last executing test programs: 28.996139567s ago: executing program 1 (id=1315): socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x81, 0xfffff034}, {0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmmsg(r2, &(0x7f0000000180), 0x4000190, 0x0) 28.179312359s ago: executing program 0 (id=1317): r0 = socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8822d55593a2179}, 0xc) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="c99bfa0018", 0x5) r4 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r4) 16.807325078s ago: executing program 1 (id=1318): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfff}, 0x50) 16.807078388s ago: executing program 1 (id=1319): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000017000000440006803c00040067636da86165732900000000000000000000000000000000000000000000000014000000e3de3d7b4cd07ec3ee777de774fc7987cca41989040005"], 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) 16.236156767s ago: executing program 1 (id=1320): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc43", 0xf) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40}, 0x0) recvmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/229, 0xe5}], 0x1}}], 0x1, 0x60, 0x0) 11.429119957s ago: executing program 0 (id=1321): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000040)=@ethtool_coalesce={0x3e, 0x80, 0x10000, 0x6, 0xc6, 0x8001, 0xb28e, 0x46, 0x6, 0x81, 0x6, 0x3, 0x8, 0x8008, 0x8000, 0xae, 0x101, 0x2, 0xfff, 0x4d, 0x1000000, 0x1000001, 0x15b}}) 11.297081183s ago: executing program 0 (id=1322): r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f0000000980)={0x19980330}, &(0x7f00000009c0)={0x0, 0x3, 0x3, 0xfffffff9, 0x5, 0xfa0}) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, 0x0, 0x0) 11.138307202s ago: executing program 0 (id=1323): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000000206010100000000000000000000000005000400000000000900020073797a30000000000500010007000000050005000a000000140007800800114000000000080012400000ffff16000300686173683a6e6574"], 0x64}}, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x20a802, 0x1ff) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x100000c, 0x451}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) syz_io_uring_setup(0x7697, &(0x7f0000000c40)={0x0, 0x4291, 0x100, 0x2, 0xac, 0x0, r4}, 0x0, 0x0) 3.488739199s ago: executing program 1 (id=1324): r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002780)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r3) stat(0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000006680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r0}}}], 0x50, 0x881}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040000}}], 0x2, 0x0) 3.407609553s ago: executing program 1 (id=1325): r0 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8040) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) syz_open_dev$dri(0x0, 0xd21, 0x20000) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) epoll_create(0x3) ioctl$COMEDI_DEVCONFIG(0xffffffffffffffff, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(0xffffffffffffffff, 0x40946400, &(0x7f0000002740)={'mpc624\x00', [0x4f27, 0x3, 0x2, 0x3, 0x5, 0xcc5, 0xf, 0x7, 0xa, 0xe8aa, 0x2, 0x1, 0xffffbffd, 0x1, 0x0, 0x0, 0x0, 0x1a449, 0x3ff, 0x40000003, 0x99, 0xcaa7, 0x0, 0x20001e57, 0x7, 0xe6b, 0x3c, 0xd0, 0x2, 0x1, 0xfce]}) write$P9_RSTATu(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="1e0200000400000005a800000000000000000000000080000000000000000000810300"/47], 0x21e) ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x4004510d, &(0x7f0000000000)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="18000000240001030000000000000000010000000400ae"], 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) recvmmsg(r4, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0}, 0x200001}, {{0x0, 0x0, 0x0}, 0x200}, {{0x0, 0x0, 0x0}, 0x401}, {{0x0, 0x0, 0x0}, 0x101}, {{0x0, 0x0, 0x0}, 0x40}, {{0x0, 0x0, 0x0}, 0x409}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000001a00)=""/4109, 0x100d}, {&(0x7f0000006080)=""/4085, 0xff5}, {&(0x7f0000000340)=""/113, 0x71}, {0x0}, {&(0x7f0000000100)=""/98, 0x62}, {&(0x7f00000003c0)=""/100, 0x64}, {&(0x7f00000006c0)=""/200, 0xc8}, {&(0x7f0000000440)=""/67, 0x43}], 0x9}, 0x4db}, {{0x0, 0x0, 0x0}, 0x8}], 0x8, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) openat$sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r5 = getpgrp(0x0) prlimit64(r5, 0xa, &(0x7f0000000140)={0xa, 0x6}, 0x0) 82.090436ms ago: executing program 0 (id=1326): r0 = socket(0x200000000000011, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001180)={&(0x7f0000000ec0)=@file={0x0, './file0/file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x4000894) 0s ago: executing program 0 (id=1327): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x1f, 0x10000, 0x4, 0x3, 0xcc7, 0x4, 0x80008, 0xe, 0x6, 0x2, 0x1, 0x1, 0x1, 0x6, 0x10000105, 0x0, 0x1a44d, 0x3, 0x3fff7fff, 0x89, 0x10, 0x1, 0x20001e58, 0x80000b, 0xe69, 0x3c, 0x8, 0x6, 0x0, 0xffffffb8]}) kernel console output (not intermixed with test programs): .40 [ 477.841781][ T96] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 477.841997][ T96] usb 1-1: Product: syz [ 477.842041][ T96] usb 1-1: Manufacturer: syz [ 477.842064][ T96] usb 1-1: SerialNumber: syz [ 477.968316][ T4144] capability: warning: `syz.1.66' uses deprecated v2 capabilities in a way that may be insecure [ 478.273814][ T96] usb 1-1: 0:2 : does not exist [ 478.476324][ T96] usb 1-1: USB disconnect, device number 6 [ 478.638245][ C0] af_packet: tpacket_rcv: packet too big, clamped from 56 to 4294967272. macoff=96 [ 478.710692][ T31] audit: type=1400 audit(478.630:167): avc: denied { write } for pid=4171 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 478.714390][ T31] audit: type=1400 audit(478.630:168): avc: denied { nlmsg_read } for pid=4171 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 478.813987][ T31] audit: type=1326 audit(478.730:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 478.818288][ T31] audit: type=1326 audit(478.730:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 478.827040][ T31] audit: type=1326 audit(478.740:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.71" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 478.833936][ T31] audit: type=1326 audit(478.740:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 478.841192][ T31] audit: type=1400 audit(478.740:173): avc: denied { mount } for pid=4174 comm="syz.0.72" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 478.843164][ T31] audit: type=1326 audit(478.740:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 479.282171][ T3846] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 479.549343][ T3846] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 479.549652][ T3846] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 479.572188][ T3846] usb 2-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 479.575133][ T3846] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 479.581226][ T3846] usb 2-1: SerialNumber: syz [ 479.818495][ T3846] usb 2-1: 0:2 : does not exist [ 479.839408][ T3846] usb 2-1: USB disconnect, device number 3 [ 481.832540][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 481.832895][ T31] audit: type=1400 audit(481.750:177): avc: denied { write } for pid=4211 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 495.212716][ T31] audit: type=1400 audit(495.130:178): avc: denied { mounton } for pid=4222 comm="syz.1.82" path="/41/file0" dev="tmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 496.047733][ T96] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 496.198096][ T96] usb 1-1: Using ep0 maxpacket: 32 [ 496.212166][ T96] usb 1-1: config 0 has an invalid interface number: 77 but max is 0 [ 496.212523][ T96] usb 1-1: config 0 has no interface number 0 [ 496.229257][ T96] usb 1-1: New USB device found, idVendor=0763, idProduct=1002, bcdDevice=ef.ed [ 496.229575][ T96] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 496.229923][ T96] usb 1-1: Product: syz [ 496.230099][ T96] usb 1-1: Manufacturer: syz [ 496.230186][ T96] usb 1-1: SerialNumber: syz [ 496.236323][ T96] usb 1-1: config 0 descriptor?? [ 496.249668][ T96] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 496.303185][ T96] snd-usb-audio 1-1:0.77: probe with driver snd-usb-audio failed with error -2 [ 496.454942][ T4235] netlink: 642 bytes leftover after parsing attributes in process `syz.0.85'. [ 496.462347][ T96] usb 1-1: USB disconnect, device number 7 [ 496.802560][ T31] audit: type=1400 audit(496.720:179): avc: denied { accept } for pid=4264 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 496.810650][ T31] audit: type=1400 audit(496.730:180): avc: denied { write } for pid=4264 comm="syz.0.86" path="socket:[3479]" dev="sockfs" ino=3479 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 496.894389][ T4270] netlink: 164 bytes leftover after parsing attributes in process `syz.0.87'. [ 498.428572][ T4291] input: syz0 as /devices/virtual/input/input3 [ 503.115827][ T31] audit: type=1400 audit(503.030:181): avc: denied { unmount } for pid=4320 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 508.862633][ T4365] netlink: 88 bytes leftover after parsing attributes in process `syz.1.120'. [ 509.194690][ T3846] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 509.227862][ T3846] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 515.679858][ T4395] veth1_to_team: entered promiscuous mode [ 515.696137][ T4395] A link change request failed with some changes committed already. Interface veth1_to_team may have been left with an inconsistent configuration, please check. [ 516.488430][ T31] audit: type=1400 audit(516.410:182): avc: denied { bind } for pid=4413 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 516.495828][ T31] audit: type=1400 audit(516.410:183): avc: denied { connect } for pid=4413 comm="syz.1.134" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 516.510728][ T31] audit: type=1400 audit(516.430:184): avc: denied { write } for pid=4413 comm="syz.1.134" laddr=::1 lport=1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 516.947277][ T3846] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 517.122160][ T3846] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 517.140186][ T3846] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 517.140361][ T3846] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 517.140542][ T3846] usb 2-1: Product: syz [ 517.140641][ T3846] usb 2-1: Manufacturer: syz [ 517.140779][ T3846] usb 2-1: SerialNumber: syz [ 518.237470][ T3846] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 518.238510][ T3846] cdc_ncm 2-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 518.239228][ T3846] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 518.444017][ T3846] cdc_ncm 2-1:1.0: setting tx_max = 184 [ 518.464390][ T3846] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 518.482167][ T3846] usb 2-1: USB disconnect, device number 4 [ 518.484756][ T3846] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 518.571340][ T4444] raw_sendmsg: syz.1.137 forgot to set AF_INET. Fix it! [ 518.642024][ T31] audit: type=1400 audit(518.560:185): avc: denied { nlmsg_write } for pid=4445 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 519.052804][ T31] audit: type=1400 audit(518.970:186): avc: denied { mount } for pid=4452 comm="syz.1.140" name="/" dev="ramfs" ino=3673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 521.721238][ T4478] netlink: 8 bytes leftover after parsing attributes in process `syz.0.149'. [ 521.724126][ T4478] netlink: 8 bytes leftover after parsing attributes in process `syz.0.149'. [ 521.893190][ T31] audit: type=1400 audit(521.810:187): avc: denied { read } for pid=4479 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 524.804594][ T31] audit: type=1400 audit(524.710:188): avc: denied { create } for pid=4483 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 524.838339][ T31] audit: type=1400 audit(524.760:189): avc: denied { bind } for pid=4483 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 524.839966][ T31] audit: type=1400 audit(524.760:190): avc: denied { name_bind } for pid=4483 comm="syz.0.151" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 524.848351][ T31] audit: type=1400 audit(524.760:191): avc: denied { node_bind } for pid=4483 comm="syz.0.151" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 524.859567][ T31] audit: type=1400 audit(524.770:192): avc: denied { connect } for pid=4483 comm="syz.0.151" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 527.068289][ T4507] netlink: 24 bytes leftover after parsing attributes in process `syz.0.156'. [ 527.621733][ T31] audit: type=1400 audit(527.530:193): avc: denied { read } for pid=4525 comm="syz.1.159" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 527.662722][ T31] audit: type=1400 audit(527.530:194): avc: denied { open } for pid=4525 comm="syz.1.159" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 527.777671][ T31] audit: type=1400 audit(527.600:195): avc: denied { ioctl } for pid=4525 comm="syz.1.159" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 527.778056][ T31] audit: type=1400 audit(527.690:196): avc: denied { set_context_mgr } for pid=4525 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 527.890830][ T31] audit: type=1400 audit(527.810:197): avc: denied { map } for pid=4525 comm="syz.1.159" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 528.449304][ T31] audit: type=1400 audit(528.370:198): avc: denied { call } for pid=4525 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 529.600925][ T31] audit: type=1400 audit(529.520:199): avc: denied { ioctl } for pid=4532 comm="syz.1.161" path="socket:[3778]" dev="sockfs" ino=3778 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 529.724005][ T4530] netlink: 24 bytes leftover after parsing attributes in process `syz.0.158'. [ 530.637255][ T3110] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 530.807943][ T3110] usb 2-1: Using ep0 maxpacket: 16 [ 530.814644][ T3110] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x7 has invalid wMaxPacketSize 0 [ 530.815043][ T3110] usb 2-1: config 0 interface 0 altsetting 1 endpoint 0x89 has invalid wMaxPacketSize 0 [ 530.815328][ T3110] usb 2-1: config 0 interface 0 has no altsetting 0 [ 530.829470][ T3110] usb 2-1: New USB device found, idVendor=06cb, idProduct=0006, bcdDevice=9a.eb [ 530.829647][ T3110] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 530.829746][ T3110] usb 2-1: Product: syz [ 530.829858][ T3110] usb 2-1: Manufacturer: syz [ 530.829950][ T3110] usb 2-1: SerialNumber: syz [ 530.840180][ T3110] usb 2-1: config 0 descriptor?? [ 531.274647][ T3758] usb 2-1: USB disconnect, device number 5 [ 532.055524][ T31] audit: type=1400 audit(531.970:200): avc: denied { read } for pid=4562 comm="syz.0.