last executing test programs: 2m36.335345071s ago: executing program 1 (id=4635): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1ff, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x2, 0x5, 0x3}) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0xa000) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000340)={0x8, 0x8169, 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1000, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x8, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000400)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x49, 0x7fff, 0x4}) 2m31.241127107s ago: executing program 1 (id=4637): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000100)=0x1, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r2, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) 2m23.632433322s ago: executing program 1 (id=4640): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r1, 0x2000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 2m8.652912467s ago: executing program 1 (id=4646): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000001c0)=@base={0xa, 0x5, 0xb3, 0x81}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @generic={0x63, 0x0, 0x0, 0x1f40}, @initr0, @exit, @printk={@x={0x18, 0x0}, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x9e}}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff1a}, 0x21) 2m3.602061652s ago: executing program 1 (id=4648): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x2, 0x4, &(0x7f0000000d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x24}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m1.631692089s ago: executing program 1 (id=4649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 1m48.534629852s ago: executing program 32 (id=4649): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 21.811833642s ago: executing program 0 (id=4672): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0xffffffff8) 19.729347186s ago: executing program 0 (id=4673): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) r1 = eventfd2(0x0, 0x1) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x10000000}) clock_gettime(0x7, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000004180)='kfree\x00'}, 0x18) read$FUSE(r0, &(0x7f0000000700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATX(r0, &(0x7f0000002840)={0x130, 0x0, r3, {0x7, 0x1, 0x0, '\x00', {0x40, 0x0, 0x2, 0xc, 0x0, 0x0, 0x2000, '\x00', 0x4, 0x400000009, 0x80000001, 0x3, {0x2, 0x3}, {0x5, 0x80000001}, {0x2, 0x7ff}, {0x6, 0x6}, 0x1adf, 0x2, 0x2, 0x5}}}, 0x130) 16.212071097s ago: executing program 0 (id=4674): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000003180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf84, 0x4}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x2d, 0x0) 6.213054702s ago: executing program 0 (id=4675): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '\xa9N\xff', 0x20, 0x1000}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 2.584677239s ago: executing program 0 (id=4676): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff000000007b080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000007000000095"], &(0x7f0000000300)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe65}, 0x23) 0s ago: executing program 0 (id=4677): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) syz_open_procfs(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x4c10, 0x0) symlink(0x0, 0x0) readlink(0x0, 0x0, 0x0) readlink(0x0, 0x0, 0x0) epoll_create1(0x80000) kernel console output (not intermixed with test programs): 1c) [ 1340.464130][T15484] Exception stack(0xeabd1fa8 to 0xeabd1ff0) [ 1340.464164][T15484] 1fa0: 00000000 00000000 00000003 00003b81 20000000 00000000 [ 1340.464194][T15484] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1340.464218][T15484] 1fe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1340.464251][T15484] r10:00000036 r9:83306c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1340.464272][T15484] r4:00000000 [ 1344.145124][T15512] FAULT_INJECTION: forcing a failure. [ 1344.145124][T15512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1344.145605][T15512] CPU: 0 UID: 0 PID: 15512 Comm: syz.1.3639 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1344.145662][T15512] Hardware name: ARM-Versatile Express [ 1344.145684][T15512] Call trace: [ 1344.145728][T15512] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1344.145909][T15512] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1344.145933][T15512] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1344.145980][T15512] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1344.146027][T15512] r5:83a63000 r4:82950610 [ 1344.146041][T15512] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1344.146092][T15512] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1344.146147][T15512] r8:76b86f30 r7:00000000 r6:00000000 r5:ead39f68 r4:00000002 [ 1344.146161][T15512] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1344.146205][T15512] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1344.146259][T15512] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1344.146323][T15512] r10:00000001 r9:8060179c r8:00000002 r7:ead39f68 r6:0000000f r5:76b86f30 [ 1344.146344][T15512] r4:83a63000 r3:ead39e9f [ 1344.146358][T15512] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1344.146415][T15512] r8:76b86f30 r7:ead39f68 r6:83a63000 r5:0000000f r4:87849d80 [ 1344.146432][T15512] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1344.146500][T15512] r10:00000003 r9:83a63000 r8:8020029c r7:00000000 r6:00000000 r5:87849d80 [ 1344.146549][T15512] r4:87849d83 [ 1344.146568][T15512] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1344.146731][T15512] r7:00000003 r6:00000004 r5:76b86f30 r4:0000000f [ 1344.147218][T15512] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1344.147713][T15512] Exception stack(0xead39fa8 to 0xead39ff0) [ 1344.147761][T15512] 9fa0: 0000000f 76b86f30 00000004 76b86f30 0000000f 00000000 [ 1344.147944][T15512] 9fc0: 0000000f 76b86f30 00000004 00000003 002e0000 00000000 00006364 76b870bc [ 1344.148001][T15512] 9fe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1348.753993][T15540] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=45 sclass=netlink_audit_socket pid=15540 comm=syz.1.3647 [ 1349.272162][T15547] FAULT_INJECTION: forcing a failure. [ 1349.272162][T15547] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.275444][T15547] CPU: 1 UID: 0 PID: 15547 Comm: syz.0.3651 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1349.275521][T15547] Hardware name: ARM-Versatile Express [ 1349.275540][T15547] Call trace: [ 1349.275562][T15547] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1349.275627][T15547] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1349.275637][T15547] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1349.275661][T15547] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1349.275687][T15547] r5:85550000 r4:82919a80 [ 1349.275695][T15547] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1349.275723][T15547] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1349.275756][T15547] r8:85550000 r7:00000c40 r6:8793faa8 r5:00001000 r4:830016c0 [ 1349.275764][T15547] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1349.275786][T15547] [<80500f14>] (__kmalloc_noprof) from [<807baf0c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1349.275832][T15547] r10:85550000 r9:8309e400 r8:00000000 r7:83419220 r6:8793faa8 r5:00001000 [ 1349.275856][T15547] r4:00000000 [ 1349.275873][T15547] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1349.275932][T15547] r10:85550000 r9:00000000 r8:00000004 r7:c01064c2 r6:00000004 r5:81cd6278 [ 1349.275944][T15547] r4:8793faa8 r3:826c0200 [ 1349.275951][T15547] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1349.275982][T15547] r9:8793fa80 r8:00000004 r7:00000000 r6:00000000 r5:c01064c2 r4:8793fa80 [ 1349.275991][T15547] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1349.276014][T15547] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1349.276042][T15547] r7:00000000 r6:8793fa81 r5:00000000 r4:c01064c2 [ 1349.276050][T15547] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1349.276071][T15547] Exception stack(0xeaf4dfa8 to 0xeaf4dff0) [ 1349.276090][T15547] dfa0: 00000000 00000000 00000004 c01064c2 00000000 00000000 [ 1349.276106][T15547] dfc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1349.276118][T15547] dfe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1349.276135][T15547] r10:00000036 r9:85550000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1349.276144][T15547] r4:00000000 [ 1349.358785][T15547] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1350.141090][T15554] usb usb1: usbfs: process 15554 (syz.0.3654) did not claim interface 0 before use [ 1350.637786][T15558] FAULT_INJECTION: forcing a failure. [ 1350.637786][T15558] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.638240][T15558] CPU: 0 UID: 0 PID: 15558 Comm: syz.1.3656 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1350.638328][T15558] Hardware name: ARM-Versatile Express [ 1350.638356][T15558] Call trace: [ 1350.638402][T15558] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1350.638503][T15558] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1350.638525][T15558] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1350.638581][T15558] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1350.638641][T15558] r5:83a63000 r4:82919a80 [ 1350.638658][T15558] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1350.638722][T15558] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1350.638794][T15558] r8:83a63000 r7:00000d40 r6:87849b68 r5:00000019 r4:83001240 [ 1350.638814][T15558] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1350.638864][T15558] [<80500f14>] (__kmalloc_noprof) from [<807bae14>] (tomoyo_encode2+0x64/0xf0) [ 1350.638928][T15558] r10:00000fff r9:8309f800 r8:00000000 r7:837c7000 r6:87849b68 r5:85a39ffd [ 1350.638951][T15558] r4:85a39fef [ 1350.638970][T15558] [<807badb0>] (tomoyo_encode2) from [<807baec4>] (tomoyo_encode+0x24/0x30) [ 1350.639029][T15558] r9:8309f800 r8:00000000 r7:837c7000 r6:87849b68 r5:00001000 r4:85a39ff0 [ 1350.639048][T15558] [<807baea0>] (tomoyo_encode) from [<807baf50>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1350.639099][T15558] r5:00001000 r4:85a39000 [ 1350.639117][T15558] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1350.639186][T15558] r10:83a63000 r9:00000000 r8:00000003 r7:00008902 r6:00000004 r5:81cd6278 [ 1350.639300][T15558] r4:87849b68 r3:826c0200 [ 1350.639325][T15558] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1350.639402][T15558] r9:87849b40 r8:00000003 r7:20000680 r6:20000680 r5:00008902 r4:87849b40 [ 1350.639429][T15558] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1350.639486][T15558] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1350.639551][T15558] r7:20000680 r6:87849b41 r5:00000000 r4:00008902 [ 1350.639573][T15558] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1350.639625][T15558] Exception stack(0xeaf55fa8 to 0xeaf55ff0) [ 1350.639664][T15558] 5fa0: 00000000 00000000 00000003 00008902 20000680 00000000 [ 1350.639701][T15558] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b870bc [ 1350.639731][T15558] 5fe0: 76b86ec0 76b86eb0 000193a4 00131fc0 [ 1350.639767][T15558] r10:00000036 r9:83a63000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1350.639819][T15558] r4:00000000 [ 1350.702776][T15558] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1352.203131][T11706] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 1352.362931][T11706] usb 2-1: Using ep0 maxpacket: 32 [ 1352.394815][T11706] usb 2-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 8 [ 1352.395226][T11706] usb 2-1: config 1 interface 0 altsetting 6 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1352.395783][T11706] usb 2-1: config 1 interface 0 has no altsetting 0 [ 1352.407842][T11706] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1352.408854][T11706] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1352.409841][T11706] usb 2-1: Product: syz [ 1352.410845][T11706] usb 2-1: Manufacturer: syz [ 1352.411586][T11706] usb 2-1: SerialNumber: syz [ 1352.418756][T15565] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1352.943632][T15565] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1352.944574][T15565] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1352.994110][T15565] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1353.003244][T15565] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1353.028105][T11706] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 1353.039207][T11706] usb 2-1: USB disconnect, device number 37 [ 1362.665396][ T31] audit: type=1400 audit(1362.560:404): avc: denied { shutdown } for pid=15638 comm="syz.1.3680" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1362.885217][ T31] audit: type=1400 audit(1362.780:405): avc: denied { create } for pid=15638 comm="syz.1.3680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1368.094194][T15679] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15679 comm=syz.1.3694 [ 1369.018268][T15692] FAULT_INJECTION: forcing a failure. [ 1369.018268][T15692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1369.018764][T15692] CPU: 0 UID: 0 PID: 15692 Comm: syz.1.3697 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1369.018824][T15692] Hardware name: ARM-Versatile Express [ 1369.018906][T15692] Call trace: [ 1369.019125][T15692] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1369.019237][T15692] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1369.019315][T15692] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1369.019396][T15692] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1369.019488][T15692] r5:85550c00 r4:82950610 [ 1369.019646][T15692] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1369.019789][T15692] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1369.019934][T15692] r8:76b86f30 r7:00000000 r6:00000000 r5:ec689f68 r4:00000002 [ 1369.020222][T15692] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1369.020350][T15692] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1369.020453][T15692] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1369.020653][T15692] r10:00000001 r9:8060179c r8:00000002 r7:ec689f68 r6:0000000f r5:76b86f30 [ 1369.020709][T15692] r4:85550c00 r3:ec689e9f [ 1369.020730][T15692] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1369.020847][T15692] r8:76b86f30 r7:ec689f68 r6:85550c00 r5:0000000f r4:87849600 [ 1369.020902][T15692] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1369.021048][T15692] r10:00000003 r9:85550c00 r8:8020029c r7:00000000 r6:00000000 r5:87849600 [ 1369.021097][T15692] r4:87849603 [ 1369.021163][T15692] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1369.021314][T15692] r7:00000003 r6:00000004 r5:76b86f30 r4:0000000f [ 1369.021404][T15692] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1369.021460][T15692] Exception stack(0xec689fa8 to 0xec689ff0) [ 1369.021658][T15692] 9fa0: 0000000f 76b86f30 00000004 76b86f30 0000000f 00000000 [ 1369.021771][T15692] 9fc0: 0000000f 76b86f30 00000004 00000003 002e0000 00000000 00006364 76b870bc [ 1369.021908][T15692] 9fe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1371.349198][T15704] FAULT_INJECTION: forcing a failure. [ 1371.349198][T15704] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.363005][T15704] CPU: 0 UID: 0 PID: 15704 Comm: syz.0.3702 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1371.363088][T15704] Hardware name: ARM-Versatile Express [ 1371.363104][T15704] Call trace: [ 1371.363125][T15704] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1371.363190][T15704] r7:00000d40 r6:00000000 r5:60000113 r4:8225b4e0 [ 1371.363199][T15704] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1371.363223][T15704] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1371.363257][T15704] r5:85554800 r4:82919a80 [ 1371.363265][T15704] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1371.363294][T15704] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1371.363327][T15704] r8:85554800 r7:00000d40 r6:8793f0e8 r5:00000020 r4:83001240 [ 1371.363335][T15704] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1371.363358][T15704] [<80500f14>] (__kmalloc_noprof) from [<807bae14>] (tomoyo_encode2+0x64/0xf0) [ 1371.363388][T15704] r10:00000fff r9:83812400 r8:00000000 r7:8341b220 r6:8793f0e8 r5:85a97ffc [ 1371.363397][T15704] r4:85a97fe7 [ 1371.363404][T15704] [<807badb0>] (tomoyo_encode2) from [<807baec4>] (tomoyo_encode+0x24/0x30) [ 1371.363430][T15704] r9:83812400 r8:00000000 