last executing test programs: 11.614533232s ago: executing program 0 (id=968): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}, 0x4}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r4 = syz_open_procfs$pagemap(0x0, &(0x7f0000002b00)) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) dup2(r4, r3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', r2, 0x4000, r4}, 0x18) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="e279fc2f", 0x4) 9.453033913s ago: executing program 1 (id=969): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000004) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) 8.292709456s ago: executing program 0 (id=970): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f000905", @ANYRES16], 0x0) r1 = landlock_create_ruleset(&(0x7f0000000000)={0xc4d8, 0x1, 0x1}, 0x18, 0x0) landlock_restrict_self(r1, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00220f0000005b574e69622bf85eda07b3"], 0x0}, 0x0) r2 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x501c4814, 0x0) 6.930785144s ago: executing program 0 (id=971): r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000280), 0x80d6, 0x50241) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) (async) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) (async) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) r4 = dup2(r3, r2) r5 = accept$packet(r4, 0x0, 0x0) dup3(r2, r5, 0x0) (async, rerun: 64) accept(r5, 0x0, 0x0) (async, rerun: 64) r6 = socket$unix(0x1, 0x1, 0x0) write$cgroup_pressure(r4, &(0x7f0000000100)={'full', 0x20, 0x1, 0x20, 0x4}, 0x2f) (async) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r7 = openat2(0xffffffffffffff9c, &(0x7f0000003500)='./file0\x00', &(0x7f0000000000)={0x149842}, 0x18) write$P9_RAUTH(r7, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x4d, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) write(0xffffffffffffffff, &(0x7f0000000000)="120000001a0035", 0x7) (async, rerun: 32) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) (async, rerun: 64) r8 = socket$inet6(0x10, 0x3, 0x0) (rerun: 64) sendto$inet6(r8, &(0x7f0000000000)='z', 0x10a63, 0x800, 0x0, 0x4b6ae4f95a5de35b) 6.289051712s ago: executing program 1 (id=972): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, r1, 0x200, 0x70bd26, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0xbf}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x38}, {0x6, 0x11, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3ff}, {0x6, 0x11, 0x4}}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_REG_RULES={0x4}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x4810) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), r0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f00000003c0)={'syztnl2\x00', 0x0, 0x80, 0x40, 0x7ff, 0x800, {{0x24, 0x4, 0x0, 0x7, 0x90, 0x64, 0x0, 0x9, 0x2f, 0x0, @multicast1, @remote, {[@timestamp_addr={0x44, 0x24, 0xdf, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0x2e}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x3b}}, {@rand_addr=0x64010101, 0x80000000}, {@empty, 0x6}]}, @noop, @timestamp_addr={0x44, 0x54, 0xac, 0x1, 0x9, [{@empty, 0x6}, {@broadcast, 0x7}, {@private=0xa010100, 0x6}, {@multicast1, 0x200}, {@rand_addr=0x64010102, 0x3}, {@remote, 0x80000001}, {@private=0xa010102, 0xffff9ad8}, {@rand_addr=0x64010102, 0x8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@multicast2, 0xb4}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'gre0\x00', &(0x7f00000004c0)={'syztnl1\x00', 0x0, 0x8000, 0x80, 0x3, 0x1a1, {{0x12, 0x4, 0x1, 0x6, 0x48, 0x65, 0x0, 0x10, 0x2f, 0x0, @multicast1, @remote, {[@lsrr={0x83, 0x1b, 0x83, [@empty, @multicast2, @private=0xa010100, @multicast2, @local, @rand_addr=0x64010101]}, @rr={0x7, 0x17, 0xc7, [@broadcast, @remote, @dev={0xac, 0x14, 0x14, 0x2c}, @remote, @multicast2]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'ip6gre0\x00', 0x0, 0x29, 0x7, 0x80, 0xff, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7807, 0x80, 0x0, 0x2}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x208010}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x48, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c800}, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000000d80)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000780)={0x5ac, r2, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x6, 0x51}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x20, 0x33, @data_frame={@a_msdu=@type01={{0x0, 0x2, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}, {0xfe0}, @broadcast, @from_mac=@broadcast, @from_mac=@broadcast, {0x1, 0x4}, "", @void, @value=@ver_80211n={0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1}}, @a_msdu}}, @NL80211_ATTR_FRAME={0x4d, 0x33, @data_frame={@msdu=@type11={{0x0, 0x2, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1}, {}, @broadcast, @device_b, @device_a, {0x3, 0xff7}, @device_b, @value={0x8, 0x0, 0x0, 0x0, 0xe}}, @random="3a8b48fc47e033506fc6f13bb58e335cd082ece48487e93ee7226a15aca87bc1ca0676f010876df36f"}}, @NL80211_ATTR_FRAME={0x476, 0x33, @data_frame={@msdu=@type01={{0x0, 0x2, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {}, @broadcast, @from_mac=@device_b, @broadcast, {0x0, 0x4}, "", @value={0x4, 0x0, 0x1, 0x0, 0x9}, @value=@ver_80211n={0x0, 0x7, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}}, @a_msdu=[{@broadcast, @broadcast, 0xb9, "00b9a49c6cec7c41ea0b9fbd7fbec094ee658372d875978d51308c33e15fbe48e0ded8fe6f734d30fc46009d59ddfa56f3881e1184d2c86a8b2fbc10983f4afea40ab3c9d1dde6e0442f8d14180c2a3c997902e538b78baf8713cb532c196ddd1a4d20b79ed6d34e1bc7ca98c3ac110b7e009a9ccac3f154d97393397ad245290ad7bfdc951dbc2dbb6db2c13bb836aefe549dff4f2ac30fb0abc3a46e478e4562c209fbeefd1342c3b8c87d043152d058450d6bccf207c4ab"}, {@device_b, @device_b, 0xa0, "762a03d607c3b5305156c1dca7da31a78f5204200af013a7fc848c8300770e448995e9a23880aca8712f5158a1c855ada42151fc36098a6865395d0d2dc9dc42ba2083e9a96c9e32058b1ea1842f983e8788b1701e5adc6484670f65d9946dbbc7ff26cd569a406162e932826153cbb29c3d090b50d353649359333def852b508ba0ba97ec1d65f0f695efe32fc541dfc32ec70368778b06dbe68d498e645fc2"}, {@broadcast, @broadcast, 0x1e, "c3563ef3133ee042c0696529664617ffd4f9a1ea952e3188a47f39a0eb89"}, {@device_a, @device_a, 0xba, "fadd866f286a31ed8b7106e6b2dde20dfed01cbe5a6ae69c12240051efe4066780061d1ec36da99797172eacdac6d685d77c87711f27d02a417e79f466816983ada1cc864955a71e2df6f4f5a133895714c7e9be9be8a92965f4cc04cfea03e7a1d522306e92f7b6432ccbe4ddc4c9a8f05163a1c768ba91623354aeccb8f56fecec229cf55033f2ef629b45b4afe28f438df81211a2cfc31e47b773d47f16b5172a486c4a193c28e5d21b0631263f0d2a877319d92dd0f76a22"}, {@broadcast, @device_a, 0xd7, "2f4150a49feee5b91926ca576e50ab587e50d0fa0335d32f10327d2f80a804e477831dd098e94ce31e8393a2efc5f5f739eecc4444ca14242028ad09451f166f4846d1e6db2ecee1827a909473a823d12a836469b62c390270378a15119a7bafc0f4de144c4c6e82f2c74fbd7a53d41cbdf32f8e31e9169ac20474317bcd9165ac5926974f3cb7ea7d3c4dfc798e034c2c74027b401a82cf7a645701cbb57dc8a713418356705c24615f14f220a2ce392dabb186cdf313013e44888f8deed9b3c6bc32151c69456cece3338b9abb3785e876b198683f62"}, {@device_b, @device_a, 0xf2, "39a3086adf34e5046aa0ed42495f162367c263e8271239a4ae49e4585dc5bece755486ddcfb13d7bdf15e22fda7519bb1f6f5f5af93d699e5dd268ca287439a9b401daefdd5e096f727f32ce11b799e3ee4eda856868df9382aa2d5707ab1da961f98905575a22204ea69895c6c15d31b85a19727b02a27a0ed5605a1f6d23342881900d13c8bf7348997b6d18c69eff8d7e8826818ba68227a3b1ab3181a751904199172b5bb0066d6f73aa80ffeb6bbb497ba18a0796ee55c8d7e137241d27d70dc6e7bd4609fb71a4aa4b6f5beb6a3eb3a9978bc67730ffddc056f936866065e204a936ba34c9d0493b9caa9956723569"}]}}, @NL80211_ATTR_FRAME={0x34, 0x33, @mgmt_frame=@disassoc={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x6}, @device_b, @device_a, @initial, {0xd}, @value=@ver_80211n={0x0, 0x9, 0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}}, 0x1f, @val={0x8c, 0x10, {0x2b7, "03a11ca77d9c", @short="6aeb2855c9e52a8b"}}}}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@cf_end_cf_ack={{}, {0x6}, @device_b, @broadcast}}, @NL80211_ATTR_FRAME={0x4f, 0x33, @mgmt_frame=@reassoc_req={{{0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x7fb4}, @device_b, @broadcast, @random="31e4968788ea", {0x4, 0xff9}}, 0x1800, 0x7, @device_a, {0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x3, [{0x6, 0x1}, {0x30}, {0x26, 0x1}]}, @val={0x2d, 0x1a, {0x300, 0x1, 0x1, 0x0, {0x3, 0xe6c, 0x0, 0x40, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x6}}}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000000) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000e00), r0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000f00)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x50, r7, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x800) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000f80)={&(0x7f0000000f40)=[0x0], 0x1, 0x800, 0x0, 0xffffffffffffffff}) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000001000), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r8, &(0x7f00000010c0)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001080)={&(0x7f0000001040)={0x34, r9, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0xc, 0x9, @l2={'ib', 0x3a, 'pim6reg0\x00'}}}}, ["", "", "", ""]}, 0x34}}, 0x5) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r8, &(0x7f0000001240)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001140)={0xa0, r2, 0xa01, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_TX_RATES={0x8c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}, @NL80211_BAND_6GHZ={0x40, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0xc, 0x12, 0xc, 0x2, 0x48, 0x9, 0x6c]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x3, 0x5, 0x5, 0x7, 0x3, 0x7, 0x8, 0xfffa]}}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x4, 0x2, 0x7ff, 0x7ff, 0x0, 0x9, 0x1, 0x80]}}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x7ff, 0x4, 0x2, 0x9, 0x7, 0x9, 0xf, 0x5]}}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x2, 0xffff, 0x9, 0x1, 0x7, 0x3, 0x3, 0xcf14]}}]}]}]}, 0xa0}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000012c0), r8) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000001400)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000013c0)={&(0x7f0000001300)={0x94, r10, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x3c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x32, 0x3, "81477bb3c2a5f297e1bfac68f9110ea54ec91d056be7deea0ed582385a804ddc68d176eacf3ef83abc7735bedd2a"}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x120}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000001480)={0x0, @private}, &(0x7f00000014c0)=0xc) sendmsg$BATADV_CMD_SET_HARDIF(r8, &(0x7f00000015c0)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x64, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r11}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6639}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffffff8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xe06a}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000001640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001700)={&(0x7f0000001600), 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x28, r2, 0x8, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @val={0xc, 0x99, {0x8, 0x62}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x4000080) sendmsg$NFT_MSG_GETOBJ_RESET(r8, &(0x7f0000001800)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x24, 0x15, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004004}, 0x40) syz_clone(0x420c000, &(0x7f0000001840)="23517a61c87b3c2c0d7b99f2deee38219eea9d533e62a986ada1c66485ddb3ce25f122b0f899760d1eb1df592b29dfff59e6745e279aa9650c2acd105d3c8e89aa10a7a9427c87bc604cc58c9a8ff15217f9bdff45b1cbdf3277e929994a5ba29773fe3663220134199167905a66d504112a049bc386554d7703378c47d877215d0c9ff5bdd7e70bc50083b287711d04ef6277c84f331acabf9698ab54ff756244", 0xa1, &(0x7f0000001900), &(0x7f0000001940), &(0x7f0000001980)="a570cca7422e50a98e472c83bc3f88cea310cb9726ce85712569fef645beea3ca09adc8a9e189cf6e42fee2b1de9bd831fcf4d95ae193c0e21b416fe2f9d3daa88715b57eea8") syz_genetlink_get_family_id$tipc(&(0x7f0000001a00), r8) r13 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r13, &(0x7f0000001a40)={0xa, 0x4e24, 0x4, @loopback, 0x7}, 0x1c) r14 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r14, &(0x7f0000001f40)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001f00)={&(0x7f0000001ac0)={0x434, 0x3f4, 0x20, 0x70bd2c, 0x25dfdbfb, {0x7, 0x1, 0xffffff81, [0x0, 0x400, 0x8001, 0x2, 0xd, 0xc, 0x9, 0x6, 0x4, 0xfffffff7, 0x5, 0x4, 0x5dc, 0x831b, 0x5, 0xffffffff, 0x5, 0x400, 0xfff, 0x6, 0x0, 0x7, 0x10000, 0x9, 0x3, 0x3ff, 0x7, 0x6, 0x2, 0x16a, 0x8000, 0x9, 0x0, 0x101, 0xf842, 0xe, 0x2, 0xa, 0x1dec, 0x8, 0x4, 0x1, 0x272f, 0x6, 0x7, 0x0, 0x9, 0xe, 0x10000, 0x6, 0x10000, 0x0, 0x9, 0x101, 0xfffffff9, 0xedac, 0x8, 0xac34, 0xf7, 0x9, 0xb, 0x4980000, 0x1, 0x8], [0x7, 0x3, 0x0, 0x2, 0x7d0, 0x5, 0x4, 0x6, 0xffff, 0xc, 0x1, 0xd, 0x7, 0x1, 0x3ff, 0xfffffff9, 0x1ff, 0x2, 0x8, 0x7fff, 0x9, 0x1000, 0x4, 0x9, 0x0, 0x91a1, 0x80000000, 0x10, 0x3, 0x6, 0x8, 0xffffffff, 0x0, 0xffffffff, 0x76f, 0xffffffff, 0x1, 0x80, 0x6, 0x8001, 0x4, 0x8, 0x0, 0x4, 0x101, 0xfff, 0x100, 0x4, 0x4, 0x3, 0x6, 0x1, 0x6, 0x7f, 0x5, 0x4, 0x6, 0xc, 0x8, 0x4, 0xffffffff, 0x6, 0x8000], [0x40, 0x4, 0xffffffff, 0xb31, 0x8000, 0x1000, 0x0, 0xd183, 0x8, 0x6, 0x7, 0x0, 0x5, 0xff, 0xe2d, 0x5892, 0x40, 0x3, 0xfff, 0x3, 0x1000, 0x6d5, 0x4, 0x8, 0x8, 0x59fcb11e, 0x3, 0x570, 0x0, 0xa, 0x5, 0x7, 0xff, 0x4, 0xfff, 0x3, 0xb, 0x4, 0x6, 0x57, 0x7576fb49, 0xff, 0x1, 0x6, 0x4, 0x0, 0x2, 0x400, 0x80000001, 0x2, 0x57e, 0x1, 0x6, 0x7a49, 0x7fffffff, 0xee7a, 0x1, 0x1, 0xffff, 0x6, 0x7, 0x7, 0x4, 0x4], [0x8001, 0x1, 0xb, 0x3, 0x8, 0x6, 0xffff, 0x1, 0x5c, 0x3d, 0x2, 0x64, 0xfffffffc, 0x5, 0x5, 0x1ff, 0xe, 0x4304, 0x928, 0xcc, 0xe, 0x937c, 0x3, 0xffff, 0x0, 0x3, 0x0, 0x6, 0x3ff, 0x9, 0x80000000, 0x4e, 0x9, 0x7, 0x7fff, 0xc288, 0x3, 0x10, 0x6, 0x80000001, 0xafd, 0x624, 0x800, 0x27, 0xff, 0x8, 0x6, 0x8, 0xff, 0x3, 0x2, 0x5, 0x1, 0x5, 0x10000, 0x0, 0xfffffffc, 0x7, 0x9, 0x8ad, 0x2, 0xf, 0x0, 0x2e7b], 0x11, ['-\xe6\x00', 'devlink\x00', 'PPPPPP']}, ["", "", "", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x24004010}, 0x4000000) 4.293503299s ago: executing program 0 (id=973): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}, 0x4}, 0x10) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4008441}, 0x34048861) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) 3.673066926s ago: executing program 1 (id=974): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='gretap0\x00', 0x10) connect$l2tp(r2, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}, 0x4}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r4 = syz_open_procfs$pagemap(0x0, &(0x7f0000002b00)) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) dup2(r4, r3) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="e279fc2f", 0x4) 943.448184ms ago: executing program 0 (id=975): r0 = io_uring_setup(0x1ba5, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x0, 0xfffffffc}) r1 = socket(0x29, 0x2, 0x2) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x6c, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') ioctl$BTRFS_IOC_START_SYNC(r2, 0x5450, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r3, 0x0, &(0x7f0000000200)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x91) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r5 = mq_open(&(0x7f0000001140)='#\xa6-\',*\\,\xa4^!