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 532.804382][ T31] audit: type=1400 audit(532.720:201): avc: denied { block_suspend } for pid=4559 comm="syz.1.169" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 537.606792][ C0] hrtimer: interrupt took 8195552 ns [ 551.487845][ T31] audit: type=1400 audit(551.400:202): avc: denied { name_bind } for pid=4600 comm="syz.0.182" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 552.407657][ T3817] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 552.557292][ T3817] usb 2-1: Using ep0 maxpacket: 16 [ 552.565459][ T3817] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 552.566757][ T3817] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has invalid wMaxPacketSize 0 [ 552.567417][ T3817] usb 2-1: config 0 interface 0 has no altsetting 0 [ 552.568161][ T3817] usb 2-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 552.569384][ T3817] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 552.604553][ T3817] usb 2-1: config 0 descriptor?? [ 553.347990][ T3846] usb 2-1: USB disconnect, device number 6 [ 556.508262][ T3857] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 556.697404][ T3857] usb 2-1: Using ep0 maxpacket: 8 [ 556.704869][ T3857] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 556.705185][ T3857] usb 2-1: config 179 has no interface number 0 [ 556.705432][ T3857] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 556.705508][ T3857] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 556.705565][ T3857] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 556.705609][ T3857] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 556.705653][ T3857] usb 2-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 556.705754][ T3857] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 556.705796][ T3857] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 556.730821][ T4639] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 557.238603][ T4639] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 557.250375][ T4639] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 557.473136][ T3784] usb 2-1: USB disconnect, device number 7 [ 557.473621][ C0] xpad 2-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 557.473969][ C0] xpad 2-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 557.549483][ T3857] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:179.65/input/input5 [ 557.818628][ T31] audit: type=1400 audit(557.720:203): avc: denied { setopt } for pid=4657 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 558.521101][ T31] audit: type=1400 audit(558.440:204): avc: denied { bind } for pid=4679 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 558.813507][ T4682] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 562.327061][ T3784] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 562.507808][ T3784] usb 2-1: Using ep0 maxpacket: 16 [ 562.594826][ T3784] usb 2-1: config 2 has an invalid interface number: 226 but max is 0 [ 562.595476][ T3784] usb 2-1: config 2 has no interface number 0 [ 562.597558][ T3784] usb 2-1: config 2 interface 226 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 562.604699][ T3784] usb 2-1: New USB device found, idVendor=0586, idProduct=401a, bcdDevice= 5.2b [ 562.605806][ T3784] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 562.607094][ T3784] usb 2-1: Product: syz [ 562.607958][ T3784] usb 2-1: Manufacturer: syz [ 562.612372][ T3784] usb 2-1: SerialNumber: syz [ 562.624246][ T3784] rtl8150 2-1:2.226: couldn't find required endpoints [ 562.624951][ T3784] rtl8150 2-1:2.226: probe with driver rtl8150 failed with error -5 [ 562.829908][ T3784] usb 2-1: USB disconnect, device number 8 [ 562.992120][ T31] audit: type=1400 audit(562.910:205): avc: denied { read } for pid=4715 comm="syz.0.206" lport=252 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 563.033128][ T31] audit: type=1400 audit(562.950:206): avc: denied { write } for pid=4716 comm="syz.1.207" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 563.060926][ T31] audit: type=1400 audit(562.980:207): avc: denied { transfer } for pid=4716 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 564.912344][ T31] audit: type=1400 audit(564.830:208): avc: denied { read } for pid=4746 comm="syz.1.222" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 564.912703][ T31] audit: type=1400 audit(564.830:209): avc: denied { open } for pid=4746 comm="syz.1.222" path="/107/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 565.059296][ T4756] netlink: 44 bytes leftover after parsing attributes in process `syz.0.224'. [ 565.252554][ T31] audit: type=1400 audit(565.170:210): avc: denied { ioctl } for pid=4759 comm="syz.0.226" path="socket:[4500]" dev="sockfs" ino=4500 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.125982][ T4863] netlink: 88 bytes leftover after parsing attributes in process `syz.1.232'. [ 576.958749][ T4876] netlink: 12 bytes leftover after parsing attributes in process `syz.1.237'. [ 577.091516][ T31] audit: type=1326 audit(577.010:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 577.096946][ T31] audit: type=1326 audit(577.010:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 577.103341][ T31] audit: type=1326 audit(577.010:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 577.113449][ T31] audit: type=1326 audit(577.020:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 577.119969][ T31] audit: type=1326 audit(577.030:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 577.129121][ T31] audit: type=1400 audit(577.030:216): avc: denied { relabelfrom } for pid=4877 comm="syz.1.238" name="" dev="pipefs" ino=5136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 577.138650][ T31] audit: type=1326 audit(577.030:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 578.154919][ T4906] IPv6: sit1: Disabled Multicast RS [ 579.239450][ T4914] netlink: 120 bytes leftover after parsing attributes in process `syz.1.244'. [ 580.858881][ T4927] netlink: 12 bytes leftover after parsing attributes in process `syz.1.248'. [ 581.162582][ T4929] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 581.168855][ T31] audit: type=1400 audit(581.080:218): avc: denied { relabelto } for pid=4928 comm="syz.1.249" name="130" dev="tmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 581.169243][ T31] audit: type=1400 audit(581.080:219): avc: denied { associate } for pid=4928 comm="syz.1.249" name="130" dev="tmpfs" ino=674 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 581.195655][ T31] audit: type=1400 audit(581.110:220): avc: denied { add_name } for pid=4928 comm="syz.1.249" name=E91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 582.140927][ T4938] netlink: 28 bytes leftover after parsing attributes in process `syz.1.253'. [ 583.028114][ T96] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 583.327231][ T96] usb 2-1: Using ep0 maxpacket: 16 [ 583.352083][ T96] usb 2-1: config 0 has an invalid interface number: 29 but max is 0 [ 583.352288][ T96] usb 2-1: config 0 has no interface number 0 [ 583.389549][ T96] usb 2-1: New USB device found, idVendor=050d, idProduct=2102, bcdDevice=70.d0 [ 583.389767][ T96] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 583.389919][ T96] usb 2-1: Product: syz [ 583.390010][ T96] usb 2-1: Manufacturer: syz [ 583.390089][ T96] usb 2-1: SerialNumber: syz [ 583.393830][ T96] usb 2-1: config 0 descriptor?? [ 589.761584][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 589.763816][ T31] audit: type=1326 audit(589.680:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.0.261" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 597.243242][ T4182] usb 2-1: USB disconnect, device number 9 [ 598.802478][ T31] audit: type=1400 audit(598.720:227): avc: denied { mounton } for pid=5000 comm="syz.1.275" path="/proc/339/task" dev="proc" ino=5286 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 599.095229][ T31] audit: type=1400 audit(599.010:228): avc: denied { watch watch_reads } for pid=5005 comm="syz.1.277" path="/143" dev="tmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 603.400573][ T5020] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 603.455440][ T5020] netlink: 36 bytes leftover after parsing attributes in process `syz.1.281'. [ 605.267979][ T96] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 605.457283][ T96] usb 2-1: Using ep0 maxpacket: 16 [ 605.463517][ T96] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 605.465745][ T96] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 605.466063][ T96] usb 2-1: New USB device found, idVendor=056a, idProduct=0318, bcdDevice= 0.00 [ 605.466125][ T96] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 605.518456][ T96] usb 2-1: config 0 descriptor?? [ 606.099052][ T96] wacom 0003:056A:0318.0004: collection stack underflow [ 606.099524][ T96] wacom 0003:056A:0318.0004: item 0 4 0 12 parsing failed [ 606.100777][ T96] wacom 0003:056A:0318.0004: parse failed [ 606.101063][ T96] wacom 0003:056A:0318.0004: probe with driver wacom failed with error -22 [ 606.293214][ T3110] usb 2-1: USB disconnect, device number 10 [ 606.815224][ T5048] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=5048 comm=syz.1.285 [ 609.892764][ T5063] fuse: Bad value for 'fd' [ 624.620887][ T31] audit: type=1400 audit(624.540:229): avc: denied { bind } for pid=5082 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 624.659904][ T31] audit: type=1400 audit(624.580:230): avc: denied { setopt } for pid=5082 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 625.639672][ T1055] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.640255][ T1055] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.647847][ T1055] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.648271][ T1055] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 626.198169][ T31] audit: type=1400 audit(626.100:231): avc: denied { read } for pid=5086 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 627.899902][ T31] audit: type=1400 audit(627.820:232): avc: denied { getopt } for pid=5094 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 628.859650][ T31] audit: type=1400 audit(628.780:233): avc: denied { nlmsg_read } for pid=5100 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 628.861053][ T31] audit: type=1400 audit(628.780:234): avc: denied { nlmsg_write } for pid=5100 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 632.192741][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.194100][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.194846][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.195499][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.197928][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.198595][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.199225][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.200007][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.201547][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.202351][ T3670] hid-generic 0000:000F:0005.0005: unknown main item tag 0x0 [ 632.212904][ T3670] hid-generic 0000:000F:0005.0005: hidraw0: HID v100.00 Device [syz1] on syz1 [ 632.507096][ T3670] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 632.667416][ T3670] usb 2-1: Using ep0 maxpacket: 16 [ 632.687428][ T3670] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 632.688597][ T3670] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 632.690523][ T3670] usb 2-1: New USB device found, idVendor=056a, idProduct=0318, bcdDevice= 0.00 [ 632.692501][ T3670] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 632.702159][ T3670] usb 2-1: config 0 descriptor?? [ 633.153436][ T3670] wacom 0003:056A:0318.0006: unbalanced collection at end of report description [ 633.155549][ T3670] wacom 0003:056A:0318.0006: parse failed [ 633.156130][ T3670] wacom 0003:056A:0318.0006: probe with driver wacom failed with error -22 [ 633.370352][ T3670] usb 2-1: USB disconnect, device number 11 [ 635.027648][ T5235] "syz.0.328" (5235) uses obsolete ecb(arc4) skcipher [ 643.361372][ T31] audit: type=1326 audit(643.280:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5316 comm="syz.0.360" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 648.924966][ T31] audit: type=1326 audit(648.840:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5338 comm="syz.0.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7fc00000 [ 653.044916][ T31] audit: type=1400 audit(652.960:237): avc: denied { setopt } for pid=5342 comm="syz.0.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 658.054661][ T5361] bridge_slave_1: entered allmulticast mode [ 662.528038][ T5369] netlink: 8 bytes leftover after parsing attributes in process `syz.0.376'. [ 662.531513][ T5369] netlink: 20 bytes leftover after parsing attributes in process `syz.0.376'. [ 662.719090][ T5373] netlink: 24 bytes leftover after parsing attributes in process `syz.0.378'. [ 663.215678][ T31] audit: type=1326 audit(663.130:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 663.233222][ T31] audit: type=1326 audit(663.150:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 663.235450][ T31] audit: type=1326 audit(663.150:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 663.244319][ T31] audit: type=1326 audit(663.150:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 663.260040][ T31] audit: type=1326 audit(663.170:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 663.260627][ T31] audit: type=1326 audit(663.170:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 663.260946][ T31] audit: type=1326 audit(663.170:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 663.261211][ T31] audit: type=1326 audit(663.170:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 663.261458][ T31] audit: type=1326 audit(663.170:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 663.261695][ T31] audit: type=1326 audit(663.170:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5390 comm="syz.0.381" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 668.604704][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 668.605106][ T31] audit: type=1400 audit(668.520:292): avc: denied { create } for pid=5408 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 668.931909][ T5409] Zero length message leads to an empty skb [ 679.976351][ T31] audit: type=1400 audit(679.890:293): avc: denied { ioctl } for pid=5442 comm="syz.0.394" path="socket:[5763]" dev="sockfs" ino=5763 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 681.198097][ T31] audit: type=1400 audit(681.120:294): avc: denied { setopt } for pid=5445 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 704.453342][ T31] audit: type=1326 audit(704.370:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 704.458144][ T31] audit: type=1326 audit(704.380:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 704.463982][ T31] audit: type=1326 audit(704.380:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 704.469276][ T31] audit: type=1326 audit(704.390:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 704.474994][ T31] audit: type=1326 audit(704.390:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 704.475372][ T31] audit: type=1326 audit(704.390:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 705.317690][ T3846] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 705.557313][ T3846] usb 2-1: Using ep0 maxpacket: 16 [ 705.687483][ T3846] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 705.687820][ T3846] usb 2-1: New USB device found, idVendor=04d8, idProduct=00dd, bcdDevice= 0.00 [ 705.688121][ T3846] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 705.750359][ T3846] usb 2-1: config 0 descriptor?? [ 706.510343][ T3846] hid_parser_main: 30 callbacks suppressed [ 706.514433][ T3846] mcp2221 0003:04D8:00DD.0007: unknown main item tag 0x0 [ 706.514716][ T3846] mcp2221 0003:04D8:00DD.0007: unknown main item tag 0x0 [ 706.514897][ T3846] mcp2221 0003:04D8:00DD.0007: unknown main item tag 0x0 [ 706.514999][ T3846] mcp2221 0003:04D8:00DD.0007: unknown main item tag 0x0 [ 706.515099][ T3846] mcp2221 0003:04D8:00DD.0007: unknown main item tag 0x0 [ 706.515760][ T3846] mcp2221 0003:04D8:00DD.0007: USB HID v0.05 Device [HID 04d8:00dd] on usb-dummy_hcd.1-1/input0 [ 706.781210][ T3846] usb 2-1: USB disconnect, device number 12 [ 708.127373][ T3670] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 708.372365][ T3670] usb 2-1: Using ep0 maxpacket: 8 [ 708.473739][ T3670] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 708.474129][ T3670] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 708.474529][ T3670] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 708.474600][ T3670] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 708.474765][ T3670] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 708.474817][ T3670] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 708.787174][ T3670] usb 2-1: GET_CAPABILITIES returned 0 [ 708.787512][ T3670] usbtmc 2-1:16.0: can't read capabilities [ 709.041996][ T3110] usb 2-1: USB disconnect, device number 13 [ 719.813168][ T5549] syz.0.417 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 719.821450][ T31] audit: type=1400 audit(719.740:301): avc: denied { create } for pid=5548 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 719.832197][ T31] audit: type=1400 audit(719.750:302): avc: denied { sys_admin } for pid=5548 comm="syz.0.417" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 737.571858][ T5585] netlink: 12 bytes leftover after parsing attributes in process `syz.0.428'. [ 737.883815][ T31] audit: type=1400 audit(737.800:303): avc: denied { create } for pid=5586 comm="syz.0.