r7:8341b220 r6:8793f0e8 r5:00001000 r4:85a97fe8 [ 1371.363438][T15704] [<807baea0>] (tomoyo_encode) from [<807baf50>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1371.363460][T15704] r5:00001000 r4:85a97000 [ 1371.363467][T15704] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1371.363500][T15704] r10:85554800 r9:00000000 r8:00000003 r7:c0189436 r6:00000004 r5:81cd6278 [ 1371.363511][T15704] r4:8793f0e8 r3:826c0200 [ 1371.363518][T15704] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1371.363548][T15704] r9:8793f0c0 r8:00000003 r7:200004c0 r6:200004c0 r5:c0189436 r4:8793f0c0 [ 1371.363557][T15704] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1371.363580][T15704] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1371.363607][T15704] r7:200004c0 r6:8793f0c1 r5:00000000 r4:c0189436 [ 1371.363615][T15704] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1371.363636][T15704] Exception stack(0xeb949fa8 to 0xeb949ff0) [ 1371.363654][T15704] 9fa0: 00000000 00000000 00000003 c0189436 200004c0 00000000 [ 1371.363669][T15704] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1371.363681][T15704] 9fe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1371.363697][T15704] r10:00000036 r9:85554800 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1371.363706][T15704] r4:00000000 [ 1371.364201][T15704] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1373.975532][T15723] FAULT_INJECTION: forcing a failure. [ 1373.975532][T15723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1373.983492][T15723] CPU: 1 UID: 0 PID: 15723 Comm: syz.0.3709 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1373.983611][T15723] Hardware name: ARM-Versatile Express [ 1373.983641][T15723] Call trace: [ 1373.983689][T15723] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1373.983803][T15723] r7:00000003 r6:00000000 r5:60000013 r4:8225b4e0 [ 1373.983825][T15723] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1373.983883][T15723] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1373.983969][T15723] r5:840a8000 r4:82950610 [ 1373.983990][T15723] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1373.984054][T15723] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1373.984118][T15723] r8:00000000 r7:00000003 r6:00001000 r5:00000000 r4:20005dc0 [ 1373.984138][T15723] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1373.984191][T15723] [<80964dd8>] (should_fail_usercopy) from [<8096aec0>] (strncpy_from_user+0x20/0x1a0) [ 1373.984244][T15723] [<8096aea0>] (strncpy_from_user) from [<80586f3c>] (setxattr_copy+0x2c/0x90) [ 1373.984324][T15723] r10:000000e4 r9:840a8000 r8:00000000 r7:00000003 r6:00001000 r5:00000000 [ 1373.984347][T15723] r4:ec7ede48 [ 1373.984364][T15723] [<80586f10>] (setxattr_copy) from [<80587174>] (path_setxattrat+0x7c/0x17c) [ 1373.984415][T15723] r5:00000000 r4:20005dc0 [ 1373.984433][T15723] [<805870f8>] (path_setxattrat) from [<80587474>] (sys_fsetxattr+0x30/0x38) [ 1373.984492][T15723] r8:8020029c r7:000000e4 r6:0012ff70 r5:00000000 r4:00000000 [ 1373.984511][T15723] [<80587444>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1373.984559][T15723] Exception stack(0xec7edfa8 to 0xec7edff0) [ 1373.984598][T15723] dfa0: 00000000 00000000 00000003 20005dc0 00000000 00000000 [ 1373.984632][T15723] dfc0: 00000000 00000000 0012ff70 000000e4 002e0000 00000000 00006364 76bf70bc [ 1373.984659][T15723] dfe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1376.815446][T15747] FAULT_INJECTION: forcing a failure. [ 1376.815446][T15747] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.818123][T15747] CPU: 1 UID: 0 PID: 15747 Comm: syz.0.3716 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1376.818256][T15747] Hardware name: ARM-Versatile Express [ 1376.818305][T15747] Call trace: [ 1376.818356][T15747] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1376.818477][T15747] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1376.818499][T15747] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1376.818558][T15747] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1376.818614][T15747] r5:85550000 r4:82919a80 [ 1376.818634][T15747] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1376.818697][T15747] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1376.818765][T15747] r8:85550000 r7:00000d40 r6:83b32328 r5:00000021 r4:83001240 [ 1376.818785][T15747] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1376.818825][T15747] [<80500f14>] (__kmalloc_noprof) from [<807bae14>] (tomoyo_encode2+0x64/0xf0) [ 1376.818884][T15747] r10:00000fff r9:8309e400 r8:00000000 r7:83419220 r6:83b32328 r5:85a92ffc [ 1376.818906][T15747] r4:85a92fe6 [ 1376.818925][T15747] [<807badb0>] (tomoyo_encode2) from [<807baec4>] (tomoyo_encode+0x24/0x30) [ 1376.818983][T15747] r9:8309e400 r8:00000000 r7:83419220 r6:83b32328 r5:00001000 r4:85a92fe7 [ 1376.819001][T15747] [<807baea0>] (tomoyo_encode) from [<807baf50>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1376.819049][T15747] r5:00001000 r4:85a92000 [ 1376.819068][T15747] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1376.819135][T15747] r10:85550000 r9:00000000 r8:00000004 r7:c01064c2 r6:00000004 r5:81cd6278 [ 1376.819160][T15747] r4:83b32328 r3:826c0200 [ 1376.819177][T15747] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1376.819242][T15747] r9:83b32300 r8:00000004 r7:00000000 r6:00000000 r5:c01064c2 r4:83b32300 [ 1376.819261][T15747] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1376.819329][T15747] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1376.819389][T15747] r7:00000000 r6:83b32301 r5:00000000 r4:c01064c2 [ 1376.819408][T15747] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1376.819455][T15747] Exception stack(0xec905fa8 to 0xec905ff0) [ 1376.819492][T15747] 5fa0: 00000000 00000000 00000004 c01064c2 00000000 00000000 [ 1376.819527][T15747] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1376.819559][T15747] 5fe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1376.819595][T15747] r10:00000036 r9:85550000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1376.819615][T15747] r4:00000000 [ 1376.841179][T15747] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1383.037850][T15782] FAULT_INJECTION: forcing a failure. [ 1383.037850][T15782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1383.039426][T15782] CPU: 1 UID: 0 PID: 15782 Comm: syz.0.3730 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1383.039551][T15782] Hardware name: ARM-Versatile Express [ 1383.039578][T15782] Call trace: [ 1383.039619][T15782] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1383.039723][T15782] r7:20000480 r6:00000000 r5:60000013 r4:8225b4e0 [ 1383.039742][T15782] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1383.039788][T15782] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1383.039841][T15782] r5:840ae000 r4:82950610 [ 1383.039857][T15782] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1383.039913][T15782] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1383.039971][T15782] r8:00000000 r7:20000480 r6:84de1b00 r5:00000000 r4:ecc3df20 [ 1383.039988][T15782] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1383.040037][T15782] [<80964dd8>] (should_fail_usercopy) from [<808b4328>] (_copy_from_iter+0x6c/0x7c8) [ 1383.040088][T15782] [<808b42bc>] (_copy_from_iter) from [<81658558>] (netlink_sendmsg+0x18c/0x444) [ 1383.040153][T15782] r10:00000000 r9:00000000 r8:ecc3df30 r7:85999000 r6:00000010 r5:85be89c0 [ 1383.040173][T15782] r4:ecc3df20 [ 1383.040191][T15782] [<816583cc>] (netlink_sendmsg) from [<8152ad40>] (__sock_sendmsg+0x44/0x78) [ 1383.040255][T15782] r10:00000000 r9:ecc3ddc4 r8:ecc3ddc4 r7:00000000 r6:85045680 r5:ecc3df20 [ 1383.040281][T15782] r4:00000000 [ 1383.040296][T15782] [<8152acfc>] (__sock_sendmsg) from [<8152b500>] (____sys_sendmsg+0x298/0x2cc) [ 1383.040349][T15782] r7:00000000 r6:85045680 r5:00000010 r4:ecc3df20 [ 1383.040367][T15782] [<8152b268>] (____sys_sendmsg) from [<8152d30c>] (___sys_sendmsg+0x9c/0xd0) [ 1383.040422][T15782] r10:ecc3de24 r9:20000540 r8:00000010 r7:00000000 r6:85045680 r5:ecc3df20 [ 1383.040444][T15782] r4:00000000 [ 1383.040459][T15782] [<8152d270>] (___sys_sendmsg) from [<8152d7a4>] (__sys_sendmsg+0x8c/0xe0) [ 1383.040525][T15782] r10:00000128 r9:840ae000 r8:83b32b40 r7:00000010 r6:20000540 r5:83b32b41 [ 1383.040546][T15782] r4:00000003 [ 1383.040561][T15782] [<8152d718>] (__sys_sendmsg) from [<8152d80c>] (sys_sendmsg+0x14/0x18) [ 1383.040614][T15782] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 1383.040630][T15782] [<8152d7f8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1383.040675][T15782] Exception stack(0xecc3dfa8 to 0xecc3dff0) [ 1383.040710][T15782] dfa0: 00000000 00000000 00000003 20000540 00000010 00000000 [ 1383.040743][T15782] dfc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76bf70bc [ 1383.040769][T15782] dfe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1384.055993][T15793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15793 comm=syz.0.3733 [ 1384.177189][T15794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15794 comm=syz.1.3734 [ 1384.362110][T15794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15794 comm=syz.1.3734 [ 1384.457488][T15794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15794 comm=syz.1.3734 [ 1384.838954][ T31] audit: type=1400 audit(1384.720:406): avc: denied { ioctl } for pid=15800 comm="syz.1.3736" path="socket:[36166]" dev="sockfs" ino=36166 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1386.205767][ T31] audit: type=1400 audit(1386.100:407): avc: denied { create } for pid=15811 comm="syz.0.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1390.730478][ C1] vkms_vblank_simulate: vblank timer overrun [ 1395.340389][T15867] FAULT_INJECTION: forcing a failure. [ 1395.340389][T15867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.340864][T15867] CPU: 0 UID: 0 PID: 15867 Comm: syz.1.3759 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1395.340937][T15867] Hardware name: ARM-Versatile Express [ 1395.340990][T15867] Call trace: [ 1395.341045][T15867] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1395.341144][T15867] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1395.341165][T15867] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1395.341212][T15867] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1395.341337][T15867] r5:840ae000 r4:82950610 [ 1395.341518][T15867] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1395.341672][T15867] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1395.341751][T15867] r8:76b86f30 r7:00000000 r6:00000000 r5:dfa2df68 r4:00000002 [ 1395.341925][T15867] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1395.341989][T15867] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1395.342076][T15867] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1395.342414][T15867] r10:00000001 r9:8060179c r8:00000002 r7:dfa2df68 r6:0000000f r5:76b86f30 [ 1395.343618][T15867] r4:840ae000 r3:dfa2de9f [ 1395.343686][T15867] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1395.343785][T15867] r8:76b86f30 r7:dfa2df68 r6:840ae000 r5:0000000f r4:87849cc0 [ 1395.343804][T15867] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1395.343910][T15867] r10:00000003 r9:840ae000 r8:8020029c r7:00000000 r6:00000000 r5:87849cc0 [ 1395.343990][T15867] r4:87849cc3 [ 1395.344008][T15867] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1395.344067][T15867] r7:00000003 r6:00000004 r5:76b86f30 r4:0000000f [ 1395.344088][T15867] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1395.344148][T15867] Exception stack(0xdfa2dfa8 to 0xdfa2dff0) [ 1395.344521][T15867] dfa0: 0000000f 76b86f30 00000004 76b86f30 0000000f 00000000 [ 1395.344592][T15867] dfc0: 0000000f 76b86f30 00000004 00000003 002e0000 00000000 00006364 76b870bc [ 1395.344623][T15867] dfe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1398.643011][T14180] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 1398.812819][T14180] usb 1-1: Using ep0 maxpacket: 32 [ 1398.835473][T14180] usb 1-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 8 [ 1398.835849][T14180] usb 1-1: config 1 interface 0 altsetting 6 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1398.836176][T14180] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1398.969638][T14180] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1398.970037][T14180] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1398.970365][T14180] usb 1-1: Product: syz [ 1398.970430][T14180] usb 1-1: Manufacturer: syz [ 1398.970503][T14180] usb 1-1: SerialNumber: syz [ 1399.063801][T15878] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1399.777908][T14180] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1399.785597][T14180] usb 1-1: USB disconnect, device number 30 [ 1410.674555][ T31] audit: type=1400 audit(1410.550:408): avc: denied { create } for pid=15946 comm="syz.1.3783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1411.955557][T15956] FAULT_INJECTION: forcing a failure. [ 1411.955557][T15956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1411.955836][T15956] CPU: 0 UID: 0 PID: 15956 Comm: syz.1.3787 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1411.955884][T15956] Hardware name: ARM-Versatile Express [ 1411.955898][T15956] Call trace: [ 1411.955923][T15956] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1411.955992][T15956] r7:20000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1411.956001][T15956] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1411.956026][T15956] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1411.956052][T15956] r5:84b8ec00 r4:82950610 [ 1411.956059][T15956] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1411.956090][T15956] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1411.956121][T15956] r8:dfc41ea0 r7:20000000 r6:0000000c r5:dfc41e90 r4:87945480 [ 1411.956129][T15956] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1411.956154][T15956] [<80964dd8>] (should_fail_usercopy) from [<80a8da10>] (iommufd_ioas_alloc_ioctl+0x8c/0x13c) [ 1411.956195][T15956] [<80a8d984>] (iommufd_ioas_alloc_ioctl) from [<80a8f710>] (iommufd_fops_ioctl+0x160/0x280) [ 1411.956228][T15956] r9:87849600 r8:b5403587 r7:81d2f948 r6:00000010 r5:20000000 r4:0000000c [ 1411.956238][T15956] [<80a8f5b0>] (iommufd_fops_ioctl) from [<805679c4>] (sys_ioctl+0x130/0xdc8) [ 1411.956336][T15956] r8:00000003 r7:20000000 r6:87849601 r5:00000000 r4:00003b81 [ 1411.956427][T15956] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1411.956496][T15956] Exception stack(0xdfc41fa8 to 0xdfc41ff0) [ 1411.956855][T15956] 1fa0: 00000000 00000000 00000003 00003b81 20000000 00000000 [ 1411.957031][T15956] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b870bc [ 1411.957225][T15956] 1fe0: 76b86ec0 76b86eb0 000193a4 00131fc0 [ 1411.957510][T15956] r10:00000036 r9:84b8ec00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1411.957625][T15956] r4:00000000 [ 1413.700958][T15960] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15960 comm=syz.0.3788 [ 1418.142948][T15990] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15990 comm=syz.0.3800 [ 1419.544152][T16003] FAULT_INJECTION: forcing a failure. [ 1419.544152][T16003] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.544613][T16003] CPU: 0 UID: 0 PID: 16003 Comm: syz.1.3806 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1419.544748][T16003] Hardware name: ARM-Versatile Express [ 1419.544777][T16003] Call trace: [ 1419.544816][T16003] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1419.544908][T16003] r7:84b8d400 r6:00000000 r5:60000013 r4:8225b4e0 [ 1419.544925][T16003] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1419.545009][T16003] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1419.545056][T16003] r5:84b8d400 r4:82919a80 [ 1419.545071][T16003] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1419.545185][T16003] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1419.545330][T16003] r8:00000000 r7:84b8d400 r6:00400cc0 r5:ffffffff r4:830adb40 [ 1419.545473][T16003] [<8051c1b0>] (should_failslab) from [<805005c0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1419.545563][T16003] [<80500570>] (kmem_cache_alloc_node_noprof) from [<81537fa4>] (__alloc_skb+0x138/0x160) [ 1419.545681][T16003] r10:e0421d1c r9:00000000 r8:00400cc0 r7:00000000 r6:830adb40 r5:ffffffff [ 1419.547094][T16003] r4:828060c0 [ 1419.547118][T16003] [<81537e6c>] (__alloc_skb) from [<81540548>] (alloc_skb_with_frags+0x44/0x1ec) [ 1419.547211][T16003] r8:802c5d70 r7:e0421cc4 r6:00000000 r5:00001000 r4:00000003 [ 1419.547348][T16003] [<81540504>] (alloc_skb_with_frags) from [<81530e4c>] (sock_alloc_send_pskb+0x1f4/0x228) [ 1419.547506][T16003] r10:e0421d1c r9:00000000 r8:802c5d70 r7:e0421cc4 r6:84b8d400 r5:7fffffff [ 1419.547621][T16003] r4:85667000 [ 1419.547669][T16003] [<81530c58>] (sock_alloc_send_pskb) from [<818033d8>] (unix_dgram_sendmsg+0x124/0x75c) [ 1419.547928][T16003] r10:00000000 r9:e0421dc4 r8:84b8d400 r7:85667000 r6:00000000 r5:00000000 [ 1419.548051][T16003] r4:e0421f20 [ 1419.548066][T16003] [<818032b4>] (unix_dgram_sendmsg) from [<81803a54>] (unix_seqpacket_sendmsg+0x44/0x84) [ 1419.548151][T16003] r10:00000000 r9:e0421dc4 r8:e0421dc4 r7:00000000 r6:85081b80 r5:e0421f20 [ 1419.548200][T16003] r4:00000000 [ 1419.548231][T16003] [<81803a10>] (unix_seqpacket_sendmsg) from [<8152ad40>] (__sock_sendmsg+0x44/0x78) [ 1419.548315][T16003] r5:e0421f20 r4:00000000 [ 1419.548357][T16003] [<8152acfc>] (__sock_sendmsg) from [<8152b500>] (____sys_sendmsg+0x298/0x2cc) [ 1419.548421][T16003] r7:00000000 r6:85081b80 r5:00004800 r4:e0421f20 [ 1419.548435][T16003] [<8152b268>] (____sys_sendmsg) from [<8152d30c>] (___sys_sendmsg+0x9c/0xd0) [ 1419.548482][T16003] r10:e0421e24 r9:200000c0 r8:00004800 r7:00000000 r6:85081b80 r5:e0421f20 [ 1419.548497][T16003] r4:00000000 [ 1419.548510][T16003] [<8152d270>] (___sys_sendmsg) from [<8152d7a4>] (__sys_sendmsg+0x8c/0xe0) [ 1419.548566][T16003] r10:00000128 r9:84b8d400 r8:878493c0 r7:00004800 r6:200000c0 r5:878493c1 [ 1419.548621][T16003] r4:00000003 [ 1419.548728][T16003] [<8152d718>] (__sys_sendmsg) from [<8152d80c>] (sys_sendmsg+0x14/0x18) [ 1419.548808][T16003] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 1419.548919][T16003] [<8152d7f8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1419.549025][T16003] Exception stack(0xe0421fa8 to 0xe0421ff0) [ 1419.549210][T16003] 1fa0: 00000000 00000000 00000003 200000c0 00004800 00000000 [ 1419.549315][T16003] 1fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b870bc [ 1419.549375][T16003] 1fe0: 76b86ec0 76b86eb0 000193a4 00131fc0 [ 1425.233125][ T23] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 1425.440623][ T23] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1425.441384][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1425.442226][ T23] usb 1-1: Product: syz [ 1425.443431][ T23] usb 1-1: Manufacturer: syz [ 1425.443879][ T23] usb 1-1: SerialNumber: syz [ 1427.180453][T16047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=16047 comm=syz.1.3815 [ 1433.043446][ T23] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 1433.203501][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 1433.227012][ T23] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1433.228930][ T23] usb 2-1: can't read configurations, error -61 [ 1433.363362][ T23] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 1433.553269][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 1433.658859][ T23] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1433.660037][ T23] usb 2-1: can't read configurations, error -61 [ 1433.662196][ T23] usb usb2-port1: attempt power cycle [ 1434.003353][ T23] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 1434.044914][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 1434.071940][ T23] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1434.073611][ T23] usb 2-1: can't read configurations, error -61 [ 1434.223589][ T23] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 1434.246148][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 1434.283387][ T23] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 1434.283836][ T23] usb 2-1: can't read configurations, error -61 [ 1434.285179][ T23] usb usb2-port1: unable to enumerate USB device [ 1434.800665][ T23] usb 1-1: USB disconnect, device number 31 [ 1435.733320][T16076] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16076 comm=syz.0.3821 [ 1437.208819][ T23] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 1437.216419][ T23] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1446.703428][ T23] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 1446.853362][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 1446.898670][ T23] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 1446.899820][ T23] usb 1-1: can't read configurations, error -61 [ 1447.023445][ T23] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 1447.175516][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 1447.200588][ T23] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 1447.201797][ T23] usb 1-1: can't read configurations, error -61 [ 1447.205047][ T23] usb usb1-port1: attempt power cycle [ 1447.543474][ T23] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 1447.594247][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 1447.655721][ T23] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 1447.656800][ T23] usb 1-1: can't read configurations, error -61 [ 1447.783172][ T23] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 1447.824396][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 1447.830786][ T23] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 1447.831213][ T23] usb 1-1: can't read configurations, error -61 [ 1447.832761][ T23] usb usb1-port1: unable to enumerate USB device [ 1463.688594][T16164] FAULT_INJECTION: forcing a failure. [ 1463.688594][T16164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1463.689147][T16164] CPU: 0 UID: 0 PID: 16164 Comm: syz.1.3849 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1463.689243][T16164] Hardware name: ARM-Versatile Express [ 1463.689269][T16164] Call trace: [ 1463.689324][T16164] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1463.689502][T16164] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1463.689536][T16164] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1463.689590][T16164] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1463.689678][T16164] r5:84b8c800 r4:82950610 [ 1463.689700][T16164] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1463.689760][T16164] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1463.689859][T16164] r8:76b86f30 r7:00000000 r6:00000000 r5:ead45f68 r4:00000002 [ 1463.689880][T16164] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1463.689932][T16164] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1463.689990][T16164] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1463.690057][T16164] r10:00000001 r9:8060179c r8:00000002 r7:ead45f68 r6:0000000f r5:76b86f30 [ 1463.690108][T16164] r4:84b8c800 r3:ead45e9f [ 1463.690128][T16164] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1463.690195][T16164] r8:76b86f30 r7:ead45f68 r6:84b8c800 r5:0000000f r4:87849d80 [ 1463.690215][T16164] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1463.690288][T16164] r10:00000003 r9:84b8c800 r8:8020029c r7:00000000 r6:00000000 r5:87849d80 [ 1463.690311][T16164] r4:87849d83 [ 1463.690362][T16164] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1463.690427][T16164] r7:00000003 r6:00000004 r5:76b86f30 r4:0000000f [ 1463.690444][T16164] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1463.690519][T16164] Exception stack(0xead45fa8 to 0xead45ff0) [ 1463.690578][T16164] 5fa0: 0000000f 76b86f30 00000004 76b86f30 0000000f 00000000 [ 1463.690613][T16164] 5fc0: 0000000f 76b86f30 00000004 00000003 002e0000 00000000 00006364 76b870bc [ 1463.690641][T16164] 5fe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1468.993744][T16192] FAULT_INJECTION: forcing a failure. [ 1468.993744][T16192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1468.995192][T16192] CPU: 1 UID: 0 PID: 16192 Comm: syz.1.3860 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1468.995291][T16192] Hardware name: ARM-Versatile Express [ 1468.995313][T16192] Call trace: [ 1468.995347][T16192] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1468.995439][T16192] r7:b5403587 r6:00000000 r5:60000113 r4:8225b4e0 [ 1468.995453][T16192] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1468.995492][T16192] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1468.995536][T16192] r5:840ae000 r4:82950610 [ 1468.995549][T16192] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1468.995595][T16192] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1468.995643][T16192] r8:00000000 r7:b5403587 r6:00000000 r5:840ae830 r4:76b65ca0 [ 1468.995656][T16192] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1468.995695][T16192] [<80964dd8>] (should_fail_usercopy) from [<8022b2dc>] (preserve_vfp_context+0x78/0xc4) [ 1468.995738][T16192] [<8022b264>] (preserve_vfp_context) from [<8022b6a4>] (setup_sigframe+0x16c/0x1c4) [ 1468.995778][T16192] r5:840ae830 r4:76b65bb8 [ 1468.995790][T16192] [<8022b538>] (setup_sigframe) from [<8022bac4>] (do_work_pending+0x2f4/0x4f8) [ 1468.995838][T16192] r10:00000128 r9:b5403587 r8:00000000 r7:840ae830 r6:76b65bb8 r5:e06a1fb0 [ 1468.995854][T16192] r4:840ae000 [ 1468.995865][T16192] [<8022b7d0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 1468.995900][T16192] Exception stack(0xe06a1fb0 to 0xe06a1ff8) [ 1468.995926][T16192] 1fa0: fffffffc 20000580 00000000 00000000 [ 1468.995952][T16192] 1fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b660bc [ 1468.995975][T16192] 1fe0: 76b65ec0 76b65eb0 000193a4 00131fc0 60000010 00000004 [ 1468.996001][T16192] r10:00000128 r9:840ae000 r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 [ 1468.996016][T16192] r4:00000000 [ 1469.473310][T14180] usb 1-1: new high-speed USB device number 36 using dummy_hcd [ 1469.674355][T14180] usb 1-1: Using ep0 maxpacket: 8 [ 1469.768706][T14180] usb 1-1: config 1 interface 0 altsetting 129 bulk endpoint 0x1 has invalid maxpacket 1023 [ 1469.769148][T14180] usb 1-1: config 1 interface 0 altsetting 129 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1469.769320][T14180] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1469.878315][T14180] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1469.878687][T14180] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1469.878776][T14180] usb 1-1: Product: syz [ 1469.878833][T14180] usb 1-1: Manufacturer: syz [ 1469.878921][T14180] usb 1-1: SerialNumber: syz [ 1469.888105][T16196] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1470.344890][T14180] usb 1-1: USB disconnect, device number 36 [ 1474.100734][T16236] FAULT_INJECTION: forcing a failure. [ 1474.100734][T16236] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1474.103379][T16236] CPU: 1 UID: 0 PID: 16236 Comm: syz.0.3873 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1474.103492][T16236] Hardware name: ARM-Versatile Express [ 1474.103519][T16236] Call trace: [ 1474.103563][T16236] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1474.103670][T16236] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1474.103691][T16236] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1474.103743][T16236] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1474.103799][T16236] r5:84b89800 r4:82950610 [ 1474.103818][T16236] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1474.103881][T16236] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1474.103947][T16236] r8:76bf6f30 r7:00000000 r6:00000000 r5:df841f68 r4:00000002 [ 1474.103964][T16236] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1474.104018][T16236] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1474.104078][T16236] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1474.104153][T16236] r10:00000001 r9:8060179c r8:00000002 r7:df841f68 r6:0000000f r5:76bf6f30 [ 1474.104177][T16236] r4:84b89800 r3:df841e9f [ 1474.104196][T16236] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1474.104273][T16236] r8:76bf6f30 r7:df841f68 r6:84b89800 r5:0000000f r4:857a7180 [ 1474.104294][T16236] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1474.104360][T16236] r10:00000003 r9:84b89800 r8:8020029c r7:00000000 r6:00000000 r5:857a7180 [ 1474.104382][T16236] r4:857a7183 [ 1474.104399][T16236] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1474.104459][T16236] r7:00000003 r6:00000006 r5:76bf6f30 r4:0000000f [ 1474.104477][T16236] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1474.104527][T16236] Exception stack(0xdf841fa8 to 0xdf841ff0) [ 1474.104567][T16236] 1fa0: 0000000f 76bf6f30 00000006 76bf6f30 0000000f 00000000 [ 1474.104603][T16236] 1fc0: 0000000f 76bf6f30 00000006 00000003 002e0000 00000000 00006364 76bf70bc [ 1474.104631][T16236] 1fe0: 00000158 76bf6ed0 000d7df0 0012fe94 [ 1474.694277][ T31] audit: type=1400 audit(1474.590:409): avc: denied { bind } for pid=16239 comm="syz.1.3875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1474.694819][ T31] audit: type=1400 audit(1474.590:410): avc: denied { name_bind } for pid=16239 comm="syz.1.3875" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1474.698796][ T31] audit: type=1400 audit(1474.590:411): avc: denied { node_bind } for pid=16239 comm="syz.1.3875" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1479.285210][T16265] FAULT_INJECTION: forcing a failure. [ 1479.285210][T16265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1479.285697][T16265] CPU: 0 UID: 0 PID: 16265 Comm: syz.0.3885 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1479.285782][T16265] Hardware name: ARM-Versatile Express [ 1479.285807][T16265] Call trace: [ 1479.285858][T16265] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1479.285955][T16265] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1479.285974][T16265] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1479.286099][T16265] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1479.286158][T16265] r5:840a8000 r4:82950610 [ 1479.286319][T16265] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1479.286480][T16265] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1479.286726][T16265] r8:76bf6f30 r7:00000000 r6:00000000 r5:eb215f68 r4:00000002 [ 1479.286956][T16265] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1479.287074][T16265] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1479.287216][T16265] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1479.287301][T16265] r10:00000001 r9:8060179c r8:00000002 r7:eb215f68 r6:0000000f r5:76bf6f30 [ 1479.287324][T16265] r4:840a8000 r3:eb215e9f [ 1479.287426][T16265] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1479.287629][T16265] r8:76bf6f30 r7:eb215f68 r6:840a8000 r5:0000000f r4:87849780 [ 1479.287993][T16265] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1479.288106][T16265] r10:00000003 r9:840a8000 r8:8020029c r7:00000000 r6:00000000 r5:87849780 [ 1479.288174][T16265] r4:87849783 [ 1479.288339][T16265] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1479.288436][T16265] r7:00000003 r6:00000004 r5:76bf6f30 r4:0000000f [ 1479.288455][T16265] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1479.288503][T16265] Exception stack(0xeb215fa8 to 0xeb215ff0) [ 1479.288539][T16265] 5fa0: 0000000f 76bf6f30 00000004 76bf6f30 0000000f 00000000 [ 1479.288573][T16265] 5fc0: 0000000f 76bf6f30 00000004 00000003 002e0000 00000000 00006364 76bf70bc [ 1479.288599][T16265] 5fe0: 00000158 76bf6ed0 000d7df0 0012fe94 [ 1482.495234][T16286] FAULT_INJECTION: forcing a failure. [ 1482.495234][T16286] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1482.496877][T16286] CPU: 1 UID: 0 PID: 16286 Comm: syz.1.3892 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1482.497021][T16286] Hardware name: ARM-Versatile Express [ 1482.497070][T16286] Call trace: [ 1482.497112][T16286] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1482.497213][T16286] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1482.497230][T16286] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1482.497283][T16286] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1482.497333][T16286] r5:84b8d400 r4:82950610 [ 1482.497347][T16286] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1482.497399][T16286] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1482.497453][T16286] r8:76b86f30 r7:00000000 r6:00000000 r5:eb17df68 r4:00000002 [ 1482.497468][T16286] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1482.497512][T16286] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1482.497567][T16286] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1482.497629][T16286] r10:00000001 r9:8060179c r8:00000002 r7:eb17df68 r6:0000000f r5:76b86f30 [ 1482.497650][T16286] r4:84b8d400 r3:eb17de9f [ 1482.497665][T16286] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1482.497721][T16286] r8:76b86f30 r7:eb17df68 r6:84b8d400 r5:0000000f r4:857a73c0 [ 1482.497737][T16286] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1482.497790][T16286] r10:00000003 r9:84b8d400 r8:8020029c r7:00000000 r6:00000000 r5:857a73c0 [ 1482.497807][T16286] r4:857a73c0 [ 