688716][ T31] audit: type=1400 audit(1259.620:669): avc: denied { ioctl } for pid=12579 comm="syz.0.2588" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1259.690709][ T31] audit: type=1400 audit(1259.620:670): avc: denied { set_context_mgr } for pid=12579 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1259.765172][ T7857] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 1259.807504][ T31] audit: type=1400 audit(1259.740:671): avc: denied { map } for pid=12579 comm="syz.0.2588" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1259.849042][ T31] audit: type=1400 audit(1259.780:672): avc: denied { call } for pid=12579 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1259.851424][ T31] audit: type=1400 audit(1259.780:673): avc: denied { transfer } for pid=12579 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1259.882408][T12580] binder: 12579:12580 ioctl c0306201 200005c0 returned -14 [ 1259.945192][ T7857] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1259.979797][ T7857] usb 2-1: config 4 has an invalid interface number: 210 but max is 0 [ 1259.979970][ T7857] usb 2-1: config 4 has no interface number 0 [ 1259.980176][ T7857] usb 2-1: config 4 interface 210 has no altsetting 0 [ 1260.006693][ T7857] usb 2-1: New USB device found, idVendor=17a1, idProduct=0128, bcdDevice=1e.7d [ 1260.006847][ T7857] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1260.006987][ T7857] usb 2-1: Product: syz [ 1260.007100][ T7857] usb 2-1: Manufacturer: syz [ 1260.007183][ T7857] usb 2-1: SerialNumber: syz [ 1260.322761][ T7857] usb 2-1: USB disconnect, device number 39 [ 1260.757806][T12315] usb 1-1: new high-speed USB device number 37 using dummy_hcd [ 1260.890794][T12588] binder: 12587:12588 ioctl c0306201 200005c0 returned -14 [ 1260.940795][T12315] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1260.942293][T12315] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 1260.943274][T12315] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1260.952095][T12315] usb 1-1: config 0 descriptor?? [ 1261.481134][T12594] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2595'. [ 1263.146324][T12601] netlink: 104 bytes leftover after parsing attributes in process `syz.1.2598'. [ 1263.146380][ T31] audit: type=1400 audit(1263.080:674): avc: denied { nlmsg_read } for pid=12600 comm="syz.1.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1263.985870][ T31] audit: type=1400 audit(1263.910:675): avc: denied { name_bind } for pid=12606 comm="syz.1.2601" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1268.265287][ T1803] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 1268.425269][ T1803] usb 2-1: Using ep0 maxpacket: 16 [ 1268.442994][ T1803] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 1268.443350][ T1803] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 1268.479160][ T1803] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 1268.479428][ T1803] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1268.479681][ T1803] usb 2-1: Product: syz [ 1268.479727][ T1803] usb 2-1: Manufacturer: syz [ 1268.479806][ T1803] usb 2-1: SerialNumber: syz [ 1268.483336][ T1803] usb 2-1: config 0 descriptor?? [ 1271.241415][ T96] usb 1-1: USB disconnect, device number 37 [ 1271.460698][ T31] audit: type=1400 audit(1271.390:676): avc: denied { unmount } for pid=11600 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1272.365355][T12315] usb 1-1: new high-speed USB device number 38 using dummy_hcd [ 1272.515108][T12315] usb 1-1: Using ep0 maxpacket: 16 [ 1272.538132][T12315] usb 1-1: config index 0 descriptor too short (expected 102, got 36) [ 1272.539271][T12315] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1272.540434][T12315] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 1272.541394][T12315] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1272.560211][T12315] usb 1-1: New USB device found, idVendor=054c, idProduct=06c1, bcdDevice=c2.87 [ 1272.561626][T12315] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1272.564453][T12315] usb 1-1: Product: syz [ 1272.567353][T12315] usb 1-1: Manufacturer: syz [ 1272.570210][T12315] usb 1-1: SerialNumber: syz [ 1272.576375][T12315] usb 1-1: config 0 descriptor?? [ 1272.586590][T12315] port100 1-1:0.0: NFC: Could not find bulk-in