last executing test programs: 8.03619441s ago: executing program 1 (id=6441): syz_usb_connect(0x0, 0x3f, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000d5b6c108701801007fe60102030109022d00010000000009040000030a00000009058d0000000000000905f3ff"], 0x0) 6.851213057s ago: executing program 1 (id=6442): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ppoll(&(0x7f0000000080)=[{r1, 0x60}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x1}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 3.961649754s ago: executing program 1 (id=6443): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fanotify_init(0x0, 0x400) fcntl$setflags(r0, 0x2, 0x1) 3.652610764s ago: executing program 1 (id=6446): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x66}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x400000d0) 2.914288622s ago: executing program 1 (id=6447): capset(&(0x7f0000000180)={0x20071026}, &(0x7f0000000040)={0x0, 0x7}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) r2 = dup2(r1, r0) readv(r2, &(0x7f0000001400)=[{&(0x7f0000000040)=""/81, 0x51}], 0x1) 2.810494339s ago: executing program 0 (id=6448): r0 = syz_open_dev$loop(&(0x7f0000000000), 0x26, 0x863e02) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xf, 0x2012, r0, 0x0) 2.356999778s ago: executing program 0 (id=6449): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x89a41, 0x0) r1 = dup(r0) io_setup(0x19, &(0x7f00000009c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, r1}]) 1.640600754s ago: executing program 0 (id=6450): renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000b00)='./file0/file0\x00', 0x2) 1.207861462s ago: executing program 0 (id=6451): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r1) socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x2400c094) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c096) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000c40)={0x14, 0x24, 0x1, 0x70bd26, 0x25dfdbfc, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={0x0, 0xb4}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) 530.153996ms ago: executing program 0 (id=6452): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023892) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 276.71µs ago: executing program 1 (id=6453): renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./cgroup\x00', 0x5c0d6b3c34ef68fc) 0s ago: executing program 0 (id=6454): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x0, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0xf27, 0x80000000, 0x2, 0xa, 0xd, 0x5, 0x8, 0x4, 0x4, 0xfd, 0x4, 0x0, 0x1, 0x1, 0x100006, 0x101, 0x12000000, 0x7f, 0x3, 0x40000003, 0x8c, 0xca9f, 0x0, 0xfffffff9, 0xffffffff, 0xe66, 0x13, 0x8, 0x4089, 0x8, 0x6]}) kernel console output (not intermixed with test programs): 4429] Hardware name: ARM-Versatile Express [ 3207.820838][T24429] Call trace: [ 3207.820886][T24429] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3207.821020][T24429] r7:b5403587 r6:00000000 r5:60000013 r4:82295bd4 [ 3207.821042][T24429] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3207.821100][T24429] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3207.821172][T24429] r5:85f39800 r4:8294fc90 [ 3207.821196][T24429] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3207.821279][T24429] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3207.821357][T24429] r8:00000000 r7:b5403587 r6:76f1fbb8 r5:00000000 r4:ed5c1fb0 [ 3207.821380][T24429] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3207.821443][T24429] [<80999e28>] (should_fail_usercopy) from [<8022a868>] (restore_sigframe+0x94/0x210) [ 3207.821507][T24429] [<8022a7d4>] (restore_sigframe) from [<8022aa88>] (sys_rt_sigreturn+0x44/0x74) [ 3207.821578][T24429] r7:000000ad r6:00130308 r5:76f1fb38 r4:ed5c1fb0 [ 3207.821600][T24429] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3207.821653][T24429] Exception stack(0xed5c1fa8 to 0xed5c1ff0) [ 3207.821701][T24429] 1fa0: 00000000 00000000 00000342 76f1fb38 76f1fbb8 00000000 [ 3207.821746][T24429] 1fc0: 00000000 00000000 00130308 000000ad 00310000 00000000 00006364 76f200bc [ 3207.821778][T24429] 1fe0: 76f1fec0 76f1fb38 0015acf0 000ef438 [ 3207.821808][T24429] r5:00000000 r4:00000000 [ 3208.546721][ T29] audit: type=1400 audit(134220936.382:494): avc: denied { getopt } for pid=24431 comm="syz.0.5586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3209.053149][ T29] audit: type=1400 audit(134220936.922:495): avc: denied { create } for pid=24434 comm="syz.0.5587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3209.071267][ T29] audit: type=1400 audit(134220936.942:496): avc: denied { write } for pid=24434 comm="syz.0.5587" path="socket:[64066]" dev="sockfs" ino=64066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3210.367398][ T29] audit: type=1400 audit(134220938.232:497): avc: denied { create } for pid=24438 comm="syz.0.5589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3212.815441][T21430] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 3212.987043][T21430] usb 2-1: Using ep0 maxpacket: 8 [ 3213.026946][T21430] usb 2-1: config 0 has an invalid interface number: 143 but max is 0 [ 3213.027629][T21430] usb 2-1: config 0 has no interface number 0 [ 3213.029718][T21430] usb 2-1: New USB device found, idVendor=2058, idProduct=1005, bcdDevice=c1.9b [ 3213.031988][T21430] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3213.035258][T21430] usb 2-1: config 0 descriptor?? [ 3213.208456][T21430] viperboard 2-1:0.143: version 0.00 found at bus 002 address 047 [ 3213.222355][T21430] viperboard-i2c viperboard-i2c.6.auto: error -EIO: failure setting i2c_bus_freq to 100 [ 3213.223081][T21430] viperboard-i2c viperboard-i2c.6.auto: probe with driver viperboard-i2c failed with error -5 [ 3213.302206][T21430] usb 2-1: USB disconnect, device number 47 [ 3220.207603][ T29] audit: type=1400 audit(134220948.062:498): avc: denied { lock } for pid=24490 comm="syz.1.5594" path="socket:[64640]" dev="sockfs" ino=64640 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3221.258211][T24494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24494 comm=syz.0.5595 [ 3222.064917][ T29] audit: type=1400 audit(134220949.932:499): avc: denied { nlmsg_write } for pid=24495 comm="syz.0.5596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3223.268746][T24503] FAULT_INJECTION: forcing a failure. [ 3223.268746][T24503] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.269238][T24503] CPU: 0 UID: 0 PID: 24503 Comm: syz.1.5599 Tainted: G L syzkaller #0 PREEMPT [ 3223.269308][T24503] Tainted: [L]=SOFTLOCKUP [ 3223.269318][T24503] Hardware name: ARM-Versatile Express [ 3223.269330][T24503] Call trace: [ 3223.269352][T24503] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3223.269492][T24503] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3223.269528][T24503] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3223.269560][T24503] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3223.269607][T24503] r5:8321ec00 r4:82918a08 [ 3223.269682][T24503] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3223.269746][T24503] [<80999be8>] (should_fail_ex) from [<8053a6f8>] (should_failslab+0x6c/0x94) [ 3223.269811][T24503] r8:000002c8 r7:00000000 r6:00000dc0 r5:82499730 r4:83001540 [ 3223.269858][T24503] [<8053a68c>] (should_failslab) from [<8051a874>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 3223.269924][T24503] [<8051a828>] (__kmalloc_cache_noprof) from [<814ca164>] (snd_mixer_oss_get_volume1_vol.constprop.0+0x78/0x1b4) [ 3223.269997][T24503] r10:830fe1df r9:830fe1e0 r8:ed7dde70 r7:83e0413c r6:84a41080 r5:82499730 [ 3223.270052][T24503] r4:84cb3200 [ 3223.270072][T24503] [<814ca0ec>] (snd_mixer_oss_get_volume1_vol.constprop.0) from [<814ca330>] (snd_mixer_oss_get_volume1+0x90/0x124) [ 3223.270147][T24503] r10:8321ec00 r9:814ca2a0 r8:83e045c8 r7:862e3dc0 r6:84a41b80 r5:ed7dde74 [ 3223.270165][T24503] r4:ed7dde70 [ 3223.270178][T24503] [<814ca2a0>] (snd_mixer_oss_get_volume1) from [<814c83ec>] (snd_mixer_oss_ioctl1+0xcc/0xb14) [ 3223.270244][T24503] r7:83e04000 r6:20000340 r5:862e3dc0 r4:00000006 [ 3223.270264][T24503] [<814c8320>] (snd_mixer_oss_ioctl1) from [<814c8e48>] (snd_mixer_oss_ioctl+0x14/0x18) [ 3223.270332][T24503] r10:8321ec00 r9:00000003 r8:860d3780 r7:20000340 r6:860d3781 r5:00000000 [ 3223.270350][T24503] r4:80045006 [ 3223.270364][T24503] [<814c8e34>] (snd_mixer_oss_ioctl) from [<80585920>] (sys_ioctl+0x130/0xba0) [ 3223.270427][T24503] [<805857f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3223.270492][T24503] Exception stack(0xed7ddfa8 to 0xed7ddff0) [ 3223.270540][T24503] dfa0: 00000000 00000000 00000003 80045006 20000340 00000000 [ 3223.270610][T24503] dfc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76f340bc [ 3223.270643][T24503] dfe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3223.270676][T24503] r10:00000036 r9:8321ec00 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3223.270694][T24503] r4:00000000 [ 3223.683826][ T29] audit: type=1400 audit(134220951.552:500): avc: denied { mounton } for pid=24504 comm="syz.1.5600" path="/468/file0" dev="tmpfs" ino=2461 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3223.697438][ T29] audit: type=1400 audit(134220951.562:501): avc: denied { mount } for pid=24504 comm="syz.1.5600" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3223.703019][T24505] FAULT_INJECTION: forcing a failure. [ 3223.703019][T24505] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.703690][T24505] CPU: 1 UID: 0 PID: 24505 Comm: syz.1.5600 Tainted: G L syzkaller #0 PREEMPT [ 3223.703795][T24505] Tainted: [L]=SOFTLOCKUP [ 3223.703816][T24505] Hardware name: ARM-Versatile Express [ 3223.703841][T24505] Call trace: [ 3223.703881][T24505] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3223.703990][T24505] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3223.704009][T24505] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3223.704065][T24505] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3223.704122][T24505] r5:843ee000 r4:82918a08 [ 3223.704138][T24505] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3223.704204][T24505] [<80999be8>] (should_fail_ex) from [<8053a6f8>] (should_failslab+0x6c/0x94) [ 3223.704276][T24505] r8:843ee000 r7:00000000 r6:00000cc0 r5:20000040 r4:830a1a80 [ 3223.704296][T24505] [<8053a68c>] (should_failslab) from [<80519ba0>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 3223.704357][T24505] [<80519b54>] (kmem_cache_alloc_noprof) from [<80579df4>] (getname_flags.part.0+0x28/0x18c) [ 3223.704429][T24505] r10:00000015 r9:b5403587 r8:84d38000 r7:00000001 r6:82499930 r5:20000040 [ 3223.704452][T24505] r4:20000040 [ 3223.704469][T24505] [<80579dcc>] (getname_flags.part.0) from [<8057f928>] (getname_flags+0x3c/0x50) [ 3223.704546][T24505] r9:b5403587 r8:84d38000 r7:00000000 r6:ffffff9c r5:00000001 r4:20000040 [ 3223.704569][T24505] [<8057f8ec>] (getname_flags) from [<8057fee0>] (user_path_at+0x2c/0x64) [ 3223.704625][T24505] r5:00000001 r4:ed859f6c [ 3223.704642][T24505] [<8057feb4>] (user_path_at) from [<8059f2ac>] (sys_mount+0x158/0x260) [ 3223.704705][T24505] r6:86204a40 r5:20000240 r4:00000000 [ 3223.704723][T24505] [<8059f154>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3223.704773][T24505] Exception stack(0xed859fa8 to 0xed859ff0) [ 3223.704817][T24505] 9fa0: 20000240 00000000 00000000 20000040 20000140 00028000 [ 3223.704857][T24505] 9fc0: 20000240 00000000 00130308 00000015 00310000 00000000 00006364 76f340bc [ 3223.704889][T24505] 9fe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3223.704927][T24505] r10:00000015 r9:843ee000 r8:8020029c r7:00000015 r6:00130308 r5:00000000 [ 3223.704948][T24505] r4:20000240 [ 3223.773891][ T29] audit: type=1400 audit(134220951.642:502): avc: denied { unmount } for pid=20843 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3225.267212][ T29] audit: type=1400 audit(134220953.122:503): avc: denied { create } for pid=24517 comm="syz.1.5605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3225.269098][ T29] audit: type=1400 audit(134220953.122:504): avc: denied { write } for pid=24517 comm="syz.1.5605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3226.080821][T24526] FAULT_INJECTION: forcing a failure. [ 3226.080821][T24526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3226.144703][T24526] CPU: 0 UID: 0 PID: 24526 Comm: syz.1.5608 Tainted: G L syzkaller #0 PREEMPT [ 3226.144811][T24526] Tainted: [L]=SOFTLOCKUP [ 3226.144823][T24526] Hardware name: ARM-Versatile Express [ 3226.144836][T24526] Call trace: [ 3226.144860][T24526] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3226.144936][T24526] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3226.144946][T24526] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3226.144975][T24526] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3226.145005][T24526] r5:83eb5400 r4:8294fc90 [ 3226.145013][T24526] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3226.145046][T24526] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3226.145081][T24526] r8:76f33f30 r7:00000000 r6:00000000 r5:edb39f68 r4:00000002 [ 3226.145090][T24526] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3226.145118][T24526] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3226.145150][T24526] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3226.145198][T24526] r10:00000001 r9:80624eec r8:00000002 r7:edb39f68 r6:0000000f r5:76f33f30 [ 3226.145210][T24526] r4:83eb5400 r3:edb39e9f [ 3226.145219][T24526] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3226.145253][T24526] r8:76f33f30 r7:edb39f68 r6:83eb5400 r5:0000000f r4:85891f00 [ 3226.145263][T24526] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3226.145294][T24526] r10:00000003 r9:83eb5400 r8:8020029c r7:00000000 r6:00000000 r5:85891f00 [ 3226.145305][T24526] r4:85891f03 [ 3226.145313][T24526] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3226.145342][T24526] r7:00000003 r6:00000004 r5:76f33f30 r4:0000000f [ 3226.145351][T24526] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3226.145375][T24526] Exception stack(0xedb39fa8 to 0xedb39ff0) [ 3226.145398][T24526] 9fa0: 0000000f 76f33f30 00000004 76f33f30 0000000f 00000000 [ 3226.145418][T24526] 9fc0: 0000000f 76f33f30 00000004 00000003 00310000 00000000 00006364 76f340bc [ 3226.145437][T24526] 9fe0: 00000158 76f33ed0 000d801c 0013022c [ 3226.402720][ T29] audit: type=1400 audit(134220954.272:505): avc: denied { read } for pid=24529 comm="syz.1.5610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3226.425878][ T29] audit: type=1400 audit(134220954.292:506): avc: denied { load_policy } for pid=24527 comm="syz.0.5609" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3226.438792][T24528] SELinux: policydb version 1112798827 does not match my version range 15-35 [ 3226.440255][T24528] SELinux: failed to load policy [ 3226.782435][ T29] audit: type=1400 audit(134220954.642:507): avc: denied { create } for pid=24533 comm="syz.0.5611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 3226.888804][ T29] audit: type=1400 audit(134220954.762:508): avc: denied { mounton } for pid=24533 comm="syz.0.5611" path="/334/file0" dev="tmpfs" ino=1757 