last executing test programs: 23.752982867s ago: executing program 0 (id=2737): r0 = socket$inet_sctp(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x44080) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000008c0)=@newqdisc={0x70, 0x24, 0xd0f, 0x70bd26, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xfff2, 0xa}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x44, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x6, 0x0, 0x3ff, 0x6, 0x4, 0x5}, {0xff, 0x1, 0x401, 0xf64a, 0x1, 0x9}, 0xf97, 0x6, 0xb70}}, @TCA_TBF_PRATE64={0xc, 0x5, 0x592f3ca27be3fa98}, @TCA_TBF_RATE64={0xc, 0x4, 0x2e27b565961173ac}]}}]}, 0x70}}, 0x800) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000300)="ab", 0x34000, 0x41, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) 23.419509987s ago: executing program 0 (id=2738): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x4c80, 0x0) 23.160910744s ago: executing program 0 (id=2739): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) symlinkat(0x0, 0xffffffffffffff9c, 0x0) 22.93094197s ago: executing program 0 (id=2740): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 4.24099656s ago: executing program 1 (id=2763): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100033060000000000000000ac1e0001000000000000000000000000fe8000000010000000000000000000000000000000000000000040a400000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000010000000000000000000000000000000032000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x138}}, 0x0) 3.620466277s ago: executing program 1 (id=2764): syz_io_uring_setup(0x4172, &(0x7f0000000780)={0x0, 0x0, 0x10100}, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) fcntl$setpipe(r2, 0x407, 0x6) 2.911046438s ago: executing program 1 (id=2765): socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f0000000740)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0xfc, 0x0, 0x8, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x2, 0x6, 0x0, 0x9, {{0x5}, {0x5, 0x24, 0x0, 0x4a0a}, {0xd, 0x24, 0xf, 0x1, 0x0, 0xfff8, 0x3, 0xf}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x1, 0xed}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x3, 0x6, 0xf7}}}}}]}}]}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001980), 0x1) pipe(&(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 1.570330155s ago: executing program 1 (id=2766): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x2, 0x5}, 0x8) 1.007635801s ago: executing program 1 (id=2767): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 480.970206ms ago: executing program 1 (id=2768): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000001200)={&(0x7f0000000000)={0x1d, r1, 0x0, {0x2, 0xff, 0x4}, 0xfd}, 0x18, &(0x7f00000011c0)={&(0x7f00000001c0)="27fd482ac5a6d19823", 0x9}, 0x1, 0x0, 0x0, 0x2404c011}, 0x1) sendmsg$can_j1939(r0, &(0x7f0000000980)={&(0x7f00000008c0)={0x1d, 0x0, 0x3, {0x0, 0x1, 0x3}, 0xfe}, 0x18, &(0x7f0000000940)={&(0x7f0000000900)="f1dd86", 0x3}, 0x1, 0x0, 0x0, 0x8080}, 0x85) 260.372153ms ago: executing program 0 (id=2769): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000000005"], 0xd4}}, 0x0) 0s ago: executing program 0 (id=2770): socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f0000000740)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0xfc, 0x0, 0x8, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x2, 0x6, 0x0, 0x9, {{0x5}, {0x5, 0x24, 0x0, 0x4a0a}, {0xd, 0x24, 0xf, 0x1, 0x0, 0xfff8, 0x3, 0xf}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x8, 0x4, 0x1, 0xed}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x3, 0x6, 0xf7}}}}}]}}]}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001980), 0x1) pipe(&(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendto$inet6(r0, &(0x7f0000000280)="4103092cc1f7480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) kernel console output (not intermixed with test programs): +0x14/0x18) [ 841.669626][T10594] r6:200000c0 r5:00000000 r4:dfd01f38 [ 841.669909][T10594] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 841.670377][T10594] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 841.670853][T10594] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 841.671451][T10594] r8:00044000 r7:00000000 r6:8316d680 r5:dfd01f38 r4:dfd01e74 [ 841.671856][T10594] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 841.672293][T10594] r10:00000128 r9:82e58000 r8:8020029c r7:00044000 r6:200000c0 r5:8316d680 [ 841.672648][T10594] r4:00000000 [ 841.672848][T10594] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 841.673261][T10594] Exception stack(0xdfd01fa8 to 0xdfd01ff0) [ 841.673540][T10594] 1fa0: 00000000 00000000 00000003 200000c0 00044000 00000000 [ 841.673940][T10594] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 841.674285][T10594] 1fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 841.674561][T10594] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 841.848839][T10598] FAULT_INJECTION: forcing a failure. [ 841.848839][T10598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.849279][T10598] CPU: 0 UID: 0 PID: 10598 Comm: syz.0.1853 Not tainted 6.12.0-rc7-syzkaller #0 [ 841.849523][T10598] Hardware name: ARM-Versatile Express [ 841.849667][T10598] Call trace: [ 841.849775][T10598] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 841.850121][T10598] r7:dfbe5e30 r6:20000240 r5:60000013 r4:8203de58 [ 841.850295][T10598] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 841.850644][T10598] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 841.850898][T10598] r5:00000000 r4:8274e844 [ 841.851050][T10598] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 841.851367][T10598] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 841.851615][T10598] r6:20000240 r5:00000000 r4:dfbe5f38 [ 841.851773][T10598] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 841.852068][T10598] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 841.852352][T10598] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 841.852666][T10598] r8:00000810 r7:00000000 r6:84c05b80 r5:dfbe5f38 r4:dfbe5e74 [ 841.853116][T10598] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 841.853613][T10598] r10:00000128 r9:83ddb000 r8:8020029c r7:00000810 r6:20000240 r5:84c05b80 [ 841.854157][T10598] r4:00000000 [ 841.854756][T10598] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 841.855053][T10598] Exception stack(0xdfbe5fa8 to 0xdfbe5ff0) [ 841.855789][T10598] 5fa0: 00000000 00000000 00000003 20000240 00000810 00000000 [ 841.856829][T10598] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 841.857588][T10598] 5fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 841.858804][T10598] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 842.208586][T10605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10605 comm=syz.0.1856 [ 845.082420][ T31] audit: type=1400 audit(844.992:474): avc: denied { getopt } for pid=10619 comm="syz.1.1861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 845.454562][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.455339][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.455808][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.456263][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.468247][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.469051][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.469484][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.469950][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.470405][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.470841][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.471289][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.471722][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.472168][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.472596][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.473275][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.473816][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.474265][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.474695][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.475130][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.475562][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.476000][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.476431][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.488160][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.488861][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.489317][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.490811][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.491246][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.491748][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.499732][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.502758][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.503923][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.504363][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.504849][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.505287][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.505706][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.506140][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.506558][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.516007][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.517509][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.522408][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.523082][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.523551][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.524120][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.524623][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.525492][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.531752][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.532367][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.532833][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.533287][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.533732][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.534169][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.535096][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.535569][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.536007][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.536471][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.544211][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.544930][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.545504][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.546108][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.550389][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.551036][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.551506][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.553519][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.554480][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.555304][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.555989][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.556551][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.561055][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.561592][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.562056][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.562663][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.563218][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.568397][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.569088][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.569543][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.569969][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.570379][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.570770][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.571185][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.571587][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.572021][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.572459][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.572925][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.573366][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.573782][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.574223][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.574647][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.575116][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.575532][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.576142][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.591460][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.592190][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.592608][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.593048][ T47] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 845.604788][ T47] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz0 [ 845.619940][ T31] audit: type=1400 audit(845.532:475): avc: denied { create } for pid=10633 comm="syz.1.1866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 845.624294][ T31] audit: type=1400 audit(845.532:476): avc: denied { write } for pid=10633 comm="syz.1.1866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 848.015734][T10643] FAULT_INJECTION: forcing a failure. [ 848.015734][T10643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 848.016381][T10643] CPU: 0 UID: 0 PID: 10643 Comm: syz.0.1867 Not tainted 6.12.0-rc7-syzkaller #0 [ 848.016750][T10643] Hardware name: ARM-Versatile Express [ 848.017348][T10643] Call trace: [ 848.017582][T10643] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 848.018023][T10643] r7:dfed1e30 r6:20000700 r5:60000013 r4:8203de58 [ 848.018304][T10643] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 848.018707][T10643] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 848.019130][T10643] r5:00000000 r4:8274e844 [ 848.019339][T10643] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 848.019738][T10643] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 848.020119][T10643] r6:20000700 r5:00000000 r4:dfed1f38 [ 848.020357][T10643] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 848.020758][T10643] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 848.021193][T10643] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 848.021595][T10643] r8:200c0011 r7:00000000 r6:84c04f00 r5:dfed1f38 r4:dfed1e74 [ 848.021895][T10643] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 848.022296][T10643] r10:00000128 r9:8375b000 r8:8020029c r7:200c0011 r6:20000700 r5:84c04f00 [ 848.022627][T10643] r4:00000000 [ 848.022809][T10643] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 848.023495][T10643] Exception stack(0xdfed1fa8 to 0xdfed1ff0) [ 848.023889][T10643] 1fa0: 00000000 00000000 00000003 20000700 200c0011 00000000 [ 848.024589][T10643] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 848.025125][T10643] 1fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 848.025427][T10643] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 