last executing test programs: 7.919218719s ago: executing program 0 (id=1347): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='contention_end\x00', r3}, 0x10) splice(r1, 0x0, r0, 0x0, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) write$binfmt_script(r2, &(0x7f0000000780)={'#! ', './file0'}, 0xb) 6.510888928s ago: executing program 0 (id=1348): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)={0x2c, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @crypto_settings=[@NL80211_ATTR_SOCKET_OWNER={0x4}]]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002540)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4000815}, 0x850) 4.879742024s ago: executing program 1 (id=1350): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="7800000039000900000f0f0000b9000004000000040000000c0001"], 0x78}}, 0x0) 4.685987779s ago: executing program 1 (id=1351): r0 = syz_io_uring_setup(0xec5, &(0x7f0000000c00), &(0x7f0000000500), &(0x7f0000000600)) io_uring_enter(r0, 0x0, 0x10a5, 0x3, &(0x7f0000000040), 0x8) 4.156425193s ago: executing program 0 (id=1352): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xd000) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) shmdt(r0) 3.492479572s ago: executing program 0 (id=1353): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)=""/180, 0x10002}], 0x1, 0x0, 0xe}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001400)=""/94, 0x5e}], 0x1}}], 0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x3, 0x4) sendto(r0, &(0x7f0000000180)='%', 0x300000, 0x840, 0x0, 0x60) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "24f9f785ee66fb5b", "750000000000000023d0a58f00", "0600", "4e694600000000e4"}, 0x28) 2.008265204s ago: executing program 1 (id=1354): r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x7, 0x6, 0x1}) 1.462272979s ago: executing program 1 (id=1355): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$GIO_UNIMAP(r1, 0x4b4d, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 1.260148405s ago: executing program 0 (id=1356): openat$dir(0xffffffffffffff9c, &(0x7f0000002440)='./file0\x00', 0x40, 0x0) mount(&(0x7f0000002780)=@sg0, &(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='ceph\x00', 0x0, 0x0) 1.254471955s ago: executing program 1 (id=1357): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='cmdline\x00') flock(r2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='cmdline\x00') flock(r3, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='cmdline\x00') flock(r4, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 464.299727ms ago: executing program 0 (id=1358): socket$nl_generic(0x10, 0x3, 0x10) socket$key(0xf, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000040)=0x6, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0x10132) setsockopt$sock_int(r4, 0x1, 0x10, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x78) recvmmsg(r4, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 0s ago: executing program 1 (id=1359): syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000b75000/0x4000)=nil, 0x4000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000011c0)={'vxcan0\x00', 0x0}) madvise(&(0x7f0000597000/0x2000)=nil, 0x2000, 0x10) bind$can_j1939(r2, &(0x7f0000001200)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000080)={0x1d, r3}, 0x18) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000000)='h', 0xfdef}], 0x1) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f0000000100)=[{0x0, 0x7, {0x2, 0xff, 0x3}, {0x1, 0x0, 0x1}, 0xff, 0x1}, {0x3, 0x3, {0x1, 0xf0, 0x4}, {0x0, 0x1}, 0xfd, 0xff}, {0x2, 0x0, {0x0, 0xf0, 0x3}, {0x2, 0xff, 0x3}, 0x0, 0xfe}], 0x60) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@getchain={0x24, 0x11, 0x839, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) socket(0x21, 0x5, 0xffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000040)=@urb_type_iso={0x0, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0}) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f000020f000/0x4000)=nil) kernel console output (not intermixed with test programs): ass=kcm_socket permissive=1 [ 176.915412][ T31] audit: type=1400 audit(176.830:170): avc: denied { write } for pid=4467 comm="syz.1.206" path="socket:[4315]" dev="sockfs" ino=4315 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 176.916529][ T31] audit: type=1400 audit(176.830:171): avc: denied { write } for pid=4467 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 176.918883][ T31] audit: type=1400 audit(176.830:172): avc: denied { setopt } for pid=4467 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 178.016920][ T4477] fuse: Bad value for 'fd' [ 178.145197][ T31] audit: type=1400 audit(178.060:173): avc: denied { create } for pid=4478 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 178.170969][ T4479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4479 comm=syz.0.211 [ 180.317577][ T4480] FAULT_INJECTION: forcing a failure. [ 180.317577][ T4480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.321011][ T4480] CPU: 0 UID: 0 PID: 4480 Comm: syz.1.209 Not tainted 6.12.0-syzkaller #0 [ 180.321350][ T4480] Hardware name: ARM-Versatile Express [ 180.321573][ T4480] Call trace: [ 180.321837][ T4480] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 180.322256][ T4480] r7:00000000 r6:76b0af30 r5:60000013 r4:8203df48 [ 180.323017][ T4480] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 180.323686][ T4480] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 180.324066][ T4480] r5:00000000 r4:8274e844 [ 180.324303][ T4480] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 180.324671][ T4480] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 180.325032][ T4480] r6:76b0af30 r5:00000001 r4:00000001 [ 180.325272][ T4480] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 180.325633][ T4480] [<808e6b5c>] (should_fail_usercopy) from [<80844464>] (kstrtouint_from_user+0x60/0x134) [ 180.326097][ T4480] [<80844404>] (kstrtouint_from_user) from [<805c597c>] (proc_fail_nth_write+0x40/0xe8) [ 180.326520][ T4480] r8:ec7c9f68 r7:843a6000 r6:00000001 r5:84138a80 r4:00000001 [ 180.326852][ T4480] [<805c593c>] (proc_fail_nth_write) from [<805176e4>] (vfs_write+0xac/0x44c) [ 180.327253][ T4480] r5:84138a80 r4:805c593c [ 180.327468][ T4480] [<80517638>] (vfs_write) from [<80517c08>] (ksys_write+0x78/0xf8) [ 180.327850][ T4480] r10:00000004 r9:843a6000 r8:8020029c r7:00000000 r6:00000002 r5:84138a80 [ 180.328182][ T4480] r4:84138a83 [ 180.328370][ T4480] [<80517b90>] (ksys_write) from [<80517c98>] (sys_write+0x10/0x14) [ 180.328751][ T4480] r7:00000004 r6:00000005 r5:76b0af30 r4:00000001 [ 180.329027][ T4480] [<80517c88>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 180.329387][ T4480] Exception stack(0xec7c9fa8 to 0xec7c9ff0) [ 180.329668][ T4480] 9fa0: 00000001 76b0af30 00000005 76b0af30 00000001 00000000 [ 180.330506][ T4480] 9fc0: 00000001 76b0af30 00000005 00000004 00000000 00006364 003d0f00 76b0b0bc [ 180.331016][ T4480] 9fe0: 00000158 76b0aed0 000d8998 001313ec [ 180.935540][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 180.935639][ T31] audit: type=1400 audit(180.850:177): avc: denied { create } for pid=4496 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 180.940766][ T31] audit: type=1400 audit(180.850:178): avc: denied { write } for pid=4496 comm="syz.0.216" path="socket:[4388]" dev="sockfs" ino=4388 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 180.947135][ T31] audit: type=1400 audit(180.860:179): avc: denied { ioctl } for pid=4496 comm="syz.0.216" path="socket:[4388]" dev="sockfs" ino=4388 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 185.606538][ T31] audit: type=1400 audit(185.520:180): avc: denied { listen } for pid=4548 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 185.843591][ T31] audit: type=1400 audit(185.760:181): avc: denied { create } for pid=4553 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 187.294575][ T31] audit: type=1400 audit(187.200:182): avc: denied { write } for pid=4557 comm="syz.1.233" path="socket:[5166]" dev="sockfs" ino=5166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 189.157419][ T4567] FAULT_INJECTION: forcing a failure. [ 189.157419][ T4567] name failslab, interval 1, probability 0, space 0, times 0 [ 189.158342][ T4567] CPU: 1 UID: 0 PID: 4567 Comm: syz.0.237 Not tainted 6.12.0-syzkaller #0 [ 189.158944][ T4567] Hardware name: ARM-Versatile Express [ 189.159188][ T4567] Call trace: [ 189.159399][ T4567] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 189.159859][ T4567] r7:8403d400 r6:00000cc0 r5:60000013 r4:8203df48 [ 189.160139][ T4567] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 189.160516][ T4567] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 189.160871][ T4567] r5:00000000 r4:8271925c [ 189.161057][ T4567] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 189.161407][ T4567] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 189.161822][ T4567] r6:00000cc0 r5:ffffffff r4:82cac780 [ 189.162048][ T4567] [<804e9074>] (should_failslab) from [<804cd864>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 189.163167][ T4567] [<804cd814>] (kmem_cache_alloc_node_noprof) from [<81494ac4>] (__alloc_skb+0x138/0x160) [ 189.163814][ T4567] r10:eca49d4c r9:00000000 r8:00000cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 189.164344][ T4567] r4:82606000 [ 189.164610][ T4567] [<8149498c>] (__alloc_skb) from [<8149cc98>] (alloc_skb_with_frags+0x44/0x1ec) [ 189.165047][ T4567] r8:802a6f00 r7:eca49cd4 r6:00000000 r5:00001000 r4:00000000 [ 189.165348][ T4567] [<8149cc54>] (alloc_skb_with_frags) from [<8148e398>] (sock_alloc_send_pskb+0x1f4/0x228) [ 189.165845][ T4567] r10:eca49d4c r9:00000000 r8:802a6f00 r7:eca49cd4 r6:8403d400 r5:7fffffff [ 189.166193][ T4567] r4:851c0000 [ 189.166376][ T4567] [<8148e1a4>] (sock_alloc_send_pskb) from [<81830bbc>] (isotp_sendmsg+0x2b4/0x7fc) [ 189.166847][ T4567] r10:eca49f38 r9:00000014 r8:eca49f48 r7:00000014 r6:851c0000 r5:851c2000 [ 189.167187][ T4567] r4:00000000 [ 189.167363][ T4567] [<81830908>] (isotp_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 189.167762][ T4567] r10:00000000 r9:eca49dd4 r8:eca49dd4 r7:8319ea00 r6:8319ea00 r5:eca49f38 [ 189.168111][ T4567] r4:00000000 [ 189.168537][ T4567] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 189.169233][ T4567] r7:8319ea00 r6:00000000 r5:00000010 r4:eca49f38 [ 189.169766][ T4567] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 189.170160][ T4567] r10:eca49e34 r9:20000140 r8:00000010 r7:00000000 r6:8319ea00 r5:eca49f38 [ 189.170501][ T4567] r4:00000000 [ 189.170682][ T4567] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 189.171082][ T4567] r10:00000128 r9:8403d400 r8:8020029c r7:00000010 r6:20000140 r5:8319ea00 [ 189.171429][ T4567] r4:00000000 [ 189.171605][ T4567] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 189.172011][ T4567] Exception stack(0xeca49fa8 to 0xeca49ff0) [ 189.172289][ T4567] 9fa0: 00000000 00000000 00000003 20000140 00000010 00000000 [ 189.172994][ T4567] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b880bc [ 189.173645][ T4567] 9fe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 189.174028][ T4567] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 189.305729][ T4571] fuse: Bad value for 'group_id' [ 189.307285][ T4571] fuse: Bad value for 'group_id' [ 190.238812][ T4582] fuse: Bad value for 'group_id' [ 190.239326][ T4582] fuse: Bad value for 'group_id' [ 192.945938][ T4597] fuse: Bad value for 'fd' [ 198.006970][ T4628] fuse: Bad value for 'fd' [ 198.852994][ T716] usb 2-1: new low-speed USB device number 11 using dummy_hcd [ 198.861114][ T4643] fuse: Bad value for 'fd' [ 199.015235][ T716] usb 2-1: Invalid ep0 maxpacket: 32 [ 199.143866][ T716] usb 2-1: new low-speed USB device number 12 using dummy_hcd [ 199.295237][ T716] usb 2-1: Invalid ep0 maxpacket: 32 [ 199.297553][ T716] usb usb2-port1: attempt power cycle [ 199.633957][ T716] usb 2-1: new low-speed USB device number 13 using dummy_hcd [ 199.656858][ T716] usb 2-1: Invalid ep0 maxpacket: 32 [ 199.793673][ T716] usb 2-1: new low-speed USB device number 14 using dummy_hcd [ 199.819015][ T716] usb 2-1: Invalid ep0 maxpacket: 32 [ 199.821532][ T716] usb usb2-port1: unable to enumerate USB device [ 202.404575][ T31] audit: type=1400 audit(202.320:183): avc: denied { map_read map_write } for pid=4651 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.684507][ T31] audit: type=1400 audit(202.600:184): avc: denied { prog_run } for pid=4651 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 208.484725][ T4667] fuse: Bad value for 'fd' [ 211.680727][ T4682] sctp: [Deprecated]: syz.1.268 (pid 4682) Use of int in maxseg socket option. [ 211.680727][ T4682] Use struct sctp_assoc_value instead [ 211.703471][ T4682] SELinux: Context system_u:object_r:console_device_t:s0 is not valid (left unmapped). [ 211.705627][ T31] audit: type=1400 audit(211.620:185): avc: denied { relabelto } for pid=4681 comm="syz.1.268" name="dmmidi2" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:console_device_t:s0" [ 211.707582][ T31] audit: type=1400 audit(211.620:186): avc: denied { associate } for pid=4681 comm="syz.1.268" name="dmmidi2" dev="devtmpfs" ino=735 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:console_device_t:s0" [ 211.826641][ T4684] fuse: Bad value for 'fd' [ 212.449632][ T4688] FAULT_INJECTION: forcing a failure. [ 212.449632][ T4688] name failslab, interval 1, probability 0, space 0, times 0 [ 212.450434][ T4688] CPU: 1 UID: 0 PID: 4688 Comm: syz.1.270 Not tainted 6.12.0-syzkaller #0 [ 212.450772][ T4688] Hardware name: ARM-Versatile Express [ 212.451030][ T4688] Call trace: [ 212.451259][ T4688] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 212.451779][ T4688] r7:00000c40 r6:8513dda8 r5:60000013 r4:8203df48 [ 212.452078][ T4688] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 212.452706][ T4688] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 212.453225][ T4688] r5:00000000 r4:8271925c [ 212.453718][ T4688] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 212.454270][ T4688] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 212.454700][ T4688] r6:8513dda8 r5:00001000 r4:82c016c0 [ 212.454971][ T4688] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 212.455411][ T4688] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 212.455910][ T4688] r10:8403b000 r9:82c9fc00 r8:00000000 r7:83032088 r6:8513dda8 r5:00001000 [ 212.456282][ T4688] r4:00000000 [ 212.456479][ T4688] [<80752284>] (tomoyo_realpath_from_path) from [<8074e404>] (tomoyo_path_number_perm+0xcc/0x22c) [ 212.456983][ T4688] r10:8403b000 r9:00000000 r8:00000004 r7:c0086426 r6:00000004 r5:81ad1968 [ 212.457348][ T4688] r4:8513dda8 r3:824ba340 [ 212.457554][ T4688] [<8074e338>] (tomoyo_path_number_perm) from [<80752cd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 212.458089][ T4688] r9:8513dd80 r8:00000004 r7:00000000 r6:00000000 r5:c0086426 r4:8513dd80 [ 212.458456][ T4688] [<80752cb4>] (tomoyo_file_ioctl) from [<8070131c>] (security_file_ioctl+0x64/0x1e4) [ 212.458915][ T4688] [<807012b8>] (security_file_ioctl) from [<80530600>] (sys_ioctl+0x50/0xd98) [ 212.459405][ T4688] r7:00000000 r6:8513dd81 r5:00000000 r4:c0086426 [ 212.459738][ T4688] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 212.460168][ T4688] Exception stack(0xdfa11fa8 to 0xdfa11ff0) [ 212.460471][ T4688] 1fa0: 00000000 00000000 00000004 c0086426 00000000 00000000 [ 212.460897][ T4688] 1fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b2c0bc [ 212.461303][ T4688] 1fe0: 76b2bec0 76b2beb0 00018af0 00133450 [ 212.461612][ T4688] r10:00000036 r9:8403b000 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 212.462033][ T4688] r4:00000000 [ 212.463509][ T4688] ERROR: Out of memory at tomoyo_realpath_from_path. [ 217.201918][ T4709] fuse: Bad value for 'fd' [ 220.177221][ T4725] FAULT_INJECTION: forcing a failure. [ 220.177221][ T4725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.178033][ T4725] CPU: 1 UID: 0 PID: 4725 Comm: syz.0.280 Not tainted 6.12.0-syzkaller #0 [ 220.178408][ T4725] Hardware name: ARM-Versatile Express [ 220.178664][ T4725] Call trace: [ 220.178885][ T4725] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 220.179347][ T4725] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 220.179621][ T4725] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 220.180022][ T4725] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 220.180396][ T4725] r5:00000000 r4:8274e844 [ 220.180599][ T4725] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 220.181008][ T4725] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 220.181373][ T4725] r6:00000000 r5:dfb9df68 r4:00000002 [ 220.181616][ T4725] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 220.181994][ T4725] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 220.182900][ T4725] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 220.183557][ T4725] r10:00000001 r9:805c43b8 r8:00000002 r7:dfb9df68 r6:0000000f r5:76b87f30 [ 220.184080][ T4725] r4:8403c800 r3:dfb9de9f [ 220.184316][ T4725] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 220.184767][ T4725] r8:76b87f30 r7:dfb9df68 r6:8403c800 r5:0000000f r4:8513d900 [ 220.185111][ T4725] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 220.185500][ T4725] r10:00000003 r9:8403c800 r8:8020029c r7:00000000 r6:00000000 r5:8513d900 [ 220.185917][ T4725] r4:8513d903 [ 220.186121][ T4725] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 220.186522][ T4725] r7:00000003 r6:00000004 r5:76b87f30 r4:0000000f [ 220.186832][ T4725] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 220.187365][ T4725] Exception stack(0xdfb9dfa8 to 0xdfb9dff0) [ 220.187655][ T4725] dfa0: 0000000f 76b87f30 00000004 76b87f30 0000000f 00000000 [ 220.188367][ T4725] dfc0: 0000000f 76b87f30 00000004 00000003 00000000 00006364 003d0f00 76b880bc [ 220.188927][ T4725] dfe0: 00000158 76b87ed0 000d8998 00131324 [ 221.781396][ T4740] sctp: [Deprecated]: syz.0.286 (pid 4740) Use of int in max_burst socket option. [ 221.781396][ T4740] Use struct sctp_assoc_value instead [ 222.462913][ T31] audit: type=1400 audit(222.370:187): avc: denied { accept } for pid=4739 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 224.140519][ T31] audit: type=1400 audit(224.050:188): avc: denied { create } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.157229][ T31] audit: type=1400 audit(224.070:189): avc: denied { write } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.160065][ T31] audit: type=1400 audit(224.070:190): avc: denied { accept } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.320970][ T31] audit: type=1400 audit(224.230:191): avc: denied { getopt } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.329969][ T31] audit: type=1400 audit(224.240:192): avc: denied { setopt } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.335176][ T31] audit: type=1400 audit(224.250:193): avc: denied { read } for pid=4754 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 227.449337][ T31] audit: type=1400 audit(227.360:194): avc: denied { bind } for pid=4772 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 227.608064][ T31] audit: type=1400 audit(227.520:195): avc: denied { accept } for pid=4772 comm="syz.0.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 229.000666][ T4787] fuse: Bad value for 'group_id' [ 229.001158][ T4787] fuse: Bad value for 'group_id' [ 229.307010][ T4802] fuse: Bad value for 'group_id' [ 229.309011][ T4802] fuse: Bad value for 'group_id' [ 230.225977][ T4808] fuse: Bad value for 'group_id' [ 230.226464][ T4808] fuse: Bad value for 'group_id' [ 230.407945][ T31] audit: type=1400 audit(230.320:196): avc: denied { create } for pid=4811 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 230.423537][ T31] audit: type=1400 audit(230.330:197): avc: denied { bind } for pid=4811 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 233.641363][ T4824] fuse: Bad value for 'group_id' [ 233.641986][ T4824] fuse: Bad value for 'group_id' [ 237.187215][ T4845] fuse: Bad value for 'group_id' [ 237.187724][ T4845] fuse: Bad value for 'group_id' [ 237.291907][ T4847] fuse: Bad value for 'fd' [ 238.709134][ T4859] fuse: Bad value for 'fd' [ 241.261081][ T4868] fuse: Bad value for 'rootmode' [ 242.035258][ T4875] fuse: Bad value for 'fd' [ 243.014840][ T4880] fuse: Bad value for 'rootmode' [ 245.411939][ T4891] fuse: Unknown parameter 'group_i00000000000000000000' [ 246.251197][ T4896] fuse: Bad value for 'rootmode' [ 246.261286][ T31] audit: type=1400 audit(246.170:198): avc: denied { remove_name } for pid=2899 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 246.266759][ T31] audit: type=1400 audit(246.180:199): avc: denied { rename } for pid=2899 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 247.267704][ T4903] fuse: Unknown parameter 'group_i00000000000000000000' [ 247.379860][ T4905] fuse: Invalid rootmode [ 249.301617][ T4916] fuse: Unknown parameter 'group_id00000000000000000000' [ 249.397161][ T4918] fuse: Invalid rootmode [ 250.019794][ T31] audit: type=1400 audit(249.930:200): avc: denied { name_bind } for pid=4919 comm="syz.1.347" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 250.538956][ T31] audit: type=1400 audit(250.450:201): avc: denied { ioctl } for pid=4919 comm="syz.1.347" path="socket:[5789]" dev="sockfs" ino=5789 ioctlcmd=0x8927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 251.188826][ T4930] fuse: Unknown parameter 'group_id00000000000000000000' [ 251.296121][ T4932] fuse: Bad value for 'rootmode' [ 251.554863][ T31] audit: type=1400 audit(251.470:202): avc: denied { write } for pid=4919 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 252.765514][ T4941] fuse: Invalid rootmode [ 252.858978][ T4943] fuse: Unknown parameter 'group_id00000000000000000000' [ 252.945850][ T4946] fuse: Bad value for 'rootmode' [ 253.257084][ T4952] fuse: Bad value for 'rootmode' [ 253.370842][ T4954] fuse: Bad value for 'user_id' [ 253.373648][ T4954] fuse: Bad value for 'user_id' [ 254.639382][ T4962] fuse: Unknown parameter 'grou00000000000000000000' [ 254.756978][ T4964] fuse: Bad value for 'rootmode' [ 254.865241][ T4966] fuse: Bad value for 'user_id' [ 254.865905][ T4966] fuse: Bad value for 'user_id' [ 258.074289][ T4980] fuse: Bad value for 'rootmode' [ 258.164983][ T4982] fuse: Unknown parameter 'use00000000000000000000' [ 259.793735][ T4989] fuse: Bad value for 'fd' [ 261.505752][ T4997] fuse: Unknown parameter 'use00000000000000000000' [ 261.616813][ T4999] fuse: Unknown parameter 'use00000000000000000000' [ 263.041019][ T5005] fuse: Bad value for 'fd' [ 264.854721][ T5013] fuse: Unknown parameter 'use00000000000000000000' [ 264.976832][ T5015] fuse: Unknown parameter 'user_i00000000000000000000' [ 266.265422][ T5021] fuse: Bad value for 'fd' [ 266.368208][ T5023] fuse: Unknown parameter '0x0000000000000003' [ 266.493769][ T5025] fuse: Unknown parameter 'use00000000000000000000' [ 266.587901][ T5027] fuse: Unknown parameter 'user_i00000000000000000000' [ 269.811363][ T5040] fuse: Bad value for 'user_id' [ 269.811901][ T5040] fuse: Bad value for 'user_id' [ 269.937925][ T5043] fuse: Unknown parameter 'user_i00000000000000000000' [ 270.035445][ T5045] fuse: Unknown parameter 'user_i00000000000000000000' [ 273.287093][ T5050] FAULT_INJECTION: forcing a failure. [ 273.287093][ T5050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.287964][ T5050] CPU: 0 UID: 0 PID: 5050 Comm: syz.1.390 Not tainted 6.12.0-syzkaller #0 [ 273.288310][ T5050] Hardware name: ARM-Versatile Express [ 273.288692][ T5050] Call trace: [ 273.288918][ T5050] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 273.289492][ T5050] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 273.289907][ T5050] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 273.290315][ T5050] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 273.290627][ T5050] r5:00000000 r4:8274e844 [ 273.290799][ T5050] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 273.291118][ T5050] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 273.291426][ T5050] r6:00000000 r5:eadb1f68 r4:00000002 [ 273.291615][ T5050] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 273.291944][ T5050] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 273.292297][ T5050] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 273.292699][ T5050] r10:00000001 r9:805c43b8 r8:00000002 r7:eadb1f68 r6:0000000f r5:76ae9f30 [ 273.293030][ T5050] r4:83606c00 r3:eadb1e9f [ 273.293200][ T5050] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 273.293524][ T5050] r8:76ae9f30 r7:eadb1f68 r6:83606c00 r5:0000000f r4:84138180 [ 273.293792][ T5050] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 273.294097][ T5050] r10:00000003 r9:83606c00 r8:8020029c r7:00000000 r6:00000000 r5:84138180 [ 273.294363][ T5050] r4:84138183 [ 273.294508][ T5050] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 273.294803][ T5050] r7:00000003 r6:00000005 r5:76ae9f30 r4:0000000f [ 273.295037][ T5050] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 273.295939][ T5050] Exception stack(0xeadb1fa8 to 0xeadb1ff0) [ 273.296387][ T5050] 1fa0: 0000000f 76ae9f30 00000005 76ae9f30 0000000f 00000000 [ 273.296833][ T5050] 1fc0: 0000000f 76ae9f30 00000005 00000003 00000000 00006364 003d0f00 76aea0bc [ 273.297299][ T5050] 1fe0: 00000158 76ae9ed0 000d8998 00131324 [ 273.420958][ T5057] fuse: Bad value for 'fd' [ 273.514533][ T5059] fuse: Unknown parameter 'user_i00000000000000000000' [ 273.619495][ T5062] fuse: Unknown parameter 'user_id00000000000000000000' [ 273.678518][ T5064] fuse: Unknown parameter 'fd0x0000000000000003' [ 273.830594][ T5069] fuse: Bad value for 'fd' [ 273.945172][ T5071] fuse: Unknown parameter 'user_i00000000000000000000' [ 274.048445][ T5073] fuse: Unknown parameter 'user_id00000000000000000000' [ 275.142100][ T5078] fuse: Unknown parameter 'fd0x0000000000000003' [ 275.288359][ T5082] fuse: Bad value for 'fd' [ 275.293813][ T5081] fuse: Unknown parameter 'user_id00000000000000000000' [ 275.428512][ T5086] fuse: Unknown parameter 'user_id00000000000000000000' [ 278.518108][ T5105] fuse: Bad value for 'fd' [ 278.632221][ T5107] fuse: Bad value for 'fd' [ 279.057655][ T5117] fuse: Bad value for 'fd' [ 279.168348][ T5119] fuse: Bad value for 'fd' [ 282.080861][ T5135] fuse: Bad value for 'fd' [ 282.197036][ T5137] fuse: Bad value for 'fd' [ 283.503995][ T5150] fuse: Invalid rootmode [ 286.135715][ T5167] fuse: Invalid rootmode [ 287.114740][ T5180] fuse: Invalid rootmode [ 290.552110][ T5197] fuse: Bad value for 'rootmode' [ 292.255989][ T5211] fuse: Bad value for 'rootmode' [ 294.035206][ T5223] fuse: Bad value for 'rootmode' [ 295.300581][ T5238] fuse: Unknown parameter '0x0000000000000004' [ 300.127525][ T31] audit: type=1400 audit(300.040:203): avc: denied { read } for pid=5252 comm="syz.1.460" path="socket:[6367]" dev="sockfs" ino=6367 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 300.485029][ T5256] fuse: Unknown parameter '0x0000000000000004' [ 302.845384][ T5267] fuse: Unknown parameter '0x0000000000000004' [ 303.811525][ T5273] fuse: Unknown parameter '0x0000000000000004' [ 303.892100][ T5275] capability: warning: `syz.0.467' uses 32-bit capabilities (legacy support in use) [ 307.962073][ T5295] syz.0.473 (5295): /proc/5292/oom_adj is deprecated, please use /proc/5292/oom_score_adj instead. [ 307.987050][ T31] audit: type=1400 audit(307.900:204): avc: denied { bind } for pid=5292 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 307.988041][ T31] audit: type=1400 audit(307.900:205): avc: denied { node_bind } for pid=5292 comm="syz.0.473" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 307.994637][ T31] audit: type=1400 audit(307.900:206): avc: denied { watch } for pid=5292 comm="syz.0.473" path="/252" dev="tmpfs" ino=1372 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 311.139858][ T5305] fuse: Unknown parameter 'fd0x0000000000000004' [ 311.827414][ T5308] FAULT_INJECTION: forcing a failure. [ 311.827414][ T5308] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 311.828123][ T5308] CPU: 1 UID: 0 PID: 5308 Comm: syz.1.477 Not tainted 6.12.0-syzkaller #0 [ 311.828474][ T5308] Hardware name: ARM-Versatile Express [ 311.828685][ T5308] Call trace: [ 311.828893][ T5308] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 311.829803][ T5308] r7:ec16ddc4 r6:00000000 r5:60000013 r4:8203df48 [ 311.830140][ T5308] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 311.830549][ T5308] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 311.831001][ T5308] r5:00000000 r4:827192b0 [ 311.832542][ T5308] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 311.833276][ T5308] [<808e6968>] (should_fail_ex) from [<804e9170>] (should_fail_alloc_page+0x68/0x74) [ 311.833923][ T5308] r6:00000000 r5:00000cc0 r4:ec16ddd0 [ 311.834180][ T5308] [<804e9108>] (should_fail_alloc_page) from [<804b9670>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 311.835885][ T5308] [<804b95e8>] (prepare_alloc_pages.constprop.0) from [<804c0248>] (__alloc_pages_noprof+0xb4/0x1128) [ 311.836800][ T5308] r10:00000000 r9:00000000 r8:ec16df68 r7:84038c00 r6:00000cc0 r5:ec16df68 [ 311.842500][ T5308] r4:00000000 r3:ec16ddd0 [ 311.842815][ T5308] [<804c0194>] (__alloc_pages_noprof) from [<804c187c>] (get_free_pages_noprof+0x1c/0x34) [ 311.846365][ T5308] r10:81b2645c r9:00000000 r8:ec16df68 r7:84038c00 r6:82e25258 r5:ec16df68 [ 311.847269][ T5308] r4:00000000 [ 311.847494][ T5308] [<804c1860>] (get_free_pages_noprof) from [<809c71d0>] (vcs_write+0x54/0x758) [ 311.849464][ T5308] [<809c717c>] (vcs_write) from [<805176e4>] (vfs_write+0xac/0x44c) [ 311.852955][ T5308] r10:81b2645c r9:00000000 r8:ec16df68 r7:84038c00 r6:00000000 r5:84138300 [ 311.853370][ T5308] r4:809c717c [ 311.856627][ T5308] [<80517638>] (vfs_write) from [<80517c08>] (ksys_write+0x78/0xf8) [ 311.858849][ T5308] r10:00000004 r9:84038c00 r8:8020029c r7:00000000 r6:00000000 r5:84138300 [ 311.859440][ T5308] r4:84138301 [ 311.862292][ T5308] [<80517b90>] (ksys_write) from [<80517c98>] (sys_write+0x10/0x14) [ 311.864860][ T5308] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 311.869777][ T5308] [<80517c88>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 311.870450][ T5308] Exception stack(0xec16dfa8 to 0xec16dff0) [ 311.871544][ T5308] dfa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 311.872914][ T5308] dfc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b4d0bc [ 311.875444][ T5308] dfe0: 76b4cec0 76b4ceb0 00018af0 00133450 [ 315.596505][ T5320] fuse: Unknown parameter 'fd0x0000000000000004' [ 316.917740][ T5325] fuse: Unknown parameter '0x0000000000000004' [ 320.624750][ T5338] fuse: Unknown parameter '0x0000000000000004' [ 323.926896][ T5354] fuse: Unknown parameter '0x0000000000000004' [ 324.030973][ T5358] fuse: Bad value for 'fd' [ 324.346012][ T5367] fuse: Unknown parameter '0x0000000000000004' [ 324.517326][ T5369] fuse: Unknown parameter '0x0000000000000003' [ 325.124915][ T5380] fuse: Unknown parameter 'fd0x0000000000000004' [ 325.202260][ T5382] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5382 comm=syz.0.505 [ 328.688995][ T5401] fuse: Unknown parameter 'fd0x0000000000000004' [ 328.828429][ T5375] Process accounting resumed [ 329.280549][ T5414] fuse: Unknown parameter 'fd0x0000000000000004' [ 330.105446][ T31] audit: type=1400 audit(330.020:207): avc: denied { create } for pid=5431 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 330.122892][ T31] audit: type=1400 audit(330.030:208): avc: denied { ioctl } for pid=5431 comm="syz.1.520" path="socket:[7674]" dev="sockfs" ino=7674 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 330.135066][ T31] audit: type=1400 audit(330.050:209): avc: denied { setattr } for pid=5431 comm="syz.1.520" name="KEY" dev="sockfs" ino=7674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 330.140737][ T31] audit: type=1400 audit(330.050:210): avc: denied { shutdown } for pid=5431 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 337.133213][ T5477] fuse: Unknown parameter '0x0000000000000003' [ 341.045981][ T5491] fuse: Unknown parameter '0x0000000000000003' [ 344.381145][ T5505] fuse: Unknown parameter 'fd0x0000000000000003' [ 345.508635][ T31] audit: type=1400 audit(345.420:211): avc: denied { accept } for pid=5506 comm="syz.0.