\'$\x00', 0x40, 0x0, 0x0) dup3(r4, r5, 0x0) write$binfmt_script(r5, 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) 403.787959ms ago: executing program 0 (id=976): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='vlan1\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000004) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) 293.538372ms ago: executing program 1 (id=977): mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x440, &(0x7f0000000240)={[{}]}) 103.622957ms ago: executing program 1 (id=978): r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000340)=0x2aa8, 0x4) 0s ago: executing program 1 (id=979): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0xfffffffffffffff6, 0x0) kernel console output (not intermixed with test programs): t=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 95.548242][ T3797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3797 comm=syz.1.9 [ 95.553396][ T3797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3797 comm=syz.1.9 [ 95.627781][ T31] audit: type=1400 audit(95.530:125): avc: denied { create } for pid=3800 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 96.053211][ T31] audit: type=1400 audit(95.960:126): avc: denied { create } for pid=3809 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.259916][ T31] audit: type=1400 audit(96.170:127): avc: denied { read write } for pid=3809 comm="syz.0.13" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 96.261807][ T31] audit: type=1400 audit(96.170:128): avc: denied { open } for pid=3809 comm="syz.0.13" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 98.843076][ T3824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3824 comm=syz.1.15 [ 99.467172][ T3834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3834 comm=syz.1.18 [ 99.469794][ T3834] Zero length message leads to an empty skb [ 99.579674][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 99.579779][ T31] audit: type=1400 audit(99.490:132): avc: denied { create } for pid=3835 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.582289][ T31] audit: type=1400 audit(99.490:133): avc: denied { setopt } for pid=3835 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.609041][ T31] audit: type=1400 audit(99.520:134): avc: denied { bind } for pid=3835 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 100.540000][ T31] audit: type=1400 audit(100.450:135): avc: denied { lock } for pid=3847 comm="syz.1.23" path="socket:[2719]" dev="sockfs" ino=2719 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 100.553502][ T3848] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 100.561843][ T31] audit: type=1400 audit(100.470:136): avc: denied { ioctl } for pid=3847 comm="syz.1.23" path="socket:[2721]" dev="sockfs" ino=2721 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.211249][ T3854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=3854 comm=syz.1.25 [ 101.814194][ T31] audit: type=1400 audit(101.720:137): avc: denied { create } for pid=3865 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 102.821311][ T3873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=3873 comm=syz.1.30 [ 106.290306][ T31] audit: type=1400 audit(106.200:138): avc: denied { ioctl } for pid=3885 comm="syz.1.33" path="socket:[2769]" dev="sockfs" ino=2769 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.693975][ T3899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3899 comm=syz.1.37 [ 109.970664][ T3896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=3896 comm=syz.0.36 [ 110.155245][ T3914] FAULT_INJECTION: forcing a failure. [ 110.155245][ T3914] name failslab, interval 1, probability 0, space 0, times 1 [ 110.156308][ T3914] CPU: 0 UID: 0 PID: 3914 Comm: syz.1.41 Not tainted 6.12.0-syzkaller #0 [ 110.156873][ T3914] Hardware name: ARM-Versatile Express [ 110.157429][ T3914] Call trace: [ 110.158404][ T3914] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 110.159800][ T3914] r7:00000c40 r6:8408f4a8 r5:60000013 r4:8203f890 [ 110.160214][ T3914] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 110.160650][ T3914] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 110.161476][ T3914] r5:00000000 r4:8271955c [ 110.161699][ T3914] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 110.162064][ T3914] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 110.162434][ T3914] r6:8408f4a8 r5:00001000 r4:82c016c0 [ 110.162622][ T3914] [<804eb344>] (should_failslab) from [<804d0524>] (__kmalloc_noprof+0x9c/0x458) [ 110.162975][ T3914] [<804d0488>] (__kmalloc_noprof) from [<807575e8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 110.163309][ T3914] r10:84996000 r9:82f90000 r8:00000000 r7:8324a6e8 r6:8408f4a8 r5:00001000 [ 110.163556][ T3914] r4:00000000 [ 110.163663][ T3914] [<807575ac>] (tomoyo_realpath_from_path) from [<8075372c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 110.164000][ T3914] r10:84996000 r9:00000000 r8:8408f480 r7:00008942 r6:00000004 r5:81ad1abc [ 110.164265][ T3914] r4:8408f4a8 r3:824ba300 [ 110.164412][ T3914] [<80753660>] (tomoyo_path_number_perm) from [<80757ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 110.164800][ T3914] r9:00000004 r8:8408f480 r7:20000380 r6:20000380 r5:00008942 r4:8408f480 [ 110.165048][ T3914] [<80757fdc>] (tomoyo_file_ioctl) from [<807061e4>] (security_file_ioctl+0x64/0x1e4) [ 110.165317][ T3914] [<80706180>] (security_file_ioctl) from [<80532a78>] (sys_ioctl+0x4c/0xd88) [ 110.165626][ T3914] r7:20000380 r6:8408f481 r5:00000000 r4:00008942 [ 110.165841][ T3914] [<80532a2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 110.166243][ T3914] Exception stack(0xea7b9fa8 to 0xea7b9ff0) [ 110.166683][ T3914] 9fa0: 00000000 00000000 00000004 00008942 20000380 00000000 [ 110.167027][ T3914] 9fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b300bc [ 110.167380][ T3914] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 110.167603][ T3914] r10:00000036 r9:84996000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 110.167874][ T3914] r4:00000000 [ 110.177355][ T3914] ERROR: Out of memory at tomoyo_realpath_from_path. [ 110.349362][ T31] audit: type=1400 audit(110.260:139): avc: denied { write } for pid=3917 comm="syz.1.42" name="psched" dev="proc" ino=4026532671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 111.199844][ T31] audit: type=1400 audit(111.110:140): avc: denied { create } for pid=3924 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 111.202269][ T31] audit: type=1400 audit(111.110:141): avc: denied { write } for pid=3924 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 113.204698][ T3930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=3930 comm=syz.1.45 [ 113.311355][ T31] audit: type=1400 audit(113.220:142): avc: denied { create } for pid=3934 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.347473][ T31] audit: type=1400 audit(113.250:143): avc: denied { ioctl } for pid=3934 comm="syz.1.46" path="socket:[1847]" dev="sockfs" ino=1847 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.362656][ T31] audit: type=1400 audit(113.270:144): avc: denied { write } for pid=3934 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 114.075820][ T31] audit: type=1400 audit(113.980:145): avc: denied { map_create } for pid=3946 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.078806][ T31] audit: type=1400 audit(113.980:146): avc: denied { perfmon } for pid=3946 comm="syz.1.49" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 114.080866][ T31] audit: type=1400 audit(113.990:147): avc: denied { map_read map_write } for pid=3946 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.271436][ T31] audit: type=1400 audit(114.180:148): avc: denied { prog_load } for pid=3950 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.272360][ T31] audit: type=1400 audit(114.180:149): avc: denied { bpf } for pid=3950 comm="syz.1.51" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 114.306276][ T31] audit: type=1400 audit(114.210:150): avc: denied { getopt } for pid=3950 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.442673][ T3953] SELinux: Context /sbin/dhclient is not valid (left unmapped). [ 114.443482][ T31] audit: type=1400 audit(114.350:151): avc: denied { relabelto } for pid=3952 comm="syz.1.52" name="vsock" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/sbin/dhclient" [ 114.951291][ T3963] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 118.441650][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 118.443005][ T31] audit: type=1400 audit(118.340:155): avc: denied { read } for pid=3967 comm="syz.1.57" name="vsock" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/sbin/dhclient" [ 118.455390][ T31] audit: type=1400 audit(118.350:156): avc: denied { open } for pid=3967 comm="syz.1.57" path="/dev/vsock" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/sbin/dhclient" [ 118.547960][ T31] audit: type=1400 audit(118.450:157): avc: denied { ioctl } for pid=3967 comm="syz.1.57" path="/dev/vsock" dev="devtmpfs" ino=749 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/sbin/dhclient" [ 121.963292][ T31] audit: type=1400 audit(121.870:158): avc: denied { read } for pid=3975 comm="syz.1.61" path="socket:[2955]" dev="sockfs" ino=2955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 124.053214][ T3999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3999 comm=syz.1.67 [ 124.428431][ T31] audit: type=1400 audit(124.340:159): avc: denied { create } for pid=4008 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 124.787371][ T31] audit: type=1400 audit(124.690:160): avc: denied { setopt } for pid=4017 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 125.539129][ T31] audit: type=1400 audit(125.450:161): avc: denied { create } for pid=4046 comm="syz.1.80" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.053407][ T4049] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4049 comm=syz.1.80 [ 129.025347][ T4096] FAULT_INJECTION: forcing a failure. [ 129.025347][ T4096] name failslab, interval 1, probability 0, space 0, times 0 [ 129.025764][ T4096] CPU: 1 UID: 0 PID: 4096 Comm: syz.1.94 Not tainted 6.12.0-syzkaller #0 [ 129.025949][ T4096] Hardware name: ARM-Versatile Express [ 129.026104][ T4096] Call trace: [ 129.026215][ T4096] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 129.026594][ T4096] r7:00000dc0 r6:00000dc0 r5:60000013 r4:8203f890 [ 129.026883][ T4096] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 129.027242][ T4096] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 129.027502][ T4096] r5:00000000 r4:8271955c [ 129.027641][ T4096] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 129.027987][ T4096] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 129.028303][ T4096] r6:00000dc0 r5:00000300 r4:82c01540 [ 129.028859][ T4096] [<804eb344>] (should_failslab) from [<804d0524>] (__kmalloc_noprof+0x9c/0x458) [ 129.029245][ T4096] [<804d0488>] (__kmalloc_noprof) from [<81495ab0>] (sk_prot_alloc+0xa4/0x104) [ 129.029582][ T4096] r10:815b654c r9:00000000 r8:00000000 r7:00000010 r6:00000dc0 r5:827df058 [ 129.029898][ T4096] r4:82923f10 [ 129.030157][ T4096] [<81495a0c>] (sk_prot_alloc) from [<81497ad4>] (sk_alloc+0x30/0x1c0) [ 129.030536][ T4096] r9:00000000 r8:00000010 r7:00000cc0 r6:843b0000 r5:827df058 r4:82923f10 [ 129.030800][ T4096] [<81497aa4>] (sk_alloc) from [<815b03f4>] (__netlink_create+0x3c/0xa4) [ 129.031088][ T4096] r9:00000000 r8:00000000 r7:8335d900 r6:00000010 r5:8335d900 r4:82923f10 [ 129.031340][ T4096] [<815b03b8>] (__netlink_create) from [<815b18e4>] (netlink_create+0x118/0x264) [ 129.031848][ T4096] r6:00000010 r5:82923f18 r4:82923f10 [ 129.032065][ T4096] [<815b17cc>] (netlink_create) from [<81490e48>] (__sock_create+0xfc/0x1dc) [ 129.032367][ T4096] r10:81c5a0e0 r9:843b0000 r8:8335d900 r7:00000010 r6:815b17cc r5:00000003 [ 129.032597][ T4096] r4:00000010 [ 129.032721][ T4096] [<81490d4c>] (__sock_create) from [<81493530>] (__sys_socket+0x94/0x10c) [ 129.033059][ T4096] r10:00000119 r9:84994800 r8:8020029c r7:00000119 r6:84994800 r5:00000010 [ 129.033403][ T4096] r4:00000003 [ 129.033586][ T4096] [<8149349c>] (__sys_socket) from [<814935b8>] (sys_socket+0x10/0x14) [ 129.034030][ T4096] r6:00000000 r5:ffffffff r4:76b2eeb0 [ 129.034276][ T4096] [<814935a8>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 129.034674][ T4096] Exception stack(0xdfd25fa8 to 0xdfd25ff0) [ 129.034941][ T4096] 5fa0: 76b2eeb0 ffffffff 00000010 00000003 00000010 00000000 [ 129.035376][ T4096] 5fc0: 76b2eeb0 ffffffff 00000000 00000119 00000000 00006364 003d0f00 76b300bc [ 129.035843][ T4096] 5fe0: 00000000 76b2ee7c 0001b518 00135b0c [ 129.410789][ T31] audit: type=1400 audit(129.320:162): avc: denied { read } for pid=4103 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 129.413772][ T31] audit: type=1400 audit(129.320:163): avc: denied { write } for pid=4103 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 129.867157][ T31] audit: type=1400 audit(129.770:164): avc: denied { shutdown } for pid=4103 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.058634][ T31] audit: type=1400 audit(130.970:165): avc: denied { nlmsg_read } for pid=4117 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 134.819239][ T31] audit: type=1400 audit(134.720:166): avc: denied { create } for pid=4143 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.870874][ T31] audit: type=1400 audit(134.780:167): avc: denied { read } for pid=4143 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 135.374594][ T31] audit: type=1400 audit(135.280:168): avc: denied { getopt } for pid=4143 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 140.036284][ T31] audit: type=1400 audit(139.940:169): avc: denied { create } for pid=4181 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 140.056338][ T31] audit: type=1400 audit(139.960:170): avc: denied { bind } for pid=4181 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 140.482169][ T31] audit: type=1400 audit(140.390:171): avc: denied { accept } for pid=4181 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 140.500540][ T31] audit: type=1400 audit(140.410:172): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 143.263064][ T96] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 143.302889][ T31] audit: type=1400 audit(143.210:173): avc: denied { lock } for pid=4232 comm="syz.1.142" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.447908][ T96] usb 1-1: Using ep0 maxpacket: 32 [ 143.455059][ T96] usb 1-1: config 0 has no interfaces? [ 143.467199][ T96] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 143.467529][ T96] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 143.467760][ T96] usb 1-1: Product: syz [ 143.467885][ T96] usb 1-1: Manufacturer: syz [ 143.471250][ T96] usb 1-1: SerialNumber: syz [ 143.477917][ T96] usb 1-1: config 0 descriptor?? [ 143.698596][ T31] audit: type=1400 audit(143.600:174): avc: granted { setsecparam } for pid=4224 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 143.739377][ T31] audit: type=1400 audit(143.650:175): avc: denied { write } for pid=4240 comm="syz.1.145" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.768019][ T31] audit: type=1400 audit(143.680:176): avc: denied { map } for pid=4240 comm="syz.1.145" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 143.777035][ T31] audit: type=1400 audit(143.680:177): avc: denied { read write } for pid=4240 comm="syz.1.145" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 145.489963][ T31] audit: type=1400 audit(145.400:178): avc: denied { setattr } for pid=4264 comm="syz.1.157" name="CAN_RAW" dev="sockfs" ino=3416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 150.792153][ T96] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 150.792996][ T96] hid-generic 0000:0000:0000.0001: probe with driver hid-generic failed with error -22 [ 151.191971][ T31] audit: type=1800 audit(151.090:179): pid=4288 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.1.164" name="/newroot/110/file0" dev="tmpfs" ino=580 res=0 errno=0 [ 153.718905][ T49] usb 1-1: USB disconnect, device number 2 [ 154.368869][ T31] audit: type=1400 audit(154.280:180): avc: denied { ioctl } for pid=4319 comm="syz.0.172" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4415 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 156.992781][ T31] audit: type=1400 audit(156.900:181): avc: denied { getopt } for pid=4367 comm="syz.0.174" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.008150][ T31] audit: type=1400 audit(156.910:182): avc: denied { create } for pid=4367 comm="syz.0.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 157.200400][ T31] audit: type=1400 audit(157.110:183): avc: denied { write } for pid=4367 comm="syz.0.