848.210744][ T31] audit: type=1400 audit(848.122:477): avc: denied { create } for pid=10644 comm="syz.1.1869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 853.543610][T10680] FAULT_INJECTION: forcing a failure. [ 853.543610][T10680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 853.544469][T10680] CPU: 0 UID: 0 PID: 10680 Comm: syz.0.1882 Not tainted 6.12.0-rc7-syzkaller #0 [ 853.544899][T10680] Hardware name: ARM-Versatile Express [ 853.545140][T10680] Call trace: [ 853.545362][T10680] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 853.545784][T10680] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 853.546034][T10680] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 853.546414][T10680] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 853.547142][T10680] r5:00000000 r4:8274e844 [ 853.547396][T10680] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 853.548063][T10680] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 853.548448][T10680] r6:00000000 r5:dff65f68 r4:00000002 [ 853.548682][T10680] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 853.549132][T10680] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 853.549580][T10680] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 853.550060][T10680] r10:00000001 r9:805c4430 r8:00000002 r7:dff65f68 r6:0000000f r5:76bd1f30 [ 853.550388][T10680] r4:83498c00 r3:dff65e9f [ 853.550626][T10680] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 853.551074][T10680] r8:76bd1f30 r7:dff65f68 r6:83498c00 r5:0000000f r4:8452b3c0 [ 853.551354][T10680] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 853.551762][T10680] r10:00000003 r9:83498c00 r8:8020029c r7:00000000 r6:00000000 r5:8452b3c0 [ 853.552091][T10680] r4:8452b3c3 [ 853.552261][T10680] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 853.552652][T10680] r7:00000003 r6:00000004 r5:76bd1f30 r4:0000000f [ 853.552948][T10680] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 853.553324][T10680] Exception stack(0xdff65fa8 to 0xdff65ff0) [ 853.553601][T10680] 5fa0: 0000000f 76bd1f30 00000004 76bd1f30 0000000f 00000000 [ 853.554132][T10680] 5fc0: 0000000f 76bd1f30 00000004 00000003 00000000 00006364 003d0f00 76bd20bc [ 853.554486][T10680] 5fe0: 00000158 76bd1ed0 000d8998 00131324 [ 853.715132][T10682] FAULT_INJECTION: forcing a failure. [ 853.715132][T10682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 853.715702][T10682] CPU: 1 UID: 0 PID: 10682 Comm: syz.0.1883 Not tainted 6.12.0-rc7-syzkaller #0 [ 853.716062][T10682] Hardware name: ARM-Versatile Express [ 853.716260][T10682] Call trace: [ 853.716438][T10682] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 853.717135][T10682] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 853.717653][T10682] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 853.718052][T10682] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 853.718441][T10682] r5:00000000 r4:8274e844 [ 853.718640][T10682] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 853.719033][T10682] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 853.719399][T10682] r6:00000000 r5:dff65f68 r4:00000002 [ 853.719632][T10682] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 853.719987][T10682] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 853.720617][T10682] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 853.721305][T10682] r10:00000001 r9:805c4430 r8:00000002 r7:dff65f68 r6:0000000f r5:76bd1f30 [ 853.721687][T10682] r4:83498c00 r3:dff65e9f [ 853.721985][T10682] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 853.722379][T10682] r8:76bd1f30 r7:dff65f68 r6:83498c00 r5:0000000f r4:8466b240 [ 853.722649][T10682] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 853.723016][T10682] r10:00000003 r9:83498c00 r8:8020029c r7:00000000 r6:00000000 r5:8466b240 [ 853.723303][T10682] r4:8466b243 [ 853.723454][T10682] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 853.723831][T10682] r7:00000003 r6:00000007 r5:76bd1f30 r4:0000000f [ 853.724105][T10682] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 853.724463][T10682] Exception stack(0xdff65fa8 to 0xdff65ff0) [ 853.724796][T10682] 5fa0: 0000000f 76bd1f30 00000007 76bd1f30 0000000f 00000000 [ 853.725140][T10682] 5fc0: 0000000f 76bd1f30 00000007 00000003 00000000 00006364 003d0f00 76bd20bc [ 853.725464][T10682] 5fe0: 00000158 76bd1ed0 000d8998 00131324 [ 854.450281][T10698] FAULT_INJECTION: forcing a failure. [ 854.450281][T10698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.450873][T10698] CPU: 0 UID: 0 PID: 10698 Comm: syz.0.1888 Not tainted 6.12.0-rc7-syzkaller #0 [ 854.451163][T10698] Hardware name: ARM-Versatile Express [ 854.451361][T10698] Call trace: [ 854.451544][T10698] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 854.451868][T10698] r7:e0455d5c r6:00000002 r5:60000013 r4:8203de58 [ 854.452049][T10698] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 854.452365][T10698] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 854.452697][T10698] r5:00000000 r4:827192b0 [ 854.452905][T10698] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 854.453225][T10698] [<808e69e0>] (should_fail_ex) from [<804e9220>] (should_fail_alloc_page+0x68/0x74) [ 854.453613][T10698] r6:00000002 r5:00040cc0 r4:e0455d68 [ 854.453817][T10698] [<804e91b8>] (should_fail_alloc_page) from [<804b96e8>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 854.454293][T10698] [<804b9660>] (prepare_alloc_pages.constprop.0) from [<804c02c0>] (__alloc_pages_noprof+0xb4/0x1128) [ 854.454756][T10698] r10:00000002 r9:8452bc00 r8:ffffffff r7:83788c00 r6:00040cc0 r5:00000000 [ 854.455052][T10698] r4:00000000 r3:e0455d68 [ 854.455248][T10698] [<804c020c>] (__alloc_pages_noprof) from [<804c6e3c>] (___kmalloc_large_node+0x50/0xac) [ 854.455645][T10698] r10:83788c00 r9:8452bc00 r8:ffffffff r7:804ce59c r6:00000cc0 r5:00000000 [ 854.455928][T10698] r4:00000002 [ 854.456109][T10698] [<804c6dec>] (___kmalloc_large_node) from [<804c6fcc>] (__kmalloc_large_node_noprof+0x24/0x114) [ 854.456534][T10698] r7:804ce59c r6:00000cc0 r5:00002200 r4:85552070 [ 854.456929][T10698] [<804c6fa8>] (__kmalloc_large_node_noprof) from [<804ce59c>] (__kmalloc_noprof+0x324/0x458) [ 854.457463][T10698] r10:83788c00 r9:8452bc00 r8:83788c00 r7:00000cc0 r6:85550000 r5:00002200 [ 854.457950][T10698] r4:85552070 [ 854.458124][T10698] [<804ce278>] (__kmalloc_noprof) from [<812de5e8>] (vhost_dev_set_owner+0xdc/0x218) [ 854.458572][T10698] r10:83788c00 r9:8452bc00 r8:00000003 r7:822386bc r6:85550000 r5:00000000 [ 854.458908][T10698] r4:85552070 [ 854.459078][T10698] [<812de50c>] (vhost_dev_set_owner) from [<812d2b3c>] (vhost_net_ioctl+0x1d8/0xa40) [ 854.459594][T10698] r7:85554000 r6:85550004 r5:8260e968 r4:85550000 [ 854.459844][T10698] [<812d2964>] (vhost_net_ioctl) from [<80530794>] (sys_ioctl+0x134/0xd98) [ 854.460422][T10698] r10:83788c00 r9:8452bc00 r8:00000003 r7:00000000 r6:8452bc00 r5:00000000 [ 854.460811][T10698] r4:0000af01 [ 854.461037][T10698] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 854.461368][T10698] Exception stack(0xe0455fa8 to 0xe0455ff0) [ 854.461637][T10698] 5fa0: 00000000 00000000 00000003 0000af01 00000000 00000000 [ 854.462067][T10698] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bd20bc [ 854.462392][T10698] 5fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 854.462875][T10698] r10:00000036 r9:83788c00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 854.463106][T10698] r4:00000000 [ 855.454599][ T31] audit: type=1400 audit(855.362:478): avc: denied { shutdown } for pid=10704 comm="syz.1.1891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 855.896116][ T31] audit: type=1400 audit(855.802:479): avc: denied { create } for pid=10715 comm="syz.1.1893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 856.378305][T10727] FAULT_INJECTION: forcing a failure. [ 856.378305][T10727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.378996][T10727] CPU: 0 UID: 0 PID: 10727 Comm: syz.1.1897 Not tainted 6.12.0-rc7-syzkaller #0 [ 856.379317][T10727] Hardware name: ARM-Versatile Express [ 856.379552][T10727] Call trace: [ 856.379766][T10727] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 856.380274][T10727] r7:e065de30 r6:20000c40 r5:60000013 r4:8203de58 [ 856.380577][T10727] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 856.381044][T10727] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 856.381491][T10727] r5:00000000 r4:8274e844 [ 856.381700][T10727] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 856.382127][T10727] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 856.382540][T10727] r6:20000c40 r5:00000000 r4:e065df38 [ 856.382782][T10727] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 856.383231][T10727] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 856.383725][T10727] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 856.384175][T10727] r8:00004004 r7:00000000 r6:84c05180 r5:e065df38 r4:e065de74 [ 856.384441][T10727] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 856.384869][T10727] r10:00000128 r9:8349d400 r8:8020029c r7:00004004 r6:20000c40 r5:84c05180 [ 856.385172][T10727] r4:00000000 [ 856.385335][T10727] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 856.385678][T10727] Exception stack(0xe065dfa8 to 0xe065dff0) [ 856.385949][T10727] dfa0: 00000000 00000000 00000003 20000c40 00004004 00000000 [ 856.386349][T10727] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bec0bc [ 856.386730][T10727] dfe0: 76bebec0 76bebeb0 00018af0 00133450 [ 856.387014][T10727] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 858.048291][T10743] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10743 comm=syz.1.1903 [ 858.579441][T10755] FAULT_INJECTION: forcing a failure. [ 858.579441][T10755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 858.580220][T10755] CPU: 1 UID: 0 PID: 10755 Comm: syz.1.1908 Not tainted 6.12.0-rc7-syzkaller #0 [ 858.580601][T10755] Hardware name: ARM-Versatile Express [ 858.580882][T10755] Call trace: [ 858.581408][T10755] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 858.582177][T10755] r7:84304a40 r6:00000000 r5:60000013 r4:8203de58 [ 858.582644][T10755] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 858.583065][T10755] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 858.583472][T10755] r5:00000000 r4:8274e844 [ 858.583675][T10755] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 858.584095][T10755] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 858.584872][T10755] r6:00000000 r5:20000040 r4:00000000 [ 858.585389][T10755] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 858.585922][T10755] [<808e6bd4>] (should_fail_usercopy) from [<8166902c>] (do_ip_getsockopt+0x794/0xbb0) [ 858.586395][T10755] [<8166889c>] (do_ip_getsockopt) from [<816694ac>] (ip_getsockopt+0x64/0x134) [ 858.587258][T10755] r10:00000127 r9:20000040 r8:00000000 r7:20000040 r6:00000000 r5:84304a40 [ 858.587811][T10755] r4:00000001 [ 858.588055][T10755] [<81669448>] (ip_getsockopt) from [<8177ced8>] (ipv6_getsockopt+0x148/0x150) [ 858.588730][T10755] r9:20000040 r8:00000000 r7:20000040 r6:00000000 r5:00000001 r4:84304be0 [ 858.589387][T10755] [<8177cd90>] (ipv6_getsockopt) from [<8167a1b0>] (tcp_getsockopt+0x34/0x6c) [ 858.589946][T10755] r9:20000040 r8:00000000 r7:8315c780 r6:00000001 r5:00000000 r4:8177cd90 [ 858.590302][T10755] [<8167a17c>] (tcp_getsockopt) from [<8148afe4>] (sock_common_getsockopt+0x28/0x30) [ 858.591097][T10755] r4:8167a17c [ 858.591315][T10755] [<8148afbc>] (sock_common_getsockopt) from [<81487dd8>] (do_sock_getsockopt+0x10c/0x29c) [ 858.594713][T10755] r4:8148afbc [ 858.594970][T10755] [<81487ccc>] (do_sock_getsockopt) from [<81489d60>] (sys_getsockopt+0x90/0xd4) [ 858.595612][T10755] r9:83498000 r8:8315c780 r7:00000000 r6:00000001 r5:00000000 r4:00000000 [ 858.596240][T10755] [<81489cd0>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 858.597047][T10755] Exception stack(0xdfdcdfa8 to 0xdfdcdff0) [ 858.597523][T10755] dfa0: 20000040 00000000 00000003 00000000 00000001 00000000 [ 858.598243][T10755] dfc0: 20000040 00000000 00131400 00000127 00000000 00006364 003d0f00 76bec0bc [ 858.599182][T10755] dfe0: 76bebec0 76bebeb0 00018af0 00133450 [ 858.599594][T10755] r8:8020029c r7:00000127 r6:00131400 r5:00000000 r4:20000040 [ 859.019434][T10763] FAULT_INJECTION: forcing a failure. [ 859.019434][T10763] name failslab, interval 1, probability 0, space 0, times 0 [ 859.020071][T10763] CPU: 0 UID: 0 PID: 10763 Comm: syz.1.1913 Not tainted 6.12.0-rc7-syzkaller #0 [ 859.020381][T10763] Hardware name: ARM-Versatile Express [ 859.020575][T10763] Call trace: [ 859.020816][T10763] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 859.021253][T10763] r7:01000dc0 r6:84a15240 r5:60000013 r4:8203de58 [ 859.021504][T10763] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 859.021906][T10763] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 859.022291][T10763] r5:00000000 r4:8271925c [ 859.022478][T10763] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 859.022853][T10763] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 859.023239][T10763] r6:84a15240 r5:000000a8 r4:82c01180 [ 859.023536][T10763] [<804e9124>] (should_failslab) from [<804ceb64>] (__kmalloc_node_noprof+0xa0/0x464) [ 859.024011][T10763] [<804ceac4>] (__kmalloc_node_noprof) from [<804cb93c>] (alloc_slab_obj_exts+0x4c/0xc4) [ 859.024497][T10763] r10:00000000 r9:dfdcdc08 r8:84a4afc0 r7:828c1b00 r6:84a15240 r5:00000000 [ 859.024933][T10763] r4:dde9faf4 [ 859.025119][T10763] [<804cb8f0>] (alloc_slab_obj_exts) from [<804f8244>] (__memcg_slab_post_alloc_hook+0x15c/0x450) [ 859.025600][T10763] r5:82cac780 r4:dde9faf4 [ 859.025808][T10763] [<804f80e8>] (__memcg_slab_post_alloc_hook) from [<804cdbec>] (kmem_cache_alloc_node_noprof+0x318/0x338) [ 859.026314][T10763] r10:00000000 r9:000000c0 r8:a0000013 r7:83498c00 r6:00400cc0 r5:00000001 [ 859.026651][T10763] r4:82cac780 [ 859.027049][T10763] [<804cd8d4>] (kmem_cache_alloc_node_noprof) from [<81494acc>] (__alloc_skb+0x138/0x160) [ 859.027674][T10763] r10:dfdcdd2c r9:00000000 r8:00400cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 859.028012][T10763] r4:82606000 [ 859.028191][T10763] [<81494994>] (__alloc_skb) from [<8149cca0>] (alloc_skb_with_frags+0x44/0x1ec) [ 859.028599][T10763] r8:802a6f40 r7:dfdcdccc r6:00000000 r5:00001000 r4:00000003 [ 859.028955][T10763] [<8149cc5c>] (alloc_skb_with_frags) from [<8148e3a0>] (sock_alloc_send_pskb+0x1f4/0x228) [ 859.029414][T10763] r10:dfdcdd2c r9:00000000 r8:802a6f40 r7:dfdcdccc r6:83498c00 r5:7fffffff [ 859.029719][T10763] r4:82fa5b00 [ 859.029922][T10763] [<8148e1ac>] (sock_alloc_send_pskb) from [<8174c44c>] (unix_dgram_sendmsg+0x154/0x8b8) [ 859.030408][T10763] r10:00000000 r9:82fa5b00 r8:83498c00 r7:00000000 r6:00000000 r5:84c04000 [ 859.030717][T10763] r4:dfdcdf38 [ 859.030894][T10763] [<8174c2f8>] (unix_dgram_sendmsg) from [<8174cbf4>] (unix_seqpacket_sendmsg+0x44/0x84) [ 859.031280][T10763] r10:00000000 r9:dfdcddd4 r8:dfdcddd4 