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 345.513931][ T31] audit: type=1400 audit(345.420:212): avc: denied { write } for pid=5506 comm="syz.0.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 348.840093][ T5522] fuse: Unknown parameter 'fd0x0000000000000003' [ 350.665523][ T31] audit: type=1400 audit(350.580:213): avc: denied { create } for pid=5531 comm="syz.1.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.164617][ T5545] fuse: Unknown parameter 'fd0x0000000000000003' [ 375.938124][ T31] audit: type=1400 audit(375.850:214): avc: denied { write } for pid=5618 comm="syz.1.573" path="socket:[6869]" dev="sockfs" ino=6869 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 408.318586][ T5754] FAULT_INJECTION: forcing a failure. [ 408.318586][ T5754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.319556][ T5754] CPU: 1 UID: 0 PID: 5754 Comm: syz.1.607 Not tainted 6.12.0-syzkaller #0 [ 408.320024][ T5754] Hardware name: ARM-Versatile Express [ 408.320491][ T5754] Call trace: [ 408.320757][ T5754] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 408.321420][ T5754] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 408.321817][ T5754] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 408.322661][ T5754] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 408.323389][ T5754] r5:00000000 r4:8274e844 [ 408.323593][ T5754] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 408.323923][ T5754] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 408.324327][ T5754] r6:00000000 r5:eaf51f68 r4:00000002 [ 408.324584][ T5754] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 408.324993][ T5754] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 408.325452][ T5754] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 408.325945][ T5754] r10:00000001 r9:805c43b8 r8:00000002 r7:eaf51f68 r6:0000000f r5:76ac8f30 [ 408.326281][ T5754] r4:83be5400 r3:eaf51e9f [ 408.326487][ T5754] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 408.326974][ T5754] r8:76ac8f30 r7:eaf51f68 r6:83be5400 r5:0000000f r4:852573c0 [ 408.327294][ T5754] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 408.327690][ T5754] r10:00000003 r9:83be5400 r8:8020029c r7:00000000 r6:00000000 r5:852573c0 [ 408.328030][ T5754] r4:852573c3 [ 408.328242][ T5754] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 408.328639][ T5754] r7:00000003 r6:00000005 r5:76ac8f30 r4:0000000f [ 408.328942][ T5754] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 408.329344][ T5754] Exception stack(0xeaf51fa8 to 0xeaf51ff0) [ 408.329648][ T5754] 1fa0: 0000000f 76ac8f30 00000005 76ac8f30 0000000f 00000000 [ 408.330082][ T5754] 1fc0: 0000000f 76ac8f30 00000005 00000003 00000000 00006364 003d0f00 76ac90bc [ 408.330465][ T5754] 1fe0: 00000158 76ac8ed0 000d8998 00131324 [ 430.367226][ T31] audit: type=1400 audit(430.280:215): avc: denied { name_bind } for pid=5841 comm="syz.1.637" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 430.370444][ T31] audit: type=1400 audit(430.280:216): avc: denied { node_bind } for pid=5841 comm="syz.1.637" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 434.293238][ T31] audit: type=1400 audit(434.200:217): avc: denied { create } for pid=5858 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 434.435583][ T31] audit: type=1400 audit(434.350:218): avc: denied { getopt } for pid=5858 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 438.781853][ T31] audit: type=1400 audit(438.690:219): avc: denied { read } for pid=5874 comm="syz.1.647" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 438.785072][ T31] audit: type=1400 audit(438.690:220): avc: denied { open } for pid=5874 comm="syz.1.647" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 438.789209][ T5875] binder: 5874:5875 ioctl 541b 2000b480 returned -22 [ 444.446731][ T31] audit: type=1400 audit(444.360:221): avc: denied { accept } for pid=5901 comm="syz.0.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_selinux_socket permissive=1 [ 455.176932][ T31] audit: type=1400 audit(455.090:222): avc: denied { ioctl } for pid=5958 comm="syz.0.670" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8393 ioctlcmd=0x5879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 455.215000][ T31] audit: type=1400 audit(455.130:223): avc: denied { execute } for pid=5958 comm="syz.0.670" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8398 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 455.382278][ T5961] FAULT_INJECTION: forcing a failure. [ 455.382278][ T5961] name failslab, interval 1, probability 0, space 0, times 0 [ 455.384475][ T5961] CPU: 1 UID: 0 PID: 5961 Comm: syz.0.671 Not tainted 6.12.0-syzkaller #0 [ 455.384822][ T5961] Hardware name: ARM-Versatile Express [ 455.385060][ T5961] Call trace: [ 455.385353][ T5961] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 455.386649][ T5961] r7:843a0c00 r6:00000cc0 r5:60000013 r4:8203df48 [ 455.386860][ T5961] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 455.387172][ T5961] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 455.387533][ T5961] r5:00000000 r4:8271925c [ 455.387708][ T5961] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 455.388033][ T5961] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 455.388393][ T5961] r6:00000cc0 r5:20000000 r4:82ca8b40 [ 455.388675][ T5961] [<804e9074>] (should_failslab) from [<804cded0>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 455.389054][ T5961] [<804cde84>] (kmem_cache_alloc_noprof) from [<80525fc0>] (getname_flags.part.0+0x28/0x18c) [ 455.389539][ T5961] r10:000000e2 r9:843a0c00 r8:eb5e1e64 r7:00000001 r6:8223883c r5:20000000 [ 455.389929][ T5961] r4:20000000 [ 455.390088][ T5961] [<80525f98>] (getname_flags.part.0) from [<8052b07c>] (getname_flags+0x3c/0x50) [ 455.390421][ T5961] r9:843a0c00 r8:eb5e1e64 r7:00000000 r6:ffffff9c r5:00000001 r4:20000000 [ 455.390691][ T5961] [<8052b040>] (getname_flags) from [<8052b5e4>] (user_path_at+0x2c/0x64) [ 455.391077][ T5961] r5:00000001 r4:eb5e1e48 [ 455.391330][ T5961] [<8052b5b8>] (user_path_at) from [<8054d938>] (path_setxattr+0x8c/0x124) [ 455.391645][ T5961] r6:00000000 r5:20000000 r4:00000000 [ 455.391926][ T5961] [<8054d8ac>] (path_setxattr) from [<8054db34>] (sys_setxattr+0x24/0x2c) [ 455.392675][ T5961] r8:8020029c r7:000000e2 r6:00131400 r5:00000000 r4:00000000 [ 455.393018][ T5961] [<8054db10>] (sys_setxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 455.393747][ T5961] Exception stack(0xeb5e1fa8 to 0xeb5e1ff0) [ 455.394071][ T5961] 1fa0: 00000000 00000000 20000000 20000040 00000000 00000000 [ 455.394655][ T5961] 1fc0: 00000000 00000000 00131400 000000e2 00000000 00006364 003d0f00 76b880bc [ 455.395150][ T5961] 1fe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 462.006765][ T31] audit: type=1400 audit(461.920:224): avc: denied { listen } for pid=5991 comm="syz.1.681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 466.441852][ T31] audit: type=1400 audit(466.350:225): avc: denied { accept } for pid=6033 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 471.232124][ T31] audit: type=1400 audit(471.140:226): avc: denied { bind } for pid=6047 comm="syz.0.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 473.739572][ T31] audit: type=1400 audit(473.650:227): avc: denied { write } for pid=6064 comm="syz.1.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 477.721175][ T31] audit: type=1400 audit(477.630:228): avc: denied { setattr } for pid=6083 comm="syz.1.709" path="socket:[9558]" dev="sockfs" ino=9558 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 494.767857][ T31] audit: type=1400 audit(494.680:229): avc: denied { ioctl } for pid=6119 comm="syz.0.720" path="socket:[9615]" dev="sockfs" ino=9615 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 498.288870][ T31] audit: type=1400 audit(498.200:230): avc: denied { setopt } for pid=6139 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 498.901619][ T31] audit: type=1400 audit(498.810:231): avc: denied { accept } for pid=6134 comm="syz.0.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 506.421623][ T31] audit: type=1400 audit(506.330:232): avc: denied { setopt } for pid=6175 comm="syz.1.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 506.449085][ T31] audit: type=1400 audit(506.360:233): avc: denied { ioctl } for pid=6175 comm="syz.1.738" path="socket:[9707]" dev="sockfs" ino=9707 ioctlcmd=0x943a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 507.963787][ T31] audit: type=1400 audit(507.870:234): avc: denied { wake_alarm } for pid=6186 comm="syz.0.742" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 508.146272][ T31] audit: type=1400 audit(508.060:235): avc: denied { read } for pid=6188 comm="syz.0.743" name="dmmidi2" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:console_device_t:s0" [ 508.147722][ T31] audit: type=1400 audit(508.060:236): avc: denied { open } for pid=6188 comm="syz.0.743" path="/dev/dmmidi2" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:console_device_t:s0" [ 508.152011][ T6189] FAULT_INJECTION: forcing a failure. [ 508.152011][ T6189] name failslab, interval 1, probability 0, space 0, times 0 [ 508.156707][ T6189] CPU: 0 UID: 0 PID: 6189 Comm: syz.0.743 Not tainted 6.12.0-syzkaller #0 [ 508.157217][ T6189] Hardware name: ARM-Versatile Express [ 508.157658][ T6189] Call trace: [ 508.157899][ T6189] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 508.158432][ T6189] r7:00000c40 r6:8513d028 r5:60000013 r4:8203df48 [ 508.158762][ T6189] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 508.159257][ T6189] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 508.159646][ T6189] r5:00000000 r4:8271925c [ 508.159901][ T6189] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 508.160364][ T6189] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 508.160757][ T6189] r6:8513d028 r5:00001000 r4:82c016c0 [ 508.161053][ T6189] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 508.161570][ T6189] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 508.162063][ T6189] r10:00000000 r9:82c9e800 r8:00000000 r7:830277f8 r6:8513d028 r5:00001000 [ 508.163543][ T6189] r4:00000000 [ 508.163903][ T6189] [<80752284>] (tomoyo_realpath_from_path) from [<8074e6b4>] (tomoyo_check_open_permission+0x150/0x1c0) [ 508.164535][ T6189] r10:00000000 r9:00000004 r8:82caae80 r7:00000000 r6:00000000 r5:8513d028 [ 508.164974][ T6189] r4:00000001 r3:00000001 [ 508.165302][ T6189] [<8074e564>] (tomoyo_check_open_permission) from [<80753154>] (tomoyo_file_open+0x34/0x38) [ 508.165771][ T6189] r9:8513d000 r8:8513d028 r7:00000000 r6:8390a458 r5:81a1c9c4 r4:8513d000 [ 508.166219][ T6189] [<80753120>] (tomoyo_file_open) from [<80710e58>] (security_file_open+0xe8/0x344) [ 508.166864][ T6189] r5:81a1c9c4 r4:8513d000 [ 508.167111][ T6189] [<80710d70>] (security_file_open) from [<80511b5c>] (do_dentry_open+0xe4/0x4c0) [ 508.167566][ T6189] r4:8513d000 [ 508.167758][ T6189] [<80511a78>] (do_dentry_open) from [<80513a30>] (vfs_open+0x2c/0xec) [ 508.168248][ T6189] r9:8513d000 r8:ec7d5e58 r7:00000000 r6:8513d028 r5:8271f3f4 r4:8513d000 [ 508.170664][ T6189] [<80513a04>] (vfs_open) from [<8052c17c>] (path_openat+0x770/0x11a4) [ 508.171194][ T6189] r6:ec7d5f20 r5:8271f3f4 r4:00000000 [ 508.171494][ T6189] [<8052ba0c>] (path_openat) from [<8052cc4c>] (do_filp_open+0x9c/0x138) [ 508.172013][ T6189] r10:00000142 r9:83cbd400 r8:00000001 r7:ec7d5e58 r6:ec7d5f20 r5:83cbd400 [ 508.172550][ T6189] r4:83465000 [ 508.172714][ T6189] [<8052cbb0>] (do_filp_open) from [<80513edc>] (do_sys_openat2+0xbc/0xe4) [ 508.173252][ T6189] r8:8020029c r7:ffffff9c r6:00000007 r5:ec7d5f58 r4:83465000 [ 508.173698][ T6189] [<80513e20>] (do_sys_openat2) from [<805142e4>] (sys_openat+0x98/0xd4) [ 508.174135][ T6189] r7:00000142 r6:00000000 r5:76b87ab0 r4:ffffff9c [ 508.174409][ T6189] [<8051424c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 508.174862][ T6189] Exception stack(0xec7d5fa8 to 0xec7d5ff0) [ 508.175148][ T6189] 5fa0: 00000000 76b87ab0 ffffff9c 76b87ab0 00000000 00000000 [ 508.175598][ T6189] 5fc0: 00000000 76b87ab0 00000000 00000142 00000000 00006364 003d0f00 76b880bc [ 508.176072][ T6189] 5fe0: 81010101 76b87a68 000d8998 00131248 [ 508.176405][ T6189] r5:76b87ab0 r4:00000000 [ 508.179373][ T6189] ERROR: Out of memory at tomoyo_realpath_from_path. [ 508.900595][ T6194] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6194 comm=syz.1.745 [ 508.919352][ T6194] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6194 comm=syz.1.745 [ 513.301986][ T6221] FAULT_INJECTION: forcing a failure. [ 513.301986][ T6221] name failslab, interval 1, probability 0, space 0, times 0 [ 513.303874][ T6221] CPU: 1 UID: 0 PID: 6221 Comm: syz.1.753 Not tainted 6.12.0-syzkaller #0 [ 513.304109][ T6221] Hardware name: ARM-Versatile Express [ 513.304224][ T6221] Call trace: [ 513.304411][ T6221] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 513.304691][ T6221] r7:8403b000 r6:00000cc0 r5:60000013 r4:8203df48 [ 513.304882][ T6221] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 513.305203][ T6221] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 513.305421][ T6221] r5:00000000 r4:8271925c [ 513.305537][ T6221] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 513.305780][ T6221] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 