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 157.226200][ T31] audit: type=1400 audit(157.130:184): avc: denied { ioctl } for pid=4367 comm="syz.0.174" path="socket:[4438]" dev="sockfs" ino=4438 ioctlcmd=0x943b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 157.871853][ T4381] FAULT_INJECTION: forcing a failure. [ 157.871853][ T4381] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 157.872598][ T4381] CPU: 1 UID: 0 PID: 4381 Comm: syz.0.177 Not tainted 6.12.0-syzkaller #0 [ 157.872928][ T4381] Hardware name: ARM-Versatile Express [ 157.873162][ T4381] Call trace: [ 157.873377][ T4381] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 157.873792][ T4381] r7:e86d5e20 r6:20000200 r5:60000013 r4:8203f890 [ 157.874101][ T4381] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 157.874465][ T4381] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 157.874809][ T4381] r5:00000000 r4:8274f688 [ 157.875178][ T4381] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 157.875639][ T4381] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 157.876148][ T4381] r6:20000200 r5:00000000 r4:e86d5f20 [ 157.876758][ T4381] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 157.878299][ T4381] [<808ed648>] (should_fail_usercopy) from [<81494850>] (copy_msghdr_from_user+0x50/0x130) [ 157.879293][ T4381] [<81494800>] (copy_msghdr_from_user) from [<814949a8>] (___sys_sendmsg+0x78/0xd0) [ 157.880314][ T4381] r8:20000010 r7:00000000 r6:8335fb80 r5:e86d5f20 r4:e86d5e64 [ 157.880907][ T4381] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 157.882589][ T4381] r10:00000128 r9:84991800 r8:84f3c780 r7:20000010 r6:20000200 r5:84f3c781 [ 157.882948][ T4381] r4:00000003 [ 157.883164][ T4381] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 157.883569][ T4381] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 157.883893][ T4381] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 157.884273][ T4381] Exception stack(0xe86d5fa8 to 0xe86d5ff0) [ 157.884578][ T4381] 5fa0: 00000000 00000000 00000003 20000200 20000010 00000000 [ 157.884959][ T4381] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b570bc [ 157.885325][ T4381] 5fe0: 76b56ec0 76b56eb0 00018af0 00133450 [ 157.997669][ T31] audit: type=1400 audit(157.900:185): avc: denied { setopt } for pid=4382 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 158.003134][ T4383] sctp: [Deprecated]: syz.0.178 (pid 4383) Use of struct sctp_assoc_value in delayed_ack socket option. [ 158.003134][ T4383] Use struct sctp_sack_info instead [ 158.015497][ T31] audit: type=1400 audit(157.920:186): avc: denied { bind } for pid=4382 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 158.016898][ T31] audit: type=1400 audit(157.920:187): avc: denied { name_bind } for pid=4382 comm="syz.0.178" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 158.018967][ T31] audit: type=1400 audit(157.920:188): avc: denied { node_bind } for pid=4382 comm="syz.0.178" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 158.021371][ T31] audit: type=1400 audit(157.930:189): avc: denied { getopt } for pid=4382 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 160.471752][ T31] audit: type=1400 audit(160.380:190): avc: denied { create } for pid=4413 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 162.761469][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 162.761585][ T31] audit: type=1400 audit(162.670:201): avc: denied { bind } for pid=4444 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 163.313804][ T31] audit: type=1400 audit(163.220:202): avc: denied { write } for pid=4444 comm="syz.0.198" path="socket:[3732]" dev="sockfs" ino=3732 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 163.539010][ T31] audit: type=1400 audit(163.450:203): avc: denied { lock } for pid=4455 comm="syz.0.199" path="socket:[4703]" dev="sockfs" ino=4703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 168.443380][ T31] audit: type=1400 audit(168.350:204): avc: denied { read } for pid=4519 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 169.537038][ T8] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 169.692686][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 169.693270][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 169.693543][ T8] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 169.693750][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 169.698394][ T8] usb 2-1: config 0 descriptor?? [ 170.151125][ T8] usbhid 2-1:0.0: can't add hid device: -71 [ 170.151519][ T8] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 170.160736][ T8] usb 2-1: USB disconnect, device number 2 [ 170.948087][ T8] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 171.125922][ T8] usb 2-1: config index 0 descriptor too short (expected 9, got 0) [ 171.127318][ T8] usb 2-1: can't read configurations, error -22 [ 171.279556][ T8] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 171.453623][ T8] usb 2-1: config index 0 descriptor too short (expected 9, got 0) [ 171.454197][ T8] usb 2-1: can't read configurations, error -22 [ 171.455660][ T8] usb usb2-port1: attempt power cycle [ 171.817350][ T8] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 171.871596][ T8] usb 2-1: config index 0 descriptor too short (expected 9, got 0) [ 171.872065][ T8] usb 2-1: can't read configurations, error -22 [ 172.017428][ T8] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 172.066984][ T8] usb 2-1: config index 0 descriptor too short (expected 9, got 0) [ 172.067601][ T8] usb 2-1: can't read configurations, error -22 [ 172.069124][ T8] usb usb2-port1: unable to enumerate USB device [ 174.916228][ T31] audit: type=1400 audit(174.820:205): avc: denied { create } for pid=4567 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 174.923593][ T31] audit: type=1400 audit(174.830:206): avc: denied { getopt } for pid=4567 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 181.054929][ T31] audit: type=1400 audit(180.950:207): avc: denied { setopt } for pid=4583 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 184.154928][ T31] audit: type=1400 audit(184.060:208): avc: denied { accept } for pid=4588 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 184.424389][ T4605] FAULT_INJECTION: forcing a failure. [ 184.424389][ T4605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.424874][ T4605] CPU: 0 UID: 0 PID: 4605 Comm: syz.0.228 Not tainted 6.12.0-syzkaller #0 [ 184.425170][ T4605] Hardware name: ARM-Versatile Express [ 184.425358][ T4605] Call trace: [ 184.425536][ T4605] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 184.425899][ T4605] r7:00000000 r6:00000000 r5:60000013 r4:8203f890 [ 184.426743][ T4605] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 184.427194][ T4605] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 184.428097][ T4605] r5:00000000 r4:8274f688 [ 184.428402][ T4605] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 184.428803][ T4605] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 184.429833][ T4605] r6:00000000 r5:eb76df68 r4:00000002 [ 184.430666][ T4605] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 184.431213][ T4605] [<808ed648>] (should_fail_usercopy) from [<80553894>] (simple_read_from_buffer+0x8c/0x134) [ 184.431668][ T4605] [<80553808>] (simple_read_from_buffer) from [<805c86f0>] (proc_fail_nth_read+0xb8/0x100) [ 184.432100][ T4605] r10:00000001 r9:805c8638 r8:00000002 r7:eb76df68 r6:0000000f r5:76b56f30 [ 184.432451][ T4605] r4:84996000 r3:eb76de9f [ 184.432666][ T4605] [<805c8638>] (proc_fail_nth_read) from [<8051901c>] (vfs_read+0x98/0x324) [ 184.433209][ T4605] r8:76b56f30 r7:eb76df68 r6:84996000 r5:0000000f r4:84f3f840 [ 184.433612][ T4605] [<80518f84>] (vfs_read) from [<80519cc8>] (ksys_read+0x74/0xe4) [ 184.433980][ T4605] r10:00000003 r9:84996000 r8:8020029c r7:00000000 r6:00000000 r5:84f3f840 [ 184.434351][ T4605] r4:84f3f843 [ 184.434538][ T4605] [<80519c54>] (ksys_read) from [<80519d48>] (sys_read+0x10/0x14) [ 184.434897][ T4605] r7:00000003 r6:00000004 r5:76b56f30 r4:0000000f [ 184.435202][ T4605] [<80519d38>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 184.435586][ T4605] Exception stack(0xeb76dfa8 to 0xeb76dff0) [ 184.435892][ T4605] dfa0: 0000000f 76b56f30 00000004 76b56f30 0000000f 00000000 [ 184.436359][ T4605] dfc0: 0000000f 76b56f30 00000004 00000003 00000000 00006364 003d0f00 76b570bc [ 184.438779][ T4605] dfe0: 00000158 76b56ed0 000d8998 00131324 [ 186.135574][ T31] audit: type=1400 audit(186.040:209): avc: denied { getopt } for pid=4622 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 187.115027][ T31] audit: type=1400 audit(187.020:210): avc: denied { write } for pid=4632 comm="syz.0.236" dev="sockfs" ino=3894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 187.116177][ T31] audit: type=1400 audit(187.020:211): avc: denied { setattr } for pid=4632 comm="syz.0.236" name="PING" dev="sockfs" ino=3894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 187.125962][ T31] audit: type=1400 audit(187.030:212): avc: denied { ioctl } for pid=4632 comm="syz.0.236" path="socket:[3894]" dev="sockfs" ino=3894 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 187.724970][ T31] audit: type=1400 audit(187.630:213): avc: denied { getattr } for pid=4639 comm="syz.0.237" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 187.844029][ T4643] netlink: 48 bytes leftover after parsing attributes in process `syz.0.238'. [ 188.939259][ T31] audit: type=1400 audit(188.850:214): avc: denied { write } for pid=4646 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 188.951475][ T31] audit: type=1400 audit(188.860:215): avc: denied { create } for pid=4646 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 189.999000][ T4658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=4658 comm=syz.1.243 [ 190.340261][ T31] audit: type=1400 audit(190.240:216): avc: denied { ioctl } for pid=4666 comm="syz.1.246" path="socket:[4991]" dev="sockfs" ino=4991 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 191.833769][ T4675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=4675 comm=syz.0.248 [ 192.527883][ T31] audit: type=1400 audit(192.440:217): avc: denied { ioctl } for pid=4683 comm="syz.0.252" path="socket:[3986]" dev="sockfs" ino=3986 ioctlcmd=0x4b4a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 192.741338][ T4686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=4686 comm=syz.0.253 [ 193.091431][ T31] audit: type=1400 audit(193.000:218): avc: denied { listen } for pid=4692 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 193.119913][ T31] audit: type=1400 audit(193.030:219): avc: denied { accept } for pid=4692 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 195.252917][ T31] audit: type=1400 audit(195.160:220): avc: denied { write } for pid=4725 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 195.875157][ T31] audit: type=1400 audit(195.780:221): avc: denied { write } for pid=4727 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 196.478748][ T4732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=4732 comm=syz.1.273 [ 197.657499][ T719] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 197.817218][ T719] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 197.817860][ T719] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 197.818256][ T719] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 197.818662][ T719] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 197.819112][ T719] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 197.819407][ T719] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 197.823346][ T719] usb 1-1: config 0 descriptor?? [ 198.327403][ T719] plantronics 0003:047F:FFFF.0002: ignoring exceeding usage max [ 198.333118][ T719] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 198.344686][ T719] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 198.628782][ T719] usb 1-1: USB disconnect, device number 3 [ 199.263827][ T31] audit: type=1400 audit(199.170:222): avc: denied { setopt } for pid=4784 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 199.302123][ T31] audit: type=1400 audit(199.210:223): avc: denied { sqpoll } for pid=4784 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 199.739812][ T4795] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4795 comm=syz.0.287 [ 200.034611][ T4801] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36325 sclass=netlink_audit_socket pid=4801 comm=syz.0.290 [ 200.329143][ T4811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=4811 comm=syz.0.293 [ 200.419391][ T4813] FAULT_INJECTION: forcing a failure. [ 200.419391][ T4813] name failslab, interval 1, probability 0, space 0, times 0 [ 200.420048][ T4813] CPU: 1 UID: 0 PID: 4813 Comm: syz.0.294 Not tainted 6.12.0-syzkaller #0 [ 200.420403][ T4813] Hardware name: ARM-Versatile Express [ 200.420643][ T4813] Call trace: [ 200.420853][ T4813] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 200.421382][ T4813] r7:00000c40 r6:dfa6de44 r5:60000013 r4:8203f890 [ 200.421671][ T4813] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 200.422099][ T4813] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 200.422497][ T4813] r5:00000000 r4:8271955c [ 200.422726][ T4813] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 200.423140][ T4813] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 200.423634][ T4813] r6:dfa6de44 r5:00001000 r4:82c016c0 [ 200.423898][ T4813] [<804eb344>] (should_failslab) from [<804d0524>] (__kmalloc_noprof+0x9c/0x458) [ 200.424325][ T4813] [<804d0488>] (__kmalloc_noprof) from [<807575e8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 200.424796][ T4813] r10:8271fdf4 r9:84c27400 r8:00000000 r7:83364908 r6:dfa6de44 r5:00001000 [ 200.425184][ T4813] r4:00000000 [ 200.425376][ T4813] [<807575ac>] (tomoyo_realpath_from_path) from [<8075372c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 200.425862][ T4813] r10:8271fdf4 r9:00000000 r8:807580d8 r7:000001c0 r6:00000003 r5:81ad1abc [ 200.426266][ T4813] r4:dfa6de44 r3:824ba300 [ 200.426491][ T4813] [<80753660>] (tomoyo_path_number_perm) from [<80758138>] (tomoyo_path_mknod+0x60/0x9c) [ 200.427454][ T4813] r9:0000c1c0 r8:807580d8 r7:00000000 r6:0000c1c0 r5:83364908 r4:00000000 [ 200.428072][ T4813] [<807580d8>] (tomoyo_path_mknod) from [<80704c48>] (security_path_mknod+0xa8/0x22c) [ 200.428597][ T4813] r4:dfa6deac [ 200.428790][ T4813] [<80704ba0>] (security_path_mknod) from [<817550c4>] (unix_bind+0x17c/0x604) [ 200.429266][ T4813] r9:0000c1c0 r8:842f8000 r7:83364908 r6:8489e700 r5:850e8c80 r4:00000000 [ 200.429524][ T4813] [<81754f48>] (unix_bind) from [<814939a8>] (__sys_bind+0xec/0x108) [ 200.429921][ T4813] r10:0000011a r9:20003000 r8:8335a280 r7:84f3cb40 r6:0000006e r5:84f3cb41 [ 200.430345][ T4813] r4:00000000 [ 200.430519][ T4813] [<814938bc>] (__sys_bind) from [<814939d4>] (sys_bind+0x10/0x14) [ 200.431036][ T4813] r9:84995400 r8:8020029c r7:0000011a r6:00131400 r5:00000000 r4:00000000 [ 200.431392][ T4813] [<814939c4>] (sys_bind) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.431875][ T4813] Exception stack(0xdfa6dfa8 to 0xdfa6dff0) [ 200.432184][ T4813] dfa0: 00000000 00000000 00000003 20003000 0000006e 00000000 [ 200.432644][ T4813] dfc0: 00000000 00000000 00131400 0000011a 00000000 00006364 003d0f00 76b570bc [ 200.433114][ T4813] dfe0: 76b56ec0 76b56eb0 00018af0 00133450 [ 200.436339][ T4813] ERROR: Out of memory at tomoyo_realpath_from_path. [ 200.483379][ T4815] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=4815 comm=syz.1.295 [ 203.900464][ T31] audit: type=1400 audit(203.810:224): avc: denied { create } for pid=4841 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 203.957136][ T719] usb 2-1: new low-speed USB device number 7 using dummy_hcd [ 204.127166][ T719] usb 2-1: Invalid ep0 maxpacket: 64 [ 204.257308][ T719] usb 2-1: new low-speed USB device number 8 using dummy_hcd [ 204.407465][ T719] usb 2-1: Invalid ep0 maxpacket: 64 [ 204.409283][ T719] usb usb2-port1: attempt power cycle [ 204.747485][ T719] usb 2-1: new low-speed USB device number 9 using dummy_hcd [ 204.771124][ T719] usb 2-1: Invalid ep0 maxpacket: 64 [ 204.897529][ T719] usb 2-1: new low-speed USB device number 10 using dummy_hcd [ 204.919500][ T719] usb 2-1: Invalid ep0 maxpacket: 64 [ 204.920502][ T719] usb usb2-port1: unable to enumerate USB device [ 205.813624][ T31] audit: type=1400 audit(205.720:225): avc: denied { connect } for pid=4865 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 205.822450][ T31] audit: type=1400 audit(205.730:226): avc: denied { ioctl } for pid=4865 