r7:84c04000 r6:84c04000 r5:dfdcdf38 [ 859.031590][T10763] r4:00000000 [ 859.031778][T10763] [<8174cbb0>] (unix_seqpacket_sendmsg) from [<8148720c>] (__sock_sendmsg+0x44/0x78) [ 859.032173][T10763] r5:dfdcdf38 r4:00000000 [ 859.032376][T10763] [<814871c8>] (__sock_sendmsg) from [<8148820c>] (____sys_sendmsg+0x2a4/0x2c4) [ 859.032792][T10763] r7:84c04000 r6:00000000 r5:04000000 r4:dfdcdf38 [ 859.033048][T10763] [<81487f68>] (____sys_sendmsg) from [<8148a174>] (___sys_sendmsg+0x9c/0xd0) [ 859.033420][T10763] r10:dfdcde34 r9:20000240 r8:04000000 r7:00000000 r6:84c04000 r5:dfdcdf38 [ 859.033716][T10763] r4:00000000 [ 859.033908][T10763] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 859.034329][T10763] r10:00000128 r9:83498c00 r8:8020029c r7:04000000 r6:20000240 r5:84c04000 [ 859.034625][T10763] r4:00000000 [ 859.034793][T10763] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 859.035167][T10763] Exception stack(0xdfdcdfa8 to 0xdfdcdff0) [ 859.035415][T10763] dfa0: 00000000 00000000 00000000 20000240 04000000 00000000 [ 859.035739][T10763] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bec0bc [ 859.036063][T10763] dfe0: 76bebec0 76bebeb0 00018af0 00133450 [ 859.036313][T10763] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 859.258853][ T31] audit: type=1400 audit(859.172:480): avc: denied { write } for pid=10768 comm="syz.0.1915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 859.720830][ T31] audit: type=1400 audit(859.632:481): avc: denied { connect } for pid=10766 comm="syz.1.1914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 860.780038][T10790] FAULT_INJECTION: forcing a failure. [ 860.780038][T10790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 860.780445][T10790] CPU: 0 UID: 0 PID: 10790 Comm: syz.0.1923 Not tainted 6.12.0-rc7-syzkaller #0 [ 860.780815][T10790] Hardware name: ARM-Versatile Express [ 860.780955][T10790] Call trace: [ 860.781084][T10790] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 860.781393][T10790] r7:8486a3a3 r6:00000000 r5:60000013 r4:8203de58 [ 860.781602][T10790] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 860.781855][T10790] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 860.782139][T10790] r5:00000000 r4:8274e844 [ 860.782256][T10790] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 860.782445][T10790] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 860.782674][T10790] r6:00000000 r5:ea9c5f48 r4:00000014 [ 860.782836][T10790] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 860.783162][T10790] [<808e6bd4>] (should_fail_usercopy) from [<80838c58>] (_copy_from_iter+0x68/0x7c8) [ 860.783425][T10790] [<80838bf0>] (_copy_from_iter) from [<81830b6c>] (isotp_sendmsg+0x25c/0x7fc) [ 860.783659][T10790] r10:ea9c5f38 r9:8486a3a3 r8:ea9c5f48 r7:00000014 r6:84868000 r5:8486a000 [ 860.784147][T10790] r4:00000000 [ 860.784480][T10790] [<81830910>] (isotp_sendmsg) from [<8148720c>] (__sock_sendmsg+0x44/0x78) [ 860.784831][T10790] r10:00000000 r9:ea9c5dd4 r8:ea9c5dd4 r7:84c05400 r6:84c05400 r5:ea9c5f38 [ 860.785097][T10790] r4:00000000 [ 860.785227][T10790] [<814871c8>] (__sock_sendmsg) from [<8148820c>] (____sys_sendmsg+0x2a4/0x2c4) [ 860.785583][T10790] r7:84c05400 r6:00000000 r5:00000001 r4:ea9c5f38 [ 860.785857][T10790] [<81487f68>] (____sys_sendmsg) from [<8148a174>] (___sys_sendmsg+0x9c/0xd0) [ 860.786177][T10790] r10:ea9c5e34 r9:20000000 r8:00000001 r7:00000000 r6:84c05400 r5:ea9c5f38 [ 860.786385][T10790] r4:00000000 [ 860.786509][T10790] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 860.787000][T10790] r10:00000128 r9:83758000 r8:8020029c r7:00000001 r6:20000000 r5:84c05400 [ 860.787446][T10790] r4:00000000 [ 860.787615][T10790] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 860.788056][T10790] Exception stack(0xea9c5fa8 to 0xea9c5ff0) [ 860.788410][T10790] 5fa0: 00000000 00000000 00000003 20000000 00000001 00000000 [ 860.788921][T10790] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 860.789432][T10790] 5fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 860.789663][T10790] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 865.474237][T10852] FAULT_INJECTION: forcing a failure. [ 865.474237][T10852] name failslab, interval 1, probability 0, space 0, times 0 [ 865.478822][T10852] CPU: 0 UID: 0 PID: 10852 Comm: syz.1.1939 Not tainted 6.12.0-rc7-syzkaller #0 [ 865.479335][T10852] Hardware name: ARM-Versatile Express [ 865.479559][T10852] Call trace: [ 865.479760][T10852] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 865.480183][T10852] r7:00000d40 r6:8452bda8 r5:60000013 r4:8203de58 [ 865.480488][T10852] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 865.481070][T10852] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 865.481489][T10852] r5:00000000 r4:8271925c [ 865.481688][T10852] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 865.482057][T10852] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 865.482433][T10852] r6:8452bda8 r5:00000019 r4:82c01240 [ 865.482646][T10852] [<804e9124>] (should_failslab) from [<804ce314>] (__kmalloc_noprof+0x9c/0x458) [ 865.483022][T10852] [<804ce278>] (__kmalloc_noprof) from [<80752240>] (tomoyo_encode2+0x64/0xf0) [ 865.483440][T10852] r10:00000fff r9:82c9fc00 r8:00000000 r7:830ef908 r6:8452bda8 r5:83c36ffd [ 865.483760][T10852] r4:83c36fef [ 865.483913][T10852] [<807521dc>] (tomoyo_encode2) from [<807522f0>] (tomoyo_encode+0x24/0x30) [ 865.484279][T10852] r9:82c9fc00 r8:00000000 r7:830ef908 r6:8452bda8 r5:00001000 r4:83c36ff0 [ 865.484534][T10852] [<807522cc>] (tomoyo_encode) from [<8075237c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 865.484942][T10852] r5:00001000 r4:83c36000 [ 865.485116][T10852] [<807522fc>] (tomoyo_realpath_from_path) from [<8074e47c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 865.485498][T10852] r10:8441c800 r9:00000000 r8:00000003 r7:0000894c r6:00000004 r5:81ad1968 [ 865.485756][T10852] r4:8452bda8 r3:824ba340 [ 865.485923][T10852] [<8074e3b0>] (tomoyo_path_number_perm) from [<80752d48>] (tomoyo_file_ioctl+0x1c/0x20) [ 865.486299][T10852] r9:8452bd80 r8:00000003 r7:00000000 r6:00000000 r5:0000894c r4:8452bd80 [ 865.486566][T10852] [<80752d2c>] (tomoyo_file_ioctl) from [<80701394>] (security_file_ioctl+0x64/0x1e4) [ 865.487407][T10852] [<80701330>] (security_file_ioctl) from [<805306b0>] (sys_ioctl+0x50/0xd98) [ 865.488080][T10852] r7:00000000 r6:8452bd81 r5:00000000 r4:0000894c [ 865.488371][T10852] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 865.488734][T10852] Exception stack(0xeab41fa8 to 0xeab41ff0) [ 865.488986][T10852] 1fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 865.489317][T10852] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bec0bc [ 865.489644][T10852] 1fe0: 76bebec0 76bebeb0 00018af0 00133450 [ 865.489906][T10852] r10:00000036 r9:8441c800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 865.490219][T10852] r4:00000000 [ 865.497477][T10852] ERROR: Out of memory at tomoyo_realpath_from_path. [ 867.160525][T10862] block nbd0: shutting down sockets [ 869.631720][T10877] FAULT_INJECTION: forcing a failure. [ 869.631720][T10877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 869.633630][T10877] CPU: 1 UID: 0 PID: 10877 Comm: syz.0.1948 Not tainted 6.12.0-rc7-syzkaller #0 [ 869.634035][T10877] Hardware name: ARM-Versatile Express [ 869.634266][T10877] Call trace: [ 869.634507][T10877] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 869.634966][T10877] r7:8530f442 r6:00000000 r5:60000013 r4:8203de58 [ 869.635143][T10877] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 869.635393][T10877] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 869.635570][T10877] r5:00000000 r4:8274e844 [ 869.635694][T10877] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 869.635901][T10877] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 869.636132][T10877] r6:00000000 r5:eac01ef0 r4:0000000e [ 869.636304][T10877] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 869.636604][T10877] [<808e6bd4>] (should_fail_usercopy) from [<80838c58>] (_copy_from_iter+0x68/0x7c8) [ 869.637218][T10877] [<80838bf0>] (_copy_from_iter) from [<814a3790>] (skb_copy_datagram_from_iter+0x70/0x284) [ 869.637545][T10877] r10:843bfb40 r9:00000ebe r8:00000000 r7:0000000e r6:8530f442 r5:0000000e [ 869.638137][T10877] r4:0000000e [ 869.638337][T10877] [<814a3720>] (skb_copy_datagram_from_iter) from [<80c9148c>] (tun_get_user+0x588/0x1084) [ 869.638762][T10877] r10:81b74c84 r9:00000ebe r8:0000000e r7:843bfb40 r6:eac01ef0 r5:843bfb40 [ 869.639015][T10877] r4:83c26680 [ 869.639122][T10877] [<80c90f04>] (tun_get_user) from [<80c927f0>] (tun_chr_write_iter+0x60/0xc8) [ 869.639400][T10877] r10:81b74c84 r9:20000300 r8:83e6f800 r7:83c26680 r6:00000000 r5:eac01ef0 [ 869.639603][T10877] r4:eac01f08 [ 869.639780][T10877] [<80c92790>] (tun_chr_write_iter) from [<8051795c>] (vfs_write+0x274/0x44c) [ 869.640079][T10877] r8:eac01f68 r7:8441b000 r6:0000000e r5:8452b480 r4:80c92790 [ 869.640278][T10877] [<805176e8>] (vfs_write) from [<80517cb8>] (ksys_write+0x78/0xf8) [ 869.640562][T10877] r10:00000004 r9:8441b000 r8:8020029c r7:00000000 r6:00000000 r5:8452b480 [ 869.640907][T10877] r4:8452b481 [ 869.641026][T10877] [<80517c40>] (ksys_write) from [<80517d48>] (sys_write+0x10/0x14) [ 869.641447][T10877] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 869.641720][T10877] [<80517d38>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 869.642150][T10877] Exception stack(0xeac01fa8 to 0xeac01ff0) [ 869.642441][T10877] 1fa0: 00000000 00000000 00000003 20000300 0000000e 00000000 [ 869.642825][T10877] 1fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76bd20bc [ 869.643236][T10877] 1fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 871.684128][T10892] random: crng reseeded on system resumption [ 871.878453][T10910] FAULT_INJECTION: forcing a failure. [ 871.878453][T10910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 871.879047][T10910] CPU: 0 UID: 0 PID: 10910 Comm: syz.1.1954 Not tainted 6.12.0-rc7-syzkaller #0 [ 871.879414][T10910] Hardware name: ARM-Versatile Express [ 871.879634][T10910] Call trace: [ 871.879835][T10910] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 871.880254][T10910] r7:ead3de30 r6:20000280 r5:60000013 r4:8203de58 [ 871.880624][T10910] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 871.881004][T10910] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 871.881341][T10910] r5:00000000 r4:8274e844 [ 871.881505][T10910] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 871.881828][T10910] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 871.882140][T10910] r6:20000280 r5:00000000 r4:ead3df38 [ 871.882322][T10910] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 871.882632][T10910] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 871.882981][T10910] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 871.883313][T10910] r8:04000080 r7:00000000 r6:84c05900 r5:ead3df38 r4:ead3de74 [ 871.883539][T10910] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 871.883846][T10910] r10:00000128 r9:84419800 r8:8020029c r7:04000080 r6:20000280 r5:84c05900 [ 871.884122][T10910] r4:00000000 [ 871.884283][T10910] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 871.884600][T10910] Exception stack(0xead3dfa8 to 0xead3dff0) [ 871.884921][T10910] dfa0: 00000000 00000000 00000003 20000280 04000080 00000000 [ 871.885283][T10910] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bec0bc [ 871.885605][T10910] dfe0: 76bebec0 76bebeb0 00018af0 00133450 [ 871.885849][T10910] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 876.418109][ T31] audit: type=1400 audit(876.322:482): avc: denied { setopt } for pid=10947 comm="syz.1.1963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 876.447866][ T31] audit: type=1400 audit(876.362:483): avc: denied { name_connect } for pid=10947 comm="syz.1.1963" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 876.572581][T10954] FAULT_INJECTION: forcing a failure. [ 876.572581][T10954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 876.573217][T10954] CPU: 0 UID: 0 PID: 10954 Comm: syz.1.1964 Not tainted 6.12.0-rc7-syzkaller #0 [ 876.573495][T10954] Hardware name: ARM-Versatile Express [ 876.573681][T10954] Call trace: [ 876.573869][T10954] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 876.574221][T10954] r7:eae7de30 r6:20000680 r5:60000013 r4:8203de58 [ 876.574432][T10954] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 876.574958][T10954] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 876.575366][T10954] r5:00000000 r4:8274e844 [ 876.575539][T10954] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 876.575908][T10954] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 876.576255][T10954] r6:20000680 r5:00000000 r4:eae7df38 [ 876.576444][T10954] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 876.576792][T10954] [<808e6bd4>] (should_fail_usercopy) from [<81489ff8>] (copy_msghdr_from_user+0x50/0x130) [ 876.577355][T10954] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 876.577987][T10954] r8:00000000 r7:00000000 r6:84c04780 r5:eae7df38 r4:eae7de74 [ 876.578300][T10954] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 876.578641][T10954] r10:00000128 r9:84418000 r8:8020029c r7:00000000 r6:20000680 r5:84c04780 [ 876.578941][T10954] r4:00000000 [ 876.579117][T10954] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 876.579458][T10954] Exception stack(0xeae7dfa8 to 0xeae7dff0) [ 876.579710][T10954] dfa0: 00000000 00000000 00000003 20000680 00000000 00000000 [ 876.580005][T10954] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bec0bc [ 876.580325][T10954] dfe0: 76bebec0 76bebeb0 00018af0 00133450 [ 876.580723][T10954] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 877.832838][T10960] FAULT_INJECTION: forcing a failure. [ 877.832838][T10960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.835548][T10960] CPU: 0 UID: 0 PID: 10960 Comm: syz.0.1966 Not tainted 6.12.0-rc7-syzkaller #0 [ 877.835942][T10960] Hardware name: ARM-Versatile Express [ 877.836220][T10960] Call trace: [ 877.836456][T10960] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 877.837034][T10960] r7:76bafe1c r6:0000000c r5:60000013 r4:8203de58 [ 877.837479][T10960] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 877.838183][T10960] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 877.838626][T10960] r5:00000000 r4:8274e844 [ 877.838823][T10960] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 877.839272][T10960] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 877.839664][T10960] r6:0000000c r5:0000000c r4:eb1e1ee4 [ 877.839903][T10960] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 877.840315][T10960] [<808e6bd4>] (should_fail_usercopy) from [<81488268>] (move_addr_to_kernel+0x3c/0xe4) [ 877.840910][T10960] [<8148822c>] (move_addr_to_kernel) from [<81489818>] (__sys_sendto+0xc0/0x14c) [ 877.841347][T10960] r9:83ddd400 r8:00000003 r7:84c04a00 r6:76bafe1c r5:00000000 r4:00000000 [ 