513.306001][ T6221] r6:00000cc0 r5:82c9fc00 r4:82caca80 [ 513.306144][ T6221] [<804e9074>] (should_failslab) from [<804cdb9c>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 513.306486][ T6221] [<804cdb4c>] (kmem_cache_alloc_lru_noprof) from [<81486878>] (sock_alloc_inode+0x24/0x74) [ 513.306750][ T6221] r10:0000016e r9:85257d80 r8:00000000 r7:00000000 r6:81c4a980 r5:82c9fc00 [ 513.306941][ T6221] r4:8306c000 [ 513.307036][ T6221] [<81486854>] (sock_alloc_inode) from [<8053b40c>] (alloc_inode+0x24/0xcc) [ 513.307323][ T6221] r5:82c9fc00 r4:8306c000 [ 513.307527][ T6221] [<8053b3e8>] (alloc_inode) from [<8053d2e0>] (new_inode_pseudo+0x10/0x14) [ 513.307899][ T6221] r7:00000000 r6:00000000 r5:ece41f5c r4:8306c000 [ 513.308202][ T6221] [<8053d2d0>] (new_inode_pseudo) from [<81485dd8>] (sock_alloc+0x20/0x70) [ 513.308559][ T6221] [<81485db8>] (sock_alloc) from [<814891e8>] (do_accept+0x8c/0x174) [ 513.308907][ T6221] r5:ece41f5c r4:8306c000 [ 513.309138][ T6221] [<8148915c>] (do_accept) from [<8148935c>] (__sys_accept4+0x8c/0xf8) [ 513.309479][ T6221] r10:0000016e r9:85257d80 r8:00000000 r7:00000000 r6:00000800 r5:00000006 [ 513.309712][ T6221] r4:85257d81 [ 513.309809][ T6221] [<814892d0>] (__sys_accept4) from [<814893d8>] (sys_accept4+0x10/0x14) [ 513.310037][ T6221] r9:8403b000 r8:8020029c r7:0000016e r6:00131400 r5:00000000 r4:00000000 [ 513.310236][ T6221] [<814893c8>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 513.310460][ T6221] Exception stack(0xece41fa8 to 0xece41ff0) [ 513.310586][ T6221] 1fa0: 00000000 00000000 00000004 00000000 00000000 00000800 [ 513.310828][ T6221] 1fc0: 00000000 00000000 00131400 0000016e 00000000 00006364 003d0f00 76aea0bc [ 513.310996][ T6221] 1fe0: 76ae9ec0 76ae9eb0 00018af0 00133450 [ 525.842788][ T31] audit: type=1400 audit(525.750:237): avc: denied { write } for pid=6285 comm="syz.0.779" name="raw6" dev="proc" ino=4026532810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 533.337382][ T31] audit: type=1400 audit(533.250:238): avc: denied { execute } for pid=6314 comm="syz.1.790" path="/sys/kernel/debug/binder/state" dev="debugfs" ino=1342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file permissive=1 [ 538.215007][ T31] audit: type=1400 audit(538.130:239): avc: denied { create } for pid=6334 comm="syz.1.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 538.787099][ T6346] FAULT_INJECTION: forcing a failure. [ 538.787099][ T6346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.787557][ T6346] CPU: 1 UID: 0 PID: 6346 Comm: syz.1.802 Not tainted 6.12.0-syzkaller #0 [ 538.787803][ T6346] Hardware name: ARM-Versatile Express [ 538.787973][ T6346] Call trace: [ 538.788115][ T6346] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 538.788421][ T6346] r7:841b1680 r6:00000000 r5:60000013 r4:8203df48 [ 538.788576][ T6346] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 538.788885][ T6346] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 538.789159][ T6346] r5:00000000 r4:8274e844 [ 538.789387][ T6346] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 538.789733][ T6346] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 538.790005][ T6346] r6:00000000 r5:ed489f48 r4:00000014 [ 538.790183][ T6346] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 538.790436][ T6346] [<808e6b5c>] (should_fail_usercopy) from [<80838be0>] (_copy_from_iter+0x68/0x7c8) [ 538.790758][ T6346] [<80838b78>] (_copy_from_iter) from [<815aa788>] (netlink_sendmsg+0x19c/0x43c) [ 538.791009][ T6346] r10:00000000 r9:00000000 r8:ed489f48 r7:84f3d800 r6:00000014 r5:84200540 [ 538.791226][ T6346] r4:ed489f38 [ 538.791333][ T6346] [<815aa5ec>] (netlink_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 538.791575][ T6346] r10:00000000 r9:ed489dd4 r8:ed489dd4 r7:8306db80 r6:8306db80 r5:ed489f38 [ 538.791782][ T6346] r4:00000000 [ 538.791915][ T6346] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 538.792168][ T6346] r7:8306db80 r6:00000000 r5:00000850 r4:ed489f38 [ 538.792514][ T6346] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 538.793028][ T6346] r10:ed489e34 r9:20000680 r8:00000850 r7:00000000 r6:8306db80 r5:ed489f38 [ 538.793311][ T6346] r4:00000000 [ 538.793434][ T6346] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 538.793778][ T6346] r10:00000128 r9:83cb8000 r8:8020029c r7:00000850 r6:20000680 r5:8306db80 [ 538.794289][ T6346] r4:00000000 [ 538.794495][ T6346] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 538.794839][ T6346] Exception stack(0xed489fa8 to 0xed489ff0) [ 538.795178][ T6346] 9fa0: 00000000 00000000 00000005 20000680 00000850 00000000 [ 538.795880][ T6346] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b4d0bc [ 538.796384][ T6346] 9fe0: 76b4cec0 76b4ceb0 00018af0 00133450 [ 538.796639][ T6346] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 543.267862][ T6369] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6369 comm=syz.0.811 [ 543.300592][ T6369] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6369 comm=syz.0.811 [ 545.057921][ T6380] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6380 comm=syz.1.816 [ 545.081792][ T6380] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6380 comm=syz.1.816 [ 546.902091][ T6391] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6391 comm=syz.0.821 [ 546.916929][ T6391] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6391 comm=syz.0.821 [ 550.286215][ T6405] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6405 comm=syz.0.826 [ 550.298934][ T6405] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6405 comm=syz.0.826 [ 553.046080][ T6417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6417 comm=syz.0.831 [ 553.057387][ T6417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6417 comm=syz.0.831 [ 556.364207][ T6426] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6426 comm=syz.0.834 [ 556.364196][ T31] audit: type=1400 audit(556.270:240): avc: denied { write } for pid=6425 comm="syz.0.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 556.653109][ T6431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6431 comm=syz.1.836 [ 556.661300][ T6431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6431 comm=syz.1.836 [ 558.568972][ T6442] FAULT_INJECTION: forcing a failure. [ 558.568972][ T6442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.569599][ T6442] CPU: 1 UID: 0 PID: 6442 Comm: syz.0.839 Not tainted 6.12.0-syzkaller #0 [ 558.569953][ T6442] Hardware name: ARM-Versatile Express [ 558.570180][ T6442] Call trace: [ 558.570380][ T6442] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 558.570747][ T6442] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 558.571002][ T6442] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 558.571337][ T6442] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 558.571672][ T6442] r5:00000000 r4:8274e844 [ 558.571881][ T6442] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 558.572232][ T6442] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 558.572965][ T6442] r6:00000000 r5:ed9c1f68 r4:00000002 [ 558.573263][ T6442] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 558.573951][ T6442] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 558.574751][ T6442] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 558.575691][ T6442] r10:00000001 r9:805c43b8 r8:00000002 r7:ed9c1f68 r6:0000000f r5:76b87f30 [ 558.576100][ T6442] r4:843a5400 r3:ed9c1e9f [ 558.576324][ T6442] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 558.576742][ T6442] r8:76b87f30 r7:ed9c1f68 r6:843a5400 r5:0000000f r4:85151540 [ 558.577060][ T6442] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 558.577426][ T6442] r10:00000003 r9:843a5400 r8:8020029c r7:00000000 r6:00000000 r5:85151540 [ 558.577822][ T6442] r4:85151543 [ 558.577994][ T6442] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 558.578368][ T6442] r7:00000003 r6:00000005 r5:76b87f30 r4:0000000f [ 558.578683][ T6442] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 558.579048][ T6442] Exception stack(0xed9c1fa8 to 0xed9c1ff0) [ 558.579316][ T6442] 1fa0: 0000000f 76b87f30 00000005 76b87f30 0000000f 00000000 [ 558.579727][ T6442] 1fc0: 0000000f 76b87f30 00000005 00000003 00000000 00006364 003d0f00 76b880bc [ 558.580093][ T6442] 1fe0: 00000158 76b87ed0 000d8998 00131324 [ 558.791690][ T6447] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6447 comm=syz.0.841 [ 558.800305][ T6447] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6447 comm=syz.0.841 [ 569.911687][ T31] audit: type=1400 audit(569.820:241): avc: denied { ioctl } for pid=6501 comm="syz.0.860" path="uts:[4026532658]" dev="nsfs" ino=4026532658 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 579.392116][ T31] audit: type=1400 audit(579.300:242): avc: denied { read } for pid=6543 comm="syz.1.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 580.101075][ T31] audit: type=1400 audit(580.000:243): avc: denied { execute } for pid=6549 comm="syz.0.878" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 586.328602][ T6609] FAULT_INJECTION: forcing a failure. [ 586.328602][ T6609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 586.329303][ T6609] CPU: 1 UID: 0 PID: 6609 Comm: syz.1.891 Not tainted 6.12.0-syzkaller #0 [ 586.329638][ T6609] Hardware name: ARM-Versatile Express [ 586.329985][ T6609] Call trace: [ 586.330217][ T6609] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 586.330626][ T6609] r7:ee2e1e30 r6:200000c0 r5:60000013 r4:8203df48 [ 586.330887][ T6609] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 586.331258][ T6609] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 586.331619][ T6609] r5:00000000 r4:8274e844 [ 586.331819][ T6609] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 586.332201][ T6609] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 586.332950][ T6609] r6:200000c0 r5:00000000 r4:ee2e1f38 [ 586.333183][ T6609] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 586.333423][ T6609] [<808e6b5c>] (should_fail_usercopy) from [<81489ff0>] (copy_msghdr_from_user+0x50/0x130) [ 586.333655][ T6609] [<81489fa0>] (copy_msghdr_from_user) from [<8148a148>] (___sys_sendmsg+0x78/0xd0) [ 586.334007][ T6609] r8:00001000 r7:00000000 r6:83338c80 r5:ee2e1f38 r4:ee2e1e74 [ 586.334240][ T6609] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 586.334520][ T6609] r10:00000128 r9:843a1800 r8:8020029c r7:00001000 r6:200000c0 r5:83338c80 [ 586.334712][ T6609] r4:00000000 [ 586.334876][ T6609] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 586.335227][ T6609] Exception stack(0xee2e1fa8 to 0xee2e1ff0) [ 586.335498][ T6609] 1fa0: 00000000 00000000 00000004 200000c0 00001000 00000000 [ 586.335860][ T6609] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76aea0bc [ 586.336141][ T6609] 1fe0: 76ae9ec0 76ae9eb0 00018af0 00133450 [ 586.336298][ T6609] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 589.011014][ T31] audit: type=1400 audit(588.920:244): avc: denied { write } for pid=6617 comm="syz.0.901" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 593.434733][ T31] audit: type=1400 audit(593.340:245): avc: denied { write } for pid=6640 comm="syz.1.909" path="socket:[11508]" dev="sockfs" ino=11508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 593.526605][ T6644] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6644 comm=syz.1.910 [ 596.813139][ T6660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6660 comm=syz.1.915 [ 596.978536][ T31] audit: type=1400 audit(596.890:246): avc: denied { accept } for pid=6661 comm="syz.1.916" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 609.218379][ T31] audit: type=1400 audit(609.130:247): avc: denied { bind } for pid=6733 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 609.219155][ T31] audit: type=1400 audit(609.130:248): avc: denied { name_bind } for pid=6733 comm="syz.0.934" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 609.219682][ T31] audit: type=1400 audit(609.130:249): avc: denied { node_bind } for pid=6733 comm="syz.0.934" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 609.379028][ T31] audit: type=1400 audit(609.290:250): avc: denied { bind } for pid=6740 comm="syz.0.936" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 609.382185][ T31] audit: type=1400 audit(609.290:251): avc: denied { node_bind } for pid=6740 comm="syz.0.936" saddr=::20:0:400:ff00:0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 609.396729][ T31] audit: type=1400 audit(609.310:252): avc: denied { read } for pid=6740 comm="syz.0.936" path="socket:[10786]" dev="sockfs" ino=10786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 610.353949][ T31] audit: type=1400 audit(610.270:253): avc: denied { sqpoll } for pid=6757 comm="syz.1.944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 618.371411][ T31] audit: type=1400 audit(618.280:254): avc: denied { name_connect } for pid=6794 comm="syz.1.954" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 619.447766][ T31] audit: type=1400 audit(619.360:255): avc: denied { map } for pid=6806 comm="syz.0.957" path="socket:[10894]" dev="sockfs" ino=10894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 621.582083][ T6816] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=6816 comm=syz.1.960 [ 631.405891][ T6861] FAULT_INJECTION: forcing a failure. [ 631.405891][ T6861] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 631.406601][ T6861] CPU: 0 UID: 0 PID: 6861 Comm: syz.0.977 Not tainted 6.12.0-syzkaller #0 [ 631.407091][ T6861] Hardware name: ARM-Versatile Express [ 631.407231][ T6861] Call trace: [ 631.407350][ T6861] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 631.407599][ T6861] r7:82e6a000 r6:00000000 r5:60000013 r4:8203df48 [ 631.407825][ T6861] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 631.408059][ T6861] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 631.408372][ T6861] r5:00000000 r4:8274e844 [ 631.408529][ T6861] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 631.408761][ T6861] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 631.408986][ T6861] r6:00000000 r5:dfb61e78 r4:00000005 [ 631.409187][ T6861] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 631.409459][ T6861] [<808e6b5c>] (should_fail_usercopy) from [<80838be0>] (_copy_from_iter+0x68/0x7c8) [ 631.409743][ T6861] [<80838b78>] (_copy_from_iter) from [<815aa788>] (netlink_sendmsg+0x19c/0x43c) [ 631.409986][ T6861] r10:00000000 r9:00000000 r8:dfb61e78 r7:84f42000 r6:00000005 r5:841cbf00 [ 631.410328][ T6861] r4:dfb61e68 [ 631.410426][ T6861] [<815aa5ec>] (netlink_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 631.410667][ T6861] r10:81c4a780 r9:20000000 r8:00000000 r7:8319ea00 r6:8319ea00 r5:dfb61e68 [ 631.410926][ T6861] r4:00000000 [ 631.411022][ T6861] [<814871c0>] (__sock_sendmsg) from [<814872d8>] (sock_write_iter+0xa0/0xfc) [ 631.411259][ T6861] r7:8319ea00 r6:852579c0 r5:dfb61f08 r4:dfb61ef0 [ 631.411473][ T6861] [<81487238>] (sock_write_iter) from [<805179e0>] (vfs_write+0x3a8/0x44c) [ 631.411800][ T6861] r7:8403b000 r6:00000005 r5:852579c0 r4:00000000 [ 631.411896][ T6861] [<80517638>] (vfs_write) from [<80517c54>] (ksys_write+0xc4/0xf8) [ 631.412046][ T6861] r10:00000004 r9:8403b000 r8:8020029c r7:00000005 r6:20000000 