last executing test programs: 29m54.238070005s ago: executing program 1 (id=6191): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x402, 0x0) sendto$unix(r0, &(0x7f0000000040)="691c8ba4aa4c4da57ba6708aadcb2ca31480de3f2135aba370d4dbc65ab5516d4da987f4112468f574f9acbd670bc10979c0ee26b83895f13af7eeda8be155f1e2c60ad7e4b6eb675c25ad5139edf82d5e8cc5369c99d546b6e56b79e30a2a02585ab44f41baab3190a1f1befdaa98d638c32a731befb9d90add63668fad8f01b0ef6363b9e6652a51584a2372642e2de8f0e933f17b89b2542b8b592b446eb1767446552d042a9f20f3e587282570f6", 0xb0, 0x4000000, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000001c0)={0x1d, r2, 0x1, {0x0, 0x1, 0x2}, 0xfe}, 0x18) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000200)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000240)=0x80000001) (async) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x54d0, 0x80, 0x9, 0x401, 0x10, "972ea5fbb1e145656f27a0a66a90f1345a971f"}) (async) r3 = accept$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, &(0x7f0000000300)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@private2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@ipv4={""/10, ""/2, @loopback}}}, &(0x7f00000004c0)=0xe8) (async) statx(r0, &(0x7f0000000500)='./file0\x00', 0x6000, 0x800, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={""/10, ""/2, @initdev}}}, &(0x7f0000000740)=0xe8) (async) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000840)=0x0) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000980)=0xe8) (async) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) (async) r12 = getgid() setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000a40)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x1, r5}, {0x2, 0x4, r6}, {0x2, 0x1, r7}, {0x2, 0x3, r8}, {0x2, 0x4, r9}], {0x4, 0x2}, [{0x8, 0x6, r11}, {0x8, 0x2, r12}, {0x8, 0x6, 0xee00}, {0x8, 0x4, 0xee00}], {0x10, 0x4}, {0x20, 0x2}}, 0x74, 0x3) close(r0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000ac0)=0x0) quotactl_fd$Q_SETQUOTA(r3, 0xffffffff80000802, r13, &(0x7f0000000b00)={0x4, 0x61b05cb1, 0x65e4, 0x7fffffff, 0x6, 0xe46f, 0x6, 0x2, 0x4000000}) (async) mknod(&(0x7f0000000b80)='./file0\x00', 0xc000, 0x9) (async) r14 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c00), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000c40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000d00)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x1c, r14, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r15}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x10) (async) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000d40)=0x14, 0x4) openat$binder_debug(0xffffff9c, &(0x7f0000000d80)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) openat$iommufd(0xffffff9c, &(0x7f0000000dc0), 0x400, 0x0) (async) setpriority(0x2, r10, 0x3) (async) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008090}, 0x4000000) 29m54.129411871s ago: executing program 1 (id=6192): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x60242, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000004a80), 0xe7d, 0x11e643ae52109c68) r2 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x6, 0xb, 0x20, @mcast2, @loopback, 0x10, 0x1, 0x2, 0x5}}) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x2400c884) 29m54.028661106s ago: executing program 1 (id=6193): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8840) 29m53.94876547s ago: executing program 1 (id=6194): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000040)=0x80) dup3(r1, r2, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0x2) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa6d214, 0x0) r3 = socket(0x10, 0x3, 0x0) getpeername$inet(r3, 0x0, 0x0) r4 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x44100, 0x2) unlinkat(r4, &(0x7f0000000080)='./file0\x00', 0x200) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r6, 0x0) connect$unix(r5, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r7 = fcntl$dupfd(r6, 0x0, r5) accept$packet(r7, 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r7, 0xc004510e, &(0x7f0000000200)=0x15b) 29m53.873802954s ago: executing program 1 (id=6196): r0 = openat$audio1(0xffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f0000000040)=0x3) fsetxattr$security_evm(r0, &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x5, 0x0, 0xf, 0xabc, 0x29, "ef2cca81ab4b340a202805c7f93d2cc0b3ea6caa49704a5bdc216c941d040ab38f5e2491fc76ca5f25"}, 0x32, 0x3) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x4, 0x4c0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000180)=""/143) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) fcntl$setownex(r0, 0xf, 0x0) fcntl$setown(r1, 0x8, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000340)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000400)={@mcast1, 0x0}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000001b40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001b00)={&(0x7f0000000480)={0x1440, r4, 0x2, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x1140, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_BITS={0x3c, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%\'\'+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '/@/-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_BITS={0xdc, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/audio1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/dev/input/event#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/\xcc\\}:\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '-+*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/audio1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-+\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'security.evm\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xe}, @ETHTOOL_A_BITSET_VALUE={0x44, 0x4, "bf44bee184d3351f2b76f7430721a2b9a50966792b0b004d34e08a66968fd63eea9f976e15efaebfbfa1eb07e26a73c3cdb1b4d0778179e77f93186ce7925631"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2849721e}, @ETHTOOL_A_BITSET_VALUE={0xc7, 0x4, "265e73c5214398b3aa2943c0d5a756fda3ce5d39360a39bc49d65357ebe16271aa33decc699bb4b7caec5cbb6d761a14555173dd8b9b82b253ddad979ec8498a0b9e4687f9324a47677565e154ebf1ba1580e6f0e8cd5f9c5d658f590c55ba862d50702df0a625463e4cafd24487cdbf6608a9e9653625141b87e5f5dc60bf9948d0009eb2f7e4b3eb28b28f60deac180c88fcf99a3f51f6f62aaab52ec211f73797fcb55ebf13e643a31e17cd70618306cf2c64197c13a101e9b8c763356430651f17"}, @ETHTOOL_A_BITSET_VALUE={0x50, 0x4, "9b3eed5a3f10a6b1ea794831220b8e4304b8a6787c7db8ce7a59d79ddfbdc2ef2987efadd2b84910ec57095bbd3ef366e53dc5c4bc7e828c3d291c988e91c64c47fb051bdf0ee7cbe2936735"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xc3}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8b}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1b}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x110, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x100}, @ETHTOOL_A_BITSET_MASK={0xfe, 0x5, "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"}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x1440}}, 0x20000861) fsetxattr$security_evm(r1, &(0x7f0000001b80), &(0x7f0000001bc0)=@md5={0x1, "f6d363186021dab3d487e0da86c2329f"}, 0x11, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r6, &(0x7f0000001d40)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001c40)={0xb4, 0x2, 0x1, 0x3, 0x0, 0x0, {0x2, 0x0, 0x5}, [@CTA_TUPLE_REPLY={0x84, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'sip-20000\x00'}}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1000}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0x404c000) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r7, &(0x7f0000001e80)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001e40)={&(0x7f0000001e00)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4400c0c4}, 0x800) r9 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001f00), r7) sendmsg$NLBL_UNLABEL_C_STATICADD(r7, &(0x7f0000002040)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002000)={&(0x7f0000001f40)={0xa0, r9, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wlan1\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:hald_keymap_exec_t:s0\x00'}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000010}, 0x4002025) syz_usb_connect$cdc_ncm(0x6, 0x124, &(0x7f0000002080)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x112, 0x2, 0x1, 0xff, 0x150, 0xd, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xa, 0x24, 0x6, 0x0, 0x1, "c04c750334"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x8, 0x5, 0x8, 0xc8}, {0x6, 0x24, 0x1a, 0x9}, [@mdlm={0x15, 0x24, 0x12, 0x3}, @mdlm_detail={0x49, 0x24, 0x13, 0xff, "d00e1711abb363c2504febecc166994ccba426f18a9cb66711c4bfd530374f74759d51605b29c33ade2f88ea93a22a2f0833fbec71c0f7fe09d723baea41cc85c5d88d565f"}, @mdlm_detail={0x53, 0x24, 0x13, 0x6, "68dc612e9c1e068d4e222b6c62fe9e715cf4b88c8e697c2269e8a036d28e859efe703a688fead7a17b1e1b8d006c506142fd6c44aa6ab4f8821d86dd3f6a07f6a675b2bf8ae56ed6cd4d454f9ece22"}]}, {{0x9, 0x5, 0x81, 0x3, 0x400, 0x0, 0x5, 0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x10, 0xa3, 0x0, 0x52}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0xc0, 0x5, 0x2}}}}}}}]}}, &(0x7f0000002440)={0xa, &(0x7f00000021c0)={0xa, 0x6, 0x110, 0x7, 0x8, 0xe0, 0x8, 0xfe}, 0x94, &(0x7f0000002200)={0x5, 0xf, 0x94, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0x8, "a4c7f0e6f8ead859507d275ac9b29a5a"}, @generic={0x42, 0x10, 0xb, "7e0d8b83bef92367fccfcce9bacbb591d215fee7fcd2ed797bab56bf93868ed81624b18331362fcc4f196953ebb2fe6a1db734df2f4ff821267bd41df017dd"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x5, 0x0, 0xf7, 0x101, 0xe0}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x8, 0x3, 0xff}, @generic={0x1c, 0x10, 0x0, "8b9696f4b06d4166e3077ec832465c105455537b60da554c0a"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x55, 0x22, 0x4, 0x3, 0x2e}]}, 0x3, [{0xa6, &(0x7f00000022c0)=@string={0xa6, 0x3, "a3bb74d49bbaaaf8d10a1e329eee7d05d8e37b826710a6bcea66f1e7fb06a4d8e90dd4fff8b977cd5d0d2cab24ce54b126dd584742ac05164a78bb41af1a12f98c2a245dacf23668889aafa7205d1aa66d468fd380613d32c341228e7ccbefff8e54404e4077037c2ca43b9eea2b845081abd475e9abc3323c2eb5d7b3ab0d1c80935ad26c6c3640648695f6d076967366645668af903ecab8c527b641daaf2582c7e7bf"}}, {0x4, &(0x7f0000002380)=@lang_id={0x4, 0x3, 0x416}}, {0x6c, &(0x7f00000023c0)=@string={0x6c, 0x3, "ab827d3f91cc205a7eb008b9be2908f2e968f9d0cf5f29e8b0d27c2e9fd9f451eb9a43e436e27afc46a66c9bf6cc6e0d95749bc3935d045a893e651974d56dfd8f11c1de0f620a03f4dc15544e33835c8131fbc59e5e4b3c3826b07cd79bd63ee8ff0b4a03845e2730b4"}}]}) r10 = fcntl$dupfd(r0, 0x0, r1) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000024c0), r7) sendmsg$NLBL_MGMT_C_ADD(r11, &(0x7f00000025c0)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002580)={&(0x7f0000002500)={0x68, r12, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x11) recvmsg$can_raw(r10, &(0x7f0000002940)={&(0x7f0000002600)=@rc, 0x80, &(0x7f0000002880)=[{&(0x7f0000002680)=""/15, 0xf}, {&(0x7f00000026c0)=""/143, 0x8f}, {&(0x7f0000002780)=""/133, 0x85}, {&(0x7f0000002840)=""/27, 0x1b}], 0x4, &(0x7f00000028c0)=""/75, 0x4b}, 0x100) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000002980)={0x10, 0x0, 0x0, 0xc40080}, 0xc, &(0x7f0000002a80)={&(0x7f00000029c0)={0x94, 0x0, 0x103, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x28, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf62e62a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x178fdf96}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42e76bd8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x255276ed}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x94}, 0x1, 0x0, 0x0, 0x884}, 0x0) 29m53.265702565s ago: executing program 1 (id=6198): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8840) 29m53.264943555s ago: executing program 32 (id=6198): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8840) 5.42204473s ago: executing program 0 (id=8579): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='mm_page_alloc_extfrag\x00', r0, 0x0, 0x4000}, 0x18) 5.148650185s ago: executing program 0 (id=8580): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_SPLIT_GSO={0x8}]}}]}, 0x3c}}, 0x0) 4.748407305s ago: executing program 0 (id=8581): r0 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000000)=0x3) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) 4.448338981s ago: executing program 0 (id=8582): creat(0x0, 0xac) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1e8}}, 0x0) 4.380074365s ago: executing program 0 (id=8583): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_PROBE_CLIENT(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r0, 0x1, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x28}}, 0x20000040) 3.348331578s ago: executing program 0 (id=8584): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, &(0x7f0000000380)={0x2c, &(0x7f0000000180)={0x40, 0x10, 0x5, "ba24b721a5"}, 0x0, 0x0, 0x0, 0x0}) 2.056887424s ago: executing program 2 (id=8587): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xe) 1.675685184s ago: executing program 2 (id=8588): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000003005740ed0b0011c3ec000000010902120001000000000904"], 0x0) syz_usb_connect$cdc_ncm(0x4, 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x5f, &(0x7f0000000840)=@string={0x5f, 0x3, "ff389aab7719532fd50129566dcb72d0df0999a4e83705fae50e1bca4bdc3513a9a302f686e259537e26ff7620491104d500afae682ce3709114bc7acf1ad658e1e5096407dd2b73c23fc554bdd5974902461b22f73bf6e0a999557178"}}]}) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)=ANY=[@ANYBLOB="00000100000022"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, &(0x7f00000004c0)={0x44, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000700)={0x84, &(0x7f0000000640)=ANY=[@ANYBLOB="201104060000000101"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 1.246843846s ago: executing program 2 (id=8589): creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002280), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9}}, 0x50) 799.224789ms ago: executing program 2 (id=8590): r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000007c0)=ANY=[@ANYBLOB="12010000ed3ec908cd0cb300ea2d010203010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000900)={0x44, &(0x7f0000000640)={0x20, 0x11}, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x20, 0x82, 0x1, '['}, &(0x7f0000000840)={0x20, 0x83, 0x1, "d0"}, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000380)={0x24, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 517.512184ms ago: executing program 2 (id=8591): r0 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r0, &(0x7f0000006380)=[{{&(0x7f0000000500)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000a80)=[@ip_retopts={{0x18, 0x0, 0x7, {[@generic={0x44, 0x4, "d906"}, @timestamp_addr={0x44, 0x4, 0x87, 0x1, 0x5}]}}}], 0x18}}], 0x1, 0x4) 0s ago: executing program 2 (id=8592): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x2, 0x421, 0x1, 0xcc7, 0x7fffffff, 0x5c952399, 0x5, 0x3ff, 0x2, 0x300, 0x1, 0x1, 0x9, 0x0, 0x0, 0x8, 0xfffffffa, 0x1ff, 0x80000089, 0xa, 0x0, 0x20001e54, 0xffffeadb, 0x3, 0x3d, 0x8, 0x4, 0x8000000, 0xdffffffa]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a44, 0x1700) kernel console output (not intermixed with test programs): 7.990969][T25414] name failslab, interval 1, probability 0, space 0, times 0 [ 3097.991353][T25414] CPU: 0 UID: 0 PID: 25414 Comm: syz.2.7342 Not tainted syzkaller #0 PREEMPT [ 3097.991481][T25414] Hardware name: ARM-Versatile Express [ 3097.991513][T25414] Call trace: [ 3097.991599][T25414] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3097.991707][T25414] r7:8412e000 r6:00000000 r5:60000013 r4:822603d4 [ 3097.991727][T25414] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3097.991779][T25414] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3097.991840][T25414] r5:8412e000 r4:82917c00 [ 3097.991857][T25414] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3097.991916][T25414] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3097.992002][T25414] r8:00000000 r7:8412e000 r6:00000cc0 r5:20000240 r4:830a2a80 [ 3097.992221][T25414] [<8051f194>] (should_failslab) from [<80503810>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 3097.992431][T25414] [<805037c4>] (kmem_cache_alloc_noprof) from [<80562b24>] (getname_flags.part.0+0x28/0x18c) [ 3097.992504][T25414] r10:00000015 r9:8412e000 r8:00000000 r7:00000001 r6:82465858 r5:20000240 [ 3097.992528][T25414] r4:20000240 [ 3097.992575][T25414] [<80562afc>] (getname_flags.part.0) from [<80567ac0>] (getname_flags+0x3c/0x50) [ 3097.992779][T25414] r9:8412e000 r8:00000000 r7:00000000 r6:ffffff9c r5:00000001 r4:20000240 [ 3097.992959][T25414] [<80567a84>] (getname_flags) from [<80568078>] (user_path_at+0x2c/0x64) [ 3097.993016][T25414] r5:00000001 r4:dfb5df6c [ 3097.993035][T25414] [<8056804c>] (user_path_at) from [<80586788>] (sys_mount+0x158/0x260) [ 3097.993113][T25414] r6:00000000 r5:00000000 r4:00000000 [ 3097.993243][T25414] [<80586630>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3097.993465][T25414] Exception stack(0xdfb5dfa8 to 0xdfb5dff0) [ 3097.994099][T25414] dfa0: 00000000 00000000 00000000 20000240 00000000 03b60821 [ 3097.994280][T25414] dfc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76f710bc [ 3097.994373][T25414] dfe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3097.994416][T25414] r10:00000015 r9:8412e000 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 3097.994438][T25414] r4:00000000 [ 3099.612259][T25423] FAULT_INJECTION: forcing a failure. [ 3099.612259][T25423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3099.634493][T25423] CPU: 0 UID: 0 PID: 25423 Comm: syz.2.7345 Not tainted syzkaller #0 PREEMPT [ 3099.634586][T25423] Hardware name: ARM-Versatile Express [ 3099.634607][T25423] Call trace: [ 3099.634655][T25423] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3099.634725][T25423] r7:00000000 r6:00000000 r5:60000013 r4:822603d4 [ 3099.634734][T25423] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3099.634758][T25423] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3099.634783][T25423] r5:8584d400 r4:8294f190 [ 3099.634790][T25423] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3099.634817][T25423] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3099.634853][T25423] r8:76f70f30 r7:00000000 r6:00000000 r5:dfb61f68 r4:00000002 [ 3099.634862][T25423] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3099.634886][T25423] [<80972780>] (should_fail_usercopy) from [<8058e5bc>] (simple_read_from_buffer+0x80/0x13c) [ 3099.634914][T25423] [<8058e53c>] (simple_read_from_buffer) from [<806085b4>] (proc_fail_nth_read+0xb8/0x108) [ 3099.634949][T25423] r10:00000001 r9:806084fc r8:00000002 r7:dfb61f68 r6:0000000f r5:76f70f30 [ 3099.634973][T25423] r4:8584d400 r3:dfb61e9f [ 3099.634991][T25423] [<806084fc>] (proc_fail_nth_read) from [<8055340c>] (vfs_read+0x98/0x324) [ 3099.635035][T25423] r8:76f70f30 r7:dfb61f68 r6:8584d400 r5:0000000f r4:86c473c0 [ 3099.635043][T25423] [<80553374>] (vfs_read) from [<8055411c>] (ksys_read+0x74/0xe8) [ 3099.635077][T25423] r10:00000003 r9:8584d400 r8:8020029c r7:00000000 r6:00000000 r5:86c473c0 [ 3099.635086][T25423] r4:86c473c3 [ 3099.635093][T25423] [<805540a8>] (ksys_read) from [<805541a0>] (sys_read+0x10/0x14) [ 3099.635120][T25423] r7:00000003 r6:00000004 r5:76f70f30 r4:0000000f [ 3099.635128][T25423] [<80554190>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3099.635156][T25423] Exception stack(0xdfb61fa8 to 0xdfb61ff0) [ 3099.635224][T25423] 1fa0: 0000000f 76f70f30 00000004 76f70f30 0000000f 00000000 [ 3099.635260][T25423] 1fc0: 0000000f 76f70f30 00000004 00000003 002e0000 00000000 00006364 76f710bc [ 3099.635273][T25423] 1fe0: 00000158 76f70ed0 000d80f0 00130194 [ 3102.394237][ T31] audit: type=1400 audit(134220830.293:515): avc: denied { set_context_mgr } for pid=25434 comm="syz.2.7350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 3107.074571][T25453] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25453 comm=syz.0.7356 [ 3107.998948][T25461] FAULT_INJECTION: forcing a failure. [ 3107.998948][T25461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3107.999302][T25461] CPU: 0 UID: 0 PID: 25461 Comm: syz.0.7359 Not tainted syzkaller #0 PREEMPT [ 3107.999414][T25461] Hardware name: ARM-Versatile Express [ 3107.999446][T25461] Call trace: [ 3107.999491][T25461] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3107.999594][T25461] r7:00000001 r6:00000000 r5:60000013 r4:822603d4 [ 3107.999617][T25461] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3107.999669][T25461] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3107.999723][T25461] r5:8584ec00 r4:8294f190 [ 3107.999739][T25461] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3107.999817][T25461] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3107.999940][T25461] r8:00000000 r7:00000001 r6:82465858 r5:20000240 r4:20000240 [ 3108.000154][T25461] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3108.000264][T25461] [<80972780>] (should_fail_usercopy) from [<80978868>] (strncpy_from_user+0x20/0x1a0) [ 3108.000366][T25461] [<80978848>] (strncpy_from_user) from [<80562b40>] (getname_flags.part.0+0x44/0x18c) [ 3108.000576][T25461] r10:00000015 r9:8584ec00 r8:00000000 r7:00000001 r6:82465858 r5:20000240 [ 3108.000601][T25461] r4:83227000 [ 3108.000817][T25461] [<80562afc>] (getname_flags.part.0) from [<80567ac0>] (getname_flags+0x3c/0x50) [ 3108.001024][T25461] r9:8584ec00 r8:00000000 r7:00000000 r6:ffffff9c r5:00000001 r4:20000240 [ 3108.001049][T25461] [<80567a84>] (getname_flags) from [<80568078>] (user_path_at+0x2c/0x64) [ 3108.001105][T25461] r5:00000001 r4:dfbd5f6c [ 3108.001122][T25461] [<8056804c>] (user_path_at) from [<80586788>] (sys_mount+0x158/0x260) [ 3108.001172][T25461] r6:00000000 r5:00000000 r4:00000000 [ 3108.001189][T25461] [<80586630>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3108.001230][T25461] Exception stack(0xdfbd5fa8 to 0xdfbd5ff0) [ 3108.001267][T25461] 5fa0: 00000000 00000000 00000000 20000240 00000000 03b60821 [ 3108.001303][T25461] 5fc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76f130bc [ 3108.001329][T25461] 5fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3108.001359][T25461] r10:00000015 r9:8584ec00 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 3108.001379][T25461] r4:00000000 [ 3109.345031][T25475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25475 comm=syz.2.7364 [ 3114.096293][ T31] audit: type=1400 audit(134220842.013:516): avc: denied { lock } for pid=25487 comm="syz.0.7369" path="/dev/input/mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 3120.384835][T25509] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25509 comm=syz.2.7375 [ 3146.315082][ T31] audit: type=1400 audit(134220874.203:517): avc: denied { write } for pid=25588 comm="syz.0.7403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3146.464809][ T31] audit: type=1400 audit(134220874.373:518): avc: denied { read } for pid=25592 comm="syz.2.7405" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3146.467016][ T31] audit: type=1400 audit(134220874.373:519): avc: denied { open } for pid=25592 comm="syz.2.7405" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3147.296072][ T31] audit: type=1400 audit(134220875.213:520): avc: denied { setattr } for pid=25594 comm="syz.0.7406" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3147.694143][ T31] audit: type=1400 audit(134220875.603:521): avc: denied { ioctl } for pid=25592 comm="syz.2.7405" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3148.265914][T25600] tmpfs: Unknown parameter 'usrquotaÀ' [ 3151.058729][ T31] audit: type=1400 audit(134220878.973:522): avc: denied { write } for pid=25606 comm="syz.0.7409" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3152.005286][T25613] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25613 comm=syz.0.7409 [ 3172.957613][ T31] audit: type=1400 audit(134220900.873:523): avc: denied { create } for pid=25651 comm="syz.0.7424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 3179.134759][T25675] FAULT_INJECTION: forcing a failure. [ 3179.134759][T25675] name failslab, interval 1, probability 0, space 0, times 0 [ 3179.136003][T25675] CPU: 0 UID: 0 PID: 25675 Comm: syz.0.7432 Not tainted syzkaller #0 PREEMPT [ 3179.136060][T25675] Hardware name: ARM-Versatile Express [ 3179.136074][T25675] Call trace: [ 3179.136097][T25675] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3179.136170][T25675] r7:8584b000 r6:00000000 r5:60000013 r4:822603d4 [ 3179.136180][T25675] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3179.136211][T25675] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3179.136243][T25675] r5:8584b000 r4:82917c00 [ 3179.136251][T25675] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3179.136289][T25675] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3179.136330][T25675] r8:00000000 r7:8584b000 r6:00400dc0 r5:8290b6a0 r4:830020c0 [ 3179.136341][T25675] [<8051f194>] (should_failslab) from [<80502bc4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3179.136368][T25675] [<80502b78>] (__kmalloc_cache_noprof) from [<805a43d8>] (alloc_fs_context+0x3c/0x2a8) [ 3179.136404][T25675] r10:8584b000 r9:02800001 r8:02800051 r7:00000002 r6:834a33b8 r5:8290b6a0 [ 3179.136417][T25675] r4:834a33b8 [ 3179.136426][T25675] [<805a439c>] (alloc_fs_context) from [<805a46a0>] (fs_context_for_reconfigure+0x30/0x38) [ 3179.136463][T25675] r9:00000000 r8:8570d400 r7:85de2a90 r6:dfa05f6c r5:00000050 r4:834a33b8 [ 3179.136473][T25675] [<805a4670>] (fs_context_for_reconfigure) from [<80585b18>] (path_mount+0x360/0xa70) [ 3179.136502][T25675] [<805857b8>] (path_mount) from [<805867a8>] (sys_mount+0x178/0x260) [ 3179.136536][T25675] r10:00000015 r9:8584b000 r8:00000000 r7:00000000 r6:00000000 r5:00000000 [ 3179.136547][T25675] r4:00000000 [ 3179.136556][T25675] [<80586630>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3179.136581][T25675] Exception stack(0xdfa05fa8 to 0xdfa05ff0) [ 3179.136626][T25675] 5fa0: 00000000 00000000 00000000 20000240 00000000 03b60821 [ 3179.136646][T25675] 5fc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76f130bc [ 3179.136662][T25675] 5fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3179.136681][T25675] r10:00000015 r9:8584b000 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 3179.136693][T25675] r4:00000000 [ 3192.978677][T25713] FAULT_INJECTION: forcing a failure. [ 3192.978677][T25713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3192.978990][T25713] CPU: 0 UID: 0 PID: 25713 Comm: syz.2.7447 Not tainted syzkaller #0 PREEMPT [ 3192.979108][T25713] Hardware name: ARM-Versatile Express [ 3192.979133][T25713] Call trace: [ 3192.979170][T25713] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3192.979275][T25713] r7:20000180 r6:00000000 r5:60000013 r4:822603d4 [ 3192.979291][T25713] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3192.979332][T25713] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3192.979376][T25713] r5:8412d400 r4:8294f190 [ 3192.979388][T25713] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3192.979560][T25713] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3192.979787][T25713] r8:84bcac01 r7:20000180 r6:dfa05ee4 r5:00000010 r4:00000010 [ 3192.979884][T25713] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3192.979958][T25713] [<80972780>] (should_fail_usercopy) from [<815443d4>] (move_addr_to_kernel+0x34/0xf8) [ 3192.980083][T25713] [<815443a0>] (move_addr_to_kernel) from [<81545ae8>] (__sys_sendto+0xd0/0x160) [ 3192.980262][T25713] r7:20000180 r6:85175180 r5:00000000 r4:00000000 [ 3192.980421][T25713] [<81545a18>] (__sys_sendto) from [<81545b94>] (sys_sendto+0x1c/0x24) [ 3192.980523][T25713] r9:8412d400 r8:8020029c r7:00000122 r6:00130270 r5:00000010 r4:20000180 [ 3192.980544][T25713] [<81545b78>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3192.980628][T25713] Exception stack(0xdfa05fa8 to 0xdfa05ff0) [ 3192.980975][T25713] 5fa0: 20000180 00000010 00000004 00000000 00000000 00000000 [ 3192.981009][T25713] 5fc0: 20000180 00000010 00130270 00000122 002e0000 00000000 00006364 76f710bc [ 3192.981107][T25713] 5fe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3196.076930][T25723] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=25723 comm=syz.0.7452 [ 3197.856141][T25736] SELinux: Context system_u:object_r:devicekit_var_lib_t:s0 is not valid (left unmapped). [ 3197.864290][ T31] audit: type=1400 audit(134220925.773:524): avc: denied { relabelto } for pid=25735 comm="syz.0.7458" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3197.864602][ T31] audit: type=1400 audit(134220925.773:525): avc: denied { associate } for pid=25735 comm="syz.0.7458" name="null" dev="devtmpfs" ino=4 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3198.326832][T25738] FAULT_INJECTION: forcing a failure. [ 3198.326832][T25738] name failslab, interval 1, probability 0, space 0, times 0 [ 3198.334669][T25738] CPU: 1 UID: 0 PID: 25738 Comm: syz.0.7459 Not tainted syzkaller #0 PREEMPT [ 3198.334819][T25738] Hardware name: ARM-Versatile Express [ 3198.334848][T25738] Call trace: [ 3198.334887][T25738] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3198.334989][T25738] r7:8412e000 r6:00000000 r5:60000013 r4:822603d4 [ 3198.335008][T25738] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3198.335052][T25738] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3198.335099][T25738] r5:8412e000 r4:82917c00 [ 3198.335113][T25738] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3198.335162][T25738] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3198.335267][T25738] r8:00000000 r7:8412e000 r6:00000dc0 r5:828215b0 r4:83001300 [ 3198.335288][T25738] [<8051f194>] (should_failslab) from [<80502bc4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3198.335333][T25738] [<80502b78>] (__kmalloc_cache_noprof) from [<80494d58>] (shmem_init_fs_context+0x28/0x78) [ 3198.335394][T25738] r10:8412e000 r9:02800001 r8:858f0000 r7:00000002 r6:837ac3b8 r5:828215b0 [ 3198.335416][T25738] r4:85e47b80 [ 3198.335432][T25738] [<80494d30>] (shmem_init_fs_context) from [<805a4530>] (alloc_fs_context+0x194/0x2a8) [ 3198.335490][T25738] r5:828215b0 r4:85e47b80 [ 3198.335508][T25738] [<805a439c>] (alloc_fs_context) from [<805a46a0>] (fs_context_for_reconfigure+0x30/0x38) [ 3198.335562][T25738] r9:00000000 r8:8570d400 r7:85e32910 r6:dfa81f6c r5:00000050 r4:837ac3b8 [ 3198.335590][T25738] [<805a4670>] (fs_context_for_reconfigure) from [<80585b18>] (path_mount+0x360/0xa70) [ 3198.335635][T25738] [<805857b8>] (path_mount) from [<805867a8>] (sys_mount+0x178/0x260) [ 3198.335686][T25738] r10:00000015 r9:8412e000 r8:00000000 r7:00000000 r6:00000000 r5:00000000 [ 3198.335704][T25738] r4:00000000 [ 3198.335718][T25738] [<80586630>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3198.335757][T25738] Exception stack(0xdfa81fa8 to 0xdfa81ff0) [ 3198.335790][T25738] 1fa0: 00000000 00000000 00000000 20000240 00000000 03b60821 [ 3198.335827][T25738] 1fc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76f130bc [ 3198.335851][T25738] 1fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3198.335879][T25738] r10:00000015 r9:8412e000 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 3198.335896][T25738] r4:00000000 [ 3228.696169][T25795] FAULT_INJECTION: forcing a failure. [ 3228.696169][T25795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3228.723310][T25795] CPU: 1 UID: 0 PID: 25795 Comm: syz.2.7481 Not tainted syzkaller #0 PREEMPT [ 3228.723459][T25795] Hardware name: ARM-Versatile Express [ 3228.723486][T25795] Call trace: [ 3228.723613][T25795] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3228.723722][T25795] r7:dfa95e20 r6:00000000 r5:60000113 r4:822603d4 [ 3228.723765][T25795] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3228.723817][T25795] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3228.723870][T25795] r5:8584d400 r4:8294f190 [ 3228.723885][T25795] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3228.723937][T25795] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3228.723990][T25795] r8:00008050 r7:dfa95e20 r6:20000200 r5:00000000 r4:dfa95f20 [ 3228.724004][T25795] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3228.724047][T25795] [<80972780>] (should_fail_usercopy) from [<815461b8>] (copy_msghdr_from_user+0x50/0x130) [ 3228.724102][T25795] [<81546168>] (copy_msghdr_from_user) from [<81546310>] (___sys_sendmsg+0x78/0xd0) [ 3228.724214][T25795] r8:00008050 r7:00000000 r6:8516ea00 r5:dfa95f20 r4:dfa95e64 [ 3228.724234][T25795] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3228.724288][T25795] r10:00000128 r9:8584d400 r8:85997e40 r7:00008050 r6:20000200 r5:85997e41 [ 3228.724306][T25795] r4:00000003 [ 3228.724322][T25795] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3228.724371][T25795] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3228.724388][T25795] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3228.724425][T25795] Exception stack(0xdfa95fa8 to 0xdfa95ff0) [ 3228.724457][T25795] 5fa0: 00000000 00000000 00000003 20000200 00008050 00000000 [ 3228.724487][T25795] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f710bc [ 3228.724511][T25795] 5fe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3229.135932][T25798] FAULT_INJECTION: forcing a failure. [ 3229.135932][T25798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3229.145325][T25798] CPU: 