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 741.306091][ T5591] netdevsim netdevsim0: Direct firmware load for . [ 741.306091][ T5591] failed with error -2 [ 741.308989][ T31] audit: type=1400 audit(741.230:304): avc: denied { firmware_load } for pid=5586 comm="syz.0.429" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 741.311279][ T5591] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 741.311279][ T5591] [ 741.902297][ T31] audit: type=1400 audit(741.820:305): avc: denied { sqpoll } for pid=5586 comm="syz.0.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 745.949427][ T5614] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5614 comm=syz.1.436 [ 752.302499][ T31] audit: type=1400 audit(752.200:306): avc: denied { create } for pid=5678 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 752.378208][ T31] audit: type=1400 audit(752.290:307): avc: denied { bind } for pid=5678 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 753.052038][ T31] audit: type=1400 audit(752.970:308): avc: denied { create } for pid=5685 comm="syz.1.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 754.940065][ T31] audit: type=1400 audit(754.860:309): avc: denied { create } for pid=5702 comm="syz.0.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 755.202911][ T31] audit: type=1400 audit(755.120:310): avc: denied { bind } for pid=5704 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 759.379050][ T31] audit: type=1400 audit(759.290:311): avc: denied { map } for pid=5745 comm="syz.1.482" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.382081][ T31] audit: type=1400 audit(759.300:312): avc: denied { execute } for pid=5745 comm="syz.1.482" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.787554][ T31] audit: type=1400 audit(761.700:313): avc: denied { view } for pid=5752 comm="syz.1.484" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 768.400374][ T5793] netlink: 104 bytes leftover after parsing attributes in process `syz.1.499'. [ 769.550054][ T5803] netlink: 97 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.551468][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.552586][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.553721][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.558562][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.560757][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.562931][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 769.564546][ T5803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.504'. [ 770.498809][ T31] audit: type=1400 audit(770.420:314): avc: denied { mount } for pid=5810 comm="syz.1.508" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 770.572562][ T31] audit: type=1400 audit(770.490:315): avc: denied { unmount } for pid=3121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 771.591599][ T5826] netlink: 1112 bytes leftover after parsing attributes in process `syz.1.514'. [ 772.820013][ T5840] netlink: 'syz.1.520': attribute type 39 has an invalid length. [ 785.307806][ T5873] __nla_validate_parse: 3 callbacks suppressed [ 785.315699][ T5873] netlink: 4 bytes leftover after parsing attributes in process `syz.0.533'. [ 785.635336][ T31] audit: type=1400 audit(785.550:316): avc: denied { write } for pid=5876 comm="syz.0.535" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 787.089763][ T31] audit: type=1400 audit(787.010:317): avc: denied { create } for pid=5889 comm="syz.0.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 789.654884][ T31] audit: type=1400 audit(789.570:318): avc: denied { create } for pid=5912 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 789.677450][ T31] audit: type=1400 audit(789.590:319): avc: denied { write } for pid=5912 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 794.645766][ T5950] netlink: 104 bytes leftover after parsing attributes in process `syz.0.567'. [ 794.937205][ T31] audit: type=1400 audit(794.850:320): avc: denied { create } for pid=5955 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.956053][ T31] audit: type=1400 audit(794.870:321): avc: denied { ioctl } for pid=5955 comm="syz.0.570" path="socket:[7580]" dev="sockfs" ino=7580 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.970756][ T31] audit: type=1400 audit(794.890:322): avc: denied { bind } for pid=5955 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.973969][ T31] audit: type=1400 audit(794.890:323): avc: denied { setopt } for pid=5955 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.982375][ T31] audit: type=1400 audit(794.900:324): avc: denied { accept } for pid=5955 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.986282][ T31] audit: type=1400 audit(794.900:325): avc: denied { write } for pid=5955 comm="syz.0.570" path="socket:[7583]" dev="sockfs" ino=7583 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 794.987645][ T5956] trusted_key: syz.0.570 sent an empty control message without MSG_MORE. [ 795.160311][ T31] audit: type=1400 audit(795.080:326): avc: denied { create } for pid=5962 comm="syz.0.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 795.216053][ T5966] FAULT_INJECTION: forcing a failure. [ 795.216053][ T5966] name failslab, interval 1, probability 0, space 0, times 1 [ 795.220064][ T5966] CPU: 0 UID: 0 PID: 5966 Comm: syz.1.574 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 795.220351][ T5966] Hardware name: ARM-Versatile Express [ 795.220674][ T5966] Call trace: [ 795.221060][ T5966] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 795.222545][ T5966] r7:8424ec00 r6:00000000 r5:60000013 r4:822602a4 [ 795.222649][ T5966] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 795.222720][ T5966] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 795.222792][ T5966] r5:8424ec00 r4:82917bc0 [ 795.222809][ T5966] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 795.222880][ T5966] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 795.222970][ T5966] r8:00000000 r7:8424ec00 r6:00000820 r5:8595cd80 r4:830a7b40 [ 795.222990][ T5966] [<8051f3e4>] (should_failslab) from [<80503a60>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 795.223048][ T5966] [<80503a14>] (kmem_cache_alloc_noprof) from [<81556d68>] (skb_clone+0x60/0x1c8) [ 795.223222][ T5966] r10:000001a2 r9:8561e100 r8:83eb2c00 r7:8595cd80 r6:8512f6c0 r5:8595cd80 [ 795.223258][ T5966] r4:00000820 [ 795.223277][ T5966] [<81556d08>] (skb_clone) from [<8166ce64>] (__netlink_deliver_tap+0x1f4/0x28c) [ 795.223353][ T5966] r5:00000014 r4:8512f000 [ 795.223476][ T5966] [<8166cc70>] (__netlink_deliver_tap) from [<816701c4>] (netlink_unicast+0x2f0/0x30c) [ 795.223564][ T5966] r10:00000000 r9:00000000 r8:851e8ec0 r7:8595cd80 r6:8561e100 r5:00000014 [ 795.223588][ T5966] r4:83eb2c00 [ 795.223606][ T5966] [<8166fed4>] (netlink_unicast) from [<816703ac>] (netlink_sendmsg+0x1cc/0x444) [ 795.223680][ T5966] r9:00000000 r8:00000000 r7:85b1cc00 r6:00000014 r5:8595cd80 r4:dfb59f20 [ 795.223702][ T5966] [<816701e0>] (netlink_sendmsg) from [<81542630>] (__sock_sendmsg+0x44/0x78) [ 795.223784][ T5966] r10:00000000 r9:dfb59dc4 r8:dfb59dc4 r7:00000000 r6:84ad8000 r5:dfb59f20 [ 795.223806][ T5966] r4:00000000 [ 795.223823][ T5966] [<815425ec>] (__sock_sendmsg) from [<81543984>] (____sys_sendmsg+0x298/0x2cc) [ 795.223895][ T5966] r7:00000000 r6:84ad8000 r5:0000c000 r4:dfb59f20 [ 795.223913][ T5966] [<815436ec>] (____sys_sendmsg) from [<8154594c>] (___sys_sendmsg+0x9c/0xd0) [ 795.224002][ T5966] r10:dfb59e24 r9:20001bc0 r8:0000c000 r7:00000000 r6:84ad8000 r5:dfb59f20 [ 795.224024][ T5966] r4:00000000 [ 795.224043][ T5966] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 795.224127][ T5966] r10:00000128 r9:8424ec00 r8:859b5240 r7:0000c000 r6:20001bc0 r5:859b5241 [ 795.224148][ T5966] r4:00000003 [ 795.224165][ T5966] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 795.224272][ T5966] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 795.224289][ T5966] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 795.224428][ T5966] Exception stack(0xdfb59fa8 to 0xdfb59ff0) [ 795.224729][ T5966] 9fa0: 00000000 00000000 00000003 20001bc0 0000c000 00000000 [ 795.224794][ T5966] 9fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 795.224826][ T5966] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 795.548370][ T31] audit: type=1400 audit(795.460:327): avc: denied { setopt } for pid=5962 comm="syz.0.573" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 795.875014][ T31] audit: type=1400 audit(795.790:328): avc: denied { ioctl } for pid=5968 comm="syz.1.575" path="socket:[7619]" dev="sockfs" ino=7619 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 796.665202][ T5983] FAULT_INJECTION: forcing a failure. [ 796.665202][ T5983] name failslab, interval 1, probability 0, space 0, times 0 [ 796.665927][ T5983] CPU: 1 UID: 0 PID: 5983 Comm: syz.1.578 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 796.666042][ T5983] Hardware name: ARM-Versatile Express [ 796.666280][ T5983] Call trace: [ 796.668582][ T5983] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 796.670733][ T5983] r7:84256000 r6:00000000 r5:60000013 r4:822602a4 [ 796.670951][ T5983] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 796.671143][ T5983] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 796.671344][ T5983] r5:84256000 r4:82917bc0 [ 796.671438][ T5983] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 796.671498][ T5983] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 796.671609][ T5983] r8:00000000 r7:84256000 r6:00000cc0 r5:ffffffff r4:830a7b40 [ 796.671626][ T5983] [<8051f3e4>] (should_failslab) from [<805033f4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 796.671735][ T5983] [<805033a4>] (kmem_cache_alloc_node_noprof) from [<815508bc>] (__alloc_skb+0x138/0x160) [ 796.672002][ T5983] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7b40 r5:ffffffff [ 796.672109][ T5983] r4:828060c0 [ 796.672206][ T5983] [<81550784>] (__alloc_skb) from [<8166fbcc>] (netlink_alloc_large_skb+0x88/0xa0) [ 796.672318][ T5983] r8:00000000 r7:85b1b400 r6:00000020 r5:84adbb80 r4:00000140 [ 796.672334][ T5983] [<8166fb44>] (netlink_alloc_large_skb) from [<81670314>] (netlink_sendmsg+0x134/0x444) [ 796.672712][ T5983] r5:84adbb80 r4:df9edf20 [ 796.672731][ T5983] [<816701e0>] (netlink_sendmsg) from [<81542630>] (__sock_sendmsg+0x44/0x78) [ 796.672799][ T5983] r10:00000000 r9:df9eddc4 r8:df9eddc4 r7:00000000 r6:84adbb80 r5:df9edf20 [ 796.672948][ T5983] r4:00000000 [ 796.673132][ T5983] [<815425ec>] (__sock_sendmsg) from [<81543984>] (____sys_sendmsg+0x298/0x2cc) [ 796.673243][ T5983] r7:00000000 r6:84adbb80 r5:04000080 r4:df9edf20 [ 796.673390][ T5983] [<815436ec>] (____sys_sendmsg) from [<8154594c>] (___sys_sendmsg+0x9c/0xd0) [ 796.673727][ T5983] r10:df9ede24 r9:20000100 r8:04000080 r7:00000000 r6:84adbb80 r5:df9edf20 [ 796.673763][ T5983] r4:00000000 [ 796.673862][ T5983] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 796.674002][ T5983] r10:00000128 r9:84256000 r8:859b5540 r7:04000080 r6:20000100 r5:859b5541 [ 796.674188][ T5983] r4:00000003 [ 796.674205][ T5983] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 796.674411][ T5983] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 796.674426][ T5983] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 796.674808][ T5983] Exception stack(0xdf9edfa8 to 0xdf9edff0) [ 796.675404][ T5983] dfa0: 00000000 00000000 00000003 20000100 04000080 00000000 [ 796.675653][ T5983] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 796.675802][ T5983] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 797.094499][ T31] audit: type=1400 audit(797.010:329): avc: denied { listen } for pid=5992 comm="syz.1.