or bulk-out endpoint [ 1272.796619][ T1803] usb 1-1: USB disconnect, device number 38 [ 1273.748428][ T31] audit: type=1400 audit(1273.680:677): avc: denied { name_bind } for pid=12644 comm="syz.0.2615" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1273.749501][ T31] audit: type=1400 audit(1273.680:678): avc: denied { node_bind } for pid=12644 comm="syz.0.2615" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1278.157129][ T31] audit: type=1400 audit(1278.090:679): avc: denied { setopt } for pid=12663 comm="syz.0.2622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1278.232820][ T31] audit: type=1400 audit(1278.160:680): avc: denied { map } for pid=12663 comm="syz.0.2622" path="socket:[34088]" dev="sockfs" ino=34088 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1278.836700][ T10] usb 2-1: USB disconnect, device number 40 [ 1279.423369][T12674] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2627'. [ 1279.425262][T12674] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2627'. [ 1279.976177][T12674] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2627'. [ 1284.030047][T12719] syzkaller0: entered promiscuous mode [ 1284.031277][T12719] syzkaller0: entered allmulticast mode [ 1291.584370][T12770] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2659'. [ 1291.618132][ T31] audit: type=1400 audit(1291.550:681): avc: denied { setopt } for pid=12768 comm="syz.0.2658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1291.629749][T12771] netlink: 'syz.0.2658': attribute type 6 has an invalid length. [ 1293.707002][T12780] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1294.862278][T12795] ip6gre1: entered allmulticast mode [ 1296.207688][ T31] audit: type=1400 audit(1296.140:682): avc: denied { bind } for pid=12813 comm="syz.1.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1296.216961][ T31] audit: type=1400 audit(1296.150:683): avc: denied { write } for pid=12813 comm="syz.1.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1296.608466][T12826] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2677'. [ 1297.207622][T12830] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2678'. [ 1297.463917][ T31] audit: type=1400 audit(1297.370:684): avc: denied { connect } for pid=12835 comm="syz.0.2681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1299.909577][T12859] bond0: (slave bond_slave_0): Releasing backup interface [ 1299.959086][T12859] bond0: (slave bond_slave_1): Releasing backup interface [ 1300.332384][T12862] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 1304.413129][ T31] audit: type=1400 audit(1304.340:685): avc: denied { sqpoll } for pid=12903 comm="syz.1.2704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1306.110715][ T31] audit: type=1400 audit(1306.040:686): avc: denied { watch watch_reads } for pid=12909 comm="syz.1.2706" path="/147" dev="tmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1307.908890][ T31] audit: type=1400 audit(1307.840:687): avc: denied { ioctl } for pid=12918 comm="syz.1.2709" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=33626 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1308.325380][T12315] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 1308.487030][T12315] usb 2-1: Using ep0 maxpacket: 32 [ 1308.675413][T12315] usb 2-1: config 0 has an invalid interface number: 133 but max is 0 [ 1308.676694][T12315] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1308.680217][T12315] usb 2-1: config 0 has no interface number 0 [ 1308.682626][T12315] usb 2-1: config 0 interface 133 altsetting 0 bulk endpoint 0xB has invalid maxpacket 1024 [ 1308.685781][T12315] usb 2-1: config 0 interface 133 altsetting 0 has an endpoint descriptor with address 0xB8, changing to 0x88 [ 1308.688703][T12315] usb 2-1: config 0 interface 133 altsetting 0 bulk endpoint 0x88 has invalid maxpacket 105 [ 1308.691606][T12315] usb 2-1: config 0 interface 133 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1308.720313][T12315] usb 2-1: New USB device found, idVendor=0424, idProduct=012c, bcdDevice=71.1e [ 1308.721388][T12315] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1308.726688][T12315] usb 2-1: Product: syz [ 1308.729829][T12315] usb 2-1: Manufacturer: syz [ 1308.732444][T12315] usb 2-1: SerialNumber: syz [ 1308.740684][T12315] usb 2-1: config 0 descriptor?? [ 1308.751367][T12921] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1308.768767][T12921] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1309.032897][T12315] usb 2-1: probing VID:PID(0424:012C) [ 1309.035634][T12315] usb 2-1: vub300 testing BULK OUT EndPoint(0) 0B [ 1309.036924][T12315] usb 2-1: vub300 testing BULK IN EndPoint(1) 88 [ 1309.037842][T12315] usb 2-1: Could not find two sets of bulk-in/out endpoint pairs [ 1309.038832][T12315] vub300 2-1:0.133: probe with driver vub300 failed with error -22 [ 1309.043148][T12315] usb 2-1: USB disconnect, device number 41 [ 1310.517974][ T31] audit: type=1400 audit(1310.450:688): avc: denied { setopt } for pid=12931 comm="syz.1.2715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1312.035251][ T31] audit: type=1400 audit(1311.950:689): avc: denied { setopt } for pid=12943 comm="syz.1.2718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1328.335728][ T1803] usb 1-1: new high-speed USB device number 39 using dummy_hcd [ 1328.508144][ T1803] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 1328.508308][ T1803] usb 1-1: config 0 has no interface number 0 [ 1328.529301][ T1803] usb 1-1: New USB device found, idVendor=18b4, idProduct=fffb, bcdDevice=dc.7b [ 1328.529454][ T1803] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1328.531788][ T1803] usb 1-1: Product: syz [ 1328.531989][ T1803] usb 1-1: Manufacturer: syz [ 1328.532079][ T1803] usb 1-1: SerialNumber: syz [ 1328.537707][ T1803] usb 1-1: config 0 descriptor?? [ 1333.908918][ T31] audit: type=1400 audit(1333.840:690): avc: denied { mount } for pid=12956 comm="syz.1.2723" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1333.989536][ T31] audit: type=1400 audit(1333.900:691): avc: denied { unmount } for pid=11935 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1343.051985][ T1803] usb 1-1: USB disconnect, device number 39 [ 1343.545638][ T1803] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 1343.705349][ T1803] usb 1-1: Using ep0 maxpacket: 32 [ 1343.735688][ T1803] usb 1-1: New USB device found, idVendor=0fd9, idProduct=0025, bcdDevice=29.40 [ 1343.736011][ T1803] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1343.747600][ T1803] usb 1-1: config 0 descriptor?? [ 1353.981220][ T1803] usb 1-1: USB disconnect, device number 40 [ 1357.405296][ T10] usb 1-1: new high-speed USB device number 41 using dummy_hcd [ 1357.566456][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1357.568350][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1357.575325][ T10] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 1357.576590][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1357.579582][ T10] usb 1-1: config 0 descriptor?? [ 1358.035989][ T10] cm6533_jd 0003:0D8C:0022.0004: hiddev0,hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.0-1/input0 [ 1359.045557][ T7857] usb 1-1: USB disconnect, device number 41 [ 1359.169378][ T31] audit: type=1400 audit(1359.100:692): avc: denied { bind } for pid=12986 comm="syz.0.2734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1359.171117][ T31] audit: type=1400 audit(1359.100:693): avc: denied { name_bind } for pid=12986 comm="syz.0.2734" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1359.175229][ T31] audit: type=1400 audit(1359.100:694): avc: denied { node_bind } for pid=12986 comm="syz.0.2734" saddr=127.0.0.1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1368.156041][ T31] audit: type=1400 audit(1368.070:695): avc: denied { write } for pid=12993 comm="syz.0.2741" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1368.795211][T12315] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 1368.994465][T12315] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1368.995037][T12315] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1368.995356][T12315] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 1368.995532][T12315] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1369.002536][T12315] usb 2-1: config 0 descriptor?? [ 1369.456846][T12315] cm6533_jd 0003:0D8C:0022.0005: hiddev0,hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.1-1/input0 [ 1370.471285][T12315] usb 2-1: USB disconnect, device number 42 [ 1370.756446][T13006] syzkaller0: entered