1 UID: 0 PID: 25798 Comm: syz.2.7482 Not tainted syzkaller #0 PREEMPT [ 3229.145447][T25798] Hardware name: ARM-Versatile Express [ 3229.145471][T25798] Call trace: [ 3229.145510][T25798] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3229.145615][T25798] r7:dfab9e20 r6:00000000 r5:60000113 r4:822603d4 [ 3229.145635][T25798] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3229.145682][T25798] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3229.145727][T25798] r5:85849800 r4:8294f190 [ 3229.145741][T25798] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3229.145792][T25798] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3229.145846][T25798] r8:00000080 r7:dfab9e20 r6:200015c0 r5:00000000 r4:dfab9f20 [ 3229.145861][T25798] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3229.145903][T25798] [<80972780>] (should_fail_usercopy) from [<815461b8>] (copy_msghdr_from_user+0x50/0x130) [ 3229.145955][T25798] [<81546168>] (copy_msghdr_from_user) from [<81546310>] (___sys_sendmsg+0x78/0xd0) [ 3229.146010][T25798] r8:00000080 r7:00000000 r6:8516ea00 r5:dfab9f20 r4:dfab9e64 [ 3229.146026][T25798] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3229.146079][T25798] r10:00000128 r9:85849800 r8:85997e40 r7:00000080 r6:200015c0 r5:85997e41 [ 3229.146095][T25798] r4:00000004 [ 3229.146108][T25798] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3229.146157][T25798] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3229.146174][T25798] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3229.146212][T25798] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 3229.146244][T25798] 9fa0: 00000000 00000000 00000004 200015c0 00000080 00000000 [ 3229.146280][T25798] 9fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f710bc [ 3229.146304][T25798] 9fe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3229.456448][T25800] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3229.474696][T25800] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3229.524209][T25800] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3229.525690][T25800] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3231.149901][T25814] FAULT_INJECTION: forcing a failure. [ 3231.149901][T25814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3231.150291][T25814] CPU: 0 UID: 0 PID: 25814 Comm: syz.2.7488 Not tainted syzkaller #0 PREEMPT [ 3231.150386][T25814] Hardware name: ARM-Versatile Express [ 3231.150423][T25814] Call trace: [ 3231.150470][T25814] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3231.150573][T25814] r7:dfad1e20 r6:00000000 r5:60000013 r4:822603d4 [ 3231.150603][T25814] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3231.150658][T25814] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3231.150711][T25814] r5:8412ec00 r4:8294f190 [ 3231.150729][T25814] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3231.150875][T25814] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3231.151036][T25814] r8:2000801c r7:dfad1e20 r6:20000780 r5:00000000 r4:dfad1f20 [ 3231.151145][T25814] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3231.151255][T25814] [<80972780>] (should_fail_usercopy) from [<815461b8>] (copy_msghdr_from_user+0x50/0x130) [ 3231.151608][T25814] [<81546168>] (copy_msghdr_from_user) from [<81546310>] (___sys_sendmsg+0x78/0xd0) [ 3231.151792][T25814] r8:2000801c r7:00000000 r6:85174a00 r5:dfad1f20 r4:dfad1e64 [ 3231.151844][T25814] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3231.151915][T25814] r10:00000128 r9:8412ec00 r8:84bcacc0 r7:2000801c r6:20000780 r5:84bcacc1 [ 3231.152037][T25814] r4:00000003 [ 3231.152059][T25814] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3231.152239][T25814] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3231.152400][T25814] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3231.152461][T25814] Exception stack(0xdfad1fa8 to 0xdfad1ff0) [ 3231.152597][T25814] 1fa0: 00000000 00000000 00000003 20000780 2000801c 00000000 [ 3231.152704][T25814] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f710bc [ 3231.152807][T25814] 1fe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3234.201882][ T31] audit: type=1400 audit(134220962.093:526): avc: denied { nlmsg_read } for pid=25821 comm="syz.0.7490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3240.274327][ T31] audit: type=1400 audit(134220968.183:527): avc: denied { read } for pid=25844 comm="syz.0.7498" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3240.276259][ T31] audit: type=1400 audit(134220968.183:528): avc: denied { open } for pid=25844 comm="syz.0.7498" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3247.946389][ T31] audit: type=1400 audit(134220975.863:529): avc: denied { append } for pid=25855 comm="syz.0.7502" name="usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3272.337844][ T31] audit: type=1400 audit(134221000.253:530): avc: denied { map } for pid=25919 comm="syz.2.7527" path="/dev/fb1" dev="devtmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3276.937685][T25931] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25931 comm=syz.2.7530 [ 3291.011528][ C0] vkms_vblank_simulate: vblank timer overrun [ 3291.536527][T26004] fuse: Bad value for 'fd' [ 3300.926928][T26082] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26082 comm=syz.2.7583 [ 3301.207016][ T31] audit: type=1400 audit(134221029.123:531): avc: denied { write } for pid=26083 comm="syz.2.7585" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3311.699084][T26181] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26181 comm=syz.0.7616 [ 3313.265074][T26192] FAULT_INJECTION: forcing a failure. [ 3313.265074][T26192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3313.265277][T26192] CPU: 1 UID: 0 PID: 26192 Comm: syz.0.7621 Not tainted syzkaller #0 PREEMPT [ 3313.265324][T26192] Hardware name: ARM-Versatile Express [ 3313.265340][T26192] Call trace: [ 3313.265391][T26192] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3313.265448][T26192] r7:00000000 r6:00000000 r5:60000013 r4:822603d4 [ 3313.265480][T26192] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3313.265508][T26192] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3313.265534][T26192] r5:8412d400 r4:8294f190 [ 3313.265542][T26192] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3313.265569][T26192] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3313.265606][T26192] r8:76f12f30 r7:00000000 r6:00000000 r5:dfc25f68 r4:00000002 [ 3313.265614][T26192] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3313.265638][T26192] [<80972780>] (should_fail_usercopy) from [<8058e5bc>] (simple_read_from_buffer+0x80/0x13c) [ 3313.265666][T26192] [<8058e53c>] (simple_read_from_buffer) from [<806085b4>] (proc_fail_nth_read+0xb8/0x108) [ 3313.265698][T26192] r10:00000001 r9:806084fc r8:00000002 r7:dfc25f68 r6:0000000f r5:76f12f30 [ 3313.265708][T26192] r4:8412d400 r3:dfc25e9f [ 3313.265716][T26192] [<806084fc>] (proc_fail_nth_read) from [<8055340c>] (vfs_read+0x98/0x324) [ 3313.265745][T26192] r8:76f12f30 r7:dfc25f68 r6:8412d400 r5:0000000f r4:85fbc240 [ 3313.265753][T26192] [<80553374>] (vfs_read) from [<8055411c>] (ksys_read+0x74/0xe8) [ 3313.265803][T26192] r10:00000003 r9:8412d400 r8:8020029c r7:00000000 r6:00000000 r5:85fbc240 [ 3313.265890][T26192] r4:85fbc243 [ 3313.266166][T26192] [<805540a8>] (ksys_read) from [<805541a0>] (sys_read+0x10/0x14) [ 3313.266295][T26192] r7:00000003 r6:00000004 r5:76f12f30 r4:0000000f [ 3313.266419][T26192] [<80554190>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3313.266482][T26192] Exception stack(0xdfc25fa8 to 0xdfc25ff0) [ 3313.266518][T26192] 5fa0: 0000000f 76f12f30 00000004 76f12f30 0000000f 00000000 [ 3313.266592][T26192] 5fc0: 0000000f 76f12f30 00000004 00000003 002e0000 00000000 00006364 76f130bc [ 3313.267040][T26192] 5fe0: 00000158 76f12ed0 000d80f0 00130194 [ 3316.077209][T26205] SELinux: Context system_u:object_r:dpkg_var_lib_t:s0 is not valid (left unmapped). [ 3316.138064][ T31] audit: type=1400 audit(134221043.993:532): avc: denied { relabelfrom } for pid=26203 comm="syz.0.7627" name="CAN_BCM" dev="sockfs" ino=74272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3316.138390][ T31] audit: type=1400 audit(134221043.993:533): avc: denied { relabelto } for pid=26203 comm="syz.0.7627" name="CAN_BCM" dev="sockfs" ino=74272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=can_socket permissive=1 trawcon="system_u:object_r:dpkg_var_lib_t:s0" [ 3329.464518][T26241] FAULT_INJECTION: forcing a failure. [ 3329.464518][T26241] name failslab, interval 1, probability 0, space 0, times 0 [ 3329.465040][T26241] CPU: 1 UID: 0 PID: 26241 Comm: syz.0.7640 Not tainted syzkaller #0 PREEMPT [ 3329.465129][T26241] Hardware name: ARM-Versatile Express [ 3329.465157][T26241] Call trace: [ 3329.465200][T26241] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3329.465298][T26241] r7:00000d40 r6:00000000 r5:60000013 r4:822603d4 [ 3329.465317][T26241] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3329.465367][T26241] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3329.465418][T26241] r5:85848000 r4:82917c00 [ 3329.465433][T26241] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3329.465488][T26241] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3329.465550][T26241] r8:85848000 r7:00000d40 r6:85fbcaa8 r5:00000019 r4:83001240 [ 3329.465568][T26241] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3329.465627][T26241] [<80503af8>] (__kmalloc_noprof) from [<807c34a4>] (tomoyo_encode2+0x64/0xf0) [ 3329.465689][T26241] r10:00000fff r9:83359400 r8:00000000 r7:837a35d8 r6:85fbcaa8 r5:85670ffd [ 3329.465710][T26241] r4:85670fef [ 3329.465726][T26241] [<807c3440>] (tomoyo_encode2) from [<807c3554>] (tomoyo_encode+0x24/0x30) [ 3329.465781][T26241] r9:83359400 r8:00000000 r7:837a35d8 r6:85fbcaa8 r5:00001000 r4:85670ff0 [ 3329.465798][T26241] [<807c3530>] (tomoyo_encode) from [<807c35e0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3329.465848][T26241] r5:00001000 r4:85670000 [ 3329.465863][T26241] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3329.465920][T26241] r10:85848000 r9:00000000 r8:85fbca80 r7:00005451 r6:00000004 r5:81cd6504 [ 3329.465944][T26241] r4:85fbcaa8 r3:826c0200 [ 3329.465960][T26241] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3329.466016][T26241] r9:00000003 r8:85fbca80 r7:00000000 r6:00000000 r5:00005451 r4:85fbca80 [ 3329.466034][T26241] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3329.466083][T26241] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3329.466139][T26241] r7:00000000 r6:85fbca81 r5:00000000 r4:00005451 [ 3329.466155][T26241] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3329.466200][T26241] Exception stack(0xdfcedfa8 to 0xdfcedff0) [ 3329.466241][T26241] dfa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 3329.466275][T26241] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3329.466300][T26241] dfe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3329.466334][T26241] r10:00000036 r9:85848000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3329.466354][T26241] r4:00000000 [ 3329.521801][T26241] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3335.369554][ T31] audit: type=1400 audit(134221063.283:534): avc: denied { map } for pid=26264 comm="syz.0.7650" path="/dev/input/mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 3335.369898][ T31] audit: type=1400 audit(134221063.283:535): avc: denied { execute } for pid=26264 comm="syz.0.7650" path="/dev/input/mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 3338.965908][T26283] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26283 comm=syz.2.7651 [ 3341.921887][T26294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=26294 comm=syz.2.7657 [ 3344.155750][ T31] audit: type=1400 audit(134221072.073:536): avc: denied { listen } for pid=26303 comm="syz.2.7660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3344.745544][T26307] SELinux: Context system_u:object_r:ssh_exec_t:s0 is not valid (left unmapped). [ 3344.746782][ T31] audit: type=1400 audit(134221072.663:537): avc: denied { relabelto } for pid=26306 comm="syz.2.7661" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 3344.748521][ T31] audit: type=1400 audit(134221072.663:538): avc: denied { associate } for pid=26306 comm="syz.2.7661" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 3347.466423][ T31] audit: type=1400 audit(134221075.383:539): avc: denied { mounton } for pid=26319 comm="syz.2.7666" path="/syzcgroup/unified/syz2/cgroup.procs" dev="cgroup2" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 3351.648067][T26329] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26329 comm=syz.2.7669 [ 3360.415265][T26357] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26357 comm=syz.2.7679 [ 3373.730322][T26398] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=26398 comm=syz.0.7690 [ 3404.164337][ T31] audit: type=1400 audit(134221132.063:540): avc: denied { getopt } for pid=26473 comm="syz.0.7716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3412.082068][ T31] audit: type=1400 audit(134221139.993:541): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.088849][ T31] audit: type=1400 audit(134221139.993:542): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.093145][ T31] audit: type=1400 audit(134221139.993:543): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.097200][ T31] audit: type=1400 audit(134221139.993:544): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.100108][ T31] audit: type=1400 audit(134221139.993:545): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.102879][ T31] audit: type=1400 audit(134221139.993:546): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.106420][ T31] audit: type=1400 audit(134221139.993:547): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.137994][T26503] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 3412.174397][ T31] audit: type=1400 audit(134221140.083:548): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.174688][ T31] audit: type=1400 audit(134221140.083:549): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3412.174856][ T31] audit: type=1400 audit(134221140.083:550): avc: granted { setsecparam } for pid=26511 comm="syz.2.7725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3414.648965][T26522] FAULT_INJECTION: forcing a failure. [ 3414.648965][T26522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3414.686644][T26522] CPU: 0 UID: 0 PID: 26522 Comm: syz.2.7727 Not tainted syzkaller #0 PREEMPT [ 3414.686769][T26522] Hardware name: ARM-Versatile Express [ 3414.686790][T26522] Call trace: [ 3414.686828][T26522] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3414.686924][T26522] r7:00000000 r6:00000000 r5:60000013 r4:822603d4 [ 3414.686939][T26522] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3414.686979][T26522] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3414.687022][T26522] r5:85439800 r4:8294f190 [ 3414.687035][T26522] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3414.687078][T26522] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3414.687122][T26522] r8:76f70f30 r7:00000000 r6:00000000 r5:dfa11f68 r4:00000002 [ 3414.687135][T26522] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3414.687173][T26522] [<80972780>] (should_fail_usercopy) from [<8058e5bc>] (simple_read_from_buffer+0x80/0x13c) [ 3414.687252][T26522] [<8058e53c>] (simple_read_from_buffer) from [<806085b4>] (proc_fail_nth_read+0xb8/0x108) [ 3414.687304][T26522] r10:00000001 r9:806084fc r8:00000002 r7:dfa11f68 r6:0000000f r5:76f70f30 [ 3414.687321][T26522] r4:85439800 r3:dfa11e9f [ 3414.687334][T26522] [<806084fc>] (proc_fail_nth_read) from [<8055340c>] (vfs_read+0x98/0x324) [ 3414.687381][T26522] r8:76f70f30 r7:dfa11f68 r6:85439800 r5:0000000f r4:85f579c0 [ 3414.687394][T26522] [<80553374>] (vfs_read) from [<8055411c>] (ksys_read+0x74/0xe8) [ 3414.687443][T26522] r10:00000003 r9:85439800 r8:8020029c r7:00000000 r6:00000000 r5:85f579c0 [ 3414.687458][T26522] r4:85f579c3 [ 3414.687471][T26522] [<805540a8>] (ksys_read) from [<805541a0>] (sys_read+0x10/0x14) [ 3414.687514][T26522] r7:00000003 r6:00000006 r5:76f70f30 r4:0000000f [ 3414.687527][T26522] [<80554190>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3414.687564][T26522] Exception stack(0xdfa11fa8 to 0xdfa11ff0) [ 3414.687599][T26522] 1fa0: 0000000f 76f70f30 00000006 76f70f30 0000000f 00000000 [ 3414.687629][T26522] 1fc0: 0000000f 76f70f30 00000006 00000003 002e0000 00000000 00006364 76f710bc [ 3414.687650][T26522] 1fe0: 00000158 76f70ed0 000d80f0 00130194 [ 3424.577430][T26573] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26573 comm=syz.2.7744 [ 