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 801.171194][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 801.174368][ T31] audit: type=1400 audit(801.090:333): avc: denied { map } for pid=6019 comm="syz.1.588" path="socket:[6810]" dev="sockfs" ino=6810 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 808.660529][ T6063] FAULT_INJECTION: forcing a failure. [ 808.660529][ T6063] name failslab, interval 1, probability 0, space 0, times 0 [ 808.660873][ T6063] CPU: 1 UID: 0 PID: 6063 Comm: syz.1.602 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 808.660961][ T6063] Hardware name: ARM-Versatile Express [ 808.660986][ T6063] Call trace: [ 808.661078][ T6063] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 808.661203][ T6063] r7:00000d40 r6:00000000 r5:60000013 r4:822602a4 [ 808.661223][ T6063] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 808.661280][ T6063] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 808.661345][ T6063] r5:83365400 r4:82917bc0 [ 808.661856][ T6063] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 808.662149][ T6063] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 808.662482][ T6063] r8:83365400 r7:00000d40 r6:85783f28 r5:00000018 r4:83001240 [ 808.662678][ T6063] [<8051f3e4>] (should_failslab) from [<80503de4>] (__kmalloc_noprof+0x9c/0x458) [ 808.662959][ T6063] [<80503d48>] (__kmalloc_noprof) from [<807c33dc>] (tomoyo_encode2+0x64/0xf0) [ 808.663206][ T6063] r10:00000fff r9:8309f400 r8:00000000 r7:834f4bb0 r6:85783f28 r5:84d71ffd [ 808.663363][ T6063] r4:84d71ff0 [ 808.663398][ T6063] [<807c3378>] (tomoyo_encode2) from [<807c348c>] (tomoyo_encode+0x24/0x30) [ 808.663501][ T6063] r9:8309f400 r8:00000000 r7:834f4bb0 r6:85783f28 r5:00001000 r4:84d71ff1 [ 808.663564][ T6063] [<807c3468>] (tomoyo_encode) from [<807c3518>] (tomoyo_realpath_from_path+0x80/0x17c) [ 808.663672][ T6063] r5:00001000 r4:84d71000 [ 808.663753][ T6063] [<807c3498>] (tomoyo_realpath_from_path) from [<807bf618>] (tomoyo_path_number_perm+0xcc/0x22c) [ 808.663828][ T6063] r10:83365400 r9:00000000 r8:85783f00 r7:00004143 r6:00000004 r5:81cd6544 [ 808.663851][ T6063] r4:85783f28 r3:826c0200 [ 808.663918][ T6063] [<807bf54c>] (tomoyo_path_number_perm) from [<807c3ef8>] (tomoyo_file_ioctl+0x1c/0x20) [ 808.664028][ T6063] r9:00000003 r8:85783f00 r7:00000000 r6:00000000 r5:00004143 r4:85783f00 [ 808.664063][ T6063] [<807c3edc>] (tomoyo_file_ioctl) from [<8077074c>] (security_file_ioctl+0x64/0x1e4) [ 808.664301][ T6063] [<807706e8>] (security_file_ioctl) from [<8056ce34>] (sys_ioctl+0x4c/0xba0) [ 808.664398][ T6063] r7:00000000 r6:85783f01 r5:00000000 r4:00004143 [ 808.664495][ T6063] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 808.664626][ T6063] Exception stack(0xdfad1fa8 to 0xdfad1ff0) [ 808.664671][ T6063] 1fa0: 00000000 00000000 00000003 00004143 00000000 00000000 [ 808.664786][ T6063] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 808.664945][ T6063] 1fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 808.665086][ T6063] r10:00000036 r9:83365400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 808.665142][ T6063] r4:00000000 [ 808.669445][ T6063] ERROR: Out of memory at tomoyo_realpath_from_path. [ 808.672788][ T31] audit: type=1400 audit(808.590:334): avc: denied { ioctl } for pid=6062 comm="syz.1.602" path="socket:[6872]" dev="sockfs" ino=6872 ioctlcmd=0x4143 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 810.321618][ T31] audit: type=1400 audit(810.240:335): avc: denied { create } for pid=6081 comm="syz.0.607" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 810.364637][ T31] audit: type=1400 audit(810.270:336): avc: denied { unlink } for pid=3120 comm="syz-executor" name="file0" dev="tmpfs" ino=1611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 811.339056][ T6088] FAULT_INJECTION: forcing a failure. [ 811.339056][ T6088] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 811.339386][ T6088] CPU: 1 UID: 0 PID: 6088 Comm: syz.1.609 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 811.339468][ T6088] Hardware name: ARM-Versatile Express [ 811.339492][ T6088] Call trace: [ 811.339543][ T6088] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 811.339655][ T6088] r7:dfa55e20 r6:00000000 r5:60000013 r4:822602a4 [ 811.339673][ T6088] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 811.339724][ T6088] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 811.339779][ T6088] r5:85476c00 r4:8294f150 [ 811.339794][ T6088] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 811.340378][ T6088] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 811.340989][ T6088] r8:20000000 r7:dfa55e20 r6:200001c0 r5:00000000 r4:dfa55f20 [ 811.341011][ T6088] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 811.341068][ T6088] [<80972440>] (should_fail_usercopy) from [<815457d0>] (copy_msghdr_from_user+0x50/0x130) [ 811.341199][ T6088] [<81545780>] (copy_msghdr_from_user) from [<81545928>] (___sys_sendmsg+0x78/0xd0) [ 811.341275][ T6088] r8:20000000 r7:00000000 r6:8485db80 r5:dfa55f20 r4:dfa55e64 [ 811.341294][ T6088] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 811.341962][ T6088] r10:00000128 r9:85476c00 r8:85783f00 r7:20000000 r6:200001c0 r5:85783f01 [ 811.342108][ T6088] r4:00000003 [ 811.342631][ T6088] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 811.342854][ T6088] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 811.343079][ T6088] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 811.343834][ T6088] Exception stack(0xdfa55fa8 to 0xdfa55ff0) [ 811.344493][ T6088] 5fa0: 00000000 00000000 00000003 200001c0 20000000 00000000 [ 811.344791][ T6088] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 811.345118][ T6088] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 813.030908][ T6094] mmap: syz.0.612 (6094) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 813.551333][ T6100] FAULT_INJECTION: forcing a failure. [ 813.551333][ T6100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 813.551573][ T6100] CPU: 1 UID: 0 PID: 6100 Comm: syz.1.614 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 813.551628][ T6100] Hardware name: ARM-Versatile Express [ 813.551641][ T6100] Call trace: [ 813.551671][ T6100] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 813.551734][ T6100] r7:00000000 r6:00000000 r5:60000013 r4:822602a4 [ 813.551743][ T6100] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 813.551772][ T6100] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 813.551802][ T6100] r5:84e1c800 r4:8294f150 [ 813.551810][ T6100] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 813.551842][ T6100] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 813.551878][ T6100] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfaddf68 r4:00000002 [ 813.551887][ T6100] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 813.551915][ T6100] [<80972440>] (should_fail_usercopy) from [<8058e7a0>] (simple_read_from_buffer+0x80/0x13c) [ 813.551947][ T6100] [<8058e720>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 813.551986][ T6100] r10:00000001 r9:8060860c r8:00000002 r7:dfaddf68 r6:0000000f r5:76fc2f30 [ 813.552104][ T6100] r4:84e1c800 r3:dfadde9f [ 813.552131][ T6100] [<8060860c>] (proc_fail_nth_read) from [<805535bc>] (vfs_read+0x98/0x324) [ 813.552190][ T6100] r8:76fc2f30 r7:dfaddf68 r6:84e1c800 r5:0000000f r4:857cacc0 [ 813.552233][ T6100] [<80553524>] (vfs_read) from [<805542cc>] (ksys_read+0x74/0xe8) [ 813.552341][ T6100] r10:00000003 r9:84e1c800 r8:8020029c r7:00000000 r6:00000000 r5:857cacc0 [ 813.552475][ T6100] r4:857cacc3 [ 813.552504][ T6100] [<80554258>] (ksys_read) from [<80554350>] (sys_read+0x10/0x14) [ 813.552723][ T6100] r7:00000003 r6:00000004 r5:76fc2f30 r4:0000000f [ 813.552735][ T6100] [<80554340>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 813.552768][ T6100] Exception stack(0xdfaddfa8 to 0xdfaddff0) [ 813.552824][ T6100] dfa0: 0000000f 76fc2f30 00000004 76fc2f30 0000000f 00000000 [ 813.552851][ T6100] dfc0: 0000000f 76fc2f30 00000004 00000003 002e0000 00000000 00006364 76fc30bc [ 813.552866][ T6100] dfe0: 00000158 76fc2ed0 000d80f4 00130194 [ 814.104213][ T31] audit: type=1400 audit(814.020:337): avc: denied { connect } for pid=6114 comm="syz.0.620" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 815.762552][ T31] audit: type=1400 audit(815.680:338): avc: denied { accept } for pid=6132 comm="syz.0.627" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 816.472386][ T6139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6139 comm=syz.1.629 [ 816.550280][ T31] audit: type=1400 audit(816.470:339): avc: denied { ioctl } for pid=6140 comm="syz.0.630" path="socket:[6965]" dev="sockfs" ino=6965 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 816.772709][ T6144] FAULT_INJECTION: forcing a failure. [ 816.772709][ T6144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 816.774293][ T6144] CPU: 1 UID: 0 PID: 6144 Comm: syz.1.631 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 816.774401][ T6144] Hardware name: ARM-Versatile Express [ 816.774426][ T6144] Call trace: [ 816.774470][ T6144] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 816.774696][ T6144] r7:00000000 r6:00000000 r5:60000013 r4:822602a4 [ 816.774862][ T6144] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 816.775109][ T6144] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 816.775326][ T6144] r5:85473c00 r4:8294f150 [ 816.775374][ T6144] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 816.775795][ T6144] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 816.775938][ T6144] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfb69f68 r4:00000002 [ 816.775971][ T6144] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 816.776176][ T6144] [<80972440>] (should_fail_usercopy) from [<8058e7a0>] (simple_read_from_buffer+0x80/0x13c) [ 816.776265][ T6144] [<8058e720>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 816.776713][ T6144] r10:00000001 r9:8060860c r8:00000002 r7:dfb69f68 r6:0000000f r5:76fc2f30 [ 816.776812][ T6144] r4:85473c00 r3:dfb69e9f [ 816.776934][ T6144] [<8060860c>] (proc_fail_nth_read) from [<805535bc>] (vfs_read+0x98/0x324) [ 816.777074][ T6144] r8:76fc2f30 r7:dfb69f68 r6:85473c00 r5:0000000f r4:857cad80 [ 816.777096][ T6144] [<80553524>] (vfs_read) from [<805542cc>] (ksys_read+0x74/0xe8) [ 816.777173][ T6144] r10:00000003 r9:85473c00 r8:8020029c r7:00000000 r6:00000000 r5:857cad80 [ 816.777195][ T6144] r4:857cad83 [ 816.777213][ T6144] [<80554258>] (ksys_read) from [<80554350>] (sys_read+0x10/0x14) [ 816.777283][ T6144] r7:00000003 r6:00000004 r5:76fc2f30 r4:0000000f [ 816.777301][ T6144] [<80554340>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 816.777359][ T6144] Exception stack(0xdfb69fa8 to 0xdfb69ff0) [ 816.777538][ T6144] 9fa0: 0000000f 76fc2f30 00000004 76fc2f30 0000000f 00000000 [ 816.777574][ T6144] 9fc0: 0000000f 76fc2f30 00000004 00000003 002e0000 00000000 00006364 76fc30bc [ 816.777603][ T6144] 9fe0: 00000158 76fc2ed0 000d80f4 00130194 [ 817.151586][ T31] audit: type=1400 audit(817.070:340): avc: denied { listen } for pid=6147 comm="syz.1.632" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 820.225285][ T31] audit: type=1400 audit(820.140:341): avc: denied { create } for pid=6154 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 821.442574][ T6167] FAULT_INJECTION: forcing a failure. [ 821.442574][ T6167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 821.443532][ T6167] CPU: 1 UID: 0 PID: 6167 Comm: syz.1.636 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 821.443627][ T6167] Hardware name: ARM-Versatile Express [ 821.443653][ T6167] Call trace: [ 821.443696][ T6167] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 821.443850][ T6167] r7:00000000 r6:00000000 r5:60000013 r4:822602a4 [ 821.443874][ T6167] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 821.443937][ T6167] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 821.444001][ T6167] r5:83ae1800 r4:8294f150 [ 821.444058][ T6167] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 821.444122][ T6167] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 821.444227][ T6167] r8:76fa1f30 r7:00000000 r6:00000000 r5:dfb79f68 r4:00000002 [ 821.444281][ T6167] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 821.444340][ T6167] [<80972440>] (should_fail_usercopy) from [<8058e7a0>] (simple_read_from_buffer+0x80/0x13c) [ 821.444417][ T6167] [<8058e720>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 821.444517][ T6167] r10:00000001 r9:8060860c r8:00000002 r7:dfb79f68 r6:0000000f r5:76fa1f30 [ 821.444540][ T6167] r4:83ae1800 r3:dfb79e9f [ 821.444557][ T6167] [<8060860c>] (proc_fail_nth_read) from [<805535bc>] (vfs_read+0x98/0x324) [ 821.444659][ T6167] r8:76fa1f30 r7:dfb79f68 r6:83ae1800 r5:0000000f r4:857cad80 [ 821.444690][ T6167] [<80553524>] (vfs_read) from [<805542cc>] (ksys_read+0x74/0xe8) [ 821.444766][ T6167] r10:00000003 r9:83ae1800 r8:8020029c r7:00000000 r6:00000000 r5:857cad80 [ 821.444787][ T6167] r4:857cad83 [ 821.444802][ T6167] [<80554258>] (ksys_read) from [<80554350>] (sys_read+0x10/0x14) [ 821.444871][ T6167] r7:00000003 r6:00000006 r5:76fa1f30 r4:0000000f [ 821.444887][ T6167] [<80554340>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 821.444946][ T6167] Exception stack(0xdfb79fa8 to 0xdfb79ff0) [ 821.444990][ T6167] 9fa0: 0000000f 76fa1f30 00000006 76fa1f30 0000000f 00000000 [ 821.445028][ T6167] 9fc0: 0000000f 76fa1f30 00000006 00000003 002e0000 00000000 00006364 76fa20bc [ 821.445058][ T6167] 9fe0: 00000158 76fa1ed0 000d80f4 00130194 [ 821.655337][ T31] audit: type=1400 audit(821.570:342): avc: denied { shutdown } for pid=6169 comm="syz.1.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 821.655793][ T31] audit: type=1400 audit(821.570:343): avc: denied { getopt } for pid=6169 comm="syz.1.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 821.661791][ T31] audit: type=1400 audit(821.580:344): avc: denied { shutdown } for pid=6169 comm="syz.1.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 821.776084][ T31] audit: type=1400 audit(821.690:345): avc: denied { create } for pid=6174 comm="syz.1.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 823.485037][ T6184] fuse: Bad value for 'group_id' [ 823.486245][ T6184] fuse: Bad value for 'group_id' [ 827.229555][ T31] audit: type=1400 audit(827.150:346): avc: denied { setopt } for pid=6220 comm="syz.1.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 827.238769][ T31] audit: type=1400 audit(827.160:347): avc: denied { getopt } for pid=6220 comm="syz.1.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 827.242595][ T31] audit: type=1400 audit(827.160:348): avc: denied { write } for pid=6220 comm="syz.1.