last executing test programs: 5m6.631726754s ago: executing program 1 (id=1048): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001ec0)={0x0}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000e00), r2) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000e40)={0x14, r3, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}}, 0x890) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00', 0x0}) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 5m6.409011095s ago: executing program 1 (id=1049): r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000), 0x2001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000600), 0x1, 0x0) close_range(r1, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x20, r2, 0x8, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xfffffffa, 0x9}}}}}, 0x20}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) r6 = creat(&(0x7f00000023c0)='./file0\x00', 0x1) sendmsg$NL80211_CMD_NEW_MPATH(r6, &(0x7f0000002300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000022c0)={&(0x7f0000000180)={0x58, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x58}, 0x1, 0x0, 0x0, 0x4800}, 0x20000000) write$FUSE_DIRENT(r0, 0x0, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002240), 0x2, 0x0) r8 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40810) (fail_nth: 3) close_range(r8, r8, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r9 = socket$l2tp(0x2, 0x2, 0x73) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r10, &(0x7f0000000400), 0x0, 0x15) bind$inet(r9, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r9, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x40c1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000040)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x2000}}) read$FUSE(r7, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2092) syz_fuse_handle_req(r7, &(0x7f0000002580)="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", 0x2000, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002280)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r7, &(0x7f00000046c0)={0x50, 0x0, r11, {0x7, 0x9, 0x0, 0x403a1810, 0x1, 0x5, 0x7, 0x0, 0x0, 0x0, 0x2}}, 0x50) 5m3.250290496s ago: executing program 1 (id=1051): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r1, &(0x7f0000020080), 0x1001c) write$P9_RREADDIR(r1, 0x0, 0x43) close(r0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r4, 0x80045017, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(r0, 0xc01064c1, 0x0) 5m2.457320509s ago: executing program 1 (id=1054): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x10007, 0x7) r4 = gettid() r5 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) kcmp(r4, r4, 0x3, 0xffffffffffffffff, r5) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) r6 = epoll_create(0x7) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x5452, &(0x7f0000000040)) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000100)={0xfb, "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"}) close(r2) write$cgroup_netprio_ifpriomap(r3, 0x0, 0xd) r7 = dup2(0xffffffffffffffff, r0) ioctl$sock_inet_tcp_SIOCINQ(r7, 0x541b, &(0x7f00000000c0)) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000540)="b5", 0x1}], 0x1) 5m2.307011983s ago: executing program 1 (id=1056): r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x5452, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') dup3(r2, r3, 0x80000) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x103141, 0x0) close(r4) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f0000000280)) socket$inet_mptcp(0x2, 0x1, 0x106) r6 = openat$fuse(0xffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r6, 0x5450, 0x0) r7 = openat(r3, &(0x7f0000000080)='./file0\x00', 0xc0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5452, &(0x7f0000000000)) close_range(r0, r7, 0x2) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x2000c0) close_range(r9, r9, 0x2) r10 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r10, 0x5450, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r4) r11 = socket$nl_generic(0x10, 0x3, 0x10) openat$vhost_vsock(0xffffff9c, &(0x7f0000000300), 0x2, 0x0) r12 = dup3(0xffffffffffffffff, r11, 0x80000) ioctl$I2C_RETRIES(r12, 0x701, 0x10000) fcntl$setflags(r8, 0x2, 0x1) 5m1.839638846s ago: executing program 1 (id=1057): r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r3 = openat$selinux_validatetrans(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r3, 0x5450, 0x0) r4 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) sendfile(r0, r4, 0x0, 0x1ffff) 5m1.839338936s ago: executing program 32 (id=1057): r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendmsg$NLBL_CIPSOV4_C_LIST(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r3 = openat$selinux_validatetrans(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r3, 0x5450, 0x0) r4 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) sendfile(r0, r4, 0x0, 0x1ffff) 47.374941378s ago: executing program 2 (id=1529): sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4040800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x23e69000) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0xffffffffffffffff}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in6=@remote, 0x4d5, 0x32}, 0x0, @in6=@loopback, 0x1, 0x3, 0x0, 0xb7, 0x1fb, 0xffffffff, 0xfffffff9}}, 0xe8) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8822d55593a2179}, 0xc) sendmmsg(r3, &(0x7f0000000180), 0x400000000000077, 0x7600) 29.409996816s ago: executing program 2 (id=1542): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000480), r4) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x54, r5, 0x207, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x54}}, 0x800) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, {@in=@remote, 0x0, 0x33}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x20}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0) 16.651080583s ago: executing program 2 (id=1546): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="020a0003070000000000ffffffff000005001a00ff10a88376efec29c632e9ccdd5510e94c3128aae88cea684fad1145f6addf8cf05638a4"], 0x38}}, 0x20008040) 4.11926586s ago: executing program 0 (id=1554): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fa1ff0000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 3.89840981s ago: executing program 0 (id=1555): socket$inet_udplite(0x2, 0x2, 0x88) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x802, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280), 0xa0280, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x34}}, 0x0) 3.400728806s ago: executing program 2 (id=1556): add_key(0x0, 0x0, &(0x7f0000000080)="f8", 0x1, 0xfffffffffffffffe) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) futex(&(0x7f0000000080), 0x88, 0x0, 0x0, 0x0, 0x0) 3.240741321s ago: executing program 2 (id=1557): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/rt_acct\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/22, 0x16}], 0x1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r1 = gettid() bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket(0x2, 0x80805, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x10007ffffffff}, 0x18) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sendmmsg$inet(r2, &(0x7f0000000000)=[{{&(0x7f0000000080)={0x2, 0x4c21, @private=0xa01fdff}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000300)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f00000002c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000ac0)="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", 0x541}], 0x1}}], 0x2, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = mq_open(&(0x7f0000000040)='!se\xf7ih,\x17i\xacP\xe6lNnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x1}) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x200000000000000, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r6, &(0x7f0000000080)=[{&(0x7f0000000280)=""/160, 0xa0}, {&(0x7f0000002140)=""/4096, 0x694}], 0x2) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) 1.295331451s ago: executing program 0 (id=1558): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="2c385a7af3", 0x5) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0x10}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1}, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000002aaaaaaaaaaaa08004500006000000000002f9078640101000000000024806558000000000000000010000800000086dd"], 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000009c000000090a010400000000000000000700000308000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d58001280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008200001800e000100636f6e6e6c696d69740000000c00028008000140000000001400017b090001006cdbf80789f3f947dd000280080003"], 0xe4}, 0x1, 0x0, 0x0, 0x8001}, 0x20050840) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030041000b05d25a806c8c6394f90324fc60100000000a000200053582c137153e3704020180fc5409000c00", 0x33fe0}], 0x1}, 0x0) 649.85563ms ago: executing program 0 (id=1559): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32=r3], 0x3c}}, 0x40) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000940)=@newqdisc={0x78, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x4c, 0x2, [@TCA_TBF_RATE64={0xc, 0x4, 0x4e1e2563543d84f9}, @TCA_TBF_PBURST={0x8, 0x7, 