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3227.790357][ T29] audit: type=1400 audit(134220955.662:509): avc: denied { read } for pid=24529 comm="syz.1.5610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3230.311991][ T29] audit: type=1400 audit(134220958.182:510): avc: denied { node_bind } for pid=24533 comm="syz.0.5611" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3230.777202][ T29] audit: type=1400 audit(134220958.632:511): avc: denied { lock } for pid=24544 comm="syz.1.5615" path="socket:[64202]" dev="sockfs" ino=64202 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 3231.006267][ T29] audit: type=1400 audit(134220958.872:512): avc: denied { create } for pid=24550 comm="syz.1.5616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3231.218805][ T29] audit: type=1400 audit(134220959.092:513): avc: denied { unmount } for pid=21868 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3231.238606][ T29] audit: type=1400 audit(134220959.112:514): avc: denied { getopt } for pid=24550 comm="syz.1.5616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3231.241658][ T29] audit: type=1400 audit(134220959.112:515): avc: denied { write } for pid=24550 comm="syz.1.5616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3232.937522][T24563] FAULT_INJECTION: forcing a failure. [ 3232.937522][T24563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3232.939003][T24563] CPU: 1 UID: 0 PID: 24563 Comm: syz.0.5620 Tainted: G L syzkaller #0 PREEMPT [ 3232.939108][T24563] Tainted: [L]=SOFTLOCKUP [ 3232.939130][T24563] Hardware name: ARM-Versatile Express [ 3232.939155][T24563] Call trace: [ 3232.939207][T24563] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3232.939339][T24563] r7:76f1fb58 r6:00000000 r5:60000113 r4:82295bd4 [ 3232.939361][T24563] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3232.939423][T24563] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3232.939483][T24563] r5:83eb6000 r4:8294fc90 [ 3232.939502][T24563] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3232.939575][T24563] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3232.939644][T24563] r8:b5003587 r7:76f1fb58 r6:76f1fb38 r5:edc8df58 r4:76f1fb38 [ 3232.939664][T24563] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3232.939721][T24563] [<80999e28>] (should_fail_usercopy) from [<8026a0c8>] (copy_siginfo_to_user+0x1c/0xa4) [ 3232.939787][T24563] [<8026a0ac>] (copy_siginfo_to_user) from [<8022ae08>] (do_work_pending+0x350/0x4d0) [ 3232.939864][T24563] r9:fffffe00 r8:b5003587 r7:83eb6830 r6:76f1fb38 r5:edc8dfb0 r4:83eb6000 [ 3232.939887][T24563] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3232.939943][T24563] Exception stack(0xedc8dfb0 to 0xedc8dff8) [ 3232.939986][T24563] dfa0: 00000004 20000380 00009000 00000000 [ 3232.940028][T24563] dfc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f200bc [ 3232.940066][T24563] dfe0: 76f1fec0 76f1feb0 000192bc 0013235c 60000010 00000004 [ 3232.940111][T24563] r10:00000128 r9:83eb6000 r8:8020029c r7:00000128 r6:00130308 r5:00000000 [ 3232.940134][T24563] r4:00000000 [ 3234.597800][ T29] audit: type=1400 audit(134220962.412:516): avc: denied { setopt } for pid=24568 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3234.998744][ T29] audit: type=1400 audit(134220962.852:517): avc: denied { create } for pid=24572 comm="syz.0.5623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3235.907870][ T29] audit: type=1400 audit(134220963.782:518): avc: denied { read write } for pid=24580 comm="syz.0.5625" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3235.910383][ T29] audit: type=1400 audit(134220963.782:519): avc: denied { open } for pid=24580 comm="syz.0.5625" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3235.927314][T24581] FAULT_INJECTION: forcing a failure. [ 3235.927314][T24581] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.928133][T24581] CPU: 1 UID: 0 PID: 24581 Comm: syz.0.5625 Tainted: G L syzkaller #0 PREEMPT [ 3235.928283][T24581] Tainted: [L]=SOFTLOCKUP [ 3235.928307][T24581] Hardware name: ARM-Versatile Express [ 3235.928330][T24581] Call trace: [ 3235.928369][T24581] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3235.928489][T24581] r7:00000c40 r6:00000000 r5:60000013 r4:82295bd4 [ 3235.928516][T24581] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3235.928560][T24581] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3235.928589][T24581] r5:845e2400 r4:82918a08 [ 3235.928607][T24581] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3235.928664][T24581] [<80999be8>] (should_fail_ex) from [<8053a6f8>] (should_failslab+0x6c/0x94) [ 3235.928730][T24581] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 3235.928740][T24581] [<8053a68c>] (should_failslab) from [<805152f4>] (__kmalloc_noprof+0x9c/0x568) [ 3235.928769][T24581] [<80515258>] (__kmalloc_noprof) from [<807e4348>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3235.928812][T24581] r10:845e2400 r9:84d34800 r8:00000000 r7:83534110 r6:8334ce68 r5:00001000 [ 3235.928822][T24581] r4:00000000 [ 3235.928830][T24581] [<807e430c>] (tomoyo_realpath_from_path) from [<807e048c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3235.928867][T24581] r10:845e2400 r9:00000000 r8:8334ce40 r7:00005450 r6:00000004 r5:81cd6ac0 [ 3235.928879][T24581] r4:8334ce68 r3:826c2240 [ 3235.928887][T24581] [<807e03c0>] (tomoyo_path_number_perm) from [<807e4d6c>] (tomoyo_file_ioctl+0x1c/0x20) [ 3235.928924][T24581] r9:00000003 r8:8334ce40 r7:00000000 r6:00000000 r5:00005450 r4:8334ce40 [ 3235.928933][T24581] [<807e4d50>] (tomoyo_file_ioctl) from [<80790fd8>] (security_file_ioctl+0x64/0x1e4) [ 3235.928964][T24581] [<80790f74>] (security_file_ioctl) from [<8058583c>] (sys_ioctl+0x4c/0xba0) [ 3235.929000][T24581] r7:00000000 r6:8334ce41 r5:00000000 r4:00005450 [ 3235.929009][T24581] [<805857f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3235.929035][T24581] Exception stack(0xedda9fa8 to 0xedda9ff0) [ 3235.929056][T24581] 9fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 3235.929075][T24581] 9fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76f200bc [ 3235.929090][T24581] 9fe0: 76f1fec0 76f1feb0 000192bc 00132360 [ 3235.929109][T24581] r10:00000036 r9:845e2400 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3235.929119][T24581] r4:00000000 [ 3235.967813][T24581] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3235.969687][ T29] audit: type=1400 audit(134220963.842:520): avc: denied { ioctl } for pid=24580 comm="syz.0.5625" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3236.973371][T24587] binder: 24586:24587 ioctl 400c6615 20000040 returned -22 [ 3237.198342][ T29] audit: type=1326 audit(134220965.072:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3237.886755][ T29] audit: type=1326 audit(134220965.742:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3238.896120][ T29] audit: type=1326 audit(134220966.762:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3239.460743][ T29] audit: type=1326 audit(134220967.332:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3240.849006][ T29] audit: type=1326 audit(134220968.722:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3241.012970][T24596] FAULT_INJECTION: forcing a failure. [ 3241.012970][T24596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3241.022978][T24596] CPU: 1 UID: 0 PID: 24596 Comm: syz.1.5630 Tainted: G L syzkaller #0 PREEMPT [ 3241.023119][T24596] Tainted: [L]=SOFTLOCKUP [ 3241.023141][T24596] Hardware name: ARM-Versatile Express [ 3241.023164][T24596] Call trace: [ 3241.023207][T24596] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3241.023334][T24596] r7:00000003 r6:00000000 r5:60000013 r4:82295bd4 [ 3241.023356][T24596] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3241.023408][T24596] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3241.023465][T24596] r5:845e0c00 r4:8294fc90 [ 3241.023483][T24596] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3241.023559][T24596] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3241.023629][T24596] r8:00000003 r7:00000003 r6:84ffe6c0 r5:20000040 r4:0000040b [ 3241.023649][T24596] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3241.023710][T24596] [<80999e28>] (should_fail_usercopy) from [<80584284>] (do_fcntl+0x348/0x994) [ 3241.023774][T24596] [<80583f3c>] (do_fcntl) from [<80584940>] (sys_fcntl+0x70/0xd0) [ 3241.023842][T24596] r8:00000003 r7:20000040 r6:0000040b r5:00000000 r4:84ffe6c1 [ 3241.023863][T24596] [<805848d0>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3241.023914][T24596] Exception stack(0xedd89fa8 to 0xedd89ff0) [ 3241.023954][T24596] 9fa0: 00000000 00000000 00000003 0000040b 20000040 00000000 [ 3241.023996][T24596] 9fc0: 00000000 00000000 00130308 00000037 00310000 00000000 00006364 76f340bc [ 3241.024028][T24596] 9fe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3241.024064][T24596] r9:845e0c00 r8:8020029c r7:00000037 r6:00130308 r5:00000000 r4:00000000 [ 3241.691484][ T29] audit: type=1326 audit(134220969.562:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3242.257505][ T29] audit: type=1326 audit(134220970.112:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3243.282042][ T29] audit: type=1326 audit(134220971.152:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3244.394274][ T29] audit: type=1326 audit(134220972.262:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3244.794109][T24608] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24608 comm=syz.1.5633 [ 3245.468306][ T29] audit: type=1326 audit(134220973.342:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3246.457212][ T29] audit: type=1326 audit(134220974.322:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3247.524477][ T29] audit: type=1326 audit(134220975.352:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24588 comm="syz.0.5629" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x0 [ 3249.757878][T23367] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 3249.945812][T23367] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 3249.948794][T23367] usb 2-1: config 1 has no interface number 0 [ 3249.950081][T23367] usb 2-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 3249.951233][T23367] usb 2-1: config 1 interface 7 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 3250.008321][T23367] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 3250.009723][T23367] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3250.010751][T23367] usb 2-1: Product: syz [ 3250.011126][T23367] usb 2-1: Manufacturer: syz [ 3250.011297][T23367] usb 2-1: SerialNumber: syz [ 3250.019822][T24622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3250.031104][T24622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 3250.050542][T23367] usb 2-1: Expected 3 endpoints, found: 1 [ 3250.270659][ T29] audit: type=1400 audit(134220978.142:533): avc: denied { ioctl } for pid=24620 comm="syz.1.5638" path="socket:[64416]" dev="sockfs" ino=64416 ioctlcmd=0x4161 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3255.202797][T21430] usb 2-1: USB disconnect, device number 48 [ 3256.057280][T24646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24646 comm=syz.0.5641 [ 3259.770306][ T29] audit: type=1400 audit(134220987.642:534): avc: denied { associate } for pid=24654 comm="syz.0.5645" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3260.549965][ T29] audit: type=1400 audit(134220988.422:535): avc: denied { getopt } for pid=24657 comm="syz.1.5646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3260.711192][ T29] audit: type=1400 audit(134220988.582:536): avc: denied { setopt } for pid=24657 comm="syz.1.5646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3260.966938][ T29] audit: type=1400 audit(134220988.832:537): avc: granted { setsecparam } for pid=24661 comm="syz.1.5647" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3260.988423][ T29] audit: type=1400 audit(134220988.842:538): avc: denied { map_create } for pid=24661 comm="syz.1.5647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3270.763043][ T29] audit: type=1400 audit(134220998.632:539): avc: denied { getopt } for pid=24712 comm="syz.0.5665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3274.474714][T24727] FAULT_INJECTION: forcing a failure. [ 3274.474714][T24727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3274.477743][T24727] CPU: 1 UID: 0 PID: 24727 Comm: syz.1.5670 Tainted: G L syzkaller #0 PREEMPT [ 3274.477852][T24727] Tainted: [L]=SOFTLOCKUP [ 3274.477865][T24727] Hardware name: ARM-Versatile Express [ 3274.477878][T24727] Call trace: [ 3274.477902][T24727] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3274.477969][T24727] r7:ee361e20 r6:00000000 r5:60000013 r4:82295bd4 [ 3274.477980][T24727] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3274.478008][T24727] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3274.478039][T24727] r5:8382ec00 r4:8294fc90 [ 3274.478047][T24727] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3274.478080][T24727] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3274.478115][T24727] r8:04000004 r7:ee361e20 r6:20000300 r5:00000000 r4:ee361f20 [ 3274.478124][T24727] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3274.478151][T24727] [<80999e28>] (should_fail_usercopy) from [<8159a3a4>] (copy_msghdr_from_user+0x50/0x130) [ 3274.478212][T24727] [<8159a354>] (copy_msghdr_from_user) from [<8159a4fc>] (___sys_sendmsg+0x78/0xd0) [ 3274.478544][T24727] r8:04000004 r7:00000000 r6:836d8c80 r5:ee361f20 r4:ee361e64 [ 3274.478583][T24727] [<8159a484>] (___sys_sendmsg) from [<8159a9b8>] (__sys_sendmsg+0x8c/0xe0) [ 3274.478667][T24727] r10:00000128 r9:8382ec00 r8:84fe6f00 r7:04000004 r6:20000300 r5:84fe6f01 [ 3274.478690][T24727] r4:00000003 [ 3274.478709][T24727] [<8159a92c>] (__sys_sendmsg) from [<8159aa20>] (sys_sendmsg+0x14/0x18) [ 3274.478780][T24727] r8:8020029c r7:00000128 r6:00130308 r5:00000000 r4:00000000 [ 3274.478804][T24727] [<8159aa0c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3274.478865][T24727] Exception stack(0xee361fa8 to 0xee361ff0) [ 3274.478914][T24727] 1fa0: 00000000 00000000 00000003 20000300 04000004 00000000 [ 3274.478952][T24727] 1fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f340bc [ 3274.478983][T24727] 1fe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3278.422665][ T29] audit: type=1400 audit(134221006.292:540): avc: denied { connect } for pid=24733 comm="syz.1.5672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3278.837099][T24740] FAULT_INJECTION: forcing a failure. [ 3278.837099][T24740] name failslab, interval 1, probability 0, space 0, times 0 [ 3278.837580][T24740] CPU: 0 UID: 0 PID: 24740 Comm: syz.1.5673 Tainted: G L syzkaller #0 PREEMPT [ 3278.837674][T24740] Tainted: [L]=SOFTLOCKUP [ 3278.837697][T24740] Hardware name: ARM-Versatile Express [ 3278.837721][T24740] Call trace: [ 3278.837819][T24740] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3278.837966][T24740] r7:00000000 r6:00000000 r5:60000113 r4:82295bd4 [ 3278.837993][T24740] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3278.838089][T24740] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3278.838289][T24740] r5:83eb6000 r4:82918a08 [ 