1482.497821][T16286] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1482.497872][T16286] r7:00000003 r6:00000007 r5:76b86f30 r4:0000000f [ 1482.497887][T16286] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1482.497927][T16286] Exception stack(0xeb17dfa8 to 0xeb17dff0) [ 1482.497959][T16286] dfa0: 0000000f 76b86f30 00000007 76b86f30 0000000f 00000000 [ 1482.497991][T16286] dfc0: 0000000f 76b86f30 00000007 00000003 002e0000 00000000 00006364 76b870bc [ 1482.498015][T16286] dfe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1488.246722][ T31] audit: type=1400 audit(1488.140:412): avc: denied { mount } for pid=16319 comm="syz.1.3905" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1489.563292][ T7178] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 1489.753324][ T7178] usb 2-1: Using ep0 maxpacket: 32 [ 1489.770284][ T7178] usb 2-1: config 0 has no interfaces? [ 1489.771490][ T7178] usb 2-1: New USB device found, idVendor=1b1c, idProduct=1c09, bcdDevice= 0.00 [ 1489.774042][ T7178] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1489.779692][ T7178] usb 2-1: config 0 descriptor?? [ 1490.037058][T14180] usb 2-1: USB disconnect, device number 42 [ 1490.394584][T16329] FAULT_INJECTION: forcing a failure. [ 1490.394584][T16329] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.396135][T16329] CPU: 1 UID: 0 PID: 16329 Comm: syz.1.3909 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1490.396241][T16329] Hardware name: ARM-Versatile Express [ 1490.396266][T16329] Call trace: [ 1490.396311][T16329] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1490.396408][T16329] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1490.396426][T16329] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1490.396474][T16329] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1490.396537][T16329] r5:83a5d400 r4:82919a80 [ 1490.396553][T16329] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1490.396609][T16329] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1490.396670][T16329] r8:83a5d400 r7:00000c40 r6:857a79e8 r5:00001000 r4:830016c0 [ 1490.396689][T16329] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1490.396734][T16329] [<80500f14>] (__kmalloc_noprof) from [<807baf0c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1490.396795][T16329] r10:83a5d400 r9:8309f800 r8:00000000 r7:8501baa0 r6:857a79e8 r5:00001000 [ 1490.396814][T16329] r4:00000000 [ 1490.396829][T16329] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1490.396932][T16329] r10:83a5d400 r9:00000000 r8:00000003 r7:80085502 r6:00000004 r5:81cd6278 [ 1490.396957][T16329] r4:857a79e8 r3:826c0200 [ 1490.397003][T16329] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1490.397067][T16329] r9:857a79c0 r8:00000003 r7:76b85e88 r6:76b85e88 r5:80085502 r4:857a79c0 [ 1490.397085][T16329] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1490.397133][T16329] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1490.397188][T16329] r7:76b85e88 r6:857a79c1 r5:00000003 r4:80085502 [ 1490.397207][T16329] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1490.397252][T16329] Exception stack(0xeb4b9fa8 to 0xeb4b9ff0) [ 1490.397287][T16329] 9fa0: 76b85e98 00000003 00000003 80085502 76b85e88 76b84e50 [ 1490.397319][T16329] 9fc0: 76b85e98 00000003 00000003 00000036 00000000 00000000 00006364 76b870bc [ 1490.397346][T16329] 9fe0: 00000000 76b84e38 002b9000 0013198c [ 1490.397379][T16329] r10:00000036 r9:83a5d400 r8:8020029c r7:00000036 r6:00000003 r5:00000003 [ 1490.397400][T16329] r4:76b85e98 [ 1490.433787][T16329] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1491.177720][T16344] 8021q: VLANs not supported on tunl0 [ 1491.940884][ T31] audit: type=1400 audit(1491.830:413): avc: denied { create } for pid=16353 comm="syz.1.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1492.049721][ T31] audit: type=1400 audit(1491.940:414): avc: denied { accept } for pid=16353 comm="syz.1.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1495.086650][ T31] audit: type=1400 audit(1494.980:415): avc: denied { read } for pid=16364 comm="syz.0.3918" path="socket:[38988]" dev="sockfs" ino=38988 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1499.412348][ T31] audit: type=1400 audit(1499.290:416): avc: denied { ioctl } for pid=16384 comm="syz.0.3926" path="/dev/usbmon2" dev="devtmpfs" ino=688 ioctlcmd=0x5441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1499.443405][ T31] audit: type=1400 audit(1499.330:417): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1499.494110][ T31] audit: type=1400 audit(1499.390:418): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1499.495844][ T31] audit: type=1400 audit(1499.390:419): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1499.705982][ T31] audit: type=1400 audit(1499.600:420): avc: denied { read } for pid=16386 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1500.133256][ T31] audit: type=1400 audit(1499.980:421): avc: denied { create } for pid=16389 comm="syz.1.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1500.133682][ T31] audit: type=1400 audit(1499.990:422): avc: denied { create } for pid=16388 comm="syz.0.3929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1500.133968][ T31] audit: type=1400 audit(1499.990:423): avc: denied { ioctl } for pid=16389 comm="syz.1.3928" path="socket:[39032]" dev="sockfs" ino=39032 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1500.134171][ T31] audit: type=1400 audit(1500.000:424): avc: denied { ioctl } for pid=16388 comm="syz.0.3929" path="socket:[38131]" dev="sockfs" ino=38131 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1500.134727][ T31] audit: type=1400 audit(1500.000:425): avc: denied { bind } for pid=16389 comm="syz.1.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1500.134946][ T31] audit: type=1400 audit(1500.000:426): avc: denied { module_request } for pid=16388 comm="syz.0.3929" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1500.135141][ T31] audit: type=1400 audit(1500.000:427): avc: denied { write } for pid=16389 comm="syz.1.3928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1500.343088][ T31] audit: type=1400 audit(1500.230:428): avc: denied { sys_module } for pid=16388 comm="syz.0.3929" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1501.030590][ T31] audit: type=1400 audit(1500.920:429): avc: denied { create } for pid=16395 comm="syz.0.3930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1501.056161][ T31] audit: type=1400 audit(1500.950:430): avc: denied { read } for pid=16395 comm="syz.0.3930" dev="nsfs" ino=4026532687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1508.828138][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1508.828706][ T31] audit: type=1400 audit(1508.720:449): avc: denied { map } for pid=16445 comm="syz.1.3947" path="socket:[39082]" dev="sockfs" ino=39082 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1509.057512][ T31] audit: type=1400 audit(1508.950:450): avc: denied { read } for pid=16448 comm="syz.0.3948" path="socket:[38264]" dev="sockfs" ino=38264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1512.944144][ T31] audit: type=1400 audit(1512.840:451): avc: denied { mounton } for pid=16465 comm="syz.1.3955" path="/2286/file0" dev="tmpfs" ino=11689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1512.985789][ T31] audit: type=1400 audit(1512.880:452): avc: denied { mount } for pid=16465 comm="syz.1.3955" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1513.674498][ T31] audit: type=1400 audit(1513.530:453): avc: denied { create } for pid=16465 comm="syz.1.3955" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:fusefs_t tclass=chr_file permissive=1 [ 1513.994674][ T31] audit: type=1400 audit(1513.890:454): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1517.403338][ T31] audit: type=1400 audit(1517.280:455): avc: denied { getopt } for pid=16486 comm="syz.1.3960" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1517.403859][ T31] audit: type=1400 audit(1517.290:456): avc: denied { create } for pid=16486 comm="syz.1.3960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1517.420098][ T31] audit: type=1400 audit(1517.310:457): avc: denied { setopt } for pid=16486 comm="syz.1.3960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1519.217742][T16501] Invalid ELF header magic: != ELF [ 1519.218849][ T31] audit: type=1400 audit(1519.110:458): avc: denied { module_load } for pid=16492 comm="syz.1.3962" path="/sys/kernel/notes" dev="sysfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1521.114466][ T31] audit: type=1400 audit(1521.010:459): avc: denied { write } for pid=16509 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1521.116615][ T31] audit: type=1400 audit(1521.010:460): avc: denied { open } for pid=16509 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1521.148693][ T31] audit: type=1400 audit(1521.040:461): avc: denied { search } for pid=16509 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.150683][ T31] audit: type=1400 audit(1521.040:462): avc: denied { search } for pid=16509 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.153683][ T31] audit: type=1400 audit(1521.040:463): avc: denied { search } for pid=16509 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.156178][ T31] audit: type=1400 audit(1521.040:464): avc: denied { search } for pid=16509 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.200517][ T31] audit: type=1400 audit(1521.090:465): avc: denied { read open } for pid=16511 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.204804][ T31] audit: type=1400 audit(1521.090:466): avc: denied { getattr } for pid=16511 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1521.325956][ T31] audit: type=1400 audit(1521.220:467): avc: denied { add_name } for pid=16509 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1524.475147][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1524.476426][ T31] audit: type=1400 audit(1524.370:486): avc: denied { prog_load } for pid=16524 comm="syz.1.3972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1524.479150][ T31] audit: type=1400 audit(1524.370:487): avc: denied { bpf } for pid=16524 comm="syz.1.3972" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1524.481397][ T31] audit: type=1400 audit(1524.370:488): avc: denied { perfmon } for pid=16524 comm="syz.1.3972" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1524.638232][ T31] audit: type=1400 audit(1524.530:489): avc: denied { read } for pid=16534 comm="syz.1.3975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1528.643703][ T31] audit: type=1400 audit(1528.530:490): avc: denied { create } for pid=16551 comm="syz.0.3981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1529.913384][ T31] audit: type=1400 audit(1529.710:491): avc: denied { append } for pid=16560 comm="syz.0.3984" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1529.914007][ T31] audit: type=1400 audit(1529.780:492): avc: denied { bind } for pid=16560 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1529.914344][ T31] audit: type=1400 audit(1529.780:493): avc: denied { shutdown } for pid=16560 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1530.057686][ T31] audit: type=1400 audit(1529.950:494): avc: denied { create } for pid=16565 comm="syz.0.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1530.074462][ T31] audit: type=1400 audit(1529.970:495): avc: denied { write } for pid=16565 comm="syz.0.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1530.079861][ T31] audit: type=1400 audit(1529.970:496): avc: denied { ioctl } for pid=16565 comm="syz.0.3987" path="socket:[39339]" dev="sockfs" ino=39339 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1530.413091][T14180] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 1530.574740][T14180] usb 2-1: device descriptor read/64, error -71 [ 1530.615106][ T31] audit: type=1400 audit(1530.510:497): avc: denied { create } for pid=16571 comm="syz.0.3988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1530.627367][ T31] audit: type=1400 audit(1530.520:498): avc: denied { ioctl } for pid=16571 comm="syz.0.3988" path="socket:[39346]" dev="sockfs" ino=39346 ioctlcmd=0xaa02 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1530.833614][T14180] usb 2-1: new high-speed USB device number 44 using dummy_hcd [ 1531.013664][T14180] usb 2-1: device descriptor read/64, error -71 [ 1531.115434][ T31] audit: type=1400 audit(1530.970:499): avc: denied { getopt } for pid=16575 comm="syz.0.3989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1531.129920][T14180] usb usb2-port1: attempt power cycle [ 1531.493476][T14180] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 1531.545300][T14180] usb 2-1: device descriptor read/8, error -71 [ 1531.793857][T14180] usb 2-1: new high-speed USB device number 46 using dummy_hcd [ 1531.823336][T14180] usb 2-1: device descriptor read/8, error -71 [ 1531.934794][T14180] usb usb2-port1: unable to enumerate USB device [ 1533.686420][ T31] audit: type=1400 audit(1533.580:500): avc: denied { write } for pid=16597 comm="syz.0.3999" name="dev" dev="proc" ino=4026532701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1540.989620][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1540.991087][ T31] audit: type=1400 audit(1540.880:502): avc: denied { create } for pid=16608 comm="syz.1.4002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1541.009508][ T31] audit: type=1400 audit(1540.900:503): avc: denied { getopt } for pid=16608 comm="syz.1.4002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1543.253115][ T31] audit: type=1400 audit(1543.140:504): avc: denied { mounton } for pid=16626 comm="syz.0.4008" path="/1701/file1" dev="tmpfs" ino=8763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1543.353075][ T31] audit: type=1400 audit(1543.240:505): avc: denied { read write } for pid=16626 comm="syz.0.4008" name="rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/usr/sbin/cups-browsed" [ 1543.353740][ T31] audit: type=1400 audit(1543.240:506): avc: denied { open } for pid=16626 comm="syz.0.4008" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/usr/sbin/cups-browsed" [ 1543.444144][ T31] audit: type=1400 audit(1543.340:507): avc: denied { execmem } for pid=16626 comm="syz.0.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1543.678401][ T31] audit: type=1400 audit(1543.570:508): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1545.079383][ T31] audit: type=1400 audit(1544.970:509): avc: denied { create } for pid=16633 comm="syz.0.4010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1545.375445][ T31] audit: type=1400 audit(1545.270:510): avc: denied { ioctl } for pid=16633 comm="syz.0.4010" path="socket:[38512]" dev="sockfs" ino=38512 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1546.943337][ T31] audit: type=1400 audit(1546.810:511): avc: denied { bind } for pid=16645 comm="syz.0.4014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1546.943801][ T31] audit: type=1400 audit(1546.810:512): avc: denied { accept } for pid=16645 comm="syz.0.4014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1546.944175][ T31] audit: type=1400 audit(1546.810:513): avc: denied { write } for pid=16645 comm="syz.0.4014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1547.862142][T16657] FAULT_INJECTION: forcing a failure. [ 1547.862142][T16657] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.895420][T16657] CPU: 1 UID: 0 PID: 16657 Comm: syz.1.4019 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1547.895543][T16657] Hardware name: ARM-Versatile Express [ 1547.895572][T16657] Call trace: [ 1547.895614][T16657] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1547.895733][T16657] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1547.895754][T16657] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1547.895806][T16657] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1547.895857][T16657] r5:840bb000 r4:82919a80 [ 1547.895875][T16657] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1547.895935][T16657] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1547.895999][T16657] r8:840bb000 r7:00000c40 r6:83b32b68 r5:00001000 r4:830016c0 [ 1547.896019][T16657] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1547.896068][T16657] [<80500f14>] (__kmalloc_noprof) from [<807baf0c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1547.896132][T16657] r10:840bb000 r9:8309f800 r8:00000000 r7:837c0aa0 r6:83b32b68 r5:00001000 [ 1547.896153][T16657] r4:00000000 [ 1547.896169][T16657] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1547.896243][T16657] r10:840bb000 r9:00000000 r8:00000003 r7:00005450 r6:00000004 r5:81cd6278 [ 1547.896266][T16657] r4:83b32b68 r3:826c0200 [ 1547.896281][T16657] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1547.896343][T16657] r9:83b32b40 r8:00000003 r7:00000000 r6:00000000 r5:00005450 r4:83b32b40 [ 1547.896362][T16657] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1547.896411][T16657] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1547.896467][T16657] r7:00000000 r6:83b32b41 r5:00000000 r4:00005450 [ 1547.896485][T16657] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1547.896526][T16657] Exception stack(0xed479fa8 to 0xed479ff0) [ 1547.896562][T16657] 9fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 1547.896597][T16657] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b870bc [ 1547.896623][T16657] 9fe0: 76b86ec0 76b86eb0 000193a4 00131fc0 [ 1547.896655][T16657] r10:00000036 r9:840bb000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1547.896673][T16657] r4:00000000 [ 1547.973437][T16657] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1548.426475][ T31] audit: type=1400 audit(1548.320:514): avc: denied { create } for pid=16660 comm="syz.1.4020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1548.699654][ T31] audit: type=1400 audit(1548.590:515): avc: denied { read } for pid=16660 comm="syz.1.4020" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1548.700160][ T31] audit: type=1400 audit(1548.590:516): avc: denied { open } for pid=16660 comm="syz.1.4020" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1549.705201][ T31] audit: type=1400 audit(1549.600:517): avc: denied { create } for pid=16669 comm="syz.1.4023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1549.754709][ T31] audit: type=1400 audit(1549.650:518): avc: denied { ioctl } for pid=16669 comm="syz.1.4023" path="socket:[39505]" dev="sockfs" ino=39505 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1550.336786][ T31] audit: type=1400 audit(1550.230:519): avc: denied { read } for pid=16675 comm="syz.1.4026" path="socket:[38610]" dev="sockfs" ino=38610 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1550.982181][ T31] audit: type=1400 audit(1550.870:520): avc: denied { setopt } for pid=16683 comm="syz.0.4031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1552.214505][T16699] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16699 comm=syz.0.4037 [ 1553.045322][ T31] audit: type=1400 audit(1552.940:521): avc: denied { setopt } for pid=16707 comm="syz.0.