0x1fc0}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0xffff}, {0x0, 0x1, 0x0, 0x8, 0x8, 0x3}, 0xfffffffe, 0x81}}, @TCA_TBF_PRATE64={0xc, 0x5, 0xcb59372f370e8465}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000080) bind$packet(r0, &(0x7f0000000040)={0x11, 0x9, r3, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000800)="410309fc1116480401020200c52cf7c25975e005b02f000006892f000300897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305fbe258161b6fd8f2428652265d94c6fdbaefc57376a57c2feffff188be9427c323ef024a37016d2a7f9ab6e7941a6fc4f95aa73c1dfff4941f6503b5bd8c91db22cd33795481c94085fa12cdc679ac2a5d7b5d99b93fb07acb0da680e78b74c74aae8d7690d5986a9af81622a0ac210bc7b5ca5fed11cb54d046642670041e846bb184ff5d39fe8516d2d2a8d84e6e7dfcb2b8a8023444db513a3d7a124b59f0a5cd36489dbbb75cce3145d0ea3c3aa21af7cbcbc7a7575db782e757ca543109f5ddcec4930aa91f4119ea3d1f56140cb86cfe0724b23904ef5d05c725ee23918a502b1afe09fb0757d", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 379.622085ms ago: executing program 0 (id=1560): mount(0x0, 0x0, &(0x7f0000000000)='devpts\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffffe}}, 0x10) 5.766529ms ago: executing program 0 (id=1561): r0 = syz_usb_connect(0x3, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="120101000814c910be0632a2f333010203010902120001000000"], 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_open_dev$I2C(&(0x7f0000000040), 0x1, 0x2003) ioctl$I2C_RDWR(r1, 0x707, &(0x7f0000000a40)={0x0}) 0s ago: executing program 2 (id=1562): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000001d71184e000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): "syz.0.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 336.881693][ T29] audit: type=1400 audit(336.800:406): avc: denied { read } for pid=5597 comm="syz.0.639" path="socket:[9246]" dev="sockfs" ino=9246 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 338.707964][ T29] audit: type=1400 audit(338.630:407): avc: denied { create } for pid=5608 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 338.712580][ T29] audit: type=1400 audit(338.630:408): avc: denied { setopt } for pid=5608 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 340.141439][ T29] audit: type=1400 audit(340.060:409): avc: denied { execmem } for pid=5626 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 340.161611][ T29] audit: type=1400 audit(340.080:410): avc: denied { connect } for pid=5626 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 340.342021][ T5631] fuse: Bad value for 'fd' [ 340.939850][ T5644] fuse: Invalid rootmode [ 341.072287][ T29] audit: type=1400 audit(340.990:411): avc: denied { read } for pid=5645 comm="syz.0.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 342.057369][ T5656] fuse: Invalid rootmode [ 344.461364][ T29] audit: type=1400 audit(344.380:412): avc: denied { ioctl } for pid=5668 comm="syz.1.666" path="socket:[8507]" dev="sockfs" ino=8507 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 345.797747][ T5676] FAULT_INJECTION: forcing a failure. [ 345.797747][ T5676] name failslab, interval 1, probability 0, space 0, times 0 [ 345.798177][ T5676] CPU: 0 UID: 0 PID: 5676 Comm: syz.1.669 Not tainted syzkaller #0 PREEMPT [ 345.798278][ T5676] Hardware name: ARM-Versatile Express [ 345.798307][ T5676] Call trace: [ 345.798354][ T5676] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 345.798784][ T5676] r7:00000c40 r6:00000000 r5:60000013 r4:82252424 [ 345.798959][ T5676] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 345.799179][ T5676] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 345.799285][ T5676] r5:84be4800 r4:82918810 [ 345.799362][ T5676] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 345.799642][ T5676] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 345.799794][ T5676] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 345.799934][ T5676] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 345.800083][ T5676] [<8050a498>] (__kmalloc_noprof) from [<807d32c8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 345.800196][ T5676] r10:84be4800 r9:8309e400 r8:00000000 r7:834d5ee0 r6:84ebdf28 r5:00001000 [ 345.800225][ T5676] r4:00000000 [ 345.800244][ T5676] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf40c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 345.800310][ T5676] r10:84be4800 r9:00000000 r8:84ebdf00 r7:00005450 r6:00000004 r5:81cd65c8 [ 345.800334][ T5676] r4:84ebdf28 r3:826c1240 [ 345.800351][ T5676] [<807cf340>] (tomoyo_path_number_perm) from [<807d3cec>] (tomoyo_file_ioctl+0x1c/0x20) [ 345.800415][ T5676] r9:00000003 r8:84ebdf00 r7:00000000 r6:00000000 r5:00005450 r4:84ebdf00 [ 345.800465][ T5676] [<807d3cd0>] (tomoyo_file_ioctl) from [<807805b0>] (security_file_ioctl+0x64/0x1e4) [ 345.800520][ T5676] [<8078054c>] (security_file_ioctl) from [<80578844>] (sys_ioctl+0x4c/0xba0) [ 345.800578][ T5676] r7:00000000 r6:84ebdf01 r5:00000000 r4:00005450 [ 345.800596][ T5676] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 345.800683][ T5676] Exception stack(0xeb811fa8 to 0xeb811ff0) [ 345.800747][ T5676] 1fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 345.801058][ T5676] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f840bc [ 345.801146][ T5676] 1fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 345.801224][ T5676] r10:00000036 r9:84be4800 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 345.801254][ T5676] r4:00000000 [ 345.802064][ T5676] ERROR: Out of memory at tomoyo_realpath_from_path. [ 346.538778][ T5691] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5691 comm=syz.0.673 [ 346.631641][ T29] audit: type=1400 audit(346.550:413): avc: denied { create } for pid=5692 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 346.838770][ T5697] fuse: Bad value for 'rootmode' [ 347.171437][ T5703] FAULT_INJECTION: forcing a failure. [ 347.171437][ T5703] name failslab, interval 1, probability 0, space 0, times 0 [ 347.173395][ T5703] CPU: 0 UID: 0 PID: 5703 Comm: syz.0.679 Not tainted syzkaller #0 PREEMPT [ 347.173507][ T5703] Hardware name: ARM-Versatile Express [ 347.173534][ T5703] Call trace: [ 347.173577][ T5703] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 347.173708][ T5703] r7:00000c40 r6:00000000 r5:60000013 r4:82252424 [ 347.173728][ T5703] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 347.173779][ T5703] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 347.173832][ T5703] r5:84166c00 r4:82918810 [ 347.173847][ T5703] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 347.173946][ T5703] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 347.174019][ T5703] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 347.174036][ T5703] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 347.174089][ T5703] [<8050a498>] (__kmalloc_noprof) from [<807d32c8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 347.174160][ T5703] r10:84166c00 r9:8309e400 r8:00000000 r7:8342e4c8 r6:85aa81a8 r5:00001000 [ 347.174180][ T5703] r4:00000000 [ 347.174198][ T5703] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf40c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 347.174256][ T5703] r10:84166c00 r9:00000000 r8:85aa8180 r7:c004510e r6:00000004 r5:81cd65c8 [ 347.174277][ T5703] r4:85aa81a8 r3:826c1240 [ 347.174293][ T5703] [<807cf340>] (tomoyo_path_number_perm) from [<807d3cec>] (tomoyo_file_ioctl+0x1c/0x20) [ 347.174350][ T5703] r9:00000003 r8:85aa8180 r7:200000c0 r6:200000c0 r5:c004510e r4:85aa8180 [ 347.174367][ T5703] [<807d3cd0>] (tomoyo_file_ioctl) from [<807805b0>] (security_file_ioctl+0x64/0x1e4) [ 347.174419][ T5703] [<8078054c>] (security_file_ioctl) from [<80578844>] (sys_ioctl+0x4c/0xba0) [ 347.174475][ T5703] r7:200000c0 r6:85aa8181 r5:00000000 r4:c004510e [ 347.174491][ T5703] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 347.174537][ T5703] Exception stack(0xebb41fa8 to 0xebb41ff0) [ 347.174576][ T5703] 1fa0: 00000000 00000000 00000003 c004510e 200000c0 00000000 [ 347.174609][ T5703] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f270bc [ 347.174639][ T5703] 1fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 347.174675][ T5703] r10:00000036 r9:84166c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 347.174696][ T5703] r4:00000000 [ 347.185739][ T5703] ERROR: Out of memory at tomoyo_realpath_from_path. [ 347.358799][ T5707] fuse: Bad value for 'rootmode' [ 347.640772][ T29] audit: type=1400 audit(347.560:414): avc: denied { create } for pid=5715 comm="syz.1.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 347.752758][ T29] audit: type=1400 audit(347.670:415): avc: denied { ioctl } for pid=5715 comm="syz.1.685" path="socket:[9439]" dev="sockfs" ino=9439 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 347.939213][ T5722] fuse: Bad value for 'rootmode' [ 348.055425][ T5724] FAULT_INJECTION: forcing a failure. [ 348.055425][ T5724] name failslab, interval 1, probability 0, space 0, times 0 [ 348.055970][ T5724] CPU: 1 UID: 0 PID: 5724 Comm: syz.1.688 Not tainted syzkaller #0 PREEMPT [ 348.056089][ T5724] Hardware name: ARM-Versatile Express [ 348.056117][ T5724] Call trace: [ 348.056176][ T5724] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 348.056280][ T5724] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 348.056300][ T5724] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 348.056349][ T5724] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 348.056404][ T5724] r5:83833c00 r4:82918810 [ 348.056423][ T5724] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 348.056481][ T5724] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 348.056554][ T5724] r8:0000025c r7:00000000 r6:00000cc0 r5:00000001 r4:83001540 [ 348.056574][ T5724] [<8052efe0>] (should_failslab) from [<8050f9bc>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 348.056760][ T5724] [<8050f970>] (__kmalloc_cache_noprof) from [<8148e950>] (snd_pcm_hw_param_near.constprop.0+0x5c/0x274) [ 348.057240][ T5724] r10:00001f40 r9:824576c0 r8:8421ae00 r7:0000000a r6:00001f40 r5:00000001 [ 348.057409][ T5724] r4:847b2c00 [ 348.057604][ T5724] [<8148e8f4>] (snd_pcm_hw_param_near.constprop.0) from [<8148f134>] (snd_pcm_oss_change_params_locked+0x314/0xc88) [ 348.057774][ T5724] r10:00001f40 r9:00001f40 r8:847b1800 r7:847b0800 r6:00001f40 r5:8421ae00 [ 348.058018][ T5724] r4:847b2c00 [ 348.058221][ T5724] [<8148ee20>] (snd_pcm_oss_change_params_locked) from [<8148fd18>] (snd_pcm_oss_get_active_substream+0x94/0xc0) [ 348.058296][ T5724] r10:83833c00 r9:ebdc9ed4 r8:847b1ab8 r7:857cff40 r6:857cff44 r5:8421ae00 [ 348.058315][ T5724] r4:8421ae00 [ 348.058484][ T5724] [<8148fc84>] (snd_pcm_oss_get_active_substream) from [<814915ac>] (snd_pcm_oss_ioctl+0x9cc/0x1010) [ 348.058889][ T5724] r9:00000003 r8:84ebd780 r7:857cff40 r6:20000700 r5:00000000 r4:80045002 [ 348.058985][ T5724] [<81490be0>] (snd_pcm_oss_ioctl) from [<80578928>] (sys_ioctl+0x130/0xba0) [ 348.059191][ T5724] r10:83833c00 r9:00000003 r8:84ebd780 r7:20000700 r6:84ebd781 r5:00000000 [ 348.059416][ T5724] r4:80045002 [ 348.059459][ T5724] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 348.059547][ T5724] Exception stack(0xebdc9fa8 to 0xebdc9ff0) [ 348.059595][ T5724] 9fa0: 00000000 00000000 00000003 80045002 20000700 00000000 [ 348.059633][ T5724] 9fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f840bc [ 348.059661][ T5724] 9fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 348.059738][ T5724] r10:00000036 r9:83833c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 348.060078][ T5724] r4:00000000 [ 348.325047][ T5729] fuse: Unknown parameter 'ÿÿ")B [ 348.325047][ T5729] ·yê*Aÿò¯·€^' [ 348.561334][ T5733] fuse: Unknown parameter 'use00000000000000000000' [ 348.671224][ T29] audit: type=1400 audit(348.590:416): avc: denied { map_create } for pid=5734 comm="syz.1.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 348.698054][ T5735] FAULT_INJECTION: forcing a failure. [ 348.698054][ T5735] name failslab, interval 1, probability 0, space 0, times 0 [ 348.698442][ T5735] CPU: 1 UID: 0 PID: 5735 Comm: syz.1.693 Not tainted syzkaller #0 PREEMPT [ 348.698542][ T5735] Hardware name: ARM-Versatile Express [ 348.698573][ T5735] Call trace: [ 348.698622][ T5735] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 348.698746][ T5735] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 348.698847][ T5735] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 348.698967][ T5735] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 348.699032][ T5735] r5:84060c00 r4:82918810 [ 348.699050][ T5735] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 348.699161][ T5735] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 348.699311][ T5735] r8:84060c00 r7:00000000 r6:00000d40 r5:8365b8d8 r4:830a4600 [ 348.699404][ T5735] [<8052efe0>] (should_failslab) from [<8050ece8>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 348.699504][ T5735] [<8050ec9c>] (kmem_cache_alloc_noprof) from [<80789e04>] (security_inode_alloc+0x30/0x1e8) [ 348.699587][ T5735] r10:8365b9e0 r9:00000000 r8:00000000 r7:00000c40 r6:8339c400 r5:8365b8d8 [ 348.699608][ T5735] r4:8365b8d8 [ 348.699625][ T5735] [<80789dd4>] (security_inode_alloc) from [<805822a0>] (inode_init_always_gfp+0x188/0x1dc) [ 348.699819][ T5735] r5:00000000 r4:8365b8d8 [ 348.699932][ T5735] [<80582118>] (inode_init_always_gfp) from [<805859b8>] (alloc_inode+0x40/0xcc) [ 348.700010][ T5735] r10:00000000 r9:81d0d01c r8:84060c00 r7:81ccf150 r6:81cceb34 r5:8339c400 [ 348.700165][ T5735] r4:8365b8d8 r3:84060c00 [ 348.700362][ T5735] [<80585978>] (alloc_inode) from [<80585a54>] (new_inode+0x10/0x68) [ 348.700554][ T5735] r7:81ccf150 r6:82ae0e48 r5:00008100 r4:837c9a18 [ 348.700696][ T5735] [<80585a44>] (new_inode) from [<80759f28>] (__debugfs_create_file+0xb0/0x208) [ 348.700843][ T5735] r9:81d0d01c r8:84060c00 r7:81ccf150 r6:82ae0e48 r5:00008100 r4:837c9a18 [ 348.700940][ T5735] [<80759e78>] (__debugfs_create_file) from [<8075a0b0>] (debugfs_create_file_full+0x30/0x38) [ 348.701023][ T5735] r10:84060c00 r9:00000001 r8:00000001 