r5:852579c0 [ 631.412246][ T6861] r4:852579c1 [ 631.412324][ T6861] [<80517b90>] (ksys_write) from [<80517c98>] (sys_write+0x10/0x14) [ 631.412961][ T6861] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 631.413304][ T6861] [<80517c88>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 631.413739][ T6861] Exception stack(0xdfb61fa8 to 0xdfb61ff0) [ 631.414311][ T6861] 1fa0: 00000000 00000000 00000003 20000000 00000005 00000000 [ 631.414680][ T6861] 1fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b880bc [ 631.414942][ T6861] 1fe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 631.574694][ T6865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6865 comm=syz.1.979 [ 631.577279][ T31] audit: type=1400 audit(631.490:256): avc: granted { setsecparam } for pid=6864 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 632.722073][ T6878] FAULT_INJECTION: forcing a failure. [ 632.722073][ T6878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 632.723907][ T6878] CPU: 1 UID: 0 PID: 6878 Comm: syz.1.981 Not tainted 6.12.0-syzkaller #0 [ 632.724343][ T6878] Hardware name: ARM-Versatile Express [ 632.724611][ T6878] Call trace: [ 632.724861][ T6878] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 632.725345][ T6878] r7:dff1de30 r6:200000c0 r5:60000013 r4:8203df48 [ 632.725634][ T6878] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 632.726113][ T6878] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 632.726532][ T6878] r5:00000000 r4:8274e844 [ 632.726795][ T6878] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 632.727724][ T6878] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 632.728334][ T6878] r6:200000c0 r5:00000000 r4:dff1df38 [ 632.728631][ T6878] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 632.729120][ T6878] [<808e6b5c>] (should_fail_usercopy) from [<81489ff0>] (copy_msghdr_from_user+0x50/0x130) [ 632.729634][ T6878] [<81489fa0>] (copy_msghdr_from_user) from [<8148a148>] (___sys_sendmsg+0x78/0xd0) [ 632.730148][ T6878] r8:00000000 r7:00000000 r6:83375180 r5:dff1df38 r4:dff1de74 [ 632.731101][ T6878] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 632.731840][ T6878] r10:00000128 r9:8350b000 r8:8020029c r7:00000000 r6:200000c0 r5:83375180 [ 632.732550][ T6878] r4:00000000 [ 632.732742][ T6878] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 632.733136][ T6878] Exception stack(0xdff1dfa8 to 0xdff1dff0) [ 632.733436][ T6878] dfa0: 00000000 00000000 00000004 200000c0 00000000 00000000 [ 632.734313][ T6878] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b0b0bc [ 632.734882][ T6878] dfe0: 76b0aec0 76b0aeb0 00018af0 00133450 [ 632.735194][ T6878] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 638.128707][ T6925] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6925 comm=syz.0.1001 [ 638.218646][ T31] audit: type=1400 audit(638.130:257): avc: denied { setopt } for pid=6926 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 638.221905][ T31] audit: type=1400 audit(638.130:258): avc: denied { write } for pid=6926 comm="syz.1.1003" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 638.246026][ T31] audit: type=1400 audit(638.150:259): avc: denied { getopt } for pid=6926 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 638.247573][ T31] audit: type=1400 audit(638.160:260): avc: denied { accept } for pid=6926 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 641.005281][ T31] audit: type=1400 audit(640.920:261): avc: denied { getopt } for pid=6946 comm="syz.1.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 641.008952][ T31] audit: type=1400 audit(640.920:262): avc: denied { ioctl } for pid=6946 comm="syz.1.1009" path="socket:[11860]" dev="sockfs" ino=11860 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 642.111840][ T6973] input: syz0 as /devices/virtual/input/input4 [ 643.738656][ T7001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7001 comm=syz.0.1026 [ 647.265116][ T7027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7027 comm=syz.0.1034 [ 647.399536][ T7029] FAULT_INJECTION: forcing a failure. [ 647.399536][ T7029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 647.403258][ T7029] CPU: 0 UID: 0 PID: 7029 Comm: syz.0.1035 Not tainted 6.12.0-syzkaller #0 [ 647.403646][ T7029] Hardware name: ARM-Versatile Express [ 647.403864][ T7029] Call trace: [ 647.404066][ T7029] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 647.404398][ T7029] r7:82e6b8c0 r6:00000000 r5:60000013 r4:8203df48 [ 647.404612][ T7029] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 647.404920][ T7029] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 647.405209][ T7029] r5:00000000 r4:8274e844 [ 647.405366][ T7029] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 647.405659][ T7029] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 647.405985][ T7029] r6:00000000 r5:e86d1e78 r4:00000009 [ 647.406185][ T7029] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 647.406481][ T7029] [<808e6b5c>] (should_fail_usercopy) from [<80838be0>] (_copy_from_iter+0x68/0x7c8) [ 647.406772][ T7029] [<80838b78>] (_copy_from_iter) from [<815aa788>] (netlink_sendmsg+0x19c/0x43c) [ 647.407102][ T7029] r10:00000000 r9:00000000 r8:e86d1e78 r7:84f43c00 r6:00000009 r5:8431d0c0 [ 647.407346][ T7029] r4:e86d1e68 [ 647.407454][ T7029] [<815aa5ec>] (netlink_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 647.407710][ T7029] r10:81c4a780 r9:20000440 r8:00000000 r7:8335a500 r6:8335a500 r5:e86d1e68 [ 647.408009][ T7029] r4:00000000 [ 647.408117][ T7029] [<814871c0>] (__sock_sendmsg) from [<814872d8>] (sock_write_iter+0xa0/0xfc) [ 647.408360][ T7029] r7:8335a500 r6:84138a80 r5:e86d1f08 r4:e86d1ef0 [ 647.408530][ T7029] [<81487238>] (sock_write_iter) from [<805179e0>] (vfs_write+0x3a8/0x44c) [ 647.408776][ T7029] r7:843a6c00 r6:00000009 r5:84138a80 r4:00000000 [ 647.409085][ T7029] [<80517638>] (vfs_write) from [<80517c54>] (ksys_write+0xc4/0xf8) [ 647.409653][ T7029] r10:00000004 r9:843a6c00 r8:8020029c r7:00000009 r6:20000440 r5:84138a80 [ 647.410155][ T7029] r4:84138a81 [ 647.410279][ T7029] [<80517b90>] (ksys_write) from [<80517c98>] (sys_write+0x10/0x14) [ 647.410564][ T7029] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 647.410775][ T7029] [<80517c88>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 647.411105][ T7029] Exception stack(0xe86d1fa8 to 0xe86d1ff0) [ 647.411302][ T7029] 1fa0: 00000000 00000000 00000003 20000440 00000009 00000000 [ 647.411549][ T7029] 1fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76b880bc [ 647.411727][ T7029] 1fe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 651.085995][ T7046] syz_tun: refused to change device tx_queue_len [ 654.044643][ T7059] serio: Serial port pts0 [ 654.437980][ T7064] FAULT_INJECTION: forcing a failure. [ 654.437980][ T7064] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 654.438698][ T7064] CPU: 0 UID: 0 PID: 7064 Comm: syz.0.1045 Not tainted 6.12.0-syzkaller #0 [ 654.439085][ T7064] Hardware name: ARM-Versatile Express [ 654.439347][ T7064] Call trace: [ 654.439566][ T7064] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 654.440010][ T7064] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 654.440301][ T7064] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 654.440696][ T7064] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 654.441089][ T7064] r5:00000000 r4:8274e844 [ 654.441309][ T7064] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 654.441728][ T7064] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 654.442105][ T7064] r6:00000000 r5:e86d1f68 r4:00000002 [ 654.442633][ T7064] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 654.443354][ T7064] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 654.443898][ T7064] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 654.444371][ T7064] r10:00000001 r9:805c43b8 r8:00000002 r7:e86d1f68 r6:0000000f r5:76b87f30 [ 654.444748][ T7064] r4:82e58000 r3:e86d1e9f [ 654.444988][ T7064] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 654.445403][ T7064] r8:76b87f30 r7:e86d1f68 r6:82e58000 r5:0000000f r4:84138b40 [ 654.445834][ T7064] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 654.446224][ T7064] r10:00000003 r9:82e58000 r8:8020029c r7:00000000 r6:00000000 r5:84138b40 [ 654.446589][ T7064] r4:84138b43 [ 654.446782][ T7064] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 654.447178][ T7064] r7:00000003 r6:00000004 r5:76b87f30 r4:0000000f [ 654.447483][ T7064] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 654.447904][ T7064] Exception stack(0xe86d1fa8 to 0xe86d1ff0) [ 654.448206][ T7064] 1fa0: 0000000f 76b87f30 00000004 76b87f30 0000000f 00000000 [ 654.448602][ T7064] 1fc0: 0000000f 76b87f30 00000004 00000003 00000000 00006364 003d0f00 76b880bc [ 654.449005][ T7064] 1fe0: 00000158 76b87ed0 000d8998 00131324 [ 654.598485][ T7067] FAULT_INJECTION: forcing a failure. [ 654.598485][ T7067] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 654.599215][ T7067] CPU: 1 UID: 0 PID: 7067 Comm: syz.0.1046 Not tainted 6.12.0-syzkaller #0 [ 654.599605][ T7067] Hardware name: ARM-Versatile Express [ 654.599878][ T7067] Call trace: [ 654.600100][ T7067] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 654.600531][ T7067] r7:eae89e30 r6:20000200 r5:60000013 r4:8203df48 [ 654.600803][ T7067] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 654.601179][ T7067] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 654.601574][ T7067] r5:00000000 r4:8274e844 [ 654.601838][ T7067] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 654.602732][ T7067] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 654.603328][ T7067] r6:20000200 r5:00000000 r4:eae89f38 [ 654.603650][ T7067] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 654.604267][ T7067] [<808e6b5c>] (should_fail_usercopy) from [<81489ff0>] (copy_msghdr_from_user+0x50/0x130) [ 654.604691][ T7067] [<81489fa0>] (copy_msghdr_from_user) from [<8148a148>] (___sys_sendmsg+0x78/0xd0) [ 654.605155][ T7067] r8:00000080 r7:00000000 r6:83374f00 r5:eae89f38 r4:eae89e74 [ 654.605497][ T7067] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 654.605968][ T7067] r10:00000128 r9:83472400 r8:8020029c r7:00000080 r6:20000200 r5:83374f00 [ 654.606323][ T7067] r4:00000000 [ 654.606503][ T7067] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 654.606928][ T7067] Exception stack(0xeae89fa8 to 0xeae89ff0) [ 654.607341][ T7067] 9fa0: 00000000 00000000 00000003 20000200 00000080 00000000 [ 654.608103][ T7067] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b880bc [ 654.608654][ T7067] 9fe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 654.608977][ T7067] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 656.313422][ T24] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 656.473339][ T24] usb 2-1: Using ep0 maxpacket: 32 [ 656.503425][ T24] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 656.505548][ T24] usb 2-1: config 0 has no interfaces? [ 656.507408][ T24] usb 2-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 656.509018][ T24] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 656.549061][ T24] usb 2-1: config 0 descriptor?? [ 662.436672][ T31] audit: type=1400 audit(662.350:263): avc: denied { getopt } for pid=7103 comm="syz.0.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 662.471749][ T31] audit: type=1400 audit(662.380:264): avc: denied { ioctl } for pid=7103 comm="syz.0.1052" path="socket:[12347]" dev="sockfs" ino=12347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 662.729284][ T31] audit: type=1400 audit(662.640:265): avc: denied { nlmsg_write } for pid=7103 comm="syz.0.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 662.731183][ T31] audit: type=1400 audit(662.640:266): avc: denied { read } for pid=7103 comm="syz.0.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 668.749344][ T48] usb 2-1: USB disconnect, device number 15 [ 696.963250][ T7287] FAULT_INJECTION: forcing a failure. [ 696.963250][ T7287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 696.964195][ T7287] CPU: 0 UID: 0 PID: 7287 Comm: syz.0.1104 Not tainted 6.12.0-syzkaller #0 [ 696.964466][ T7287] Hardware name: ARM-Versatile Express [ 696.964671][ T7287] Call trace: [ 696.964859][ T7287] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 696.965181][ T7287] r7:eb67dde4 r6:00000004 r5:60000013 r4:8203df48 [ 696.965394][ T7287] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 696.965673][ T7287] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 696.965995][ T7287] r5:00000000 r4:8274e844 [ 696.966167][ T7287] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 696.966453][ T7287] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 696.966733][ T7287] r6:00000004 r5:20000200 r4:00000004 [ 696.966929][ T7287] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 696.967221][ T7287] [<808e6b5c>] (should_fail_usercopy) from [<81670dd8>] (copy_from_sockptr_offset+0x64/0x114) [ 696.967539][ T7287] [<81670d74>] (copy_from_sockptr_offset) from [<81677f28>] (do_tcp_setsockopt+0x88/0xc3c) [ 696.967869][ T7287] r8:84d20000 r7:00000004 r6:00000008 r5:84038c00 r4:848e26c0 [ 696.968111][ T7287] [<81677ea4>] (do_tcp_setsockopt) from [<81678b2c>] (tcp_setsockopt+0x50/0x58) [ 696.968409][ T7287] r10:00000126 r9:8148b058 r8:00000004 r7:850cfec8 r6:00000006 r5:850cfa80 [ 696.968662][ T7287] r4:81678adc [ 696.968825][ T7287] [<81678ae0>] (tcp_setsockopt) from [<8148b090>] (sock_common_setsockopt+0x38/0x40) [ 696.969139][ T7287] r4:81678adc [ 696.969275][ T7287] [<8148b05c>] (sock_common_setsockopt) from [<818a60f8>] (smc_setsockopt+0xac/0x3cc) [ 696.969580][ T7287] r4:00000008 [ 696.969771][ T7287] [<818a6050>] (smc_setsockopt) from [<814866f0>] (do_sock_setsockopt+0xb0/0x17c) [ 696.970085][ T7287] r9:84038c00 r8:8020029c r7:00000000 r6:8335a780 r5:00000000 r4:818a604c [ 696.970343][ T7287] [<81486640>] (do_sock_setsockopt) from [<81489bb0>] (sys_setsockopt+0x78/0xbc) [ 696.970642][ T7287] r6:8335a780 r5:00000008 r4:00000006 [ 696.970839][ T7287] [<81489b38>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 696.971122][ T7287] Exception stack(0xeb67dfa8 to 0xeb67dff0) [ 696.971419][ T7287] dfa0: 00000004 00000000 00000004 00000006 00000008 20000200 [ 696.971729][ T7287] dfc0: 00000004 00000000 00131400 00000126 00000000 00006364 003d0f00 76b880bc [ 696.972483][ T7287] dfe0: 76b87ec0 76b87eb0 00018af0 00133450 [ 696.972750][ T7287] r7:00000126 r6:00131400 r5:00000000 r4:00000004 [ 697.433480][ T48] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 697.583272][ T48] usb 1-1: Invalid ep0 maxpacket: 32 [ 697.713313][ T48] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 697.873181][ T48] usb 1-1: Invalid ep0 maxpacket: 32 [ 697.874315][ T48] usb usb1-port1: attempt power cycle [ 698.218375][ T48] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 698.236674][ T48] usb 1-1: Invalid ep0 maxpacket: 32 [ 698.364096][ T48] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 698.384544][ T48] usb 1-1: Invalid ep0 maxpacket: 32 [ 698.385405][ T48] usb usb1-port1: unable to enumerate USB device [ 714.956044][ T7363] FAULT_INJECTION: forcing a failure. [ 714.956044][ T7363] name failslab, interval 1, probability 0, space 0, times 