3278.838323][T24740] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3278.838402][T24740] [<80999be8>] (should_fail_ex) from [<8053a6f8>] (should_failslab+0x6c/0x94) [ 3278.838574][T24740] r8:83eb6000 r7:00000000 r6:00000cc0 r5:8603dbe0 r4:83002d80 [ 3278.838607][T24740] [<8053a68c>] (should_failslab) from [<80519ba0>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 3278.838682][T24740] [<80519b54>] (kmem_cache_alloc_noprof) from [<804f06e8>] (__anon_vma_prepare+0xf0/0x1b0) [ 3278.838794][T24740] r10:00000000 r9:20000000 r8:82acd5d8 r7:858312c0 r6:84b63d00 r5:8603dbe0 [ 3278.838835][T24740] r4:00000000 [ 3278.838855][T24740] [<804f05f8>] (__anon_vma_prepare) from [<804d674c>] (__vmf_anon_prepare+0x5c/0xcc) [ 3278.838938][T24740] r10:00000000 r9:20000000 r8:84bfbb00 r7:00000001 r6:84b63d00 r5:84b63d00 [ 3278.838969][T24740] r4:ee36dd20 r3:00000215 [ 3278.839025][T24740] [<804d66f0>] (__vmf_anon_prepare) from [<804d6878>] (do_anonymous_page+0xbc/0x5c4) [ 3278.839112][T24740] r7:00000001 r6:84b63d00 r5:83eb6000 r4:ee36dd20 [ 3278.839136][T24740] [<804d67bc>] (do_anonymous_page) from [<804daf88>] (handle_mm_fault+0x584/0x6a4) [ 3278.839216][T24740] r10:00000000 r9:858312c0 r8:84bfbb00 r7:ee36de48 r6:20000000 r5:83eb6000 [ 3278.839240][T24740] r4:00000215 [ 3278.839259][T24740] [<804daa04>] (handle_mm_fault) from [<80233704>] (do_page_fault+0xf0/0x4b4) [ 3278.839337][T24740] r10:00000002 r9:858312c0 r8:00000215 r7:20000000 r6:00000a06 r5:200000c0 [ 3278.839360][T24740] r4:ee36de48 [ 3278.839375][T24740] [<80233614>] (do_page_fault) from [<80233bc8>] (do_translation_fault+0x100/0x130) [ 3278.839457][T24740] r10:00000064 r9:83eb6000 r8:80233ac8 r7:ee36de48 r6:200000c0 r5:00000a06 [ 3278.839484][T24740] r4:8281d080 [ 3278.839504][T24740] [<80233ac8>] (do_translation_fault) from [<80233c9c>] (do_DataAbort+0x38/0xa8) [ 3278.839580][T24740] r9:83eb6000 r8:80233ac8 r7:ee36de48 r6:200000c0 r5:00000a06 r4:8281d080 [ 3278.839604][T24740] [<80233c64>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 3278.839662][T24740] Exception stack(0xee36de48 to 0xee36de90) [ 3278.839712][T24740] de40: 200000c0 ee36dee4 ffffffa0 09041934 00001000 00000000 [ 3278.839768][T24740] de60: 00000000 00000000 00000000 00000000 00000064 ee36df2c 00000000 ee36de9c [ 3278.839806][T24740] de80: 0000000e 81a7fc00 a0000013 ffffffff [ 3278.839931][T24740] r8:00000000 r7:ee36de7c r6:ffffffff r5:a0000013 r4:81a7fc00 [ 3278.840002][T24740] [<805bbb7c>] (do_statfs_native) from [<805bbfa8>] (sys_fstatfs+0x78/0x80) [ 3278.840370][T24740] r8:8020029c r7:00000064 r6:00130308 r5:200000c0 r4:00000003 [ 3278.840404][T24740] [<805bbf30>] (sys_fstatfs) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3278.840639][T24740] Exception stack(0xee36dfa8 to 0xee36dff0) [ 3278.840915][T24740] dfa0: 00000000 00000000 00000003 200000c0 00000000 00000000 [ 3278.841203][T24740] dfc0: 00000000 00000000 00130308 00000064 00310000 00000000 00006364 76f340bc [ 3278.841251][T24740] dfe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3278.841382][T24740] r5:00000000 r4:00000000 [ 3287.780480][ T29] audit: type=1400 audit(134221015.652:541): avc: denied { ioctl } for pid=24771 comm="syz.1.5685" path="socket:[65067]" dev="sockfs" ino=65067 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3294.779385][ T29] audit: type=1400 audit(134221022.652:542): avc: denied { write } for pid=24792 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3294.782897][ T29] audit: type=1400 audit(134221022.652:543): avc: denied { open } for pid=24792 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3294.804204][ T29] audit: type=1400 audit(134221022.672:544): avc: denied { search } for pid=24792 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.818822][ T29] audit: type=1400 audit(134221022.692:545): avc: denied { search } for pid=24792 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.821029][ T29] audit: type=1400 audit(134221022.692:546): avc: denied { search } for pid=24792 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.822827][ T29] audit: type=1400 audit(134221022.692:547): avc: denied { search } for pid=24792 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.856964][ T29] audit: type=1400 audit(134221022.722:548): avc: denied { read open } for pid=24794 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.860245][ T29] audit: type=1400 audit(134221022.732:549): avc: denied { getattr } for pid=24794 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.977095][ T29] audit: type=1400 audit(134221022.842:550): avc: denied { add_name } for pid=24792 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3294.979059][ T29] audit: type=1400 audit(134221022.842:551): avc: denied { create } for pid=24792 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3300.074729][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 3300.078585][ T29] audit: type=1400 audit(134221027.942:562): avc: denied { ioctl } for pid=24806 comm="syz.0.5694" path="socket:[65764]" dev="sockfs" ino=65764 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3300.101195][ T29] audit: type=1400 audit(134221027.972:563): avc: denied { write } for pid=24806 comm="syz.0.5694" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 3300.217327][ T29] audit: type=1400 audit(134221028.082:564): avc: denied { connect } for pid=24805 comm="syz.1.5695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3301.747333][ T3684] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 3301.907123][ T3684] usb 1-1: Using ep0 maxpacket: 16 [ 3302.097128][ T3684] usb 1-1: unable to get BOS descriptor or descriptor too short [ 3302.174471][ T3684] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3302.175339][ T3684] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 3302.178262][ T3684] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 16 [ 3302.230035][ T3684] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 3302.230255][ T3684] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3302.231430][ T3684] usb 1-1: Product: syz [ 3302.231554][ T3684] usb 1-1: Manufacturer: syz [ 3302.231577][ T3684] usb 1-1: SerialNumber: syz [ 3302.634172][ T3684] cdc_ncm 1-1:1.0: bind() failure [ 3302.642212][ T3684] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 3302.642647][ T3684] cdc_ncm 1-1:1.1: bind() failure [ 3302.657784][ T3684] usb 1-1: USB disconnect, device number 40 [ 3305.069892][T24843] FAULT_INJECTION: forcing a failure. [ 3305.069892][T24843] name failslab, interval 1, probability 0, space 0, times 0 [ 3305.130022][T24843] CPU: 0 UID: 0 PID: 24843 Comm: syz.1.5702 Tainted: G L syzkaller #0 PREEMPT [ 3305.130198][T24843] Tainted: [L]=SOFTLOCKUP [ 3305.130221][T24843] Hardware name: ARM-Versatile Express [ 3305.130248][T24843] Call trace: [ 3305.130301][T24843] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3305.130643][T24843] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3305.130671][T24843] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3305.130727][T24843] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3305.130885][T24843] r5:845e5400 r4:82918a08 [ 3305.130903][T24843] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3305.130980][T24843] [<80999be8>] (should_fail_ex) from [<8053a6f8>] (should_failslab+0x6c/0x94) [ 3305.131050][T24843] r8:845e5400 r7:00000000 r6:00000cc0 r5:ee7b9bf8 r4:830a1b40 [ 3305.131069][T24843] [<8053a68c>] (should_failslab) from [<80519fe8>] (kmem_cache_alloc_lru_noprof+0x50/0x448) [ 3305.131129][T24843] [<80519f98>] (kmem_cache_alloc_lru_noprof) from [<8058a0b4>] (__d_alloc+0x30/0x21c) [ 3305.131223][T24843] r10:82ae3fb4 r9:82499924 r8:834e47f8 r7:8339c400 r6:83571730 r5:ee7b9bf8 [ 3305.131253][T24843] r4:834e47f8 [ 3305.131269][T24843] [<8058a084>] (__d_alloc) from [<8058a2b8>] (d_alloc+0x18/0x68) [ 3305.131339][T24843] r9:81d0dd20 r8:834e47f8 r7:ee7b9bf8 r6:83571730 r5:00060000 r4:834e47f8 [ 3305.131390][T24843] [<8058a2a0>] (d_alloc) from [<80579c44>] (lookup_one_qstr_excl+0x7c/0xcc) [ 3305.131468][T24843] r7:ee7b9bf8 r6:83571730 r5:00060000 r4:00000000 [ 3305.131489][T24843] [<80579bc8>] (lookup_one_qstr_excl) from [<8057ff50>] (start_dirop+0x38/0x5c) [ 3305.131562][T24843] r9:81d0dd20 r8:845e5400 r7:00060000 r6:ee7b9bf8 r5:835717b0 r4:834e47f8 [ 3305.131587][T24843] [<8057ff18>] (start_dirop) from [<805a7ce0>] (simple_start_creating+0x6c/0x90) [ 3305.131652][T24843] r7:ee7b9cdc r6:82ae3fb4 r5:834e47f8 r4:ee7b9cdc [ 3305.131674][T24843] [<805a7c74>] (simple_start_creating) from [<80769c04>] (debugfs_start_creating.part.0+0x5c/0xf4) [ 3305.131737][T24843] r5:834e47f8 r4:00000000 [ 3305.131754][T24843] [<80769ba8>] (debugfs_start_creating.part.0) from [<80769f84>] (__debugfs_create_file+0x90/0x1d4) [ 3305.131815][T24843] r7:81ccf610 r6:00000001 r5:00008100 r4:863f1b50 [ 3305.131838][T24843] [<80769ef4>] (__debugfs_create_file) from [<8076a0f8>] (debugfs_create_file_full+0x30/0x38) [ 3305.131911][T24843] r10:845e5400 r9:00000001 r8:00000001 r7:81983920 r6:00000001 r5:00000001 [ 3305.131935][T24843] r4:863f1b50 [ 3305.131952][T24843] [<8076a0c8>] (debugfs_create_file_full) from [<809a2040>] (ref_tracker_dir_debugfs+0xe4/0x188) [ 3305.132006][T24843] [<809a1f5c>] (ref_tracker_dir_debugfs) from [<815c87d0>] (alloc_netdev_mqs+0xc4/0x49c) [ 3305.132065][T24843] r5:00000001 r4:863f1800 [ 3305.132087][T24843] [<815c870c>] (alloc_netdev_mqs) from [<81981ea4>] (vlan_ioctl_handler+0x3a8/0x49c) [ 3305.132171][T24843] r10:845e5400 r9:00000001 r8:85c3e000 r7:84cfbe00 r6:00000002 r5:00000002 [ 3305.132199][T24843] r4:00000000 [ 3305.132219][T24843] [<81981afc>] (vlan_ioctl_handler) from [<81598b64>] (sock_ioctl+0x1f8/0x600) [ 3305.132312][T24843] r9:00000003 r8:86005300 r7:8507db80 r6:84cfbe00 r5:20000000 r4:82c2fccc [ 3305.132335][T24843] [<8159896c>] (sock_ioctl) from [<80585920>] (sys_ioctl+0x130/0xba0) [ 3305.132408][T24843] r9:00000003 r8:86005300 r7:20000000 r6:86005301 r5:00000000 r4:00008983 [ 3305.132445][T24843] [<805857f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3305.132509][T24843] Exception stack(0xee7b9fa8 to 0xee7b9ff0) [ 3305.132557][T24843] 9fa0: 00000000 00000000 00000003 00008983 20000000 00000000 [ 3305.132597][T24843] 9fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76f340bc [ 3305.132627][T24843] 9fe0: 76f33ec0 76f33eb0 000192bc 00132360 [ 3305.132667][T24843] r10:00000036 r9:845e5400 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3305.132689][T24843] r4:00000000 [ 3307.800649][ T29] audit: type=1400 audit(134221035.672:565): avc: denied { create } for pid=24850 comm="syz.0.5704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 3318.138920][T24888] FAULT_INJECTION: forcing a failure. [ 3318.138920][T24888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3318.150593][T24888] CPU: 1 UID: 0 PID: 24888 Comm: syz.1.5715 Tainted: G L syzkaller #0 PREEMPT [ 3318.150724][T24888] Tainted: [L]=SOFTLOCKUP [ 3318.150736][T24888] Hardware name: ARM-Versatile Express [ 3318.150749][T24888] Call trace: [ 3318.150772][T24888] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3318.150884][T24888] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3318.150909][T24888] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3318.150964][T24888] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3318.150996][T24888] r5:845e3c00 r4:8294fc90 [ 3318.151005][T24888] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3318.151039][T24888] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3318.151074][T24888] r8:8020029c r7:00000000 r6:82499930 r5:20002040 r4:20002040 [ 3318.151084][T24888] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3318.151112][T24888] [<80999e28>] (should_fail_usercopy) from [<8099fea4>] (strncpy_from_user+0x20/0x1a0) [ 3318.151155][T24888] [<8099fe84>] (strncpy_from_user) from [<80579e10>] (getname_flags.part.0+0x44/0x18c) [ 3318.151195][T24888] r10:00000143 r9:845e3c00 r8:8020029c r7:00000000 r6:82499930 r5:20002040 [ 3318.151206][T24888] r4:832e7000 [ 3318.151215][T24888] [<80579dcc>] (getname_flags.part.0) from [<8057f928>] (getname_flags+0x3c/0x50) [ 3318.151260][T24888] r9:845e3c00 r8:8020029c r7:00000143 r6:00130308 r5:00000000 r4:20002040 [ 3318.151271][T24888] [<8057f8ec>] (getname_flags) from [<805826d8>] (sys_mkdirat+0x24/0x38) [ 3318.151303][T24888] r5:00000164 r4:ffffff9c [ 3318.151312][T24888] [<805826b4>] (sys_mkdirat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3318.151338][T24888] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 3318.151361][T24888] dfa0: 00000000 00000000 ffffff9c 20002040 00000164 00000000 [ 3318.151381][T24888] dfc0: 00000000 00000000 00130308 00000143 00310000 00000000 00006364 76ed10bc [ 3318.151397][T24888] dfe0: 76ed0ec0 76ed0eb0 000192bc 00132360 [ 3318.151411][T24888] r5:00000000 r4:00000000 [ 3334.874676][ T29] audit: type=1400 audit(134221062.722:566): avc: denied { read } for pid=24941 comm="syz.0.5736" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3335.394370][ T29] audit: type=1400 audit(134221063.262:567): avc: denied { setattr } for pid=24941 comm="syz.0.5736" name="L2TP/IP" dev="sockfs" ino=65975 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3350.130459][ T29] audit: type=1400 audit(134221078.002:568): avc: denied { read } for pid=24997 comm="syz.1.