3429.405978][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 3429.406305][ T31] audit: type=1400 audit(134221157.323:606): avc: denied { write } for pid=26592 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3429.406517][ T31] audit: type=1400 audit(134221157.323:607): avc: denied { open } for pid=26592 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3429.579962][ T31] audit: type=1400 audit(134221157.493:608): avc: denied { getattr } for pid=26592 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3429.590403][ T31] audit: type=1400 audit(134221157.493:609): avc: denied { ioctl } for pid=26592 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3435.335697][ T31] audit: type=1400 audit(134221163.253:610): avc: denied { getattr } for pid=26601 comm="syz.2.7753" name="/" dev="aio" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3441.955630][T26617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1539 sclass=netlink_audit_socket pid=26617 comm=syz.0.7759 [ 3444.328401][T26622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26622 comm=syz.0.7760 [ 3444.358883][T26622] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26622 comm=syz.0.7760 [ 3448.024544][T22328] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 3448.274045][T22328] usb 1-1: Using ep0 maxpacket: 8 [ 3448.318228][T22328] usb 1-1: config 1 interface 0 altsetting 9 bulk endpoint 0x1 has invalid maxpacket 16 [ 3448.319148][T22328] usb 1-1: config 1 interface 0 has no altsetting 0 [ 3448.332863][T22328] usb 1-1: New USB device found, idVendor=03f0, idProduct=0004, bcdDevice= 0.40 [ 3448.334464][T22328] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3448.335458][T22328] usb 1-1: Product: syz [ 3448.336118][T22328] usb 1-1: Manufacturer: 퇓쥣ì­ã‘¾ç„澩瑒䦴蜥è®á¤‹çµ’ꉨﰺ꩟ê’풖绋㗲知㦯æ™íŒ ã•º [ 3448.337223][T22328] usb 1-1: SerialNumber: syz [ 3448.345089][T26633] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3448.605972][T26633] mmap: syz.0.7765 (26633) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 3449.202282][ T31] audit: type=1400 audit(134221177.113:611): avc: denied { execute } for pid=26632 comm="syz.0.7765" path="/selinux/mls" dev="selinuxfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 3449.244961][T22328] usb 1-1: USB disconnect, device number 40 [ 3464.630453][T26680] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26680 comm=syz.0.7776 [ 3471.225327][ T31] audit: type=1400 audit(134221199.143:612): avc: denied { mount } for pid=26693 comm="syz.0.7783" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 3473.064852][ T31] audit: type=1400 audit(134221200.963:613): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 3498.998358][T26761] FAULT_INJECTION: forcing a failure. [ 3498.998358][T26761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3498.999314][T26761] CPU: 1 UID: 0 PID: 26761 Comm: syz.2.7804 Not tainted syzkaller #0 PREEMPT [ 3498.999380][T26761] Hardware name: ARM-Versatile Express [ 3498.999392][T26761] Call trace: [ 3498.999413][T26761] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3498.999470][T26761] r7:200000c0 r6:00000000 r5:60000013 r4:822603d4 [ 3498.999479][T26761] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3498.999503][T26761] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3498.999529][T26761] r5:84119800 r4:8294f190 [ 3498.999536][T26761] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3498.999563][T26761] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3498.999601][T26761] r8:85f57001 r7:200000c0 r6:df9d5ee4 r5:00000010 r4:00000010 [ 3498.999609][T26761] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3498.999642][T26761] [<80972780>] (should_fail_usercopy) from [<815443d4>] (move_addr_to_kernel+0x34/0xf8) [ 3498.999698][T26761] [<815443a0>] (move_addr_to_kernel) from [<81545ae8>] (__sys_sendto+0xd0/0x160) [ 3498.999754][T26761] r7:200000c0 r6:8516ea00 r5:24000821 r4:00000000 [ 3498.999768][T26761] [<81545a18>] (__sys_sendto) from [<81545b94>] (sys_sendto+0x1c/0x24) [ 3498.999801][T26761] r9:84119800 r8:8020029c r7:00000122 r6:00130270 r5:00000010 r4:200000c0 [ 3498.999809][T26761] [<81545b78>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3498.999831][T26761] Exception stack(0xdf9d5fa8 to 0xdf9d5ff0) [ 3498.999851][T26761] 5fa0: 200000c0 00000010 00000003 00000000 00000000 24000821 [ 3498.999871][T26761] 5fc0: 200000c0 00000010 00130270 00000122 002e0000 00000000 00006364 76f710bc [ 3498.999884][T26761] 5fe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3502.314472][T25258] usb 1-1: new high-speed USB device number 41 using dummy_hcd [ 3502.524093][T25258] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 3502.525093][T25258] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3502.525863][T25258] usb 1-1: Product: syz [ 3502.526375][T25258] usb 1-1: Manufacturer: syz [ 3502.526984][T25258] usb 1-1: SerialNumber: syz [ 3503.577040][T25258] rtl8150 1-1:1.0: eth5: rtl8150 is detected [ 3503.947326][ T23] usb 1-1: USB disconnect, device number 41 [ 3509.045052][T26809] FAULT_INJECTION: forcing a failure. [ 3509.045052][T26809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3509.045402][T26809] CPU: 0 UID: 0 PID: 26809 Comm: syz.0.7810 Not tainted syzkaller #0 PREEMPT [ 3509.045492][T26809] Hardware name: ARM-Versatile Express [ 3509.045520][T26809] Call trace: [ 3509.045563][T26809] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3509.045672][T26809] r7:dfa5de20 r6:00000000 r5:60000013 r4:822603d4 [ 3509.045690][T26809] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3509.045735][T26809] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3509.045782][T26809] r5:838b4800 r4:8294f190 [ 3509.045799][T26809] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3509.045852][T26809] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3509.045907][T26809] r8:20000800 r7:dfa5de20 r6:20000480 r5:00000000 r4:dfa5df20 [ 3509.045922][T26809] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3509.045965][T26809] [<80972780>] (should_fail_usercopy) from [<815461b8>] (copy_msghdr_from_user+0x50/0x130) [ 3509.046023][T26809] [<81546168>] (copy_msghdr_from_user) from [<81546310>] (___sys_sendmsg+0x78/0xd0) [ 3509.046083][T26809] r8:20000800 r7:00000000 r6:84c32000 r5:dfa5df20 r4:dfa5de64 [ 3509.046099][T26809] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3509.046161][T26809] r10:00000128 r9:838b4800 r8:85997f00 r7:20000800 r6:20000480 r5:85997f01 [ 3509.046179][T26809] r4:00000006 [ 3509.046195][T26809] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3509.046243][T26809] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3509.046259][T26809] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3509.046297][T26809] Exception stack(0xdfa5dfa8 to 0xdfa5dff0) [ 3509.046335][T26809] dfa0: 00000000 00000000 00000006 20000480 20000800 00000000 [ 3509.046370][T26809] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76ef20bc [ 3509.046396][T26809] dfe0: 76ef1ec0 76ef1eb0 0001948c 001322c0 [ 3510.180392][T26813] FAULT_INJECTION: forcing a failure. [ 3510.180392][T26813] name failslab, interval 1, probability 0, space 0, times 0 [ 3510.184502][T26813] CPU: 1 UID: 0 PID: 26813 Comm: syz.0.7812 Not tainted syzkaller #0 PREEMPT [ 3510.184672][T26813] Hardware name: ARM-Versatile Express [ 3510.184712][T26813] Call trace: [ 3510.184766][T26813] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3510.184905][T26813] r7:00000d40 r6:00000000 r5:60000113 r4:822603d4 [ 3510.184927][T26813] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3510.184977][T26813] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3510.185029][T26813] r5:8543e000 r4:82917c00 [ 3510.185044][T26813] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3510.185100][T26813] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3510.185162][T26813] r8:8543e000 r7:00000d40 r6:85f570e8 r5:00000019 r4:83001240 [ 3510.185183][T26813] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3510.185232][T26813] [<80503af8>] (__kmalloc_noprof) from [<807c34a4>] (tomoyo_encode2+0x64/0xf0) [ 3510.185291][T26813] r10:00000fff r9:83359400 r8:00000000 r7:837a8088 r6:85f570e8 r5:85677ffd [ 3510.185312][T26813] r4:85677fef [ 3510.185328][T26813] [<807c3440>] (tomoyo_encode2) from [<807c3554>] (tomoyo_encode+0x24/0x30) [ 3510.185386][T26813] r9:83359400 r8:00000000 r7:837a8088 r6:85f570e8 r5:00001000 r4:85677ff0 [ 3510.185402][T26813] [<807c3530>] (tomoyo_encode) from [<807c35e0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3510.185452][T26813] r5:00001000 r4:85677000 [ 3510.185467][T26813] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3510.185527][T26813] r10:8543e000 r9:00000000 r8:85f570c0 r7:00005451 r6:00000004 r5:81cd6504 [ 3510.185548][T26813] r4:85f570e8 r3:826c0200 [ 3510.185564][T26813] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3510.185626][T26813] r9:00000003 r8:85f570c0 r7:00000000 r6:00000000 r5:00005451 r4:85f570c0 [ 3510.185645][T26813] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3510.185696][T26813] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3510.185753][T26813] r7:00000000 r6:85f570c1 r5:00000000 r4:00005451 [ 3510.185782][T26813] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3510.185828][T26813] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 3510.185863][T26813] 9fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 3510.185893][T26813] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3510.185917][T26813] 9fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3510.185995][T26813] r10:00000036 r9:8543e000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3510.186020][T26813] r4:00000000 [ 3510.251003][T26813] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3516.056273][ T31] audit: type=1400 audit(134221243.963:614): avc: denied { append } for pid=26835 comm="syz.2.7822" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3524.176391][T26841] FAULT_INJECTION: forcing a failure. [ 3524.176391][T26841] name failslab, interval 1, probability 0, space 0, times 0 [ 3524.176909][T26841] CPU: 1 UID: 0 PID: 26841 Comm: syz.0.7823 Not tainted syzkaller #0 PREEMPT [ 3524.176997][T26841] Hardware name: ARM-Versatile Express [ 3524.177027][T26841] Call trace: [ 3524.177074][T26841] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3524.177172][T26841] r7:84b05400 r6:00000000 r5:60000013 r4:822603d4 [ 3524.177191][T26841] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3524.177238][T26841] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3524.177282][T26841] r5:84b05400 r4:82917c00 [ 3524.177296][T26841] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3524.177354][T26841] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3524.177421][T26841] r8:00000000 r7:84b05400 r6:00000dc0 r5:dfa71f20 r4:83001240 [ 3524.177440][T26841] [<8051f194>] (should_failslab) from [<80502bc4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3524.177490][T26841] [<80502b78>] (__kmalloc_cache_noprof) from [<817406a0>] (tcp_sendmsg_fastopen+0x94/0x188) [ 3524.177557][T26841] r10:20000800 r9:dfa71f20 r8:00000000 r7:dfa71ce4 r6:00000034 r5:dfa71f20 [ 3524.177576][T26841] r4:8563ca40 [ 3524.177595][T26841] [<8174060c>] (tcp_sendmsg_fastopen) from [<8174118c>] (tcp_sendmsg_locked+0x9f8/0xfd8) [ 3524.177654][T26841] r8:8563ca40 r7:00000000 r6:00000034 r5:00000034 r4:00000000 [ 3524.177671][T26841] [<81740794>] (tcp_sendmsg_locked) from [<8174179c>] (tcp_sendmsg+0x30/0x44) [ 3524.177728][T26841] r10:00000000 r9:dfa71dc4 r8:dfa71dc4 r7:00000000 r6:00000034 r5:dfa71f20 [ 3524.177747][T26841] r4:8563ca40 [ 3524.177763][T26841] [<8174176c>] (tcp_sendmsg) from [<8181c710>] (inet6_sendmsg+0x40/0x4c) [ 3524.177821][T26841] r7:00000000 r6:8563ca40 r5:00000034 r4:dfa71f20 [ 3524.177846][T26841] [<8181c6d0>] (inet6_sendmsg) from [<81543018>] (__sock_sendmsg+0x44/0x78) [ 3524.177903][T26841] r7:00000000 r6:8516f680 r5:dfa71f20 r4:00000000 [ 3524.177920][T26841] [<81542fd4>] (__sock_sendmsg) from [<8154436c>] (____sys_sendmsg+0x298/0x2cc) [ 3524.177975][T26841] r7:00000000 r6:8516f680 r5:20000800 r4:dfa71f20 [ 3524.177992][T26841] [<815440d4>] (____sys_sendmsg) from [<81546334>] (___sys_sendmsg+0x9c/0xd0) [ 3524.178051][T26841] r10:dfa71e24 r9:20000480 r8:20000800 r7:00000000 r6:8516f680 r5:dfa71f20 [ 3524.178072][T26841] r4:00000000 [ 3524.178088][T26841] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3524.178149][T26841] r10:00000128 r9:84b05400 r8:85f57180 r7:20000800 r6:20000480 r5:85f57181 [ 3524.178171][T26841] r4:00000006 [ 3524.178186][T26841] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3524.178239][T26841] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3524.178256][T26841] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3524.178301][T26841] Exception stack(0xdfa71fa8 to 0xdfa71ff0) [ 3524.178335][T26841] 1fa0: 00000000 00000000 00000006 20000480 20000800 00000000 [ 3524.178366][T26841] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76ef20bc [ 3524.178391][T26841] 1fe0: 76ef1ec0 76ef1eb0 0001948c 001322c0 [ 3568.146577][T26968] FAULT_INJECTION: forcing a failure. [ 3568.146577][T26968] name failslab, interval 1, probability 0, space 0, times 0 [ 3568.164363][T26968] CPU: 1 UID: 0 PID: 26968 Comm: syz.0.7872 Not tainted syzkaller #0 PREEMPT [ 3568.164508][T26968] Hardware name: ARM-Versatile Express [ 3568.164535][T26968] Call trace: [ 3568.164583][T26968] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3568.164699][T26968] r7:83b3b000 r6:00000000 r5:60000113 r4:822603d4 [ 3568.164724][T26968] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3568.164778][T26968] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3568.164832][T26968] r5:83b3b000 r4:82917c00 [ 3568.164856][T26968] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3568.164913][T26968] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3568.164979][T26968] r8:00000000 r7:83b3b000 r6:00000cc0 r5:00000002 r4:83001240 [ 3568.164999][T26968] [<8051f194>] (should_failslab) from [<80502bc4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3568.165049][T26968] [<80502b78>] (__kmalloc_cache_noprof) from [<8031d4f4>] (__request_module+0xe8/0x2c0) [ 3568.165111][T26968] r10:00000000 r9:dfae5ecb r8:828f5404 r7:83b3b000 r6:815b58b0 r5:00000002 [ 3568.165131][T26968] r4:00000000 [ 3568.165147][T26968] [<8031d40c>] (__request_module) from [<815b58b0>] (dev_load+0x80/0x8c) [ 3568.165208][T26968] r3:00400140 r2:dfae5ecc r1:8242b2f0 [ 3568.165238][T26968] r8:00000000 r7:858f0000 r6:dfae5ecc r5:00000000 r4:dfae5ecc [ 3568.165256][T26968] [<815b5830>] (dev_load) from [<815b6f38>] (dev_ioctl+0x51c/0x62c) [ 3568.165305][T26968] r5:00000002 r4:000089f2 [ 3568.165323][T26968] [<815b6a1c>] (dev_ioctl) from [<81544b40>] (sock_ioctl+0x464/0x600) [ 3568.165389][T26968] r10:83b3b000 r9:00000003 r8:85f576c0 r7:b5403587 r6:858f0000 r5:200001c0 [ 3568.165412][T26968] r4:000089f2 r3:00000000 [ 3568.165430][T26968] [<815446dc>] (sock_ioctl) from [<8056cd68>] (sys_ioctl+0x130/0xba0) [ 3568.165494][T26968] r9:00000003 r8:85f576c0 r7:200001c0 r6:85f576c1 r5:00000000 r4:000089f2 [ 3568.165513][T26968] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3568.165558][T26968] Exception stack(0xdfae5fa8 to 0xdfae5ff0) [ 3568.165597][T26968] 5fa0: 00000000 00000000 00000003 000089f2 200001c0 00000000 [ 3568.165637][T26968] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3568.165664][T26968] 5fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3568.165697][T26968] r10:00000036 r9:83b3b000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3568.165718][T26968] r4:00000000 [ 3608.074736][T27054] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3608.076871][T27054] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3609.870643][T27058] FAULT_INJECTION: forcing a failure. [ 3609.870643][T27058] name failslab, interval 1, probability 0, space 0, times 0 [ 3609.871000][T27058] CPU: 0 UID: 0 PID: 27058 Comm: syz.0.7900 Not tainted syzkaller #0 PREEMPT [ 3609.871094][T27058] Hardware name: ARM-Versatile Express [ 3609.871128][T27058] Call trace: [ 3609.871176][T27058] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3609.871328][T27058] r7:8412ec00 r6:00000000 r5:60000013 r4:822603d4 [ 3609.871349][T27058] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3609.871437][T27058] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3609.871557][T27058] r5:8412ec00 r4:82917c00 [ 3609.871633][T27058] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3609.871861][T27058] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3609.871971][T27058] r8:00000000 r7:8412ec00 r6:00000dc0 r5:828f5534 r4:83001240 [ 3609.872022][T27058] [<8051f194>] (should_failslab) from [<80502bc4>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 