0 [ 714.956752][ T7363] CPU: 1 UID: 0 PID: 7363 Comm: syz.1.1127 Not tainted 6.12.0-syzkaller #0 [ 714.957095][ T7363] Hardware name: ARM-Versatile Express [ 714.957302][ T7363] Call trace: [ 714.957488][ T7363] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 714.957947][ T7363] r7:82e45400 r6:00000dc0 r5:60000013 r4:8203df48 [ 714.958187][ T7363] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 714.958530][ T7363] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 714.958899][ T7363] r5:00000000 r4:8271925c [ 714.959084][ T7363] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 714.959444][ T7363] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 714.959822][ T7363] r6:00000dc0 r5:ec299f38 r4:82c01240 [ 714.960052][ T7363] [<804e9074>] (should_failslab) from [<804cd27c>] (__kmalloc_cache_noprof+0x4c/0x344) [ 714.960414][ T7363] [<804cd230>] (__kmalloc_cache_noprof) from [<81673d48>] (tcp_sendmsg_fastopen+0x94/0x188) [ 714.960818][ T7363] r10:00000000 r9:ec299f38 r8:00000000 r7:ec299cdc r6:00000000 r5:ec299f38 [ 714.961131][ T7363] r4:848e5540 [ 714.961354][ T7363] [<81673cb4>] (tcp_sendmsg_fastopen) from [<81674704>] (tcp_sendmsg_locked+0x8c8/0xd34) [ 714.961764][ T7363] r8:848e5540 r7:20000010 r6:00000000 r5:ec299f38 r4:00000000 [ 714.962036][ T7363] [<81673e3c>] (tcp_sendmsg_locked) from [<81674ba0>] (tcp_sendmsg+0x30/0x44) [ 714.962586][ T7363] r10:00000000 r9:ec299dd4 r8:ec299dd4 r7:00000000 r6:00000000 r5:ec299f38 [ 714.963254][ T7363] r4:848e5540 [ 714.963459][ T7363] [<81674b70>] (tcp_sendmsg) from [<816b9138>] (inet_sendmsg+0x40/0x4c) [ 714.964087][ T7363] r7:00000000 r6:848e5540 r5:00000000 r4:ec299f38 [ 714.964356][ T7363] [<816b90f8>] (inet_sendmsg) from [<818a5b9c>] (smc_sendmsg+0x84/0x278) [ 714.964727][ T7363] r7:00000000 r6:ec299f38 r5:00000000 r4:850cf600 [ 714.965007][ T7363] [<818a5b18>] (smc_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 714.965386][ T7363] r9:ec299dd4 r8:ec299dd4 r7:8335bb80 r6:8335bb80 r5:ec299f38 r4:00000000 [ 714.965952][ T7363] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 714.966451][ T7363] r7:8335bb80 r6:00000000 r5:20000010 r4:ec299f38 [ 714.966675][ T7363] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 714.967019][ T7363] r10:ec299e34 r9:200000c0 r8:20000010 r7:00000000 r6:8335bb80 r5:ec299f38 [ 714.967303][ T7363] r4:00000000 [ 714.967476][ T7363] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 714.967861][ T7363] r10:00000128 r9:82e45400 r8:8020029c r7:20000010 r6:200000c0 r5:8335bb80 [ 714.968191][ T7363] r4:00000000 [ 714.968366][ T7363] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 714.968719][ T7363] Exception stack(0xec299fa8 to 0xec299ff0) [ 714.968995][ T7363] 9fa0: 00000000 00000000 00000004 200000c0 20000010 00000000 [ 714.969344][ T7363] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76aea0bc [ 714.969730][ T7363] 9fe0: 76ae9ec0 76ae9eb0 00018af0 00133450 [ 714.970001][ T7363] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 715.151076][ T7372] FAULT_INJECTION: forcing a failure. [ 715.151076][ T7372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.151657][ T7372] CPU: 1 UID: 0 PID: 7372 Comm: syz.1.1130 Not tainted 6.12.0-syzkaller #0 [ 715.152002][ T7372] Hardware name: ARM-Versatile Express [ 715.152169][ T7372] Call trace: [ 715.152367][ T7372] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 715.153127][ T7372] r7:ec24de50 r6:00000008 r5:60000013 r4:8203df48 [ 715.153386][ T7372] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 715.153769][ T7372] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 715.154115][ T7372] r5:00000000 r4:8274e844 [ 715.154283][ T7372] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 715.154622][ T7372] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 715.154968][ T7372] r6:00000008 r5:200007b8 r4:00000008 [ 715.155181][ T7372] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 715.155540][ T7372] [<808e6b5c>] (should_fail_usercopy) from [<81670dd8>] (copy_from_sockptr_offset+0x64/0x114) [ 715.155940][ T7372] [<81670d74>] (copy_from_sockptr_offset) from [<81678790>] (do_tcp_setsockopt+0x8f0/0xc3c) [ 715.156362][ T7372] r8:848c5aa4 r7:08cbd750 r6:ec24de48 r5:00000000 r4:848c5540 [ 715.156648][ T7372] [<81677ea4>] (do_tcp_setsockopt) from [<81678b2c>] (tcp_setsockopt+0x50/0x58) [ 715.157023][ T7372] r10:00000126 r9:8403c800 r8:8020029c r7:00000000 r6:83374a00 r5:00000000 [ 715.157338][ T7372] r4:81678adc [ 715.157484][ T7372] [<81678ae0>] (tcp_setsockopt) from [<8148b090>] (sock_common_setsockopt+0x38/0x40) [ 715.157925][ T7372] r4:81678adc [ 715.158229][ T7372] [<8148b05c>] (sock_common_setsockopt) from [<814866f0>] (do_sock_setsockopt+0xb0/0x17c) [ 715.159488][ T7372] r4:8148b058 [ 715.159765][ T7372] [<81486640>] (do_sock_setsockopt) from [<81489bb0>] (sys_setsockopt+0x78/0xbc) [ 715.160429][ T7372] r6:83374a00 r5:00000016 r4:00000006 [ 715.160775][ T7372] [<81489b38>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 715.161152][ T7372] Exception stack(0xec24dfa8 to 0xec24dff0) [ 715.161403][ T7372] dfa0: 08cbd752 00000000 00000003 00000006 00000016 20000600 [ 715.161805][ T7372] dfc0: 08cbd752 00000000 00131400 00000126 00000000 00006364 003d0f00 76b4d0bc [ 715.162184][ T7372] dfe0: 76b4cec0 76b4ceb0 00018af0 00133450 [ 715.162508][ T7372] r7:00000126 r6:00131400 r5:00000000 r4:08cbd752 [ 715.388542][ T7376] FAULT_INJECTION: forcing a failure. [ 715.388542][ T7376] name failslab, interval 1, probability 0, space 0, times 0 [ 715.389151][ T7376] CPU: 1 UID: 0 PID: 7376 Comm: syz.1.1132 Not tainted 6.12.0-syzkaller #0 [ 715.389447][ T7376] Hardware name: ARM-Versatile Express [ 715.389654][ T7376] Call trace: [ 715.389863][ T7376] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 715.390218][ T7376] r7:00000dc0 r6:82cd0500 r5:60000013 r4:8203df48 [ 715.390421][ T7376] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 715.390710][ T7376] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 715.390973][ T7376] r5:00000000 r4:8271925c [ 715.391130][ T7376] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 715.391406][ T7376] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 715.391680][ T7376] r6:82cd0500 r5:00000027 r4:82c01240 [ 715.391851][ T7376] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 715.392151][ T7376] [<804ce1b8>] (__kmalloc_noprof) from [<81976f10>] (kobject_get_path+0x74/0x134) [ 715.392569][ T7376] r10:822073c4 r9:81b4cb60 r8:83ce46f0 r7:0000002f r6:82cd0500 r5:00000027 [ 715.392842][ T7376] r4:00000000 [ 715.393001][ T7376] [<81976e9c>] (kobject_get_path) from [<81978778>] (kobject_uevent_env+0xe0/0x870) [ 715.393349][ T7376] r10:822073c4 r9:81b4cb60 r8:84faf000 r7:00000000 r6:82cd0500 r5:00000006 [ 715.393632][ T7376] r4:83ce46f0 [ 715.393824][ T7376] [<81978698>] (kobject_uevent_env) from [<81978f1c>] (kobject_uevent+0x14/0x18) [ 715.394185][ T7376] r10:8403d400 r9:85569c00 r8:855873b8 r7:00000000 r6:848bf030 r5:00000000 [ 715.394484][ T7376] r4:83ce46f0 [ 715.394657][ T7376] [<81978f08>] (kobject_uevent) from [<80aadc5c>] (driver_bound+0x94/0xe4) [ 715.394998][ T7376] [<80aadbc8>] (driver_bound) from [<80aade64>] (really_probe+0x174/0x3ac) [ 715.395347][ T7376] r4:83ce46f0 [ 715.395515][ T7376] [<80aadcf0>] (really_probe) from [<80aae130>] (__driver_probe_device+0x94/0x1dc) [ 715.395882][ T7376] r7:0000001b r6:83ce46f0 r5:848bf030 r4:83ce46f0 [ 715.396138][ T7376] [<80aae09c>] (__driver_probe_device) from [<80aae350>] (driver_probe_device+0x38/0xc8) [ 715.396595][ T7376] r8:855873b8 r7:0000001b r6:83ce46f0 r5:848bf030 r4:8290d958 [ 715.396866][ T7376] [<80aae318>] (driver_probe_device) from [<80aae5d4>] (__driver_attach+0xe0/0x1b8) [ 715.397242][ T7376] r7:00000000 r6:83ce4734 r5:848bf030 r4:83ce46f0 [ 715.397486][ T7376] [<80aae4f4>] (__driver_attach) from [<80aab958>] (bus_for_each_dev+0x84/0xd4) [ 715.397912][ T7376] r7:00000000 r6:82ebd100 r5:80aae4f4 r4:848bf030 [ 715.398165][ T7376] [<80aab8d4>] (bus_for_each_dev) from [<80aad6c4>] (driver_attach+0x24/0x28) [ 715.398529][ T7376] r7:82ebd100 r6:00000000 r5:85587380 r4:848bf030 [ 715.398768][ T7376] [<80aad6a0>] (driver_attach) from [<80aacf28>] (bus_add_driver+0xf8/0x21c) [ 715.399139][ T7376] [<80aace30>] (bus_add_driver) from [<80aaf814>] (driver_register+0x84/0x11c) [ 715.399484][ T7376] r8:00000004 r7:848bf004 r6:848bf030 r5:00000000 r4:848bf030 [ 715.399737][ T7376] [<80aaf790>] (driver_register) from [<80f43f5c>] (usb_gadget_register_driver_owner+0x50/0xf8) [ 715.413599][ T7376] r5:00000000 r4:848bf00c [ 715.413874][ T7376] [<80f43f0c>] (usb_gadget_register_driver_owner) from [<80fb24c0>] (raw_ioctl+0xa0c/0x1084) [ 715.414350][ T7376] r7:848bf004 r6:60000013 r5:00000000 r4:848bf000 [ 715.414616][ T7376] [<80fb1ab4>] (raw_ioctl) from [<805306e4>] (sys_ioctl+0x134/0xd98) [ 715.415148][ T7376] r10:8403d400 r9:85569c00 r8:00000004 r7:00000000 r6:85569c01 r5:00000000 [ 715.415453][ T7376] r4:00005501 [ 715.415722][ T7376] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 715.416065][ T7376] Exception stack(0xec291fa8 to 0xec291ff0) [ 715.416322][ T7376] 1fa0: 00000004 76b4be70 00000004 00005501 00000000 76b4ae00 [ 715.416642][ T7376] 1fc0: 00000004 76b4be70 76b4ae70 00000036 00000003 76b4be60 003b0034 00000000 [ 715.416958][ T7376] 1fe0: 00000000 76b4ade8 00258000 00132e1c [ 715.417207][ T7376] r10:00000036 r9:8403d400 r8:8020029c r7:00000036 r6:76b4ae70 r5:76b4be70 [ 715.417500][ T7376] r4:00000004 [ 715.623465][ T46] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 715.772903][ T46] usb 2-1: Using ep0 maxpacket: 8 [ 715.796048][ T46] usb 2-1: unable to get BOS descriptor or descriptor too short [ 715.801775][ T46] usb 2-1: config 1 interface 0 altsetting 40 has 2 endpoint descriptors, different from the interface descriptor's value: 8 [ 715.802807][ T46] usb 2-1: config 1 interface 0 has no altsetting 0 [ 715.822073][ T46] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 715.824091][ T46] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 715.824446][ T46] usb 2-1: Product: syz [ 715.824657][ T46] usb 2-1: Manufacturer: syz [ 715.824883][ T46] usb 2-1: SerialNumber: syz [ 716.089572][ T46] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 716.102395][ T46] usb 2-1: USB disconnect, device number 16 [ 716.388961][ T31] audit: type=1400 audit(716.300:267): avc: denied { lock } for pid=7397 comm="syz.1.1137" path="/dev/rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 718.864029][ T31] audit: type=1400 audit(718.780:268): avc: denied { connect } for pid=7412 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 718.869715][ T31] audit: type=1400 audit(718.780:269): avc: denied { create } for pid=7412 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 718.896423][ T31] audit: type=1400 audit(718.810:270): avc: denied { ioctl } for pid=7412 comm="syz.0.1143" path="socket:[13558]" dev="sockfs" ino=13558 ioctlcmd=0x5017 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 718.898335][ T31] audit: type=1400 audit(718.810:271): avc: denied { shutdown } for pid=7412 comm="syz.0.1143" laddr=172.20.20.10 lport=2 faddr=172.20.20.187 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 718.905425][ T31] audit: type=1400 audit(718.820:272): avc: denied { setopt } for pid=7412 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 718.927985][ T31] audit: type=1400 audit(718.840:273): avc: denied { write } for pid=7412 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 722.351561][ T7428] cgroup: fork rejected by pids controller in /syz1 [ 728.494791][ T31] audit: type=1400 audit(728.410:274): avc: denied { read } for pid=7487 comm="syz.0.1153" path="socket:[12765]" dev="sockfs" ino=12765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 733.758619][ T7505] fuse: Bad value for 'fd' [ 734.863914][ T2938] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 734.930185][ T2938] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 735.014733][ T2938] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 735.071955][ T2938] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 735.313561][ T2938] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 735.321087][ T2938] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 735.332140][ T2938] bond0 (unregistering): Released all slaves [ 735.393516][ T2938] hsr_slave_0: left promiscuous mode [ 735.397971][ T2938] hsr_slave_1: left promiscuous mode [ 735.407259][ T2938] veth1_macvtap: left promiscuous mode [ 735.407908][ T2938] veth0_macvtap: left promiscuous mode [ 735.408402][ T2938] veth1_vlan: left promiscuous mode [ 735.408726][ T2938] veth0_vlan: left promiscuous mode [ 736.470616][ T31] audit: type=1400 audit(736.380:275): avc: denied { setopt } for pid=7604 comm="syz.1.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 737.047527][ T7512] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 737.053984][ T7512] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 738.186936][ T7512] hsr_slave_0: entered promiscuous mode [ 738.189142][ T7512] hsr_slave_1: entered promiscuous mode [ 738.740589][ T7512] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 738.752372][ T7512] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 738.759928][ T7512] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 738.769974][ T7512] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 739.570688][ T7512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 742.345102][ T7512] veth0_vlan: entered promiscuous mode [ 742.353987][ T7512] veth1_vlan: entered promiscuous mode [ 742.387678][ T7512] veth0_macvtap: entered promiscuous mode [ 742.396076][ T7512] veth1_macvtap: entered promiscuous mode [ 742.425364][ T7512] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.425741][ T7512] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.425966][ T7512] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.426211][ T7512] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.510486][ T31] audit: type=1400 audit(742.420:276): avc: denied { mounton } for pid=7512 comm="syz-executor" path="/syzkaller.2ibbxG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 746.024590][ T31] audit: type=1400 audit(745.940:277): avc: denied { write } for pid=7964 comm="syz.0.1169" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 757.619726][ T31] audit: type=1400 audit(757.530:278): avc: denied { setattr } for pid=8038 comm="syz.1.1188" path="socket:[13300]" dev="sockfs" ino=13300 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 760.249582][ T8054] FAULT_INJECTION: forcing a failure. [ 760.249582][ T8054] name failslab, interval 1, probability 0, space 0, times 0 [ 760.250321][ T8054] CPU: 0 UID: 0 PID: 8054 Comm: syz.0.1191 Not tainted 6.12.0-syzkaller #0 [ 760.250564][ T8054] Hardware name: ARM-Versatile Express [ 760.250746][ T8054] Call trace: [ 760.250860][ T8054] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 760.251132][ T8054] r7:00000c40 r6:85151b68 r5:60000013 r4:8203df48 [ 760.251291][ T8054] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 760.251516][ T8054] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 760.251863][ T8054] r5:00000000 r4:8271925c [ 760.252070][ T8054] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 