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1553.048109][ T31] audit: type=1400 audit(1552.940:522): avc: denied { connect } for pid=16707 comm="syz.0.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1553.071698][ T31] audit: type=1400 audit(1552.960:523): avc: denied { write } for pid=16707 comm="syz.0.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1560.747007][ T31] audit: type=1400 audit(1560.640:524): avc: denied { name_bind } for pid=16754 comm="syz.1.4060" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1560.747465][ T31] audit: type=1400 audit(1560.640:525): avc: denied { node_bind } for pid=16754 comm="syz.1.4060" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1560.765221][T16755] FAULT_INJECTION: forcing a failure. [ 1560.765221][T16755] name failslab, interval 1, probability 0, space 0, times 0 [ 1560.765751][T16755] CPU: 0 UID: 0 PID: 16755 Comm: syz.1.4060 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1560.765835][T16755] Hardware name: ARM-Versatile Express [ 1560.765863][T16755] Call trace: [ 1560.765915][T16755] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1560.766009][T16755] r7:83a63000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1560.766131][T16755] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1560.766290][T16755] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1560.766415][T16755] r5:83a63000 r4:82919a80 [ 1560.766433][T16755] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1560.766592][T16755] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1560.766795][T16755] r8:00000000 r7:83a63000 r6:00000cc0 r5:edb6de28 r4:830a8b40 [ 1560.766872][T16755] [<8051c1b0>] (should_failslab) from [<805008f8>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 1560.767148][T16755] [<805008a8>] (kmem_cache_alloc_lru_noprof) from [<8056c4c4>] (__d_alloc+0x30/0x220) [ 1560.767225][T16755] r10:829e5ce8 r9:8245e83c r8:8309f800 r7:83a63000 r6:81e53d00 r5:edb6de28 [ 1560.767300][T16755] r4:00000002 [ 1560.767325][T16755] [<8056c494>] (__d_alloc) from [<8056f7f8>] (d_alloc_pseudo+0x14/0x50) [ 1560.767385][T16755] r9:8309f800 r8:830af610 r7:83a63000 r6:81e53d00 r5:8309f800 r4:00000002 [ 1560.767404][T16755] [<8056f7e4>] (d_alloc_pseudo) from [<805505c0>] (alloc_file_pseudo+0x6c/0x104) [ 1560.767458][T16755] r5:85081c00 r4:00000002 [ 1560.767474][T16755] [<80550554>] (alloc_file_pseudo) from [<81529118>] (sock_alloc_file+0x48/0xc4) [ 1560.767548][T16755] r10:81e7824c r9:83b32cc0 r8:00000000 r7:00000000 r6:85081c00 r5:85081b80 [ 1560.767566][T16755] r4:837e0280 [ 1560.767580][T16755] [<815290d0>] (sock_alloc_file) from [<8152c470>] (do_accept+0xa0/0x174) [ 1560.767631][T16755] r6:edb6df5c r5:85081b80 r4:837e0280 [ 1560.767648][T16755] [<8152c3d0>] (do_accept) from [<8152c5cc>] (__sys_accept4+0x88/0xf4) [ 1560.767774][T16755] r10:0000011d r9:83b32cc0 r8:00000000 r7:00000000 r6:00000006 r5:00000000 [ 1560.767929][T16755] r4:83b32cc1 [ 1560.768051][T16755] [<8152c544>] (__sys_accept4) from [<8152c660>] (sys_accept+0x14/0x18) [ 1560.768244][T16755] r9:83a63000 r8:8020029c r7:0000011d r6:0012ff70 r5:00000000 r4:00000000 [ 1560.768468][T16755] [<8152c64c>] (sys_accept) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1560.768651][T16755] Exception stack(0xedb6dfa8 to 0xedb6dff0) [ 1560.768695][T16755] dfa0: 00000000 00000000 00000004 00000000 00000000 00000000 [ 1560.768824][T16755] dfc0: 00000000 00000000 0012ff70 0000011d 002e0000 00000000 00006364 76b870bc [ 1560.768916][T16755] dfe0: 76b86ec0 76b86eb0 000193a4 00131fc0 [ 1561.443096][ T31] audit: type=1400 audit(1561.330:526): avc: denied { allowed } for pid=16756 comm="syz.0.4061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1561.475193][ T31] audit: type=1400 audit(1561.370:527): avc: denied { create } for pid=16756 comm="syz.0.4061" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1561.477742][ T31] audit: type=1400 audit(1561.370:528): avc: denied { map } for pid=16756 comm="syz.0.4061" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38761 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1561.477980][ T31] audit: type=1400 audit(1561.370:529): avc: denied { read write } for pid=16756 comm="syz.0.4061" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38761 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1562.478315][ T31] audit: type=1400 audit(1562.370:530): avc: denied { setattr } for pid=16769 comm="syz.0.4066" name="" dev="pipefs" ino=38781 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1563.694398][ T31] audit: type=1400 audit(1563.580:531): avc: denied { prog_run } for pid=16780 comm="syz.0.4070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1564.268528][T16784] __nla_validate_parse: 23 callbacks suppressed [ 1564.269134][T16784] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4070'. [ 1564.558051][ T31] audit: type=1400 audit(1564.450:532): avc: denied { read } for pid=16780 comm="syz.0.4070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1570.159113][ T31] audit: type=1400 audit(1570.050:533): avc: denied { write } for pid=16796 comm="syz.1.4074" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 1570.161622][ T31] audit: type=1400 audit(1570.050:534): avc: denied { open } for pid=16796 comm="syz.1.4074" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 1575.983931][ T31] audit: type=1400 audit(1575.880:535): avc: denied { map_create } for pid=16806 comm="syz.1.4076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1575.999065][ T31] audit: type=1400 audit(1575.890:536): avc: denied { create } for pid=16806 comm="syz.1.4076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1576.012066][ T31] audit: type=1400 audit(1575.900:537): avc: denied { write } for pid=16806 comm="syz.1.4076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1576.012981][ T31] audit: type=1400 audit(1575.900:538): avc: denied { nlmsg_write } for pid=16806 comm="syz.1.4076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1576.053447][ T31] audit: type=1400 audit(1575.920:539): avc: denied { accept } for pid=16806 comm="syz.1.4076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1582.986749][ T31] audit: type=1400 audit(1582.870:540): avc: denied { ioctl } for pid=16839 comm="syz.1.4090" path="socket:[38878]" dev="sockfs" ino=38878 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1583.383789][ T31] audit: type=1400 audit(1583.210:541): avc: denied { ioctl } for pid=16843 comm="syz.1.4091" path="pid:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1584.316431][T16857] FAULT_INJECTION: forcing a failure. [ 1584.316431][T16857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1584.317397][T16857] CPU: 0 UID: 0 PID: 16857 Comm: syz.0.4097 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1584.317494][T16857] Hardware name: ARM-Versatile Express [ 1584.317510][T16857] Call trace: [ 1584.317539][T16857] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1584.317609][T16857] r7:854e8000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1584.317618][T16857] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1584.317642][T16857] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1584.317691][T16857] r5:84b8c800 r4:82950610 [ 1584.317708][T16857] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1584.317756][T16857] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1584.317787][T16857] r8:dfa35ecc r7:854e8000 r6:20000040 r5:00000000 r4:dfa35e28 [ 1584.317795][T16857] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1584.317820][T16857] [<80964dd8>] (should_fail_usercopy) from [<8152af74>] (get_user_ifreq+0x1c/0xa0) [ 1584.317847][T16857] [<8152af58>] (get_user_ifreq) from [<8176c3b0>] (inet_ioctl+0x198/0x268) [ 1584.317877][T16857] r7:854e8000 r6:20000040 r5:84da3800 r4:00008934 [ 1584.317888][T16857] [<8176c218>] (inet_ioctl) from [<8152bb78>] (sock_ioctl+0x4c4/0x600) [ 1584.317946][T16857] r7:85080a00 r6:854e8000 r5:20000040 r4:00008934 [ 1584.317963][T16857] [<8152b6b4>] (sock_ioctl) from [<805679c4>] (sys_ioctl+0x130/0xdc8) [ 1584.317996][T16857] r9:87849600 r8:00000003 r7:20000040 r6:87849601 r5:00000000 r4:00008934 [ 1584.318005][T16857] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1584.318026][T16857] Exception stack(0xdfa35fa8 to 0xdfa35ff0) [ 1584.318043][T16857] 5fa0: 00000000 00000000 00000003 00008934 20000040 00000000 [ 1584.318059][T16857] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1584.318071][T16857] 5fe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1584.318088][T16857] r10:00000036 r9:84b8c800 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1584.318098][T16857] r4:00000000 [ 1585.883467][T16869] cgroup: Unknown subsys name 'fowner' [ 1593.113064][ T31] audit: type=1400 audit(1592.950:542): avc: denied { create } for pid=16894 comm="syz.0.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1593.344943][ T31] audit: type=1400 audit(1593.240:543): avc: denied { ioctl } for pid=16898 comm="syz.0.4115" path="socket:[40975]" dev="sockfs" ino=40975 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1593.887569][ T31] audit: type=1400 audit(1593.780:544): avc: denied { read } for pid=16902 comm="syz.0.4117" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 1593.896420][ T31] audit: type=1400 audit(1593.790:545): avc: denied { ioctl } for pid=16902 comm="syz.0.4117" path="/dev/zero" dev="devtmpfs" ino=5 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 1594.038369][T16905] FAULT_INJECTION: forcing a failure. [ 1594.038369][T16905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1594.038827][T16905] CPU: 1 UID: 0 PID: 16905 Comm: syz.1.4118 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1594.038901][T16905] Hardware name: ARM-Versatile Express [ 1594.038926][T16905] Call trace: [ 1594.038983][T16905] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1594.039075][T16905] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1594.039096][T16905] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1594.039215][T16905] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1594.039277][T16905] r5:83a63c00 r4:82950610 [ 1594.039352][T16905] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1594.039456][T16905] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1594.039616][T16905] r8:76b86f30 r7:00000000 r6:00000000 r5:dfd89f68 r4:00000002 [ 1594.039638][T16905] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1594.039803][T16905] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1594.039873][T16905] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1594.040004][T16905] r10:00000001 r9:8060179c r8:00000002 r7:dfd89f68 r6:0000000f r5:76b86f30 [ 1594.040060][T16905] r4:83a63c00 r3:dfd89e9f [ 1594.040077][T16905] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1594.040267][T16905] r8:76b86f30 r7:dfd89f68 r6:83a63c00 r5:0000000f r4:83b32a80 [ 1594.040461][T16905] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1594.040561][T16905] r10:00000003 r9:83a63c00 r8:8020029c r7:00000000 r6:00000000 r5:83b32a80 [ 1594.040719][T16905] r4:83b32a83 [ 1594.041082][T16905] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1594.041311][T16905] r7:00000003 r6:00000005 r5:76b86f30 r4:0000000f [ 1594.041335][T16905] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1594.041742][T16905] Exception stack(0xdfd89fa8 to 0xdfd89ff0) [ 1594.041792][T16905] 9fa0: 0000000f 76b86f30 00000005 76b86f30 0000000f 00000000 [ 1594.041830][T16905] 9fc0: 0000000f 76b86f30 00000005 00000003 002e0000 00000000 00006364 76b870bc [ 1594.042040][T16905] 9fe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1595.034599][ T31] audit: type=1400 audit(1594.930:546): avc: denied { map } for pid=16902 comm="syz.0.4117" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 1598.687719][T16947] FAULT_INJECTION: forcing a failure. [ 1598.687719][T16947] name failslab, interval 1, probability 0, space 0, times 0 [ 1598.689699][T16947] CPU: 0 UID: 0 PID: 16947 Comm: syz.0.4132 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1598.689816][T16947] Hardware name: ARM-Versatile Express [ 1598.689841][T16947] Call trace: [ 1598.689880][T16947] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1598.689993][T16947] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4e0 [ 1598.690012][T16947] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1598.690062][T16947] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1598.690120][T16947] r5:84b8d400 r4:82919a80 [ 1598.690135][T16947] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1598.690197][T16947] [<80964b98>] (should_fail_ex) from [<8051c21c>] (should_failslab+0x6c/0x94) [ 1598.690274][T16947] r8:84b8d400 r7:00000d40 r6:87849f28 r5:00000019 r4:83001240 [ 1598.690292][T16947] [<8051c1b0>] (should_failslab) from [<80500fb0>] (__kmalloc_noprof+0x9c/0x458) [ 1598.690337][T16947] [<80500f14>] (__kmalloc_noprof) from [<807bae14>] (tomoyo_encode2+0x64/0xf0) [ 1598.690399][T16947] r10:00000fff r9:8309f800 r8:00000000 r7:837c1a18 r6:87849f28 r5:85a3dffd [ 1598.690419][T16947] r4:85a3dfef [ 1598.690434][T16947] [<807badb0>] (tomoyo_encode2) from [<807baec4>] (tomoyo_encode+0x24/0x30) [ 1598.690488][T16947] r9:8309f800 r8:00000000 r7:837c1a18 r6:87849f28 r5:00001000 r4:85a3dff0 [ 1598.690504][T16947] [<807baea0>] (tomoyo_encode) from [<807baf50>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1598.690683][T16947] r5:00001000 r4:85a3d000 [ 1598.690708][T16947] [<807baed0>] (tomoyo_realpath_from_path) from [<807b7050>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1598.690806][T16947] r10:84b8d400 r9:00000000 r8:00000003 r7:00008983 r6:00000004 r5:81cd6278 [ 1598.690840][T16947] r4:87849f28 r3:826c0200 [ 1598.690867][T16947] [<807b6f84>] (tomoyo_path_number_perm) from [<807bb930>] (tomoyo_file_ioctl+0x1c/0x20) [ 1598.690963][T16947] r9:87849f00 r8:00000003 r7:20000080 r6:20000080 r5:00008983 r4:87849f00 [ 1598.690989][T16947] [<807bb914>] (tomoyo_file_ioctl) from [<807688b4>] (security_file_ioctl+0x64/0x1e4) [ 1598.691057][T16947] [<80768850>] (security_file_ioctl) from [<805678e0>] (sys_ioctl+0x4c/0xdc8) [ 1598.691142][T16947] r7:20000080 r6:87849f01 r5:00000000 r4:00008983 [ 1598.691167][T16947] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1598.691232][T16947] Exception stack(0xdfc79fa8 to 