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3350.659825][T24999] FAULT_INJECTION: forcing a failure. [ 3350.659825][T24999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3350.670388][T24999] CPU: 1 UID: 0 PID: 24999 Comm: syz.1.5754 Tainted: G L syzkaller #0 PREEMPT [ 3350.670554][T24999] Tainted: [L]=SOFTLOCKUP [ 3350.670581][T24999] Hardware name: ARM-Versatile Express [ 3350.670606][T24999] Call trace: [ 3350.670652][T24999] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3350.670779][T24999] r7:dfde5e20 r6:00000000 r5:60000013 r4:82295bd4 [ 3350.670802][T24999] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3350.670859][T24999] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3350.670917][T24999] r5:83811800 r4:8294fc90 [ 3350.670935][T24999] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3350.671003][T24999] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3350.671076][T24999] r8:00000014 r7:dfde5e20 r6:20000340 r5:00000000 r4:dfde5f20 [ 3350.671098][T24999] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3350.671160][T24999] [<80999e28>] (should_fail_usercopy) from [<8159a3a4>] (copy_msghdr_from_user+0x50/0x130) [ 3350.671231][T24999] [<8159a354>] (copy_msghdr_from_user) from [<8159a4fc>] (___sys_sendmsg+0x78/0xd0) [ 3350.671317][T24999] r8:00000014 r7:00000000 r6:836f6000 r5:dfde5f20 r4:dfde5e64 [ 3350.671340][T24999] [<8159a484>] (___sys_sendmsg) from [<8159a9b8>] (__sys_sendmsg+0x8c/0xe0) [ 3350.671416][T24999] r10:00000128 r9:83811800 r8:8660ee40 r7:00000014 r6:20000340 r5:8660ee41 [ 3350.671441][T24999] r4:00000004 [ 3350.671460][T24999] [<8159a92c>] (__sys_sendmsg) from [<8159aa20>] (sys_sendmsg+0x14/0x18) [ 3350.671534][T24999] r8:8020029c r7:00000128 r6:00130308 r5:00000000 r4:00000000 [ 3350.671555][T24999] [<8159aa0c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3350.671612][T24999] Exception stack(0xdfde5fa8 to 0xdfde5ff0) [ 3350.671659][T24999] 5fa0: 00000000 00000000 00000004 20000340 00000014 00000000 [ 3350.671703][T24999] 5fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f130bc [ 3350.671735][T24999] 5fe0: 76f12ec0 76f12eb0 000192bc 00132360 [ 3358.367569][ T29] audit: type=1400 audit(134221086.232:569): avc: denied { write } for pid=25022 comm="syz.1.5763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3359.091927][ T29] audit: type=1400 audit(134221086.962:570): avc: denied { accept } for pid=25022 comm="syz.1.5763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3359.874066][T25027] FAULT_INJECTION: forcing a failure. [ 3359.874066][T25027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3359.886704][T25027] CPU: 1 UID: 0 PID: 25027 Comm: syz.0.5764 Tainted: G L syzkaller #0 PREEMPT [ 3359.886800][T25027] Tainted: [L]=SOFTLOCKUP [ 3359.886810][T25027] Hardware name: ARM-Versatile Express [ 3359.886825][T25027] Call trace: [ 3359.886848][T25027] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3359.886920][T25027] r7:20000880 r6:00000000 r5:60000113 r4:82295bd4 [ 3359.886930][T25027] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3359.886958][T25027] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3359.886989][T25027] r5:85f38c00 r4:8294fc90 [ 3359.886997][T25027] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3359.887030][T25027] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3359.887064][T25027] r8:00000000 r7:20000880 r6:86787200 r5:00000000 r4:e03a5e68 [ 3359.887073][T25027] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3359.887101][T25027] [<80999e28>] (should_fail_usercopy) from [<808d8d4c>] (_copy_from_iter+0x6c/0x7d8) [ 3359.887133][T25027] [<808d8ce0>] (_copy_from_iter) from [<816ca5a0>] (netlink_sendmsg+0x18c/0x444) [ 3359.887172][T25027] r10:00000000 r9:00000000 r8:e03a5e78 r7:84d37000 r6:00000118 r5:85d9acc0 [ 3359.887183][T25027] r4:e03a5e68 [ 3359.887192][T25027] [<816ca414>] (netlink_sendmsg) from [<815976b4>] (__sock_sendmsg+0x44/0x78) [ 3359.887230][T25027] r10:81e4b200 r9:20000880 r8:00000000 r7:836d8c80 r6:836d8c80 r5:e03a5e68 [ 3359.887241][T25027] r4:00000000 [ 3359.887249][T25027] [<81597670>] (__sock_sendmsg) from [<815977a0>] (sock_write_iter+0xb8/0x104) [ 3359.887295][T25027] r7:836d8c80 r6:86005cc0 r5:e03a5f08 r4:e03a5ef0 [ 3359.887304][T25027] [<815976e8>] (sock_write_iter) from [<8056b4dc>] (vfs_write+0x3a4/0x44c) [ 3359.887338][T25027] r7:85f38c00 r6:00000118 r5:86005cc0 r4:00004004 [ 3359.887348][T25027] [<8056b138>] (vfs_write) from [<8056b748>] (ksys_write+0xc8/0xe8) [ 3359.887380][T25027] r10:00000004 r9:85f38c00 r8:8020029c r7:00000118 r6:20000880 r5:86005cc0 [ 3359.887391][T25027] r4:86005cc1 [ 3359.887399][T25027] [<8056b680>] (ksys_write) from [<8056b778>] (sys_write+0x10/0x14) [ 3359.887429][T25027] r7:00000004 r6:00130308 r5:00000000 r4:00000000 [ 3359.887437][T25027] [<8056b768>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3359.887462][T25027] Exception stack(0xe03a5fa8 to 0xe03a5ff0) [ 3359.887484][T25027] 5fa0: 00000000 00000000 00000003 20000880 00000118 00000000 [ 3359.887507][T25027] 5fc0: 00000000 00000000 00130308 00000004 00310000 00000000 00006364 76f200bc [ 3359.887522][T25027] 5fe0: 76f1fec0 76f1feb0 000192bc 00132360 [ 3365.124571][ T29] audit: type=1400 audit(134221092.992:571): avc: denied { accept } for pid=25042 comm="syz.1.5771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3371.097793][T25060] FAULT_INJECTION: forcing a failure. [ 3371.097793][T25060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3371.099769][T25060] CPU: 1 UID: 0 PID: 25060 Comm: syz.1.5776 Tainted: G L syzkaller #0 PREEMPT [ 3371.099894][T25060] Tainted: [L]=SOFTLOCKUP [ 3371.099919][T25060] Hardware name: ARM-Versatile Express [ 3371.099944][T25060] Call trace: [ 3371.099990][T25060] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3371.100106][T25060] r7:b5403587 r6:00000000 r5:60000013 r4:82295bd4 [ 3371.100130][T25060] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3371.100193][T25060] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3371.100257][T25060] r5:843e0c00 r4:8294fc90 [ 3371.100278][T25060] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3371.100351][T25060] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3371.100431][T25060] r8:00000000 r7:b5403587 r6:76f33ca0 r5:00000000 r4:e84e5f0c [ 3371.100454][T25060] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3371.100528][T25060] [<80999e28>] (should_fail_usercopy) from [<8022a4a8>] (restore_vfp_context+0x3c/0xe0) [ 3371.100596][T25060] [<8022a46c>] (restore_vfp_context) from [<8022a9d0>] (restore_sigframe+0x1fc/0x210) [ 3371.100659][T25060] r6:76f33ca0 r5:00000000 r4:e84e5fb0 [ 3371.100678][T25060] [<8022a7d4>] (restore_sigframe) from [<8022aa88>] (sys_rt_sigreturn+0x44/0x74) [ 3371.100750][T25060] r7:000000ad r6:00130308 r5:76f33b38 r4:e84e5fb0 [ 3371.100772][T25060] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3371.100830][T25060] Exception stack(0xe84e5fa8 to 0xe84e5ff0) [ 3371.100877][T25060] 5fa0: 00000000 00000000 00000003 200005c0 04000085 00000000 [ 3371.100922][T25060] 5fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f340bc [ 3371.100956][T25060] 5fe0: 76f33ec0 76f33eb0 000192bc 0013235c [ 3371.100986][T25060] r5:00000000 r4:00000000 [ 3371.748256][ T29] audit: type=1400 audit(134221099.622:572): avc: denied { create } for pid=25063 comm="syz.0.5777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 3377.648574][T25079] FAULT_INJECTION: forcing a failure. [ 3377.648574][T25079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3377.650260][T25079] CPU: 1 UID: 0 PID: 25079 Comm: syz.0.5782 Tainted: G L syzkaller #0 PREEMPT [ 3377.650347][T25079] Tainted: [L]=SOFTLOCKUP [ 3377.650359][T25079] Hardware name: ARM-Versatile Express [ 3377.650373][T25079] Call trace: [ 3377.650396][T25079] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3377.650469][T25079] r7:83e88400 r6:00000000 r5:60000013 r4:82295bd4 [ 3377.650481][T25079] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3377.650512][T25079] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3377.650543][T25079] r5:86060000 r4:8294fc90 [ 3377.650552][T25079] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3377.650586][T25079] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3377.650635][T25079] r8:81d39e00 r7:83e88400 r6:c0086401 r5:00000008 r4:00000008 [ 3377.650646][T25079] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3377.650687][T25079] [<80999e28>] (should_fail_usercopy) from [<80af9c50>] (drm_ioctl+0x1c8/0x5b0) [ 3377.650751][T25079] [<80af9a88>] (drm_ioctl) from [<80585920>] (sys_ioctl+0x130/0xba0) [ 3377.650849][T25079] r10:86060000 r9:00000003 r8:86005600 r7:20000680 r6:86005601 r5:00000000 [ 3377.650882][T25079] r4:c0086401 [ 3377.650903][T25079] [<805857f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3377.650965][T25079] Exception stack(0xea551fa8 to 0xea551ff0) [ 3377.651012][T25079] 1fa0: 00000000 00000000 00000003 c0086401 20000680 00000000 [ 3377.651055][T25079] 1fc0: 00000000 00000000 00130308 00000036 00310000 00000000 00006364 76f200bc [ 3377.651091][T25079] 1fe0: 76f1fec0 76f1feb0 000192bc 00132360 [ 3377.651124][T25079] r10:00000036 r9:86060000 r8:8020029c r7:00000036 r6:00130308 r5:00000000 [ 3377.651139][T25079] r4:00000000 [ 3378.599147][T25081] FAULT_INJECTION: forcing a failure. [ 3378.599147][T25081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3378.611275][T25081] CPU: 1 UID: 0 PID: 25081 Comm: syz.0.5783 Tainted: G L syzkaller #0 PREEMPT [ 3378.611452][T25081] Tainted: [L]=SOFTLOCKUP [ 3378.611477][T25081] Hardware name: ARM-Versatile Express [ 3378.611520][T25081] Call trace: [ 3378.611572][T25081] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3378.611689][T25081] r7:b5403587 r6:00000000 r5:60000113 r4:82295bd4 [ 3378.611711][T25081] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3378.611770][T25081] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3378.611832][T25081] r5:86066000 r4:8294fc90 [ 3378.611851][T25081] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3378.611919][T25081] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3378.611991][T25081] r8:00000000 r7:b5403587 r6:00000000 r5:86066830 r4:76f1fbb8 [ 3378.612011][T25081] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3378.612069][T25081] [<80999e28>] (should_fail_usercopy) from [<8022a734>] (setup_sigframe+0x124/0x1c4) [ 3378.612132][T25081] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3378.612206][T25081] r10:b5403587 r9:76f1fbb8 r8:00000000 r7:86066830 r6:76f1fb38 r5:e447dfb0 [ 3378.612231][T25081] r4:86066000 [ 3378.612250][T25081] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3378.612312][T25081] Exception stack(0xe447dfb0 to 0xe447dff8) [ 3378.612356][T25081] dfa0: 00000003 20002840 00000800 00000000 [ 3378.612399][T25081] dfc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f200bc [ 3378.612437][T25081] dfe0: 76f1fec0 76f1feb0 000192bc 0013235c 60000010 00000003 [ 3378.612481][T25081] r10:00000128 r9:86066000 r8:8020029c r7:00000128 r6:00130308 r5:00000000 [ 3378.612513][T25081] r4:00000000 [ 3384.172736][T25110] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25110 comm=syz.0.5792 [ 3393.087994][ T29] audit: type=1400 audit(134221120.902:573): avc: denied { write } for pid=25146 comm="syz.1.5803" name="ip_tables_names" dev="proc" ino=4026532780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3394.738842][T25153] tmpfs: Unknown parameter 'usrquotaÀ' [ 3418.643276][ T29] audit: type=1400 audit(134221146.512:574): avc: denied { execute } for pid=25230 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3418.650943][ T29] audit: type=1400 audit(134221146.522:575): avc: denied { execute_no_trans } for pid=25230 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3418.726077][ T29] audit: type=1400 audit(134221146.592:576): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3418.884529][T16231] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3418.940821][T16231] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3419.029267][T16231] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3419.080137][T16231] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3419.372063][T16231] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3419.391855][T16231] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3419.398848][T16231] bond0 (unregistering): Released all slaves [ 3419.494394][T16231] hsr_slave_0: left promiscuous mode [ 3419.496218][T16231] hsr_slave_1: left promiscuous mode [ 3419.517367][T16231] veth1_macvtap: left promiscuous mode [ 3419.517640][T16231] veth0_macvtap: left promiscuous mode [ 3419.517899][T16231] veth1_vlan: left promiscuous mode [ 3419.517984][T16231] veth0_vlan: left promiscuous mode [ 3422.551463][T25233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3422.562106][T25233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3423.522679][T25233] hsr_slave_0: entered promiscuous mode [ 3423.523671][T25233] hsr_slave_1: entered promiscuous mode [ 3426.747450][T25313] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 3426.759797][T25233] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3426.771127][T25233] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3426.789532][T25233] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3426.803553][T25233] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3427.612269][T25233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3432.210026][T25628] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=521 sclass=netlink_audit_socket pid=25628 comm=syz.0.5837 [ 3432.242670][T25628] FAULT_INJECTION: forcing a failure. [ 3432.242670][T25628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3432.243196][T25628] CPU: 0 UID: 0 PID: 25628 Comm: syz.0.5837 Tainted: G L syzkaller #0 PREEMPT [ 3432.243312][T25628] Tainted: [L]=SOFTLOCKUP [ 3432.243335][T25628] Hardware name: ARM-Versatile Express [ 3432.243364][T25628] Call trace: [ 3432.243408][T25628] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3432.243668][T25628] r7:200004c0 r6:00000000 r5:60000013 r4:82295bd4 [ 3432.243742][T25628] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3432.243842][T25628] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3432.243925][T25628] r5:83eb6000 r4:8294fc90 [ 3432.244031][T25628] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3432.244267][T25628] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3432.244477][T25628] r8:00000000 r7:200004c0 r6:84eb3200 r5:00000000 r4:00000058 [ 3432.244507][T25628] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3432.244577][T25628] [<80999e28>] (should_fail_usercopy) from [<808d8420>] (_copy_to_iter+0x6c/0x7a8) [ 3432.244718][T25628] [<808d83b4>] (_copy_to_iter) from [<815b3c08>] (simple_copy_to_iter+0x2c/0x84) [ 3432.244811][T25628] r10:00000058 r9:00002000 r8:00000058 r7:00000000 r6:00000000 r5:eafa9e78 [ 3432.244986][T25628] r4:00000058 [ 3432.245262][T25628] [<815b3bdc>] (simple_copy_to_iter) from [<815b3e7c>] (__skb_datagram_iter+0x64/0x3c4) [ 3432.245339][T25628] r5:00000058 r4:00000058 [ 3432.245425][T25628] [<815b3e18>] (__skb_datagram_iter) from [<815b425c>] (skb_copy_datagram_iter+0x4c/0xfc) [ 3432.245697][T25628] r10:00000058 r9:00002000 r8:836f2c80 r7:eafa9e78 r6:00000000 r5:00000058 [ 3432.245732][T25628] r4:865d4c00 [ 3432.245754][T25628] [<815b4210>] (skb_copy_datagram_iter) from [<816c8a64>] (netlink_recvmsg+0xb8/0x27c) [ 3432.245880][T25628] r9:00002000 r8:836f2c80 r7:00000000 r6:eafa9e68 r5:865d4c00 r4:85981000 [ 3432.245943][T25628] [<816c89ac>] (netlink_recvmsg) from [<81597378>] (sock_recvmsg+0x50/0x78) [ 3432.246098][T25628] r10:00000001 r9:00004004 r8:200004c0 r7:00000000 r6:836f2c80 r5:eafa9e68 [ 3432.246128][T25628] r4:816c89ac [ 3432.246238][T25628] [<81597328>] (sock_recvmsg) from [<81597444>] (sock_read_iter+0xa4/0xfc) [ 3432.246598][T25628] r7:836f2c80 r6:86621d80 r5:eafa9f08 r4:eafa9ef0 [ 3432.246631][T25628] [<815973a0>] (sock_read_iter) from [<8056ab4c>] (vfs_read+0x2fc/0x324) [ 3432.246708][T25628] r7:00000000 r6:83eb6000 r5:00002000 r4:86621d80 [ 3432.246731][T25628] [<8056a850>] (vfs_read) from [<8056b64c>] (ksys_read+0xc8/0xe8) [ 3432.246801][T25628] r10:00000003 r9:83eb6000 r8:8020029c r7:00002000 r6:200004c0 r5:86621d80 [ 3432.246827][T25628] r4:86621d80 [ 3432.246849][T25628] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3432.246949][T25628] r7:00000003 r6:00000003 r5:200004c0 r4:00002000 [ 3432.246971][T25628] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3432.247026][T25628] Exception stack(0xeafa9fa8 to 0xeafa9ff0) [ 3432.247075][T25628] 9fa0: 00002000 200004c0 00000003 200004c0 00002000 00000000 [ 3432.247119][T25628] 9fc0: 00002000 200004c0 00000003 00000003 00310000 00000000 00006364 76f200bc [ 3432.247155][T25628] 9fe0: 00000158 76f1fe80 000d801c 0013022c [ 3432.536960][T25233] veth0_vlan: entered promiscuous mode [ 3432.558757][T25233] veth1_vlan: entered promiscuous mode [ 3432.691964][T25233] veth0_macvtap: entered promiscuous mode [ 3432.721168][T25233] veth1_macvtap: entered promiscuous mode [ 