760.252604][ T8054] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 760.253032][ T8054] r6:85151b68 r5:00001000 r4:82c016c0 [ 760.253268][ T8054] [<804e9074>] (should_failslab) from [<804ce254>] (__kmalloc_noprof+0x9c/0x458) [ 760.255376][ T8054] [<804ce1b8>] (__kmalloc_noprof) from [<807522c0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 760.256289][ T8054] r10:843a6c00 r9:82c9fc00 r8:00000000 r7:831c0550 r6:85151b68 r5:00001000 [ 760.256909][ T8054] r4:00000000 [ 760.257265][ T8054] [<80752284>] (tomoyo_realpath_from_path) from [<8074e404>] (tomoyo_path_number_perm+0xcc/0x22c) [ 760.257926][ T8054] r10:843a6c00 r9:00000000 r8:00000004 r7:400454e2 r6:00000004 r5:81ad1968 [ 760.258466][ T8054] r4:85151b68 r3:824ba340 [ 760.258906][ T8054] [<8074e338>] (tomoyo_path_number_perm) from [<80752cd0>] (tomoyo_file_ioctl+0x1c/0x20) [ 760.259481][ T8054] r9:85151b40 r8:00000004 r7:00000000 r6:00000000 r5:400454e2 r4:85151b40 [ 760.260005][ T8054] [<80752cb4>] (tomoyo_file_ioctl) from [<8070131c>] (security_file_ioctl+0x64/0x1e4) [ 760.260524][ T8054] [<807012b8>] (security_file_ioctl) from [<80530600>] (sys_ioctl+0x50/0xd98) [ 760.260787][ T8054] r7:00000000 r6:85151b41 r5:00000000 r4:400454e2 [ 760.260957][ T8054] [<805305b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 760.261213][ T8054] Exception stack(0xed0a9fa8 to 0xed0a9ff0) [ 760.261458][ T8054] 9fa0: 00000000 00000000 00000004 400454e2 00000000 00000000 [ 760.261821][ T8054] 9fc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b3e0bc [ 760.262047][ T8054] 9fe0: 76b3dec0 76b3deb0 00018af0 00133450 [ 760.262225][ T8054] r10:00000036 r9:843a6c00 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 760.262439][ T8054] r4:00000000 [ 760.263747][ T8054] ERROR: Out of memory at tomoyo_realpath_from_path. [ 763.836517][ T8072] FAULT_INJECTION: forcing a failure. [ 763.836517][ T8072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 763.837667][ T8072] CPU: 0 UID: 0 PID: 8072 Comm: syz.1.1197 Not tainted 6.12.0-syzkaller #0 [ 763.837922][ T8072] Hardware name: ARM-Versatile Express [ 763.838041][ T8072] Call trace: [ 763.838144][ T8072] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 763.838376][ T8072] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 763.838523][ T8072] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 763.838757][ T8072] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 763.839123][ T8072] r5:00000000 r4:8274e844 [ 763.839310][ T8072] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 763.839712][ T8072] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 763.840055][ T8072] r6:00000000 r5:ecdb9f68 r4:00000002 [ 763.840278][ T8072] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 763.840620][ T8072] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 763.841007][ T8072] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 763.841417][ T8072] r10:00000001 r9:805c43b8 r8:00000002 r7:ecdb9f68 r6:0000000f r5:76b4cf30 [ 763.841749][ T8072] r4:8403b000 r3:ecdb9e9f [ 763.841958][ T8072] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 763.842316][ T8072] r8:76b4cf30 r7:ecdb9f68 r6:8403b000 r5:0000000f r4:8513da80 [ 763.842591][ T8072] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 763.842923][ T8072] r10:00000003 r9:8403b000 r8:8020029c r7:00000000 r6:00000000 r5:8513da80 [ 763.843219][ T8072] r4:8513da83 [ 763.843388][ T8072] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 763.843706][ T8072] r7:00000003 r6:00000004 r5:76b4cf30 r4:0000000f [ 763.843959][ T8072] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 763.844297][ T8072] Exception stack(0xecdb9fa8 to 0xecdb9ff0) [ 763.844551][ T8072] 9fa0: 0000000f 76b4cf30 00000004 76b4cf30 0000000f 00000000 [ 763.844872][ T8072] 9fc0: 0000000f 76b4cf30 00000004 00000003 00000000 00006364 003d0f00 76b4d0bc [ 763.845188][ T8072] 9fe0: 00000158 76b4ced0 000d8998 00131324 [ 763.926584][ T31] audit: type=1400 audit(763.830:279): avc: denied { connect } for pid=8083 comm="syz.1.1201" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 764.489062][ T31] audit: type=1400 audit(764.400:280): avc: denied { setattr } for pid=8093 comm="syz.1.1205" name="AF_VSOCK" dev="sockfs" ino=14108 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 767.688455][ T8106] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8106 comm=syz.1.1207 [ 770.105859][ T8123] FAULT_INJECTION: forcing a failure. [ 770.105859][ T8123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 770.107824][ T8123] CPU: 0 UID: 0 PID: 8123 Comm: syz.0.1214 Not tainted 6.12.0-syzkaller #0 [ 770.108593][ T8123] Hardware name: ARM-Versatile Express [ 770.109323][ T8123] Call trace: [ 770.109585][ T8123] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 770.110479][ T8123] r7:b5403587 r6:00000000 r5:60000013 r4:8203df48 [ 770.111123][ T8123] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 770.111894][ T8123] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 770.112625][ T8123] r5:00000000 r4:8274e844 [ 770.113083][ T8123] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 770.113939][ T8123] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 770.114667][ T8123] r6:00000000 r5:843a2020 r4:76b3dca0 [ 770.115100][ T8123] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 770.115997][ T8123] [<808e6b5c>] (should_fail_usercopy) from [<8020b4a4>] (preserve_vfp_context+0x78/0xc4) [ 770.116947][ T8123] [<8020b42c>] (preserve_vfp_context) from [<8020b86c>] (setup_sigframe+0x16c/0x1c4) [ 770.117342][ T8123] r5:843a2020 r4:76b3dbb8 [ 770.117566][ T8123] [<8020b700>] (setup_sigframe) from [<8020bc8c>] (do_work_pending+0x2f4/0x4f8) [ 770.119079][ T8123] r10:00000128 r9:b5403587 r8:00000000 r7:843a2020 r6:76b3dbb8 r5:ed585fb0 [ 770.119668][ T8123] r4:843a1800 [ 770.120083][ T8123] [<8020b998>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 770.121112][ T8123] Exception stack(0xed585fb0 to 0xed585ff8) [ 770.121917][ T8123] 5fa0: fffffffc 20000140 00008800 00000000 [ 770.122683][ T8123] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b3e0bc [ 770.123938][ T8123] 5fe0: 76b3dec0 76b3deb0 00018af0 00133450 60000010 00000004 [ 770.124703][ T8123] r10:00000128 r9:843a1800 r8:8020029c r7:00000128 r6:00131400 r5:00000000 [ 770.125355][ T8123] r4:00000000 [ 770.125719][ C0] vkms_vblank_simulate: vblank timer overrun [ 771.445919][ T31] audit: type=1400 audit(771.360:281): avc: denied { ioctl } for pid=8131 comm="syz.1.1217" path="socket:[14454]" dev="sockfs" ino=14454 ioctlcmd=0x6609 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 771.602162][ T31] audit: type=1400 audit(771.510:282): avc: denied { shutdown } for pid=8131 comm="syz.1.1217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 771.960649][ T31] audit: type=1400 audit(771.870:283): avc: denied { bind } for pid=8128 comm="syz.0.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 782.587324][ T31] audit: type=1400 audit(782.500:284): avc: denied { setattr } for pid=8170 comm="syz.0.1230" name="RAW" dev="sockfs" ino=14511 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 782.595817][ T31] audit: type=1400 audit(782.500:285): avc: denied { shutdown } for pid=8170 comm="syz.0.1230" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 784.713736][ T8176] FAULT_INJECTION: forcing a failure. [ 784.713736][ T8176] name failslab, interval 1, probability 0, space 0, times 0 [ 784.716117][ T8176] CPU: 0 UID: 0 PID: 8176 Comm: syz.1.1232 Not tainted 6.12.0-syzkaller #0 [ 784.716500][ T8176] Hardware name: ARM-Versatile Express [ 784.716766][ T8176] Call trace: [ 784.718446][ T8176] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 784.719995][ T8176] r7:83cbe000 r6:00000cc0 r5:60000013 r4:8203df48 [ 784.720370][ T8176] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 784.720797][ T8176] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 784.721196][ T8176] r5:00000000 r4:8271925c [ 784.721435][ T8176] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 784.722039][ T8176] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 784.722569][ T8176] r6:00000cc0 r5:ffffffff r4:82cac780 [ 784.722846][ T8176] [<804e9074>] (should_failslab) from [<804cd864>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 784.723327][ T8176] [<804cd814>] (kmem_cache_alloc_node_noprof) from [<81494ac4>] (__alloc_skb+0x138/0x160) [ 784.723756][ T8176] r10:ed77dd4c r9:00000000 r8:00000cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 784.724169][ T8176] r4:82606000 [ 784.724361][ T8176] [<8149498c>] (__alloc_skb) from [<8149cc98>] (alloc_skb_with_frags+0x44/0x1ec) [ 784.725615][ T8176] r8:802a6f00 r7:ed77dcd4 r6:00000000 r5:00001000 r4:00000000 [ 784.727581][ T8176] [<8149cc54>] (alloc_skb_with_frags) from [<8148e398>] (sock_alloc_send_pskb+0x1f4/0x228) [ 784.728355][ T8176] r10:ed77dd4c r9:00000000 r8:802a6f00 r7:ed77dcd4 r6:83cbe000 r5:7fffffff [ 784.729041][ T8176] r4:843c0000 [ 784.729282][ T8176] [<8148e1a4>] (sock_alloc_send_pskb) from [<81830bbc>] (isotp_sendmsg+0x2b4/0x7fc) [ 784.730105][ T8176] r10:ed77df38 r9:00000014 r8:ed77df48 r7:00000014 r6:843c0000 r5:843c2000 [ 784.730552][ T8176] r4:00000000 [ 784.730753][ T8176] [<81830908>] (isotp_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 784.731223][ T8176] r10:00000000 r9:ed77ddd4 r8:ed77ddd4 r7:8334e500 r6:8334e500 r5:ed77df38 [ 784.731599][ T8176] r4:00000000 [ 784.731787][ T8176] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 784.732207][ T8176] r7:8334e500 r6:00000000 r5:00000004 r4:ed77df38 [ 784.732590][ T8176] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 784.732993][ T8176] r10:ed77de34 r9:20000180 r8:00000004 r7:00000000 r6:8334e500 r5:ed77df38 [ 784.733362][ T8176] r4:00000000 [ 784.733549][ T8176] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 784.734010][ T8176] r10:00000128 r9:83cbe000 r8:8020029c r7:00000004 r6:20000180 r5:8334e500 [ 784.734374][ T8176] r4:00000000 [ 784.734572][ T8176] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 784.734964][ T8176] Exception stack(0xed77dfa8 to 0xed77dff0) [ 784.735286][ T8176] dfa0: 00000000 00000000 00000003 20000180 00000004 00000000 [ 784.735676][ T8176] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b4d0bc [ 784.736037][ T8176] dfe0: 76b4cec0 76b4ceb0 00018af0 00133450 [ 784.736325][ T8176] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 788.044651][ T2938] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 788.097177][ T2938] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 788.147346][ T2938] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 788.205893][ T2938] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 788.459510][ T2938] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 788.478378][ T2938] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 788.482392][ T2938] bond0 (unregistering): Released all slaves [ 788.547103][ T2938] hsr_slave_0: left promiscuous mode [ 788.551230][ T2938] hsr_slave_1: left promiscuous mode [ 788.556588][ T2938] veth1_macvtap: left promiscuous mode [ 788.556991][ T2938] veth0_macvtap: left promiscuous mode [ 788.557379][ T2938] veth1_vlan: left promiscuous mode [ 788.557791][ T2938] veth0_vlan: left promiscuous mode [ 788.579323][ T8217] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=8217 comm=syz.0.1236 [ 790.075086][ T8195] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 790.081523][ T8195] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 791.525571][ T8195] hsr_slave_0: entered promiscuous mode [ 791.528333][ T8195] hsr_slave_1: entered promiscuous mode [ 791.531099][ T8195] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 791.531479][ T8195] Cannot create hsr debugfs directory [ 792.106634][ T8195] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 792.123969][ T8195] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 792.130316][ T8195] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 792.138445][ T8195] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 792.925864][ T8195] 8021q: adding VLAN 0 to HW filter on device bond0 [ 795.251008][ T31] audit: type=1400 audit(795.160:286): avc: denied { read } for pid=8632 comm="syz.0.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 796.781602][ T8195] veth0_vlan: entered promiscuous mode [ 796.817232][ T8195] veth1_vlan: entered promiscuous mode [ 796.900086][ T8195] veth0_macvtap: entered promiscuous mode [ 796.915224][ T8195] veth1_macvtap: entered promiscuous mode [ 796.998669][ T8195] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 796.999273][ T8195] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 796.999625][ T8195] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 796.999960][ T8195] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 797.221161][ T8666] FAULT_INJECTION: forcing a failure. [ 797.221161][ T8666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 797.222029][ T8666] CPU: 0 UID: 0 PID: 8666 Comm: syz.1.1237 Not tainted 6.12.0-syzkaller #0 [ 797.222748][ T8666] Hardware name: ARM-Versatile Express [ 797.223381][ T8666] Call trace: [ 797.223659][ T8666] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 797.224139][ T8666] r7:00000000 r6:00000000 r5:60000013 r4:8203df48 [ 797.224548][ T8666] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 797.224943][ T8666] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 797.225378][ T8666] r5:00000000 r4:8274e844 [ 797.225605][ T8666] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 797.226058][ T8666] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 797.226465][ T8666] r6:00000000 r5:edb69f68 r4:00000002 [ 797.226718][ T8666] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 797.227141][ T8666] [<808e6b5c>] (should_fail_usercopy) from [<8054f898>] (simple_read_from_buffer+0x8c/0x134) [ 797.227596][ T8666] [<8054f80c>] (simple_read_from_buffer) from [<805c4470>] (proc_fail_nth_read+0xb8/0x100) [ 797.228046][ T8666] r10:00000001 r9:805c43b8 r8:00000002 r7:edb69f68 r6:0000000f r5:76bd7f30 [ 797.228418][ T8666] r4:843a6000 r3:edb69e9f [ 797.228644][ T8666] [<805c43b8>] (proc_fail_nth_read) from [<80516e4c>] (vfs_read+0x98/0x324) [ 797.229073][ T8666] r8:76bd7f30 r7:edb69f68 r6:843a6000 r5:0000000f r4:836c5f00 [ 797.229416][ T8666] [<80516db4>] (vfs_read) from [<80517afc>] (ksys_read+0x78/0xf8) [ 797.229856][ T8666] r10:00000003 r9:843a6000 r8:8020029c r7:00000000 r6:00000000 r5:836c5f00 [ 797.230241][ T8666] r4:836c5f03 [ 797.230441][ T8666] [<80517a84>] (ksys_read) from [<80517b8c>] (sys_read+0x10/0x14) [ 797.230860][ T8666] r7:00000003 r6:00000005 r5:76bd7f30 r4:0000000f [ 797.231183][ T8666] [<80517b7c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 797.231604][ T8666] Exception stack(0xedb69fa8 to 0xedb69ff0) [ 797.231924][ T8666] 9fa0: 0000000f 76bd7f30 00000005 76bd7f30 0000000f 00000000 [ 797.232331][ T8666] 9fc0: 0000000f 76bd7f30 00000005 00000003 00000000 00006364 003d0f00 76bd80bc [ 797.233243][ T8666] 9fe0: 00000158 76bd7ed0 000d8998 00131324 [ 805.666317][ T31] audit: type=1400 audit(805.580:287): avc: denied { shutdown } for pid=8701 comm="syz.1.