3609.872190][T27058] [<80502b78>] (__kmalloc_cache_noprof) from [<80273754>] (call_usermodehelper_setup+0x48/0xb8) [ 3609.872301][T27058] r10:00000000 r9:dfb55ecb r8:828f5404 r7:828f5404 r6:85d4f400 r5:828f5534 [ 3609.872492][T27058] r4:85d4f400 [ 3609.872515][T27058] [<8027370c>] (call_usermodehelper_setup) from [<8031d55c>] (__request_module+0x150/0x2c0) [ 3609.872604][T27058] r7:8412ec00 r6:85d4f600 r5:00000002 r4:85d4f400 [ 3609.872704][T27058] [<8031d40c>] (__request_module) from [<815b58b0>] (dev_load+0x80/0x8c) [ 3609.872806][T27058] r3:00400140 r2:dfb55ecc r1:8242b2f0 [ 3609.872857][T27058] r8:00000000 r7:858f0000 r6:dfb55ecc r5:00000000 r4:dfb55ecc [ 3609.872878][T27058] [<815b5830>] (dev_load) from [<815b6f38>] (dev_ioctl+0x51c/0x62c) [ 3609.873006][T27058] r5:00000002 r4:000089f2 [ 3609.873083][T27058] [<815b6a1c>] (dev_ioctl) from [<81544b40>] (sock_ioctl+0x464/0x600) [ 3609.873252][T27058] r10:8412ec00 r9:00000003 r8:85997cc0 r7:b5403587 r6:858f0000 r5:200001c0 [ 3609.873278][T27058] r4:000089f2 r3:00000000 [ 3609.873379][T27058] [<815446dc>] (sock_ioctl) from [<8056cd68>] (sys_ioctl+0x130/0xba0) [ 3609.873503][T27058] r9:00000003 r8:85997cc0 r7:200001c0 r6:85997cc1 r5:00000000 r4:000089f2 [ 3609.873557][T27058] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3609.873771][T27058] Exception stack(0xdfb55fa8 to 0xdfb55ff0) [ 3609.873885][T27058] 5fa0: 00000000 00000000 00000003 000089f2 200001c0 00000000 [ 3609.873940][T27058] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3609.873969][T27058] 5fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3609.874004][T27058] r10:00000036 r9:8412ec00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3609.874026][T27058] r4:00000000 [ 3657.626651][T27196] FAULT_INJECTION: forcing a failure. [ 3657.626651][T27196] name failslab, interval 1, probability 0, space 0, times 0 [ 3657.627009][T27196] CPU: 0 UID: 0 PID: 27196 Comm: syz.0.7957 Not tainted syzkaller #0 PREEMPT [ 3657.627089][T27196] Hardware name: ARM-Versatile Express [ 3657.627113][T27196] Call trace: [ 3657.627151][T27196] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3657.627283][T27196] r7:00000d40 r6:00000000 r5:60000013 r4:822603d4 [ 3657.627300][T27196] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3657.627345][T27196] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3657.627393][T27196] r5:8412bc00 r4:82917c00 [ 3657.627407][T27196] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3657.627458][T27196] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3657.627517][T27196] r8:8412bc00 r7:00000d40 r6:85997f28 r5:00000019 r4:83001240 [ 3657.627533][T27196] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3657.627668][T27196] [<80503af8>] (__kmalloc_noprof) from [<807c34a4>] (tomoyo_encode2+0x64/0xf0) [ 3657.627772][T27196] r10:00000fff r9:83359400 r8:00000000 r7:834a04c8 r6:85997f28 r5:85cc4ffd [ 3657.627826][T27196] r4:85cc4fef [ 3657.627944][T27196] [<807c3440>] (tomoyo_encode2) from [<807c3554>] (tomoyo_encode+0x24/0x30) [ 3657.628004][T27196] r9:83359400 r8:00000000 r7:834a04c8 r6:85997f28 r5:00001000 r4:85cc4ff0 [ 3657.628020][T27196] [<807c3530>] (tomoyo_encode) from [<807c35e0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3657.628155][T27196] r5:00001000 r4:85cc4000 [ 3657.628192][T27196] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3657.628256][T27196] r10:8412bc00 r9:00000000 r8:85997f00 r7:000089f3 r6:00000004 r5:81cd6504 [ 3657.628411][T27196] r4:85997f28 r3:826c0200 [ 3657.628428][T27196] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3657.628486][T27196] r9:00000003 r8:85997f00 r7:20000380 r6:20000380 r5:000089f3 r4:85997f00 [ 3657.628746][T27196] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3657.628871][T27196] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3657.628993][T27196] r7:20000380 r6:85997f01 r5:00000000 r4:000089f3 [ 3657.629156][T27196] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3657.629292][T27196] Exception stack(0xdfcbdfa8 to 0xdfcbdff0) [ 3657.629328][T27196] dfa0: 00000000 00000000 00000003 000089f3 20000380 00000000 [ 3657.629384][T27196] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3657.629610][T27196] dfe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3657.629686][T27196] r10:00000036 r9:8412bc00 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3657.629828][T27196] r4:00000000 [ 3657.714625][T27196] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3662.435336][T27212] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27212 comm=syz.0.7964 [ 3671.637318][T27222] 8021q: VLANs not supported on wg2 [ 3678.750094][T27238] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27238 comm=syz.2.7973 [ 3712.110395][ T31] audit: type=1400 audit(134221440.023:615): avc: denied { create } for pid=27305 comm="syz.2.7995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3712.132737][ T31] audit: type=1400 audit(134221440.043:616): avc: denied { ioctl } for pid=27305 comm="syz.2.7995" path="socket:[78097]" dev="sockfs" ino=78097 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3719.866868][T27319] FAULT_INJECTION: forcing a failure. [ 3719.866868][T27319] name failslab, interval 1, probability 0, space 0, times 0 [ 3719.867285][T27319] CPU: 0 UID: 0 PID: 27319 Comm: syz.0.8000 Not tainted syzkaller #0 PREEMPT [ 3719.867376][T27319] Hardware name: ARM-Versatile Express [ 3719.867403][T27319] Call trace: [ 3719.867449][T27319] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3719.867553][T27319] r7:00000c40 r6:00000000 r5:60000013 r4:822603d4 [ 3719.867573][T27319] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3719.867635][T27319] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3719.867768][T27319] r5:83b38000 r4:82917c00 [ 3719.867867][T27319] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3719.868069][T27319] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3719.868157][T27319] r8:83b38000 r7:00000c40 r6:85997c28 r5:00001000 r4:830016c0 [ 3719.868183][T27319] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3719.868391][T27319] [<80503af8>] (__kmalloc_noprof) from [<807c359c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3719.868497][T27319] r10:83b38000 r9:83358000 r8:00000000 r7:83416cc0 r6:85997c28 r5:00001000 [ 3719.868630][T27319] r4:00000000 [ 3719.868765][T27319] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3719.868839][T27319] r10:83b38000 r9:00000000 r8:85997c00 r7:4008af04 r6:00000004 r5:81cd6504 [ 3719.869051][T27319] r4:85997c28 r3:826c0200 [ 3719.869080][T27319] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3719.869300][T27319] r9:00000003 r8:85997c00 r7:00000000 r6:00000000 r5:4008af04 r4:85997c00 [ 3719.869322][T27319] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3719.869642][T27319] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3719.869778][T27319] r7:00000000 r6:85997c01 r5:00000000 r4:4008af04 [ 3719.869805][T27319] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3719.869942][T27319] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 3719.870177][T27319] 1fa0: 00000000 00000000 00000003 4008af04 00000000 00000000 [ 3719.870212][T27319] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3719.870387][T27319] 1fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3719.870466][T27319] r10:00000036 r9:83b38000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3719.870622][T27319] r4:00000000 [ 3719.994345][T27319] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3726.850706][T27331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27331 comm=syz.2.8004 [ 3726.958946][T27331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27331 comm=syz.2.8004 [ 3727.504617][T27331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27331 comm=syz.2.8004 [ 3737.468792][T27359] FAULT_INJECTION: forcing a failure. [ 3737.468792][T27359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3737.469088][T27359] CPU: 1 UID: 0 PID: 27359 Comm: syz.0.8014 Not tainted syzkaller #0 PREEMPT [ 3737.469136][T27359] Hardware name: ARM-Versatile Express [ 3737.469150][T27359] Call trace: [ 3737.469172][T27359] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3737.469228][T27359] r7:00000000 r6:00000000 r5:60000013 r4:822603d4 [ 3737.469237][T27359] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3737.469261][T27359] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3737.469286][T27359] r5:84b00c00 r4:8294f190 [ 3737.469294][T27359] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3737.469337][T27359] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3737.469400][T27359] r8:76f12f30 r7:00000000 r6:00000000 r5:dfa01f68 r4:00000002 [ 3737.469415][T27359] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3737.469442][T27359] [<80972780>] (should_fail_usercopy) from [<8058e5bc>] (simple_read_from_buffer+0x80/0x13c) [ 3737.469472][T27359] [<8058e53c>] (simple_read_from_buffer) from [<806085b4>] (proc_fail_nth_read+0xb8/0x108) [ 3737.469504][T27359] r10:00000001 r9:806084fc r8:00000002 r7:dfa01f68 r6:0000000f r5:76f12f30 [ 3737.469515][T27359] r4:84b00c00 r3:dfa01e9f [ 3737.469522][T27359] [<806084fc>] (proc_fail_nth_read) from [<8055340c>] (vfs_read+0x98/0x324) [ 3737.469552][T27359] r8:76f12f30 r7:dfa01f68 r6:84b00c00 r5:0000000f r4:85fd1540 [ 3737.469560][T27359] [<80553374>] (vfs_read) from [<8055411c>] (ksys_read+0x74/0xe8) [ 3737.469590][T27359] r10:00000003 r9:84b00c00 r8:8020029c r7:00000000 r6:00000000 r5:85fd1540 [ 3737.469599][T27359] r4:85fd1543 [ 3737.469610][T27359] [<805540a8>] (ksys_read) from [<805541a0>] (sys_read+0x10/0x14) [ 3737.469638][T27359] r7:00000003 r6:00000005 r5:76f12f30 r4:0000000f [ 3737.469645][T27359] [<80554190>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3737.469667][T27359] Exception stack(0xdfa01fa8 to 0xdfa01ff0) [ 3737.469684][T27359] 1fa0: 0000000f 76f12f30 00000005 76f12f30 0000000f 00000000 [ 3737.469699][T27359] 1fc0: 0000000f 76f12f30 00000005 00000003 002e0000 00000000 00006364 76f130bc [ 3737.469711][T27359] 1fe0: 00000158 76f12ed0 000d80f0 00130194 [ 3739.542063][T27371] FAULT_INJECTION: forcing a failure. [ 3739.542063][T27371] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3739.542402][T27371] CPU: 0 UID: 0 PID: 27371 Comm: syz.0.8019 Not tainted syzkaller #0 PREEMPT [ 3739.542488][T27371] Hardware name: ARM-Versatile Express [ 3739.542513][T27371] Call trace: [ 3739.542567][T27371] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3739.542668][T27371] r7:dfa21e20 r6:00000000 r5:60000013 r4:822603d4 [ 3739.542724][T27371] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3739.542781][T27371] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3739.542857][T27371] r5:84b00c00 r4:8294f190 [ 3739.542923][T27371] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3739.543028][T27371] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3739.543123][T27371] r8:00000000 r7:dfa21e20 r6:20000240 r5:00000000 r4:dfa21f20 [ 3739.543236][T27371] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3739.543289][T27371] [<80972780>] (should_fail_usercopy) from [<815461b8>] (copy_msghdr_from_user+0x50/0x130) [ 3739.543405][T27371] [<81546168>] (copy_msghdr_from_user) from [<81546310>] (___sys_sendmsg+0x78/0xd0) [ 3739.543784][T27371] r8:00000000 r7:00000000 r6:84c33180 r5:dfa21f20 r4:dfa21e64 [ 3739.543805][T27371] [<81546298>] (___sys_sendmsg) from [<815467cc>] (__sys_sendmsg+0x8c/0xe0) [ 3739.543917][T27371] r10:00000128 r9:84b00c00 r8:85997f00 r7:00000000 r6:20000240 r5:85997f01 [ 3739.543938][T27371] r4:00000003 [ 3739.543957][T27371] [<81546740>] (__sys_sendmsg) from [<81546834>] (sys_sendmsg+0x14/0x18) [ 3739.544033][T27371] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 3739.544054][T27371] [<81546820>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3739.544095][T27371] Exception stack(0xdfa21fa8 to 0xdfa21ff0) [ 3739.544130][T27371] 1fa0: 00000000 00000000 00000003 20000240 00000000 00000000 [ 3739.544186][T27371] 1fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76ef20bc [ 3739.544264][T27371] 1fe0: 76ef1ec0 76ef1eb0 0001948c 001322c0 [ 3747.685591][T27392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27392 comm=syz.0.8027 [ 3771.226058][T27435] FAULT_INJECTION: forcing a failure. [ 3771.226058][T27435] name failslab, interval 1, probability 0, space 0, times 0 [ 3771.226421][T27435] CPU: 0 UID: 0 PID: 27435 Comm: syz.2.8045 Not tainted syzkaller #0 PREEMPT [ 3771.226510][T27435] Hardware name: ARM-Versatile Express [ 3771.226538][T27435] Call trace: [ 3771.226580][T27435] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3771.226690][T27435] r7:00000d40 r6:00000000 r5:60000013 r4:822603d4 [ 3771.226735][T27435] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3771.226839][T27435] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3771.226910][T27435] r5:83b3b000 r4:82917c00 [ 3771.227097][T27435] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3771.227173][T27435] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3771.227325][T27435] r8:83b3b000 r7:00000d40 r6:859976e8 r5:00000019 r4:83001240 [ 3771.227349][T27435] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3771.227421][T27435] [<80503af8>] (__kmalloc_noprof) from [<807c34a4>] (tomoyo_encode2+0x64/0xf0) [ 3771.227521][T27435] r10:00000fff r9:83359400 r8:00000000 r7:834a03b8 r6:859976e8 r5:83323ffd [ 3771.227630][T27435] r4:83323fef [ 3771.227686][T27435] [<807c3440>] (tomoyo_encode2) from [<807c3554>] (tomoyo_encode+0x24/0x30) [ 3771.227965][T27435] r9:83359400 r8:00000000 r7:834a03b8 r6:859976e8 r5:00001000 r4:83323ff0 [ 3771.228011][T27435] [<807c3530>] (tomoyo_encode) from [<807c35e0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3771.228102][T27435] r5:00001000 r4:83323000 [ 3771.228157][T27435] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3771.228218][T27435] r10:83b3b000 r9:00000000 r8:859976c0 r7:00008905 r6:00000004 r5:81cd6504 [ 3771.228383][T27435] r4:859976e8 r3:826c0200 [ 3771.228493][T27435] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3771.228587][T27435] r9:00000003 r8:859976c0 r7:20000040 r6:20000040 r5:00008905 r4:859976c0 [ 3771.228711][T27435] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3771.228816][T27435] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3771.228939][T27435] r7:20000040 r6:859976c1 r5:00000000 r4:00008905 [ 3771.229201][T27435] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3771.229270][T27435] Exception stack(0xdfa1dfa8 to 0xdfa1dff0) [ 3771.229468][T27435] dfa0: 00000000 00000000 00000003 00008905 20000040 00000000 [ 3771.229528][T27435] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f710bc [ 3771.229592][T27435] dfe0: 76f70ec0 76f70eb0 0001948c 001322c0 [ 3771.229737][T27435] r10:00000036 r9:83b3b000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3771.229829][T27435] r4:00000000 [ 3771.477971][T27435] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3807.596848][T27511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27511 comm=syz.2.8072 [ 3813.136668][T27533] fuse: Bad value for 'user_id' [ 3813.137239][T27533] fuse: Bad value for 'user_id' [ 3816.058328][ T31] audit: type=1400 audit(134221543.973:617): avc: denied { map } for pid=27547 comm="syz.2.8082" path="socket:[79341]" dev="sockfs" ino=79341 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3816.620861][ T31] audit: type=1400 audit(134221544.533:618): avc: denied { listen } for pid=27547 comm="syz.2.8082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3828.146497][T27604] fuse: Bad value for 'group_id' [ 3828.146787][T27604] fuse: Bad value for 'group_id' [ 3828.595896][T27606] FAULT_INJECTION: forcing a failure. [ 3828.595896][T27606] name failslab, interval 1, probability 0, space 0, times 0 [ 3828.609073][T27606] CPU: 0 UID: 0 PID: 27606 Comm: syz.0.8099 Not tainted syzkaller #0 PREEMPT [ 3828.609204][T27606] Hardware name: ARM-Versatile Express [ 3828.609225][T27606] Call trace: [ 3828.609262][T27606] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3828.609355][T27606] r7:00000d40 r6:00000000 r5:60000013 r4:822603d4 [ 3828.609371][T27606] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3828.609413][T27606] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3828.609458][T27606] r5:85848000 r4:82917c00 [ 3828.609470][T27606] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3828.609517][T27606] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 3828.609571][T27606] r8:85848000 r7:00000d40 r6:85fd16e8 r5:0000001c r4:83001240 [ 3828.609585][T27606] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 3828.609633][T27606] [<80503af8>] (__kmalloc_noprof) from [<807c34a4>] (tomoyo_encode2+0x64/0xf0) [ 