3432.830194][T16231] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3432.831041][T24286] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3432.831209][T24286] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3432.831289][T24286] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3433.023204][ T29] audit: type=1400 audit(134221160.892:577): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/syzkaller.0YHde7/syz-tmp" dev="vda" ino=824 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3433.034880][ T29] audit: type=1400 audit(134221160.902:578): avc: denied { mount } for pid=25233 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3433.044658][ T29] audit: type=1400 audit(134221160.912:579): avc: denied { mount } for pid=25233 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3433.063626][ T29] audit: type=1400 audit(134221160.932:580): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/syzkaller.0YHde7/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3433.073379][ T29] audit: type=1400 audit(134221160.942:581): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/syzkaller.0YHde7/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=67656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3433.087970][ T29] audit: type=1400 audit(134221160.962:582): avc: denied { unmount } for pid=25233 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3433.092579][ T29] audit: type=1400 audit(134221160.962:583): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3433.095431][ T29] audit: type=1400 audit(134221160.962:584): avc: denied { mount } for pid=25233 comm="syz-executor" name="/" dev="gadgetfs" ino=3148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3433.102604][ T29] audit: type=1400 audit(134221160.972:585): avc: denied { mount } for pid=25233 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3433.105563][ T29] audit: type=1400 audit(134221160.972:586): avc: denied { mounton } for pid=25233 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3434.409233][T25653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25653 comm=syz.1.5841 [ 3434.764437][T25650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25650 comm=syz.0.5839 [ 3437.788339][T25683] FAULT_INJECTION: forcing a failure. [ 3437.788339][T25683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3437.797749][T25683] CPU: 1 UID: 0 PID: 25683 Comm: syz.1.5849 Tainted: G L syzkaller #0 PREEMPT [ 3437.797933][T25683] Tainted: [L]=SOFTLOCKUP [ 3437.797959][T25683] Hardware name: ARM-Versatile Express [ 3437.797987][T25683] Call trace: [ 3437.798033][T25683] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3437.798161][T25683] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3437.798185][T25683] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3437.798246][T25683] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3437.798320][T25683] r5:8321a400 r4:8294fc90 [ 3437.798339][T25683] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3437.798401][T25683] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3437.798478][T25683] r8:76f70f30 r7:00000000 r6:00000000 r5:eb1d5f68 r4:00000002 [ 3437.798500][T25683] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3437.798562][T25683] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3437.798626][T25683] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3437.798704][T25683] r10:00000001 r9:80624eec r8:00000002 r7:eb1d5f68 r6:0000000f r5:76f70f30 [ 3437.798732][T25683] r4:8321a400 r3:eb1d5e9f [ 3437.798752][T25683] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3437.798821][T25683] r8:76f70f30 r7:eb1d5f68 r6:8321a400 r5:0000000f r4:86621a80 [ 3437.798842][T25683] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3437.798906][T25683] r10:00000003 r9:8321a400 r8:8020029c r7:00000000 r6:00000000 r5:86621a80 [ 3437.798932][T25683] r4:86621a83 [ 3437.798948][T25683] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3437.799009][T25683] r7:00000003 r6:00000004 r5:76f70f30 r4:0000000f [ 3437.799029][T25683] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3437.799080][T25683] Exception stack(0xeb1d5fa8 to 0xeb1d5ff0) [ 3437.799123][T25683] 5fa0: 0000000f 76f70f30 00000004 76f70f30 0000000f 00000000 [ 3437.799163][T25683] 5fc0: 0000000f 76f70f30 00000004 00000003 00310000 00000000 00006364 76f710bc [ 3437.799195][T25683] 5fe0: 00000158 76f70ed0 000d801c 0013022c [ 3438.733929][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 3438.735610][ T29] audit: type=1400 audit(134221166.602:588): avc: denied { create } for pid=25687 comm="syz.1.5852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3439.449735][ T29] audit: type=1400 audit(134221167.322:589): avc: denied { relabelto } for pid=25696 comm="syz.1.5854" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 3439.451594][ T29] audit: type=1400 audit(134221167.322:590): avc: denied { associate } for pid=25696 comm="syz.1.5854" name="dsp" dev="devtmpfs" ino=727 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:apt_var_lib_t:s0" [ 3448.107677][ T29] audit: type=1400 audit(134221175.972:591): avc: denied { getopt } for pid=25734 comm="syz.1.5865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3452.002042][ T29] audit: type=1400 audit(134221179.872:592): avc: denied { read } for pid=25750 comm="syz.1.5870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3452.531804][T25752] fuse: Bad value for 'fd' [ 3452.532293][ T29] audit: type=1400 audit(134221180.402:593): avc: denied { mounton } for pid=25750 comm="syz.1.5870" path="/26/file0" dev="tmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 3455.759929][ T29] audit: type=1400 audit(134221183.632:594): avc: denied { mount } for pid=25758 comm="syz.0.5873" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3455.884660][ T29] audit: type=1400 audit(134221183.752:595): avc: denied { unmount } for pid=21868 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3478.184257][ T29] audit: type=1400 audit(134221206.052:596): avc: denied { setopt } for pid=25842 comm="syz.0.5899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3483.646024][ T29] audit: type=1400 audit(134221211.512:597): avc: denied { ioctl } for pid=25874 comm="syz.0.5908" path="socket:[68618]" dev="sockfs" ino=68618 ioctlcmd=0x6616 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3509.352880][T25944] FAULT_INJECTION: forcing a failure. [ 3509.352880][T25944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3509.353338][T25944] CPU: 0 UID: 0 PID: 25944 Comm: syz.1.5926 Tainted: G L syzkaller #0 PREEMPT [ 3509.353443][T25944] Tainted: [L]=SOFTLOCKUP [ 3509.353462][T25944] Hardware name: ARM-Versatile Express [ 3509.353763][T25944] Call trace: [ 3509.354142][T25944] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3509.354847][T25944] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3509.354959][T25944] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3509.355162][T25944] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3509.355257][T25944] r5:85975400 r4:8294fc90 [ 3509.355274][T25944] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3509.355340][T25944] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3509.355438][T25944] r8:76f91f30 r7:00000000 r6:00000000 r5:ec9adf68 r4:00000002 [ 3509.355485][T25944] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3509.355573][T25944] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3509.355636][T25944] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3509.355996][T25944] r10:00000001 r9:80624eec r8:00000002 r7:ec9adf68 r6:0000000f r5:76f91f30 [ 3509.356060][T25944] r4:85975400 r3:ec9ade9f [ 3509.356090][T25944] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3509.356367][T25944] r8:76f91f30 r7:ec9adf68 r6:85975400 r5:0000000f r4:85891780 [ 3509.356395][T25944] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3509.356479][T25944] r10:00000003 r9:85975400 r8:8020029c r7:00000000 r6:00000000 r5:85891780 [ 3509.356502][T25944] r4:85891783 [ 3509.356523][T25944] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3509.356644][T25944] r7:00000003 r6:00000005 r5:76f91f30 r4:0000000f [ 3509.356669][T25944] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3509.356735][T25944] Exception stack(0xec9adfa8 to 0xec9adff0) [ 3509.356796][T25944] dfa0: 0000000f 76f91f30 00000005 76f91f30 0000000f 00000000 [ 3509.356850][T25944] dfc0: 0000000f 76f91f30 00000005 00000003 00310000 00000000 00006364 76f920bc [ 3509.356885][T25944] dfe0: 00000158 76f91ed0 000d801c 0013022c [ 3527.116122][T25977] FAULT_INJECTION: forcing a failure. [ 3527.116122][T25977] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3527.116703][T25977] CPU: 0 UID: 0 PID: 25977 Comm: syz.1.5935 Tainted: G L syzkaller #0 PREEMPT [ 3527.116880][T25977] Tainted: [L]=SOFTLOCKUP [ 3527.116899][T25977] Hardware name: ARM-Versatile Express [ 3527.116922][T25977] Call trace: [ 3527.116962][T25977] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3527.117189][T25977] r7:b5403587 r6:00000000 r5:60000013 r4:82295bd4 [ 3527.117213][T25977] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3527.117279][T25977] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3527.117332][T25977] r5:83e2a400 r4:8294fc90 [ 3527.117373][T25977] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3527.117553][T25977] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3527.117724][T25977] r8:00000000 r7:b5403587 r6:00000000 r5:83e2ac30 r4:76f91ca0 [ 3527.117773][T25977] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3527.117950][T25977] [<80999e28>] (should_fail_usercopy) from [<8022a5c4>] (preserve_vfp_context+0x78/0xc4) [ 3527.118081][T25977] [<8022a54c>] (preserve_vfp_context) from [<8022a77c>] (setup_sigframe+0x16c/0x1c4) [ 3527.118150][T25977] r5:83e2ac30 r4:76f91bb8 [ 3527.118232][T25977] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3527.118317][T25977] r10:b5403587 r9:76f91bb8 r8:00000000 r7:83e2ac30 r6:76f91b38 r5:ecb0dfb0 [ 3527.118339][T25977] r4:83e2a400 [ 3527.118356][T25977] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3527.118563][T25977] Exception stack(0xecb0dfb0 to 0xecb0dff8) [ 3527.118614][T25977] dfa0: 00000003 20000180 0004c021 00000000 [ 3527.118725][T25977] dfc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f920bc [ 3527.118801][T25977] dfe0: 76f91ec0 76f91eb0 000192bc 0013235c 60000010 00000003 [ 3527.118921][T25977] r10:00000128 r9:83e2a400 r8:8020029c r7:00000128 r6:00130308 r5:00000000 [ 3527.118960][T25977] r4:00000000 [ 3527.521579][T25980] comedi: valid board names for 8255 driver are: [ 3527.527596][T25980] 8255 [ 3527.528482][T25980] comedi: valid board names for vmk80xx driver are: [ 3527.529353][T25980] vmk80xx [ 3527.530033][T25980] comedi: valid board names for usbduxsigma driver are: [ 3527.531812][T25980] usbduxsigma [ 3527.532844][T25980] comedi: valid board names for usbduxfast driver are: [ 3527.533873][T25980] usbduxfast [ 3527.534626][T25980] comedi: valid board names for usbdux driver are: [ 3527.537420][T25980] usbdux [ 3527.538472][T25980] comedi: valid board names for ni6501 driver are: [ 3527.539441][T25980] ni6501 [ 3527.540136][T25980] comedi: valid board names for dt9812 driver are: [ 3527.541178][T25980] dt9812 [ 3527.543470][T25980] comedi: valid board names for ni_labpc_cs driver are: [ 3527.545890][T25980] ni_labpc_cs [ 3527.547718][T25980] comedi: valid board names for ni_daq_700 driver are: [ 3527.548527][T25980] ni_daq_700 [ 3527.549231][T25980] comedi: valid board names for labpc_pci driver are: [ 3527.557402][T25980] labpc_pci [ 3527.558388][T25980] comedi: valid board names for adl_pci9118 driver are: [ 3527.561038][T25980] pci9118dg [ 3527.562516][T25980] pci9118hg [ 3527.563220][T25980] pci9118hr [ 3527.563903][T25980] comedi: valid board names for 8255_pci driver are: [ 3527.565698][T25980] 8255_pci [ 3527.567047][T25980] comedi: valid board names for comedi_parport driver are: [ 3527.567949][T25980] comedi_parport [ 3527.569247][T25980] comedi: valid board names for comedi_test driver are: [ 3527.570841][T25980] comedi_test [ 3527.571665][T25980] comedi: valid board names for comedi_bond driver are: [ 3527.572561][T25980] comedi_bond [ 3527.990033][ T29] audit: type=1400 audit(134221255.862:598): avc: denied { ioctl } for pid=25981 comm="syz.1.5937" path="socket:[68156]" dev="sockfs" ino=68156 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3544.369990][T26011] FAULT_INJECTION: forcing a failure. [ 3544.369990][T26011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3544.377267][T26011] CPU: 0 UID: 0 PID: 26011 Comm: syz.0.5945 Tainted: G L syzkaller #0 PREEMPT [ 3544.377461][T26011] Tainted: [L]=SOFTLOCKUP [ 3544.377483][T26011] Hardware name: ARM-Versatile Express [ 3544.377509][T26011] Call trace: [ 3544.377555][T26011] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3544.377674][T26011] r7:00000000 r6:00000000 r5:60000113 r4:82295bd4 [ 3544.377696][T26011] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3544.377751][T26011] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3544.377806][T26011] r5:843ebc00 r4:8294fc90 [ 3544.377824][T26011] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3544.377940][T26011] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3544.378008][T26011] r8:76f1ff30 r7:00000000 r6:00000000 r5:ecc79f68 r4:00000002 [ 3544.378030][T26011] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3544.378086][T26011] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3544.378148][T26011] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3544.378221][T26011] r10:00000001 r9:80624eec r8:00000002 r7:ecc79f68 r6:0000000f r5:76f1ff30 [ 3544.378267][T26011] r4:843ebc00 r3:ecc79e9f [ 3544.378289][T26011] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3544.378357][T26011] r8:76f1ff30 r7:ecc79f68 r6:843ebc00 r5:0000000f r4:86621000 [ 3544.378378][T26011] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3544.378445][T26011] r10:00000003 r9:843ebc00 r8:8020029c r7:00000000 r6:00000000 r5:86621000 [ 3544.378474][T26011] r4:86621003 [ 3544.378493][T26011] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3544.378555][T26011] r7:00000003 r6:00000004 r5:76f1ff30 r4:0000000f [ 3544.378573][T26011] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3544.378619][T26011] Exception stack(0xecc79fa8 to 0xecc79ff0) [ 3544.378670][T26011] 9fa0: 0000000f 76f1ff30 00000004 76f1ff30 0000000f 00000000 [ 3544.378711][T26011] 9fc0: 0000000f 76f1ff30 00000004 00000003 00310000 00000000 00006364 76f200bc [ 3544.378743][T26011] 9fe0: 00000158 76f1fed0 000d801c 0013022c [ 3557.590031][T26024] ptrace attach of "/syz-executor exec"[26025] was attempted by "/syz-executor exec"[26024] [ 3560.803052][T26030] FAULT_INJECTION: forcing a failure. [ 3560.803052][T26030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3560.806712][T26030] CPU: 1 UID: 0 PID: 26030 Comm: syz.1.5949 Tainted: G L syzkaller #0 PREEMPT [ 3560.806781][T26030] Tainted: [L]=SOFTLOCKUP [ 3560.806792][T26030] Hardware name: ARM-Versatile Express [ 3560.806805][T26030] Call trace: [ 3560.806827][T26030] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3560.806922][T26030] r7:b5403587 r6:00000000 r5:60000113 r4:82295bd4 [ 3560.807003][T26030] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3560.807050][T26030] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3560.807081][T26030] r5:86062400 