0xdfc79ff0) [ 1598.691295][T16947] 9fa0: 00000000 00000000 00000003 00008983 20000080 00000000 [ 1598.691348][T16947] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76bf70bc [ 1598.691383][T16947] 9fe0: 76bf6ec0 76bf6eb0 000193a4 00131fc0 [ 1598.691430][T16947] r10:00000036 r9:84b8d400 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 1598.691456][T16947] r4:00000000 [ 1598.708925][T16947] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1599.378396][T16962] FAULT_INJECTION: forcing a failure. [ 1599.378396][T16962] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.380062][T16962] CPU: 0 UID: 0 PID: 16962 Comm: syz.1.4136 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 1599.380166][T16962] Hardware name: ARM-Versatile Express [ 1599.380194][T16962] Call trace: [ 1599.380235][T16962] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1599.380325][T16962] r7:00000000 r6:00000000 r5:60000013 r4:8225b4e0 [ 1599.380341][T16962] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 1599.380386][T16962] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1599.380433][T16962] r5:84b8d400 r4:82950610 [ 1599.380446][T16962] [<8021fe1c>] (dump_stack) from [<80964d5c>] (should_fail_ex+0x1c4/0x228) [ 1599.380505][T16962] [<80964b98>] (should_fail_ex) from [<80964dd4>] (should_fail+0x14/0x18) [ 1599.380561][T16962] r8:76b86f30 r7:00000000 r6:00000000 r5:e030df68 r4:00000002 [ 1599.380575][T16962] [<80964dc0>] (should_fail) from [<80964df4>] (should_fail_usercopy+0x1c/0x20) [ 1599.380621][T16962] [<80964dd8>] (should_fail_usercopy) from [<805895f0>] (simple_read_from_buffer+0x80/0x13c) [ 1599.380673][T16962] [<80589570>] (simple_read_from_buffer) from [<80601854>] (proc_fail_nth_read+0xb8/0x100) [ 1599.380736][T16962] r10:00000001 r9:8060179c r8:00000002 r7:e030df68 r6:0000000f r5:76b86f30 [ 1599.380758][T16962] r4:84b8d400 r3:e030de9f [ 1599.380772][T16962] [<8060179c>] (proc_fail_nth_read) from [<8054dc68>] (vfs_read+0x98/0x320) [ 1599.380830][T16962] r8:76b86f30 r7:e030df68 r6:84b8d400 r5:0000000f r4:87849240 [ 1599.380845][T16962] [<8054dbd0>] (vfs_read) from [<8054e910>] (ksys_read+0x74/0xe8) [ 1599.380899][T16962] r10:00000003 r9:84b8d400 r8:8020029c r7:00000000 r6:00000000 r5:87849240 [ 1599.380917][T16962] r4:87849243 [ 1599.380930][T16962] [<8054e89c>] (ksys_read) from [<8054e994>] (sys_read+0x10/0x14) [ 1599.381007][T16962] r7:00000003 r6:00000004 r5:76b86f30 r4:0000000f [ 1599.381021][T16962] [<8054e984>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1599.381062][T16962] Exception stack(0xe030dfa8 to 0xe030dff0) [ 1599.381092][T16962] dfa0: 0000000f 76b86f30 00000004 76b86f30 0000000f 00000000 [ 1599.381121][T16962] dfc0: 0000000f 76b86f30 00000004 00000003 002e0000 00000000 00006364 76b870bc [ 1599.381144][T16962] dfe0: 00000158 76b86ed0 000d7df0 0012fe94 [ 1599.473481][ T7178] usb 1-1: new low-speed USB device number 37 using dummy_hcd [ 1599.624003][ T7178] usb 1-1: Invalid ep0 maxpacket: 32 [ 1599.753682][ T7178] usb 1-1: new low-speed USB device number 38 using dummy_hcd [ 1599.946934][ T7178] usb 1-1: Invalid ep0 maxpacket: 32 [ 1599.948225][ T7178] usb usb1-port1: attempt power cycle [ 1600.303606][ T7178] usb 1-1: new low-speed USB device number 39 using dummy_hcd [ 1600.333219][ T7178] usb 1-1: Invalid ep0 maxpacket: 32 [ 1600.463151][ T7178] usb 1-1: new low-speed USB device number 40 using dummy_hcd [ 1600.493135][ T7178] usb 1-1: Invalid ep0 maxpacket: 32 [ 1600.494224][ T7178] usb usb1-port1: unable to enumerate USB device [ 1611.414330][ T31] audit: type=1400 audit(1611.280:547): avc: denied { getopt } for pid=17054 comm="syz.1.4146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1611.492233][ T31] audit: type=1400 audit(1611.370:548): avc: denied { create } for pid=17054 comm="syz.1.4146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1611.733400][T14180] usb 1-1: new low-speed USB device number 41 using dummy_hcd [ 1611.966981][T14180] usb 1-1: Invalid ep0 maxpacket: 32 [ 1612.094432][T14180] usb 1-1: new low-speed USB device number 42 using dummy_hcd [ 1612.243383][T14180] usb 1-1: Invalid ep0 maxpacket: 32 [ 1612.245556][T14180] usb usb1-port1: attempt power cycle [ 1612.593225][T14180] usb 1-1: new low-speed USB device number 43 using dummy_hcd [ 1612.624527][T14180] usb 1-1: Invalid ep0 maxpacket: 32 [ 1612.763412][T14180] usb 1-1: new low-speed USB device number 44 using dummy_hcd [ 1612.795853][T14180] usb 1-1: Invalid ep0 maxpacket: 32 [ 1612.797423][T14180] usb usb1-port1: unable to enumerate USB device [ 1617.944884][ T31] audit: type=1400 audit(1617.840:549): avc: denied { shutdown } for pid=17085 comm="syz.0.4153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1618.312115][ T31] audit: type=1400 audit(1618.200:550): avc: denied { lock } for pid=17085 comm="syz.0.4153" path="socket:[41194]" dev="sockfs" ino=41194 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1618.376619][ T31] audit: type=1400 audit(1618.270:551): avc: denied { setopt } for pid=17085 comm="syz.0.4153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1622.145672][ T31] audit: type=1400 audit(1622.040:552): avc: denied { write } for pid=17114 comm="syz.0.4165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1622.203980][ T31] audit: type=1400 audit(1622.080:553): avc: denied { read write } for pid=17114 comm="syz.0.4165" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 1622.204558][ T31] audit: type=1400 audit(1622.080:554): avc: denied { open } for pid=17114 comm="syz.0.4165" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 1622.205154][ T31] audit: type=1400 audit(1622.090:555): avc: denied { ioctl } for pid=17114 comm="syz.0.4165" path="/dev/vcsu" dev="devtmpfs" ino=14 ioctlcmd=0x5512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 1624.284324][T17136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17136 comm=syz.0.4173 [ 1626.328057][ T31] audit: type=1400 audit(1626.220:556): avc: denied { read } for pid=17145 comm="syz.1.4177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1627.443235][ T31] audit: type=1400 audit(1627.330:557): avc: denied { write } for pid=17154 comm="syz.0.4180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1627.945542][T17162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17162 comm=syz.1.4177 [ 1628.320424][ T7178] usb 1-1: new high-speed USB device number 45 using dummy_hcd [ 1628.584393][ T7178] usb 1-1: Using ep0 maxpacket: 32 [ 1628.600751][ T7178] usb 1-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 8 [ 1628.601200][ T7178] usb 1-1: config 1 interface 0 altsetting 6 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1628.601689][ T7178] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1628.626389][ T7178] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1628.626765][ T7178] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1628.627093][ T7178] usb 1-1: Product: syz [ 1628.627160][ T7178] usb 1-1: Manufacturer: syz [ 1628.627221][ T7178] usb 1-1: SerialNumber: syz [ 1628.647641][T17163] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1629.290163][ T7178] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1629.300271][ T7178] usb 1-1: USB disconnect, device number 45 [ 1629.657395][ T31] audit: type=1400 audit(1629.510:558): avc: denied { execute } for pid=17173 comm="syz.1.4182" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1053 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1632.999017][ T31] audit: type=1400 audit(1632.890:559): avc: denied { execute } for pid=17187 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1633.006734][ T31] audit: type=1400 audit(1632.900:560): avc: denied { execute_no_trans } for pid=17187 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1633.052911][ T31] audit: type=1400 audit(1632.940:561): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1633.212052][ T2947] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1633.266629][ T2947] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1633.326619][ T2947] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1633.387266][ T2947] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1633.947585][ T2947] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1633.960862][ T2947] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1633.969920][ T2947] bond0 (unregistering): Released all slaves [ 1634.087694][ T2947] hsr_slave_0: left promiscuous mode [ 1634.089328][ T2947] hsr_slave_1: left promiscuous mode [ 1634.115406][ T2947] veth1_macvtap: left promiscuous mode [ 1634.115814][ T2947] veth0_macvtap: left promiscuous mode [ 1634.116076][ T2947] veth1_vlan: left promiscuous mode [ 1634.116137][ T2947] veth0_vlan: left promiscuous mode [ 1636.374109][T17190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1636.394257][T17190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1637.829360][T17190] hsr_slave_0: entered promiscuous mode [ 1637.831232][T17190] hsr_slave_1: entered promiscuous mode [ 1638.938675][T17190] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1638.966268][T17190] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1638.981692][T17190] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1639.026548][T17190] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1640.075502][T17190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1644.025901][T17190] veth0_vlan: entered promiscuous mode [ 1644.059844][T17190] veth1_vlan: entered promiscuous mode [ 1644.150087][T17190] veth0_macvtap: entered promiscuous mode [ 1644.161000][T17190] veth1_macvtap: entered promiscuous mode [ 1644.232018][T17190] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1644.237129][T17190] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1644.238339][T17190] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1644.239476][T17190] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1644.426449][ T31] audit: type=1400 audit(1644.320:562): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/syzkaller.6O22CD/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1644.436704][ T31] audit: type=1400 audit(1644.330:563): avc: denied { mount } for pid=17190 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1644.463985][ T31] audit: type=1400 audit(1644.350:564): avc: denied { mount } for pid=17190 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1644.464506][ T31] audit: type=1400 audit(1644.350:565): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/syzkaller.6O22CD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1644.475387][ T31] audit: type=1400 audit(1644.360:566): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/syzkaller.6O22CD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=41617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1644.482962][ T31] audit: type=1400 audit(1644.370:567): avc: denied { unmount } for pid=17190 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1644.489511][ T31] audit: type=1400 audit(1644.380:568): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1644.489783][ T31] audit: type=1400 audit(1644.380:569): avc: denied { mount } for pid=17190 comm="syz-executor" name="/" dev="gadgetfs" ino=2415 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1644.491327][ T31] audit: type=1400 audit(1644.380:570): avc: denied { mount } for pid=17190 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1644.493105][ T31] audit: type=1400 audit(1644.380:571): avc: denied { mounton } for pid=17190 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1649.698068][ T2947] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1649.809958][ T2947] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1649.939581][ T2947] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1650.100668][ T2947] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1651.401977][ T2947] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1651.494106][ T2947] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1651.514824][ T2947] bond0 (unregistering): Released all slaves [ 1651.773602][ T2947] hsr_slave_0: left promiscuous mode [ 1651.782908][ T2947] hsr_slave_1: left promiscuous mode [ 1651.857355][ T2947] veth1_macvtap: left promiscuous mode [ 1651.858574][ T2947] veth0_macvtap: left promiscuous mode [ 1651.861394][ T2947] veth1_vlan: left promiscuous mode [ 1651.864038][ T2947] veth0_vlan: left promiscuous mode [ 1655.428663][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1655.429149][ T31] audit: type=1400 audit(1655.320:574): avc: denied { setopt } for pid=17819 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1655.448650][T17822] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4209'. [ 1655.671968][ T31] audit: type=1400 audit(1655.560:575): avc: denied { bind } for pid=17819 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1655.686918][ T31] audit: type=1400 audit(1655.580:576): avc: denied { write } for pid=17819 comm="syz.0.4209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1656.585059][T17671] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1656.591138][T17671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1659.435762][T17671] hsr_slave_0: entered promiscuous mode [ 1659.437434][T17671] hsr_slave_1: entered promiscuous mode [ 1659.443043][T17671] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1659.443823][T17671] Cannot create hsr debugfs directory [ 1660.903276][ T31] audit: type=1400 audit(1660.790:577): avc: denied { name_bind } for pid=18067 comm="syz.0.4220" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1661.020178][T17671] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1661.037064][T17671] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1661.046184][T17671] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1661.069305][T17671] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1663.357469][T17671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1663.777964][T18115] bond0: option use_carrier: invalid value (2) [ 1665.645709][ T31] audit: type=1400 audit(1665.540:578): avc: denied { mount } for pid=18133 comm="syz.0.4231" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1666.793276][ T31] audit: type=1400 audit(1666.680:579): avc: denied { read } for pid=18152 comm="syz.0.4237" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 1666.793875][ T31] audit: type=1400 audit(1666.680:580): avc: denied { open } for pid=18152 comm="syz.0.4237" path="/dev/rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 1666.813906][ T31] audit: type=1400 audit(1666.710:581): avc: denied { ioctl } for pid=18152 comm="syz.0.4237" path="/dev/rtc0" dev="devtmpfs" ino=697 ioctlcmd=0x7014 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 1667.113649][T18158] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4238'. [ 1672.223433][T17671] veth0_vlan: entered promiscuous mode [ 1672.296489][T17671] veth1_vlan: entered promiscuous mode [ 1672.438447][T17671] veth0_macvtap: entered promiscuous mode [ 1672.460686][T17671] veth1_macvtap: entered promiscuous mode [ 1672.608097][T17671] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1672.608626][T17671] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1672.608765][T17671] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1672.608849][T17671] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1672.853964][T18213] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4248'. [ 1672.854893][T18213] netlink: 124 bytes leftover after parsing attributes in process `syz.0.4248'. [ 1673.334804][T18222] bond0: option resend_igmp: invalid value (1349619868) [ 1673.335360][T18222] bond0: option resend_igmp: allowed values 0 - 255 [ 1673.827822][ T31] audit: type=1400 audit(1673.720:582): avc: denied { connect } for pid=18232 comm="syz.1.4253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1673.856397][ T31] audit: type=1400 audit(1673.750:583): avc: denied { write } for pid=18232 comm="syz.1.4253" laddr=::1 lport=43247 faddr=::1 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1674.995769][ T31] audit: type=1400 audit(1674.890:584): avc: denied { ioctl } for pid=18246 comm="syz.0.4259" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=43117 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1678.117829][ T31] audit: type=1400 audit(1678.010:585): avc: denied { read } for pid=18271 comm="syz.0.4268" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1678.119176][ T31] audit: type=1400 audit(1678.010:586): avc: denied { open } for pid=18271 comm="syz.0.4268" path="/74/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1678.389684][T18285] netlink: 'syz.0.4271': attribute type 15 has an invalid length. [ 1678.691166][T18289] syzkaller0: entered promiscuous mode [ 