3828.609688][T27606] r10:00000fff r9:83358000 r8:00000000 r7:834023b8 r6:85fd16e8 r5:85cc6ffc [ 3828.609705][T27606] r4:85cc6feb [ 3828.609719][T27606] [<807c3440>] (tomoyo_encode2) from [<807c3554>] (tomoyo_encode+0x24/0x30) [ 3828.609767][T27606] r9:83358000 r8:00000000 r7:834023b8 r6:85fd16e8 r5:00001000 r4:85cc6fec [ 3828.609781][T27606] [<807c3530>] (tomoyo_encode) from [<807c35e0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 3828.609823][T27606] r5:00001000 r4:85cc6000 [ 3828.609836][T27606] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3828.609886][T27606] r10:85848000 r9:00000000 r8:85fd16c0 r7:00005451 r6:00000004 r5:81cd6504 [ 3828.609904][T27606] r4:85fd16e8 r3:826c0200 [ 3828.609918][T27606] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 3828.609967][T27606] r9:00000003 r8:85fd16c0 r7:00000000 r6:00000000 r5:00005451 r4:85fd16c0 [ 3828.609982][T27606] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 3828.610023][T27606] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 3828.610072][T27606] r7:00000000 r6:85fd16c1 r5:00000000 r4:00005451 [ 3828.610087][T27606] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3828.610124][T27606] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 3828.610154][T27606] dfa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 3828.610185][T27606] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 3828.610206][T27606] dfe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 3828.610234][T27606] r10:00000036 r9:85848000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 3828.610251][T27606] r4:00000000 [ 3828.627395][T27606] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3828.644328][ T31] audit: type=1400 audit(134221556.543:619): avc: denied { ioctl } for pid=27605 comm="syz.0.8099" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:devicekit_var_lib_t:s0" [ 3871.824461][ T31] audit: type=1400 audit(134221599.713:620): avc: denied { read } for pid=27682 comm="syz.2.8126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3882.068333][ T31] audit: type=1400 audit(134221609.983:621): avc: denied { lock } for pid=27695 comm="syz.2.8130" path="/dev/iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3882.105294][T27696] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27696 comm=syz.2.8130 [ 3889.645721][T27725] FAULT_INJECTION: forcing a failure. [ 3889.645721][T27725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3889.656170][T27725] CPU: 0 UID: 0 PID: 27725 Comm: syz.0.8141 Not tainted syzkaller #0 PREEMPT [ 3889.656303][T27725] Hardware name: ARM-Versatile Express [ 3889.656323][T27725] Call trace: [ 3889.656359][T27725] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3889.656447][T27725] r7:00000000 r6:00000000 r5:60000113 r4:822603d4 [ 3889.656462][T27725] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 3889.656500][T27725] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 3889.656541][T27725] r5:83b3b000 r4:8294f190 [ 3889.656554][T27725] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 3889.656597][T27725] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 3889.656657][T27725] r8:76f12f30 r7:00000000 r6:00000000 r5:dfb9df68 r4:00000002 [ 3889.656670][T27725] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 3889.656707][T27725] [<80972780>] (should_fail_usercopy) from [<8058e5bc>] (simple_read_from_buffer+0x80/0x13c) [ 3889.656753][T27725] [<8058e53c>] (simple_read_from_buffer) from [<806085b4>] (proc_fail_nth_read+0xb8/0x108) [ 3889.656805][T27725] r10:00000001 r9:806084fc r8:00000002 r7:dfb9df68 r6:0000000f r5:76f12f30 [ 3889.656822][T27725] r4:83b3b000 r3:dfb9de9f [ 3889.656834][T27725] [<806084fc>] (proc_fail_nth_read) from [<8055340c>] (vfs_read+0x98/0x324) [ 3889.656881][T27725] r8:76f12f30 r7:dfb9df68 r6:83b3b000 r5:0000000f r4:85fd1d80 [ 3889.656894][T27725] [<80553374>] (vfs_read) from [<8055411c>] (ksys_read+0x74/0xe8) [ 3889.656944][T27725] r10:00000003 r9:83b3b000 r8:8020029c r7:00000000 r6:00000000 r5:85fd1d80 [ 3889.656958][T27725] r4:85fd1d83 [ 3889.656971][T27725] [<805540a8>] (ksys_read) from [<805541a0>] (sys_read+0x10/0x14) [ 3889.657017][T27725] r7:00000003 r6:00000004 r5:76f12f30 r4:0000000f [ 3889.657029][T27725] [<80554190>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3889.657064][T27725] Exception stack(0xdfb9dfa8 to 0xdfb9dff0) [ 3889.657092][T27725] dfa0: 0000000f 76f12f30 00000004 76f12f30 0000000f 00000000 [ 3889.657120][T27725] dfc0: 0000000f 76f12f30 00000004 00000003 002e0000 00000000 00006364 76f130bc [ 3889.657140][T27725] dfe0: 00000158 76f12ed0 000d80f0 00130194 [ 3904.594198][ T31] audit: type=1400 audit(134221632.493:622): avc: denied { map } for pid=27803 comm="syz.2.8172" path="socket:[79813]" dev="sockfs" ino=79813 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3905.224678][T27808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27808 comm=syz.2.8174 [ 3905.929778][T27812] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3905.930686][T27812] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3909.915814][ T31] audit: type=1400 audit(134221637.833:623): avc: denied { map } for pid=27829 comm="syz.0.8182" path="/dev/virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="L-" [ 3916.948396][T27852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27852 comm=syz.0.8187 [ 3921.985506][T27861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27861 comm=syz.2.8191 [ 3946.287494][T27951] fuse: Invalid rootmode [ 3948.728465][T27967] SELinux: Context system_u:object_r:admin_passwd_exec_t:s0 is not valid (left unmapped). [ 3948.734201][ T31] audit: type=1400 audit(134221676.643:624): avc: denied { relabelto } for pid=27964 comm="syz.0.8227" name=E91F7189591E9233614B dev="tmpfs" ino=21451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 3948.736395][ T31] audit: type=1400 audit(134221676.653:625): avc: denied { associate } for pid=27964 comm="syz.0.8227" name=E91F7189591E9233614B dev="tmpfs" ino=21451 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 3949.215322][ T31] audit: type=1400 audit(134221677.133:626): avc: denied { unlink } for pid=3124 comm="syz-executor" name=E91F7189591E9233614B dev="tmpfs" ino=21451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 3949.756380][T27971] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27971 comm=syz.2.8229 [ 3966.452821][T28036] fuse: Unknown parameter 'use00000000000000000000' [ 3970.008378][T28049] fuse: Unknown parameter 'user_i00000000000000000000' [ 3972.505992][T28063] fuse: Unknown parameter 'user_i00000000000000000000' [ 3975.865872][T28074] fuse: Unknown parameter 'user_i00000000000000000000' [ 3994.536893][T28141] fuse: Unknown parameter 'user_id00000000000000000000' [ 3999.185636][T28159] fuse: Bad value for 'fd' [ 4003.953303][T28190] fuse: Bad value for 'fd' [ 4007.260335][T28206] fuse: Bad value for 'fd' [ 4009.278692][T28219] fuse: Unknown parameter '0x0000000000000003' [ 4010.334530][ T31] audit: type=1400 audit(134221738.233:627): avc: denied { listen } for pid=28221 comm="syz.2.8305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4012.465650][T28237] fuse: Unknown parameter '0x0000000000000003' [ 4014.955686][T28253] fuse: Unknown parameter '0x0000000000000003' [ 4016.970132][T28266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28266 comm=syz.0.8319 [ 4017.355491][T28268] fuse: Unknown parameter '0x0000000000000003' [ 4020.039748][T28278] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28278 comm=syz.2.8322 [ 4020.226170][T28280] fuse: Unknown parameter '0x0000000000000003' [ 4022.878422][T28300] fuse: Unknown parameter '0x0000000000000003' [ 4026.468088][T28316] fuse: Unknown parameter 'fd0x0000000000000003' [ 4033.526604][T28332] fuse: Unknown parameter 'fd0x0000000000000003' [ 4035.276413][ T31] audit: type=1326 audit(134221763.193:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4035.307939][ T31] audit: type=1326 audit(134221763.193:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4035.309800][ T31] audit: type=1326 audit(134221763.193:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4035.311738][ T31] audit: type=1326 audit(134221763.093:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4035.814245][ T31] audit: type=1326 audit(134221763.723:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4036.586763][ T31] audit: type=1326 audit(134221764.503:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4036.606381][ T31] audit: type=1326 audit(134221764.523:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4037.717104][ T31] audit: type=1326 audit(134221765.633:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4038.138151][T28347] FAULT_INJECTION: forcing a failure. [ 4038.138151][T28347] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 4038.172436][T28347] CPU: 1 UID: 0 PID: 28347 Comm: syz.0.8344 Not tainted syzkaller #0 PREEMPT [ 4038.172572][T28347] Hardware name: ARM-Versatile Express [ 4038.172598][T28347] Call trace: [ 4038.172669][T28347] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4038.172789][T28347] r7:00000000 r6:00000000 r5:60000113 r4:822603d4 [ 4038.172881][T28347] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4038.172996][T28347] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4038.173172][T28347] r5:85439800 r4:82917c54 [ 4038.173267][T28347] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 4038.173405][T28347] [<80972540>] (should_fail_ex) from [<8051f290>] (should_fail_alloc_page+0x68/0x74) [ 4038.173738][T28347] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:dff89df0 [ 4038.173901][T28347] [<8051f228>] (should_fail_alloc_page) from [<804ed540>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 4038.174143][T28347] [<804ed4ac>] (prepare_alloc_pages.constprop.0) from [<804f5a68>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 4038.174251][T28347] r10:dff89fb0 r9:00000000 r8:85439800 r7:00000040 r6:00140cca r5:85439800 [ 4038.174277][T28347] r4:00000000 r3:dff89df0 [ 4038.174295][T28347] [<804f59bc>] (__alloc_frozen_pages_noprof) from [<804f6b00>] (__folio_alloc_noprof+0x14/0x6c) [ 4038.174356][T28347] r10:dff89fb0 r9:854df380 r8:00000000 r7:00000040 r6:76ef0e84 r5:85439800 [ 4038.174374][T28347] r4:00001255 [ 4038.174390][T28347] [<804f6aec>] (__folio_alloc_noprof) from [<804c763c>] (handle_mm_fault+0xcf8/0x14dc) [ 4038.174516][T28347] r5:85439800 r4:00001255 [ 4038.174538][T28347] [<804c6944>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 4038.174607][T28347] r10:00000002 r9:85e9ed80 r8:00000255 r7:85439800 r6:00000a07 r5:76ef0e84 [ 4038.174651][T28347] r4:dff89fb0 [ 4038.174673][T28347] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 4038.174742][T28347] r10:00006364 r9:00000000 r8:80234128 r7:dff89fb0 r6:76ef0e84 r5:00000a07 [ 4038.174822][T28347] r4:8281cef0 [ 4038.174852][T28347] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 4038.174950][T28347] Exception stack(0xdff89fb0 to 0xdff89ff8) [ 4038.175075][T28347] 9fa0: 00000000 ffffffff 00000000 00000000 [ 4038.175218][T28347] 9fc0: 0001beb4 00000000 00000000 00188f1c 002e0000 00000000 00006364 76ef20bc [ 4038.175423][T28347] 9fe0: 00000000 76ef0e80 0001946c 0001bec0 20000010 ffffffff [ 4038.175554][T28347] r8:826b7044 r7:85439800 r6:ffffffff r5:20000010 r4:0001bec0 [ 4038.251994][ T31] audit: type=1326 audit(134221766.163:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4038.347532][ T31] audit: type=1326 audit(134221766.263:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28339 comm="syz.2.8347" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 4038.354632][T28347] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 4040.459096][T28357] FAULT_INJECTION: forcing a failure. [ 4040.459096][T28357] name failslab, interval 1, probability 0, space 0, times 0 [ 4040.505223][T28357] CPU: 1 UID: 0 PID: 28357 Comm: syz.0.8348 Not tainted syzkaller #0 PREEMPT [ 4040.505311][T28357] Hardware name: ARM-Versatile Express [ 4040.505325][T28357] Call trace: [ 4040.505347][T28357] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4040.505401][T28357] r7:00000c40 r6:00000000 r5:60000013 r4:822603d4 [ 4040.505410][T28357] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4040.505443][T28357] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4040.505493][T28357] r5:83b38000 r4:82917c00 [ 4040.505508][T28357] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 4040.505559][T28357] [<80972540>] (should_fail_ex) from [<8051f200>] (should_failslab+0x6c/0x94) [ 4040.505595][T28357] r8:83b38000 r7:00000c40 r6:85fd5928 r5:00001000 r4:830016c0 [ 4040.505604][T28357] [<8051f194>] (should_failslab) from [<80503b94>] (__kmalloc_noprof+0x9c/0x458) [ 4040.505639][T28357] [<80503af8>] (__kmalloc_noprof) from [<807c359c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4040.505670][T28357] r10:83b38000 r9:83359400 r8:00000000 r7:837a4aa0 r6:85fd5928 r5:00001000 [ 4040.505679][T28357] r4:00000000 [ 4040.505687][T28357] [<807c3560>] (tomoyo_realpath_from_path) from [<807bf6e0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4040.505716][T28357] r10:83b38000 r9:00000000 r8:85fd5900 r7:00008917 r6:00000004 r5:81cd6504 [ 4040.505726][T28357] r4:85fd5928 r3:826c0200 [ 4040.505733][T28357] [<807bf614>] (tomoyo_path_number_perm) from [<807c3fc0>] (tomoyo_file_ioctl+0x1c/0x20) [ 4040.505761][T28357] r9:00000003 r8:85fd5900 r7:20000800 r6:20000800 r5:00008917 r4:85fd5900 [ 4040.505769][T28357] [<807c3fa4>] (tomoyo_file_ioctl) from [<80770814>] (security_file_ioctl+0x64/0x1e4) [ 4040.505793][T28357] [<807707b0>] (security_file_ioctl) from [<8056cc84>] (sys_ioctl+0x4c/0xba0) [ 4040.505821][T28357] r7:20000800 r6:85fd5901 r5:00000000 r4:00008917 [ 4040.505829][T28357] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4040.505850][T28357] Exception stack(0xe0339fa8 to 0xe0339ff0) [ 4040.505867][T28357] 9fa0: 00000000 00000000 00000003 00008917 20000800 00000000 [ 4040.505887][T28357] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f130bc [ 4040.505899][T28357] 9fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 4040.505919][T28357] r10:00000036 r9:83b38000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 4040.505928][T28357] r4:00000000 [ 4040.512589][T28357] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4041.638180][T28359] fuse: Unknown parameter 'fd0x0000000000000003' [ 4049.123998][T28366] FAULT_INJECTION: forcing a failure. [ 4049.123998][T28366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4049.126669][T28366] CPU: 0 UID: 0 PID: 28366 Comm: syz.0.8353 Not tainted syzkaller #0 PREEMPT [ 4049.126779][T28366] Hardware name: ARM-Versatile Express [ 4049.126808][T28366] Call trace: [ 4049.126888][T28366] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4049.126986][T28366] r7:b5403587 r6:00000000 r5:60000013 r4:822603d4 [ 4049.127064][T28366] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4049.127170][T28366] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4049.127254][T28366] r5:8543bc00 r4:8294f190 [ 4049.127273][T28366] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 4049.127335][T28366] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 4049.127398][T28366] r8:00000000 r7:b5403587 r6:00000000 r5:8543c430 r4:76f12bf0 [ 4049.127416][T28366] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 4049.127479][T28366] [<80972780>] (should_fail_usercopy) from [<8022b664>] (setup_sigframe+0x124/0x1c4) [ 4049.127533][T28366] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 4049.127662][T28366] r10:00006364 r9:b5403587 r8:00000000 r7:8543c430 r6:76f12bf0 r5:e0361fb0 [ 4049.127687][T28366] r4:8543bc00 [ 4049.127703][T28366] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 4049.127755][T28366] Exception stack(0xe0361fb0 to 0xe0361ff8) [ 4049.127788][T28366] 1fa0: 76f13b10 00000000 003fb0d6 00e29828 [ 4049.127823][T28366] 1fc0: 76f13b00 00000005 00188f14 00188f1c 002e0000 00000000 00006364 76f130bc [ 4049.127854][T28366] 1fe0: 76f13b38 76f12ee8 0001d6d8 0014c820 20000010 ffffffff [ 4049.127894][T28366] r10:00006364 r9:8543bc00 r8:00000000 r7:8543bc00 r6:ffffffff r5:20000010 [ 4049.127917][T28366] r4:0014c820 [ 4064.244830][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 4064.245158][ T31] audit: type=1400 audit(134221792.133:643): avc: denied { append } for pid=28405 comm="syz.0.8364" name="mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 4080.907931][T28458] FAULT_INJECTION: forcing a failure. [ 4080.907931][T28458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4080.908277][T28458] CPU: 1 UID: 0 PID: 28458 Comm: syz.0.8379 Not tainted syzkaller #0 PREEMPT [ 4080.908353][T28458] Hardware name: ARM-Versatile Express [ 4080.908377][T28458] Call trace: [ 