r4:8294fc90 [ 3560.807090][T26030] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3560.807122][T26030] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3560.807157][T26030] r8:00000000 r7:b5403587 r6:00000000 r5:86062c30 r4:76f91ca0 [ 3560.807175][T26030] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3560.807204][T26030] [<80999e28>] (should_fail_usercopy) from [<8022a5c4>] (preserve_vfp_context+0x78/0xc4) [ 3560.807234][T26030] [<8022a54c>] (preserve_vfp_context) from [<8022a77c>] (setup_sigframe+0x16c/0x1c4) [ 3560.807265][T26030] r5:86062c30 r4:76f91bb8 [ 3560.807273][T26030] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3560.807309][T26030] r10:b5403587 r9:76f91bb8 r8:00000000 r7:86062c30 r6:76f91b38 r5:ecc29fb0 [ 3560.807319][T26030] r4:86062400 [ 3560.807328][T26030] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3560.807353][T26030] Exception stack(0xecc29fb0 to 0xecc29ff8) [ 3560.807374][T26030] 9fa0: 00000003 20002840 00000800 00000000 [ 3560.807393][T26030] 9fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f920bc [ 3560.807411][T26030] 9fe0: 76f91ec0 76f91eb0 000192bc 0013235c 60000010 00000003 [ 3560.807437][T26030] r10:00000128 r9:86062400 r8:8020029c r7:00000128 r6:00130308 r5:00000000 [ 3560.807449][T26030] r4:00000000 [ 3561.043848][ T29] audit: type=1400 audit(134221288.912:599): avc: denied { create } for pid=26035 comm="syz.1.5950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 3561.133921][T26036] syz.1.5950(26036): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 3575.572878][T26055] FAULT_INJECTION: forcing a failure. [ 3575.572878][T26055] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3575.573318][T26055] CPU: 0 UID: 0 PID: 26055 Comm: syz.1.5954 Tainted: G L syzkaller #0 PREEMPT [ 3575.573429][T26055] Tainted: [L]=SOFTLOCKUP [ 3575.573454][T26055] Hardware name: ARM-Versatile Express [ 3575.573479][T26055] Call trace: [ 3575.573535][T26055] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3575.573695][T26055] r7:00006364 r6:00000000 r5:60000013 r4:82295bd4 [ 3575.573740][T26055] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3575.573891][T26055] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3575.573962][T26055] r5:845e2400 r4:8294fc90 [ 3575.573983][T26055] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3575.574066][T26055] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3575.574316][T26055] r8:00000000 r7:00006364 r6:76f920bc r5:845e2c30 r4:76f91bb8 [ 3575.574454][T26055] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3575.574528][T26055] [<80999e28>] (should_fail_usercopy) from [<8022a6f4>] (setup_sigframe+0xe4/0x1c4) [ 3575.574598][T26055] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3575.574708][T26055] r10:b5403587 r9:76f91bb8 r8:00000000 r7:845e2c30 r6:76f91b38 r5:ece31fb0 [ 3575.574739][T26055] r4:845e2400 [ 3575.574811][T26055] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3575.574900][T26055] Exception stack(0xece31fb0 to 0xece31ff8) [ 3575.574982][T26055] 1fa0: 00000003 20000200 00000000 00000000 [ 3575.575071][T26055] 1fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f920bc [ 3575.575118][T26055] 1fe0: 76f91ec0 76f91eb0 000192bc 0013235c 60000010 000000da [ 3575.575201][T26055] r10:000000ad r9:845e2400 r8:00000000 r7:000000ad r6:00130308 r5:00000000 [ 3575.575273][T26055] r4:00000000 [ 3598.892185][ T29] audit: type=1400 audit(134221326.762:600): avc: denied { create } for pid=26101 comm="syz.1.5963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3617.088610][ T29] audit: type=1400 audit(134221344.962:601): avc: denied { write } for pid=26187 comm="syz.0.5985" path="socket:[69028]" dev="sockfs" ino=69028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3617.139656][ T29] audit: type=1400 audit(134221345.012:602): avc: denied { ioctl } for pid=26187 comm="syz.0.5985" path="socket:[69030]" dev="sockfs" ino=69030 ioctlcmd=0x6608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3617.178444][T26188] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=26188 comm=syz.0.5985 [ 3617.997739][T26191] FAULT_INJECTION: forcing a failure. [ 3617.997739][T26191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3617.999020][T26191] CPU: 1 UID: 0 PID: 26191 Comm: syz.0.5986 Tainted: G L syzkaller #0 PREEMPT [ 3617.999084][T26191] Tainted: [L]=SOFTLOCKUP [ 3617.999108][T26191] Hardware name: ARM-Versatile Express [ 3617.999130][T26191] Call trace: [ 3617.999178][T26191] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3617.999270][T26191] r7:b5403587 r6:00000000 r5:60000013 r4:82295bd4 [ 3617.999281][T26191] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3617.999309][T26191] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3617.999340][T26191] r5:843ebc00 r4:8294fc90 [ 3617.999348][T26191] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3617.999382][T26191] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3617.999420][T26191] r8:00000000 r7:b5403587 r6:00000000 r5:843ec430 r4:76f1fbb8 [ 3617.999429][T26191] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3617.999457][T26191] [<80999e28>] (should_fail_usercopy) from [<8022a734>] (setup_sigframe+0x124/0x1c4) [ 3617.999488][T26191] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3617.999523][T26191] r10:b5403587 r9:76f1fbb8 r8:00000000 r7:843ec430 r6:76f1fb38 r5:ed2c5fb0 [ 3617.999534][T26191] r4:843ebc00 [ 3617.999542][T26191] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3617.999567][T26191] Exception stack(0xed2c5fb0 to 0xed2c5ff8) [ 3617.999587][T26191] 5fa0: 00000003 20000380 00008000 00000000 [ 3617.999649][T26191] 5fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f200bc [ 3617.999688][T26191] 5fe0: 76f1fec0 76f1feb0 000192bc 0013235c 60000010 00000520 [ 3617.999711][T26191] r10:000000ad r9:843ebc00 r8:00000000 r7:000000ad r6:00130308 r5:00000000 [ 3617.999757][T26191] r4:00000000 [ 3641.108311][ T29] audit: type=1400 audit(134221368.982:603): avc: denied { bind } for pid=26263 comm="syz.1.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3641.109360][ T29] audit: type=1400 audit(134221368.982:604): avc: denied { node_bind } for pid=26263 comm="syz.1.6005" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3647.557170][T26278] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5121 sclass=netlink_audit_socket pid=26278 comm=syz.1.6010 [ 3648.105756][ T29] audit: type=1400 audit(134221375.972:605): avc: denied { mounton } for pid=26277 comm="syz.1.6010" path="/111/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3648.106006][T26280] fuse: blksize only supported for fuseblk [ 3648.109908][ T29] audit: type=1400 audit(134221375.982:606): avc: denied { read } for pid=26277 comm="syz.1.6010" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3648.110914][ T29] audit: type=1400 audit(134221375.982:607): avc: denied { open } for pid=26277 comm="syz.1.6010" path="/111/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3658.402176][T26319] FAULT_INJECTION: forcing a failure. [ 3658.402176][T26319] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3658.402629][T26319] CPU: 0 UID: 0 PID: 26319 Comm: syz.0.6023 Tainted: G L syzkaller #0 PREEMPT [ 3658.402688][T26319] Tainted: [L]=SOFTLOCKUP [ 3658.402699][T26319] Hardware name: ARM-Versatile Express [ 3658.402712][T26319] Call trace: [ 3658.402736][T26319] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3658.402801][T26319] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3658.402812][T26319] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3658.402841][T26319] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3658.402871][T26319] r5:83838000 r4:8294fc90 [ 3658.402880][T26319] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3658.402977][T26319] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3658.403053][T26319] r8:76f1ff30 r7:00000000 r6:00000000 r5:ed945f68 r4:00000002 [ 3658.403081][T26319] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3658.403134][T26319] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3658.403277][T26319] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3658.403366][T26319] r10:00000001 r9:80624eec r8:00000002 r7:ed945f68 r6:0000000f r5:76f1ff30 [ 3658.403393][T26319] r4:83838000 r3:ed945e9f [ 3658.403440][T26319] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3658.403527][T26319] r8:76f1ff30 r7:ed945f68 r6:83838000 r5:0000000f r4:85891780 [ 3658.403549][T26319] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3658.403939][T26319] r10:00000003 r9:83838000 r8:8020029c r7:00000000 r6:00000000 r5:85891780 [ 3658.404175][T26319] r4:85891783 [ 3658.404376][T26319] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3658.404570][T26319] r7:00000003 r6:00000004 r5:76f1ff30 r4:0000000f [ 3658.404836][T26319] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3658.405075][T26319] Exception stack(0xed945fa8 to 0xed945ff0) [ 3658.405204][T26319] 5fa0: 0000000f 76f1ff30 00000004 76f1ff30 0000000f 00000000 [ 3658.405246][T26319] 5fc0: 0000000f 76f1ff30 00000004 00000003 00310000 00000000 00006364 76f200bc [ 3658.405413][T26319] 5fe0: 00000158 76f1fed0 000d801c 0013022c [ 3661.283897][ T29] audit: type=1400 audit(134221389.152:608): avc: denied { block_suspend } for pid=26330 comm="syz.1.6027" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3668.019820][ T29] audit: type=1400 audit(134221395.892:609): avc: denied { setopt } for pid=26340 comm="syz.1.6030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3712.054204][ T29] audit: type=1400 audit(134221439.922:610): avc: denied { setopt } for pid=26509 comm="syz.1.6091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3715.164014][ T29] audit: type=1400 audit(134221443.032:611): avc: denied { append } for pid=26521 comm="syz.0.6096" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3720.641052][T26537] fuse: Bad value for 'fd' [ 3726.657606][T26565] fuse: Bad value for 'fd' [ 3726.824360][ T29] audit: type=1400 audit(134221454.692:612): avc: denied { bind } for pid=26566 comm="syz.1.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3730.220264][T26579] fuse: Bad value for 'fd' [ 3730.923856][ T29] audit: type=1400 audit(134221458.792:613): avc: denied { mount } for pid=26584 comm="syz.1.6113" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 3739.192132][T26607] FAULT_INJECTION: forcing a failure. [ 3739.192132][T26607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3739.192658][T26607] CPU: 0 UID: 0 PID: 26607 Comm: syz.1.6118 Tainted: G L syzkaller #0 PREEMPT [ 3739.192769][T26607] Tainted: [L]=SOFTLOCKUP [ 3739.192795][T26607] Hardware name: ARM-Versatile Express [ 3739.192822][T26607] Call trace: [ 3739.192868][T26607] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3739.192991][T26607] r7:000000ad r6:00000000 r5:60000013 r4:82295bd4 [ 3739.193012][T26607] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3739.193069][T26607] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3739.193240][T26607] r5:83e2e000 r4:8294fc90 [ 3739.193352][T26607] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3739.193523][T26607] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3739.193616][T26607] r8:00000000 r7:000000ad r6:00130308 r5:76f91b38 r4:76f91bc0 [ 3739.193763][T26607] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3739.193904][T26607] [<80999e28>] (should_fail_usercopy) from [<8026b2ec>] (restore_altstack+0x34/0xf8) [ 3739.194328][T26607] [<8026b2b8>] (restore_altstack) from [<8022aaa8>] (sys_rt_sigreturn+0x64/0x74) [ 3739.194416][T26607] r5:76f91b38 r4:ee579fb0 [ 3739.194582][T26607] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3739.194762][T26607] Exception stack(0xee579fa8 to 0xee579ff0) [ 3739.194992][T26607] 9fa0: 00000000 00000000 00000003 20000300 04000000 00000000 [ 3739.195316][T26607] 9fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f920bc [ 3739.195479][T26607] 9fe0: 76f91ec0 76f91eb0 000192bc 0013235c [ 3739.195671][T26607] r5:00000000 r4:00000000 [ 3742.619878][ T29] audit: type=1400 audit(134221470.492:614): avc: denied { ioctl } for pid=26619 comm="syz.0.6122" path="socket:[70131]" dev="sockfs" ino=70131 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3742.650784][ T29] audit: type=1400 audit(134221470.522:615): avc: denied { getopt } for pid=26619 comm="syz.0.6122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3751.265798][ T29] audit: type=1400 audit(134221479.132:616): avc: denied { mount } for pid=26650 comm="syz.0.6132" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 3759.100949][T26679] FAULT_INJECTION: forcing a failure. [ 3759.100949][T26679] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3759.101432][T26679] CPU: 0 UID: 0 PID: 26679 Comm: syz.1.6139 Tainted: G L syzkaller #0 PREEMPT [ 3759.101589][T26679] Tainted: [L]=SOFTLOCKUP [ 3759.101618][T26679] Hardware name: ARM-Versatile Express [ 3759.101647][T26679] Call trace: [ 3759.101695][T26679] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3759.101872][T26679] r7:b5403587 r6:00000000 r5:60000013 r4:82295bd4 [ 3759.101900][T26679] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3759.102106][T26679] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3759.102255][T26679] r5:85970000 r4:8294fc90 [ 3759.102390][T26679] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3759.102530][T26679] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3759.102666][T26679] r8:00000000 r7:b5403587 r6:76f91bb8 r5:00000000 r4:ee7f9fb0 [ 3759.102938][T26679] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3759.103065][T26679] [<80999e28>] (should_fail_usercopy) from [<8022a868>] (restore_sigframe+0x94/0x210) [ 3759.103146][T26679] [<8022a7d4>] (restore_sigframe) from [<8022aa88>] (sys_rt_sigreturn+0x44/0x74) [ 3759.103507][T26679] r7:000000ad r6:00130308 r5:76f91b38 r4:ee7f9fb0 [ 3759.104171][T26679] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3759.104307][T26679] Exception stack(0xee7f9fa8 to 0xee7f9ff0) [ 3759.104524][T26679] 9fa0: 00000000 00000000 00000219 76f91b38 76f91bb8 00000000 [ 3759.104918][T26679] 9fc0: 00000000 00000000 00130308 000000ad 00310000 00000000 00006364 76f920bc [ 3759.105084][T26679] 9fe0: 76f91ec0 76f91b38 0015acf0 000ef438 [ 3759.105152][T26679] r5:00000000 r4:00000000 [ 3775.240443][T26760] fuse: Unknown parameter '0x0000000000000004' [ 3775.259530][ T29] audit: type=1400 audit(134221503.112:617): avc: denied { setattr } for pid=26759 comm="syz.1.6167" path="pipe:[70776]" dev="pipefs" ino=70776 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3791.345447][T26855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26855 comm=syz.0.6193 [ 3791.809359][T26862] fuse: Unknown parameter 'grou00000000000000000000' [ 3793.700542][T26868] FAULT_INJECTION: forcing a failure. [ 3793.700542][T26868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3793.701018][T26868] CPU: 0 UID: 0 PID: 26868 Comm: syz.1.6198 Tainted: G L syzkaller #0 PREEMPT [ 3793.701122][T26868] Tainted: [L]=SOFTLOCKUP [ 3793.701142][T26868] Hardware name: ARM-Versatile Express [ 3793.701165][T26868] Call trace: [ 