r7:8193ae58 r6:00000001 r5:00000001 [ 348.701256][ T5735] r4:8553cb50 [ 348.701318][ T5735] [<8075a080>] (debugfs_create_file_full) from [<8098edd0>] (ref_tracker_dir_debugfs+0xe4/0x188) [ 348.701407][ T5735] [<8098ecec>] (ref_tracker_dir_debugfs) from [<81585dc4>] (alloc_netdev_mqs+0xc4/0x4ac) [ 348.701530][ T5735] r5:00000001 r4:8553c800 [ 348.701573][ T5735] [<81585d00>] (alloc_netdev_mqs) from [<819393dc>] (vlan_ioctl_handler+0x3a8/0x49c) [ 348.701655][ T5735] r10:84060c00 r9:00000001 r8:84129000 r7:856c0000 r6:00000003 r5:00000003 [ 348.701678][ T5735] r4:00000000 [ 348.701696][ T5735] [<81939034>] (vlan_ioctl_handler) from [<81557734>] (sock_ioctl+0x1f8/0x600) [ 348.701770][ T5735] r9:00000004 r8:84ebd3c0 r7:8505ea00 r6:856c0000 r5:200000c0 r4:82c2c204 [ 348.701793][ T5735] [<8155753c>] (sock_ioctl) from [<80578928>] (sys_ioctl+0x130/0xba0) [ 348.701866][ T5735] r9:00000004 r8:84ebd3c0 r7:200000c0 r6:84ebd3c1 r5:00000000 r4:00008982 [ 348.701949][ T5735] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 348.702001][ T5735] Exception stack(0xec1f1fa8 to 0xec1f1ff0) [ 348.702049][ T5735] 1fa0: 00000000 00000000 00000004 00008982 200000c0 00000000 [ 348.702115][ T5735] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f840bc [ 348.702171][ T5735] 1fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 348.702212][ T5735] r10:00000036 r9:84060c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 348.702268][ T5735] r4:00000000 [ 348.703642][ T5735] debugfs: out of free dentries, can not create file 'netdev@8553cb50' [ 350.100400][ T5756] FAULT_INJECTION: forcing a failure. [ 350.100400][ T5756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.100898][ T5756] CPU: 1 UID: 0 PID: 5756 Comm: syz.1.699 Not tainted syzkaller #0 PREEMPT [ 350.100995][ T5756] Hardware name: ARM-Versatile Express [ 350.101023][ T5756] Call trace: [ 350.101068][ T5756] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 350.101180][ T5756] r7:ec28de20 r6:00000000 r5:60000013 r4:82252424 [ 350.101203][ T5756] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 350.101356][ T5756] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 350.101467][ T5756] r5:84162400 r4:8294f590 [ 350.101524][ T5756] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 350.101751][ T5756] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 350.101864][ T5756] r8:00060044 r7:ec28de20 r6:20000100 r5:00000000 r4:ec28df20 [ 350.102055][ T5756] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 350.102198][ T5756] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 350.102411][ T5756] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 350.102501][ T5756] r8:00060044 r7:00000000 r6:8505e500 r5:ec28df20 r4:ec28de64 [ 350.102524][ T5756] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 350.102618][ T5756] r10:00000128 r9:84162400 r8:84ebdcc0 r7:00060044 r6:20000100 r5:84ebdcc1 [ 350.102747][ T5756] r4:00000004 [ 350.102862][ T5756] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 350.103124][ T5756] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 350.103215][ T5756] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 350.103320][ T5756] Exception stack(0xec28dfa8 to 0xec28dff0) [ 350.103402][ T5756] dfa0: 00000000 00000000 00000004 20000100 00060044 00000000 [ 350.103454][ T5756] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f840bc [ 350.103677][ T5756] dfe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 353.384219][ T29] audit: type=1400 audit(353.300:417): avc: denied { name_bind } for pid=5768 comm="syz.0.704" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 354.053392][ T5778] FAULT_INJECTION: forcing a failure. [ 354.053392][ T5778] name failslab, interval 1, probability 0, space 0, times 0 [ 354.053851][ T5778] CPU: 1 UID: 0 PID: 5778 Comm: syz.1.706 Not tainted syzkaller #0 PREEMPT [ 354.053994][ T5778] Hardware name: ARM-Versatile Express [ 354.054024][ T5778] Call trace: [ 354.054070][ T5778] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 354.054188][ T5778] r7:00000c40 r6:00000000 r5:60000013 r4:82252424 [ 354.054209][ T5778] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 354.054428][ T5778] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 354.054522][ T5778] r5:84166c00 r4:82918810 [ 354.054753][ T5778] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 354.054987][ T5778] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 354.055105][ T5778] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 354.055269][ T5778] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 354.055477][ T5778] [<8050a498>] (__kmalloc_noprof) from [<807d32c8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 