4080.908416][T28458] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4080.908501][T28458] r7:eb900000 r6:00000000 r5:60000013 r4:822603d4 [ 4080.908517][T28458] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4080.908557][T28458] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4080.908599][T28458] r5:8543e000 r4:8294f190 [ 4080.908611][T28458] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 4080.908790][T28458] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 4080.908950][T28458] r8:00000000 r7:eb900000 r6:e03c5f68 r5:84045c00 r4:00000000 [ 4080.909000][T28458] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 4080.909044][T28458] [<80972780>] (should_fail_usercopy) from [<809f391c>] (fb_sys_write+0xb0/0x21c) [ 4080.909087][T28458] [<809f386c>] (fb_sys_write) from [<809e6970>] (fb_write+0x6c/0xd4) [ 4080.909210][T28458] r10:81d164d0 r9:00000000 r8:e03c5f68 r7:8543e000 r6:00000000 r5:85f570c0 [ 4080.909264][T28458] r4:809f386c [ 4080.909278][T28458] [<809e6904>] (fb_write) from [<80553d08>] (vfs_write+0xac/0x44c) [ 4080.909384][T28458] r4:809e6904 [ 4080.909503][T28458] [<80553c5c>] (vfs_write) from [<80554218>] (ksys_write+0x74/0xe8) [ 4080.909634][T28458] r10:00000004 r9:8543e000 r8:8020029c r7:00000000 r6:00000000 r5:85f570c0 [ 4080.909691][T28458] r4:85f570c1 [ 4080.909705][T28458] [<805541a4>] (ksys_write) from [<8055429c>] (sys_write+0x10/0x14) [ 4080.909753][T28458] r7:00000004 r6:00130270 r5:00000000 r4:00000000 [ 4080.909814][T28458] [<8055428c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4080.909890][T28458] Exception stack(0xe03c5fa8 to 0xe03c5ff0) [ 4080.909924][T28458] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 4080.909951][T28458] 5fc0: 00000000 00000000 00130270 00000004 002e0000 00000000 00006364 76f130bc [ 4080.910103][T28458] 5fe0: 76f12ec0 76f12eb0 0001948c 001322c0 [ 4084.527708][T21610] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4084.590238][T21610] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4084.650326][T21610] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4084.708982][T21610] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4085.072239][T21610] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4085.082639][T21610] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4085.102072][T21610] bond0 (unregistering): Released all slaves [ 4085.198658][T21610] hsr_slave_0: left promiscuous mode [ 4085.200348][T21610] hsr_slave_1: left promiscuous mode [ 4085.221750][T21610] veth1_macvtap: left promiscuous mode [ 4085.222055][T21610] veth0_macvtap: left promiscuous mode [ 4085.222266][T21610] veth1_vlan: left promiscuous mode [ 4085.222384][T21610] veth0_vlan: left promiscuous mode [ 4087.342733][T28473] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4087.352780][T28473] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4088.467752][T28473] hsr_slave_0: entered promiscuous mode [ 4088.469457][T28473] hsr_slave_1: entered promiscuous mode [ 4089.256197][T28473] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 4089.265676][T28473] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 4089.288138][T28473] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 4089.296847][T28473] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 4090.219466][T28473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4092.734943][T28869] FAULT_INJECTION: forcing a failure. [ 4092.734943][T28869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4092.736657][T28869] CPU: 0 UID: 0 PID: 28869 Comm: syz.0.8387 Not tainted syzkaller #0 PREEMPT [ 4092.736747][T28869] Hardware name: ARM-Versatile Express [ 4092.736776][T28869] Call trace: [ 4092.736838][T28869] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4092.736959][T28869] r7:00000000 r6:00000000 r5:60000013 r4:822603d4 [ 4092.736985][T28869] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 4092.737040][T28869] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 4092.737100][T28869] r5:85a04800 r4:8294f190 [ 4092.737116][T28869] [<8021fb9c>] (dump_stack) from [<80972704>] (should_fail_ex+0x1c4/0x228) [ 4092.737174][T28869] [<80972540>] (should_fail_ex) from [<8097277c>] (should_fail+0x14/0x18) [ 4092.737236][T28869] r8:e8751eb8 r7:00000000 r6:00000001 r5:76ef1f30 r4:00000001 [ 4092.737257][T28869] [<80972768>] (should_fail) from [<8097279c>] (should_fail_usercopy+0x1c/0x20) [ 4092.737333][T28869] [<80972780>] (should_fail_usercopy) from [<808bed70>] (kstrtouint_from_user+0x54/0x13c) [ 4092.737393][T28869] [<808bed1c>] (kstrtouint_from_user) from [<80609b7c>] (proc_fail_nth_write+0x40/0xf0) [ 4092.737458][T28869] r8:e8751f68 r7:85a04800 r6:00000001 r5:84be2e40 r4:00000001 [ 4092.737477][T28869] [<80609b3c>] (proc_fail_nth_write) from [<80553d08>] (vfs_write+0xac/0x44c) [ 4092.737535][T28869] r5:84be2e40 r4:80609b3c [ 4092.737555][T28869] [<80553c5c>] (vfs_write) from [<80554218>] (ksys_write+0x74/0xe8) [ 4092.737635][T28869] r10:00000004 r9:85a04800 r8:8020029c r7:00000000 r6:00000002 r5:84be2e40 [ 4092.737659][T28869] r4:84be2e43 [ 4092.737674][T28869] [<805541a4>] (ksys_write) from [<8055429c>] (sys_write+0x10/0x14) [ 4092.737737][T28869] r7:00000004 r6:00000004 r5:76ef1f30 r4:00000001 [ 4092.737755][T28869] [<8055428c>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4092.737804][T28869] Exception stack(0xe8751fa8 to 0xe8751ff0) [ 4092.737844][T28869] 1fa0: 00000001 76ef1f30 00000004 76ef1f30 00000001 00000000 [ 4092.737879][T28869] 1fc0: 00000001 76ef1f30 00000004 00000004 002e0000 00000000 00006364 76ef20bc [ 4092.737914][T28869] 1fe0: 00000158 76ef1ed0 000d80f0 0013025c [ 4094.132796][T28473] veth0_vlan: entered promiscuous mode [ 4094.170536][T28473] veth1_vlan: entered promiscuous mode [ 4094.291348][T28473] veth0_macvtap: entered promiscuous mode [ 4094.315949][T28473] veth1_macvtap: entered promiscuous mode [ 4094.443545][T28481] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4094.444954][T28481] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4094.445387][T28481] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4094.445603][T28481] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4096.508226][T28902] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4096.623092][T28902] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4096.780246][T28902] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4096.890115][T28902] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4097.866435][T28902] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4097.878845][T28902] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4097.886779][T28902] bond0 (unregistering): Released all slaves [ 4097.998614][T28902] hsr_slave_0: left promiscuous mode [ 4098.000399][T28902] hsr_slave_1: left promiscuous mode [ 4098.017905][T28902] veth1_macvtap: left promiscuous mode [ 4098.018183][T28902] veth0_macvtap: left promiscuous mode [ 4102.482342][T28920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4102.489917][T28920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4104.459247][T28920] hsr_slave_0: entered promiscuous mode [ 4104.468375][T28920] hsr_slave_1: entered promiscuous mode [ 4104.484869][T28920] debugfs: 'hsr0' already exists in 'hsr' [ 4104.485173][T28920] Cannot create hsr debugfs directory [ 4104.961356][ T31] audit: type=1400 audit(134221832.873:644): avc: denied { map } for pid=29217 comm="syz.2.8395" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4104.974591][ T31] audit: type=1400 audit(134221832.883:645): avc: denied { call } for pid=29217 comm="syz.2.8395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4104.977718][T29222] binder_alloc: 29217: binder_alloc_buf size 16384 failed, no address space [ 4104.979062][T29222] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 4105.388692][T28920] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 4105.396135][T28920] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 4105.409398][T28920] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 4105.426214][T28920] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 4105.696606][T29312] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 4105.696994][T29312] IPv6: NLM_F_CREATE should be set when creating new route [ 4106.195053][T29331] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4106.196950][T29331] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4106.389271][T28920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4106.533262][T29335] syzkaller0: entered promiscuous mode [ 4106.535504][T29335] syzkaller0: entered allmulticast mode [ 4106.552826][T29335] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 4107.228031][ T31] audit: type=1400 audit(134221835.143:646): avc: denied { read } for pid=29345 comm="syz.2.8406" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 4107.230418][ T31] audit: type=1400 audit(134221835.143:647): avc: denied { open } for pid=29345 comm="syz.2.8406" path="/16/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 4107.267477][T29358] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 4107.267822][T29358] block device autoloading is deprecated and will be removed. [ 4107.291993][ T31] audit: type=1400 audit(134221835.203:648): avc: denied { ioctl } for pid=29345 comm="syz.2.8406" path="/16/file0/file0" dev="fuse" ino=64 ioctlcmd=0x922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 4107.516900][T29368] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 4107.687569][T29371] comedi: valid board names for 8255 driver are: [ 4107.688743][T29371] 8255 [ 4107.690926][T29371] comedi: valid board names for vmk80xx driver are: [ 4107.694847][T29371] vmk80xx [ 4107.697770][T29371] comedi: valid board names for usbduxsigma driver are: [ 4107.700534][T29371] usbduxsigma [ 4107.702134][T29371] comedi: valid board names for usbduxfast driver are: [ 4107.704562][T29371] usbduxfast [ 4107.705942][T29371] comedi: valid board names for usbdux driver are: [ 4107.707503][T29371] usbdux [ 4107.709304][T29371] comedi: valid board names for ni6501 driver are: [ 4107.711688][T29371] ni6501 [ 4107.713260][T29371] comedi: valid board names for dt9812 driver are: [ 4107.715975][T29371] dt9812 [ 4107.717389][T29371] comedi: valid board names for ni_labpc_cs driver are: [ 4107.718996][T29371] ni_labpc_cs [ 4107.720527][T29371] comedi: valid board names for ni_daq_700 driver are: [ 4107.722556][T29371] ni_daq_700 [ 4107.725135][T29371] comedi: valid board names for labpc_pci driver are: [ 4107.725502][T29371] labpc_pci [ 4107.725723][T29371] comedi: valid board names for adl_pci9118 driver are: [ 4107.725895][T29371] pci9118dg [ 4107.725954][T29371] pci9118hg [ 4107.725970][T29371] pci9118hr [ 4107.725986][T29371] comedi: valid board names for 8255_pci driver are: [ 4107.726002][T29371] 8255_pci [ 4107.726014][T29371] comedi: valid board names for comedi_parport driver are: [ 4107.726030][T29371] comedi_parport [ 4107.726072][T29371] comedi: valid board names for comedi_test driver are: [ 4107.726092][T29371] comedi_test [ 4107.726150][T29371] comedi: valid board names for comedi_bond driver are: [ 4107.726171][T29371] comedi_bond [ 4108.062508][T29378] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4108.067319][T29378] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4108.294486][T29378] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4108.295444][T29378] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4108.985473][T29393] fuse: root generation should be zero [ 4109.822551][T28920] veth0_vlan: entered promiscuous mode [ 4109.846279][T28920] veth1_vlan: entered promiscuous mode [ 4109.908894][T28920] veth0_macvtap: entered promiscuous mode [ 4109.919488][T28920] veth1_macvtap: entered promiscuous mode [ 4109.967421][T26171] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4109.968036][T26171] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4109.968175][T26171] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4109.968288][T26171] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4111.771828][ T31] audit: type=1400 audit(134221839.683:649): avc: denied { bind } for pid=29428 comm="syz.2.8414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4113.999005][ T31] audit: type=1400 audit(134221841.913:650): avc: denied { read } for pid=29450 comm="syz.2.8422" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 4113.999371][ T31] audit: type=1400 audit(134221841.913:651): avc: denied { open } for pid=29450 comm="syz.2.8422" path="/28/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 4114.010327][ T31] audit: type=1400 audit(134221841.923:652): avc: denied { ioctl } for pid=29450 comm="syz.2.8422" path="/28/file0/file0" dev="fuse" ino=3 ioctlcmd=0x541a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 4114.405000][T17534] usb 1-1: new high-speed USB device number 42 using dummy_hcd [ 4114.598033][T17534] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4114.600013][T17534] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4114.602398][T17534] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 4114.605713][T17534] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 4114.606831][T17534] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4114.615571][T17534] usb 1-1: config 0 descriptor?? [ 4115.099233][T17534] plantronics 0003:047F:FFFF.000B: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 4115.571121][T29480] netlink: 'syz.2.8432': attribute type 13 has an invalid length. [ 4115.571445][T29480] netlink: 'syz.2.8432': attribute type 17 has an invalid length. [ 4115.582490][T29480] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 4116.684703][ T31] audit: type=1400 audit(134221844.593:653): avc: denied { mounton } for pid=29531 comm="syz.2.8437" path="/38/file0" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 4116.724734][T23681] usb 1-1: reset high-speed USB device number 42 using dummy_hcd [ 4116.879796][T23681] usb 1-1: device firmware changed [ 4116.883274][T17534] usb 1-1: USB disconnect, device number 42 [ 4117.035040][T17534] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 4117.190518][T17534] usb 1-1: config 0 has no interfaces? [ 4117.192485][T17534] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 4117.194705][T17534] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4117.202586][T17534] usb 1-1: config 0 descriptor?? [ 4117.425260][T28905] usb 1-1: USB disconnect, device number 43 [ 4117.845130][T29553] misc userio: Begin command sent, but we're already running [ 4118.375264][T17534] usb 1-1: new high-speed USB device number 44 using dummy_hcd [ 4118.532865][T17534] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4118.535318][T17534] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 4118.536641][T17534] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4118.540831][T17534] usb 1-1: config 0 descriptor?? [ 4118.758520][T17534] usbhid 1-1:0.0: can't add hid device: -71 [ 4118.760146][T17534] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 4118.769438][T17534] usb 1-1: USB disconnect, device number 44 [ 4119.216358][T28905] usb 1-1: new high-speed USB device number 45 using dummy_hcd [ 4119.365110][T28905] usb 1-1: Using ep0 maxpacket: 32 [ 4119.379734][T28905] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4119.380193][T28905] usb 1-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice= 0.40 [ 4119.380416][T28905] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4119.391814][T28905] usb 1-1: config 0 descriptor?? [ 4119.410164][T28905] ldusb 1-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 4119.417023][T28905] ldusb 1-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 4119.724012][T28905] usb 1-1: USB disconnect, device number 45 [ 4119.732757][T28905] ldusb 1-1:0.0: LD USB Device #0 now disconnected [ 4122.630444][T29594] netlink: 36 bytes leftover after parsing attributes in process `syz.0.8444'. [ 4122.648671][T29594] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8444'. [ 4123.041991][T29622] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8447'. [ 4123.112938][T29622] netlink: 'syz.0.8447': attribute type 1 has an invalid length. [ 4123.510123][T29634] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8451'. [ 4126.204415][T22328] usb 1-1: new high-speed USB device number 46 using dummy_hcd [ 4126.334526][T22328] usb 1-1: device descriptor read/64, error -71 [ 4126.574836][T22328] usb 1-1: new high-speed USB device number 47 using dummy_hcd [ 4126.705015][T22328] usb 1-1: device descriptor read/64, error -71 [ 4126.814809][T22328] usb usb1-port1: attempt power cycle [ 4127.155073][T22328] usb 1-1: new high-speed USB device number 48 using dummy_hcd [ 4127.178293][T22328] usb 1-1: device descriptor read/8, error -71 [ 4127.424562][T22328] usb 1-1: new