877.841761][T10960] [<81489758>] (__sys_sendto) from [<814898c0>] (sys_sendto+0x1c/0x24) [ 877.842175][T10960] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76bafe1c [ 877.842496][T10960] [<814898a4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 877.842881][T10960] Exception stack(0xeb1e1fa8 to 0xeb1e1ff0) [ 877.843176][T10960] 1fa0: 76bafe1c 0000000c 00000003 76bafeb0 00000020 00000000 [ 877.843579][T10960] 1fc0: 76bafe1c 0000000c 00000000 00000122 00000003 00000000 76bafeb0 76bb10bc [ 877.843972][T10960] 1fe0: 00000000 76bafdf0 000d8998 001358e8 [ 878.877768][T10966] FAULT_INJECTION: forcing a failure. [ 878.877768][T10966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 878.879047][T10966] CPU: 1 UID: 0 PID: 10966 Comm: syz.1.1969 Not tainted 6.12.0-rc7-syzkaller #0 [ 878.879785][T10966] Hardware name: ARM-Versatile Express [ 878.880041][T10966] Call trace: [ 878.880280][T10966] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 878.880768][T10966] r7:200001c0 r6:00000010 r5:60000013 r4:8203de58 [ 878.881387][T10966] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 878.881997][T10966] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 878.882426][T10966] r5:00000000 r4:8274e844 [ 878.882635][T10966] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 878.883054][T10966] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 878.883449][T10966] r6:00000010 r5:00000010 r4:eae49ef4 [ 878.883637][T10966] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 878.883927][T10966] [<808e6bd4>] (should_fail_usercopy) from [<81488268>] (move_addr_to_kernel+0x3c/0xe4) [ 878.884257][T10966] [<8148822c>] (move_addr_to_kernel) from [<814894cc>] (__sys_connect+0x58/0xc4) [ 878.884562][T10966] r9:83dda400 r8:8020029c r7:0000011b r6:00000010 r5:8466bcc1 r4:200001c0 [ 878.884953][T10966] [<81489474>] (__sys_connect) from [<81489548>] (sys_connect+0x10/0x14) [ 878.885395][T10966] r6:00131400 r5:00000000 r4:00000000 [ 878.885648][T10966] [<81489538>] (sys_connect) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 878.886029][T10966] Exception stack(0xeae49fa8 to 0xeae49ff0) [ 878.886263][T10966] 9fa0: 00000000 00000000 00000005 200001c0 00000010 00000000 [ 878.886563][T10966] 9fc0: 00000000 00000000 00131400 0000011b 00000000 00006364 003d0f00 76bec0bc [ 878.887250][T10966] 9fe0: 76bebec0 76bebeb0 00018af0 00133450 [ 881.609800][ T31] audit: type=1400 audit(881.522:484): avc: denied { audit_write } for pid=10971 comm="syz.0.1971" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 883.296315][T10987] FAULT_INJECTION: forcing a failure. [ 883.296315][T10987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 883.299679][T10987] CPU: 0 UID: 0 PID: 10987 Comm: syz.1.1976 Not tainted 6.12.0-rc7-syzkaller #0 [ 883.300197][T10987] Hardware name: ARM-Versatile Express [ 883.300415][T10987] Call trace: [ 883.300616][T10987] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 883.301089][T10987] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 883.301342][T10987] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 883.301725][T10987] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 883.302115][T10987] r5:00000000 r4:8274e844 [ 883.302299][T10987] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 883.302666][T10987] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 883.303021][T10987] r6:00000000 r5:eb16df68 r4:00000002 [ 883.303247][T10987] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 883.303598][T10987] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 883.304007][T10987] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 883.304429][T10987] r10:00000001 r9:805c4430 r8:00000002 r7:eb16df68 r6:0000000f r5:76bebf30 [ 883.304815][T10987] r4:83ddec00 r3:eb16de9f [ 883.305016][T10987] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 883.305402][T10987] r8:76bebf30 r7:eb16df68 r6:83ddec00 r5:0000000f r4:8452b900 [ 883.305668][T10987] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 883.306053][T10987] r10:00000003 r9:83ddec00 r8:8020029c r7:00000000 r6:00000000 r5:8452b900 [ 883.306348][T10987] r4:8452b903 [ 883.306507][T10987] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 883.307462][T10987] r7:00000003 r6:00000006 r5:76bebf30 r4:0000000f [ 883.308053][T10987] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 883.308445][T10987] Exception stack(0xeb16dfa8 to 0xeb16dff0) [ 883.308758][T10987] dfa0: 0000000f 76bebf30 00000006 76bebf30 0000000f 00000000 [ 883.310082][T10987] dfc0: 0000000f 76bebf30 00000006 00000003 00000000 00006364 003d0f00 76bec0bc [ 883.311112][T10987] dfe0: 00000158 76bebed0 000d8998 00131324 [ 884.863383][T11001] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1980'. [ 885.074796][T11011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11011 comm=syz.1.1982 [ 885.093579][T11011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11011 comm=syz.1.1982 [ 885.095120][ T31] audit: type=1400 audit(885.002:485): avc: denied { read } for pid=11009 comm="syz.1.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 885.103818][T11011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11011 comm=syz.1.1982 [ 885.106595][T11011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11011 comm=syz.1.1982 [ 885.365188][ T31] audit: type=1400 audit(885.272:486): avc: denied { setattr } for pid=11009 comm="syz.1.1982" name="L2TP/IP" dev="sockfs" ino=20354 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 885.554042][T11011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11011 comm=syz.1.1982 [ 885.993106][T11028] FAULT_INJECTION: forcing a failure. [ 885.993106][T11028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.993711][T11028] CPU: 1 UID: 0 PID: 11028 Comm: syz.1.1986 Not tainted 6.12.0-rc7-syzkaller #0 [ 885.994069][T11028] Hardware name: ARM-Versatile Express [ 885.994301][T11028] Call trace: [ 885.994516][T11028] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 885.994955][T11028] r7:00000000 r6:76bebf30 r5:60000013 r4:8203de58 [ 885.995206][T11028] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 885.995610][T11028] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 885.996159][T11028] r5:00000000 r4:8274e844 [ 885.996423][T11028] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 885.997134][T11028] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 885.997812][T11028] r6:76bebf30 r5:00000001 r4:00000001 [ 885.998065][T11028] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 885.998463][T11028] [<808e6bd4>] (should_fail_usercopy) from [<808444dc>] (kstrtouint_from_user+0x60/0x134) [ 885.998895][T11028] [<8084447c>] (kstrtouint_from_user) from [<805c59f4>] (proc_fail_nth_write+0x40/0xe8) [ 885.999322][T11028] r8:eb431f68 r7:83ddd400 r6:00000001 r5:84787c00 r4:00000001 [ 885.999610][T11028] [<805c59b4>] (proc_fail_nth_write) from [<80517794>] (vfs_write+0xac/0x44c) [ 886.000041][T11028] r5:84787c00 r4:805c59b4 [ 886.000251][T11028] [<805176e8>] (vfs_write) from [<80517cb8>] (ksys_write+0x78/0xf8) [ 886.000652][T11028] r10:00000004 r9:83ddd400 r8:8020029c r7:00000000 r6:00000002 r5:84787c00 [ 886.001041][T11028] r4:84787c03 [ 886.001224][T11028] [<80517c40>] (ksys_write) from [<80517d48>] (sys_write+0x10/0x14) [ 886.001631][T11028] r7:00000004 r6:00000006 r5:76bebf30 r4:00000001 [ 886.001916][T11028] [<80517d38>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 886.002302][T11028] Exception stack(0xeb431fa8 to 0xeb431ff0) [ 886.002728][T11028] 1fa0: 00000001 76bebf30 00000006 76bebf30 00000001 00000000 [ 886.003348][T11028] 1fc0: 00000001 76bebf30 00000006 00000004 00000000 00006364 003d0f00 76bec0bc [ 886.003899][T11028] 1fe0: 00000158 76bebed0 000d8998 001313ec [ 886.583710][T11038] FAULT_INJECTION: forcing a failure. [ 886.583710][T11038] name failslab, interval 1, probability 0, space 0, times 0 [ 886.585317][T11038] CPU: 0 UID: 0 PID: 11038 Comm: syz.0.1988 Not tainted 6.12.0-rc7-syzkaller #0 [ 886.585632][T11038] Hardware name: ARM-Versatile Express [ 886.585837][T11038] Call trace: [ 886.586040][T11038] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 886.586413][T11038] r7:00000cc0 r6:00000009 r5:60000013 r4:8203de58 [ 886.586702][T11038] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 886.587290][T11038] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 886.587655][T11038] r5:00000000 r4:8271925c [ 886.587844][T11038] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 886.588212][T11038] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 886.588570][T11038] r6:00000009 r5:00000009 r4:82c01240 [ 886.588846][T11038] [<804e9124>] (should_failslab) from [<804cefc8>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 886.589282][T11038] [<804cef28>] (__kmalloc_node_track_caller_noprof) from [<8046d2ac>] (kstrdup+0x38/0x5c) [ 886.589699][T11038] r10:840f8c00 r9:00000000 r8:826f6564 r7:802f9808 r6:00000009 r5:00000cc0 [ 886.590002][T11038] r4:eb4add40 [ 886.590175][T11038] [<8046d274>] (kstrdup) from [<802f9808>] (__request_module+0xfc/0x2c0) [ 886.590708][T11038] r7:840f8c00 r6:814f3d30 r5:00000002 r4:84795ec0 [ 886.591053][T11038] [<802f970c>] (__request_module) from [<814f3d30>] (dev_load+0x80/0x8c) [ 886.591432][T11038] r3:00400140 r2:eb4ade28 r1:821fab64 [ 886.591653][T11038] r8:eb4ade38 r7:00008915 r6:00000000 r5:00000000 r4:eb4ade28 [ 886.591915][T11038] [<814f3cb0>] (dev_load) from [<816b5350>] (devinet_ioctl+0x70/0x754) [ 886.592291][T11038] r5:847f0d00 r4:eb4ade28 [ 886.592489][T11038] [<816b52e0>] (devinet_ioctl) from [<816b8160>] (inet_ioctl+0x128/0x268) [ 886.592913][T11038] r10:840f8c00 r9:81c67314 r8:eb4adecc r7:847f0d00 r6:20000340 r5:840eae80 [ 886.593217][T11038] r4:00008915 [ 886.593392][T11038] [<816b8038>] (inet_ioctl) from [<8148887c>] (sock_ioctl+0x4cc/0x608) [ 886.593758][T11038] r7:84c04000 r6:847f0d00 r5:20000340 r4:00008915 [ 886.594021][T11038] [<814883b0>] (sock_ioctl) from [<80530794>] (sys_ioctl+0x134/0xd98) [ 886.594409][T11038] r9:836db900 r8:00000004 r7:20000340 r6:836db901 r5:00000000 r4:00008915 [ 886.594749][T11038] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 886.595102][T11038] Exception stack(0xeb4adfa8 to 0xeb4adff0) [ 886.595352][T11038] dfa0: 00000000 00000000 00000004 00008915 20000340 00000000 [ 886.595673][T11038] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bd20bc [ 886.595986][T11038] dfe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 886.596237][T11038] r10:00000036 r9:840f8c00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 886.596521][T11038] r4:00000000 [ 889.307543][ T10] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 889.474212][ T10] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 889.474843][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 889.475258][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 889.475568][ T10] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 889.476387][ T10] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 889.477391][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 889.490056][ T10] usb 2-1: config 0 descriptor?? [ 889.703002][T11056] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 889.704931][T11056] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 889.920172][ T10] usbhid 2-1:0.0: can't add hid device: -71 [ 889.921369][ T10] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 889.925078][ T10] usb 2-1: USB disconnect, device number 21 [ 890.077389][ T31] audit: type=1400 audit(889.982:487): avc: denied { remount } for pid=11072 comm="syz.1.1997" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 892.558171][T11085] FAULT_INJECTION: forcing a failure. [ 892.558171][T11085] name failslab, interval 1, probability 0, space 0, times 0 [ 892.558838][T11085] CPU: 0 UID: 0 PID: 11085 Comm: syz.1.2001 Not tainted 6.12.0-rc7-syzkaller #0 [ 892.559198][T11085] Hardware name: ARM-Versatile Express [ 892.559414][T11085] Call trace: [ 892.559597][T11085] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 892.559979][T11085] r7:840f8c00 r6:00000cc0 r5:60000013 r4:8203de58 [ 892.560276][T11085] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 892.560664][T11085] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 892.561166][T11085] r5:00000000 r4:8271925c [ 892.561403][T11085] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 892.561833][T11085] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 892.562258][T11085] r6:00000cc0 r5:eb881f10 r4:82ca8c00 [ 892.562469][T11085] [<804e9124>] (should_failslab) from [<804cdc5c>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 892.562923][T11085] [<804cdc0c>] (kmem_cache_alloc_lru_noprof) from [<805351d8>] (__d_alloc+0x30/0x228) [ 892.563402][T11085] r10:0000014b r9:00000600 r8:82238830 r7:84357000 r6:833c8660 r5:eb881f10 [ 892.563762][T11085] r4:833c8660 [ 892.563982][T11085] [<805351a8>] (__d_alloc) from [<805353e8>] (d_alloc+0x18/0x68) [ 892.564398][T11085] r9:00000600 r8:846fa458 r7:eb881f10 r6:833c8660 r5:00000600 r4:833c8660 [ 892.564813][T11085] [<805353d0>] (d_alloc) from [<80525e8c>] (lookup_one_qstr_excl+0x48/0x90) [ 892.565246][T11085] r7:eb881f10 r6:833c8660 r5:00000600 r4:00000000 [ 892.565545][T11085] [<80525e44>] (lookup_one_qstr_excl) from [<8052abac>] (filename_create+0xd0/0x198) [ 892.566025][T11085] r9:00000600 r8:00000000 r7:00000600 r6:eb881f10 r5:eb881f54 r4:00000000 [ 892.566375][T11085] [<8052aadc>] (filename_create) from [<8052d6dc>] (do_symlinkat+0x58/0x130) [ 892.566906][T11085] r9:00000002 r8:ffffff9c r7:82fef000 r6:20000200 r5:ffffff9c r4:82feb000 [ 892.567521][T11085] [<8052d684>] (do_symlinkat) from [<8052d7f0>] (sys_symlinkat+0x3c/0x40) [ 892.568026][T11085] r9:840f8c00 r8:8020029c r7:0000014b r6:20000200 r5:ffffff9c r4:82feb000 [ 892.568468][T11085] [<8052d7b4>] (sys_symlinkat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 892.568969][T11085] Exception stack(0xeb881fa8 to 0xeb881ff0) [ 892.569307][T11085] 1fa0: 00000000 00000000 200001c0 ffffff9c 20000200 00000000 [ 892.569971][T11085] 1fc0: 00000000 00000000 00131400 0000014b 00000000 00006364 003d0f00 76bec0bc [ 892.570495][T11085] 1fe0: 76bebec0 76bebeb0 00018af0 00133450 [ 892.570770][T11085] r7:0000014b r6:00131400 r5:00000000 r4:00000000 [ 895.818124][ T31] audit: type=1400 audit(895.712:488): avc: denied { listen } for pid=11138 comm="syz.1.