comm="syz.0.312" path="socket:[5262]" dev="sockfs" ino=5262 ioctlcmd=0x661b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 205.889884][ T4868] fuse: Bad value for 'fd' [ 206.097548][ T31] audit: type=1400 audit(206.000:227): avc: denied { ioctl } for pid=4873 comm="syz.0.316" path="socket:[5300]" dev="sockfs" ino=5300 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 206.169379][ T4876] FAULT_INJECTION: forcing a failure. [ 206.169379][ T4876] name failslab, interval 1, probability 0, space 0, times 0 [ 206.169807][ T4876] CPU: 0 UID: 0 PID: 4876 Comm: syz.0.317 Not tainted 6.12.0-syzkaller #0 [ 206.170120][ T4876] Hardware name: ARM-Versatile Express [ 206.170279][ T4876] Call trace: [ 206.170626][ T4876] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 206.171189][ T4876] r7:83c4e000 r6:00000dc0 r5:60000013 r4:8203f890 [ 206.171470][ T4876] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 206.171861][ T4876] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 206.172130][ T4876] r5:00000000 r4:8271955c [ 206.172277][ T4876] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 206.172508][ T4876] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 206.172794][ T4876] r6:00000dc0 r5:826f6910 r4:82c01240 [ 206.172960][ T4876] [<804eb344>] (should_failslab) from [<804cf54c>] (__kmalloc_cache_noprof+0x4c/0x344) [ 206.173245][ T4876] [<804cf500>] (__kmalloc_cache_noprof) from [<80261020>] (call_usermodehelper_setup+0x48/0xb8) [ 206.173554][ T4876] r10:83c4e000 r9:00000000 r8:826f67e4 r7:826f67e4 r6:84efb3c0 r5:826f6910 [ 206.173809][ T4876] r4:84efb3c0 [ 206.173926][ T4876] [<80260fd8>] (call_usermodehelper_setup) from [<802faa60>] (__request_module+0x150/0x2c0) [ 206.174261][ T4876] r7:83c4e000 r6:850dae00 r5:00000002 r4:84efb3c0 [ 206.174460][ T4876] [<802fa910>] (__request_module) from [<814fe4a0>] (dev_load+0x80/0x8c) [ 206.174707][ T4876] r3:00400140 r2:dfd91e28 r1:821fcbb4 [ 206.174858][ T4876] r8:dfd91e38 r7:00008917 r6:00000000 r5:00000000 r4:dfd91e28 [ 206.175076][ T4876] [<814fe420>] (dev_load) from [<816bfae0>] (devinet_ioctl+0x70/0x754) [ 206.175305][ T4876] r5:842f8000 r4:dfd91e28 [ 206.175404][ T4876] [<816bfa70>] (devinet_ioctl) from [<816c28f0>] (inet_ioctl+0x128/0x268) [ 206.175670][ T4876] r10:83c4e000 r9:81c674d4 r8:dfd91ecc r7:842f8000 r6:200005c0 r5:8407f440 [ 206.175903][ T4876] r4:00008917 [ 206.176010][ T4876] [<816c27c8>] (inet_ioctl) from [<814932a4>] (sock_ioctl+0x4cc/0x608) [ 206.176272][ T4876] r7:8321d900 r6:842f8000 r5:200005c0 r4:00008917 [ 206.176481][ T4876] [<81492dd8>] (sock_ioctl) from [<80532b64>] (sys_ioctl+0x138/0xd88) [ 206.176913][ T4876] r9:00000003 r8:84f3b9c0 r7:200005c0 r6:84f3b9c1 r5:00000000 r4:00008917 [ 206.177063][ T4876] [<80532a2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 206.177434][ T4876] Exception stack(0xdfd91fa8 to 0xdfd91ff0) [ 206.177564][ T4876] 1fa0: 00000000 00000000 00000003 00008917 200005c0 00000000 [ 206.177811][ T4876] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b570bc [ 206.178103][ T4876] 1fe0: 76b56ec0 76b56eb0 00018af0 00133450 [ 206.178276][ T4876] r10:00000036 r9:83c4e000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 206.178531][ T4876] r4:00000000 [ 208.975864][ T31] audit: type=1400 audit(208.880:228): avc: denied { lock } for pid=4881 comm="syz.0.319" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.979946][ T4882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4882 comm=syz.0.319 [ 212.851372][ T31] audit: type=1400 audit(212.760:229): avc: denied { create } for pid=4891 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 218.701299][ T4922] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pid=4922 comm=syz.1.330 [ 218.707491][ T31] audit: type=1400 audit(218.610:230): avc: denied { write } for pid=4921 comm="syz.1.330" path="socket:[5380]" dev="sockfs" ino=5380 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 225.608120][ T31] audit: type=1400 audit(225.520:231): avc: denied { create } for pid=4942 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 230.919425][ T719] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 231.073761][ T719] usb 2-1: config 1 interface 0 altsetting 125 endpoint 0x81 has an invalid bInterval 106, changing to 10 [ 231.074323][ T719] usb 2-1: config 1 interface 0 has no altsetting 0 [ 231.089588][ T719] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.40 [ 231.089898][ T719] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 231.090211][ T719] usb 2-1: Product: syz [ 231.090375][ T719] usb 2-1: Manufacturer: syz [ 231.090556][ T719] usb 2-1: SerialNumber: syz [ 231.134882][ T31] audit: type=1400 audit(231.040:232): avc: denied { getopt } for pid=4977 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 231.662799][ T31] audit: type=1400 audit(231.570:233): avc: denied { node_bind } for pid=4982 comm="syz.0.346" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 231.901494][ T4971] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 231.903966][ T4971] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 232.052251][ T31] audit: type=1400 audit(231.960:234): avc: denied { ioctl } for pid=4982 comm="syz.0.346" path="socket:[6430]" dev="sockfs" ino=6430 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 236.467304][ T719] usbhid 2-1:1.0: can't add hid device: -71 [ 236.467895][ T719] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 236.473697][ T719] usb 2-1: USB disconnect, device number 11 [ 240.633231][ T5008] fuse: Unknown parameter 'fd0x0000000000000008' [ 241.137054][ T31] audit: type=1400 audit(241.040:235): avc: denied { listen } for pid=5012 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 241.978832][ T5025] fuse: Unknown parameter 'fD' [ 242.185905][ T31] audit: type=1400 audit(242.090:236): avc: denied { remount } for pid=5028 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 242.360149][ T31] audit: type=1400 audit(242.270:237): avc: denied { watch } for pid=5030 comm="syz.1.358" path="/179" dev="tmpfs" ino=939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 242.527512][ T31] audit: type=1400 audit(242.440:238): avc: denied { ioctl } for pid=5031 comm="syz.0.357" path="socket:[5557]" dev="sockfs" ino=5557 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 242.683440][ T31] audit: type=1400 audit(242.590:239): avc: denied { append } for pid=5034 comm="syz.1.359" name="vsock" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/sbin/dhclient" [ 242.929574][ T31] audit: type=1400 audit(242.840:240): avc: denied { setopt } for pid=5038 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 242.957828][ T31] audit: type=1400 audit(242.870:241): avc: denied { getopt } for pid=5040 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 244.400327][ T31] audit: type=1400 audit(244.310:242): avc: denied { ioctl } for pid=5054 comm="syz.1.366" path="socket:[6561]" dev="sockfs" ino=6561 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 244.427782][ T31] audit: type=1400 audit(244.340:243): avc: denied { write } for pid=5054 comm="syz.1.366" path="socket:[6563]" dev="sockfs" ino=6563 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 244.464348][ T5055] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5055 comm=syz.1.366 [ 244.945180][ T31] audit: type=1400 audit(244.850:244): avc: denied { audit_write } for pid=5059 comm="syz.1.368" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 255.138239][ T5150] random: crng reseeded on system resumption [ 255.159226][ T5150] Restarting kernel threads ... done. [ 255.694987][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 255.695096][ T31] audit: type=1400 audit(255.600:246): avc: denied { setopt } for pid=5149 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 255.701842][ T31] audit: type=1400 audit(255.610:247): avc: denied { bind } for pid=5149 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.656239][ T5161] FAULT_INJECTION: forcing a failure. [ 256.656239][ T5161] name failslab, interval 1, probability 0, space 0, times 0 [ 256.658642][ T5161] CPU: 0 UID: 0 PID: 5161 Comm: syz.1.390 Not tainted 6.12.0-syzkaller #0 [ 256.659043][ T5161] Hardware name: ARM-Versatile Express [ 256.659526][ T5161] Call trace: [ 256.659992][ T5161] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 256.661245][ T5161] r7:84386c00 r6:00000dc0 r5:60000013 r4:8203f890 [ 256.661568][ T5161] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 256.661907][ T5161] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 256.662620][ T5161] r5:00000000 r4:8271955c [ 256.663076][ T5161] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 256.663512][ T5161] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 256.663893][ T5161] r6:00000dc0 r5:0000000e r4:82c01480 [ 256.664125][ T5161] [<804eb344>] (should_failslab) from [<804cf54c>] (__kmalloc_cache_noprof+0x4c/0x344) [ 256.664497][ T5161] [<804cf500>] (__kmalloc_cache_noprof) from [<8076e7b4>] (crypto_larval_alloc+0x30/0xec) [ 256.665017][ T5161] r10:00000137 r9:84386c00 r8:0000200f r7:0000200f r6:84f6a880 r5:0000000e [ 256.665363][ T5161] r4:00000000 [ 256.665545][ T5161] [<8076e784>] (crypto_larval_alloc) from [<8076ee9c>] (crypto_alg_mod_lookup+0x80/0x224) [ 256.665926][ T5161] r7:84f6a880 r6:0000200f r5:0000000e r4:00000000 [ 256.666229][ T5161] [<8076ee1c>] (crypto_alg_mod_lookup) from [<8076f1d8>] (crypto_alloc_tfm_node+0x4c/0xb8) [ 256.666912][ T5161] r9:84386c00 r8:84f6a880 r7:84f6a880 r6:00000000 r5:00000000 r4:81ad29a0 [ 256.667526][ T5161] [<8076f18c>] (crypto_alloc_tfm_node) from [<80776ae4>] (crypto_alloc_shash+0x30/0x38) [ 256.668585][ T5161] r9:84386c00 r8:84f6a880 r7:00000000 r6:b5403587 r5:00000000 r4:dfaadf30 [ 256.669414][ T5161] [<80776ab4>] (crypto_alloc_shash) from [<806fed38>] (__keyctl_dh_compute+0x15c/0x810) [ 256.669872][ T5161] [<806febdc>] (__keyctl_dh_compute) from [<806ff498>] (keyctl_dh_compute+0xac/0x118) [ 256.670376][ T5161] r10:00000137 r9:84386c00 r8:b5403587 r7:20000100 r6:00000000 r5:00000000 [ 256.670722][ T5161] r4:20000340 [ 256.670910][ T5161] [<806ff3ec>] (keyctl_dh_compute) from [<806fb210>] (sys_keyctl+0xfc/0x318) [ 256.671397][ T5161] r8:8020029c r7:00000137 r6:00131400 r5:00000000 r4:20000340 [ 256.671697][ T5161] [<806fb114>] (sys_keyctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 256.672223][ T5161] Exception stack(0xdfaadfa8 to 0xdfaadff0) [ 256.672904][ T5161] dfa0: 20000340 00000000 00000017 20000100 00000000 00000000 [ 256.673336][ T5161] dfc0: 20000340 00000000 00131400 00000137 00000000 00006364 003d0f00 76b300bc [ 256.674343][ T5161] dfe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 256.674873][ T5161] r5:00000000 r4:20000340 [ 256.677769][ T5161] could not allocate digest TFM handle sm3 [ 259.343231][ T31] audit: type=1400 audit(259.250:248): avc: denied { ioctl } for pid=5171 comm="syz.0.392" path="socket:[5782]" dev="sockfs" ino=5782 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 262.357650][ T31] audit: type=1400 audit(262.270:249): avc: denied { write } for pid=5185 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 262.374475][ T5186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5186 comm=syz.0.398 [ 262.629106][ T5192] FAULT_INJECTION: forcing a failure. [ 262.629106][ T5192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.629891][ T5192] CPU: 1 UID: 0 PID: 5192 Comm: syz.0.400 Not tainted 6.12.0-syzkaller #0 [ 262.630468][ T5192] Hardware name: ARM-Versatile Express [ 262.630733][ T5192] Call trace: [ 262.630988][ T5192] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 262.631504][ T5192] r7:00000000 r6:00000000 r5:60000013 r4:8203f890 [ 262.631809][ T5192] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 262.632455][ T5192] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 262.632927][ T5192] r5:00000000 r4:8274f688 [ 262.633155][ T5192] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 262.633557][ T5192] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 262.634182][ T5192] r6:00000000 r5:eab45f68 r4:00000002 [ 262.634449][ T5192] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 262.634868][ T5192] [<808ed648>] (should_fail_usercopy) from [<80553894>] (simple_read_from_buffer+0x8c/0x134) [ 262.635640][ T5192] [<80553808>] (simple_read_from_buffer) from [<805c86f0>] (proc_fail_nth_read+0xb8/0x100) [ 262.636088][ T5192] r10:00000001 r9:805c8638 r8:00000002 r7:eab45f68 r6:0000000f r5:76b56f30 [ 262.636835][ T5192] r4:84991800 r3:eab45e9f [ 262.637184][ T5192] [<805c8638>] (proc_fail_nth_read) from [<8051901c>] (vfs_read+0x98/0x324) [ 262.637621][ T5192] r8:76b56f30 r7:eab45f68 r6:84991800 r5:0000000f r4:84169d80 [ 262.637970][ T5192] [<80518f84>] (vfs_read) from [<80519cc8>] (ksys_read+0x74/0xe4) [ 262.638385][ T5192] r10:00000003 r9:84991800 r8:8020029c r7:00000000 r6:00000000 r5:84169d80 [ 262.638891][ T5192] r4:84169d83 [ 262.639079][ T5192] [<80519c54>] (ksys_read) from [<80519d48>] (sys_read+0x10/0x14) [ 262.639472][ T5192] r7:00000003 r6:00000004 r5:76b56f30 r4:0000000f [ 262.639844][ T5192] [<80519d38>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 262.640293][ T5192] Exception stack(0xeab45fa8 to 0xeab45ff0) [ 262.640589][ T5192] 5fa0: 0000000f 76b56f30 00000004 76b56f30 0000000f 00000000 [ 262.641001][ T5192] 5fc0: 0000000f 76b56f30 00000004 00000003 00000000 00006364 003d0f00 76b570bc [ 262.641548][ T5192] 5fe0: 00000158 76b56ed0 000d8998 00131324 [ 263.646051][ T5198] could not allocate digest TFM handle sm3 [ 264.597506][ T31] audit: type=1400 audit(264.500:250): avc: denied { setattr } for pid=5207 comm="syz.0.406" name="[io_uring]" dev="anon_inodefs" ino=6754 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 275.612696][ T31] audit: type=1400 audit(275.520:251): avc: denied { create } for pid=5244 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 277.212906][ T5273] syz.1.424 uses obsolete (PF_INET,SOCK_PACKET) [ 284.364426][ T31] audit: type=1400 audit(284.270:252): avc: denied { mounton } for pid=5272 comm="syz.1.424" path=2F3231362FE91F7189591E9233614B dev="tmpfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 284.364755][ T5274] cgroup2: Unknown parameter 'memory_hugetlbaccounting' [ 294.697053][ T31] audit: type=1400 audit(294.600:253): avc: denied { accept } for pid=5304 comm="syz.1.