high-speed USB device number 49 using dummy_hcd [ 4127.448652][T22328] usb 1-1: device descriptor read/8, error -71 [ 4127.555497][T22328] usb usb1-port1: unable to enumerate USB device [ 4129.532287][ T31] audit: type=1400 audit(134221857.443:654): avc: denied { mount } for pid=29686 comm="syz.2.8465" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 4129.539863][ T31] audit: type=1400 audit(134221857.453:655): avc: denied { mounton } for pid=29686 comm="syz.2.8465" path="/43/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 4129.572714][ T31] audit: type=1400 audit(134221857.483:656): avc: denied { unmount } for pid=28473 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 4129.627104][T29689] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4129.628008][T29689] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4129.799345][ T31] audit: type=1400 audit(134221857.713:657): avc: denied { mount } for pid=29694 comm="syz.2.8468" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 4129.874441][T29697] input: syz1 as /devices/virtual/input/input18 [ 4132.542335][T29725] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 4132.542643][T29725] block device autoloading is deprecated and will be removed. [ 4137.500978][T29781] devtmpfs: Cannot change global quota limit on remount [ 4138.170264][ T31] audit: type=1400 audit(134221866.083:658): avc: denied { watch_reads } for pid=29793 comm="syz.2.8495" path="/proc/165" dev="proc" ino=84392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 4138.591523][T29804] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4138.595869][T29804] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4140.221525][T17534] usb 1-1: new high-speed USB device number 50 using dummy_hcd [ 4140.430883][T17534] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 4140.431142][T17534] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 4140.444206][T17534] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 4140.448086][T17534] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 4140.450832][T17534] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 4140.465253][T17534] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4140.483035][T17534] usb 1-1: config 0 descriptor?? [ 4140.987439][T17534] hid_parser_main: 194 callbacks suppressed [ 4140.994430][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4140.995946][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4140.996958][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4140.998739][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4140.999966][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.004601][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.005809][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.007402][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.009134][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.010541][T17534] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 4141.026287][T17534] plantronics 0003:047F:FFFF.000C: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 4141.212956][T28905] usb 1-1: USB disconnect, device number 50 [ 4143.366096][T29860] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8512'. [ 4144.869634][T29865] md2: bitmap files not supported by this kernel [ 4145.624394][T28919] usb 1-1: new low-speed USB device number 51 using dummy_hcd [ 4145.790036][T28919] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 4145.790964][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 77, setting to 8 [ 4145.791944][T28919] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 4145.793078][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 10 [ 4145.804086][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 65535, setting to 8 [ 4145.811735][T28919] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 4145.812567][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 77, setting to 8 [ 4145.814047][T28919] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 4145.815102][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 10 [ 4145.817868][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 65535, setting to 8 [ 4145.831337][T28919] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 4145.832570][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 77, setting to 8 [ 4145.833657][T28919] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 4145.835103][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 10 [ 4145.836231][T28919] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 65535, setting to 8 [ 4145.860163][T28919] usb 1-1: string descriptor 0 read error: -22 [ 4145.861818][T28919] usb 1-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 4145.865512][T28919] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4145.880461][T28919] adutux 1-1:168.0: ADU100 now attached to /dev/usb/adutux0 [ 4146.083089][T28919] usb 1-1: USB disconnect, device number 51 [ 4149.174105][ T31] audit: type=1400 audit(134221877.083:659): avc: denied { create } for pid=29938 comm="syz.0.8533" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4149.188604][ T31] audit: type=1400 audit(134221877.103:660): avc: denied { mounton } for pid=29938 comm="syz.0.8533" path="/48/file0" dev="tmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4149.458257][T29946] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4149.461157][T29946] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4149.471290][T29946] i2c i2c-2: Invalid block write size 255 [ 4149.976031][T29961] syzkaller1: entered promiscuous mode [ 4149.977692][T29961] syzkaller1: entered allmulticast mode [ 4150.170887][T29968] netlink: 'syz.0.8539': attribute type 1 has an invalid length. [ 4150.261230][T29968] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 4150.303339][T29968] veth3: entered promiscuous mode [ 4150.309093][T29968] bond1: (slave veth3): Enslaving as a backup interface with a down link [ 4155.064407][ T31] audit: type=1400 audit(134221882.963:661): avc: denied { execute } for pid=30070 comm="syz.2.8554" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4159.095557][ T31] audit: type=1400 audit(134221886.993:662): avc: denied { bind } for pid=30102 comm="syz.0.8563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4165.639237][T30110] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4165.641204][T30110] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4165.874980][T30100] usb 1-1: new high-speed USB device number 52 using dummy_hcd [ 4166.032872][T30100] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4166.033121][T30100] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4166.033413][T30100] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 4166.033620][T30100] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 4166.038590][T30100] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4166.056585][T30100] usb 1-1: config 0 descriptor?? [ 4166.504491][T30100] plantronics 0003:047F:FFFF.000D: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 4166.808226][T30100] usb 1-1: USB disconnect, device number 52 [ 4169.284528][T28919] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 4169.556237][T28919] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 4169.562036][T28919] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4169.577047][T28919] usb 1-1: Product: syz [ 4169.578503][T28919] usb 1-1: Manufacturer: syz [ 4169.579148][T28919] usb 1-1: SerialNumber: syz [ 4170.048667][T30164] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4170.049776][T30164] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4170.055492][T28919] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 4170.055842][T28919] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 4170.056051][T28919] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 4170.078652][T28919] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 4170.098011][T28919] usb 1-1: USB disconnect, device number 53 [ 4170.260492][T30180] syzkaller1: entered promiscuous mode [ 4170.261702][T30180] syzkaller1: entered allmulticast mode [ 4171.499452][T30192] netlink: 16 bytes leftover after parsing attributes in process `syz.0.8582'. [ 4172.914646][T25258] usb 1-1: new high-speed USB device number 54 using dummy_hcd [ 4172.975108][T30205] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4172.979137][T30205] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4173.075702][T25258] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 4173.076036][T25258] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 4173.076238][T25258] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4173.099039][T25258] usb 1-1: config 0 descriptor?? [ 4174.524011][T30220] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4174.536443][T30220] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4175.294349][T30228] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4175.308173][T30228] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4176.126348][T30235] 8<--- cut here --- [ 4176.127917][T30235] Unable to handle kernel paging request at virtual address fee04f2a when write [ 4176.130882][T30235] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 4176.135612][T30235] Internal error: Oops: a06 [#1] SMP ARM [ 4176.146455][T30235] Modules linked in: [ 4176.147266][T30235] CPU: 0 UID: 0 PID: 30235 Comm: syz.2.8592 Not tainted syzkaller #0 PREEMPT [ 4176.148009][T30235] Hardware name: ARM-Versatile Express [ 4176.153592][T30235] PC is at subdev_8255_io+0x60/0x6c [ 4176.154136][T30235] LR is at subdev_8255_io+0x4c/0x6c [ 4176.154515][T30235] pc : [<813b8858>] lr : [<813b8844>] psr: 60000013 [ 4176.157936][T30235] sp : df881cb8 ip : df881cb8 fp : df881cd4 [ 4176.158390][T30235] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 4176.159215][T30235] r7 : 00004f27 r6 : 0000009b r5 : 83ae9e40 r4 : 00004f2a [ 4176.163677][T30235] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 83ae9e40 [ 4176.164303][T30235] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 4176.164669][T30235] Control: 30c5387d Table: 85dba200 DAC: fffffffd [ 4176.165493][T30235] Register r0 information: slab kmalloc-192 start 83ae9e40 pointer offset 0 size 192 [ 4176.173639][T30235] Register r1 information: non-paged memory [ 4176.179500][T30235] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4176.181928][T30235] Register r3 information: non-paged memory [ 4176.184007][T30235] Register r4 information: non-paged memory [ 4176.185277][T30235] Register r5 information: slab kmalloc-192 start 83ae9e40 pointer offset 0 size 192 [ 4176.190955][T30235] Register r6 information: non-paged memory [ 4176.191296][T30235] Register r7 information: non-paged memory [ 4176.193246][T30235] Register r8 information: non-paged memory [ 4176.194010][T30235] Register r9 information: NULL pointer [ 4176.197188][T30235] Register r10 information: NULL pointer [ 4176.201584][T30235] Register r11 information: 2-page vmalloc region starting at 0xdf880000 allocated at kernel_clone+0xac/0x3ec [ 4176.202422][T30235] Register r12 information: 2-page vmalloc region starting at 0xdf880000 allocated at kernel_clone+0xac/0x3ec [ 4176.203999][T30235] Process syz.2.8592 (pid: 30235, stack limit = 0xdf880000) [ 4176.204435][T30235] Stack: (0xdf881cb8 to 0xdf882000) [ 4176.206357][T30235] 1ca0: 813b87f8 83ae9e40 [ 4176.212587][T30235] 1cc0: 00004f27 00004f27 df881cf4 df881cd8 813b8530 813b8804 00004f27 df881cf8 [ 4176.213183][T30235] 1ce0: 00000000 855f0000 df881d14 df881cf8 813b88f0 813b84e4 855f0000 83ae9e40 [ 4176.213834][T30235] 1d00: df881da4 00004f27 df881d54 df881d18 813b8ae4 813b8870 82ae3da0 83ec0a00 [ 4176.214355][T30235] 1d20: 828215b0 00000000 00000000 829d0104 83ae9e40 83ae9e84 df881d90 83ae9e40 [ 4176.214730][T30235] 1d40: 00000000 82b16f40 df881d8c df881d58 813a79e8 813b8a34 200000c0 00000000 [ 4176.221079][T30235] 1d60: df881d7c 200000c0 83ae9e40 b5403587 200000c0 8584e000 40946400 00000003 [ 4176.224079][T30235] 1d80: df881e4c df881d90 813a3568 813a78ec 35353238 00000000 00000000 00000000 [ 4176.229955][T30235] 1da0: 00000000 00004f27 00000005 00000002 00000421 00000001 00000cc7 7fffffff [ 4176.230618][T30235] 1dc0: 5c952399 00000005 000003ff 00000002 00000300 00000001 00000001 00000009 [ 4176.234127][T30235] 1de0: 00000000 00000000 00000008 fffffffa 000001ff 80000089 0000000a 00000000 [ 4176.234620][T30235] 1e00: 20001e54 ffffeadb 00000003 0000003d 00000008 00000004 08000000 dffffffa [ 4176.235035][T30235] 1e20: 00000000 9c93c3ad 00000000 84bcacc0 83ae9e40 200000c0 200000c0 8584e000 [ 4176.236431][T30235] 1e40: df881f14 df881e50 813a4534 813a3474 00000000 00000000 00000000 9c93c3ad [ 4176.236806][T30235] 1e60: 00000000 00000000 8247054c 0000005f 840de458 83ae9e70 842cc00c 8584e000 [ 4176.237227][T30235] 1e80: df881ee4 df881e90 80797a24 8078dd88 00000064 00000001 00000000 df881eac [ 4176.239260][T30235] 1ea0: 85ec6850 83416dd0 00006400 0000000b df881ea0 00000000 00000000 9c93c3ad [ 4176.244091][T30235] 1ec0: 84bcacc0 40946400 200000c0 200000c0 84bcacc0 00000003 df881ef4 df881ee8 [ 4176.244548][T30235] 1ee0: 80797b44 9c93c3ad df881f14 40946400 00000000 84bcacc1 200000c0 84bcacc0 [ 4176.246808][T30235] 1f00: 00000003 8584e000 df881fa4 df881f18 8056cd68 813a3f64 ecac8b10 8584e000 [ 4176.247685][T30235] 1f20: df881f3c df881f30 81a39a78 81a39948 df881f54 df881f40 8025e490 8028ef64 [ 4176.248133][T30235] 1f40: df881fb0 40000000 df881f84 df881f58 802229ec 8025e44c 00000000 8281cddc [ 4176.248443][T30235] 1f60: df881fb0 0014c820 ecac8b10 80222940 00000000 9c93c3ad df881fac 00000000 [ 4176.248796][T30235] 1f80: 00000000 002f6308 00000036 8020029c 8584e000 00000036 00000000 df881fa8 [ 4176.249201][T30235] 1fa0: 80200060 8056cc44 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4176.253706][T30235] 1fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f780bc [ 4176.256545][T30235] 1fe0: 76f77ec0 76f77eb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 4176.259881][T30235] Call trace: [ 4176.260184][T30235] [<813b87f8>] (subdev_8255_io) from [<813b8530>] (subdev_8255_do_config+0x58/0x60) [ 4176.263715][T30235] r7:00004f27 r6:00004f27 r5:83ae9e40 r4:813b87f8 [ 4176.264075][T30235] [<813b84d8>] (subdev_8255_do_config) from [<813b88f0>] (subdev_8255_io_init+0x8c/0x9c) [ 4176.264697][T30235] r4:855f0000 [ 4176.264845][T30235] [<813b8864>] (subdev_8255_io_init) from [<813b8ae4>] (dev_8255_attach+0xbc/0x114) [ 4176.268214][T30235] r7:00004f27 r6:df881da4 r5:83ae9e40 r4:855f0000 [ 4176.270929][T30235] [<813b8a28>] (dev_8255_attach) from [<813a79e8>] (comedi_device_attach+0x108/0x250) [ 4176.271499][T30235] r10:82b16f40 r9:00000000 r8:83ae9e40 r7:df881d90 r6:83ae9e84 r5:83ae9e40 [ 4176.271843][T30235] r4:829d0104 [ 4176.272245][T30235] [<813a78e0>] (comedi_device_attach) from [<813a3568>] (do_devconfig_ioctl+0x100/0x220) [ 4176.273707][T30235] r10:00000003 r9:40946400 r8:8584e000 r7:200000c0 r6:b5403587 r5:83ae9e40 [ 4176.274079][T30235] r4:200000c0 [ 4176.274262][T30235] [<813a3468>] (do_devconfig_ioctl) from [<813a4534>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 4176.281699][T30235] r8:8584e000 r7:200000c0 r6:200000c0 r5:83ae9e40 r4:84bcacc0 [ 4176.282919][T30235] [<813a3f58>] (comedi_unlocked_ioctl) from [<8056cd68>] (sys_ioctl+0x130/0xba0) [ 4176.283386][T30235] r10:8584e000 r9:00000003 r8:84bcacc0 r7:200000c0 r6:84bcacc1 r5:00000000 [ 4176.284022][T30235] r4:40946400 [ 4176.284218][T30235] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4176.284789][T30235] Exception stack(0xdf881fa8 to 0xdf881ff0) [ 4176.285089][T30235] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4176.291665][T30235] 1fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f780bc [ 4176.294273][T30235] 1fe0: 76f77ec0 76f77eb0 0001948c 001322c0 [ 4176.294724][T30235] r10:00000036 r9:8584e000 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 4176.295078][T30235] r4:00000000 [ 4176.295525][T30235] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 4176.296145][T30235] ---[ end trace 0000000000000000 ]--- [ 4176.297206][T30235] Kernel panic - not syncing: Fatal exception [ 4176.303680][T30235] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:11:04 Registers: info registers vcpu 0 CPU#0 R00=83327024 R01=82a7de70 R02=00000000 R03=64726148 R04=65726177 R05=df8817c0 R06=000019a0 R07=df881808 R08=00000024 R09=00000800 R10=00000000 R11=df881804 R12=0000001c R13=df881784 R14=73736572 R15=81a0a400 PSR=40000193 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=c01da000 R01=dfac7000 R02=00000001 R03=80239bb8 R04=7f248000 R05=00000001 R06=82ac8f44 R07=82ac8320 R08=7f248000 R09=dfac7000 R10=8280c9b4 R11=eec89d9c R12=eec89da0 R13=eec89d70 R14=80230af0 R15=80239bcc PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000