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 901.340498][ T31] audit: type=1400 audit(901.252:489): avc: denied { read } for pid=11210 comm="syz.1.2018" path="socket:[21019]" dev="sockfs" ino=21019 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 902.907224][T11232] mmap: syz.0.2014 (11232) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 902.931743][ T31] audit: type=1400 audit(902.842:490): avc: denied { ioctl } for pid=11163 comm="syz.0.2014" path="socket:[21045]" dev="sockfs" ino=21045 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 904.639012][T11263] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11263 comm=syz.1.2022 [ 908.923452][ T31] audit: type=1400 audit(908.832:491): avc: denied { accept } for pid=11311 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 910.431794][T11325] FAULT_INJECTION: forcing a failure. [ 910.431794][T11325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 910.432324][T11325] CPU: 1 UID: 0 PID: 11325 Comm: syz.1.2028 Not tainted 6.12.0-rc7-syzkaller #0 [ 910.432555][T11325] Hardware name: ARM-Versatile Express [ 910.432682][T11325] Call trace: [ 910.432845][T11325] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 910.433149][T11325] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 910.433264][T11325] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 910.433582][T11325] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 910.433907][T11325] r5:00000000 r4:8274e844 [ 910.434079][T11325] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 910.434321][T11325] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 910.434490][T11325] r6:00000000 r5:ec501f68 r4:00000002 [ 910.434589][T11325] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 910.434757][T11325] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 910.435000][T11325] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 910.435215][T11325] r10:00000001 r9:805c4430 r8:00000002 r7:ec501f68 r6:0000000f r5:76bebf30 [ 910.435365][T11325] r4:8441c800 r3:ec501e9f [ 910.435454][T11325] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 910.435640][T11325] r8:76bebf30 r7:ec501f68 r6:8441c800 r5:0000000f r4:8452b9c0 [ 910.435765][T11325] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 910.435941][T11325] r10:00000003 r9:8441c800 r8:8020029c r7:00000000 r6:00000000 r5:8452b9c0 [ 910.436081][T11325] r4:8452b9c3 [ 910.436164][T11325] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 910.436337][T11325] r7:00000003 r6:00000004 r5:76bebf30 r4:0000000f [ 910.436449][T11325] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 910.436623][T11325] Exception stack(0xec501fa8 to 0xec501ff0) [ 910.437065][T11325] 1fa0: 0000000f 76bebf30 00000004 76bebf30 0000000f 00000000 [ 910.437255][T11325] 1fc0: 0000000f 76bebf30 00000004 00000003 00000000 00006364 003d0f00 76bec0bc [ 910.437511][T11325] 1fe0: 00000158 76bebed0 000d8998 00131324 [ 911.823189][T11335] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11335 comm=syz.1.2031 [ 914.459336][ T31] audit: type=1400 audit(914.372:492): avc: denied { create } for pid=11349 comm="syz.0.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 914.525164][ T31] audit: type=1400 audit(914.432:493): avc: denied { write } for pid=11349 comm="syz.0.2038" path="socket:[21137]" dev="sockfs" ino=21137 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 916.673843][ T31] audit: type=1400 audit(916.582:494): avc: denied { setattr } for pid=11359 comm="syz.1.2041" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 918.662833][ T31] audit: type=1400 audit(918.572:495): avc: denied { setopt } for pid=11365 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 918.681017][ T31] audit: type=1400 audit(918.592:496): avc: denied { ioctl } for pid=11365 comm="syz.0.2043" path="socket:[21597]" dev="sockfs" ino=21597 ioctlcmd=0x940c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 920.879286][ T31] audit: type=1400 audit(920.792:497): avc: denied { create } for pid=11382 comm="syz.0.2047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 921.243303][ T31] audit: type=1400 audit(921.152:498): avc: denied { write } for pid=11385 comm="syz.0.2048" path="socket:[21196]" dev="sockfs" ino=21196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 921.251944][T11386] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11386 comm=syz.0.2048 [ 923.059332][ T31] audit: type=1400 audit(922.972:499): avc: denied { getopt } for pid=11404 comm="syz.1.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 923.088090][ T31] audit: type=1400 audit(923.002:500): avc: denied { read } for pid=11405 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 923.626450][ T31] audit: type=1400 audit(923.532:501): avc: denied { setopt } for pid=11405 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 926.309532][ T31] audit: type=1400 audit(926.192:502): avc: denied { watch watch_reads } for pid=11420 comm="syz.1.2060" path="/535" dev="tmpfs" ino=2785 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 927.901582][ T31] audit: type=1400 audit(927.812:503): avc: denied { name_bind } for pid=11422 comm="syz.0.2061" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 928.577067][ T31] audit: type=1400 audit(928.482:504): avc: denied { nlmsg_write } for pid=11422 comm="syz.0.2061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 933.473537][ T31] audit: type=1400 audit(933.382:505): avc: denied { map_read map_write } for pid=11468 comm="syz.1.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 936.169639][T11476] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11476 comm=syz.0.2075 [ 937.201388][ T31] audit: type=1400 audit(937.112:506): avc: denied { ioctl } for pid=11481 comm="syz.0.2077" path="socket:[21743]" dev="sockfs" ino=21743 ioctlcmd=0xf513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 942.629819][T11516] FAULT_INJECTION: forcing a failure. [ 942.629819][T11516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 942.630483][T11516] CPU: 1 UID: 0 PID: 11516 Comm: syz.0.2086 Not tainted 6.12.0-rc7-syzkaller #0 [ 942.630869][T11516] Hardware name: ARM-Versatile Express [ 942.631114][T11516] Call trace: [ 942.631316][T11516] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 942.631760][T11516] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 942.632034][T11516] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 942.632411][T11516] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 942.632825][T11516] r5:00000000 r4:8274e844 [ 942.633042][T11516] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 942.633440][T11516] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 942.633818][T11516] r6:00000000 r5:df9c5f68 r4:00000002 [ 942.634060][T11516] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 942.634438][T11516] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 942.634897][T11516] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 942.635332][T11516] r10:00000001 r9:805c4430 r8:00000002 r7:df9c5f68 r6:0000000f r5:76bb0f30 [ 942.635663][T11516] r4:84419800 r3:df9c5e9f [ 942.635868][T11516] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 942.636309][T11516] r8:76bb0f30 r7:df9c5f68 r6:84419800 r5:0000000f r4:8466bb40 [ 942.636594][T11516] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 942.637607][T11516] r10:00000003 r9:84419800 r8:8020029c r7:00000000 r6:00000000 r5:8466bb40 [ 942.638295][T11516] r4:8466bb43 [ 942.638541][T11516] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 942.638954][T11516] r7:00000003 r6:00000004 r5:76bb0f30 r4:0000000f [ 942.639280][T11516] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 942.639709][T11516] Exception stack(0xdf9c5fa8 to 0xdf9c5ff0) [ 942.640016][T11516] 5fa0: 0000000f 76bb0f30 00000004 76bb0f30 0000000f 00000000 [ 942.640510][T11516] 5fc0: 0000000f 76bb0f30 00000004 00000003 00000000 00006364 003d0f00 76bb10bc [ 942.640945][T11516] 5fe0: 00000158 76bb0ed0 000d8998 00131324 [ 947.821298][ T31] audit: type=1400 audit(947.732:507): avc: denied { ioctl } for pid=11549 comm="syz.0.2098" path="socket:[21483]" dev="sockfs" ino=21483 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 950.935287][ T31] audit: type=1400 audit(950.842:508): avc: denied { getattr } for pid=11572 comm="syz.0.2107" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 952.778367][ T31] audit: type=1400 audit(952.692:509): avc: denied { setcheckreqprot } for pid=11587 comm="syz.0.2112" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 965.652473][ T31] audit: type=1400 audit(965.562:510): avc: granted { setsecparam } for pid=11680 comm="syz.0.2146" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 966.281982][ T31] audit: type=1400 audit(966.192:511): avc: denied { connect } for pid=11692 comm="syz.0.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 966.798238][ T31] audit: type=1400 audit(966.712:512): avc: denied { ioctl } for pid=11692 comm="syz.0.2150" path="socket:[22040]" dev="sockfs" ino=22040 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 967.661503][ T31] audit: type=1400 audit(967.572:513): avc: denied { name_bind } for pid=11699 comm="syz.1.2153" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 971.688398][T11718] FAULT_INJECTION: forcing a failure. [ 971.688398][T11718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 971.689322][T11718] CPU: 1 UID: 0 PID: 11718 Comm: syz.0.2159 Not tainted 6.12.0-rc7-syzkaller #0 [ 971.690018][T11718] Hardware name: ARM-Versatile Express [ 971.690373][T11718] Call trace: [ 971.690565][T11718] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 971.691148][T11718] r7:851923a3 r6:00000000 r5:60000013 r4:8203de58 [ 971.691479][T11718] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 971.692202][T11718] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 971.692617][T11718] r5:00000000 r4:8274e844 [ 971.693774][T11718] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 971.694182][T11718] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 971.694624][T11718] r6:00000000 r5:e06f9f48 r4:00000060 [ 971.694792][T11718] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 971.695110][T11718] [<808e6bd4>] (should_fail_usercopy) from [<80838c58>] (_copy_from_iter+0x68/0x7c8) [ 971.695450][T11718] [<80838bf0>] (_copy_from_iter) from [<81830b6c>] (isotp_sendmsg+0x25c/0x7fc) [ 971.695788][T11718] r10:e06f9f38 r9:851923a3 r8:e06f9f48 r7:00000060 r6:85190000 r5:85192000 [ 971.696138][T11718] r4:00000000 [ 971.696292][T11718] [<81830910>] (isotp_sendmsg) from [<8148720c>] (__sock_sendmsg+0x44/0x78) [ 971.697065][T11718] r10:00000000 r9:e06f9dd4 r8:e06f9dd4 r7:8318d680 r6:8318d680 r5:e06f9f38 [ 971.697544][T11718] r4:00000000 [ 971.697735][T11718] [<814871c8>] (__sock_sendmsg) from [<8148820c>] (____sys_sendmsg+0x2a4/0x2c4) [ 971.698460][T11718] r7:8318d680 r6:00000000 r5:20000000 r4:e06f9f38 [ 971.698813][T11718] [<81487f68>] (____sys_sendmsg) from [<8148a174>] (___sys_sendmsg+0x9c/0xd0) [ 971.699376][T11718] r10:e06f9e34 r9:20000200 r8:20000000 r7:00000000 r6:8318d680 r5:e06f9f38 [ 971.699735][T11718] r4:00000000 [ 971.699919][T11718] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 971.700357][T11718] r10:00000128 r9:834a2400 r8:8020029c r7:20000000 r6:20000200 r5:8318d680 [ 971.700786][T11718] r4:00000000 [ 971.700979][T11718] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 971.701390][T11718] Exception stack(0xe06f9fa8 to 0xe06f9ff0) [ 971.701690][T11718] 9fa0: 00000000 00000000 00000003 20000200 20000000 00000000 [ 971.702046][T11718] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 971.702455][T11718] 9fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 971.702731][T11718] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 972.599335][T11740] FAULT_INJECTION: forcing a failure. [ 972.599335][T11740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 972.599686][T11740] CPU: 1 UID: 0 PID: 11740 Comm: syz.0.2166 Not tainted 6.12.0-rc7-syzkaller #0 [ 972.599891][T11740] Hardware name: ARM-Versatile Express [ 972.600004][T11740] Call trace: [ 972.600099][T11740] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 972.600304][T11740] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 972.600410][T11740] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 972.600583][T11740] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 972.600808][T11740] r5:00000000 r4:8274e844 [ 972.600907][T11740] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 972.601087][T11740] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 972.601253][T11740] r6:00000000 r5:e04b5f68 r4:00000002 [ 972.601351][T11740] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 972.601517][T11740] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 972.601711][T11740] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 972.601923][T11740] r10:00000001 r9:805c4430 r8:00000002 r7:e04b5f68 r6:0000000f r5:76bd1f30 [ 972.602055][T11740] r4:8441e000 r3:e04b5e9f [ 972.602130][T11740] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 972.602316][T11740] r8:76bd1f30 r7:e04b5f68 r6:8441e000 r5:0000000f r4:8466bb40 [ 972.602443][T11740] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 972.602619][T11740] r10:00000003 r9:8441e000 r8:8020029c r7:00000000 r6:00000000 r5:8466bb40 [ 972.602751][T11740] r4:8466bb43 [ 972.602826][T11740] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 972.603006][T11740] r7:00000003 r6:00000006 r5:76bd1f30 r4:0000000f [ 972.603182][T11740] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 972.603391][T11740] Exception stack(0xe04b5fa8 to 0xe04b5ff0) [ 972.603522][T11740] 5fa0: 0000000f 76bd1f30 00000006 76bd1f30 0000000f 00000000 [ 972.603683][T11740] 5fc0: 0000000f 76bd1f30 00000006 00000003 00000000 00006364 003d0f00 76bd20bc [ 972.603862][T11740] 5fe0: 00000158 76bd1ed0 000d8998 00131324 [ 973.053458][T11748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28611 sclass=netlink_route_socket pid=11748 comm=syz.0.2170 [ 977.453052][ T31] audit: type=1400 audit(977.362:514): avc: granted { setsecparam } for pid=11788 comm="syz.1.2184" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 977.902775][T11793] sctp: [Deprecated]: syz.1.2186 (pid 11793) Use of int in max_burst socket option. [ 977.902775][T11793] Use struct sctp_assoc_value instead [ 978.540148][ T31] audit: type=1400 audit(978.452:515): avc: denied { execute } for pid=11803 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 978.542551][ T31] audit: type=1400 audit(978.452:516): avc: denied { execute_no_trans } for pid=11803 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 978.588534][ T31] audit: type=1400 audit(978.492:517): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 978.682258][ T2935] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.732223][ T2935] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.787870][ T2935] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.864094][ T2935] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.164848][ T2935] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 979.172997][ T2935] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 979.176557][ T2935] bond0 (unregistering): Released all slaves [ 979.238645][ T2935] hsr_slave_0: left promiscuous mode [ 979.241042][ T2935] hsr_slave_1: left promiscuous mode [ 979.245291][ T2935] veth1_macvtap: left promiscuous mode [ 979.245679][ T2935] veth0_macvtap: left promiscuous mode [ 979.246047][ T2935] veth1_vlan: left promiscuous mode [ 979.246358][ T2935] veth0_vlan: left promiscuous mode [ 981.443520][T11806] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 981.452935][T11806] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 