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.464654][ T31] audit: type=1400 audit(295.370:254): avc: denied { setattr } for pid=5316 comm="syz.1.439" path="socket:[5984]" dev="sockfs" ino=5984 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 295.484826][ T31] audit: type=1400 audit(295.390:255): avc: denied { write } for pid=5316 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 295.964128][ T5325] fuse: Bad value for 'fd' [ 295.972565][ T31] audit: type=1400 audit(295.880:256): avc: denied { remove_name } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 295.974305][ T31] audit: type=1400 audit(295.880:257): avc: denied { rename } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 297.663325][ T5339] fuse: Bad value for 'fd' [ 298.354826][ T5345] FAULT_INJECTION: forcing a failure. [ 298.354826][ T5345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.355559][ T5345] CPU: 0 UID: 0 PID: 5345 Comm: syz.1.451 Not tainted 6.12.0-syzkaller #0 [ 298.355930][ T5345] Hardware name: ARM-Versatile Express [ 298.356177][ T5345] Call trace: [ 298.356365][ T5345] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 298.357197][ T5345] r7:84290000 r6:00000000 r5:60000013 r4:8203f890 [ 298.357674][ T5345] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 298.358106][ T5345] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 298.358512][ T5345] r5:00000000 r4:8274f688 [ 298.358716][ T5345] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 298.359109][ T5345] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 298.359525][ T5345] r6:00000000 r5:e049df30 r4:000013c0 [ 298.359794][ T5345] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 298.360256][ T5345] [<808ed648>] (should_fail_usercopy) from [<8083f5c8>] (_copy_from_iter+0x68/0x7c8) [ 298.360664][ T5345] [<8083f560>] (_copy_from_iter) from [<815b4f2c>] (netlink_sendmsg+0x19c/0x43c) [ 298.361112][ T5345] r10:00000000 r9:00000000 r8:e049df30 r7:84da0400 r6:000013c0 r5:84f9d480 [ 298.361497][ T5345] r4:e049df20 [ 298.361700][ T5345] [<815b4d90>] (netlink_sendmsg) from [<81491c34>] (__sock_sendmsg+0x44/0x78) [ 298.362177][ T5345] r10:00000000 r9:e049ddc4 r8:e049ddc4 r7:8335af00 r6:8335af00 r5:e049df20 [ 298.362591][ T5345] r4:00000000 [ 298.362792][ T5345] [<81491bf0>] (__sock_sendmsg) from [<81492c34>] (____sys_sendmsg+0x2a4/0x2c4) [ 298.363254][ T5345] r7:8335af00 r6:00000000 r5:00000000 r4:e049df20 [ 298.363559][ T5345] [<81492990>] (____sys_sendmsg) from [<814949cc>] (___sys_sendmsg+0x9c/0xd0) [ 298.364014][ T5345] r10:e049de24 r9:200016c0 r8:00000000 r7:00000000 r6:8335af00 r5:e049df20 [ 298.364410][ T5345] r4:00000000 [ 298.364608][ T5345] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 298.365035][ T5345] r10:00000128 r9:83c76c00 r8:8408f240 r7:00000000 r6:200016c0 r5:8408f241 [ 298.365424][ T5345] r4:00000003 [ 298.365626][ T5345] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 298.366081][ T5345] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 298.366442][ T5345] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 298.367258][ T5345] Exception stack(0xe049dfa8 to 0xe049dff0) [ 298.367760][ T5345] dfa0: 00000000 00000000 00000003 200016c0 00000000 00000000 [ 298.368354][ T5345] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b300bc [ 298.368789][ T5345] dfe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 298.486554][ T5347] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2564 sclass=netlink_xfrm_socket pid=5347 comm=syz.1.452 [ 298.488817][ T31] audit: type=1400 audit(298.390:258): avc: denied { write } for pid=5346 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 298.631098][ T5350] fuse: Bad value for 'fd' [ 298.941761][ T5354] fuse: Bad value for 'fd' [ 299.126052][ T5357] mmap: syz.1.456 (5357) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 301.393967][ T5368] fuse: Unknown parameter '017777777777777777777770x0000000000000003' [ 309.844537][ T5434] fuse: Unknown parameter '00000000000000000000' [ 310.156135][ T31] audit: type=1400 audit(310.060:259): avc: denied { read } for pid=5437 comm="syz.1.477" path="socket:[7150]" dev="sockfs" ino=7150 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 310.395384][ T5442] FAULT_INJECTION: forcing a failure. [ 310.395384][ T5442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.395778][ T5442] CPU: 1 UID: 0 PID: 5442 Comm: syz.1.479 Not tainted 6.12.0-syzkaller #0 [ 310.396131][ T5442] Hardware name: ARM-Versatile Express [ 310.396389][ T5442] Call trace: [ 310.396871][ T5442] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 310.397814][ T5442] r7:ea999e20 r6:20000200 r5:60000013 r4:8203f890 [ 310.398601][ T5442] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 310.399187][ T5442] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 310.400196][ T5442] r5:00000000 r4:8274f688 [ 310.400612][ T5442] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 310.401496][ T5442] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 310.402275][ T5442] r6:20000200 r5:00000000 r4:ea999f20 [ 310.402650][ T5442] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 310.403246][ T5442] [<808ed648>] (should_fail_usercopy) from [<81494850>] (copy_msghdr_from_user+0x50/0x130) [ 310.404035][ T5442] [<81494800>] (copy_msghdr_from_user) from [<814949a8>] (___sys_sendmsg+0x78/0xd0) [ 310.404488][ T5442] r8:000440c0 r7:00000000 r6:8335e500 r5:ea999f20 r4:ea999e64 [ 310.405201][ T5442] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 310.406092][ T5442] r10:00000128 r9:82f09800 r8:8530dd80 r7:000440c0 r6:20000200 r5:8530dd81 [ 310.406770][ T5442] r4:00000003 [ 310.406971][ T5442] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 310.407299][ T5442] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 310.407505][ T5442] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 310.407760][ T5442] Exception stack(0xea999fa8 to 0xea999ff0) [ 310.407928][ T5442] 9fa0: 00000000 00000000 00000003 20000200 000440c0 00000000 [ 310.408162][ T5442] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b300bc [ 310.408413][ T5442] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 315.358532][ T31] audit: type=1400 audit(315.270:260): avc: denied { read } for pid=5485 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 315.799290][ T5492] FAULT_INJECTION: forcing a failure. [ 315.799290][ T5492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.799965][ T5492] CPU: 1 UID: 0 PID: 5492 Comm: syz.1.500 Not tainted 6.12.0-syzkaller #0 [ 315.800458][ T5492] Hardware name: ARM-Versatile Express [ 315.800650][ T5492] Call trace: [ 315.800851][ T5492] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 315.801293][ T5492] r7:eade9e20 r6:20000380 r5:60000013 r4:8203f890 [ 315.801571][ T5492] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 315.801875][ T5492] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 315.802263][ T5492] r5:00000000 r4:8274f688 [ 315.802486][ T5492] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 315.802874][ T5492] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 315.803266][ T5492] r6:20000380 r5:00000000 r4:eade9f20 [ 315.803525][ T5492] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 315.803911][ T5492] [<808ed648>] (should_fail_usercopy) from [<81494850>] (copy_msghdr_from_user+0x50/0x130) [ 315.804329][ T5492] [<81494800>] (copy_msghdr_from_user) from [<814949a8>] (___sys_sendmsg+0x78/0xd0) [ 315.804756][ T5492] r8:00000800 r7:00000000 r6:8335f400 r5:eade9f20 r4:eade9e64 [ 315.805066][ T5492] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 315.805470][ T5492] r10:00000128 r9:835e3000 r8:8530dc00 r7:00000800 r6:20000380 r5:8530dc01 [ 315.805802][ T5492] r4:00000003 [ 315.805974][ T5492] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 315.806402][ T5492] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 315.807187][ T5492] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 315.807761][ T5492] Exception stack(0xeade9fa8 to 0xeade9ff0) [ 315.808044][ T5492] 9fa0: 00000000 00000000 00000003 20000380 00000800 00000000 [ 315.808493][ T5492] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b300bc [ 315.808868][ T5492] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 315.882874][ T31] audit: type=1400 audit(315.790:261): avc: denied { ioctl } for pid=5485 comm="syz.0.499" path="socket:[8234]" dev="sockfs" ino=8234 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 321.128502][ T5554] TCP: TCP_TX_DELAY enabled [ 321.318511][ T5556] fuse: Bad value for 'user_id' [ 321.327295][ T5556] fuse: Bad value for 'user_id' [ 321.880572][ T31] audit: type=1400 audit(321.780:262): avc: denied { nlmsg_write } for pid=5555 comm="syz.1.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 323.258209][ T5566] fuse: Unknown parameter 'grou00000000000000000000' [ 324.079758][ T31] audit: type=1400 audit(323.990:263): avc: denied { setopt } for pid=5567 comm="syz.0.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 324.088065][ T5571] batadv_slave_0: entered promiscuous mode [ 324.331816][ T5571] batadv_slave_0: left promiscuous mode [ 325.578648][ T5585] fuse: Unknown parameter 'grou00000000000000000000' [ 328.149988][ T5601] fuse: Unknown parameter 'grou00000000000000000000' [ 328.297288][ T31] audit: type=1400 audit(328.200:264): avc: denied { connect } for pid=5602 comm="syz.1.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 331.220588][ T5614] fuse: Unknown parameter 'group_i00000000000000000000' [ 332.209831][ T5627] fuse: Unknown parameter 'group_i00000000000000000000' [ 333.396127][ T31] audit: type=1400 audit(333.300:265): avc: denied { name_bind } for pid=5642 comm="syz.0.550" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 333.962864][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 334.260881][ T5648] fuse: Unknown parameter 'group_i00000000000000000000' [ 334.593307][ T31] audit: type=1400 audit(334.500:266): avc: denied { accept } for pid=5652 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 335.255038][ T31] audit: type=1400 audit(335.160:267): avc: denied { create } for pid=5662 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 335.262598][ T31] audit: type=1400 audit(335.170:268): avc: denied { bind } for pid=5662 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 335.264851][ T31] audit: type=1400 audit(335.170:269): avc: denied { listen } for pid=5662 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 335.270057][ T31] audit: type=1400 audit(335.180:270): avc: denied { connect } for pid=5662 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 335.280125][ T31] audit: type=1400 audit(335.190:271): avc: denied { accept } for pid=5662 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 336.167430][ T49] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 336.183818][ T31] audit: type=1400 audit(336.090:272): avc: denied { getopt } for pid=5677 comm="syz.0.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 336.327561][ T49] usb 2-1: Using ep0 maxpacket: 32 [ 336.359145][ T49] usb 2-1: config 1 interface 0 altsetting 31 endpoint 0x81 has an invalid bInterval 183, changing to 11 [ 336.359801][ T49] usb 2-1: config 1 interface 0 altsetting 31 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 336.360273][ T49] usb 2-1: config 1 interface 0 has no altsetting 0 [ 336.402254][ T49] usb 2-1: New USB device found, idVendor=0c12, idProduct=0005, bcdDevice= 0.40 [ 336.402773][ T49] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 336.403068][ T49] usb 2-1: Product: Ⰹ [ 336.403296][ T49] usb 2-1: Manufacturer: 㱊 [ 336.403489][ T49] usb 2-1: SerialNumber: 㨏갋❚㼛ᘗ㎷ꑧ⡌齐籞휦銄뜼价㾟殒ᥚ染阮 [ 336.667870][ T5670] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 336.672106][ T5670] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 336.705407][ T49] usbhid 2-1:1.0: can't add hid device: -71 [ 336.706029][ T49] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 336.717417][ T49] usb 2-1: USB disconnect, device number 12 [ 337.590426][ T5701] dlm: non-version read from control device 8224 [ 338.398968][ T5712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=5712 comm=syz.1.566 [ 338.404386][ T31] audit: type=1400 audit(338.310:273): avc: denied { getopt } for pid=5711 comm="syz.1.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 339.190447][ T5720] FAULT_INJECTION: forcing a failure. [ 339.190447][ T5720] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.190997][ T5720] CPU: 0 UID: 0 PID: 5720 Comm: syz.1.568 Not tainted 6.12.0-syzkaller #0 [ 339.191371][ T5720] Hardware name: ARM-Versatile Express [ 339.191589][ T5720] Call trace: [ 339.191774][ T5720] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 339.192056][ T5720] r7:00000000 r6:00000000 r5:60000013 r4:8203f890 [ 339.192220][ T5720] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 339.192419][ T5720] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 339.192677][ T5720] r5:00000000 r4:8274f688 [ 339.192780][ T5720] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 339.192991][ T5720] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 339.193264][ T5720] r6:00000000 r5:e027df68 r4:00000002 [ 339.193445][ T5720] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 339.193646][ T5720] [<808ed648>] (should_fail_usercopy) from [<80553894>] (simple_read_from_buffer+0x8c/0x134) [ 339.193874][ T5720] [<80553808>] (simple_read_from_buffer) from [<805c86f0>] (proc_fail_nth_read+0xb8/0x100) [ 339.194184][ T5720] r10:00000001 r9:805c8638 r8:00000002 r7:e027df68 r6:0000000f r5:76b2ff30 [ 339.194589][ T5720] r4:835e0c00 r3:e027de9f [ 339.194756][ T5720] [<805c8638>] (proc_fail_nth_read) from [<8051901c>] (vfs_read+0x98/0x324) [ 339.195140][ T5720] r8:76b2ff30 r7:e027df68 r6:835e0c00 r5:0000000f r4:8408f240 [ 339.195407][ T5720] [<80518f84>] (vfs_read) from [<80519cc8>] (ksys_read+0x74/0xe4) [ 339.195795][ T5720] r10:00000003 r9:835e0c00 r8:8020029c r7:00000000 r6:00000000 r5:8408f240 [ 339.196056][ T5720] r4:8408f243 [ 339.196237][ T5720] [<80519c54>] (ksys_read) from [<80519d48>] (sys_read+0x10/0x14) [ 339.196637][ T5720] r7:00000003 r6:00000004 r5:76b2ff30 r4:0000000f [ 339.196884][ T5720] [<80519d38>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 339.197548][ T5720] Exception stack(0xe027dfa8 to 0xe027dff0) [ 339.197895][ T5720] dfa0: 0000000f 76b2ff30 00000004 76b2ff30 0000000f 00000000 [ 339.198290][ T5720] dfc0: 0000000f 76b2ff30 00000004 00000003 00000000 00006364 003d0f00 76b300bc [ 339.198599][ T5720] dfe0: 00000158 76b2fed0 000d8998 00131324 [ 339.694805][ T31] audit: type=1400 audit(339.600:274): avc: denied { ioctl } for pid=5727 comm="syz.1.571" path="socket:[7606]" dev="sockfs" ino=7606 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 342.306100][ T5737] fuse: Bad value for 'user_id' [ 342.307797][ T5737] fuse: Bad value for 'user_id' [ 342.997336][ T96] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 343.127403][ T96] usb 1-1: device descriptor read/64, error -71 [ 343.367867][ T96] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 343.497279][ T96] usb 1-1: device descriptor read/64, error -71 [ 343.608492][ T96] usb usb1-port1: attempt power cycle [ 343.947762][ T96] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 343.969613][ T96] usb 1-1: device descriptor read/8, error -71 [ 344.208338][ T96] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 344.243459][ T96] usb 1-1: device descriptor read/8, error -71 [ 344.349489][ T96] usb usb1-port1: unable to enumerate USB device [ 345.647072][ T31] audit: type=1400 audit(345.550:275): avc: denied { map } for pid=5749 comm="syz.1.578" path="pipe:[7636]" dev="pipefs" ino=7636 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 345.863388][ T5754] fuse: Bad value for 'user_id' [ 345.864159][ T5754] fuse: Bad value for 'user_id' [ 347.841114][ T5766] fuse: Bad value for 'fd' [ 349.320365][ T31] audit: type=1400 audit(349.230:276): avc: denied { create } for pid=5773 comm="syz.1.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 349.404966][ T31] audit: type=1400 audit(349.310:277): avc: denied { map } for pid=5773 comm="syz.1.588" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.428258][ T31] audit: type=1400 audit(349.340:278): avc: denied { ioctl } for pid=5773 comm="syz.1.588" path="socket:[8723]" dev="sockfs" ino=8723 ioctlcmd=0x4810 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 349.605824][ T5778] fuse: Bad value for 'fd' [ 353.018223][ T5796] fuse: Bad value for 'fd' [ 353.512444][ T31] audit: type=1400 audit(353.420:279): avc: denied { setopt } for pid=5801 comm="syz.1.