3793.701207][T26868] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3793.701329][T26868] r7:00000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3793.701352][T26868] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3793.701480][T26868] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3793.701798][T26868] r5:83e2e000 r4:8294fc90 [ 3793.701911][T26868] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3793.702195][T26868] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3793.702377][T26868] r8:76f91f30 r7:00000000 r6:00000000 r5:dfe51f68 r4:00000002 [ 3793.702457][T26868] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3793.702573][T26868] [<80999e28>] (should_fail_usercopy) from [<805a718c>] (simple_read_from_buffer+0x80/0x13c) [ 3793.702707][T26868] [<805a710c>] (simple_read_from_buffer) from [<80624fa4>] (proc_fail_nth_read+0xb8/0x108) [ 3793.702934][T26868] r10:00000001 r9:80624eec r8:00000002 r7:dfe51f68 r6:0000000f r5:76f91f30 [ 3793.703234][T26868] r4:83e2e000 r3:dfe51e9f [ 3793.703388][T26868] [<80624eec>] (proc_fail_nth_read) from [<8056a8e8>] (vfs_read+0x98/0x324) [ 3793.703561][T26868] r8:76f91f30 r7:dfe51f68 r6:83e2e000 r5:0000000f r4:85891900 [ 3793.703688][T26868] [<8056a850>] (vfs_read) from [<8056b5f8>] (ksys_read+0x74/0xe8) [ 3793.703832][T26868] r10:00000003 r9:83e2e000 r8:8020029c r7:00000000 r6:00000000 r5:85891900 [ 3793.704079][T26868] r4:85891903 [ 3793.704116][T26868] [<8056b584>] (ksys_read) from [<8056b67c>] (sys_read+0x10/0x14) [ 3793.704333][T26868] r7:00000003 r6:00000005 r5:76f91f30 r4:0000000f [ 3793.704411][T26868] [<8056b66c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3793.704597][T26868] Exception stack(0xdfe51fa8 to 0xdfe51ff0) [ 3793.704730][T26868] 1fa0: 0000000f 76f91f30 00000005 76f91f30 0000000f 00000000 [ 3793.705081][T26868] 1fc0: 0000000f 76f91f30 00000005 00000003 00310000 00000000 00006364 76f920bc [ 3793.705116][T26868] 1fe0: 00000158 76f91ed0 000d801c 0013022c [ 3793.873622][T26871] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 3793.874217][T26871] audit: out of memory in audit_log_start [ 3794.750688][T26876] fuse: Unknown parameter 'grou00000000000000000000' [ 3795.365373][T26882] FAULT_INJECTION: forcing a failure. [ 3795.365373][T26882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3795.365694][T26882] CPU: 0 UID: 0 PID: 26882 Comm: syz.0.6204 Tainted: G L syzkaller #0 PREEMPT [ 3795.365796][T26882] Tainted: [L]=SOFTLOCKUP [ 3795.365817][T26882] Hardware name: ARM-Versatile Express [ 3795.365862][T26882] Call trace: [ 3795.365905][T26882] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3795.368360][T26882] r7:e0255e20 r6:00000000 r5:60000013 r4:82295bd4 [ 3795.369413][T26882] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3795.369529][T26882] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3795.369650][T26882] r5:83e2d400 r4:8294fc90 [ 3795.369778][T26882] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3795.369853][T26882] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3795.370019][T26882] r8:04040080 r7:e0255e20 r6:200001c0 r5:00000000 r4:e0255f20 [ 3795.370029][T26882] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3795.370072][T26882] [<80999e28>] (should_fail_usercopy) from [<8159a3a4>] (copy_msghdr_from_user+0x50/0x130) [ 3795.370110][T26882] [<8159a354>] (copy_msghdr_from_user) from [<8159a4fc>] (___sys_sendmsg+0x78/0xd0) [ 3795.370145][T26882] r8:04040080 r7:00000000 r6:85205180 r5:e0255f20 r4:e0255e64 [ 3795.370154][T26882] [<8159a484>] (___sys_sendmsg) from [<8159a9b8>] (__sys_sendmsg+0x8c/0xe0) [ 3795.370197][T26882] r10:00000128 r9:83e2d400 r8:85891900 r7:04040080 r6:200001c0 r5:85891901 [ 3795.370208][T26882] r4:00000003 [ 3795.370216][T26882] [<8159a92c>] (__sys_sendmsg) from [<8159aa20>] (sys_sendmsg+0x14/0x18) [ 3795.370279][T26882] r8:8020029c r7:00000128 r6:00130308 r5:00000000 r4:00000000 [ 3795.370302][T26882] [<8159aa0c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3795.370361][T26882] Exception stack(0xe0255fa8 to 0xe0255ff0) [ 3795.370472][T26882] 5fa0: 00000000 00000000 00000003 200001c0 04040080 00000000 [ 3795.370518][T26882] 5fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f200bc [ 3795.370550][T26882] 5fe0: 76f1fec0 76f1feb0 000192bc 00132360 [ 3795.778334][T26887] fuse: Unknown parameter 'grou00000000000000000000' [ 3797.171145][T26893] tmpfs: Unknown parameter 'usrquotaÀ' [ 3798.054364][T26897] veth1_to_team: entered allmulticast mode [ 3804.440013][ T29] audit: type=1400 audit(134221532.312:618): avc: denied { getopt } for pid=26936 comm="syz.1.6230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3805.800086][ T29] audit: type=1400 audit(134221533.672:619): avc: denied { read write } for pid=26942 comm="syz.1.6233" path="socket:[70648]" dev="sockfs" ino=70648 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3806.370007][ T29] audit: type=1400 audit(134221534.242:620): avc: denied { connect } for pid=26942 comm="syz.1.6233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3810.869562][T26956] syz.1.6238 uses obsolete (PF_INET,SOCK_PACKET) [ 3815.750583][T26985] tmpfs: Unknown parameter 'usrquotaÀ' [ 3816.222198][T26962] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 3817.733649][ T29] audit: type=1400 audit(134221545.602:621): avc: denied { getopt } for pid=26995 comm="syz.1.6248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3819.779678][ T29] audit: type=1400 audit(134221547.652:622): avc: denied { read } for pid=27007 comm="syz.1.6253" path="socket:[71177]" dev="sockfs" ino=71177 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3820.930364][T27019] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27019 comm=syz.1.6255 [ 3826.506193][ T29] audit: type=1400 audit(134221554.362:623): avc: denied { sqpoll } for pid=27034 comm="syz.1.6260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3831.811524][ T29] audit: type=1400 audit(134221559.682:624): avc: denied { read } for pid=27050 comm="syz.0.6265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3835.771545][T27063] tmpfs: Unknown parameter 'usrquotaÀ' [ 3843.050106][ T29] audit: type=1400 audit(134221570.922:625): avc: denied { read } for pid=27083 comm="syz.1.6276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3843.407982][T21430] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 3847.613804][T25492] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3847.674087][T25492] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3847.746228][T25492] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3847.810600][T25492] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3848.204282][T25492] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3848.212385][T25492] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3848.216049][T25492] bond0 (unregistering): Released all slaves [ 3848.323008][T25492] hsr_slave_0: left promiscuous mode [ 3848.331713][T25492] hsr_slave_1: left promiscuous mode [ 3848.355724][T25492] veth1_macvtap: left promiscuous mode [ 3848.356264][T25492] veth0_macvtap: left promiscuous mode [ 3848.370460][T25492] veth1_vlan: left promiscuous mode [ 3848.370975][T25492] veth0_vlan: left promiscuous mode [ 3849.118371][T27124] FAULT_INJECTION: forcing a failure. [ 3849.118371][T27124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3849.128640][T27124] CPU: 1 UID: 0 PID: 27124 Comm: syz.1.6280 Tainted: G L syzkaller #0 PREEMPT [ 3849.128813][T27124] Tainted: [L]=SOFTLOCKUP [ 3849.128839][T27124] Hardware name: ARM-Versatile Express [ 3849.128865][T27124] Call trace: [ 3849.128908][T27124] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3849.129039][T27124] r7:00006364 r6:00000000 r5:60000113 r4:82295bd4 [ 3849.129064][T27124] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3849.129126][T27124] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3849.129221][T27124] r5:8320e000 r4:8294fc90 [ 3849.129245][T27124] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3849.129327][T27124] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3849.129407][T27124] r8:00000000 r7:00006364 r6:76f920bc r5:8320e830 r4:76f91bb8 [ 3849.129429][T27124] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3849.129490][T27124] [<80999e28>] (should_fail_usercopy) from [<8022a6f4>] (setup_sigframe+0xe4/0x1c4) [ 3849.129557][T27124] [<8022a610>] (setup_sigframe) from [<8022ae7c>] (do_work_pending+0x3c4/0x4d0) [ 3849.129636][T27124] r10:b5403587 r9:76f91bb8 r8:00000000 r7:8320e830 r6:76f91b38 r5:ead69fb0 [ 3849.129662][T27124] r4:8320e000 [ 3849.129682][T27124] [<8022aab8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3849.129739][T27124] Exception stack(0xead69fb0 to 0xead69ff8) [ 3849.129784][T27124] 9fa0: 00000003 20000300 04000000 00000000 [ 3849.129865][T27124] 9fc0: 00000000 00000000 00130308 00000128 00310000 00000000 00006364 76f920bc [ 3849.129911][T27124] 9fe0: 76f91ec0 76f91eb0 000192bc 0013235c 60000010 00000003 [ 3849.129956][T27124] r10:00000128 r9:8320e000 r8:8020029c r7:00000128 r6:00130308 r5:00000000 [ 3849.129980][T27124] r4:00000000 [ 3850.371089][T27098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3850.385308][T27098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3851.375236][T27098] hsr_slave_0: entered promiscuous mode [ 3851.382417][T27098] hsr_slave_1: entered promiscuous mode [ 3851.384216][T27098] debugfs: 'hsr0' already exists in 'hsr' [ 3851.387627][T27098] Cannot create hsr debugfs directory [ 3852.053822][T27098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3852.071862][T27098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3852.090695][T27098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3852.111545][T27098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3853.066120][T27098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3853.914927][T27098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3855.915250][T27431] tmpfs: Unknown parameter 'usrquotaÀ' [ 3857.550327][T27098] veth0_vlan: entered promiscuous mode [ 3857.600921][T27098] veth1_vlan: entered promiscuous mode [ 3857.733631][T27098] veth0_macvtap: entered promiscuous mode [ 3857.746310][T27098] veth1_macvtap: entered promiscuous mode [ 3857.882289][T27364] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3857.882777][T27364] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3857.882873][T27364] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3857.882939][T27364] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3861.601802][ T29] audit: type=1400 audit(134221589.472:626): avc: denied { listen } for pid=27508 comm="syz.0.6285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 3861.608065][ T29] audit: type=1400 audit(134221589.472:627): avc: denied { create } for pid=27508 comm="syz.0.6285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 3861.805347][T27511] SELinux: syz.0.6285 (27511) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3862.333101][ T29] audit: type=1400 audit(134221590.202:628): avc: denied { getopt } for pid=27508 comm="syz.0.6285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3868.793546][T27540] FAULT_INJECTION: forcing a failure. [ 3868.793546][T27540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3868.794114][T27540] CPU: 0 UID: 0 PID: 27540 Comm: syz.0.6288 Tainted: G L syzkaller #0 PREEMPT [ 3868.794354][T27540] Tainted: [L]=SOFTLOCKUP [ 3868.794381][T27540] Hardware name: ARM-Versatile Express [ 3868.794408][T27540] Call trace: [ 3868.794563][T27540] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3868.794702][T27540] r7:000000ad r6:00000000 r5:60000013 r4:82295bd4 [ 3868.794728][T27540] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3868.794795][T27540] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3868.794975][T27540] r5:845e6000 r4:8294fc90 [ 3868.794997][T27540] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3868.795078][T27540] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3868.795157][T27540] r8:00000000 r7:000000ad r6:76f23bb8 r5:76f23b38 r4:eb079fb0 [ 3868.795181][T27540] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3868.795247][T27540] [<80999e28>] (should_fail_usercopy) from [<8022a820>] (restore_sigframe+0x4c/0x210) [ 3868.795319][T27540] [<8022a7d4>] (restore_sigframe) from [<8022aa88>] (sys_rt_sigreturn+0x44/0x74) [ 3868.795395][T27540] r7:000000ad r6:00130308 r5:76f23b38 r4:eb079fb0 [ 3868.795419][T27540] [<8022aa44>] (sys_rt_sigreturn) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3868.795502][T27540] Exception stack(0xeb079fa8 to 0xeb079ff0) [ 3868.795564][T27540] 9fa0: 00000000 00000000 00000012 76f23b38 76f23bb8 00000000 [ 3868.795609][T27540] 9fc0: 00000000 00000000 00130308 000000ad 00310000 00000000 00006364 76f240bc [ 3868.795703][T27540] 9fe0: 76f23ec0 76f23b38 0015acf0 000ef438 [ 3868.796061][T27540] r5:00000000 r4:00000000 [ 3868.874904][ T29] audit: type=1400 audit(134221596.742:629): avc: denied { name_bind } for pid=27541 comm="syz.1.6290" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3871.729196][T27554] tmpfs: Unknown parameter 'usrquotaÀ' [ 3873.820596][T27574] SELinux: Context system_u:object_r:auth_cache_t:s0 is not valid (left unmapped). [ 3873.825558][ T29] audit: type=1400 audit(134221601.692:630): avc: denied { relabelto } for pid=27572 comm="syz.0.6302" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auth_cache_t:s0" [ 3873.833150][ T29] audit: type=1400 audit(134221601.702:631): avc: denied { associate } for pid=27572 comm="syz.0.6302" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:auth_cache_t:s0" [ 3874.557781][T27576] FAULT_INJECTION: forcing a failure. [ 3874.557781][T27576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3874.560360][T27576] CPU: 0 UID: 0 PID: 27576 Comm: syz.0.6303 Tainted: G L syzkaller #0 PREEMPT [ 3874.560547][T27576] Tainted: [L]=SOFTLOCKUP [ 3874.560572][T27576] Hardware name: ARM-Versatile Express [ 3874.560600][T27576] Call trace: [ 3874.560648][T27576] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 3874.560779][T27576] r7:20000000 r6:00000000 r5:60000013 r4:82295bd4 [ 3874.560803][T27576] [<80201b58>] (show_stack) from [<8021eeb4>] (dump_stack_lvl+0x70/0x7c) [ 3874.560865][T27576] [<8021ee44>] (dump_stack_lvl) from [<8021eed8>] (dump_stack+0x18/0x1c) [ 3874.560929][T27576] r5:85f38c00 r4:8294fc90 [ 3874.560949][T27576] [<8021eec0>] (dump_stack) from [<80999dac>] (should_fail_ex+0x1c4/0x228) [ 3874.561017][T27576] [<80999be8>] (should_fail_ex) from [<80999e24>] (should_fail+0x14/0x18) [ 3874.561093][T27576] r8:8660e181 r7:20000000 r6:eb195ee4 r5:00000010 r4:00000010 [ 3874.561115][T27576] [<80999e10>] (should_fail) from [<80999e44>] (should_fail_usercopy+0x1c/0x20) [ 3874.561179][T27576] [<80999e28>] (should_fail_usercopy) from [<81598664>] (move_addr_to_kernel+0x34/0xf8) [ 3874.561266][T27576] [<81598630>] (move_addr_to_kernel) from [<81599cd4>] (__sys_sendto+0xd0/0x160) [ 3874.561342][T27576] r7:20000000 r6:856e5680 r5:240040c1 r4:00000000 [ 3874.561364][T27576] [<81599c04>] (__sys_sendto) from [<81599d80>] (sys_sendto+0x1c/0x24) [ 3874.561445][T27576] r9:85f38c00 r8:8020029c r7:00000122 r6:00130308 r5:00000010 r4:20000000 [ 3874.561468][T27576] [<81599d64>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3874.561528][T27576] Exception stack(0xeb195fa8 