982.891323][T11806] hsr_slave_0: entered promiscuous mode [ 982.908960][T11806] hsr_slave_1: entered promiscuous mode [ 983.616092][T11806] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 983.633712][T11806] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 983.643436][T11806] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 983.663274][T11806] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 984.816321][T11806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 988.772302][T11806] veth0_vlan: entered promiscuous mode [ 988.818471][T11806] veth1_vlan: entered promiscuous mode [ 988.898263][T11806] veth0_macvtap: entered promiscuous mode [ 988.922511][T11806] veth1_macvtap: entered promiscuous mode [ 989.009670][T11806] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.010345][T11806] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.010784][T11806] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.011342][T11806] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.142144][ T31] audit: type=1400 audit(989.052:518): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/syzkaller.493nS8/syz-tmp" dev="vda" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 989.151284][ T31] audit: type=1400 audit(989.062:519): avc: denied { mount } for pid=11806 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 989.158583][ T31] audit: type=1400 audit(989.062:520): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/syzkaller.493nS8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 989.164578][ T31] audit: type=1400 audit(989.072:521): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/syzkaller.493nS8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=22465 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 989.198288][ T31] audit: type=1400 audit(989.092:522): avc: denied { unmount } for pid=11806 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 989.199212][ T31] audit: type=1400 audit(989.092:523): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 989.199878][ T31] audit: type=1400 audit(989.092:524): avc: denied { mount } for pid=11806 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 989.200491][ T31] audit: type=1400 audit(989.092:525): avc: denied { mounton } for pid=11806 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 990.979434][T12258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12258 comm=syz.1.2201 [ 990.981224][T12258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=12258 comm=syz.1.2201 [ 1013.705753][ T31] audit: type=1400 audit(1013.612:526): avc: denied { setopt } for pid=12355 comm="syz.0.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1013.777893][ T31] audit: type=1400 audit(1013.682:527): avc: denied { ioctl } for pid=12355 comm="syz.0.2243" path="socket:[23467]" dev="sockfs" ino=23467 ioctlcmd=0xf50d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1014.258801][T12366] FAULT_INJECTION: forcing a failure. [ 1014.258801][T12366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1014.259965][T12366] CPU: 1 UID: 0 PID: 12366 Comm: syz.0.2248 Not tainted 6.12.0-rc7-syzkaller #0 [ 1014.260338][T12366] Hardware name: ARM-Versatile Express [ 1014.260604][T12366] Call trace: [ 1014.260871][T12366] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1014.261286][T12366] r7:84af3680 r6:00000000 r5:60000013 r4:8203de58 [ 1014.261555][T12366] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1014.262000][T12366] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1014.262512][T12366] r5:00000000 r4:8274e844 [ 1014.262736][T12366] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1014.263186][T12366] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 1014.263598][T12366] r6:00000000 r5:ebafdf48 r4:00000014 [ 1014.263896][T12366] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 1014.264327][T12366] [<808e6bd4>] (should_fail_usercopy) from [<80838c58>] (_copy_from_iter+0x68/0x7c8) [ 1014.264848][T12366] [<80838bf0>] (_copy_from_iter) from [<815aa790>] (netlink_sendmsg+0x19c/0x43c) [ 1014.265286][T12366] r10:00000000 r9:00000000 r8:ebafdf48 r7:842f0400 r6:00000014 r5:843bf900 [ 1014.265656][T12366] r4:ebafdf38 [ 1014.265862][T12366] [<815aa5f4>] (netlink_sendmsg) from [<8148720c>] (__sock_sendmsg+0x44/0x78) [ 1014.266311][T12366] r10:00000000 r9:ebafddd4 r8:ebafddd4 r7:83173b80 r6:83173b80 r5:ebafdf38 [ 1014.266818][T12366] r4:00000000 [ 1014.267083][T12366] [<814871c8>] (__sock_sendmsg) from [<8148820c>] (____sys_sendmsg+0x2a4/0x2c4) [ 1014.267903][T12366] r7:83173b80 r6:00000000 r5:00000010 r4:ebafdf38 [ 1014.268228][T12366] [<81487f68>] (____sys_sendmsg) from [<8148a174>] (___sys_sendmsg+0x9c/0xd0) [ 1014.268619][T12366] r10:ebafde34 r9:20000240 r8:00000010 r7:00000000 r6:83173b80 r5:ebafdf38 [ 1014.268938][T12366] r4:00000000 [ 1014.269135][T12366] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 1014.269552][T12366] r10:00000128 r9:83ddec00 r8:8020029c r7:00000010 r6:20000240 r5:83173b80 [ 1014.269917][T12366] r4:00000000 [ 1014.270105][T12366] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1014.270505][T12366] Exception stack(0xebafdfa8 to 0xebafdff0) [ 1014.270803][T12366] dfa0: 00000000 00000000 00000003 20000240 00000010 00000000 [ 1014.271175][T12366] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd20bc [ 1014.271561][T12366] dfe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 1014.271876][T12366] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 1014.449607][ T31] audit: type=1400 audit(1014.362:528): avc: denied { append } for pid=12367 comm="syz.0.2249" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1016.863609][T12386] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12386 comm=syz.1.2255 [ 1017.270993][ T31] audit: type=1400 audit(1017.182:529): avc: denied { ioctl } for pid=12401 comm="syz.0.2260" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1020.837310][ T31] audit: type=1400 audit(1020.742:530): avc: denied { module_load } for pid=12436 comm="syz.1.2274" path="/sys/power/pm_wakeup_irq" dev="sysfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1020.844737][T12437] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12437 comm=syz.1.2274 [ 1024.921325][ T31] audit: type=1400 audit(1024.832:531): avc: denied { ioctl } for pid=12458 comm="syz.0.2282" path="socket:[24659]" dev="sockfs" ino=24659 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1027.723154][ T31] audit: type=1400 audit(1027.632:532): avc: denied { write } for pid=12514 comm="syz.1.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1027.724767][T12515] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12515 comm=syz.1.2310 [ 1031.359400][T12534] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=272 sclass=netlink_tcpdiag_socket pid=12534 comm=syz.0.2318 [ 1031.464145][T12538] FAULT_INJECTION: forcing a failure. [ 1031.464145][T12538] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.464833][T12538] CPU: 1 UID: 0 PID: 12538 Comm: syz.1.2319 Not tainted 6.12.0-rc7-syzkaller #0 [ 1031.465149][T12538] Hardware name: ARM-Versatile Express [ 1031.465370][T12538] Call trace: [ 1031.465566][T12538] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1031.465949][T12538] r7:00000c40 r6:8466b9e8 r5:60000013 r4:8203de58 [ 1031.466178][T12538] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1031.466511][T12538] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1031.467353][T12538] r5:00000000 r4:8271925c [ 1031.467697][T12538] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1031.468075][T12538] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 1031.468468][T12538] r6:8466b9e8 r5:00001000 r4:82c016c0 [ 1031.468697][T12538] [<804e9124>] (should_failslab) from [<804ce314>] (__kmalloc_noprof+0x9c/0x458) [ 1031.469122][T12538] [<804ce278>] (__kmalloc_noprof) from [<80752338>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1031.469564][T12538] r10:83dd8000 r9:82c9fc00 r8:00000000 r7:833f5000 r6:8466b9e8 r5:00001000 [ 1031.469874][T12538] r4:00000000 [ 1031.470044][T12538] [<807522fc>] (tomoyo_realpath_from_path) from [<8074e47c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1031.470487][T12538] r10:83dd8000 r9:00000000 r8:00000003 r7:00008931 r6:00000004 r5:81ad1968 [ 1031.470783][T12538] r4:8466b9e8 r3:824ba340 [ 1031.470960][T12538] [<8074e3b0>] (tomoyo_path_number_perm) from [<80752d48>] (tomoyo_file_ioctl+0x1c/0x20) [ 1031.471371][T12538] r9:8466b9c0 r8:00000003 r7:20000000 r6:20000000 r5:00008931 r4:8466b9c0 [ 1031.471667][T12538] [<80752d2c>] (tomoyo_file_ioctl) from [<80701394>] (security_file_ioctl+0x64/0x1e4) [ 1031.472075][T12538] [<80701330>] (security_file_ioctl) from [<805306b0>] (sys_ioctl+0x50/0xd98) [ 1031.472488][T12538] r7:20000000 r6:8466b9c1 r5:00000000 r4:00008931 [ 1031.472750][T12538] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1031.473097][T12538] Exception stack(0xdfc81fa8 to 0xdfc81ff0) [ 1031.473357][T12538] 1fa0: 00000000 00000000 00000003 00008931 20000000 00000000 [ 1031.473684][T12538] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b1c0bc [ 1031.474002][T12538] 1fe0: 76b1bec0 76b1beb0 00018af0 00133450 [ 1031.474288][T12538] r10:00000036 r9:83dd8000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 1031.474579][T12538] r4:00000000 [ 1031.492664][T12538] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1033.445559][T12553] SELinux: Context system_u:object_r:ssh_exec_t:s0 is not valid (left unmapped). [ 1033.446275][ T31] audit: type=1400 audit(1033.352:533): avc: denied { relabelto } for pid=12552 comm="syz.1.2324" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ssh_exec_t:s0" [ 1033.448007][ T31] audit: type=1400 audit(1033.362:534): avc: denied { associate } for pid=12552 comm="syz.1.2324" name="/" dev="tmpfs" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_exec_t:s0" [ 1040.486481][T12626] ptrace attach of "/syz-executor exec"[12627] was attempted by "/syz-executor exec"[12626] [ 1040.762408][T12626] ptrace attach of "/syz-executor exec"[12648] was attempted by "/syz-executor exec"[12626] [ 1044.524587][ T31] audit: type=1400 audit(1044.432:535): avc: denied { setattr } for pid=12660 comm="syz.1.2356" name="nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1044.562443][ T31] audit: type=1400 audit(1044.472:536): avc: denied { create } for pid=12660 comm="syz.1.2356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1052.821560][T12705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41360 sclass=netlink_route_socket pid=12705 comm=syz.1.2373 [ 1060.817761][ T31] audit: type=1400 audit(1060.712:537): avc: denied { write } for pid=12731 comm="syz.0.2383" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1067.089401][ T31] audit: type=1400 audit(1067.002:538): avc: denied { map } for pid=12757 comm="syz.1.2393" path="socket:[24373]" dev="sockfs" ino=24373 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1073.578963][T12789] FAULT_INJECTION: forcing a failure. [ 1073.578963][T12789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1073.579606][T12789] CPU: 1 UID: 0 PID: 12789 Comm: syz.0.2402 Not tainted 6.12.0-rc7-syzkaller #0 [ 1073.580277][T12789] Hardware name: ARM-Versatile Express [ 1073.580874][T12789] Call trace: [ 1073.581145][T12789] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1073.581618][T12789] r7:20000080 r6:0000000c r5:60000013 r4:8203de58 [ 1073.581906][T12789] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1073.582319][T12789] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1073.582948][T12789] r5:00000000 r4:8274e844 [ 1073.583152][T12789] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1073.583906][T12789] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 1073.584593][T12789] r6:0000000c r5:0000000c r4:dfa01e74 [ 1073.585040][T12789] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 1073.585447][T12789] [<808e6bd4>] (should_fail_usercopy) from [<81488268>] (move_addr_to_kernel+0x3c/0xe4) [ 1073.585903][T12789] [<8148822c>] (move_addr_to_kernel) from [<81489f7c>] (__copy_msghdr+0xe4/0x110) [ 1073.586383][T12789] r9:200002c0 r8:b5403587 r7:dfa01e30 r6:200002c0 r5:dfa01de0 r4:dfa01f38 [ 1073.586739][T12789] [<81489e98>] (__copy_msghdr) from [<8148a054>] (copy_msghdr_from_user+0xac/0x130) [ 1073.587553][T12789] r5:00000000 r4:dfa01f38 [ 1073.587966][T12789] [<81489fa8>] (copy_msghdr_from_user) from [<8148a150>] (___sys_sendmsg+0x78/0xd0) [ 1073.588655][T12789] r8:00008000 r7:00000000 r6:8335ac80 r5:dfa01f38 r4:dfa01e74 [ 1073.589005][T12789] [<8148a0d8>] (___sys_sendmsg) from [<8148a68c>] (sys_sendmsg+0x78/0xbc) [ 1073.589427][T12789] r10:00000128 r9:8375e000 r8:8020029c r7:00008000 r6:200002c0 r5:8335ac80 [ 1073.589733][T12789] r4:00000000 [ 1073.589896][T12789] [<8148a614>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1073.590330][T12789] Exception stack(0xdfa01fa8 to 0xdfa01ff0) [ 1073.590597][T12789] 1fa0: 00000000 00000000 00000003 200002c0 00008000 00000000 [ 1073.590953][T12789] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bb10bc [ 1073.591313][T12789] 1fe0: 76bb0ec0 76bb0eb0 00018af0 00133450 [ 1073.591571][T12789] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 1076.696626][ T31] audit: type=1400 audit(1076.602:539): avc: denied { accept } for pid=12805 comm="syz.0.2409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1078.240242][T12822] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12822 comm=syz.1.2414 [ 1084.519541][T12856] FAULT_INJECTION: forcing a failure. [ 1084.519541][T12856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1084.520040][T12856] CPU: 0 UID: 0 PID: 12856 Comm: syz.1.2428 Not tainted 6.12.0-rc7-syzkaller #0 [ 1084.520338][T12856] Hardware name: ARM-Versatile Express [ 1084.520530][T12856] Call trace: [ 1084.520747][T12856] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1084.521116][T12856] r7:76b1ae60 r6:842df000 r5:60000013 r4:8203de58 [ 1084.521336][T12856] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1084.521662][T12856] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1084.522001][T12856] r5:00000000 r4:8274e844 [ 1084.522172][T12856] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1084.522492][T12856] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 1084.522805][T12856] r6:842df000 r5:76b1ae60 r4:00000101 [ 1084.523003][T12856] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 1084.523317][T12856] [<808e6bd4>] (should_fail_usercopy) from [<80fb0724>] (raw_ioctl_init+0x40/0x340) [ 1084.523603][T12856] [<80fb06e4>] (raw_ioctl_init) from [<80fb1e84>] (raw_ioctl+0x3f8/0x1084) [ 1084.523925][T12856] r10:840fec00 r9:8404a540 r8:00000004 r7:76b1ae60 r6:76b1ae60 r5:00000000 [ 1084.524177][T12856] r4:842df000 [ 1084.524330][T12856] [<80fb1a8c>] (raw_ioctl) from [<80530794>] (sys_ioctl+0x134/0xd98) [ 1084.524682][T12856] r10:840fec00 r9:8404a540 r8:00000004 r7:76b1ae60 r6:8404a541 r5:00000000 [ 1084.524993][T12856] r4:41015500 [ 1084.525120][T12856] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1084.525410][T12856] Exception