1678.703780][T18289] syzkaller0: entered allmulticast mode [ 1679.094034][ T31] audit: type=1400 audit(1678.970:587): avc: denied { write } for pid=18297 comm="syz.1.4276" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:audisp_var_run_t:s0" [ 1680.042126][ T31] audit: type=1400 audit(1679.930:588): avc: denied { create } for pid=18309 comm="syz.0.4282" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1680.043650][ T31] audit: type=1400 audit(1679.930:589): avc: denied { write } for pid=18309 comm="syz.0.4282" name="file0" dev="tmpfs" ino=426 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1680.045606][ T31] audit: type=1400 audit(1679.930:590): avc: denied { open } for pid=18309 comm="syz.0.4282" path="/81/file0" dev="tmpfs" ino=426 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1680.047057][ T31] audit: type=1400 audit(1679.940:591): avc: denied { ioctl } for pid=18309 comm="syz.0.4282" path="/81/file0" dev="tmpfs" ino=426 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1680.067384][ T31] audit: type=1400 audit(1679.960:592): avc: denied { unlink } for pid=17190 comm="syz-executor" name="file0" dev="tmpfs" ino=426 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1680.195174][ T31] audit: type=1400 audit(1680.090:593): avc: denied { name_bind } for pid=18313 comm="syz.0.4284" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1685.285263][ T31] audit: type=1400 audit(1685.180:594): avc: denied { create } for pid=18372 comm="syz.1.4307" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1685.329148][ T31] audit: type=1400 audit(1685.220:595): avc: denied { mounton } for pid=18372 comm="syz.1.4307" path="/27/file0" dev="tmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1688.037014][ T31] audit: type=1400 audit(1687.930:596): avc: denied { unlink } for pid=17671 comm="syz-executor" name="file0" dev="tmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1692.209327][T18437] fuse: Bad value for 'fd' [ 1692.546257][ T31] audit: type=1400 audit(1692.440:597): avc: denied { setopt } for pid=18432 comm="syz.1.4331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1701.055963][ T31] audit: type=1400 audit(1700.940:598): avc: denied { module_load } for pid=18508 comm="syz.0.4365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1702.077630][ T31] audit: type=1400 audit(1701.960:599): avc: denied { bind } for pid=18521 comm="syz.1.4370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1702.078128][ T31] audit: type=1400 audit(1701.960:600): avc: denied { name_bind } for pid=18521 comm="syz.1.4370" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1702.078496][ T31] audit: type=1400 audit(1701.960:601): avc: denied { node_bind } for pid=18521 comm="syz.1.4370" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1710.018257][ T31] audit: type=1400 audit(1709.910:602): avc: denied { watch watch_reads } for pid=18577 comm="syz.1.4394" path="/proc/165" dev="proc" ino=42766 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1712.318046][T18603] fuse: Bad value for 'fd' [ 1713.880895][T18619] fuse: Bad value for 'fd' [ 1717.404325][T18653] ip6_tunnel: non-ECT from fe88:0000:0000:0000:0000:0000:0000:0101 with DS=0x91 [ 1719.025698][T18665] fuse: Bad value for 'fd' [ 1719.520645][T18673] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4426'. [ 1731.153609][T18757] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4460'. [ 1731.185564][T18757] netlink: 'syz.1.4460': attribute type 4 has an invalid length. [ 1740.779836][ T31] audit: type=1400 audit(1740.670:603): avc: denied { mounton } for pid=18809 comm="syz.1.4470" path="/121/file0" dev="tmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 1747.334068][T18843] fuse: Bad value for 'fd' [ 1747.795476][ T31] audit: type=1400 audit(1747.690:604): avc: denied { write } for pid=18845 comm="syz.0.4478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1754.327069][T18895] fuse: Bad value for 'fd' [ 1754.552890][ T31] audit: type=1400 audit(1754.430:605): avc: denied { bind } for pid=18896 comm="syz.0.4493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1754.554667][ T31] audit: type=1400 audit(1754.430:606): avc: denied { setopt } for pid=18896 comm="syz.0.4493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1754.826829][T18899] fuse: Bad value for 'fd' [ 1755.110711][T18905] fuse: Bad value for 'fd' [ 1756.065494][T18932] fuse: Bad value for 'fd' [ 1757.034768][T18937] fuse: Bad value for 'fd' [ 1758.047602][T18943] fuse: Bad value for 'fd' [ 1782.964919][ T31] audit: type=1326 audit(1782.860:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18978 comm="syz.0.4516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1783.267206][ T31] audit: type=1326 audit(1782.860:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18978 comm="syz.0.4516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1797.488218][T19002] fuse: Bad value for 'fd' [ 1833.219227][ T31] audit: type=1326 audit(1833.020:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19043 comm="syz.1.4541" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x0 [ 1873.538754][T19092] netlink: 72 bytes leftover after parsing attributes in process `syz.0.4557'. [ 1902.751170][ T31] audit: type=1400 audit(1902.640:610): avc: denied { bind } for pid=19123 comm="syz.1.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1903.065568][ T31] audit: type=1400 audit(1902.950:611): avc: denied { node_bind } for pid=19123 comm="syz.1.4569" saddr=4:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1909.609537][T19129] bond0: Unable to set up delay as MII monitoring is disabled [ 1914.913281][ T31] audit: type=1400 audit(1914.800:612): avc: denied { create } for pid=19132 comm="syz.0.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1919.069522][ T31] audit: type=1400 audit(1918.950:613): avc: denied { mount } for pid=19141 comm="syz.1.4575" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1919.771724][ T31] audit: type=1400 audit(1919.660:614): avc: denied { unmount } for pid=17671 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1953.456743][T19182] fuse: Unknown parameter 'group_i00000000000000000000' [ 1963.305171][ T31] audit: type=1400 audit(1963.200:615): avc: denied { read write } for pid=19189 comm="syz.0.4592" name="file0" dev="tmpfs" ino=1147 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1963.316216][ T31] audit: type=1400 audit(1963.210:616): avc: denied { open } for pid=19189 comm="syz.0.4592" path="/222/file0" dev="tmpfs" ino=1147 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2038.005294][ C1] vkms_vblank_simulate: vblank timer overrun [ 2040.788418][T19276] fuse: Unknown parameter 'user_id00000000000000000000' [ 2051.578374][ T31] audit: type=1400 audit(2051.460:617): avc: denied { ioctl } for pid=19288 comm="syz.1.4628" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2051.587125][ T31] audit: type=1400 audit(2051.460:618): avc: denied { set_context_mgr } for pid=19288 comm="syz.1.4628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2052.306137][ T31] audit: type=1400 audit(2052.190:619): avc: denied { write } for pid=19288 comm="syz.1.4628" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2052.316068][ T31] audit: type=1400 audit(2052.200:620): avc: denied { map } for pid=19288 comm="syz.1.4628" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2052.558958][ T31] audit: type=1400 audit(2052.430:621): avc: denied { call } for pid=19288 comm="syz.1.4628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2052.596650][ T31] audit: type=1400 audit(2052.490:622): avc: denied { transfer } for pid=19288 comm="syz.1.4628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2074.875996][ T31] audit: type=1400 audit(2074.770:623): avc: denied { setopt } for pid=19326 comm="syz.1.4637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2075.608024][T19327] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4637'. [ 2075.741094][ C1] vcan0: j1939_tp_rxtimer: 0x85832700: rx timeout, send abort [ 2075.781880][ T31] audit: type=1400 audit(2075.670:624): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2075.790899][ T31] audit: type=1400 audit(2075.670:625): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2075.840903][ T31] audit: type=1400 audit(2075.670:626): avc: denied { append } for pid=2909 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2076.160823][ T31] audit: type=1400 audit(2075.670:627): avc: denied { open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2076.168304][ T31] audit: type=1400 audit(2075.670:628): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2076.375591][T19330] fuse: Unknown parameter '0x0000000000000003' [ 2128.115446][ T31] audit: type=1326 audit(2127.800:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.146174][ T31] audit: type=1326 audit(2128.040:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.249421][ T31] audit: type=1326 audit(2128.120:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.269857][ T31] audit: type=1326 audit(2128.120:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.277794][ T31] audit: type=1326 audit(2128.130:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.390614][ T31] audit: type=1326 audit(2128.270:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.398052][ T31] audit: type=1326 audit(2128.270:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.405595][ T31] audit: type=1326 audit(2128.270:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19382 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fa74 code=0x7ffc0000 [ 2128.643350][ T31] audit: type=1326 audit(2128.520:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2128.654510][ T31] audit: type=1326 audit(2128.520:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19379 comm="syz.0.4657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2139.706699][T17241] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2149.265514][T17241] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2155.214473][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 2155.367843][ T31] audit: type=1400 audit(2155.090:665): avc: denied { setopt } for pid=19399 comm="syz.0.4661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2161.825745][T17241] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2172.304101][T17241] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2180.096836][T19446] fuse: Bad value for 'fd' [ 2195.286684][T19454] fuse: Bad value for 'group_id' [ 2195.298403][T19454] fuse: Bad value for 'group_id' [ 2216.572860][ C1] sched: DL replenish lagged too much [ 2232.936297][ T32] INFO: task kworker/1:4:7178 blocked for more than 430 seconds. [ 2232.942014][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2232.946486][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2232.955029][ T32] task:kworker/1:4 state:D stack:0 pid:7178 tgid:7178 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2232.970567][ T32] Workqueue: events bpf_prog_free_deferred [ 2232.983804][ T32] Call trace: [ 2233.001906][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2233.018147][ T32] r10:82918438 r9:ea975d84 r8:00000002 r7:60000013 r6:ea975d8c r5:84b88000 [ 2233.066354][ T32] r4:84b88000 [ 2233.073643][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2233.087025][ T32] r5:84b88000 r4:82918434 [ 2233.094438][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2233.109982][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2233.119050][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 [ 2233.128102][ T32] r4:00000000 [ 2233.146061][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2233.153793][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2233.259346][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2233.266922][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c1580 [ 2233.274576][ T32] r4:00000000 [ 2233.357692][ T31] audit: type=1400 audit(2233.250:666): avc: denied { write } for pid=3097 comm="syz-executor" path="pipe:[359]" dev="pipefs" ino=359 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2233.484871][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2233.497959][ T32] r9:83018205 r8:84b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f238000 [ 2233.505491][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2233.517435][ T32] r5:00001000 r4:dfbbc000 [ 2233.524008][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2233.584695][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2234.109634][ T32] r5:85a7978c r4:858ef680 [ 2234.116180][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2234.128007][ T32] r7:ddde2d40 r6:83018200 r5:85a7978c r4:858ef680 [ 2234.134664][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2234.338763][ T32] r10:61c88647 r9:84b88000 r8:858ef6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2234.346131][ T32] r4:858ef680 [ 2234.353594][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.367443][ T32] r10:00000000 r9:858ef680 r8:8027ecf4 r7:df911e60 r6:8593cc00 r5:84b88000 [ 2234.374494][ T32] r4:00000001 [ 2234.387426][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.394608][ T32] Exception stack(0xea975fb0 to 0xea975ff8) [ 2234.407406][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2234.414671][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.447941][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.456240][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.463580][ T32] r4:858e9840 [ 2234.477814][ T32] INFO: task kworker/1:4:7178 is blocked on a mutex likely owned by task kworker/1:7:18104. [ 2234.526750][ T32] task:kworker/1:7 state:R running task stack:0 pid:18104 tgid:18104 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2234.548767][ T32] Workqueue: events bpf_prog_free_deferred [ 2234.637125][ T32] Call trace: [ 2234.659090][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2234.667179][ T32] r10:8280c9b4 r9:83a63c00 r8:80200be4 r7:dfc55d54 r6:ffffffff r5:83a63c00 [ 2234.675629][ T32] r4:00000000 [ 2234.675714][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2234.675839][ T32] Exception stack(0xdfc55d20 to 0xdfc55d68) [ 2234.675911][ T32] 5d20: 9c680000 ed93f000 00000001 80239bb8 7f230000 00000001 82abf044 82abe420 [ 2234.675981][ T32] 5d40: 7f230000 ed93f000 8280c9b4 dfc55d9c dfc55da0 dfc55d70 80230af0 80239bd0 [ 2234.676034][ T32] 5d60: 80000013 ffffffff [ 2234.676088][ T32] r5:80000013 r4:80239bd0 [ 2234.676136][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2234.676231][ T32] r4:82abf064 [ 2234.676289][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2234.676387][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc55dc0 r5:dfc55e08 [ 2234.676440][ T32] r4:dfc55dc0 [ 2234.676485][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2234.676578][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:878dfdc0 [ 2234.676629][ T32] r4:00000000 [ 2234.676673][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2234.676768][ T32] r9:83018205 r8:83a63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f232000 [ 2234.676817][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2234.676906][ T32] r5:00001000 r4:dfb2b000 [ 2234.676951][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2234.677070][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2234.677157][ T32] r5:85a78b8c r4:84d37000 [ 2234.677205][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2234.677315][ T32] r7:ddde2d40 r6:83018200 r5:85a78b8c r4:84d37000 [ 2234.677362][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2234.677457][ T32] r10:61c88647 r9:83a63c00 r8:84d3702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2234.677507][ T32] r4:84d37000 [ 2234.677554][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.677642][ T32] r10:00000000 r9:84d37000 r8:8027ecf4 r7:dfce1e60 r6:85792500 r5:83a63c00 [ 2234.677689][ T32] r4:00000001 [ 2234.677732][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.677809][ T32] Exception stack(0xdfc55fb0 to 0xdfc55ff8) [ 2234.677860][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2234.677918][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.677972][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.678031][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.678075][ T32] r4:856ff440 [ 2234.678554][ T32] INFO: task kworker/1:6:17957 blocked for more than 431 seconds. [ 2234.678640][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2234.678689][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2234.678733][ T32] task:kworker/1:6 state:D stack:0 pid:17957 tgid:17957 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2234.678849][ T32] Workqueue: events bpf_prog_free_deferred [ 2234.678943][ T32] Call trace: [ 2234.679013][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2234.679104][ T32] r10:82918438 r9:eb3c9d84 r8:00000002 r7:60000013 r6:eb3c9d8c r5:83860c00 [ 2234.679153][ T32] r4:83860c00 [ 2234.679194][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2234.679287][ T32] r5:83860c00 r4:82918434 [ 2234.679333][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2234.679409][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2234.679489][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 [ 2234.679540][ T32] r4:00000000 [ 2234.679582][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2234.679650][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2234.679726][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2234.679813][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858cc740 [ 2234.679861][ T32] r4:00000000 [ 2234.679900][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2234.679982][ T32] r9:83018205 r8:83860c00 r7:00000000 r6:83018200 r5:00001000 r4:7f236000 [ 2234.680027][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2234.680105][ T32] r5:00001000 r4:dfba1000 [ 2234.680146][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2234.680230][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2234.680337][ T32] r5:85a7bb8c r4:856f3100 [ 2234.680385][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2234.680486][ T32] r7:ddde2d40 r6:83018200 r5:85a7bb8c r4:856f3100 [ 2234.680533][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2234.680630][ T32] r10:61c88647 r9:83860c00 r8:856f312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2234.680683][ T32] r4:856f3100 [ 2234.680733][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.680828][ T32] r10:00000000 r9:856f3100 r8:8027ecf4 r7:dfe59e60 r6:85852100 r5:83860c00 [ 2234.680875][ T32] r4:00000001 [ 2234.680917][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.681025][ T32] Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) [ 2234.681083][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2234.681141][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.681198][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.681270][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.681322][ T32] r4:85944500 [ 2234.681649][ T32] INFO: task kworker/1:6:17957 is blocked on a mutex likely owned by task kworker/1:7:18104. [ 2234.681719][ T32] task:kworker/1:7 state:R running task stack:0 pid:18104 tgid:18104 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2234.681837][ T32] Workqueue: events bpf_prog_free_deferred [ 2234.681932][ T32] Call trace: [ 2234.681996][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2234.682088][ T32] r10:8280c9b4 r9:83a63c00 r8:80200be4 r7:dfc55d54 r6:ffffffff r5:83a63c00 [ 2234.682136][ T32] r4:00000000 [ 2234.682182][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2234.682258][ T32] Exception stack(0xdfc55d20 to 0xdfc55d68) [ 2234.741069][ T32] 5d20: 9c8fa000 ed93f000 00000001 80239bb8 7f230000 00000001 82abf044 82abe420 [ 2234.741177][ T32] 5d40: 7f230000 ed93f000 8280c9b4 dfc55d9c dfc55da0 dfc55d70 80230af0 80239bd0 [ 2234.741228][ T32] 5d60: 80000013 ffffffff [ 2234.741311][ T32] r5:80000013 r4:80239bd0 [ 2234.741365][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2234.741489][ T32] r4:82abf064 [ 2234.741541][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2234.741634][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfc55dc0 r5:dfc55e08 [ 2234.741681][ T32] r4:dfc55dc0 [ 2234.741723][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2234.741812][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:878dfdc0 [ 2234.741861][ T32] r4:00000000 [ 2234.741904][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2234.741995][ T32] r9:83018205 r8:83a63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f232000 [ 2234.742044][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2234.742131][ T32] r5:00001000 r4:dfb2b000 [ 2234.742177][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2234.742251][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2234.757339][ T32] r5:85a78b8c r4:84d37000 [ 2234.757425][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2234.757566][ T32] r7:ddde2d40 r6:83018200 r5:85a78b8c r4:84d37000 [ 2234.757639][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2234.757731][ T32] r10:61c88647 r9:83a63c00 r8:84d3702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2234.757773][ T32] r4:84d37000 [ 2234.757811][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.757906][ T32] r10:00000000 r9:84d37000 r8:8027ecf4 r7:dfce1e60 r6:85792500 r5:83a63c00 [ 2234.757954][ T32] r4:00000001 [ 2234.757997][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.758072][ T32] Exception stack(0xdfc55fb0 to 0xdfc55ff8) [ 2234.758134][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2234.758192][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.758248][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.758314][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.758361][ T32] r4:856ff440 [ 2234.758975][ T32] NMI backtrace for cpu 1 [ 2234.759096][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2234.759154][ T32] Hardware name: ARM-Versatile Express [ 2234.759178][ T32] Call trace: [ 2234.759213][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 2234.759290][ T32] r7:00000000 r6:00010113 r5:60010193 r4:8225b4e0 [ 2234.759306][ T32] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 2234.759356][ T32] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 2234.759405][ T32] r5:00000001 r4:00000001 [ 2234.759423][ T32] [<8021fe1c>] (dump_stack) from [<81a115b8>] (nmi_cpu_backtrace+0x160/0x17c) [ 2234.759475][ T32] [<81a11458>] (nmi_cpu_backtrace) from [<81a11704>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2234.759526][ T32] r7:00000001 r6:8280c690 r5:8281af40 r4:ffffffff [ 2234.759542][ T32] [<81a115d4>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2234.759601][ T32] r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007f25 r5:8281b508 r4:840f080c [ 2234.759618][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fdc0>] (watchdog+0x4a8/0x74c) [ 2234.759671][ T32] [<8037f918>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.759729][ T32] r10:00000000 r9:00000000 r8:8037f918 r7:83349780 r6:83349780 r5:83259800 [ 2234.759750][ T32] r4:00000001 [ 2234.759764][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.759803][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2234.759829][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2234.759858][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.759883][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.759914][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.759932][ T32] r4:8334c580 [ 2234.760074][ T32] Sending NMI from CPU 1 to CPUs 0: [ 2234.760802][ C0] NMI backtrace for cpu 0 [ 2234.761069][ C0] CPU: 0 UID: 0 PID: 2823 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2234.761137][ C0] Hardware name: ARM-Versatile Express [ 2234.761186][ C0] PC is at debug_check_no_obj_freed+0x2c/0x2a4 [ 2234.761289][ C0] LR is at kmem_cache_free+0x2d4/0x494 [ 2234.761459][ C0] pc : [<808cfc00>] lr : [<804fdea0>] psr: 400d0113 [ 2234.761536][ C0] sp : df801a48 ip : 00000001 fp : df801abc [ 2234.761575][ C0] r10: 81e6e7b0 r9 : 84de7200 r8 : 000af47c [ 2234.761617][ C0] r7 : 8153b890 r6 : ddea8458 r5 : 84de7200 r4 : 830adc00 [ 2234.761653][ C0] r3 : 8413c800 r2 : 00000240 r1 : 00000240 r0 : 84de7200 [ 2234.761764][ C0] Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 2234.761812][ C0] Control: 30c5387d Table: 87979040 DAC: fffffffd [ 2234.761862][ C0] Call trace: frame pointer underflow [ 2234.761952][ C0] [<808cfbd4>] (debug_check_no_obj_freed) from [<804fdea0>] (kmem_cache_free+0x2d4/0x494) [ 2234.762030][ C0] r10:81e6e7b0 r9:8413c800 r8:000af47c r7:8153b890 r6:ddea8458 r5:84de7200 [ 2234.762051][ C0] r4:830adc00 [ 2234.762079][ C0] [<804fdbcc>] (kmem_cache_free) from [<8153b890>] (skb_free_head+0x8c/0x90) [ 2234.762140][ C0] r10:81e6e7b0 r9:00000002 r8:84de7340 r7:89247558 r6:df801c4c r5:87963d80 [ 2234.762159][ C0] r4:84de7200 [ 2234.762176][ C0] [<8153b804>] (skb_free_head) from [<8153d914>] (skb_release_data+0x190/0x22c) [ 2234.762225][ C0] r5:87963d80 r4:87963d80 [ 2234.762239][ C0] [<8153d784>] (skb_release_data) from [<81540f10>] (consume_skb+0x7c/0x130) [ 2234.762295][ C0] r9:84de7314 r8:84d29fc0 r7:89247558 r6:df801c4c r5:816eed68 r4:87963d80 [ 2234.762311][ C0] [<81540e94>] (consume_skb) from [<816eed68>] (nft_synproxy_do_eval+0x264/0x2b4) [ 2234.762370][ C0] r7:89247558 r6:df801c4c r5:854e8d00 r4:87963d80 [ 2234.762384][ C0] [<816eeb04>] (nft_synproxy_do_eval) from [<816eede4>] (nft_synproxy_eval+0x14/0x18) [ 2234.762439][ C0] r9:df801ce4 r8:81e6e938 r7:81e6e69c r6:81e6e658 r5:89247560 r4:89247550 [ 2234.762454][ C0] [<816eedd0>] (nft_synproxy_eval) from [<816b7308>] (nft_do_chain+0x12c/0x570) [ 2234.762500][ C0] [<816b71dc>] (nft_do_chain) from [<816d0560>] (nft_do_chain_inet+0xac/0x120) [ 2234.762566][ C0] r10:dddcfe88 r9:83b52f20 r8:df801d3c r7:87963d80 r6:83b52f00 r5:00000004 [ 2234.762585][ C0] r4:858d7640 [ 2234.762598][ C0] [<816d04b4>] (nft_do_chain_inet) from [<8167e95c>] (nf_hook_slow+0x40/0x104) [ 2234.762649][ C0] r4:00000001 [ 2234.762663][ C0] [<8167e91c>] (nf_hook_slow) from [<81710f20>] (ip_local_deliver+0xf0/0x110) [ 2234.762724][ C0] r9:00000040 r8:0000003e r7:00000000 r6:854e8d00 r5:85a5d800 r4:87963d80 [ 2234.762739][ C0] [<81710e30>] (ip_local_deliver) from [<81710064>] (ip_rcv_finish+0x98/0xb0) [ 2234.762787][ C0] r6:85a5d800 r5:854e8d00 r4:87963d80 [ 2234.762805][ C0] [<8170ffcc>] (ip_rcv_finish) from [<81711014>] (ip_rcv+0xd4/0xe0) [ 2234.762856][ C0] r7:00000000 r6:854e8d00 r5:87963d80 r4:00000001 [ 2234.762871][ C0] [<81710f40>] (ip_rcv) from [<81563154>] (__netif_receive_skb_one_core+0x5c/0x80) [ 2234.762925][ C0] r6:00000000 r5:81710f40 r4:85a5d800 [ 2234.762940][ C0] [<815630f8>] (__netif_receive_skb_one_core) from [<815631c0>] (__netif_receive_skb+0x18/0x5c) [ 2234.762986][ C0] r5:dddcff70 r4:87963d80 [ 2234.763001][ C0] [<815631a8>] (__netif_receive_skb) from [<815634c8>] (process_backlog+0xa0/0x17c) [ 2234.763047][ C0] r5:dddcff70 r4:87963d80 [ 2234.763064][ C0] [<81563428>] (process_backlog) from [<815644b4>] (__napi_poll+0x34/0x240) [ 2234.763119][ C0] r10:dddcfe80 r9:00000000 r8:df801ea8 r7:df801ea3 r6:00000040 r5:dddcff70 [ 2234.763138][ C0] r4:00000001 [ 2234.763153][ C0] [<81564480>] (__napi_poll) from [<81564da0>] (net_rx_action+0x3a0/0x430) [ 2234.763209][ C0] r9:00000000 r8:df801ea8 r7:0000012c r6:00000000 r5:5b70d000 r4:dddcff70 [ 2234.763226][ C0] [<81564a00>] (net_rx_action) from [<8026199c>] (handle_softirqs+0x140/0x458) [ 2234.763290][ C0] r10:8413c800 r9:82804d40 r8:00000101 r7:00000003 r6:00000022 r5:00000002 [ 2234.763308][ C0] r4:8280408c [ 2234.763323][ C0] [<8026185c>] (handle_softirqs) from [<80261e10>] (__irq_exit_rcu+0x110/0x1d0) [ 2234.763382][ C0] r10:8295a34c r9:8413c800 r8:00000000 r7:eb969e60 r6:82409374 r5:82446648 [ 2234.763400][ C0] r4:8413c800 [ 2234.763416][ C0] [<80261d00>] (__irq_exit_rcu) from [<80262188>] (irq_exit+0x10/0x18) [ 2234.763465][ C0] r5:82446648 r4:826c195c [ 2234.763480][ C0] [<80262178>] (irq_exit) from [<81a23f14>] (generic_handle_arch_irq+0x7c/0x80) [ 2234.763537][ C0] [<81a23e98>] (generic_handle_arch_irq) from [<819f37e8>] (call_with_stack+0x1c/0x20) [ 2234.763593][ C0] r9:8413c800 r8:00000000 r7:eb969e94 r6:ffffffff r5:600d0113 r4:81a30b94 [ 2234.763615][ C0] [<819f37cc>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc) [ 2234.763653][ C0] Exception stack(0xeb969e60 to 0xeb969ea8) [ 2234.763692][ C0] 9e60: 84a7a440 600d0113 00000000 000019c2 00000001 00000000 8295a2b0 00000117 [ 2234.763722][ C0] 9e80: 00000000 00000000 8295a34c eb969ebc eb969ec0 eb969eb0 80a6aa04 81a30b94 [ 2234.763744][ C0] 9ea0: 600d0113 ffffffff [ 2234.763761][ C0] [<81a30b6c>] (_raw_spin_unlock_irqrestore) from [<80a6aa04>] (pl011_console_device_unlock+0x20/0x24) [ 2234.763820][ C0] [<80a6a9e4>] (pl011_console_device_unlock) from [<802e7e0c>] (nbcon_emit_one+0x80/0xf8) [ 2234.763872][ C0] [<802e7d8c>] (nbcon_emit_one) from [<802e802c>] (nbcon_kthread_func+0x1a8/0x2a4) [ 2234.763925][ C0] r6:8280c690 r5:8413c800 r4:8295a2b0 [ 2234.763940][ C0] [<802e7e84>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.763998][ C0] r10:00000000 r9:8295a2b0 r8:802e7e84 r7:83c7fb80 r6:83c7fb80 r5:8413c800 [ 2234.764017][ C0] r4:00000001 [ 2234.764032][ C0] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.764071][ C0] Exception stack(0xeb969fb0 to 0xeb969ff8) [ 2234.764095][ C0] 9fa0: 00000000 00000000 00000000 00000000 [ 2234.764122][ C0] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.764148][ C0] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.764177][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.764194][ C0] r4:841d9400 [ 2234.771848][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2234.821411][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2234.821828][ T32] Hardware name: ARM-Versatile Express [ 2234.822081][ T32] Call trace: [ 2234.822599][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 2234.823235][ T32] r7:00000000 r6:8282083c r5:00000000 r4:8225b4e0 [ 2234.823555][ T32] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 2234.823889][ T32] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 2234.824201][ T32] r5:00000000 r4:82a6dd18 [ 2234.824383][ T32] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 2234.824689][ T32] [<802024f4>] (panic) from [<8037fc30>] (watchdog+0x318/0x74c) [ 2234.825014][ T32] r3:00000001 r2:00000000 r1:00000001 r0:8225c12c [ 2234.825252][ T32] r7:8281bb28 [ 2234.825406][ T32] [<8037f918>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280) [ 2234.825812][ T32] r10:00000000 r9:00000000 r8:8037f918 r7:83349780 r6:83349780 r5:83259800 [ 2234.826094][ T32] r4:00000001 [ 2234.826245][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2234.826556][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2234.826790][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2234.827085][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2234.827373][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2234.827651][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2234.827931][ T32] r4:8334c580 [ 2234.829992][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:25:50 Registers: info registers vcpu 0 CPU#0 R00=df801bac R01=84de6114 R02=a40d5980 R03=0043a380 R04=5b70d000 R05=200f0013 R06=df801c7c R07=89247558 R08=84d29fc0 R09=84de6114 R10=81e6e7b0 R11=df801b9c R12=df801bb0 R13=df801b88 R14=89247558 R15=816ee9c4 PSR=600f0193 -ZC- A S svc32 s00=72665f67 s01=645f6565 d00=645f656572665f67 s02=31373a64 s03=20203837 d01=2020383731373a64 s04=64697070 s05=2020323a d02=2020323a64697070 s06=20202020 s07=6b736174 d03=6b73617420202020 s08=616c665f s09=303a7367 d04=303a7367616c665f s10=30323478 s11=30363038 d05=3036303830323478 s12=616c6620 s13=303a7367 d06=303a7367616c6620 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=8928ed80 R01=00000200 R02=00000008 R03=817ad2bc R04=83259800 R05=00000001 R06=85a62400 R07=85504480 R08=85a5d8d8 R09=838e0318 R10=854b19d4 R11=df805a3c R12=df805960 R13=df805970 R14=817b181c R15=817b36e4 PSR=80000113 N--- A S svc32 s00=f8000000 s01=ffffffff d00=fffffffff8000000 s02=f4000000 s03=00096bb7 d01=00096bb7f4000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=00405e9f s09=ffa0fbf9 d04=ffa0fbf900405e9f s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=002c26d3 s13=003e83b1 d06=003e83b1002c26d3 s14=00000000 s15=00000000 d07=0000000000000000 s16=fe000000 s17=f747bbd2 d08=f747bbd2fe000000 s18=a8000000 s19=ffff1f0b d09=ffff1f0ba8000000 s20=00cf4dcb s21=003e83b0 d10=003e83b000cf4dcb s22=00000000 s23=00000000 d11=0000000000000000 s24=fa405e9f s25=ffffffff d12=fffffffffa405e9f s26=f4000000 s27=00096bb7 d13=00096bb7f4000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=01f07a9b s33=00cec05a d16=00cec05a01f07a9b s34=00000000 s35=00000000 d17=0000000000000000 s36=0075e779 s37=ff43b2b5 d18=ff43b2b50075e779 s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=feae917c s43=ffffffff d21=fffffffffeae917c s44=fffffffe s45=ffffffff d22=fffffffffffffffe s46=ff8f85d4 s47=ffffffff d23=ffffffffff8f85d4 s48=ff6caf54 s49=f747bbd2 d24=f747bbd2ff6caf54 s50=f7a6eebc s51=ffffffff d25=fffffffff7a6eebc s52=feb1bba5 s53=fe77ecf2 d26=fe77ecf2feb1bba5 s54=ff772cde s55=fe7c5452 d27=fe7c5452ff772cde s56=012fd884 s57=007785cc d28=007785cc012fd884 s58=003bc2e6 s59=ff772cde d29=ff772cde003bc2e6 s60=ef1a2f86 s61=00096bb7 d30=00096bb7ef1a2f86 s62=70996fe3 s63=0075c12d d31=0075c12d70996fe3 FPSCR: 00000000