to 0xeb195ff0) [ 3874.561578][T27576] 5fa0: 20000000 00000010 00000003 00000000 00000000 240040c1 [ 3874.561624][T27576] 5fc0: 20000000 00000010 00130308 00000122 00310000 00000000 00006364 76f240bc [ 3874.561662][T27576] 5fe0: 76f23ec0 76f23eb0 000192bc 00132360 [ 3879.040273][ T29] audit: type=1400 audit(134221606.902:632): avc: denied { write } for pid=27615 comm="syz.0.6317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3880.440621][ T29] audit: type=1400 audit(134221608.312:633): avc: denied { accept } for pid=27620 comm="syz.0.6319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3882.872429][ T29] audit: type=1400 audit(134221610.742:634): avc: denied { ioctl } for pid=27638 comm="syz.1.6324" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=72367 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3884.505889][T27649] tmpfs: Unknown parameter 'usrquotaÀ' [ 3886.785037][T27672] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27672 comm=syz.1.6337 [ 3888.800033][T27684] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27684 comm=syz.1.6342 [ 3890.582677][T27697] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27697 comm=syz.1.6347 [ 3891.999137][T27709] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27709 comm=syz.1.6352 [ 3893.213754][T27721] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27721 comm=syz.1.6357 [ 3895.237878][T27735] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27735 comm=syz.1.6362 [ 3896.099169][T27746] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27746 comm=syz.1.6367 [ 3896.384560][T27753] fuse: Unknown parameter 'user_id00000000000000000000' [ 3896.984726][T27762] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27762 comm=syz.1.6374 [ 3900.430938][T27798] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27798 comm=syz.0.6379 [ 3900.583994][ T29] audit: type=1400 audit(134221628.452:635): avc: denied { shutdown } for pid=27802 comm="syz.0.6381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3900.660916][ T29] audit: type=1400 audit(134221628.532:636): avc: denied { execute } for pid=27802 comm="syz.0.6381" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3901.282197][T27812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27812 comm=syz.1.6385 [ 3904.067534][T27827] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=27827 comm=syz.1.6390 [ 3910.879231][ T29] audit: type=1400 audit(134221638.752:637): avc: denied { accept } for pid=27867 comm="syz.0.6403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3917.705318][ T29] audit: type=1400 audit(134221645.572:638): avc: denied { name_bind } for pid=27903 comm="syz.1.6415" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3917.973481][ T29] audit: type=1400 audit(134221645.842:639): avc: denied { map_read map_write } for pid=27912 comm="syz.1.6417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3919.449300][ T29] audit: type=1326 audit(134221647.312:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27917 comm="syz.1.6418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3919.451652][ T29] audit: type=1326 audit(134221647.322:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27917 comm="syz.1.6418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3919.454973][ T29] audit: type=1326 audit(134221647.322:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27917 comm="syz.1.6418" exe="/syz-executor" sig=0 arch=40000028 syscall=143 compat=0 ip=0x132360 code=0x7ffc0000 [ 3919.458981][ T29] audit: type=1326 audit(134221647.322:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27917 comm="syz.1.6418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3919.462418][ T29] audit: type=1326 audit(134221647.322:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27917 comm="syz.1.6418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3921.652410][ T29] audit: type=1326 audit(134221649.522:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27937 comm="syz.0.6427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3921.660052][ T29] audit: type=1326 audit(134221649.522:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27937 comm="syz.0.6427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3921.677883][ T29] audit: type=1326 audit(134221649.552:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27937 comm="syz.0.6427" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132360 code=0x7ffc0000 [ 3927.150469][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 3927.151963][ T29] audit: type=1400 audit(134221655.002:650): avc: denied { override_creds } for pid=27959 comm="syz.0.6433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3942.105639][ T29] audit: type=1326 audit(134221669.972:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.1.6437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3942.110639][ T29] audit: type=1326 audit(134221669.982:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.1.6437" exe="/syz-executor" sig=0 arch=40000028 syscall=45 compat=0 ip=0x132360 code=0x7ffc0000 [ 3942.113192][ T29] audit: type=1326 audit(134221669.982:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.1.6437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132360 code=0x7ffc0000 [ 3943.013959][T27977] bpf: Bad value for 'uid' [ 3943.458797][T20386] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 3943.727354][T20386] usb 2-1: Using ep0 maxpacket: 8 [ 3943.800335][T20386] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3943.800744][T20386] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8D has invalid wMaxPacketSize 0 [ 3943.802559][T20386] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 3943.802988][T20386] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 3943.803178][T20386] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 3943.803236][T20386] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 3943.922400][T20386] usb 2-1: New USB device found, idVendor=1870, idProduct=0001, bcdDevice=e6.7f [ 3943.922804][T20386] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3943.922988][T20386] usb 2-1: Product: syz [ 3943.923033][T20386] usb 2-1: Manufacturer: syz [ 3943.923059][T20386] usb 2-1: SerialNumber: syz [ 3943.939183][T20386] usb 2-1: config 0 descriptor?? [ 3944.208252][T20386] usb 2-1: USB disconnect, device number 50 [ 3951.231842][T28019] 8<--- cut here --- [ 3951.232341][T28019] Unable to handle kernel paging request at virtual address fee00f2a when write [ 3951.235630][T28019] [fee00f2a] *pgd=80000080007003, *pmd=00000000 [ 3951.245266][T28019] Internal error: Oops: a06 [#1] SMP ARM [ 3951.247855][T28019] Modules linked in: [ 3951.248379][T28019] CPU: 0 UID: 0 PID: 28019 Comm: syz.0.6454 Tainted: G L syzkaller #0 PREEMPT [ 3951.248801][T28019] Tainted: [L]=SOFTLOCKUP [ 3951.249000][T28019] Hardware name: ARM-Versatile Express [ 3951.249261][T28019] PC is at subdev_8255_io+0x60/0x6c [ 3951.249578][T28019] LR is at subdev_8255_io+0x4c/0x6c [ 3951.249863][T28019] pc : [<81416474>] lr : [<81416460>] psr: 60000013 [ 3951.250842][T28019] sp : dfa1dcb0 ip : dfa1dcb0 fp : dfa1dccc [ 3951.251387][T28019] r10: 00000001 r9 : 00000084 r8 : dfa1dd9c [ 3951.251776][T28019] r7 : 00000f27 r6 : 0000009b r5 : 84482e40 r4 : 00000f2a [ 3951.252108][T28019] r3 : 0000009b r2 : fee00f2a r1 : 00000001 r0 : 84482e40 [ 3951.252635][T28019] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 3951.253022][T28019] Control: 30c5387d Table: 8618c540 DAC: fffffffd [ 3951.253375][T28019] Register r0 information: slab kmalloc-192 start 84482e40 pointer offset 0 size 192 [ 3951.254977][T28019] Register r1 information: non-paged memory [ 3951.256043][T28019] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 3951.257052][T28019] Register r3 information: non-paged memory [ 3951.257459][T28019] Register r4 information: non-paged memory [ 3951.257802][T28019] Register r5 information: slab kmalloc-192 start 84482e40 pointer offset 0 size 192 [ 3951.258316][T28019] Register r6 information: non-paged memory [ 3951.258663][T28019] Register r7 information: non-paged memory [ 3951.258975][T28019] Register r8 information: 2-page vmalloc region starting at 0xdfa1c000 allocated at kernel_clone+0xac/0x3ec [ 3951.260174][T28019] Register r9 information: non-paged memory [ 3951.260841][T28019] Register r10 information: non-paged memory [ 3951.261354][T28019] Register r11 information: 2-page vmalloc region starting at 0xdfa1c000 allocated at kernel_clone+0xac/0x3ec [ 3951.262095][T28019] Register r12 information: 2-page vmalloc region starting at 0xdfa1c000 allocated at kernel_clone+0xac/0x3ec [ 3951.262753][T28019] Process syz.0.6454 (pid: 28019, stack limit = 0xdfa1c000) [ 3951.263375][T28019] Stack: (0xdfa1dcb0 to 0xdfa1e000) [ 3951.263981][T28019] dca0: 81416414 84482e40 00000f27 00000f27 [ 3951.264348][T28019] dcc0: dfa1dcec dfa1dcd0 8141614c 81416420 00000f27 80515264 85f03800 85f03800 [ 3951.264722][T28019] dce0: dfa1dd0c dfa1dcf0 8141650c 81416100 84482e40 00000000 85f03800 00000f27 [ 3951.265141][T28019] dd00: dfa1dd4c dfa1dd10 814166b8 8141648c 8280ca60 8453ae00 828215b0 00000000 [ 3951.265479][T28019] dd20: 00000000 829d46a0 84482e40 84482e84 dfa1dd88 84482e40 00000000 82b28ad8 [ 3951.265864][T28019] dd40: dfa1dd84 dfa1dd50 814051ec 81416650 84482e70 00000000 dfa1dd74 200000c0 [ 3951.266223][T28019] dd60: 84482e40 b5403587 84482e70 845e5400 40946400 00000003 dfa1de44 dfa1dd88 [ 3951.267018][T28019] dd80: 81400b44 814050f0 35353238 00000000 00000000 00000000 00000000 00000f27 [ 3951.267384][T28019] dda0: 80000000 00000002 0000000a 0000000d 00000005 00000008 00000004 00000004 [ 3951.268057][T28019] ddc0: 000000fd 00000004 00000000 00000001 00000001 00100006 00000101 12000000 [ 3951.268466][T28019] dde0: 0000007f 00000003 40000003 0000008c 0000ca9f 00000000 fffffff9 ffffffff [ 3951.268878][T28019] de00: 00000e66 00000013 00000008 00004089 00000008 00000006 00000000 550db87c [ 3951.269278][T28019] de20: 00000000 84d1ce40 84482e40 200000c0 84482e70 845e5400 dfa1df14 dfa1de48 [ 3951.269972][T28019] de40: 81401b38 81400a50 00000000 00000000 00000000 00000000 00000000 550db87c [ 3951.270503][T28019] de60: 00000000 00000000 824a45ec 0000005f 8429bbe8 00000064 84552324 845e5400 [ 3951.270872][T28019] de80: dfa1dee4 dfa1de90 807b8338 807ae85c 00000064 00000001 00000000 dfa1deac [ 3951.271294][T28019] dea0: 85a17550 8342daa0 00006400 0000000b dfa1dea0 00000000 00000000 550db87c [ 3951.271675][T28019] dec0: 84d1ce40 40946400 200000c0 200000c0 84d1ce40 00000003 dfa1def4 dfa1dee8 [ 3951.272079][T28019] dee0: 807b8458 550db87c dfa1df14 40946400 00000000 84d1ce41 200000c0 84d1ce40 [ 3951.272603][T28019] df00: 00000003 845e5400 dfa1dfa4 dfa1df18 80585920 81401588 ecac8b10 845e5400 [ 3951.272969][T28019] df20: dfa1df3c dfa1df30 81ab036c 81ab023c dfa1df54 dfa1df40 8025bcbc 8028e0c4 [ 3951.273887][T28019] df40: dfa1dfb0 40000000 dfa1df84 dfa1df58 80221a38 8025bc78 00000000 8281cf7c [ 3951.274465][T28019] df60: dfa1dfb0 0014c8c0 ecac8b10 8022198c 00000000 550db87c dfa1dfac 00000000 [ 3951.275022][T28019] df80: 00000000 00326310 00000036 8020029c 845e5400 00000036 00000000 dfa1dfa8 [ 3951.275420][T28019] dfa0: 80200060 805857fc 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3951.275797][T28019] dfc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f240bc [ 3951.276153][T28019] dfe0: 76f23ec0 76f23eb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 3951.277006][T28019] Call trace: [ 3951.277294][T28019] [<81416414>] (subdev_8255_io) from [<8141614c>] (subdev_8255_do_config+0x58/0x60) [ 3951.277807][T28019] r7:00000f27 r6:00000f27 r5:84482e40 r4:81416414 [ 3951.278173][T28019] [<814160f4>] (subdev_8255_do_config) from [<8141650c>] (subdev_8255_io_init+0x8c/0x9c) [ 3951.278983][T28019] r4:85f03800 [ 3951.279232][T28019] [<81416480>] (subdev_8255_io_init) from [<814166b8>] (dev_8255_attach+0x74/0x120) [ 3951.279959][T28019] r7:00000f27 r6:85f03800 r5:00000000 r4:84482e40 [ 3951.280478][T28019] [<81416644>] (dev_8255_attach) from [<814051ec>] (comedi_device_attach+0x108/0x250) [ 3951.281273][T28019] r10:82b28ad8 r9:00000000 r8:84482e40 r7:dfa1dd88 r6:84482e84 r5:84482e40 [ 3951.281634][T28019] r4:829d46a0 [ 3951.281894][T28019] [<814050e4>] (comedi_device_attach) from [<81400b44>] (do_devconfig_ioctl+0x100/0x220) [ 3951.282693][T28019] r10:00000003 r9:40946400 r8:845e5400 r7:84482e70 r6:b5403587 r5:84482e40 [ 3951.283323][T28019] r4:200000c0 [ 3951.283639][T28019] [<81400a44>] (do_devconfig_ioctl) from [<81401b38>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 3951.284459][T28019] r8:845e5400 r7:84482e70 r6:200000c0 r5:84482e40 r4:84d1ce40 [ 3951.284726][T28019] [<8140157c>] (comedi_unlocked_ioctl) from [<80585920>] (sys_ioctl+0x130/0xba0) [ 3951.285166][T28019] r10:845e5400 r9:00000003 r8:84d1ce40 r7:200000c0 r6:84d1ce41 r5:00000000 [ 3951.285747][T28019] r4:40946400 [ 3951.285961][T28019] [<805857f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3951.286366][T28019] Exception stack(0xdfa1dfa8 to 0xdfa1dff0) [ 3951.286765][T28019] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3951.287130][T28019] dfc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f240bc [ 3951.287502][T28019] dfe0: 76f23ec0 76f23eb0 000192bc 00132360 [ 3951.287851][T28019] r10:00000036 r9:845e5400 r8:8020029c r7:00000036 r6:00326310 r5:00000000 [ 3951.288233][T28019] r4:00000000 [ 3951.288828][T28019] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 3951.292268][T28019] ---[ end trace 0000000000000000 ]--- [ 3951.307624][ T29] audit: type=1400 audit(134221679.112:654): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3951.308948][ T29] audit: type=1400 audit(134221679.182:655): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3951.309590][ T29] audit: type=1400 audit(134221679.182:656): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3951.330756][ T29] audit: type=1400 audit(134221679.182:657): avc: denied { open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3951.331211][ T29] audit: type=1400 audit(134221679.182:658): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3951.428463][T28019] Kernel panic - not syncing: Fatal exception [ 3951.431352][T28019] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:12:32 Registers: info registers vcpu 0 CPU#0 R00=00000002 R01=76f54140 R02=000003ff R03=76f54140 R04=76f54140 R05=76f541d5 R06=00000000 R07=00000067 R08=00000000 R09=76f53904 R10=76f54554 R11=76f333bc R12=76f53cdc R13=7ece4c94 R14=76ed72c8 R15=76df93ec PSR=600c0010 -ZC- A S usr32 s00=61326630 s01=65687720 d00=6568772061326630 s02=32545b5d s03=39313038 d01=3931303832545b5d s04=6e55205d s05=656c6261 d02=656c62616e55205d s06=206f7420 s07=646e6168 d03=646e6168206f7420 s08=6b20656c s09=656e7265 d04=656e72656b20656c s10=6170206c s11=676e6967 d05=676e69676170206c s12=71657220 s13=74736575 d06=7473657571657220 s14=20746120 s15=74726976 d07=7472697620746120 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=df955db4 R01=00000000 R02=00000000 R03=843ea400 R04=856c8280 R05=df955e68 R06=00040000 R07=00000040 R08=76887008 R09=00004004 R10=00000001 R11=df955e44 R12=829ef16c R13=df955e08 R14=817e992c R15=817a3000 PSR=40010013 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000