stack(0xdfd0dfa8 to 0xdfd0dff0) [ 1084.525619][T12856] dfa0: 00000004 76b1ae70 00000004 41015500 76b1ae60 76b19e00 [ 1084.525861][T12856] dfc0: 00000004 76b1ae70 76b19e70 00000036 00000005 76b1ae60 003b0000 00000000 [ 1084.526028][T12856] dfe0: 00000000 76b19de8 00258000 00132e1c [ 1084.526210][T12856] r10:00000036 r9:840fec00 r8:8020029c r7:00000036 r6:76b19e70 r5:76b1ae70 [ 1084.526369][T12856] r4:00000004 [ 1085.267969][ T31] audit: type=1400 audit(1085.172:540): avc: denied { connect } for pid=12810 comm="syz.0.2412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1090.005740][ T47] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1090.006409][ T47] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1090.019827][ T47] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1091.558374][ T31] audit: type=1400 audit(1091.472:541): avc: denied { map } for pid=12895 comm="syz.1.2444" path="pipe:[25293]" dev="pipefs" ino=25293 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1095.132179][T12910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12910 comm=syz.1.2447 [ 1097.957490][ T10] usb 2-1: new low-speed USB device number 22 using dummy_hcd [ 1098.117955][ T10] usb 2-1: Invalid ep0 maxpacket: 64 [ 1098.250039][ T10] usb 2-1: new low-speed USB device number 23 using dummy_hcd [ 1098.477849][ T10] usb 2-1: Invalid ep0 maxpacket: 64 [ 1098.479333][ T10] usb usb2-port1: attempt power cycle [ 1098.879012][ T10] usb 2-1: new low-speed USB device number 24 using dummy_hcd [ 1098.907856][ T10] usb 2-1: Invalid ep0 maxpacket: 64 [ 1099.039132][ T10] usb 2-1: new low-speed USB device number 25 using dummy_hcd [ 1099.061862][ T10] usb 2-1: Invalid ep0 maxpacket: 64 [ 1099.064284][ T10] usb usb2-port1: unable to enumerate USB device [ 1113.749319][ T31] audit: type=1400 audit(1113.662:542): avc: denied { getopt } for pid=12953 comm="syz.0.2457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1113.808055][T12954] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12954 comm=syz.0.2457 [ 1119.083527][T12996] FAULT_INJECTION: forcing a failure. [ 1119.083527][T12996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1119.084171][T12996] CPU: 1 UID: 0 PID: 12996 Comm: syz.0.2469 Not tainted 6.12.0-rc7-syzkaller #0 [ 1119.084530][T12996] Hardware name: ARM-Versatile Express [ 1119.084807][T12996] Call trace: [ 1119.085009][T12996] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1119.085392][T12996] r7:00000000 r6:00000000 r5:60000013 r4:8203de58 [ 1119.085524][T12996] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1119.085702][T12996] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1119.085881][T12996] r5:00000000 r4:8274e844 [ 1119.085969][T12996] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1119.086151][T12996] [<808e69e0>] (should_fail_ex) from [<808e6bd0>] (should_fail+0x14/0x18) [ 1119.086318][T12996] r6:00000000 r5:e0521f68 r4:00000002 [ 1119.086444][T12996] [<808e6bbc>] (should_fail) from [<808e6bf0>] (should_fail_usercopy+0x1c/0x20) [ 1119.086643][T12996] [<808e6bd4>] (should_fail_usercopy) from [<8054f948>] (simple_read_from_buffer+0x8c/0x134) [ 1119.087669][T12996] [<8054f8bc>] (simple_read_from_buffer) from [<805c44e8>] (proc_fail_nth_read+0xb8/0x100) [ 1119.088470][T12996] r10:00000001 r9:805c4430 r8:00000002 r7:e0521f68 r6:0000000f r5:76bd1f30 [ 1119.089065][T12996] r4:83ddbc00 r3:e0521e9f [ 1119.089286][T12996] [<805c4430>] (proc_fail_nth_read) from [<80516efc>] (vfs_read+0x98/0x324) [ 1119.089737][T12996] r8:76bd1f30 r7:e0521f68 r6:83ddbc00 r5:0000000f r4:854e1f00 [ 1119.090040][T12996] [<80516e64>] (vfs_read) from [<80517bac>] (ksys_read+0x78/0xf8) [ 1119.090415][T12996] r10:00000003 r9:83ddbc00 r8:8020029c r7:00000000 r6:00000000 r5:854e1f00 [ 1119.090716][T12996] r4:854e1f03 [ 1119.090901][T12996] [<80517b34>] (ksys_read) from [<80517c3c>] (sys_read+0x10/0x14) [ 1119.091294][T12996] r7:00000003 r6:00000005 r5:76bd1f30 r4:0000000f [ 1119.091544][T12996] [<80517c2c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1119.091961][T12996] Exception stack(0xe0521fa8 to 0xe0521ff0) [ 1119.092232][T12996] 1fa0: 0000000f 76bd1f30 00000005 76bd1f30 0000000f 00000000 [ 1119.092596][T12996] 1fc0: 0000000f 76bd1f30 00000005 00000003 00000000 00006364 003d0f00 76bd20bc [ 1119.093008][T12996] 1fe0: 00000158 76bd1ed0 000d8998 00131324 [ 1123.089706][ T31] audit: type=1400 audit(1123.002:543): avc: denied { write } for pid=13018 comm="syz.0.2477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1126.364064][T13031] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13031 comm=syz.1.2480 [ 1133.357693][ T31] audit: type=1400 audit(1133.262:544): avc: denied { accept } for pid=13060 comm="syz.0.2491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1133.359085][ T31] audit: type=1400 audit(1133.262:545): avc: denied { read } for pid=13060 comm="syz.0.2491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1143.485108][ T47] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1143.486091][ T47] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1143.507909][ T47] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1145.193987][ T31] audit: type=1400 audit(1145.102:546): avc: denied { getopt } for pid=13131 comm="syz.0.2511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1145.214345][ T31] audit: type=1400 audit(1145.122:547): avc: denied { connect } for pid=13131 comm="syz.0.2511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1148.707835][ T31] audit: type=1400 audit(1148.612:548): avc: denied { nlmsg_read } for pid=13144 comm="syz.1.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1150.238710][T13152] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=13152 comm=syz.0.2518 [ 1166.252219][ T31] audit: type=1400 audit(1166.162:549): avc: denied { map } for pid=13237 comm="syz.1.2554" path="socket:[26763]" dev="sockfs" ino=26763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1168.199477][T13249] FAULT_INJECTION: forcing a failure. [ 1168.199477][T13249] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.200186][T13249] CPU: 0 UID: 0 PID: 13249 Comm: syz.0.2559 Not tainted 6.12.0-rc7-syzkaller #0 [ 1168.200531][T13249] Hardware name: ARM-Versatile Express [ 1168.200804][T13249] Call trace: [ 1168.201023][T13249] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1168.201489][T13249] r7:00000c40 r6:8452be68 r5:60000013 r4:8203de58 [ 1168.201742][T13249] [<8199d57c>] (show_stack) from [<819bba44>] (dump_stack_lvl+0x70/0x7c) [ 1168.202164][T13249] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1168.202562][T13249] r5:00000000 r4:8271925c [ 1168.202757][T13249] [<819bba50>] (dump_stack) from [<808e6b6c>] (should_fail_ex+0x18c/0x1dc) [ 1168.203146][T13249] [<808e69e0>] (should_fail_ex) from [<804e9190>] (should_failslab+0x6c/0x94) [ 1168.203519][T13249] r6:8452be68 r5:00001000 r4:82c016c0 [ 1168.203747][T13249] [<804e9124>] (should_failslab) from [<804ce314>] (__kmalloc_noprof+0x9c/0x458) [ 1168.204141][T13249] [<804ce278>] (__kmalloc_noprof) from [<80752338>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1168.204617][T13249] r10:840fb000 r9:850c0800 r8:00000000 r7:830ee330 r6:8452be68 r5:00001000 [ 1168.205007][T13249] r4:00000000 [ 1168.205180][T13249] [<807522fc>] (tomoyo_realpath_from_path) from [<8074e47c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1168.205623][T13249] r10:840fb000 r9:00000000 r8:00000003 r7:00005450 r6:00000004 r5:81ad1968 [ 1168.205935][T13249] r4:8452be68 r3:824ba340 [ 1168.206123][T13249] [<8074e3b0>] (tomoyo_path_number_perm) from [<80752d48>] (tomoyo_file_ioctl+0x1c/0x20) [ 1168.206535][T13249] r9:8452be40 r8:00000003 r7:00000004 r6:00000004 r5:00005450 r4:8452be40 [ 1168.207146][T13249] [<80752d2c>] (tomoyo_file_ioctl) from [<80701394>] (security_file_ioctl+0x64/0x1e4) [ 1168.207975][T13249] [<80701330>] (security_file_ioctl) from [<805306b0>] (sys_ioctl+0x50/0xd98) [ 1168.208419][T13249] r7:00000004 r6:8452be41 r5:00000000 r4:00005450 [ 1168.208688][T13249] [<80530660>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1168.209106][T13249] Exception stack(0xeb165fa8 to 0xeb165ff0) [ 1168.209379][T13249] 5fa0: 00000000 00000000 00000003 00005450 00000004 00000000 [ 1168.209736][T13249] 5fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76bd20bc [ 1168.210083][T13249] 5fe0: 76bd1ec0 76bd1eb0 00018af0 00133450 [ 1168.210360][T13249] r10:00000036 r9:840fb000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 1168.210667][T13249] r4:00000000 [ 1168.244986][T13249] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1169.058712][T13253] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=13253 comm=syz.0.2560 [ 1170.314717][ T31] audit: type=1400 audit(1170.222:550): avc: denied { read } for pid=13260 comm="syz.1.2564" path="socket:[26812]" dev="sockfs" ino=26812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1171.046254][T13276] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=13276 comm=syz.1.2565 [ 1176.095958][ T31] audit: type=1400 audit(1176.002:551): avc: denied { getopt } for pid=13293 comm="syz.1.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1176.099900][ T31] audit: type=1400 audit(1176.012:552): avc: denied { accept } for pid=13293 comm="syz.1.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1182.727683][ T31] audit: type=1400 audit(1182.632:553): avc: denied { ioctl } for pid=13318 comm="syz.0.2583" path="" dev="sockfs" ino=26908 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1213.293946][T13458] syzkaller0: entered promiscuous mode [ 1213.294470][T13458] syzkaller0: entered allmulticast mode [ 1213.345589][ T31] audit: type=1400 audit(1213.252:554): avc: denied { relabelfrom } for pid=13457 comm="syz.1.2625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1213.346413][ T31] audit: type=1400 audit(1213.252:555): avc: denied { relabelto } for pid=13457 comm="syz.1.2625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1220.259496][ T31] audit: type=1400 audit(1220.172:556): avc: denied { create } for pid=13467 comm="syz.1.2626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1236.097411][ T47] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 1236.179982][ T31] audit: type=1400 audit(1236.092:557): avc: denied { block_suspend } for pid=13484 comm="syz.0.2631" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1236.287246][ T47] usb 2-1: Using ep0 maxpacket: 32 [ 1236.296260][ T47] usb 2-1: config 32 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1236.297509][ T47] usb 2-1: config 32 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1236.321157][ T47] usb 2-1: config 32 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 1236.343373][ T47] usb 2-1: New USB device found, idVendor=0458, idProduct=5011, bcdDevice= 0.00 [ 1236.343702][ T47] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1237.396312][ T47] input: HID 0458:5011 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:32.0/0003:0458:5011.0009/input/input33 [ 1237.438740][ T47] input: HID 0458:5011 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:32.0/0003:0458:5011.0009/input/input34 [ 1237.489555][ T47] kye 0003:0458:5011.0009: input,hiddev0,hidraw0: USB HID v0.00 Mouse [HID 0458:5011] on usb-dummy_hcd.1-1/input0 [ 1238.732623][ C1] kye 0003:0458:5011.0009: usb_submit_urb(ctrl) failed: -1 [ 1239.556043][T13509] usb 2-1: USB disconnect, device number 26 [ 1240.852637][ T31] audit: type=1400 audit(1240.762:558): avc: denied { create } for pid=13517 comm="syz.1.2636" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1259.116064][ T31] audit: type=1400 audit(1259.022:559): avc: denied { unlink } for pid=11806 comm="syz-executor" name="file0" dev="tmpfs" ino=1404 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1282.078816][T13555] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 1283.387390][ T2874] usb 2-1: new full-speed USB device number 27 using dummy_hcd [ 1283.690621][ T2874] usb 2-1: New USB device found, idVendor=05a9, idProduct=1550, bcdDevice=e4.bb [ 1283.691126][ T2874] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1283.691426][ T2874] usb 2-1: Product: syz [ 1283.691618][ T2874] usb 2-1: Manufacturer: syz [ 1283.691815][ T2874] usb 2-1: SerialNumber: syz [ 1283.703746][ T2874] usb 2-1: config 0 descriptor?? [ 1297.576405][ T8255] usb 2-1: USB disconnect, device number 27 [ 1298.007632][ T8255] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 1298.169015][ T8255] usb 2-1: config 0 has an invalid interface number: 192 but max is 0 [ 1298.169698][ T8255] usb 2-1: config 0 has no interface number 0 [ 1298.169976][ T8255] usb 2-1: config 0 interface 192 has no altsetting 0 [ 1298.190365][ T8255] usb 2-1: New USB device found, idVendor=0572, idProduct=0041, bcdDevice=e1.ae [ 1298.190851][ T8255] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1298.191163][ T8255] usb 2-1: Product: syz [ 1298.191372][ T8255] usb 2-1: Manufacturer: syz [ 1298.191591][ T8255] usb 2-1: SerialNumber: syz [ 1298.201177][ T8255] usb 2-1: config 0 descriptor?? [ 1298.426741][ T8255] usb 2-1: USB disconnect, device number 28 [ 1313.628041][T13611] bridge_slave_0: entered promiscuous mode [ 1356.198183][T13664] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2663'. [ 1364.534411][ T31] audit: type=1400 audit(1364.442:560): avc: denied { connect } for pid=13698 comm="syz.1.2679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1439.739001][T13747] ptrace attach of "/syz-executor exec"[11806] was attempted by "/syz-executor exec"[13747] [ 1448.045506][T13755] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1448.057932][T13755] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1448.988420][T13755] hsr_slave_0: entered promiscuous mode [ 1448.992663][T13755] hsr_slave_1: entered promiscuous mode [ 1448.994823][T13755] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1448.995168][T13755] Cannot create hsr debugfs directory [ 1449.252594][T13755] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1449.284857][T13755] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1449.352643][T13755] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1449.411811][T13755] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1449.549793][T13755] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1449.558962][T13755] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1449.569395][T13755] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1449.576625][T13755] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1450.253117][T13755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1451.035840][T13755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1453.535021][T13755] veth0_vlan: entered promiscuous mode [ 1453.553629][T13755] veth1_vlan: entered promiscuous mode [ 1453.615534][T13755] veth0_macvtap: entered promiscuous mode [ 1453.627909][T13755] veth1_macvtap: entered promiscuous mode [ 