promiscuous mode [ 1370.757521][T13006] syzkaller0: entered allmulticast mode [ 1370.763001][ T3057] syzkaller0: tun_net_xmit 48 [ 1370.783061][T13006] syzkaller0: create flow: hash 4130208019 index 1 [ 1370.856429][T13006] syzkaller0: delete flow: hash 4130208019 index 1 [ 1371.896459][ T96] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 1372.079141][ T96] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1372.079413][ T96] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1372.079735][ T96] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 1372.080329][ T96] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1372.088544][ T96] usb 2-1: config 0 descriptor?? [ 1372.617578][ T96] cm6533_jd 0003:0D8C:0022.0006: hiddev0,hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.1-1/input0 [ 1373.821218][ T7857] usb 2-1: USB disconnect, device number 43 [ 1376.332308][T13033] ------------[ cut here ]------------ [ 1376.332877][T13033] WARNING: CPU: 0 PID: 13033 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 1376.338914][T13033] Modules linked in: [ 1376.340907][T13033] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1376.341487][T13033] CPU: 0 UID: 0 PID: 13033 Comm: syz.1.2752 Not tainted syzkaller #0 PREEMPT [ 1376.341840][T13033] Hardware name: ARM-Versatile Express [ 1376.342092][T13033] Call trace: [ 1376.342288][T13033] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1376.342682][T13033] r7:00000000 r6:8281f77c r5:00000000 r4:8226064c [ 1376.342956][T13033] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 1376.343481][T13033] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1376.343944][T13033] r5:00000000 r4:82a77d18 [ 1376.344169][T13033] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 1376.344477][T13033] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 1376.345169][T13033] r7:804bed90 [ 1376.345570][T13033] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 1376.346018][T13033] r3:8280c684 r2:00000001 r1:82247068 r0:8224eae4 [ 1376.346419][T13033] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 1376.346854][T13033] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 1376.347255][T13033] r8:00000009 r7:8227ae90 r6:dfb49d14 r5:84c0a400 r4:00000000 [ 1376.347539][T13033] [<80254bd0>] (warn_slowpath_fmt) from [<804bed90>] (kunmap_local_indexed+0x20c/0x224) [ 1376.348025][T13033] r10:00000000 r9:ded43868 r8:deb6bd48 r7:00a00000 r6:00000003 r5:84c0a400 [ 1376.348742][T13033] r4:ffefd000 [ 1376.349063][T13033] [<804beb84>] (kunmap_local_indexed) from [<8053b574>] (move_pages+0xb1c/0x1a00) [ 1376.349475][T13033] r7:00a00000 r6:00000000 r5:85766054 r4:ffefb000 [ 1376.349799][T13033] [<8053aa58>] (move_pages) from [<805c4bcc>] (userfaultfd_ioctl+0x1254/0x2408) [ 1376.350297][T13033] r10:84b9f0c0 r9:dfb49e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 1376.350670][T13033] r4:85973000 [ 1376.350926][T13033] [<805c3978>] (userfaultfd_ioctl) from [<8056ce78>] (sys_ioctl+0x130/0xba0) [ 1376.351352][T13033] r10:84c0a400 r9:00000005 r8:85ae8e40 r7:20000040 r6:85ae8e41 r5:00000000 [ 1376.351725][T13033] r4:c028aa05 [ 1376.351962][T13033] [<8056cd48>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1376.352329][T13033] Exception stack(0xdfb49fa8 to 0xdfb49ff0) [ 1376.352607][T13033] 9fa0: 00000000 00000000 00000005 c028aa05 20000040 00000000 [ 1376.352981][T13033] 9fc0: 00000000 00000000 002f6448 00000036 002e0000 00000000 00006364 76f820bc [ 1376.353328][T13033] 9fe0: 76f81ec0 76f81eb0 0001946c 00132280 [ 1376.353663][T13033] r10:00000036 r9:84c0a400 r8:8020029c r7:00000036 r6:002f6448 r5:00000000 [ 1376.354018][T13033] r4:00000000 [ 1376.356335][T13033] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:35:47 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000002 R02=eaec5030 R03=00000030 R04=84b94c40 R05=dfb49b30 R06=829590f8 R07=00000001 R08=82826ef8 R09=00000000 R10=00001a50 R11=dfb49acc R12=dfb49a70 R13=dfb49ab0 R14=81a46c6c R15=80a79bbc PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84c0b000 R01=00000001 R02=5b721000 R03=00000000 R04=00000001 R05=84c0e000 R06=84c0b000 R07=5b721000 R08=84c0e894 R09=00000098 R10=84c0e893 R11=dfa8db84 R12=dfa8db88 R13=dfa8db30 R14=8033d97c R15=81a3a970 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000