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 353.869718][ T5807] fuse: Bad value for 'fd' [ 355.496334][ T5825] fuse: Bad value for 'fd' [ 357.084567][ T5845] fuse: Bad value for 'fd' [ 357.201725][ T31] audit: type=1400 audit(357.110:280): avc: denied { map } for pid=5846 comm="syz.0.610" path="socket:[7759]" dev="sockfs" ino=7759 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 357.987987][ T5857] fuse: Invalid rootmode [ 358.144024][ T5859] kernel profiling enabled (shift: 0) [ 358.144676][ T5859] FAULT_INJECTION: forcing a failure. [ 358.144676][ T5859] name failslab, interval 1, probability 0, space 0, times 0 [ 358.145182][ T5859] CPU: 0 UID: 0 PID: 5859 Comm: syz.1.615 Not tainted 6.12.0-syzkaller #0 [ 358.145478][ T5859] Hardware name: ARM-Versatile Express [ 358.145761][ T5859] Call trace: [ 358.146018][ T5859] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 358.146444][ T5859] r7:8405e000 r6:00000cc0 r5:60000013 r4:8203f890 [ 358.147854][ T5859] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 358.149501][ T5859] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 358.150366][ T5859] r5:00000000 r4:8271955c [ 358.151143][ T5859] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 358.152440][ T5859] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 358.152819][ T5859] r6:00000cc0 r5:00000022 r4:82c026c0 [ 358.153019][ T5859] [<804eb344>] (should_failslab) from [<804cfb34>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 358.153386][ T5859] [<804cfae4>] (kmem_cache_alloc_node_noprof) from [<804b0ce0>] (alloc_vmap_area+0x37c/0xdf8) [ 358.153690][ T5859] r10:8405e000 r9:00000000 r8:8260cb10 r7:ff800000 r6:00000001 r5:00000022 [ 358.153913][ T5859] r4:06001000 [ 358.154072][ T5859] [<804b0964>] (alloc_vmap_area) from [<804b1824>] (__get_vm_area_node.constprop.0+0xc8/0x11c) [ 358.154383][ T5859] r10:85196b80 r9:df800000 r8:00000dc0 r7:ffffffff r6:00000001 r5:00000022 [ 358.154651][ T5859] r4:06001000 [ 358.154766][ T5859] [<804b175c>] (__get_vm_area_node.constprop.0) from [<804b444c>] (__vmalloc_node_range_noprof+0x94/0x55c) [ 358.155107][ T5859] r10:df800000 r9:8205894c r8:ffffffff r7:ff800000 r6:00000dc0 r5:00000001 [ 358.155367][ T5859] r4:06000000 [ 358.155489][ T5859] [<804b43b8>] (__vmalloc_node_range_noprof) from [<804b4b48>] (vzalloc_noprof+0x6c/0x74) [ 358.155799][ T5859] r10:851c0590 r9:00000000 r8:00000000 r7:ea87df08 r6:828b61b4 r5:8260c728 [ 358.156034][ T5859] r4:00000000 [ 358.156147][ T5859] [<804b4adc>] (vzalloc_noprof) from [<819c8e18>] (profile_init+0x94/0xc0) [ 358.156434][ T5859] r4:06000000 [ 358.156552][ T5859] [<819c8d84>] (profile_init) from [<80272f28>] (profiling_store+0x40/0x74) [ 358.156835][ T5859] r7:ea87df08 r6:851c0580 r5:00000030 r4:85196b40 [ 358.157314][ T5859] [<80272ee8>] (profiling_store) from [<81981538>] (kobj_attr_store+0x1c/0x28) [ 358.157799][ T5859] r5:00000030 r4:80272ee8 [ 358.158118][ T5859] [<8198151c>] (kobj_attr_store) from [<805dd6a4>] (sysfs_kf_write+0x40/0x4c) [ 358.158622][ T5859] r5:00000030 r4:8198151c [ 358.158772][ T5859] [<805dd664>] (sysfs_kf_write) from [<805dc9a4>] (kernfs_fop_write_iter+0x114/0x200) [ 358.159084][ T5859] r5:00000030 r4:85196b40 [ 358.159221][ T5859] [<805dc890>] (kernfs_fop_write_iter) from [<80519a7c>] (vfs_write+0x274/0x44c) [ 358.159514][ T5859] r10:81a23048 r9:200000c0 r8:ea87df68 r7:8405e000 r6:00000030 r5:8408fd80 [ 358.159773][ T5859] r4:805dc890 [ 358.159885][ T5859] [<80519808>] (vfs_write) from [<80519dc0>] (ksys_write+0x74/0xe4) [ 358.160134][ T5859] r10:00000004 r9:8405e000 r8:8020029c r7:00000000 r6:00000000 r5:8408fd80 [ 358.160358][ T5859] r4:8408fd83 [ 358.160504][ T5859] [<80519d4c>] (ksys_write) from [<80519e40>] (sys_write+0x10/0x14) [ 358.160745][ T5859] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 358.160915][ T5859] [<80519e30>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 358.161163][ T5859] Exception stack(0xea87dfa8 to 0xea87dff0) [ 358.161355][ T5859] dfa0: 00000000 00000000 00000003 200000c0 00000030 00000000 [ 358.161614][ T5859] dfc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b300bc [ 358.161871][ T5859] dfe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 358.173917][ T5859] syz.1.615: vmalloc error: size 100663296, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 358.175252][ T5859] CPU: 0 UID: 0 PID: 5859 Comm: syz.1.615 Not tainted 6.12.0-syzkaller #0 [ 358.175603][ T5859] Hardware name: ARM-Versatile Express [ 358.175811][ T5859] Call trace: [ 358.175942][ T5859] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 358.176240][ T5859] r7:ff800000 r6:82058914 r5:60000013 r4:8203f890 [ 358.176441][ T5859] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 358.176922][ T5859] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 358.177398][ T5859] r5:8405e000 r4:00000000 [ 358.177544][ T5859] [<819c5de8>] (dump_stack) from [<804c23c4>] (warn_alloc+0xd8/0x178) [ 358.177792][ T5859] [<804c22ec>] (warn_alloc) from [<804b4484>] (__vmalloc_node_range_noprof+0xcc/0x55c) [ 358.178234][ T5859] r3:06000000 r2:82058914 [ 358.178394][ T5859] r6:00000dc0 r5:00000001 r4:06000000 [ 358.178607][ T5859] [<804b43b8>] (__vmalloc_node_range_noprof) from [<804b4b48>] (vzalloc_noprof+0x6c/0x74) [ 358.178930][ T5859] r10:851c0590 r9:00000000 r8:00000000 r7:ea87df08 r6:828b61b4 r5:8260c728 [ 358.179191][ T5859] r4:00000000 [ 358.179302][ T5859] [<804b4adc>] (vzalloc_noprof) from [<819c8e18>] (profile_init+0x94/0xc0) [ 358.179627][ T5859] r4:06000000 [ 358.179838][ T5859] [<819c8d84>] (profile_init) from [<80272f28>] (profiling_store+0x40/0x74) [ 358.180081][ T5859] r7:ea87df08 r6:851c0580 r5:00000030 r4:85196b40 [ 358.180327][ T5859] [<80272ee8>] (profiling_store) from [<81981538>] (kobj_attr_store+0x1c/0x28) [ 358.180616][ T5859] r5:00000030 r4:80272ee8 [ 358.180875][ T5859] [<8198151c>] (kobj_attr_store) from [<805dd6a4>] (sysfs_kf_write+0x40/0x4c) [ 358.181130][ T5859] r5:00000030 r4:8198151c [ 358.181282][ T5859] [<805dd664>] (sysfs_kf_write) from [<805dc9a4>] (kernfs_fop_write_iter+0x114/0x200) [ 358.181539][ T5859] r5:00000030 r4:85196b40 [ 358.181693][ T5859] [<805dc890>] (kernfs_fop_write_iter) from [<80519a7c>] (vfs_write+0x274/0x44c) [ 358.181985][ T5859] r10:81a23048 r9:200000c0 r8:ea87df68 r7:8405e000 r6:00000030 r5:8408fd80 [ 358.182456][ T5859] r4:805dc890 [ 358.182599][ T5859] [<80519808>] (vfs_write) from [<80519dc0>] (ksys_write+0x74/0xe4) [ 358.182892][ T5859] r10:00000004 r9:8405e000 r8:8020029c r7:00000000 r6:00000000 r5:8408fd80 [ 358.183370][ T5859] r4:8408fd83 [ 358.183496][ T5859] [<80519d4c>] (ksys_write) from [<80519e40>] (sys_write+0x10/0x14) [ 358.183737][ T5859] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 358.183924][ T5859] [<80519e30>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 358.184108][ T5859] Exception stack(0xea87dfa8 to 0xea87dff0) [ 358.184480][ T5859] dfa0: 00000000 00000000 00000003 200000c0 00000030 00000000 [ 358.185050][ T5859] dfc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b300bc [ 358.185392][ T5859] dfe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 358.196956][ T5859] Mem-Info: [ 358.197469][ T5859] active_anon:1314 inactive_anon:0 isolated_anon:0 [ 358.197469][ T5859] active_file:256 inactive_file:37200 isolated_file:0 [ 358.197469][ T5859] unevictable:768 dirty:24 writeback:0 [ 358.197469][ T5859] slab_reclaimable:973 slab_unreclaimable:5368 [ 358.197469][ T5859] mapped:1778 shmem:850 pagetables:227 [ 358.197469][ T5859] sec_pagetables:0 bounce:0 [ 358.197469][ T5859] kernel_misc_reclaimable:0 [ 358.197469][ T5859] free:442470 free_pcp:813 free_cma:4020 [ 358.198649][ T5859] Node 0 active_anon:5256kB inactive_anon:0kB active_file:1024kB inactive_file:148800kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:7112kB dirty:96kB writeback:0kB shmem:3400kB writeback_tmp:0kB kernel_stack:1448kB pagetables:908kB sec_pagetables:0kB all_unreclaimable? no [ 358.199578][ T5859] Normal free:1393200kB boost:0kB min:4776kB low:6200kB high:7624kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:944kB unevictable:0kB writepending:28kB present:1556480kB managed:1430016kB mlocked:0kB bounce:0kB free_pcp:3252kB local_pcp:1604kB free_cma:0kB [ 358.200253][ T5859] lowmem_reserve[]: 0 4224 0 [ 358.200565][ T5859] Normal: 0*4kB 2*8kB (UM) 0*16kB 1*32kB (M) 2*64kB (ME) 1*128kB (M) 5*256kB (ME) 6*512kB (UM) 6*1024kB (UME) 3*2048kB (ME) 336*4096kB (UM) = 1393200kB [ 358.201337][ T5859] 38306 total pagecache pages [ 358.201483][ T5859] 0 pages in swap cache [ 358.201623][ T5859] Free swap = 124996kB [ 358.201744][ T5859] Total swap = 124996kB [ 358.201943][ T5859] 524288 pages RAM [ 358.202119][ T5859] 135168 pages HighMem/MovableOnly [ 358.202289][ T5859] 31616 pages reserved [ 358.202471][ T5859] 4096 pages cma reserved [ 358.744483][ T31] audit: type=1400 audit(358.650:281): avc: denied { execute } for pid=5853 comm="syz.0.613" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 360.664536][ T5872] fuse: Invalid rootmode [ 362.150021][ T31] audit: type=1400 audit(362.060:282): avc: denied { listen } for pid=5879 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 364.485376][ T5890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=5890 comm=syz.1.626 [ 366.127761][ T719] hid-generic 0000:0000:0000.0003: item fetching failed at offset 0/1 [ 366.128251][ T719] hid-generic 0000:0000:0000.0003: probe with driver hid-generic failed with error -22 [ 366.308618][ T5904] fuse: Unknown parameter '00000000000000000000' [ 366.561301][ T31] audit: type=1400 audit(366.470:283): avc: denied { nlmsg_write } for pid=5907 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 366.848473][ T5915] fuse: Unknown parameter '00000000000000000000' [ 367.455050][ T5926] fuse: Unknown parameter '00000000000000000000' [ 368.984412][ T31] audit: type=1400 audit(368.890:284): avc: denied { ioctl } for pid=5932 comm="syz.0.643" path="socket:[8986]" dev="sockfs" ino=8986 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 370.151568][ T5939] fuse: Unknown parameter 'user00000000000000000000' [ 376.855313][ T31] audit: type=1400 audit(376.760:285): avc: denied { mount } for pid=5994 comm="syz.1.665" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 376.897308][ T31] audit: type=1400 audit(376.800:286): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 377.689827][ T6008] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6008 comm=syz.1.668 [ 379.939193][ T31] audit: type=1400 audit(379.850:287): avc: denied { lock } for pid=6035 comm="syz.1.678" path="socket:[9237]" dev="sockfs" ino=9237 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 380.187691][ T31] audit: type=1400 audit(380.100:288): avc: denied { getattr } for pid=6035 comm="syz.1.678" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 380.768305][ T6050] FAULT_INJECTION: forcing a failure. [ 380.768305][ T6050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.777209][ T6050] CPU: 1 UID: 0 PID: 6050 Comm: syz.0.683 Not tainted 6.12.0-syzkaller #0 [ 380.778134][ T6050] Hardware name: ARM-Versatile Express [ 380.778590][ T6050] Call trace: [ 380.778915][ T6050] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 380.779403][ T6050] r7:00000000 r6:00000000 r5:60000113 r4:8203f890 [ 380.779696][ T6050] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 380.780141][ T6050] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 380.780624][ T6050] r5:00000000 r4:8274f688 [ 380.780858][ T6050] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 380.781297][ T6050] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 380.781705][ T6050] r6:00000000 r5:eb7b9f68 r4:00000002 [ 380.781954][ T6050] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 380.782419][ T6050] [<808ed648>] (should_fail_usercopy) from [<80553894>] (simple_read_from_buffer+0x8c/0x134) [ 380.782985][ T6050] [<80553808>] (simple_read_from_buffer) from [<805c86f0>] (proc_fail_nth_read+0xb8/0x100) [ 380.783506][ T6050] r10:00000001 r9:805c8638 r8:00000002 r7:eb7b9f68 r6:0000000f r5:76b56f30 [ 380.783889][ T6050] r4:84993000 r3:eb7b9e9f [ 380.784128][ T6050] [<805c8638>] (proc_fail_nth_read) from [<8051901c>] (vfs_read+0x98/0x324) [ 380.784580][ T6050] r8:76b56f30 r7:eb7b9f68 r6:84993000 r5:0000000f r4:851cd480 [ 380.784925][ T6050] [<80518f84>] (vfs_read) from [<80519cc8>] (ksys_read+0x74/0xe4) [ 380.785347][ T6050] r10:00000003 r9:84993000 r8:8020029c r7:00000000 r6:00000000 r5:851cd480 [ 380.785724][ T6050] r4:851cd483 [ 380.785924][ T6050] [<80519c54>] (ksys_read) from [<80519d48>] (sys_read+0x10/0x14) [ 380.786397][ T6050] r7:00000003 r6:00000006 r5:76b56f30 r4:0000000f [ 380.787187][ T6050] [<80519d38>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 380.787845][ T6050] Exception stack(0xeb7b9fa8 to 0xeb7b9ff0) [ 380.788161][ T6050] 9fa0: 0000000f 76b56f30 00000006 76b56f30 0000000f 00000000 [ 380.788581][ T6050] 9fc0: 0000000f 76b56f30 00000006 00000003 00000000 00006364 003d0f00 76b570bc [ 380.788973][ T6050] 9fe0: 00000158 76b56ed0 000d8998 00131324 [ 380.997816][ T31] audit: type=1400 audit(380.910:289): avc: denied { read } for pid=6051 comm="syz.0.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 381.552920][ T31] audit: type=1400 audit(381.460:290): avc: denied { getopt } for pid=6051 comm="syz.0.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 381.885834][ T6059] 8021q: VLANs not supported on hsr0 [ 382.562548][ T6068] fuse: Unknown parameter 'user_id00000000000000000000' [ 383.661008][ T6075] fuse: Bad value for 'fd' [ 383.918130][ T6079] fuse: Unknown parameter 'user_id00000000000000000000' [ 384.193226][ T6084] FAULT_INJECTION: forcing a failure. [ 384.193226][ T6084] name failslab, interval 1, probability 0, space 0, times 0 [ 384.193667][ T6084] CPU: 1 UID: 0 PID: 6084 Comm: syz.0.697 Not tainted 6.12.0-syzkaller #0 [ 384.193868][ T6084] Hardware name: ARM-Versatile Express [ 384.194086][ T6084] Call trace: [ 384.194260][ T6084] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 384.194541][ T6084] r7:00000d40 r6:851cd4a8 r5:60000013 r4:8203f890 [ 384.194746][ T6084] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 384.194972][ T6084] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 384.195204][ T6084] r5:00000000 r4:8271955c [ 384.195330][ T6084] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 384.195585][ T6084] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 384.195851][ T6084] r6:851cd4a8 r5:00000018 r4:82c01240 [ 384.196002][ T6084] [<804eb344>] (should_failslab) from [<804d0524>] (__kmalloc_noprof+0x9c/0x458) [ 384.196262][ T6084] [<804d0488>] (__kmalloc_noprof) from [<807574f0>] (tomoyo_encode2+0x64/0xf0) [ 384.196577][ T6084] r10:00000fff r9:82f90000 r8:00000000 r7:830b3aa0 r6:851cd4a8 r5:84dd7ffd [ 384.197122][ T6084] r4:84dd7ff0 [ 384.197286][ T6084] [<8075748c>] (tomoyo_encode2) from [<807575a0>] (tomoyo_encode+0x24/0x30) [ 384.197890][ T6084] r9:82f90000 r8:00000000 r7:830b3aa0 r6:851cd4a8 r5:00001000 r4:84dd7ff1 [ 384.198153][ T6084] [<8075757c>] (tomoyo_encode) from [<8075762c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 384.198486][ T6084] r5:00001000 r4:84dd7000 [ 384.198663][ T6084] [<807575ac>] (tomoyo_realpath_from_path) from [<8075372c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 384.198991][ T6084] r10:84993c00 r9:00000000 r8:851cd480 r7:00008942 r6:00000004 r5:81ad1abc [ 384.199230][ T6084] r4:851cd4a8 r3:824ba300 [ 384.199361][ T6084] [<80753660>] (tomoyo_path_number_perm) from [<80757ff8>] (tomoyo_file_ioctl+0x1c/0x20) [ 384.199696][ T6084] r9:00000004 r8:851cd480 r7:20000380 r6:20000380 r5:00008942 r4:851cd480 [ 384.199934][ T6084] [<80757fdc>] (tomoyo_file_ioctl) from [<807061e4>] (security_file_ioctl+0x64/0x1e4) [ 384.200193][ T6084] [<80706180>] (security_file_ioctl) from [<80532a78>] (sys_ioctl+0x4c/0xd88) [ 384.200452][ T6084] r7:20000380 r6:851cd481 r5:00000000 r4:00008942 [ 384.200632][ T6084] [<80532a2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 384.200880][ T6084] Exception stack(0xec5c1fa8 to 0xec5c1ff0) [ 384.201055][ T6084] 1fa0: 00000000 00000000 00000004 00008942 20000380 00000000 [ 384.201308][ T6084] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b570bc [ 384.201545][ T6084] 1fe0: 76b56ec0 76b56eb0 00018af0 00133450 [ 384.201688][ T6084] r10:00000036 r9:84993c00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 384.201935][ T6084] r4:00000000 [ 384.235814][ T6084] ERROR: Out of memory at tomoyo_realpath_from_path. [ 384.540517][ T6088] fuse: Bad value for 'fd' [ 384.890115][ T6093] fuse: Bad value for 'fd' [ 385.454553][ T6099] fuse: Unknown parameter '0x0000000000000004' [ 385.708425][ T6103] fuse: Bad value for 'fd' [ 386.240770][ T6110] fuse: Unknown parameter '0x0000000000000004' [ 386.614800][ T6115] fuse: Bad value for 'fd' [ 387.121385][ T6123] fuse: Unknown parameter '0x0000000000000004' [ 388.374976][ T6129] fuse: Unknown parameter '0x0000000000000004' [ 389.243278][ T6138] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 389.389493][ T6141] fuse: Unknown parameter '0x0000000000000004' [ 389.723594][ T6145] fuse: Unknown parameter '0x0000000000000004' [ 390.280827][ T6151] fuse: Unknown parameter '0x0000000000000004' [ 390.646089][ T6155] fuse: Unknown parameter '0x0000000000000004' [ 390.982666][ T6169] fuse: Unknown parameter '0x0000000000000004' [ 392.283322][ T6176] fuse: Unknown parameter '0x0000000000000004' [ 394.175206][ T31] audit: type=1326 audit(394.080:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6180 comm="syz.1.733" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 394.463240][ T6188] fuse: Unknown parameter 'fd0x0000000000000004' [ 394.816319][ T31] audit: type=1400 audit(394.720:292): avc: denied { create } for pid=6191 comm="syz.0.736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 395.396078][ T31] audit: type=1400 audit(395.300:293): avc: denied { setattr } for