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 827.903522][ T6235] fuse: Bad value for 'group_id' [ 827.904732][ T6235] fuse: Bad value for 'group_id' [ 828.454906][ T6243] FAULT_INJECTION: forcing a failure. [ 828.454906][ T6243] name failslab, interval 1, probability 0, space 0, times 0 [ 828.457769][ T6243] CPU: 0 UID: 0 PID: 6243 Comm: syz.1.661 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 828.457915][ T6243] Hardware name: ARM-Versatile Express [ 828.457939][ T6243] Call trace: [ 828.457987][ T6243] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 828.458123][ T6243] r7:00000dc0 r6:00000000 r5:60000013 r4:822602a4 [ 828.458142][ T6243] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 828.458194][ T6243] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 828.458248][ T6243] r5:8424d400 r4:82917bc0 [ 828.458325][ T6243] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 828.458395][ T6243] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 828.458467][ T6243] r8:8424d400 r7:00000dc0 r6:85b1e594 r5:00000064 r4:83001300 [ 828.458485][ T6243] [<8051f3e4>] (should_failslab) from [<80503de4>] (__kmalloc_noprof+0x9c/0x458) [ 828.458540][ T6243] [<80503d48>] (__kmalloc_noprof) from [<8144f29c>] (constrain_params_by_rules+0x88/0x500) [ 828.458615][ T6243] r10:df9e9d78 r9:85b1e400 r8:0000000c r7:85b1e800 r6:85b1e594 r5:00000014 [ 828.458636][ T6243] r4:00000000 [ 828.458653][ T6243] [<8144f214>] (constrain_params_by_rules) from [<8144f8fc>] (snd_pcm_hw_refine+0x1e8/0x41c) [ 828.458724][ T6243] r10:df9e9d78 r9:ffffffff r8:0000000c r7:85b1ea30 r6:85b1e594 r5:00000014 [ 828.458745][ T6243] r4:85b1e400 [ 828.458761][ T6243] [<8144f714>] (snd_pcm_hw_refine) from [<81468c6c>] (snd_pcm_oss_change_params_locked+0x25c/0xc84) [ 828.458834][ T6243] r10:85b1e404 r9:00000001 r8:85b1e800 r7:00000018 r6:824656d0 r5:8466d100 [ 828.458857][ T6243] r4:85b1e400 [ 828.458875][ T6243] [<81468a10>] (snd_pcm_oss_change_params_locked) from [<81469b8c>] (snd_pcm_oss_make_ready+0x4c/0xac) [ 828.458941][ T6243] r10:8424d400 r9:00000003 r8:859eaa80 r7:85b1eab8 r6:85b1e800 r5:8466d100 [ 828.458969][ T6243] r4:00000001 [ 828.459019][ T6243] [<81469b40>] (snd_pcm_oss_make_ready) from [<81469c14>] (snd_pcm_oss_set_trigger+0x28/0x1dc) [ 828.459083][ T6243] r7:856cd480 r6:8466d100 r5:00000000 r4:00000001 [ 828.459098][ T6243] [<81469bec>] (snd_pcm_oss_set_trigger) from [<8146abf4>] (snd_pcm_oss_ioctl+0x428/0x1004) [ 828.459166][ T6243] r9:00000003 r8:859eaa80 r7:856cd480 r6:20000140 r5:00000000 r4:b5403587 [ 828.459186][ T6243] [<8146a7cc>] (snd_pcm_oss_ioctl) from [<8056cf18>] (sys_ioctl+0x130/0xba0) [ 828.459255][ T6243] r10:8424d400 r9:00000003 r8:859eaa80 r7:20000140 r6:859eaa81 r5:00000000 [ 828.459276][ T6243] r4:40045010 [ 828.459291][ T6243] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 828.459339][ T6243] Exception stack(0xdf9e9fa8 to 0xdf9e9ff0) [ 828.459376][ T6243] 9fa0: 00000000 00000000 00000003 40045010 20000140 00000000 [ 828.459409][ T6243] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 828.459435][ T6243] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 828.459468][ T6243] r10:00000036 r9:8424d400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 828.459489][ T6243] r4:00000000 [ 829.147698][ T31] audit: type=1400 audit(829.060:349): avc: denied { ioctl } for pid=6248 comm="syz.1.663" path="socket:[8208]" dev="sockfs" ino=8208 ioctlcmd=0xf508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 829.929235][ T6257] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 830.302457][ T1055] nci: nci_rf_intf_activated_ntf_packet: unsupported activation_rf_tech_and_mode 0x16 [ 830.534148][ T6275] netlink: 4 bytes leftover after parsing attributes in process `syz.0.668'. [ 830.551765][ T31] audit: type=1400 audit(830.470:350): avc: denied { create } for pid=6274 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 830.556165][ T6275] fuse: Unknown parameter 'grÄu<&id' [ 830.652071][ T31] audit: type=1400 audit(830.570:351): avc: denied { create } for pid=6276 comm="syz.0.669" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 830.964509][ T31] audit: type=1400 audit(830.880:352): avc: denied { read write } for pid=3121 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.965059][ T31] audit: type=1400 audit(830.880:353): avc: denied { open } for pid=3121 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.974440][ T31] audit: type=1400 audit(830.890:354): avc: denied { ioctl } for pid=3121 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 832.438829][ T31] audit: type=1400 audit(832.360:355): avc: denied { map } for pid=6294 comm="syz.1.673" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 832.440057][ T31] audit: type=1400 audit(832.360:356): avc: denied { read write } for pid=6294 comm="syz.1.673" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 832.581115][ T31] audit: type=1400 audit(832.500:357): avc: denied { create } for pid=6296 comm="syz.1.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 832.602824][ T31] audit: type=1400 audit(832.520:358): avc: denied { ioctl } for pid=6296 comm="syz.1.674" path="socket:[9266]" dev="sockfs" ino=9266 ioctlcmd=0x89e7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 832.719428][ T31] audit: type=1400 audit(832.640:359): avc: denied { getopt } for pid=6296 comm="syz.1.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 834.665253][ T31] audit: type=1400 audit(834.580:360): avc: denied { remount } for pid=6327 comm="syz.1.683" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 834.666033][ T6328] ======================================================= [ 834.666033][ T6328] WARNING: The mand mount option has been deprecated and [ 834.666033][ T6328] and is ignored by this kernel. Remove the mand [ 834.666033][ T6328] option from the mount to silence this warning. [ 834.666033][ T6328] ======================================================= [ 835.190897][ T31] audit: type=1400 audit(835.110:361): avc: denied { write } for pid=6327 comm="syz.1.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 836.689081][ T6347] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1794 sclass=netlink_xfrm_socket pid=6347 comm=syz.1.685 [ 840.242330][ T31] audit: type=1400 audit(840.160:362): avc: denied { write } for pid=6375 comm="syz.1.696" name="ip_mr_cache" dev="proc" ino=4026532704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 840.934522][ T31] audit: type=1400 audit(840.850:363): avc: denied { ioctl } for pid=6395 comm="syz.0.703" path="socket:[9394]" dev="sockfs" ino=9394 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 841.525713][ T31] audit: type=1400 audit(841.440:364): avc: denied { create } for pid=6408 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 842.105410][ T31] audit: type=1400 audit(842.020:365): avc: denied { lock } for pid=6419 comm="syz.0.711" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9425 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 844.003525][ T6451] FAULT_INJECTION: forcing a failure. [ 844.003525][ T6451] name failslab, interval 1, probability 0, space 0, times 0 [ 844.004104][ T6451] CPU: 1 UID: 0 PID: 6451 Comm: syz.1.718 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 844.004240][ T6451] Hardware name: ARM-Versatile Express [ 844.004270][ T6451] Call trace: [ 844.004322][ T6451] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 844.004501][ T6451] r7:85473c00 r6:00000000 r5:60000013 r4:822602a4 [ 844.004527][ T6451] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 844.004588][ T6451] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 844.004650][ T6451] r5:85473c00 r4:82917bc0 [ 844.004667][ T6451] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 844.009403][ T6451] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 844.009593][ T6451] r8:00000000 r7:85473c00 r6:00000dc0 r5:00000005 r4:830a7900 [ 844.009620][ T6451] [<8051f3e4>] (should_failslab) from [<80503a60>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 844.009715][ T6451] [<80503a14>] (kmem_cache_alloc_noprof) from [<805db86c>] (fcntl_getlk+0x40/0x258) [ 844.009845][ T6451] r10:00000037 r9:85473c00 r8:857caf00 r7:824658e0 r6:dfc65f44 r5:00000005 [ 844.009885][ T6451] r4:00000005 [ 844.009903][ T6451] [<805db82c>] (fcntl_getlk) from [<8056b9bc>] (do_fcntl+0x38c/0x860) [ 844.010133][ T6451] r10:00000037 r9:857caf00 r8:b5403587 r7:b5003500 r6:20000140 r5:857caf00 [ 844.010158][ T6451] r4:00000005 [ 844.010176][ T6451] [<8056b630>] (do_fcntl) from [<8056bf00>] (sys_fcntl+0x70/0xd0) [ 844.010243][ T6451] r8:00000003 r7:20000140 r6:00000005 r5:00000000 r4:857caf01 [ 844.010261][ T6451] [<8056be90>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 844.010314][ T6451] Exception stack(0xdfc65fa8 to 0xdfc65ff0) [ 844.010361][ T6451] 5fa0: 00000000 00000000 00000003 00000005 20000140 00000000 [ 844.010400][ T6451] 5fc0: 00000000 00000000 00130270 00000037 002e0000 00000000 00006364 76fc30bc [ 844.010428][ T6451] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 844.010464][ T6451] r9:85473c00 r8:8020029c r7:00000037 r6:00130270 r5:00000000 r4:00000000 [ 844.764217][ T6462] FAULT_INJECTION: forcing a failure. [ 844.764217][ T6462] name failslab, interval 1, probability 0, space 0, times 0 [ 844.764586][ T6462] CPU: 1 UID: 0 PID: 6462 Comm: syz.1.722 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 844.764653][ T6462] Hardware name: ARM-Versatile Express [ 844.764667][ T6462] Call trace: [ 844.764696][ T6462] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 844.764771][ T6462] r7:838b0000 r6:00000000 r5:60000013 r4:822602a4 [ 844.764781][ T6462] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 844.764812][ T6462] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 844.764845][ T6462] r5:838b0000 r4:82917bc0 [ 844.764860][ T6462] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 844.764897][ T6462] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 844.764940][ T6462] r8:00000000 r7:838b0000 r6:00000cc0 r5:ffffffff r4:830a7b40 [ 844.764949][ T6462] [<8051f3e4>] (should_failslab) from [<805033f4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 844.764978][ T6462] [<805033a4>] (kmem_cache_alloc_node_noprof) from [<815508bc>] (__alloc_skb+0x138/0x160) [ 844.765024][ T6462] r10:00000000 r9:ffffffea r8:00000cc0 r7:00000000 r6:830a7b40 r5:ffffffff [ 844.765035][ T6462] r4:828060c0 [ 844.765044][ T6462] [<81550784>] (__alloc_skb) from [<81670694>] (netlink_ack+0x70/0x214) [ 844.765086][ T6462] r8:859b2e40 r7:85abf440 r6:00000000 r5:8169bcf8 r4:00000018 [ 844.765095][ T6462] [<81670624>] (netlink_ack) from [<81670924>] (netlink_rcv_skb+0xec/0x120) [ 844.765134][ T6462] r10:00000000 r9:00000000 r8:851e8ec0 r7:00000014 r6:85abf440 r5:8169bcf8 [ 844.765145][ T6462] r4:859b2e40 [ 844.765153][ T6462] [<81670838>] (netlink_rcv_skb) from [<8169c8f8>] (nfnetlink_rcv+0x98/0x15c) [ 844.765191][ T6462] r7:859b2e40 r6:85abf440 r5:00000000 r4:859b2e40 [ 844.765199][ T6462] [<8169c860>] (nfnetlink_rcv) from [<816700c4>] (netlink_unicast+0x1f0/0x30c) [ 844.765237][ T6462] r8:851e8ec0 r7:859b2e40 r6:8561e100 r5:00000014 r4:83eb2c00 [ 844.765246][ T6462] [<8166fed4>] (netlink_unicast) from [<816703ac>] (netlink_sendmsg+0x1cc/0x444) [ 844.765285][ T6462] r9:00000000 r8:00000000 r7:85b1fc00 r6:00000014 r5:859b2e40 r4:dfc1df20 [ 844.765294][ T6462] [<816701e0>] (netlink_sendmsg) from [<81542630>] (__sock_sendmsg+0x44/0x78) [ 844.765336][ T6462] r10:00000000 r9:dfc1ddc4 r8:dfc1ddc4 r7:00000000 r6:84858f00 r5:dfc1df20 [ 844.765347][ T6462] r4:00000000 [ 844.765355][ T6462] [<815425ec>] (__sock_sendmsg) from [<81543984>] (____sys_sendmsg+0x298/0x2cc) [ 844.765394][ T6462] r7:00000000 r6:84858f00 r5:20000800 r4:dfc1df20 [ 844.765403][ T6462] [<815436ec>] (____sys_sendmsg) from [<8154594c>] (___sys_sendmsg+0x9c/0xd0) [ 844.765445][ T6462] r10:dfc1de24 r9:20000b00 r8:20000800 r7:00000000 r6:84858f00 r5:dfc1df20 [ 844.765456][ T6462] r4:00000000 [ 844.765464][ T6462] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 844.765660][ T6462] r10:00000128 r9:838b0000 r8:857caf00 r7:20000800 r6:20000b00 r5:857caf01 [ 844.765706][ T6462] r4:00000003 [ 844.765806][ T6462] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 844.765973][ T6462] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 844.766048][ T6462] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 844.766241][ T6462] Exception stack(0xdfc1dfa8 to 0xdfc1dff0) [ 844.766271][ T6462] dfa0: 00000000 00000000 00000003 20000b00 20000800 00000000 [ 844.766291][ T6462] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 844.766370][ T6462] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 844.994674][ T6468] FAULT_INJECTION: forcing a failure. [ 844.994674][ T6468] name failslab, interval 1, probability 0, space 0, times 0 [ 844.995000][ T6468] CPU: 1 UID: 0 PID: 6468 Comm: syz.1.724 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 844.995077][ T6468] Hardware name: ARM-Versatile Express [ 844.995095][ T6468] Call trace: [ 844.995136][ T6468] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 844.995224][ T6468] r7:84e18c00 r6:00000000 r5:60000013 r4:822602a4 [ 844.995238][ T6468] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 844.995279][ T6468] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 844.995324][ T6468] r5:84e18c00 r4:82917bc0 [ 844.995335][ T6468] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 844.995381][ T6468] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 844.995476][ T6468] r8:00000000 r7:84e18c00 r6:00000cc0 r5:ffffffff r4:830a7b40 [ 844.995489][ T6468] [<8051f3e4>] (should_failslab) from [<805033f4>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 844.995542][ T6468] [<805033a4>] (kmem_cache_alloc_node_noprof) from [<815508bc>] (__alloc_skb+0x138/0x160) [ 844.995618][ T6468] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7b40 r5:ffffffff [ 844.995736][ T6468] r4:828060c0 [ 844.996062][ T6468] [<81550784>] (__alloc_skb) from [<8166fbcc>] (netlink_alloc_large_skb+0x88/0xa0) [ 844.996319][ T6468] r8:00000000 r7:85b1fc00 r6:0000001c r5:84858780 r4:00000140 [ 844.997050][ T6468] [<8166fb44>] (netlink_alloc_large_skb) from [<81670314>] (netlink_sendmsg+0x134/0x444) [ 844.997380][ T6468] r5:84858780 r4:dfc7df20 [ 844.997466][ T6468] [<816701e0>] (netlink_sendmsg) from [<81542630>] (__sock_sendmsg+0x44/0x78) [ 844.997553][ T6468] r10:00000000 r9:dfc7ddc4 r8:dfc7ddc4 r7:00000000 r6:84858780 r5:dfc7df20 [ 844.997594][ T6468] r4:00000000 [ 844.997612][ T6468] [<815425ec>] (__sock_sendmsg) from [<81543984>] (____sys_sendmsg+0x298/0x2cc) [ 844.997680][ T6468] r7:00000000 r6:84858780 r5:00000080 r4:dfc7df20 [ 844.997697][ T6468] [<815436ec>] (____sys_sendmsg) from [<8154594c>] (___sys_sendmsg+0x9c/0xd0) [ 844.997768][ T6468] r10:dfc7de24 r9:20000900 r8:00000080 r7:00000000 r6:84858780 r5:dfc7df20 [ 844.997790][ T6468] r4:00000000 [ 844.997806][ T6468] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 844.997885][ T6468] r10:00000128 r9:84e18c00 r8:857caf00 r7:00000080 r6:20000900 r5:857caf01 [ 844.997909][ T6468] r4:00000003 [ 844.997960][ T6468] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 844.998042][ T6468] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 844.998060][ T6468] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 844.998128][ T6468] Exception stack(0xdfc7dfa8 to 0xdfc7dff0) [ 844.998175][ T6468] dfa0: 00000000 00000000 00000003 20000900 00000080 00000000 [ 844.998278][ T6468] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 844.998580][ T6468] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 845.691915][ T6478] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2048 sclass=netlink_audit_socket pid=6478 comm=syz.0.728 [ 848.078292][ T31] audit: type=1400 audit(848.000:366): avc: denied { ioctl } for pid=6488 comm="syz.1.732" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=9502 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 849.343646][ T6505] FAULT_INJECTION: forcing a failure. [ 849.343646][ T6505] name failslab, interval 1, probability 0, space 0, times 0 [ 849.346482][ T6505] CPU: 1 UID: 0 PID: 6505 Comm: syz.1.738 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 849.346687][ T6505] Hardware name: ARM-Versatile Express [ 849.346716][ T6505] Call trace: [ 849.346770][ T6505] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 849.347378][ T6505] r7:00000d40 r6:00000000 r5:60000013 r4:822602a4 [ 849.347400][ T6505] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 849.347453][ T6505] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 849.347507][ T6505] r5:84df2400 r4:82917bc0 [ 849.347522][ T6505] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 849.347584][ T6505] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 