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 811.760870][ T8745] syz.1.1265 uses obsolete (PF_INET,SOCK_PACKET) [ 811.881542][ T31] audit: type=1400 audit(811.790:288): avc: denied { audit_write } for pid=8747 comm="syz.0.1267" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 817.669224][ T8773] FAULT_INJECTION: forcing a failure. [ 817.669224][ T8773] name failslab, interval 1, probability 0, space 0, times 0 [ 817.669828][ T8773] CPU: 0 UID: 0 PID: 8773 Comm: syz.0.1274 Not tainted 6.12.0-syzkaller #0 [ 817.670090][ T8773] Hardware name: ARM-Versatile Express [ 817.670363][ T8773] Call trace: [ 817.670649][ T8773] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 817.670976][ T8773] r7:84038000 r6:00400cc0 r5:60000013 r4:8203df48 [ 817.671228][ T8773] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 817.671568][ T8773] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 817.671901][ T8773] r5:00000000 r4:8271925c [ 817.672037][ T8773] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 817.672355][ T8773] [<808e6968>] (should_fail_ex) from [<804e90e0>] (should_failslab+0x6c/0x94) [ 817.672813][ T8773] r6:00400cc0 r5:ffffffff r4:82cac780 [ 817.673093][ T8773] [<804e9074>] (should_failslab) from [<804cd864>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 817.673419][ T8773] [<804cd814>] (kmem_cache_alloc_node_noprof) from [<81494ac4>] (__alloc_skb+0x138/0x160) [ 817.673767][ T8773] r10:ede65d2c r9:00000000 r8:00400cc0 r7:00000000 r6:82cac780 r5:ffffffff [ 817.674060][ T8773] r4:82606000 [ 817.674174][ T8773] [<8149498c>] (__alloc_skb) from [<8149cc98>] (alloc_skb_with_frags+0x44/0x1ec) [ 817.674506][ T8773] r8:802a6f00 r7:ede65ccc r6:00000000 r5:00001000 r4:00000003 [ 817.674809][ T8773] [<8149cc54>] (alloc_skb_with_frags) from [<8148e398>] (sock_alloc_send_pskb+0x1f4/0x228) [ 817.675207][ T8773] r10:ede65d2c r9:00000000 r8:802a6f00 r7:ede65ccc r6:84038000 r5:7fffffff [ 817.675515][ T8773] r4:83e25800 [ 817.675689][ T8773] [<8148e1a4>] (sock_alloc_send_pskb) from [<8174c444>] (unix_dgram_sendmsg+0x154/0x8b8) [ 817.676144][ T8773] r10:00000000 r9:83e25800 r8:84038000 r7:00000000 r6:00000000 r5:8308b680 [ 817.676531][ T8773] r4:ede65f38 [ 817.676711][ T8773] [<8174c2f0>] (unix_dgram_sendmsg) from [<8174cbec>] (unix_seqpacket_sendmsg+0x44/0x84) [ 817.677194][ T8773] r10:00000000 r9:ede65dd4 r8:ede65dd4 r7:8308b680 r6:8308b680 r5:ede65f38 [ 817.677551][ T8773] r4:00000000 [ 817.677814][ T8773] [<8174cba8>] (unix_seqpacket_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 817.678265][ T8773] r5:ede65f38 r4:00000000 [ 817.678627][ T8773] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 817.679016][ T8773] r7:8308b680 r6:00000000 r5:00000084 r4:ede65f38 [ 817.679281][ T8773] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 817.679718][ T8773] r10:ede65e34 r9:20000180 r8:00000084 r7:00000000 r6:8308b680 r5:ede65f38 [ 817.680111][ T8773] r4:00000000 [ 817.680380][ T8773] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 817.680854][ T8773] r10:00000128 r9:84038000 r8:8020029c r7:00000084 r6:20000180 r5:8308b680 [ 817.681380][ T8773] r4:00000000 [ 817.681626][ T8773] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 817.682180][ T8773] Exception stack(0xede65fa8 to 0xede65ff0) [ 817.682612][ T8773] 5fa0: 00000000 00000000 00000003 20000180 00000084 00000000 [ 817.683178][ T8773] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b5f0bc [ 817.683638][ T8773] 5fe0: 76b5eec0 76b5eeb0 00018af0 00133450 [ 817.683906][ T8773] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 817.813364][ T31] audit: type=1400 audit(817.720:289): avc: denied { getopt } for pid=8778 comm="syz.1.1277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 817.820905][ T31] audit: type=1400 audit(817.730:290): avc: denied { setattr } for pid=8778 comm="syz.1.1277" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 821.270931][ T8794] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=22 sclass=netlink_tcpdiag_socket pid=8794 comm=syz.1.1282 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 825.991646][ T8823] FAULT_INJECTION: forcing a failure. [ 825.991646][ T8823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 825.992468][ T8823] CPU: 1 UID: 0 PID: 8823 Comm: syz.0.1287 Not tainted 6.12.0-syzkaller #0 [ 825.992962][ T8823] Hardware name: ARM-Versatile Express [ 825.993379][ T8823] Call trace: [ 825.993822][ T8823] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 825.994265][ T8823] r7:84a3a3a3 r6:00000000 r5:60000013 r4:8203df48 [ 825.994560][ T8823] [<8199d55c>] (show_stack) from [<819bba5c>] (dump_stack_lvl+0x70/0x7c) [ 825.994975][ T8823] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 825.995349][ T8823] r5:00000000 r4:8274e844 [ 825.995564][ T8823] [<819bba68>] (dump_stack) from [<808e6af4>] (should_fail_ex+0x18c/0x1dc) [ 825.995969][ T8823] [<808e6968>] (should_fail_ex) from [<808e6b58>] (should_fail+0x14/0x18) [ 825.996357][ T8823] r6:00000000 r5:ee27df48 r4:00000020 [ 825.996593][ T8823] [<808e6b44>] (should_fail) from [<808e6b78>] (should_fail_usercopy+0x1c/0x20) [ 825.997007][ T8823] [<808e6b5c>] (should_fail_usercopy) from [<80838be0>] (_copy_from_iter+0x68/0x7c8) [ 825.997392][ T8823] [<80838b78>] (_copy_from_iter) from [<81830b64>] (isotp_sendmsg+0x25c/0x7fc) [ 825.997852][ T8823] r10:ee27df38 r9:84a3a3a3 r8:ee27df48 r7:00000020 r6:84a38000 r5:84a3a000 [ 825.998208][ T8823] r4:00000000 [ 825.998404][ T8823] [<81830908>] (isotp_sendmsg) from [<81487204>] (__sock_sendmsg+0x44/0x78) [ 825.998811][ T8823] r10:00000000 r9:ee27ddd4 r8:ee27ddd4 r7:8308bb80 r6:8308bb80 r5:ee27df38 [ 825.999174][ T8823] r4:00000000 [ 825.999361][ T8823] [<814871c0>] (__sock_sendmsg) from [<81488204>] (____sys_sendmsg+0x2a4/0x2c4) [ 825.999762][ T8823] r7:8308bb80 r6:00000000 r5:00000804 r4:ee27df38 [ 826.000034][ T8823] [<81487f60>] (____sys_sendmsg) from [<8148a16c>] (___sys_sendmsg+0x9c/0xd0) [ 826.000394][ T8823] r10:ee27de34 r9:20000200 r8:00000804 r7:00000000 r6:8308bb80 r5:ee27df38 [ 826.000692][ T8823] r4:00000000 [ 826.000860][ T8823] [<8148a0d0>] (___sys_sendmsg) from [<8148a684>] (sys_sendmsg+0x78/0xbc) [ 826.001194][ T8823] r10:00000128 r9:8403c800 r8:8020029c r7:00000804 r6:20000200 r5:8308bb80 [ 826.001492][ T8823] r4:00000000 [ 826.001665][ T8823] [<8148a60c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 826.002051][ T8823] Exception stack(0xee27dfa8 to 0xee27dff0) [ 826.002331][ T8823] dfa0: 00000000 00000000 00000003 20000200 00000804 00000000 [ 826.003473][ T8823] dfc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b5f0bc [ 826.003868][ T8823] dfe0: 76b5eec0 76b5eeb0 00018af0 00133450 [ 826.004197][ T8823] r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 828.511651][ T31] audit: type=1400 audit(828.420:291): avc: denied { ioctl } for pid=8834 comm="syz.1.1291" path="socket:[15959]" dev="sockfs" ino=15959 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 828.705043][ T31] audit: type=1400 audit(828.620:292): avc: denied { create } for pid=8834 comm="syz.1.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 828.989177][ T31] audit: type=1400 audit(828.900:293): avc: denied { create } for pid=8834 comm="syz.1.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 830.600926][ T31] audit: type=1400 audit(830.510:294): avc: denied { block_suspend } for pid=8855 comm="syz.0.1295" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 832.993770][ T31] audit: type=1400 audit(832.910:295): avc: denied { ioctl } for pid=8881 comm="syz.1.1304" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 832.994122][ T8882] binder: 8881:8882 ioctl c0046209 99999999 returned -22 [ 833.054786][ T31] audit: type=1400 audit(832.970:296): avc: denied { setopt } for pid=8883 comm="syz.1.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 833.232810][ T31] audit: type=1400 audit(833.140:297): avc: denied { nlmsg_read } for pid=8887 comm="syz.1.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 836.211436][ T31] audit: type=1400 audit(836.120:298): avc: denied { create } for pid=8910 comm="syz.1.1317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 862.351916][ T31] audit: type=1400 audit(862.260:299): avc: denied { name_bind } for pid=9015 comm="syz.0.1353" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 866.048336][ T31] audit: type=1400 audit(865.960:300): avc: denied { connect } for pid=9032 comm="syz.1.1359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 866.184881][ C1] ------------[ cut here ]------------ [ 866.193501][ C1] WARNING: CPU: 1 PID: 9033 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 866.194437][ C1] refcount_t: underflow; use-after-free. [ 866.194962][ C1] Modules linked in: [ 866.195993][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 866.196795][ C1] CPU: 1 UID: 0 PID: 9033 Comm: syz.1.1359 Not tainted 6.12.0-syzkaller #0 [ 866.197209][ C1] Hardware name: ARM-Versatile Express [ 866.197472][ C1] Call trace: frame pointer underflow [ 866.197782][ C1] [<8199d478>] (dump_backtrace) from [<8199d574>] (show_stack+0x18/0x1c) [ 866.198494][ C1] r7:00000000 r6:82622f44 r5:00000000 r4:8203df48 [ 866.198786][ C1] [<8199d55c>] (show_stack) from [<819bba40>] (dump_stack_lvl+0x54/0x7c) [ 866.200344][ C1] [<819bb9ec>] (dump_stack_lvl) from [<819bba80>] (dump_stack+0x18/0x1c) [ 866.200819][ C1] r5:00000000 r4:82870d18 [ 866.201011][ C1] [<819bba68>] (dump_stack) from [<8199e0a0>] (panic+0x120/0x374) [ 866.201859][ C1] [<8199df80>] (panic) from [<802420d8>] (get_taint+0x0/0x1c) [ 866.202269][ C1] r3:8260c5c4 r2:00000001 r1:82026320 r0:8202dd88 [ 866.203068][ C1] r7:80840e00 [ 866.203447][ C1] [<80242064>] (check_panic_on_warn) from [<8024223c>] (__warn+0x80/0x188) [ 866.204443][ C1] [<802421bc>] (__warn) from [<8024252c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 866.204897][ C1] r8:00000009 r7:8208c770 r6:df805c94 r5:84bf1800 r4:00000000 [ 866.205323][ C1] [<80242348>] (warn_slowpath_fmt) from [<80840e00>] (refcount_warn_saturate+0x13c/0x174) [ 866.205745][ C1] r10:20000013 r9:8553ec5c r8:841cb3c0 r7:00000000 r6:8182d02c r5:00000002 [ 866.206206][ C1] r4:841cb3c0 [ 866.206399][ C1] [<80840cc4>] (refcount_warn_saturate) from [<8149c5a8>] (sk_skb_reason_drop+0x1d8/0x248) [ 866.207205][ C1] [<8149c3d0>] (sk_skb_reason_drop) from [<8182d02c>] (j1939_xtp_rx_cts+0x220/0x3d0) [ 866.208267][ C1] r9:8553ec5c r8:841cb3c0 r7:849bc6d8 r6:00000df2 r5:8553ec00 r4:8553ec14 [ 866.208780][ C1] [<8182ce0c>] (j1939_xtp_rx_cts) from [<8182dfa0>] (j1939_tp_recv+0x3f4/0x530) [ 866.209596][ C1] r10:ddde50c8 r9:00000040 r8:849bc6d0 r7:83b2d000 r6:83b2d008 r5:83b2d000 [ 866.210237][ C1] r4:84934d80 [ 866.210477][ C1] [<8182dbac>] (j1939_tp_recv) from [<81827a38>] (j1939_can_recv+0x1e4/0x2dc) SYZFAIL: failed to recv rpc [ 866.210997][ C1] r7:83b2d000 r6:83b2d008 r5:83b2d810 r4:84934d80 [ 866.211816][ C1] [<81827854>] (j1939_can_recv) from [<8181d808>] (can_rcv_filter+0x9c/0x218) [ 866.212254][ C1] r9:00000040 r8:84e146a0 r7:98c80000 r6:84934a80 r5:00000001 r4:850058d0 [ 866.212918][ C1] [<8181d76c>] (can_rcv_filter) from [<8181e1ac>] (can_receive+0xb4/0xf0) [ 866.213438][ C1] r9:00000040 r8:00000000 r7:84e14000 r6:85102f40 r5:84d20000 r4:84934a80 [ 866.213842][ C1] [<8181e0f8>] (can_receive) from [<8181e26c>] (can_rcv+0x84/0xac) [ 866.214229][ C1] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:8181e1e8 r4:84934a80 [ 866.214707][ C1] [<8181e1e8>] (can_rcv) from [<814bd51c>] (__netif_receive_skb_one_core+0x5c/0x80) [ 866.215229][ C1] r5:8181e1e8 r4:84e14000 [ 866.215793][ C1] [<814bd4c0>] (__netif_receive_skb_one_core) from [<814bd588>] (__netif_receive_skb+0x18/0x5c) [ 866.216401][ C1] r5:ddde51b0 r4:84934a80 [ 866.216620][ C1] [<814bd570>] (__netif_receive_skb) from [<814bd890>] (process_backlog+0xa0/0x17c) [ 866.217261][ C1] r5:ddde51b0 r4:84934a80 [ 866.217499][ C1] [<814bd7f0>] (process_backlog) from [<814be79c>] (__napi_poll+0x34/0x240) [ 866.217985][ C1] r10:ddde50c0 r9:ddde5300 r8:df805ed0 r7:df805ecb r6:00000040 r5:ddde51b0 [ 866.218630][ C1] r4:00000001 [ 866.218868][ C1] [<814be768>] (__napi_poll) from [<814bf010>] (net_rx_action+0x358/0x440) [ 866.219432][ C1] r9:ddde5300 r8:df805ed0 r7:0000012c r6:0000dd25 r5:ddde51b0 r4:00000000 [ 866.220179][ C1] [<814becb8>] (net_rx_action) from [<8024b51c>] (handle_softirqs+0x158/0x464) [ 866.220690][ C1] r10:00000008 r9:84bf1800 r8:00000101 r7:00400140 r6:00000003 r5:00000004 [ 866.221157][ C1] r4:8260408c [ 866.221384][ C1] [<8024b3c4>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 866.222088][ C1] r10:003d0f00 r9:84bf18e0 r8:82870084 r7:84bf1800 r6:ecac8b10 r5:00000001 [ 866.222909][ C1] r4:60000013 [ 866.223118][ C1] [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14) [ 866.223843][ C1] [<802087f0>] (____do_softirq) from [<8196c914>] (call_with_stack+0x1c/0x20) [ 866.224338][ C1] [<8196c8f8>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c) [ 866.225882][ C1] [<80208804>] (do_softirq_own_stack) from [<8024ba34>] (do_softirq+0x5c/0x64) [ 866.231274][ C1] [<8024b9d8>] (do_softirq) from [<8024bb08>] (__local_bh_enable_ip+0xcc/0xd0) [ 866.232990][ C1] r5:00000001 r4:84bf1800 [ 866.233254][ C1] [<8024ba3c>] (__local_bh_enable_ip) from [<80202d6c>] (vfp_support_entry+0xac/0x2a0) [ 866.234387][ C1] r5:40000000 r4:df9a1fb0 [ 866.234616][ C1] [<80202cc0>] (vfp_support_entry) from [<8020c938>] (do_undefinstr+0xe4/0x1e0) [ 866.235465][ C1] r9:00006364 r8:80202cc0 r7:ecac8b10 r6:0014d9b0 r5:df9a1fb0 r4:8261d044 [ 866.236055][ C1] [<8020c854>] (do_undefinstr) from [<80200fe4>] (__und_usr+0x84/0xa0) [ 866.236678][ C1] Exception stack(0xdf9a1fb0 to 0xdf9a1ff8) [ 866.236970][ C1] 1fa0: 76bd8b10 00000000 0fffb0d6 00db9828 [ 866.237530][ C1] 1fc0: 00000000 002862f8 00189248 00189250 00000000 00006364 003d0f00 76bd80bc [ 866.237980][ C1] 1fe0: 76bd8b38 76bd7ee8 0001cad4 0014d9b0 20000010 ffffffff [ 866.238441][ C1] r9:00006364 r8:824b1044 r7:84bf1800 r6:ffffffff r5:20000010 r4:0014d9b4 [ 866.241019][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:17:12 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=819bd8b0 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=83cbb000 R11=df96196c R12=df961970 R13=df961960 R14=819bc544 R15=819bd8c0 PSR=00000093 ---- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005727e9 s17=00000000 d08=00000000005727e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=21980303 s33=03000800 d16=0300080021980303 s34=ff0221a0 s35=03ffffff d17=03ffffffff0221a0 s36=0021a803 s37=b0030008 d18=b00300080021a803 s38=00080021 s39=0021b803 d19=0021b80300080021 s40=30c60008 s41=08060a01 d20=08060a0130c60008 s42=0100000c s43=00218002 d21=002180020100000c s44=0010a808 s45=ff020008 d22=ff0200080010a808 s46=03ffffff s47=0a0143ee d23=0a0143ee03ffffff s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=34f82324 s53=2fcfa044 d26=2fcfa04434f82324 s54=cd1e12c8 s55=84013627 d27=84013627cd1e12c8 s56=52ceda6e s57=725941db d28=725941db52ceda6e s58=db372563 s59=31312145 d29=31312145db372563 s60=a162133f s61=90408db2 d30=90408db2a162133f s62=489d24d0 s63=2e829387 d31=2e829387489d24d0 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=8203df48 R02=00000000 R03=819bd8b0 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=00000001 R11=df8059e0 R12=df8059e4 R13=df8059d4 R14=819bc544 R15=819bd8c0 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000