pid=6195 comm="syz.0.737" name="SCTP" dev="sockfs" ino=9410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 395.829334][ T6201] fuse: Unknown parameter 'fd0x0000000000000004' [ 396.025850][ T31] audit: type=1326 audit(395.930:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6202 comm="syz.1.740" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 397.029812][ T6209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6209 comm=syz.0.743 [ 397.176943][ T6212] fuse: Unknown parameter 'fd0x0000000000000004' [ 397.340935][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 398.630290][ T6221] fuse: Unknown parameter 'fd0x0000000000000004' [ 412.917562][ T719] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 413.086992][ T719] usb 2-1: Using ep0 maxpacket: 32 [ 413.092978][ T719] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 413.103685][ T719] usb 2-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 413.103984][ T719] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 413.104133][ T719] usb 2-1: Product: syz [ 413.104234][ T719] usb 2-1: Manufacturer: syz [ 413.104343][ T719] usb 2-1: SerialNumber: syz [ 413.107574][ T719] usb 2-1: config 0 descriptor?? [ 413.110283][ T6290] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 413.126210][ T719] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 423.352195][ T8] usb 2-1: USB disconnect, device number 13 [ 431.812269][ T6390] SELinux: Context system_u:object_r:dlm_control_device_t:s0 is not valid (left unmapped). [ 431.814849][ T31] audit: type=1400 audit(431.720:295): avc: denied { relabelto } for pid=6389 comm="syz.1.786" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dlm_control_device_t:s0" [ 431.815978][ T31] audit: type=1400 audit(431.720:296): avc: denied { associate } for pid=6389 comm="syz.1.786" name="ubi_ctrl" dev="devtmpfs" ino=675 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:dlm_control_device_t:s0" [ 432.090094][ T6396] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6396 comm=syz.0.788 [ 440.760282][ T6443] FAULT_INJECTION: forcing a failure. [ 440.760282][ T6443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.761101][ T6443] CPU: 1 UID: 0 PID: 6443 Comm: syz.1.803 Not tainted 6.12.0-syzkaller #0 [ 440.761496][ T6443] Hardware name: ARM-Versatile Express [ 440.761698][ T6443] Call trace: [ 440.761930][ T6443] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 440.763022][ T6443] r7:00000004 r6:00000000 r5:60000013 r4:8203f890 [ 440.763298][ T6443] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 440.763659][ T6443] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 440.764016][ T6443] r5:00000000 r4:8274f688 [ 440.764229][ T6443] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 440.764589][ T6443] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 440.764941][ T6443] r6:00000000 r5:20000340 r4:ed3f9e48 [ 440.765176][ T6443] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 440.765548][ T6443] [<808ed648>] (should_fail_usercopy) from [<808f36b4>] (strncpy_from_user+0x20/0x194) [ 440.765927][ T6443] [<808f3694>] (strncpy_from_user) from [<805514d0>] (setxattr_copy+0x2c/0x90) [ 440.766380][ T6443] r10:000000e4 r9:835e3000 r8:20000380 r7:00000004 r6:00000000 r5:00001000 [ 440.767305][ T6443] r4:ed3f9e48 [ 440.767657][ T6443] [<805514a4>] (setxattr_copy) from [<80551710>] (path_setxattrat+0x7c/0x14c) [ 440.768082][ T6443] r5:00001000 r4:20000340 [ 440.768393][ T6443] [<80551694>] (path_setxattrat) from [<805519e0>] (sys_fsetxattr+0x30/0x38) [ 440.768871][ T6443] r8:8020029c r7:000000e4 r6:00131400 r5:00000000 r4:00000001 [ 440.769234][ T6443] [<805519b0>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 440.770597][ T6443] Exception stack(0xed3f9fa8 to 0xed3f9ff0) [ 440.771475][ T6443] 9fa0: 00000001 00000000 00000004 20000340 20000380 0000000f [ 440.772176][ T6443] 9fc0: 00000001 00000000 00131400 000000e4 00000000 00006364 003d0f00 76b300bc [ 440.772542][ T6443] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 447.857198][ T96] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 447.997730][ T96] usb 1-1: device descriptor read/64, error -71 [ 448.237278][ T96] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 448.367577][ T96] usb 1-1: device descriptor read/64, error -71 [ 448.478570][ T96] usb usb1-port1: attempt power cycle [ 448.817423][ T96] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 448.849368][ T96] usb 1-1: device descriptor read/8, error -71 [ 449.087038][ T96] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 449.138647][ T96] usb 1-1: device descriptor read/8, error -71 [ 449.228635][ T6484] capability: warning: `syz.1.816' uses 32-bit capabilities (legacy support in use) [ 449.247637][ T96] usb usb1-port1: unable to enumerate USB device [ 450.697948][ T8] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 450.874207][ T8] usb 2-1: config index 0 descriptor too short (expected 65535, got 146) [ 450.874971][ T8] usb 2-1: config 0 has too many interfaces: 255, using maximum allowed: 32 [ 450.875421][ T8] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 450.875856][ T8] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 255 [ 450.928407][ T8] usb 2-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 450.928921][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 450.929201][ T8] usb 2-1: SerialNumber: syz [ 450.933496][ T8] usb 2-1: config 0 descriptor?? [ 451.231947][ T5683] usb 2-1: USB disconnect, device number 14 [ 455.939126][ T6513] FAULT_INJECTION: forcing a failure. [ 455.939126][ T6513] name failslab, interval 1, probability 0, space 0, times 0 [ 455.939623][ T6513] CPU: 0 UID: 0 PID: 6513 Comm: syz.1.823 Not tainted 6.12.0-syzkaller #0 [ 455.939877][ T6513] Hardware name: ARM-Versatile Express [ 455.940077][ T6513] Call trace: [ 455.940247][ T6513] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 455.940572][ T6513] r7:835e2400 r6:00400cc0 r5:60000013 r4:8203f890 [ 455.940813][ T6513] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 455.941143][ T6513] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 455.941464][ T6513] r5:00000000 r4:8271955c [ 455.941624][ T6513] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 455.941878][ T6513] [<808ed454>] (should_fail_ex) from [<804eb3b0>] (should_failslab+0x6c/0x94) [ 455.942267][ T6513] r6:00400cc0 r5:ffffffff r4:82ea1000 [ 455.942433][ T6513] [<804eb344>] (should_failslab) from [<804cfb34>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 455.942718][ T6513] [<804cfae4>] (kmem_cache_alloc_node_noprof) from [<8149f23c>] (__alloc_skb+0x138/0x160) [ 455.943036][ T6513] r10:eda61d1c r9:00000000 r8:00400cc0 r7:00000000 r6:82ea1000 r5:ffffffff [ 455.943196][ T6513] r4:82606040 [ 455.943314][ T6513] [<8149f104>] (__alloc_skb) from [<814a7410>] (alloc_skb_with_frags+0x44/0x1ec) [ 455.943631][ T6513] r8:802a7ce0 r7:eda61cbc r6:00000000 r5:00001000 r4:00000003 [ 455.943855][ T6513] [<814a73cc>] (alloc_skb_with_frags) from [<81498b10>] (sock_alloc_send_pskb+0x1f4/0x228) [ 455.944249][ T6513] r10:eda61d1c r9:00000000 r8:802a7ce0 r7:eda61cbc r6:835e2400 r5:7fffffff [ 455.944468][ T6513] r4:84892100 [ 455.944687][ T6513] [<8149891c>] (sock_alloc_send_pskb) from [<81756bdc>] (unix_dgram_sendmsg+0x154/0x8b8) [ 455.945205][ T6513] r10:00000000 r9:84892100 r8:835e2400 r7:00000000 r6:00000000 r5:83229900 [ 455.945588][ T6513] r4:eda61f20 [ 455.945783][ T6513] [<81756a88>] (unix_dgram_sendmsg) from [<81757384>] (unix_seqpacket_sendmsg+0x44/0x84) [ 455.946282][ T6513] r10:00000000 r9:eda61dc4 r8:eda61dc4 r7:83229900 r6:83229900 r5:eda61f20 [ 455.946814][ T6513] r4:00000000 [ 455.946989][ T6513] [<81757340>] (unix_seqpacket_sendmsg) from [<81491c34>] (__sock_sendmsg+0x44/0x78) [ 455.947360][ T6513] r5:eda61f20 r4:00000000 [ 455.947495][ T6513] [<81491bf0>] (__sock_sendmsg) from [<81492c34>] (____sys_sendmsg+0x2a4/0x2c4) [ 455.947854][ T6513] r7:83229900 r6:00000000 r5:20000010 r4:eda61f20 [ 455.948066][ T6513] [<81492990>] (____sys_sendmsg) from [<814949cc>] (___sys_sendmsg+0x9c/0xd0) [ 455.948403][ T6513] r10:eda61e24 r9:20000200 r8:20000010 r7:00000000 r6:83229900 r5:eda61f20 [ 455.948644][ T6513] r4:00000000 [ 455.948778][ T6513] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 455.949056][ T6513] r10:00000128 r9:835e2400 r8:84169b40 r7:20000010 r6:20000200 r5:84169b41 [ 455.949249][ T6513] r4:00000003 [ 455.949358][ T6513] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 455.949569][ T6513] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 455.949747][ T6513] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 455.950023][ T6513] Exception stack(0xeda61fa8 to 0xeda61ff0) [ 455.950248][ T6513] 1fa0: 00000000 00000000 00000003 20000200 20000010 00000000 [ 455.950605][ T6513] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b300bc [ 455.950963][ T6513] 1fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 459.677671][ C0] hrtimer: interrupt took 543776 ns [ 463.601072][ T6552] fuse: Bad value for 'fd' [ 469.750857][ T31] audit: type=1400 audit(469.660:297): avc: denied { listen } for pid=6577 comm="syz.1.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 469.799606][ T31] audit: type=1400 audit(469.700:298): avc: denied { append } for pid=6577 comm="syz.1.842" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 471.402729][ T31] audit: type=1400 audit(471.310:299): avc: denied { module_request } for pid=6593 comm="syz.1.846" kmod="fs-adfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 471.431573][ T31] audit: type=1400 audit(471.330:300): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 471.432559][ T31] audit: type=1400 audit(471.340:301): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 471.437264][ T31] audit: type=1400 audit(471.340:302): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 471.438168][ T31] audit: type=1400 audit(471.340:303): avc: denied { open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 471.439079][ T31] audit: type=1400 audit(471.340:304): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 471.621561][ T31] audit: type=1400 audit(471.530:305): avc: denied { sys_module } for pid=6593 comm="syz.1.846" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 472.038212][ T31] audit: type=1400 audit(471.940:306): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 475.234151][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 475.234225][ T31] audit: type=1400 audit(475.140:329): avc: denied { create } for pid=6633 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 475.260651][ T31] audit: type=1400 audit(475.170:330): avc: denied { setopt } for pid=6633 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 475.264176][ T31] audit: type=1400 audit(475.170:331): avc: denied { connect } for pid=6633 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 475.272222][ T31] audit: type=1400 audit(475.180:332): avc: denied { write } for pid=6633 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 475.281725][ T31] audit: type=1400 audit(475.190:333): avc: denied { ioctl } for pid=6633 comm="syz.1.858" path="socket:[9991]" dev="sockfs" ino=9991 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 475.577746][ T31] audit: type=1400 audit(475.490:334): avc: denied { getopt } for pid=6627 comm="syz.0.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 475.640425][ T31] audit: type=1400 audit(475.550:335): avc: denied { create } for pid=6640 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 477.403343][ T31] audit: type=1400 audit(477.310:336): avc: denied { bind } for pid=6655 comm="syz.1.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 479.430897][ T31] audit: type=1400 audit(479.340:337): avc: denied { mounton } for pid=6669 comm="syz.0.871" path="/394/file0" dev="tmpfs" ino=2140 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 479.440739][ T31] audit: type=1400 audit(479.350:338): avc: denied { mount } for pid=6669 comm="syz.0.871" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 488.921277][ T31] audit: type=1400 audit(488.830:339): avc: denied { getattr } for pid=6701 comm="syz.0.881" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 490.933908][ T31] audit: type=1400 audit(490.840:340): avc: denied { write } for pid=6714 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.934819][ T31] audit: type=1400 audit(490.840:341): avc: denied { open } for pid=6714 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.939989][ T31] audit: type=1400 audit(490.840:342): avc: denied { getattr } for pid=6714 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.940632][ T31] audit: type=1400 audit(490.840:343): avc: denied { ioctl } for pid=6714 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.956355][ T31] audit: type=1400 audit(490.860:344): avc: denied { search } for pid=6714 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.986309][ T31] audit: type=1400 audit(490.890:345): avc: denied { read } for pid=6716 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.988024][ T31] audit: type=1400 audit(490.900:346): avc: denied { open } for pid=6716 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.989681][ T31] audit: type=1400 audit(490.900:347): avc: denied { getattr } for pid=6716 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 491.038064][ T31] audit: type=1400 audit(490.930:348): avc: denied { write } for pid=6714 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 493.978361][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 493.978451][ T31] audit: type=1400 audit(493.890:357): avc: denied { create } for pid=6734 comm="syz.1.890" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 493.984067][ T31] audit: type=1400 audit(493.890:358): avc: denied { create } for pid=6734 comm="syz.1.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 493.990502][ T6735] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 493.991238][ T6735] audit: out of memory in audit_log_start [ 493.995677][ T31] audit: type=1400 audit(493.900:359): avc: denied { read } for pid=6734 comm="syz.1.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 494.141517][ T31] audit: type=1400 audit(494.050:360): avc: denied { map } for pid=6736 comm="syz.0.891" path="/dev/adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 494.724742][ T31] audit: type=1400 audit(494.630:361): avc: denied { map_create } for pid=6736 comm="syz.0.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 498.382026][ T31] audit: type=1400 audit(498.290:362): avc: denied { create } for pid=6768 comm="syz.1.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 498.398168][ T31] audit: type=1400 audit(498.300:363): avc: denied { getopt } for pid=6768 comm="syz.1.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 498.410059][ T31] audit: type=1400 audit(498.310:364): avc: denied { nlmsg_read } for pid=6768 comm="syz.1.