849.347650][ T6505] r8:84df2400 r7:00000d40 r6:857ca928 r5:0000001d r4:83001240 [ 849.347668][ T6505] [<8051f3e4>] (should_failslab) from [<80503de4>] (__kmalloc_noprof+0x9c/0x458) [ 849.347717][ T6505] [<80503d48>] (__kmalloc_noprof) from [<807c33dc>] (tomoyo_encode2+0x64/0xf0) [ 849.347786][ T6505] r10:00000fff r9:83318000 r8:00000000 r7:8342ee58 r6:857ca928 r5:84d77ffc [ 849.347805][ T6505] r4:84d77fea [ 849.347821][ T6505] [<807c3378>] (tomoyo_encode2) from [<807c348c>] (tomoyo_encode+0x24/0x30) [ 849.347887][ T6505] r9:83318000 r8:00000000 r7:8342ee58 r6:857ca928 r5:00001000 r4:84d77feb [ 849.347906][ T6505] [<807c3468>] (tomoyo_encode) from [<807c3518>] (tomoyo_realpath_from_path+0x80/0x17c) [ 849.347963][ T6505] r5:00001000 r4:84d77000 [ 849.347979][ T6505] [<807c3498>] (tomoyo_realpath_from_path) from [<807bf618>] (tomoyo_path_number_perm+0xcc/0x22c) [ 849.348041][ T6505] r10:84df2400 r9:00000000 r8:857ca900 r7:41045508 r6:00000004 r5:81cd6544 [ 849.348067][ T6505] r4:857ca928 r3:826c0200 [ 849.348081][ T6505] [<807bf54c>] (tomoyo_path_number_perm) from [<807c3ef8>] (tomoyo_file_ioctl+0x1c/0x20) [ 849.348157][ T6505] r9:00000004 r8:857ca900 r7:200001c0 r6:200001c0 r5:41045508 r4:857ca900 [ 849.348174][ T6505] [<807c3edc>] (tomoyo_file_ioctl) from [<8077074c>] (security_file_ioctl+0x64/0x1e4) [ 849.348290][ T6505] [<807706e8>] (security_file_ioctl) from [<8056ce34>] (sys_ioctl+0x4c/0xba0) [ 849.348419][ T6505] r7:200001c0 r6:857ca901 r5:00000000 r4:41045508 [ 849.348470][ T6505] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 849.348523][ T6505] Exception stack(0xdfc85fa8 to 0xdfc85ff0) [ 849.348565][ T6505] 5fa0: 00000000 00000000 00000004 41045508 200001c0 00000000 [ 849.348600][ T6505] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 849.348660][ T6505] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 849.348781][ T6505] r10:00000036 r9:84df2400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 849.348802][ T6505] r4:00000000 [ 849.370978][ T6505] ERROR: Out of memory at tomoyo_realpath_from_path. [ 853.362775][ T31] audit: type=1400 audit(853.280:367): avc: denied { setopt } for pid=6532 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 857.691640][ T6562] FAULT_INJECTION: forcing a failure. [ 857.691640][ T6562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 857.695266][ T6562] CPU: 1 UID: 0 PID: 6562 Comm: syz.1.759 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 857.695435][ T6562] Hardware name: ARM-Versatile Express [ 857.695465][ T6562] Call trace: [ 857.695508][ T6562] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 857.695718][ T6562] r7:dfcbde20 r6:00000000 r5:60000013 r4:822602a4 [ 857.695743][ T6562] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 857.695806][ T6562] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 857.695870][ T6562] r5:84e1c800 r4:8294f150 [ 857.695887][ T6562] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 857.695956][ T6562] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 857.696021][ T6562] r8:24000044 r7:dfcbde20 r6:20000300 r5:00000000 r4:dfcbdf20 [ 857.696038][ T6562] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 857.696090][ T6562] [<80972440>] (should_fail_usercopy) from [<815457d0>] (copy_msghdr_from_user+0x50/0x130) [ 857.696163][ T6562] [<81545780>] (copy_msghdr_from_user) from [<81545928>] (___sys_sendmsg+0x78/0xd0) [ 857.696241][ T6562] r8:24000044 r7:00000000 r6:84858c80 r5:dfcbdf20 r4:dfcbde64 [ 857.696261][ T6562] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 857.696468][ T6562] r10:00000128 r9:84e1c800 r8:857caa80 r7:24000044 r6:20000300 r5:857caa81 [ 857.696500][ T6562] r4:00000003 [ 857.696521][ T6562] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 857.696607][ T6562] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 857.696628][ T6562] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 857.696700][ T6562] Exception stack(0xdfcbdfa8 to 0xdfcbdff0) [ 857.696753][ T6562] dfa0: 00000000 00000000 00000003 20000300 24000044 00000000 [ 857.696795][ T6562] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 857.696828][ T6562] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 857.793809][ T6564] FAULT_INJECTION: forcing a failure. [ 857.793809][ T6564] name failslab, interval 1, probability 0, space 0, times 0 [ 857.794281][ T6564] CPU: 0 UID: 0 PID: 6564 Comm: syz.1.760 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 857.794388][ T6564] Hardware name: ARM-Versatile Express [ 857.794418][ T6564] Call trace: [ 857.794494][ T6564] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 857.794629][ T6564] r7:00000c40 r6:00000000 r5:60000013 r4:822602a4 [ 857.794654][ T6564] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 857.795670][ T6564] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 857.795757][ T6564] r5:84e1d400 r4:82917bc0 [ 857.795780][ T6564] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 857.796191][ T6564] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 857.796377][ T6564] r8:84e1d400 r7:00000c40 r6:857ca3e8 r5:00001000 r4:830016c0 [ 857.796743][ T6564] [<8051f3e4>] (should_failslab) from [<80503de4>] (__kmalloc_noprof+0x9c/0x458) [ 857.796933][ T6564] [<80503d48>] (__kmalloc_noprof) from [<807c34d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 857.797041][ T6564] r10:84e1d400 r9:8309f400 r8:00000000 r7:834fdaa0 r6:857ca3e8 r5:00001000 [ 857.797065][ T6564] r4:00000000 [ 857.797085][ T6564] [<807c3498>] (tomoyo_realpath_from_path) from [<807bf618>] (tomoyo_path_number_perm+0xcc/0x22c) [ 857.797168][ T6564] r10:84e1d400 r9:00000000 r8:857ca3c0 r7:00005452 r6:00000004 r5:81cd6544 [ 857.797193][ T6564] r4:857ca3e8 r3:826c0200 [ 857.797212][ T6564] [<807bf54c>] (tomoyo_path_number_perm) from [<807c3ef8>] (tomoyo_file_ioctl+0x1c/0x20) [ 857.797415][ T6564] r9:00000004 r8:857ca3c0 r7:200001c0 r6:200001c0 r5:00005452 r4:857ca3c0 [ 857.797441][ T6564] [<807c3edc>] (tomoyo_file_ioctl) from [<8077074c>] (security_file_ioctl+0x64/0x1e4) [ 857.797507][ T6564] [<807706e8>] (security_file_ioctl) from [<8056ce34>] (sys_ioctl+0x4c/0xba0) [ 857.797576][ T6564] r7:200001c0 r6:857ca3c1 r5:00000000 r4:00005452 [ 857.797594][ T6564] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 857.797649][ T6564] Exception stack(0xdfc75fa8 to 0xdfc75ff0) [ 857.797702][ T6564] 5fa0: 00000000 00000000 00000004 00005452 200001c0 00000000 [ 857.797741][ T6564] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 857.797771][ T6564] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 857.797809][ T6564] r10:00000036 r9:84e1d400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 857.797827][ T6564] r4:00000000 [ 857.818153][ T6564] ERROR: Out of memory at tomoyo_realpath_from_path. [ 858.780061][ T6591] FAULT_INJECTION: forcing a failure. [ 858.780061][ T6591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 858.780417][ T6591] CPU: 0 UID: 0 PID: 6591 Comm: syz.1.770 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 858.780558][ T6591] Hardware name: ARM-Versatile Express [ 858.780587][ T6591] Call trace: [ 858.780639][ T6591] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 858.782222][ T6591] r7:00000000 r6:00000000 r5:60000013 r4:822602a4 [ 858.782276][ T6591] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 858.782381][ T6591] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 858.782525][ T6591] r5:84252400 r4:8294f150 [ 858.782563][ T6591] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 858.782711][ T6591] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 858.782921][ T6591] r8:76fc2f30 r7:00000000 r6:00000000 r5:dfcbdf68 r4:00000002 [ 858.783009][ T6591] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 858.783128][ T6591] [<80972440>] (should_fail_usercopy) from [<8058e7a0>] (simple_read_from_buffer+0x80/0x13c) [ 858.783208][ T6591] [<8058e720>] (simple_read_from_buffer) from [<806086c4>] (proc_fail_nth_read+0xb8/0x108) [ 858.783321][ T6591] r10:00000001 r9:8060860c r8:00000002 r7:dfcbdf68 r6:0000000f r5:76fc2f30 [ 858.783354][ T6591] r4:84252400 r3:dfcbde9f [ 858.783377][ T6591] [<8060860c>] (proc_fail_nth_read) from [<805535bc>] (vfs_read+0x98/0x324) [ 858.783459][ T6591] r8:76fc2f30 r7:dfcbdf68 r6:84252400 r5:0000000f r4:857839c0 [ 858.783479][ T6591] [<80553524>] (vfs_read) from [<805542cc>] (ksys_read+0x74/0xe8) [ 858.783555][ T6591] r10:00000003 r9:84252400 r8:8020029c r7:00000000 r6:00000000 r5:857839c0 [ 858.783573][ T6591] r4:857839c3 [ 858.783588][ T6591] [<80554258>] (ksys_read) from [<80554350>] (sys_read+0x10/0x14) [ 858.783690][ T6591] r7:00000003 r6:00000004 r5:76fc2f30 r4:0000000f [ 858.783717][ T6591] [<80554340>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 858.783776][ T6591] Exception stack(0xdfcbdfa8 to 0xdfcbdff0) [ 858.783821][ T6591] dfa0: 0000000f 76fc2f30 00000004 76fc2f30 0000000f 00000000 [ 858.783859][ T6591] dfc0: 0000000f 76fc2f30 00000004 00000003 002e0000 00000000 00006364 76fc30bc [ 858.783886][ T6591] dfe0: 00000158 76fc2ed0 000d80f4 00130194 [ 859.388413][ T6609] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6609 comm=syz.0.777 [ 859.863331][ T31] audit: type=1400 audit(859.780:368): avc: denied { connect } for pid=6625 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 863.047535][ T6647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6647 comm=syz.0.790 [ 863.128903][ T31] audit: type=1400 audit(863.050:369): avc: denied { audit_write } for pid=6648 comm="syz.1.792" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 866.195312][ T6679] FAULT_INJECTION: forcing a failure. [ 866.195312][ T6679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 866.195721][ T6679] CPU: 0 UID: 0 PID: 6679 Comm: syz.1.802 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 866.195817][ T6679] Hardware name: ARM-Versatile Express [ 866.195843][ T6679] Call trace: [ 866.195935][ T6679] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 866.196060][ T6679] r7:dfd31e20 r6:00000000 r5:60000013 r4:822602a4 [ 866.196081][ T6679] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 866.196136][ T6679] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 866.196189][ T6679] r5:8424a400 r4:8294f150 [ 866.196203][ T6679] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 866.196259][ T6679] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 866.196404][ T6679] r8:2400c804 r7:dfd31e20 r6:20000040 r5:00000000 r4:dfd31f20 [ 866.196573][ T6679] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 866.196718][ T6679] [<80972440>] (should_fail_usercopy) from [<815457d0>] (copy_msghdr_from_user+0x50/0x130) [ 866.197017][ T6679] [<81545780>] (copy_msghdr_from_user) from [<81545928>] (___sys_sendmsg+0x78/0xd0) [ 866.197156][ T6679] r8:2400c804 r7:00000000 r6:8485db80 r5:dfd31f20 r4:dfd31e64 [ 866.197534][ T6679] [<815458b0>] (___sys_sendmsg) from [<81545de4>] (__sys_sendmsg+0x8c/0xe0) [ 866.197774][ T6679] r10:00000128 r9:8424a400 r8:857833c0 r7:2400c804 r6:20000040 r5:857833c1 [ 866.198099][ T6679] r4:00000003 [ 866.198220][ T6679] [<81545d58>] (__sys_sendmsg) from [<81545e4c>] (sys_sendmsg+0x14/0x18) [ 866.198297][ T6679] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 866.198312][ T6679] [<81545e38>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 866.198411][ T6679] Exception stack(0xdfd31fa8 to 0xdfd31ff0) [ 866.198449][ T6679] 1fa0: 00000000 00000000 00000003 20000040 2400c804 00000000 [ 866.198484][ T6679] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76fc30bc [ 866.198513][ T6679] 1fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 866.632278][ T6686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=6686 comm=syz.1.805 [ 870.558718][ T31] audit: type=1400 audit(870.480:370): avc: denied { read } for pid=6739 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 873.866220][ T6767] syz.0.835: attempt to access beyond end of device [ 873.866220][ T6767] loop1: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 873.868241][ T6767] EXT4-fs (loop1): unable to read superblock [ 882.725406][ T31] audit: type=1400 audit(882.640:371): avc: denied { read } for pid=6826 comm="syz.0.856" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 885.060331][ T31] audit: type=1400 audit(884.980:372): avc: denied { read } for pid=6865 comm="syz.0.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 889.714699][ T31] audit: type=1400 audit(889.630:373): avc: denied { getattr } for pid=6920 comm="syz.1.887" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9210 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 890.767610][ T31] audit: type=1400 audit(890.680:374): avc: denied { append } for pid=6944 comm="syz.1.895" name="nbd1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 894.020801][ T7048] FAULT_INJECTION: forcing a failure. [ 894.020801][ T7048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 894.023843][ T7048] CPU: 1 UID: 0 PID: 7048 Comm: syz.1.919 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 894.023977][ T7048] Hardware name: ARM-Versatile Express [ 894.024029][ T7048] Call trace: [ 894.024078][ T7048] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 894.024716][ T7048] r7:00000000 r6:00000000 r5:60000013 r4:822602a4 [ 894.024742][ T7048] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 894.024802][ T7048] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 894.024862][ T7048] r5:84e1a400 r4:8294f150 [ 894.024879][ T7048] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 894.024944][ T7048] [<80972200>] (should_fail_ex) from [<8097243c>] (should_fail+0x14/0x18) [ 894.025022][ T7048] r8:8588a800 r7:00000000 r6:8594d680 r5:00000010 r4:00000000 [ 894.025040][ T7048] [<80972428>] (should_fail) from [<8097245c>] (should_fail_usercopy+0x1c/0x20) [ 894.025091][ T7048] [<80972440>] (should_fail_usercopy) from [<8049c738>] (memdup_user+0x44/0x170) [ 894.025145][ T7048] [<8049c6f4>] (memdup_user) from [<810d247c>] (i2cdev_ioctl_rdwr+0xdc/0x258) [ 894.025214][ T7048] r9:00000000 r8:8588a800 r7:8594d680 r6:8594d680 r5:00000001 r4:8594d680 [ 894.025230][ T7048] [<810d23a0>] (i2cdev_ioctl_rdwr) from [<810d30e8>] (i2cdev_ioctl+0x33c/0x404) [ 894.025301][ T7048] r10:84e1a400 r9:00000003 r8:859eae40 r7:20002580 r6:8594d680 r5:8588a800 [ 894.025323][ T7048] r4:20002580 [ 894.025338][ T7048] [<810d2dac>] (i2cdev_ioctl) from [<8056cf18>] (sys_ioctl+0x130/0xba0) [ 894.025404][ T7048] r6:859eae41 r5:00000000 r4:00000707 [ 894.025422][ T7048] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 894.025469][ T7048] Exception stack(0xdfea5fa8 to 0xdfea5ff0) [ 894.025510][ T7048] 5fa0: 00000000 00000000 00000003 00000707 20002580 00000000 [ 894.025542][ T7048] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 894.025568][ T7048] 5fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 894.025607][ T7048] r10:00000036 r9:84e1a400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 894.025629][ T7048] r4:00000000 [ 896.603730][ T31] audit: type=1400 audit(896.520:375): avc: denied { bind } for pid=7055 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 900.855362][ T7087] FAULT_INJECTION: forcing a failure. [ 900.855362][ T7087] name failslab, interval 1, probability 0, space 0, times 0 [ 900.858503][ T7087] CPU: 1 UID: 0 PID: 7087 Comm: syz.1.932 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 900.858651][ T7087] Hardware name: ARM-Versatile Express [ 900.858691][ T7087] Call trace: [ 900.858737][ T7087] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 900.858926][ T7087] r7:00000c40 r6:00000000 r5:60000013 r4:822602a4 [ 900.858947][ T7087] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 900.858998][ T7087] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 900.859051][ T7087] r5:8424d400 r4:82917bc0 [ 900.859066][ T7087] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 900.859124][ T7087] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 900.859197][ T7087] r8:8424d400 r7:00000c40 r6:85783268 r5:00001000 r4:830016c0 [ 900.859212][ T7087] [<8051f3e4>] (should_failslab) from [<80503de4>] (__kmalloc_noprof+0x9c/0x458) [ 900.859260][ T7087] [<80503d48>] (__kmalloc_noprof) from [<807c34d4>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 900.859323][ T7087] r10:8424d400 r9:8588a800 r8:00000000 r7:834f54c8 r6:85783268 r5:00001000 [ 900.859341][ T7087] r4:00000000 [ 900.859355][ T7087] [<807c3498>] (tomoyo_realpath_from_path) from [<807bf618>] (tomoyo_path_number_perm+0xcc/0x22c) [ 900.859415][ T7087] r10:8424d400 r9:00000000 r8:85783240 r7:00003ba0 r6:00000004 r5:81cd6544 [ 900.859437][ T7087] r4:85783268 r3:826c0200 [ 900.859454][ T7087] [<807bf54c>] (tomoyo_path_number_perm) from [<807c3ef8>] (tomoyo_file_ioctl+0x1c/0x20) [ 900.859520][ T7087] r9:00000004 r8:85783240 r7:20000a40 r6:20000a40 r5:00003ba0 r4:85783240 [ 900.859535][ T7087] [<807c3edc>] (tomoyo_file_ioctl) from [<8077074c>] (security_file_ioctl+0x64/0x1e4) [ 900.859589][ T7087] [<807706e8>] (security_file_ioctl) from [<8056ce34>] (sys_ioctl+0x4c/0xba0) [ 900.859653][ T7087] r7:20000a40 r6:85783241 r5:00000000 r4:00003ba0 [ 900.859667][ T7087] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 900.859727][ T7087] Exception stack(0xdfee1fa8 to 0xdfee1ff0) [ 900.859765][ T7087] 1fa0: 00000000 00000000 00000004 00003ba0 20000a40 00000000 [ 900.859797][ T7087] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76fc30bc [ 900.859822][ T7087] 1fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 900.859856][ T7087] r10:00000036 r9:8424d400 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 900.859875][ T7087] r4:00000000 [ 900.887152][ T7087] ERROR: Out of memory at tomoyo_realpath_from_path. [ 901.558450][ T7094] fuse: Unknown parameter '¥[›Äús' [ 901.565770][ T31] audit: type=1400 audit(901.480:376): avc: denied { map } for pid=7093 comm="syz.1.934" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 905.427458][ T31] audit: type=1107 audit(905.340:377): pid=7126 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='¹CÏÙ"èHlPK•å¦]lÖ€žÕ2R¬^‹ÑVgr×;Nü¦Ä<“§eÁ:‘`ð²T²p_Úd¿âÒêQë,ÄhÒ¤§¬õìꭻѷG¾ÏvÎ%&Â= ”ì´Œë)ÿ·öp´ó”t¹"’eÓ,!9Ö`óm`0J$NfØdÔÜ [ 905.427458][ T31] ì5™d¡åTc)é<ù©œIï=-…7' [ 905.470876][ T7128] SELinux: Context system_u:object_r:auditd_initrc_exec_t:s0 is not valid (left unmapped). [ 905.478514][ T31] audit: type=1400 audit(905.400:378): avc: denied { relabelto } for pid=7126 comm="syz.1.944" name="" dev="pipefs" ino=10529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:auditd_initrc_exec_t:s0" [ 908.337505][ T7142] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7142 comm=syz.1.947 [ 908.518261][ T31] audit: type=1400 audit(908.440:379): avc: denied { ioctl } for pid=7144 comm="syz.1.948" path="socket:[11490]" dev="sockfs" ino=11490 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 909.043861][ T31] audit: type=1400 audit(908.960:380): avc: denied { write } for pid=7144 comm="syz.1.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 923.220714][ T31] audit: type=1400 audit(923.140:381): avc: denied { bind } for pid=7236 comm="syz.0.978" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 923.223344][ T31] audit: type=1400 audit(923.140:382): avc: denied { accept } for pid=7236 comm="syz.0.978" lport=34973 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 924.351448][ T31] audit: type=1400 audit(924.270:383): avc: denied { getopt } for pid=7245 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 926.271853][ T31] audit: type=1400 audit(926.190:384): avc: denied { setattr } for pid=7258 comm="syz.0.983" name="" dev="pipefs" ino=10721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 926.718950][ T7265] fuse: Unknown parameter 'Ò' [ 927.951623][ T7279] FAULT_INJECTION: forcing a failure. [ 927.951623][ T7279] name failslab, interval 1, probability 0, space 0, times 0 [ 927.952007][ T7279] CPU: 0 UID: 0 PID: 7279 Comm: syz.1.991 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 927.952106][ T7279] Hardware name: ARM-Versatile Express [ 927.952134][ T7279] Call trace: [ 927.952186][ T7279] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 927.952311][ T7279] r7:83abe000 r6:00000000 r5:60000013 r4:822602a4 [ 927.952335][ T7279] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 927.955550][ T7279] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 927.955732][ T7279] r5:83abe000 r4:82917bc0 [ 927.955783][ T7279] [<8021fb9c>] (dump_stack) from [<809723c4>] (should_fail_ex+0x1c4/0x228) [ 927.955870][ T7279] [<80972200>] (should_fail_ex) from [<8051f450>] (should_failslab+0x6c/0x94) [ 927.955966][ T7279] r8:00000000 r7:83abe000 r6:00000cc0 r5:20000a00 r4:830a2a80 [ 927.955988][ T7279] [<8051f3e4>] (should_failslab) from [<80503a60>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 927.956071][ T7279] [<80503a14>] (kmem_cache_alloc_noprof) from [<80562cd4>] (getname_flags.part.0+0x28/0x18c) [ 927.956189][ T7279] r10:00000142 r9:83abe000 r8:8020029c r7:00000000 r6:82465858 r5:20000a00 [ 927.956259][ T7279] r4:20000a00 [ 927.956289][ T7279] [<80562cac>] (getname_flags.part.0) from [<80567c70>] (getname_flags+0x3c/0x50) [ 927.956419][ T7279] r9:83abe000 r8:8020029c r7:00000004 r6:dfffdf58 r5:00000000 r4:20000a00 [ 927.956475][ T7279] [<80567c34>] (getname_flags) from [<805504cc>] (do_sys_openat2+0x60/0xe0) [ 927.956546][ T7279] r5:20000a00 r4:00000000 [ 927.956564][ T7279] [<8055046c>] (do_sys_openat2) from [<80550924>] (sys_openat+0x98/0xd4) [ 927.956631][ T7279] r7:00000142 r6:00130270 r5:20000a00 r4:00000004 [ 927.956647][ T7279] [<8055088c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 927.956707][ T7279] Exception stack(0xdfffdfa8 to 0xdfffdff0) [ 927.956797][ T7279] dfa0: 00000000 00000000 00000004 20000a00 00000002 00000000 [ 927.956864][ T7279] dfc0: 00000000 00000000 00130270 00000142 002e0000 00000000 00006364 76fc30bc [ 927.956897][ T7279] dfe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 927.956925][ T7279] r5:00000000 r4:00000000 [ 930.022401][ T31] audit: type=1400 audit(929.940:385): avc: denied { read } for pid=7287 comm="syz.1.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 930.550418][ T7294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7294 comm=syz.1.993 [ 930.607720][ T31] audit: type=1400 audit(930.520:386): avc: denied { write } for pid=7287 comm="syz.1.993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 942.731209][ T7362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=7362 comm=syz.0.1016 [ 944.493361][ T7344] SELinux: Context system_u:object_r:restorecond_var_run_t:s0 is not valid (left unmapped). [ 944.495032][ T31] audit: type=1400 audit(944.410:387): avc: denied { relabelto } for pid=7343 comm="syz.1.1009" name="seq" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:restorecond_var_run_t:s0" [ 944.495389][ T31] audit: type=1400 audit(944.410:388): avc: denied { associate } for pid=7343 comm="syz.1.1009" name="seq" dev="devtmpfs" ino=721 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:restorecond_var_run_t:s0" [ 946.177237][ T31] audit: type=1400 audit(946.090:389): avc: denied { module_request } for pid=7384 comm="syz.1.1024" kmod="rdma-link-siw" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 946.787741][ T7388] netlink: 'syz.1.1025': attribute type 5 has an invalid length. [ 947.124328][ T31] audit: type=1400 audit(947.040:390): avc: denied { name_bind } for pid=7395 comm="syz.1.1028" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 947.129227][ T31] audit: type=1400 audit(947.050:391): avc: denied { node_bind } for pid=7395 comm="syz.1.1028" saddr=::1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 947.706338][ T31] audit: type=1400 audit(947.620:392): avc: denied { create } for pid=7406 comm="syz.0.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 948.904128][ T7426] smc: net device bond0 applied user defined pnetid SYZ2 [ 948.906090][ T7426] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1039'. [ 949.711257][ T7434] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1040'. [ 954.783388][ T7493] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1050'. [ 960.467484][ T7502] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1051'. [ 960.467832][ T7502] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1051'. [ 967.384141][ T31] audit: type=1400 audit(967.300:393): avc: denied { getopt } for pid=7544 comm="syz.1.1067" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 967.749586][ T7559] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1069'. [ 967.750947][ T7559] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1069'. [ 967.755380][ T7559] netlink: 'syz.0.1069': attribute type 3 has an invalid length. [ 968.378430][ T31] audit: type=1400 audit(968.280:394): avc: denied { map } for pid=7544 comm="syz.1.1067" path="socket:[12049]" dev="sockfs" ino=12049 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 968.977346][ T31] audit: type=1400 audit(968.870:395): avc: denied { create } for pid=7583 comm="syz.0.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 972.295780][ T7601] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1078'. [ 972.299001][ T7601] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1078'. [ 972.302562][ T7601] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1078'. [ 972.306392][ T7601] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1078'. [ 973.401137][ T31] audit: type=1400 audit(973.320:396): avc: denied { map } for pid=7602 comm="syz.1.1079" path="socket:[12092]" dev="sockfs" ino=12092 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 973.433632][ T7603] GUP no longer grows the stack in syz.1.1079 (7603): 20006000-2000a000 (20005000) [ 973.433994][ T7603] CPU: 0 UID: 0 PID: 7603 Comm: syz.1.1079 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 973.434088][ T7603] Hardware name: ARM-Versatile Express [ 973.434112][ T7603] Call trace: [ 973.434163][ T7603] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 973.434337][ T7603] r7:dfbc9d6c r6:00000001 r5:60000013 r4:822602a4 [ 973.434574][ T7603] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 973.434844][ T7603] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 973.435228][ T7603] r5:00000000 r4:20005000 [ 973.435331][ T7603] [<8021fb9c>] (dump_stack) from [<804b6eb4>] (gup_vma_lookup+0xb4/0xb8) [ 973.435625][ T7603] [<804b6e00>] (gup_vma_lookup) from [<804b8e78>] (__get_user_pages+0xfc/0x6f0) [ 973.435932][ T7603] r4:00210002 [ 973.436416][ T7603] [<804b8d7c>] (__get_user_pages) from [<804ba418>] (__gup_longterm_locked+0xf0/0xb54) [ 973.436767][ T7603] r10:dfbc9eb0 r9:00210002 r8:dfbc9d6c r7:859796c0 r6:00000001 r5:85979744 [ 973.436819][ T7603] r4:00000000 [ 973.436835][ T7603] [<804ba328>] (__gup_longterm_locked) from [<804bb564>] (gup_fast_fallback+0x6e8/0x8bc) [ 973.436895][ T7603] r10:20005000 r9:00000005 r8:00000010 r7:00000000 r6:00000000 r5:20000000 [ 973.436913][ T7603] r4:ffefd000 [ 973.436927][ T7603] [<804bae7c>] (gup_fast_fallback) from [<804bb7ec>] (get_user_pages_fast+0x50/0x60) [ 973.436990][ T7603] r10:00000000 r9:00000000 r8:dfbc9e4c r7:0000ff3b r6:00000010 r5:20000000 [ 973.437007][ T7603] r4:dfbc9e9c [ 973.437021][ T7603] [<804bb79c>] (get_user_pages_fast) from [<808b2a94>] (__iov_iter_get_pages_alloc+0xf4/0x778) [ 973.437127][ T7603] r6:dfbc9e80 r5:20000000 r4:dfbc9f20 [ 973.437143][ T7603] [<808b29a0>] (__iov_iter_get_pages_alloc) from [<808b314c>] (iov_iter_get_pages2+0x34/0x4c) [ 973.437207][ T7603] r10:00000000 r9:dfbc9e9c r8:00000001 r7:00000001 r6:832a0500 r5:00000000 [ 973.437227][ T7603] r4:859b5cc0 [ 973.437242][ T7603] [<808b3118>] (iov_iter_get_pages2) from [<8059dbf0>] (vmsplice_to_pipe+0x1bc/0x3a8) [ 973.437299][ T7603] [<8059da34>] (vmsplice_to_pipe) from [<8059f69c>] (sys_vmsplice+0x12c/0x154) [ 973.437362][ T7603] r10:00000157 r9:859b5cc0 r8:00000001 r7:00000001 r6:00000001 r5:859b5cc0 [ 973.437380][ T7603] r4:0000ff3b [ 973.437398][ T7603] [<8059f570>] (sys_vmsplice) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 973.437450][ T7603] Exception stack(0xdfbc9fa8 to 0xdfbc9ff0) [ 973.437490][ T7603] 9fa0: 00000000 00000000 00000012 200000c0 00000001 00000001 [ 973.437523][ T7603] 9fc0: 00000000 00000000 002f630c 00000157 002e0000 00000000 00006364 76fc30bc [ 973.437548][ T7603] 9fe0: 76fc2ec0 76fc2eb0 0001948c 001322c0 [ 973.437580][ T7603] r9:83ae4800 r8:8020029c r7:00000157 r6:002f630c r5:00000000 r4:00000000 [ 973.878849][ T7609] bridge_slave_0: default FDB implementation only supports local addresses [ 977.781712][ T7654] netlink: 65039 bytes leftover after parsing attributes in process `syz.0.1090'. [ 977.947926][ T7657] netlink: 'syz.0.1091': attribute type 13 has an invalid length. [ 977.948502][ T7657] netlink: 'syz.0.1091': attribute type 17 has an invalid length. [ 977.948790][ T7657] netlink: 'syz.0.1091': attribute type 27 has an invalid length. [ 978.676423][ T7663] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1094'. [ 978.753311][ T7663] 8021q: adding VLAN 0 to HW filter on device bond1 [ 978.784839][ T7663] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 978.790839][ T7663] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 979.587128][ T7707] bond0: (slave ipvlan2): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 979.588729][ T7707] bond0: (slave ipvlan2): The slave device specified does not support setting the MAC address [ 979.590388][ T7707] bond0: (slave ipvlan2): Error -95 calling set_mac_address [ 984.115347][ T7757] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1111'. [ 984.334824][ T7759] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1112'. [ 988.202689][ T7729] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 988.360020][ T7729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 991.440554][ T7729] hsr_slave_0: entered promiscuous mode [ 991.442185][ T7729] hsr_slave_1: entered promiscuous mode [ 991.442807][ T7729] debugfs: 'hsr0' already exists in 'hsr' [ 991.450948][ T7729] Cannot create hsr debugfs directory [ 992.535867][ T7729] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 992.563885][ T7729] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 992.602849][ T7729] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 992.619763][ T7729] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 994.949119][ T7729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1000.754004][ T7729] veth0_vlan: entered promiscuous mode [ 1000.802360][ T7729] veth1_vlan: entered promiscuous mode [ 1000.991816][ T7729] veth0_macvtap: entered promiscuous mode [ 1001.012334][ T7729] veth1_macvtap: entered promiscuous mode [ 1001.178104][ T7939] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.179022][ T7939] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.180122][ T7939] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.180219][ T7939] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1004.107838][ T8246] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1148'. [ 1004.859942][ T31] audit: type=1400 audit(1004.780:397): avc: denied { read } for pid=8253 comm="syz.1.1151" path="socket:[13233]" dev="sockfs" ino=13233 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1005.239491][ T8259] netlink: 104 bytes leftover after parsing attributes in process `syz.1.1153'. [ 1005.674111][ T31] audit: type=1400 audit(1005.590:398): avc: denied { map } for pid=8265 comm="syz.0.1156" path="socket:[13256]" dev="sockfs" ino=13256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1007.014414][ T6997] bond1 (unregistering): (slave macvlan2): Releasing backup interface [ 1007.109886][ T6997] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1007.151599][ T6997] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1007.165727][ T6997] bond0 (unregistering): Released all slaves [ 1007.284198][ T6997] bond1 (unregistering): Released all slaves [ 1007.450058][ T6997] hsr_slave_0: left promiscuous mode [ 1007.460742][ T6997] hsr_slave_1: left promiscuous mode [ 1011.783780][ T8316] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1176'. [ 1011.788894][ T8314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1176'. [ 1011.799041][ T8314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1176'. [ 1012.200138][ T8323] netlink: 104 bytes leftover after parsing attributes in process `syz.1.1179'. [ 1012.643605][ T8327] netlink: 'syz.0.1181': attribute type 10 has an invalid length. [ 1012.644090][ T8327] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1181'. [ 1012.648557][ T8327] vxcan0: entered promiscuous mode [ 1012.648825][ T8327] vxcan0: entered allmulticast mode [ 1012.649658][ T8327] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 1013.973761][ T8348] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1190'. [ 1013.975423][ T8348] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1190'. [ 1014.474998][ T8355] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1193'. [ 1014.697868][ T8359] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1194'. [ 1014.702769][ T8359] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1194'. [ 1017.084522][ T8400] netlink: 'syz.0.1210': attribute type 2 has an invalid length. [ 1017.084882][ T8400] __nla_validate_parse: 4 callbacks suppressed [ 1017.090277][ T8400] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1210'. [ 1017.967882][ T31] audit: type=1400 audit(1017.870:399): avc: denied { create } for pid=8416 comm="syz.1.1218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1018.395517][ T8421] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1219'. [ 1018.396010][ T8421] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1219'. [ 1022.158139][ T8466] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1234'. [ 1022.168006][ T8466] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1234'. [ 1022.172167][ T8466] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1234'. [ 1023.238085][ T8479] netlink: 56 bytes leftover after parsing attributes in process `syz.0.1240'. [ 1024.439210][ T8491] netlink: 76 bytes leftover after parsing attributes in process `syz.0.1245'. [ 1024.439705][ T8491] netlink: 76 bytes leftover after parsing attributes in process `syz.0.1245'. [ 1025.557184][ T8504] netlink: 'syz.0.1250': attribute type 4 has an invalid length. [ 1025.557532][ T8504] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1250'. [ 1027.543483][ T8524] netlink: 216 bytes leftover after parsing attributes in process `syz.0.1257'. [ 1028.350477][ T8533] netlink: 'syz.0.1261': attribute type 3 has an invalid length. [ 1028.781056][ T8539] netlink: 'syz.0.1264': attribute type 12 has an invalid length. [ 1028.781454][ T8539] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1264'. [ 1032.509280][ T8553] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1269'. [ 1033.556563][ T8561] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1272'. [ 1033.589155][ T8559] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1272'. [ 1033.593779][ T8559] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1272'. [ 1034.249840][ T8565] netlink: 'syz.0.1274': attribute type 3 has an invalid length. [ 1035.513124][ T8577] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1279'. [ 1035.520812][ T8575] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1279'. [ 1036.709576][ T8584] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1282'. [ 1037.497451][ T8598] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1288'. [ 1041.625317][ T8614] netlink: 136 bytes leftover after parsing attributes in process `syz.0.1295'. [ 1042.486204][ T8619] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1297'. [ 1042.559018][ T8618] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1297'. [ 1042.568785][ T8618] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1297'. [ 1044.958383][ T8638] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1306'. [ 1044.960731][ T8638] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1306'. [ 1047.350597][ T8655] comedi: valid board names for 8255 driver are: [ 1047.350806][ T8655] 8255 [ 1047.350940][ T8655] comedi: valid board names for vmk80xx driver are: [ 1047.351056][ T8655] vmk80xx [ 1047.351161][ T8655] comedi: valid board names for usbduxsigma driver are: [ 1047.351245][ T8655] usbduxsigma [ 1047.351264][ T8655] comedi: valid board names for usbduxfast driver are: [ 1047.351273][ T8655] usbduxfast [ 1047.351279][ T8655] comedi: valid board names for usbdux driver are: [ 1047.351286][ T8655] usbdux [ 1047.351293][ T8655] comedi: valid board names for ni6501 driver are: [ 1047.351300][ T8655] ni6501 [ 1047.351305][ T8655] comedi: valid board names for dt9812 driver are: [ 1047.351312][ T8655] dt9812 [ 1047.351318][ T8655] comedi: valid board names for ni_labpc_cs driver are: [ 1047.351325][ T8655] ni_labpc_cs [ 1047.351331][ T8655] comedi: valid board names for ni_daq_700 driver are: [ 1047.351338][ T8655] ni_daq_700 [ 1047.351344][ T8655] comedi: valid board names for labpc_pci driver are: [ 1047.351350][ T8655] labpc_pci [ 1047.351357][ T8655] comedi: valid board names for adl_pci9118 driver are: [ 1047.351382][ T8655] pci9118dg [ 1047.351410][ T8655] pci9118hg [ 1047.351418][ T8655] pci9118hr [ 1047.351494][ T8655] comedi: valid board names for 8255_pci driver are: [ 1047.351508][ T8655] 8255_pci [ 1047.351522][ T8655] comedi: valid board names for comedi_parport driver are: [ 1047.351531][ T8655] comedi_parport [ 1047.351537][ T8655] comedi: valid board names for comedi_test driver are: [ 1047.351544][ T8655] comedi_test [ 1047.351551][ T8655] comedi: valid board names for comedi_bond driver are: [ 1047.351563][ T8655] comedi_bond [ 1065.196483][ T8686] capability: warning: `syz.0.1322' uses 32-bit capabilities (legacy support in use) [ 1076.420888][ T8702] genirq: Flags mismatch irq 31. 00200001 (comedi_parport) vs. 00200081 (virtio0) [ 1076.429371][ T8702] 8<--- cut here --- [ 1076.429538][ T8702] Unable to handle kernel paging request at virtual address fee04f27 when write [ 1076.429657][ T8702] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 1076.430605][ T8702] Internal error: Oops: a06 [#1] SMP ARM [ 1076.433677][ T8702] Modules linked in: [ 1076.434243][ T8702] CPU: 1 UID: 0 PID: 8702 Comm: syz.0.1327 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 1076.434747][ T8702] Hardware name: ARM-Versatile Express [ 1076.435030][ T8702] PC is at parport_attach+0x174/0x1d0 [ 1076.435718][ T8702] LR is at parport_attach+0x164/0x1d0 [ 1076.436536][ T8702] pc : [<813ab008>] lr : [<813aaff8>] psr: 60000013 [ 1076.437197][ T8702] sp : dfa7dd30 ip : dfa7dd30 fp : dfa7dd54 [ 1076.437656][ T8702] r10: 82b16f00 r9 : 00000003 r8 : 84152d80 [ 1076.437952][ T8702] r7 : dfa7dd90 r6 : 84152d80 r5 : 00000000 r4 : 00000000 [ 1076.438391][ T8702] r3 : fee04f27 r2 : 81e15444 r1 : 00000001 r0 : 813aac78 [ 1076.438793][ T8702] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1076.439165][ T8702] Control: 30c5387d Table: 8566f940 DAC: 00000000 [ 1076.439490][ T8702] Register r0 information: non-slab/vmalloc memory [ 1076.440361][ T8702] Register r1 information: non-paged memory [ 1076.440759][ T8702] Register r2 information: non-slab/vmalloc memory [ 1076.441070][ T8702] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1076.441699][ T8702] Register r4 information: NULL pointer [ 1076.441978][ T8702] Register r5 information: NULL pointer [ 1076.442241][ T8702] Register r6 information: slab kmalloc-192 start 84152d80 pointer offset 0 size 192 [ 1076.443135][ T8702] Register r7 information: 2-page vmalloc region starting at 0xdfa7c000 allocated at kernel_clone+0xac/0x3ec [ 1076.443605][ T8702] Register r8 information: slab kmalloc-192 start 84152d80 pointer offset 0 size 192 [ 1076.444088][ T8702] Register r9 information: non-paged memory [ 1076.444347][ T8702] Register r10 information: non-slab/vmalloc memory [ 1076.444941][ T8702] Register r11 information: 2-page vmalloc region starting at 0xdfa7c000 allocated at kernel_clone+0xac/0x3ec [ 1076.445585][ T8702] Register r12 information: 2-page vmalloc region starting at 0xdfa7c000 allocated at kernel_clone+0xac/0x3ec [ 1076.446245][ T8702] Process syz.0.1327 (pid: 8702, stack limit = 0xdfa7c000) [ 1076.446825][ T8702] Stack: (0xdfa7dd30 to 0xdfa7e000) [ 1076.447186][ T8702] dd20: 823fe320 84152d80 829cf8ec 829cf8ec [ 1076.447557][ T8702] dd40: 81e15904 84152dc4 dfa7dd8c dfa7dd58 813a70a0 813aaea0 200000c0 00000000 [ 1076.447937][ T8702] dd60: dfa7dd7c 200000c0 84152d80 b5403587 200000c0 84e18c00 40946400 00000003 [ 1076.448302][ T8702] dd80: dfa7de4c dfa7dd90 813a2c20 813a6fa4 656d6f63 705f6964 6f707261 00007472 [ 1076.448756][ T8702] dda0: 00000000 00004f27 0000001f 00010000 00000004 00000003 00000cc7 00000004 [ 1076.449114][ T8702] ddc0: 00080008 0000000e 00000006 00000002 00000001 00000001 00000001 00000006 [ 1076.449560][ T8702] dde0: 10000105 00000000 0001a44d 00000003 3fff7fff 00000089 00000010 00000001 [ 1076.450068][ T8702] de00: 20001e58 0080000b 00000e69 0000003c 00000008 00000006 00000000 ffffffb8 [ 1076.450593][ T8702] de20: 00000000 6164fdc7 00000000 8595b300 84152d80 200000c0 200000c0 84e18c00 [ 1076.451085][ T8702] de40: dfa7df14 dfa7de50 813a3bec 813a2b2c 00000000 00000000 00000000 6164fdc7 [ 1076.451547][ T8702] de60: 00000000 00000000 8247054c 0000005f 83d3f858 84152db0 8416dd44 84e18c00 [ 1076.452174][ T8702] de80: dfa7dee4 dfa7de90 8079795c 8078dcc0 00000064 00000001 00000000 dfa7deac [ 1076.452655][ T8702] dea0: 853e4190 8342e110 00006400 0000000b dfa7dea0 00000000 00000000 6164fdc7 [ 1076.453170][ T8702] dec0: 8595b300 40946400 200000c0 200000c0 8595b300 00000003 dfa7def4 dfa7dee8 [ 1076.453601][ T8702] dee0: 80797a7c 6164fdc7 dfa7df14 40946400 00000000 8595b301 200000c0 8595b300 [ 1076.454198][ T8702] df00: 00000003 84e18c00 dfa7dfa4 dfa7df18 8056cf18 813a361c ecac8b10 84e18c00 [ 1076.454971][ T8702] df20: dfa7df3c dfa7df30 81a388b8 81a38788 dfa7df54 dfa7df40 8025e490 8028ef8c [ 1076.455515][ T8702] df40: dfa7dfb0 40000000 dfa7df84 dfa7df58 802229ec 8025e44c 00000000 8281cddc [ 1076.456304][ T8702] df60: dfa7dfb0 0014c820 ecac8b10 80222940 00000000 6164fdc7 dfa7dfac 00000000 [ 1076.457362][ T8702] df80: 00000000 002f6308 00000036 8020029c 84e18c00 00000036 00000000 dfa7dfa8 [ 1076.457891][ T8702] dfa0: 80200060 8056cdf4 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1076.458387][ T8702] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76ff50bc [ 1076.458861][ T8702] dfe0: 76ff4ec0 76ff4eb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 1076.459203][ T8702] Call trace: [ 1076.459411][ T8702] [<813aae94>] (parport_attach) from [<813a70a0>] (comedi_device_attach+0x108/0x250) [ 1076.459863][ T8702] r6:84152dc4 r5:81e15904 r4:829cf8ec [ 1076.460221][ T8702] [<813a6f98>] (comedi_device_attach) from [<813a2c20>] (do_devconfig_ioctl+0x100/0x220) [ 1076.461114][ T8702] r10:00000003 r9:40946400 r8:84e18c00 r7:200000c0 r6:b5403587 r5:84152d80 [ 1076.462570][ T8702] r4:200000c0 [ 1076.463037][ T8702] [<813a2b20>] (do_devconfig_ioctl) from [<813a3bec>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 1076.463515][ T8702] r8:84e18c00 r7:200000c0 r6:200000c0 r5:84152d80 r4:8595b300 [ 1076.464158][ T8702] [<813a3610>] (comedi_unlocked_ioctl) from [<8056cf18>] (sys_ioctl+0x130/0xba0) [ 1076.465267][ T8702] r10:84e18c00 r9:00000003 r8:8595b300 r7:200000c0 r6:8595b301 r5:00000000 [ 1076.465742][ T8702] r4:40946400 [ 1076.465966][ T8702] [<8056cde8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1076.466445][ T8702] Exception stack(0xdfa7dfa8 to 0xdfa7dff0) [ 1076.466794][ T8702] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1076.467927][ T8702] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76ff50bc [ 1076.468476][ T8702] dfe0: 76ff4ec0 76ff4eb0 0001948c 001322c0 [ 1076.468871][ T8702] r10:00000036 r9:84e18c00 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 1076.469202][ T8702] r4:00000000 [ 1076.469659][ T8702] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1076.470455][ T8702] ---[ end trace 0000000000000000 ]--- [ 1076.471335][ T8702] Kernel panic - not syncing: Fatal exception [ 1076.474182][ T8702] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:53:32 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82c1e600 R02=000000ca R03=00000002 R04=85753cc0 R05=853ad800 R06=83cdc800 R07=83cdc800 R08=8326c9ca R09=00000036 R10=00000036 R11=df97590c R12=df9758f0 R13=df975878 R14=818ac538 R15=7f013e8c PSR=80010013 N--- A S svc32 s00=20313830 s01=72697628 d00=7269762820313830 s02=37303120 s03=32342e36 d01=32342e3637303120 s04=38383830 s05=54205b5d d02=54205b5d38383830 s06=32303738 s07=6567205d d03=6567205d32303738 s08=7172696e s09=6c46203a d04=6c46203a7172696e s10=20736761 s11=6d73696d d05=6d73696d20736761 s12=68637461 s13=71726920 d06=7172692068637461 s14=2e313320 s15=32303020 d07=323030202e313320 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=852e1840 R01=0000005b R02=eb923000 R03=eb923018 R04=853be000 R05=852e1840 R06=80a7927c R07=853be04e R08=82826ee0 R09=00000000 R10=000008a3 R11=dfa7d994 R12=00000002 R13=dfa7d988 R14=82959084 R15=80a7928c PSR=80000193 N--- A S svc32 s00=72697628 s01=306f6974 d00=306f697472697628 s02=63282031 s03=64656d6f d01=64656d6f63282031 s04=6f63205d s05=6964656d d02=6964656d6f63205d s06=6176203a s07=2064696c d03=2064696c6176203a s08=72616f62 s09=616e2064 d04=616e206472616f62 s10=2073656d s11=20726f66 d05=20726f662073656d s12=656d6f63 s13=625f6964 d06=625f6964656d6f63 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000