1453.687527][T13755] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1453.688045][T13755] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1453.688367][T13755] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1453.688660][T13755] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1497.927939][ T2874] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 1498.067834][ T2874] usb 2-1: device descriptor read/64, error -71 [ 1498.317964][ T2874] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 1498.468057][ T2874] usb 2-1: device descriptor read/64, error -71 [ 1498.587854][ T2874] usb usb2-port1: attempt power cycle [ 1498.947879][ T2874] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 1498.970536][ T2874] usb 2-1: device descriptor read/8, error -71 [ 1499.217471][ T2874] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 1499.241038][ T2874] usb 2-1: device descriptor read/8, error -71 [ 1499.348133][ T2874] usb usb2-port1: unable to enumerate USB device [ 1507.731704][ T31] audit: type=1326 audit(1507.642:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14223 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1507.733784][ T31] audit: type=1326 audit(1507.642:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14223 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x133450 code=0x7ffc0000 [ 1507.735336][ T31] audit: type=1326 audit(1507.642:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14223 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1508.874979][ T31] audit: type=1400 audit(1508.782:564): avc: denied { execute_no_trans } for pid=14235 comm="syz.0.2728" path="/16/file0" dev="tmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1508.997883][T13513] usb 2-1: new high-speed USB device number 33 using dummy_hcd [ 1509.137540][T13513] usb 2-1: device descriptor read/64, error -71 [ 1509.387816][T13513] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 1509.557609][T13513] usb 2-1: device descriptor read/64, error -71 [ 1509.579440][ T31] audit: type=1400 audit(1509.492:565): avc: denied { append } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1509.647194][ T31] audit: type=1400 audit(1509.542:566): avc: denied { recv } for pid=3082 comm="syz-executor" saddr=127.0.0.1 src=36936 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1509.663725][ T31] audit: type=1400 audit(1509.572:567): avc: denied { read write } for pid=13755 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1509.665303][ T31] audit: type=1400 audit(1509.572:568): avc: denied { open } for pid=13755 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1509.665979][ T31] audit: type=1400 audit(1509.572:569): avc: denied { ioctl } for pid=13755 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1509.687331][ T31] audit: type=1400 audit(1509.592:570): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=36936 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1509.697505][T13513] usb usb2-port1: attempt power cycle [ 1510.037699][T13513] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 1510.069144][T13513] usb 2-1: device descriptor read/8, error -71 [ 1510.324525][T13513] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 1510.346590][T13513] usb 2-1: device descriptor read/8, error -71 [ 1510.459199][T13513] usb usb2-port1: unable to enumerate USB device [ 1511.049409][T14250] bond0: (slave bond_slave_0): Releasing backup interface [ 1511.071221][T14250] bond0: (slave bond_slave_1): Releasing backup interface [ 1513.064578][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 1513.064745][ T31] audit: type=1400 audit(1512.972:595): avc: denied { execmem } for pid=14267 comm="syz.0.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1520.960291][ T31] audit: type=1400 audit(1520.872:596): avc: denied { create } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1520.998600][ T31] audit: type=1400 audit(1520.912:597): avc: denied { create } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1521.298921][T14288] usb 2-1: new full-speed USB device number 37 using dummy_hcd [ 1521.691983][ T31] audit: type=1400 audit(1521.602:598): avc: denied { create } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1521.704019][ T31] audit: type=1400 audit(1521.602:599): avc: denied { setopt } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1521.737756][ T31] audit: type=1400 audit(1521.642:600): avc: denied { bind } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1521.768592][ T31] audit: type=1400 audit(1521.672:601): avc: denied { write } for pid=14286 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1521.832497][T14288] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1521.842025][T14288] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 1521.842681][T14288] usb 2-1: can't read configurations, error -71 [ 1522.163337][ T31] audit: type=1326 audit(1522.072:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14295 comm="syz.1.2746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1522.167701][ T31] audit: type=1326 audit(1522.072:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14295 comm="syz.1.2746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1522.175453][ T31] audit: type=1326 audit(1522.082:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14295 comm="syz.1.2746" exe="/syz-executor" sig=0 arch=40000028 syscall=47 compat=0 ip=0x133450 code=0x7ffc0000 [ 1522.193499][ T31] audit: type=1326 audit(1522.102:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14295 comm="syz.1.2746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1527.931521][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 1527.931623][ T31] audit: type=1400 audit(1527.842:616): avc: denied { create } for pid=14325 comm="syz.1.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1527.952339][ T31] audit: type=1400 audit(1527.852:617): avc: denied { write } for pid=14325 comm="syz.1.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1528.777790][ T31] audit: type=1400 audit(1528.682:618): avc: denied { shutdown } for pid=14330 comm="syz.1.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1528.781936][ T31] audit: type=1400 audit(1528.692:619): avc: denied { getopt } for pid=14330 comm="syz.1.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1528.784015][ T31] audit: type=1400 audit(1528.692:620): avc: denied { name_connect } for pid=14330 comm="syz.1.2758" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1528.822662][ T31] audit: type=1400 audit(1528.732:621): avc: denied { setopt } for pid=14330 comm="syz.1.2758" laddr=::ffff:127.0.0.1 lport=44880 faddr=::ffff:127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1529.330525][T14333] Illegal XDP return value 4294967274 on prog (id 95) dev N/A, expect packet loss! [ 1530.718759][T14338] syz.1.2761[14338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1530.719236][T14338] syz.1.2761[14338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1530.720150][T14338] syz.1.2761[14338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1530.832072][T14338] IPv6: NLM_F_CREATE should be specified when creating new route [ 1532.129009][T14344] netlink: 72 bytes leftover after parsing attributes in process `syz.1.2763'. [ 1532.130240][ T31] audit: type=1400 audit(1532.042:622): avc: denied { write } for pid=14343 comm="syz.1.2763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1532.130997][ T31] audit: type=1400 audit(1532.042:623): avc: denied { nlmsg_write } for pid=14343 comm="syz.1.2763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1532.777550][ T31] audit: type=1400 audit(1532.682:624): avc: denied { create } for pid=14345 comm="syz.1.2764" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1532.783328][ T31] audit: type=1400 audit(1532.682:625): avc: denied { map } for pid=14345 comm="syz.1.2764" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28951 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1533.497495][T14288] usb 2-1: new full-speed USB device number 39 using dummy_hcd [ 1534.174384][T14288] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1534.179923][T14288] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 1534.180225][T14288] usb 2-1: can't read configurations, error -71 [ 1535.221173][T14360] netlink: 'syz.1.2767': attribute type 4 has an invalid length. [ 1535.259905][T14360] netlink: 'syz.1.2767': attribute type 4 has an invalid length. [ 1535.587377][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1535.587498][ T31] audit: type=1400 audit(1535.482:627): avc: denied { create } for pid=14361 comm="syz.1.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1535.588685][ T31] audit: type=1400 audit(1535.492:628): avc: denied { ioctl } for pid=14361 comm="syz.1.2768" path="socket:[28180]" dev="sockfs" ino=28180 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1535.602167][ T31] audit: type=1400 audit(1535.512:629): avc: denied { bind } for pid=14361 comm="syz.1.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1535.604791][ T31] audit: type=1400 audit(1535.512:630): avc: denied { write } for pid=14361 comm="syz.1.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1535.668159][T14362] vcan0: tx drop: invalid da for name 0x0000000000000003 [ 1536.860047][ C0] vcan0: j1939_tp_rxtimer: 0x845d4700: rx timeout, send abort [ 1536.864602][ C0] vcan0: j1939_xtp_rx_abort_one: 0x845d4700: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. [ 1536.868067][ C0] ------------[ cut here ]------------ [ 1536.868578][ C0] WARNING: CPU: 0 PID: 15 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 1536.869442][ C0] refcount_t: underflow; use-after-free. [ 1536.870250][ C0] Modules linked in: [ 1536.871160][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1536.871856][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.12.0-rc7-syzkaller #0 [ 1536.872762][ C0] Hardware name: ARM-Versatile Express [ 1536.873014][ C0] Call trace: [ 1536.873736][ C0] [<8199d498>] (dump_backtrace) from [<8199d594>] (show_stack+0x18/0x1c) [ 1536.874583][ C0] r7:00000000 r6:82622f44 r5:00000000 r4:8203de58 [ 1536.874890][ C0] [<8199d57c>] (show_stack) from [<819bba28>] (dump_stack_lvl+0x54/0x7c) [ 1536.875296][ C0] [<819bb9d4>] (dump_stack_lvl) from [<819bba68>] (dump_stack+0x18/0x1c) [ 1536.875845][ C0] r5:00000000 r4:82870d18 [ 1536.876030][ C0] [<819bba50>] (dump_stack) from [<8199e0c0>] (panic+0x120/0x374) [ 1536.876533][ C0] [<8199dfa0>] (panic) from [<80242118>] (get_taint+0x0/0x1c) [ 1536.877244][ C0] r3:8260c5c4 r2:00000001 r1:8202622c r0:8202dc94 [ 1536.877708][ C0] r7:80840e78 [ 1536.877901][ C0] [<802420a4>] (check_panic_on_warn) from [<8024227c>] (__warn+0x80/0x188) [ 1536.878349][ C0] [<802421fc>] (__warn) from [<8024256c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1536.878788][ C0] r8:00000009 r7:8208c680 r6:df855bd4 r5:82e3b000 r4:00000000 [ 1536.879121][ C0] [<80242388>] (warn_slowpath_fmt) from [<80840e78>] (refcount_warn_saturate+0x13c/0x174) [ 1536.879579][ C0] r10:dddd10c8 r9:00000003 r8:00000001 r7:00000000 r6:8182aad4 r5:00000002 [ 1536.879921][ C0] r4:8534a900 [ 1536.880108][ C0] [<80840d3c>] (refcount_warn_saturate) from [<8149c5b0>] (sk_skb_reason_drop+0x1d8/0x248) [ 1536.880498][ C0] [<8149c3d8>] (sk_skb_reason_drop) from [<8182aad4>] (j1939_session_destroy+0x78/0x200) [ 1536.881087][ C0] r9:00000003 r8:00000001 r7:8521181c r6:845d4750 r5:845d4700 r4:8534a900 [ 1536.881392][ C0] [<8182aa5c>] (j1939_session_destroy) from [<8182b2c0>] (j1939_xtp_rx_abort_one+0xbc/0x2a4) [ 1536.881891][ C0] r6:85211000 r5:845d4700 r4:8534a840 [ 1536.882202][ C0] [<8182b204>] (j1939_xtp_rx_abort_one) from [<8182e078>] (j1939_tp_recv+0x4c4/0x530) [ 1536.882660][ C0] r9:00000040 r8:84978b50 r7:85211000 r6:85211008 r5:85211000 r4:8534a840 [ 1536.883004][ C0] [<8182dbb4>] (j1939_tp_recv) from [<81827a40>] (j1939_can_recv+0x1e4/0x2dc) [ 1536.883430][ C0] r7:85211000 r6:85211008 r5:85211810 r4:8534a840 [ 1536.883713][ C0] [<8182785c>] (j1939_can_recv) from [<8181d810>] (can_rcv_filter+0x9c/0x218) [ 1536.884164][ C0] r9:00000040 r8:850b4680 r7:98ecfd00 r6:8534ab40 r5:00000001 r4:84992390 [ 1536.884532][ C0] [<8181d774>] (can_rcv_filter) from [<8181e1b4>] (can_receive+0xb4/0xf0) [ 1536.885935][ C0] r9:00000040 r8:00000000 r7:850b4000 r6:84677500 r5:84544100 r4:8534ab40 [ 1536.886894][ C0] [<8181e100>] (can_receive) from [<8181e274>] (can_rcv+0x84/0xac) [ 1536.887726][ C0] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8181e1f0 r4:8534ab40 [ 1536.888214][ C0] [<8181e1f0>] (can_rcv) from [<814bd524>] (__netif_receive_skb_one_core+0x5c/0x80) [ 1536.888608][ C0] r5:8181e1f0 r4:850b4000 [ 1536.888823][ C0] [<814bd4c8>] (__netif_receive_skb_one_core) from [<814bd590>] (__netif_receive_skb+0x18/0x5c) [ 1536.889547][ C0] r5:dddd11b0 r4:8534ab40 [ 1536.889754][ C0] [<814bd578>] (__netif_receive_skb) from [<814bd898>] (process_backlog+0xa0/0x17c) [ 1536.890240][ C0] r5:dddd11b0 r4:8534ab40 [ 1536.890470][ C0] [<814bd7f8>] (process_backlog) from [<814be7a4>] (__napi_poll+0x34/0x240) [ 1536.890923][ C0] r10:dddd10c0 r9:dddd1300 r8:df855e38 r7:df855e33 r6:00000040 r5:dddd11b0 [ 1536.891220][ C0] r4:00000001 [ 1536.891383][ C0] [<814be770>] (__napi_poll) from [<814bf018>] (net_rx_action+0x358/0x440) [ 1536.891742][ C0] r9:dddd1300 r8:df855e38 r7:0000012c r6:0001e320 r5:dddd11b0 r4:00000000 [ 1536.892026][ C0] [<814becc0>] (net_rx_action) from [<8024b55c>] (handle_softirqs+0x158/0x464) [ 1536.892458][ C0] r10:00000008 r9:82e3b000 r8:00000100 r7:04208040 r6:00000003 r5:00000004 [ 1536.892923][ C0] r4:8260408c [ 1536.893123][ C0] [<8024b404>] (handle_softirqs) from [<8024b8ac>] (run_ksoftirqd+0x44/0x4c) [ 1536.893557][ C0] r10:00000000 r9:00000002 r8:82624734 r7:00000001 r6:82e3b000 r5:82cb7100 [ 1536.893982][ C0] r4:00000000 [ 1536.894217][ C0] [<8024b868>] (run_ksoftirqd) from [<80275158>] (smpboot_thread_fn+0x16c/0x284) [ 1536.894648][ C0] [<80274fec>] (smpboot_thread_fn) from [<8026fd40>] (kthread+0x104/0x134) [ 1536.895105][ C0] r10:00000000 r9:df819de8 r8:82cb7240 r7:82cb7100 r6:80274fec r5:82e3b000 [ 1536.895666][ C0] r4:82cb7140 r3:00000000 [ 1536.895911][ C0] [<8026fc3c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1536.896375][ C0] Exception stack(0xdf855fb0 to 0xdf855ff8) [ 1536.896666][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 1536.897892][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1536.898684][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1536.899303][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc3c r4:82cb7140 [ 1536.901542][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:23:16 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8203de58 R02=00000000 R03=819bd898 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=00000001 R11=df855964 R12=df855968 R13=df855958 R14=819bc52c R15=819bd8a8 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ddde4400 R01=0ad68360 R02=000f4808 R03=819bd898 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=ff7c8a00 R11=e0101e24 R12=e0101e28 R13=e0101e18 R14=819bc52c R15=819bd8a8 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000