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 502.100948][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 502.101052][ T31] audit: type=1400 audit(502.010:367): avc: denied { create } for pid=6788 comm="syz.1.907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 502.103476][ T31] audit: type=1400 audit(502.010:368): avc: denied { getopt } for pid=6788 comm="syz.1.907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 502.509928][ T6799] FAULT_INJECTION: forcing a failure. [ 502.509928][ T6799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 502.510664][ T6799] CPU: 1 UID: 0 PID: 6799 Comm: syz.0.909 Not tainted 6.12.0-syzkaller #0 [ 502.510949][ T6799] Hardware name: ARM-Versatile Express [ 502.511132][ T6799] Call trace: [ 502.511357][ T6799] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 502.511708][ T6799] r7:84c02000 r6:00000000 r5:60000013 r4:8203f890 [ 502.511933][ T6799] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 502.513321][ T6799] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 502.514745][ T6799] r5:00000000 r4:8274f688 [ 502.514975][ T6799] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 502.515308][ T6799] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 502.515629][ T6799] r6:00000000 r5:dfb91f30 r4:00000964 [ 502.515837][ T6799] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 502.516172][ T6799] [<808ed648>] (should_fail_usercopy) from [<8083f5c8>] (_copy_from_iter+0x68/0x7c8) [ 502.516984][ T6799] [<8083f560>] (_copy_from_iter) from [<814adf00>] (skb_copy_datagram_from_iter+0x70/0x284) [ 502.518147][ T6799] r10:84cd70c0 r9:8489db00 r8:00000000 r7:00000964 r6:84c02000 r5:00000964 [ 502.518772][ T6799] r4:00000964 [ 502.519101][ T6799] [<814ade90>] (skb_copy_datagram_from_iter) from [<81756c2c>] (unix_dgram_sendmsg+0x1a4/0x8b8) [ 502.520145][ T6799] r10:00000000 r9:8489db00 r8:835e1800 r7:00000964 r6:00000964 r5:8335c500 [ 502.520668][ T6799] r4:dfb91f20 [ 502.520864][ T6799] [<81756a88>] (unix_dgram_sendmsg) from [<81757384>] (unix_seqpacket_sendmsg+0x44/0x84) [ 502.521255][ T6799] r10:00000000 r9:dfb91dc4 r8:dfb91dc4 r7:8335c500 r6:8335c500 r5:dfb91f20 [ 502.521550][ T6799] r4:00000000 [ 502.521727][ T6799] [<81757340>] (unix_seqpacket_sendmsg) from [<81491c34>] (__sock_sendmsg+0x44/0x78) [ 502.522165][ T6799] r5:dfb91f20 r4:00000000 [ 502.522383][ T6799] [<81491bf0>] (__sock_sendmsg) from [<81492c34>] (____sys_sendmsg+0x2a4/0x2c4) [ 502.522747][ T6799] r7:8335c500 r6:00000000 r5:20000890 r4:dfb91f20 [ 502.523017][ T6799] [<81492990>] (____sys_sendmsg) from [<814949cc>] (___sys_sendmsg+0x9c/0xd0) [ 502.523411][ T6799] r10:dfb91e24 r9:20000540 r8:20000890 r7:00000000 r6:8335c500 r5:dfb91f20 [ 502.523705][ T6799] r4:00000000 [ 502.523887][ T6799] [<81494930>] (___sys_sendmsg) from [<81494e5c>] (__sys_sendmsg+0x8c/0xd8) [ 502.524266][ T6799] r10:00000128 r9:835e1800 r8:84f3b300 r7:20000890 r6:20000540 r5:84f3b301 [ 502.524562][ T6799] r4:00000003 [ 502.524704][ T6799] [<81494dd0>] (__sys_sendmsg) from [<81494ebc>] (sys_sendmsg+0x14/0x18) [ 502.525032][ T6799] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 502.525290][ T6799] [<81494ea8>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 502.525682][ T6799] Exception stack(0xdfb91fa8 to 0xdfb91ff0) [ 502.525967][ T6799] 1fa0: 00000000 00000000 00000003 20000540 20000890 00000000 [ 502.526359][ T6799] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b570bc [ 502.526775][ T6799] 1fe0: 76b56ec0 76b56eb0 00018af0 00133450 [ 502.562728][ T31] audit: type=1400 audit(502.470:369): avc: denied { ioctl } for pid=6788 comm="syz.1.907" path="socket:[10204]" dev="sockfs" ino=10204 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 502.705606][ T31] audit: type=1400 audit(502.610:370): avc: denied { create } for pid=6800 comm="syz.0.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 502.728885][ T31] audit: type=1400 audit(502.640:371): avc: denied { write } for pid=6800 comm="syz.0.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 502.729815][ T6801] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6801 comm=syz.0.910 [ 502.732307][ T31] audit: type=1400 audit(502.640:372): avc: denied { ioctl } for pid=6800 comm="syz.0.910" path="socket:[11199]" dev="sockfs" ino=11199 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 503.012413][ T31] audit: type=1400 audit(502.920:373): avc: denied { create } for pid=6808 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 503.157859][ T31] audit: type=1400 audit(503.060:374): avc: denied { append } for pid=6810 comm="syz.0.915" name="adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 505.913518][ T31] audit: type=1400 audit(505.820:375): avc: denied { create } for pid=6820 comm="syz.1.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 505.914526][ T31] audit: type=1400 audit(505.820:376): avc: denied { write } for pid=6820 comm="syz.1.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 510.026153][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 510.026223][ T31] audit: type=1400 audit(509.930:380): avc: denied { create } for pid=6847 comm="syz.1.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 510.274645][ T31] audit: type=1400 audit(510.180:381): avc: denied { create } for pid=6851 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 510.290633][ T31] audit: type=1400 audit(510.200:382): avc: denied { listen } for pid=6851 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 510.471230][ T31] audit: type=1400 audit(510.380:383): avc: denied { mounton } for pid=6853 comm="syz.1.928" path="/505/file0" dev="tmpfs" ino=2684 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 513.079290][ T31] audit: type=1400 audit(512.980:384): avc: denied { getopt } for pid=6862 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 519.073418][ T31] audit: type=1400 audit(518.980:385): avc: denied { create } for pid=6864 comm="syz.1.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 525.918655][ T6897] FAULT_INJECTION: forcing a failure. [ 525.918655][ T6897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.919328][ T6897] CPU: 1 UID: 0 PID: 6897 Comm: syz.1.939 Not tainted 6.12.0-syzkaller #0 [ 525.919691][ T6897] Hardware name: ARM-Versatile Express [ 525.919944][ T6897] Call trace: [ 525.920171][ T6897] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 525.920890][ T6897] r7:00000000 r6:00000000 r5:60000013 r4:8203f890 [ 525.921456][ T6897] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 525.921866][ T6897] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 525.922339][ T6897] r5:00000000 r4:8274f688 [ 525.922577][ T6897] [<819c5de8>] (dump_stack) from [<808ed5e0>] (should_fail_ex+0x18c/0x1dc) [ 525.922982][ T6897] [<808ed454>] (should_fail_ex) from [<808ed644>] (should_fail+0x14/0x18) [ 525.923408][ T6897] r6:00000000 r5:dfe5df68 r4:00000002 [ 525.923678][ T6897] [<808ed630>] (should_fail) from [<808ed664>] (should_fail_usercopy+0x1c/0x20) [ 525.924095][ T6897] [<808ed648>] (should_fail_usercopy) from [<80553894>] (simple_read_from_buffer+0x8c/0x134) [ 525.924551][ T6897] [<80553808>] (simple_read_from_buffer) from [<805c86f0>] (proc_fail_nth_read+0xb8/0x100) [ 525.925016][ T6897] r10:00000001 r9:805c8638 r8:00000002 r7:dfe5df68 r6:0000000f r5:76b0ef30 [ 525.925414][ T6897] r4:84383c00 r3:dfe5de9f [ 525.925642][ T6897] [<805c8638>] (proc_fail_nth_read) from [<8051901c>] (vfs_read+0x98/0x324) [ 525.926104][ T6897] r8:76b0ef30 r7:dfe5df68 r6:84383c00 r5:0000000f r4:84f3b780 [ 525.926426][ T6897] [<80518f84>] (vfs_read) from [<80519cc8>] (ksys_read+0x74/0xe4) [ 525.927020][ T6897] r10:00000003 r9:84383c00 r8:8020029c r7:00000000 r6:00000000 r5:84f3b780 [ 525.927501][ T6897] r4:84f3b783 [ 525.927682][ T6897] [<80519c54>] (ksys_read) from [<80519d48>] (sys_read+0x10/0x14) [ 525.927985][ T6897] r7:00000003 r6:00000005 r5:76b0ef30 r4:0000000f [ 525.928210][ T6897] [<80519d38>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 525.928533][ T6897] Exception stack(0xdfe5dfa8 to 0xdfe5dff0) [ 525.928846][ T6897] dfa0: 0000000f 76b0ef30 00000005 76b0ef30 0000000f 00000000 [ 525.929263][ T6897] dfc0: 0000000f 76b0ef30 00000005 00000003 00000000 00006364 003d0f00 76b0f0bc [ 525.929650][ T6897] dfe0: 00000158 76b0eed0 000d8998 00131324 [ 529.360919][ T6913] capability: warning: `syz.1.945' uses deprecated v2 capabilities in a way that may be insecure [ 535.292843][ T31] audit: type=1400 audit(535.200:386): avc: denied { prog_load } for pid=6930 comm="syz.1.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 535.293986][ T31] audit: type=1400 audit(535.200:387): avc: denied { bpf } for pid=6930 comm="syz.1.950" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 535.294695][ T31] audit: type=1400 audit(535.200:388): avc: denied { perfmon } for pid=6930 comm="syz.1.950" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 539.499326][ T6959] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6959 comm=syz.1.959 [ 543.217685][ T31] audit: type=1400 audit(543.130:389): avc: denied { read } for pid=6979 comm="syz.0.965" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 543.218382][ T31] audit: type=1400 audit(543.130:390): avc: denied { open } for pid=6979 comm="syz.0.965" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 543.220645][ T31] audit: type=1400 audit(543.130:391): avc: denied { ioctl } for pid=6979 comm="syz.0.965" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 543.241443][ T31] audit: type=1400 audit(543.150:392): avc: denied { create } for pid=6979 comm="syz.0.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 550.207694][ T96] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 550.361387][ T96] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 550.361832][ T96] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 550.362184][ T96] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 550.362543][ T96] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 550.363057][ T96] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 550.370114][ T96] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 550.372918][ T96] usb 1-1: config 0 descriptor?? [ 550.865577][ T96] plantronics 0003:047F:FFFF.0004: ignoring exceeding usage max [ 550.870036][ T96] plantronics 0003:047F:FFFF.0004: No inputs registered, leaving [ 550.882356][ T96] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 551.131315][ T96] usb 1-1: USB disconnect, device number 12 [ 551.503662][ T7030] netlink: 44378 bytes leftover after parsing attributes in process `syz.0.971'. [ 553.028904][ T31] audit: type=1400 audit(552.940:393): avc: denied { nlmsg_write } for pid=7033 comm="syz.1.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 558.079555][ T31] audit: type=1400 audit(557.990:394): avc: denied { setopt } for pid=7060 comm="syz.1.978" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 558.259206][ T7063] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 558.260948][ T7063] ------------[ cut here ]------------ [ 558.261621][ T7063] kernel BUG at mm/usercopy.c:102! [ 558.262618][ T7063] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 558.263382][ T7063] Modules linked in: [ 558.264729][ T7063] CPU: 0 UID: 0 PID: 7063 Comm: syz.1.979 Not tainted 6.12.0-syzkaller #0 [ 558.265061][ T7063] Hardware name: ARM-Versatile Express [ 558.265366][ T7063] PC is at usercopy_abort+0x98/0x9c [ 558.265678][ T7063] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 558.265988][ T7063] pc : [<819ae208>] lr : [<802bd9c4>] psr: 60000013 [ 558.268298][ T7063] sp : eac69e38 ip : eac69d78 fp : eac69e5c [ 558.268987][ T7063] r10: 0000001a r9 : 835e9800 r8 : 835ee050 [ 558.269315][ T7063] r7 : dde724a0 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 558.269667][ T7063] r3 : 835e9800 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 558.270158][ T7063] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 558.270560][ T7063] Control: 30c5387d Table: 853b8500 DAC: fffffffd [ 558.270933][ T7063] Register r0 information: non-paged memory [ 558.271691][ T7063] Register r1 information: NULL pointer [ 558.271975][ T7063] Register r2 information: NULL pointer [ 558.272270][ T7063] Register r3 information: slab task_struct start 835e9800 pointer offset 0 size 3072 [ 558.273314][ T7063] Register r4 information: non-paged memory [ 558.273622][ T7063] Register r5 information: non-paged memory [ 558.273915][ T7063] Register r6 information: NULL pointer [ 558.274265][ T7063] Register r7 information: non-slab/vmalloc memory [ 558.274635][ T7063] Register r8 information: slab task_struct start 835ee000 pointer offset 80 size 3072 [ 558.275173][ T7063] Register r9 information: slab task_struct start 835e9800 pointer offset 0 size 3072 [ 558.275731][ T7063] Register r10 information: non-paged memory [ 558.276043][ T7063] Register r11 information: 2-page vmalloc region starting at 0xeac68000 allocated at kernel_clone+0xac/0x3e4 [ 558.277270][ T7063] Register r12 information: 2-page vmalloc region starting at 0xeac68000 allocated at kernel_clone+0xac/0x3e4 [ 558.278390][ T7063] Process syz.1.979 (pid: 7063, stack limit = 0xeac68000) [ 558.279158][ T7063] Stack: (0xeac69e38 to 0xeac6a000) [ 558.279443][ T7063] 9e20: 8205dadc 8202f5a0 [ 558.279831][ T7063] 9e40: 820449b4 00000050 00000074 835e9800 eac69e8c eac69e60 804d1bc8 819ae17c [ 558.280187][ T7063] 9e60: 00000074 eac69e70 802147a0 835ee050 00000074 00000000 835ee0c4 dde724a0 [ 558.280569][ T7063] 9e80: eac69ec4 eac69e90 80510994 804d1afc 00000074 fffffff6 eac69eb4 835ee050 [ 558.280943][ T7063] 9ea0: 00000074 fffffff6 00000000 00000000 835e9800 0000001a eac69ef4 eac69ec8 [ 558.281354][ T7063] 9ec0: 80209d90 80510718 835ee000 ddde4340 eac69ef4 eac69ee0 819d34cc 00000000 [ 558.281713][ T7063] 9ee0: 0000000c fffffff6 eac69f6c eac69ef8 8020a444 80209d0c 00000000 00000000 [ 558.282110][ T7063] 9f00: eac69f1c eac69f10 819d3398 8027c5a8 eac69f6c eac69f20 8028127c 819d3374 [ 558.282481][ T7063] 9f20: eac69f54 00000000 8027e1e4 60000013 819800d0 81997354 eac69f54 077c34bc [ 558.282822][ T7063] 9f40: 0000000f 835ee000 0000000f 077c34bc 835ee000 0000000f fffffff6 00000000 [ 558.283202][ T7063] 9f60: eac69fa4 eac69f70 80252e9c 8020a11c 80202cc0 077c34bc eac69fac 00000000 [ 558.283569][ T7063] 9f80: 00000000 002862f4 0000001a 8020029c 835e9800 0000001a 00000000 eac69fa8 [ 558.284014][ T7063] 9fa0: 80200060 80252c70 00000000 00000000 0000000f 00000564 fffffff6 00000000 [ 558.284419][ T7063] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b300bc [ 558.284799][ T7063] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 60000010 0000000f 00000000 00000000 [ 558.285227][ T7063] Call trace: [ 558.285506][ T7063] [<819ae170>] (usercopy_abort) from [<804d1bc8>] (__check_heap_object+0xd8/0xf4) [ 558.285939][ T7063] [<804d1af0>] (__check_heap_object) from [<80510994>] (__check_object_size+0x288/0x304) [ 558.286430][ T7063] r8:dde724a0 r7:835ee0c4 r6:00000000 r5:00000074 r4:835ee050 [ 558.287118][ T7063] [<8051070c>] (__check_object_size) from [<80209d90>] (fpa_set+0x90/0x118) [ 558.287870][ T7063] r10:0000001a r9:835e9800 r8:00000000 r7:00000000 r6:fffffff6 r5:00000074 [ 558.288218][ T7063] r4:835ee050 [ 558.288412][ T7063] [<80209d00>] (fpa_set) from [<8020a444>] (arch_ptrace+0x334/0x424) [ 558.288790][ T7063] r6:fffffff6 r5:0000000c r4:00000000 [ 558.289377][ T7063] [<8020a110>] (arch_ptrace) from [<80252e9c>] (sys_ptrace+0x238/0x4dc) [ 558.290062][ T7063] r7:00000000 r6:fffffff6 r5:0000000f r4:835ee000 [ 558.290730][ T7063] [<80252c64>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 558.291110][ T7063] Exception stack(0xeac69fa8 to 0xeac69ff0) [ 558.291398][ T7063] 9fa0: 00000000 00000000 0000000f 00000564 fffffff6 00000000 [ 558.291756][ T7063] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b300bc [ 558.292093][ T7063] 9fe0: 76b2fec0 76b2feb0 00018af0 00133450 [ 558.292383][ T7063] r10:0000001a r9:835e9800 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 558.292718][ T7063] r4:00000000 [ 558.293203][ T7063] Code: e30d0ae0 e3480205 e58dc000 ebfff273 (e7f001f2) [ 558.293934][ T7063] ---[ end trace 0000000000000000 ]--- [ 558.294709][ T7063] Kernel panic - not syncing: Fatal exception [ 558.296818][ T7063] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:20:12 Registers: info registers vcpu 0 CPU#0 R00=83f1e840 R01=00000054 R02=eae09000 R03=00000000 R04=8287442c R05=83f1e840 R06=809f0954 R07=8287446a R08=8287441c R09=0000004f R10=00000001 R11=eac69b5c R12=00000002 R13=eac69b50 R14=827592f4 R15=809f09ac PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=821e1a94 R02=5b928000 R03=00000000 R04=00000000 R05=83f22400 R06=ddde4340 R07=83f22b78 R08=00000000 R09=83f22400 R10=003d0f00 R11=eabcde84 R12=eabcde68 R13=eabcde68 R14=80288ca0 R15=80288ca0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005827e9 s17=00000000 d08=00000000005827e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=f86aa066 s33=1d44f2fc d16=1d44f2fcf86aa066 s34=a17a23ea s35=36eb03ed d17=36eb03eda17a23ea s36=d0e7d683 s37=ecfb6ed5 d18=ecfb6ed5d0e7d683 s38=a4ebe2e3 s39=e29acdd2 d19=e29acdd2a4ebe2e3 s40=7a1b6c35 s41=41a81581 d20=41a815817a1b6c35 s42=e2c06d35 s43=1bf54448 d21=1bf54448e2c06d35 s44=dbb4357d s45=07a9db04 d22=07a9db04dbb4357d s46=145a16cd s47=583f8b7a d23=583f8b7a145a16cd s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00880000 s53=00640000 d26=0064000000880000 s54=00b40000 s55=00a00000 d27=00a0000000b40000 s56=00480000 s57=00880000 d28=0088000000480000 s58=002c0000 s59=00140000 d29=00140000002c0000 s60=00080000 s61=00000008 d30=0000000800080000 s62=00080004 s63=03e60000 d31=03e6000000080004 FPSCR: 00000000