354.055553][ T5778] r10:84166c00 r9:8309e400 r8:00000000 r7:834bf6e8 r6:84ebdf28 r5:00001000 [ 354.055574][ T5778] r4:00000000 [ 354.055589][ T5778] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf40c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 354.055648][ T5778] r10:84166c00 r9:00000000 r8:84ebdf00 r7:00005450 r6:00000004 r5:81cd65c8 [ 354.055667][ T5778] r4:84ebdf28 r3:826c1240 [ 354.055681][ T5778] [<807cf340>] (tomoyo_path_number_perm) from [<807d3cec>] (tomoyo_file_ioctl+0x1c/0x20) [ 354.055820][ T5778] r9:00000003 r8:84ebdf00 r7:00000000 r6:00000000 r5:00005450 r4:84ebdf00 [ 354.055844][ T5778] [<807d3cd0>] (tomoyo_file_ioctl) from [<807805b0>] (security_file_ioctl+0x64/0x1e4) [ 354.055943][ T5778] [<8078054c>] (security_file_ioctl) from [<80578844>] (sys_ioctl+0x4c/0xba0) [ 354.056111][ T5778] r7:00000000 r6:84ebdf01 r5:00000000 r4:00005450 [ 354.056355][ T5778] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 354.056635][ T5778] Exception stack(0xec2c5fa8 to 0xec2c5ff0) [ 354.057352][ T5778] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 354.057437][ T5778] 5fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f840bc [ 354.057465][ T5778] 5fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 354.057499][ T5778] r10:00000036 r9:84166c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 354.057520][ T5778] r4:00000000 [ 354.059569][ T5778] ERROR: Out of memory at tomoyo_realpath_from_path. [ 354.178083][ T5780] fuse: Unknown parameter 'user_i00000000000000000000' [ 355.089615][ T29] audit: type=1400 audit(355.010:418): avc: denied { create } for pid=5785 comm="syz.0.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 355.094924][ T29] audit: type=1400 audit(355.010:419): avc: denied { write } for pid=5785 comm="syz.0.710" path="socket:[8723]" dev="sockfs" ino=8723 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 355.418819][ T5790] fuse: Unknown parameter 'user_i00000000000000000000' [ 356.869406][ T29] audit: type=1400 audit(356.790:420): avc: denied { create } for pid=5800 comm="syz.1.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 356.956572][ T29] audit: type=1400 audit(356.870:421): avc: denied { create } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 356.961249][ T29] audit: type=1400 audit(356.880:422): avc: denied { bind } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 357.099219][ T29] audit: type=1400 audit(357.020:423): avc: denied { setopt } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 357.105938][ T29] audit: type=1400 audit(357.020:424): avc: denied { accept } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 357.111731][ T29] audit: type=1400 audit(357.030:425): avc: denied { write } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 357.618533][ T29] audit: type=1400 audit(357.540:426): avc: denied { setopt } for pid=5807 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 359.197737][ T5818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1547 sclass=netlink_audit_socket pid=5818 comm=syz.0.720 [ 359.287463][ T5820] FAULT_INJECTION: forcing a failure. [ 359.287463][ T5820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.289135][ T5820] CPU: 1 UID: 0 PID: 5820 Comm: syz.0.721 Not tainted syzkaller #0 PREEMPT [ 359.289216][ T5820] Hardware name: ARM-Versatile Express [ 359.289232][ T5820] Call trace: [ 359.289255][ T5820] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 359.289322][ T5820] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 359.289332][ T5820] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 359.289360][ T5820] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 359.289396][ T5820] r5:84160c00 r4:8294f590 [ 359.289404][ T5820] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 359.289436][ T5820] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 359.289471][ T5820] r8:ec589eb8 r7:00000000 r6:00000001 r5:76f26f30 r4:00000001 [ 359.289480][ T5820] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 359.289509][ T5820] [<80986bb4>] (should_fail_usercopy) from [<808cff58>] (kstrtouint_from_user+0x54/0x13c) [ 359.289542][ T5820] [<808cff04>] (kstrtouint_from_user) from [<806176b4>] (proc_fail_nth_write+0x40/0xf0) [ 359.289577][ T5820] r8:ec589f68 r7:84160c00 r6:00000001 r5:84ebd6c0 r4:00000001 [ 359.289586][ T5820] [<80617674>] (proc_fail_nth_write) from [<8055f980>] (vfs_write+0xac/0x44c) [ 359.289615][ T5820] r5:84ebd6c0 r4:80617674 [ 359.289624][ T5820] [<8055f8d4>] (vfs_write) from [<8055fe90>] (ksys_write+0x74/0xe8) [ 359.289658][ T5820] r10:00000004 r9:84160c00 r8:8020029c r7:00000000 r6:00000002 r5:84ebd6c0 [ 359.289669][ T5820] r4:84ebd6c3 [ 359.289677][ T5820] [<8055fe1c>] (ksys_write) from [<8055ff14>] (sys_write+0x10/0x14) [ 359.289706][ T5820] r7:00000004 r6:00000009 r5:76f26f30 r4:00000001 [ 359.289714][ T5820] [<8055ff04>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 359.289810][ T5820] Exception stack(0xec589fa8 to 0xec589ff0) [ 359.289849][ T5820] 9fa0: 00000001 76f26f30 00000009 76f26f30 00000001 00000000 [ 359.289867][ T5820] 9fc0: 00000001 76f26f30 00000009 00000004 00300000 00000000 00006364 76f270bc [ 359.289942][ T5820] 9fe0: 00000158 76f26ed0 000d862c 00130904 [ 359.533995][ T29] audit: type=1400 audit(359.450:427): avc: denied { write } for pid=5821 comm="syz.0.722" name="snmp6" dev="proc" ino=4026532804 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 359.624809][ T29] audit: type=1400 audit(359.540:428): avc: denied { ioctl } for pid=5825 comm="syz.0.724" path="socket:[8805]" dev="sockfs" ino=8805 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 359.853127][ T29] audit: type=1400 audit(359.770:429): avc: denied { write } for pid=5837 comm="syz.0.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 359.871037][ T29] audit: type=1400 audit(359.790:430): avc: denied { read } for pid=5837 comm="syz.0.728" lport=671 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 359.910296][ T29] audit: type=1400 audit(359.830:431): avc: denied { mount } for pid=5837 comm="syz.0.728" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 359.915242][ T29] audit: type=1400 audit(359.830:432): avc: denied { remount } for pid=5837 comm="syz.0.728" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 359.963936][ T29] audit: type=1400 audit(359.880:433): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 360.158458][ T29] audit: type=1400 audit(360.080:434): avc: denied { read write } for pid=5846 comm="syz.0.732" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 360.167829][ T29] audit: type=1400 audit(360.080:435): avc: denied { open } for pid=5846 comm="syz.0.732" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 360.179279][ T29] audit: type=1400 audit(360.100:436): avc: denied { ioctl } for pid=5846 comm="syz.0.732" path="socket:[8846]" dev="sockfs" ino=8846 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 360.741606][ T5862] FAULT_INJECTION: forcing a failure. [ 360.741606][ T5862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.742120][ T5862] CPU: 0 UID: 0 PID: 5862 Comm: syz.0.738 Not tainted syzkaller #0 PREEMPT [ 360.742217][ T5862] Hardware name: ARM-Versatile Express [ 360.742244][ T5862] Call trace: [ 360.742291][ T5862] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 360.742405][ T5862] r7:ec7d9e20 r6:00000000 r5:60000013 r4:82252424 [ 360.742598][ T5862] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 360.742671][ T5862] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 360.743008][ T5862] r5:84162400 r4:8294f590 [ 360.743147][ T5862] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 360.743678][ T5862] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 360.743992][ T5862] r8:00004010 r7:ec7d9e20 r6:20000180 r5:00000000 r4:ec7d9f20 [ 360.744024][ T5862] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 360.744092][ T5862] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 360.744161][ T5862] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 360.744401][ T5862] r8:00004010 r7:00000000 r6:8505e000 r5:ec7d9f20 r4:ec7d9e64 [ 360.744570][ T5862] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 360.745051][ T5862] r10:00000128 r9:84162400 r8:84ebd0c0 r7:00004010 r6:20000180 r5:84ebd0c1 [ 360.745101][ T5862] r4:00000003 [ 360.745124][ T5862] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 360.745600][ T5862] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 360.745725][ T5862] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 360.745988][ T5862] Exception stack(0xec7d9fa8 to 0xec7d9ff0) [ 360.746048][ T5862] 9fa0: 00000000 00000000 00000003 20000180 00004010 00000000 [ 360.746085][ T5862] 9fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 360.746111][ T5862] 9fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 360.791853][ T23] hid (null): bogus close delimiter [ 360.794693][ T23] hid (null): unknown global tag 0xd [ 360.801806][ T23] hid-generic 0040:0001:0005.0001: bogus close delimiter [ 360.816961][ T23] hid-generic 0040:0001:0005.0001: item 0 0 2 10 parsing failed [ 360.818311][ T23] hid-generic 0040:0001:0005.0001: probe with driver hid-generic failed with error -22 [ 362.483520][ T5887] fuse: Unknown parameter 'user_id00000000000000000000' [ 365.170750][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 365.171320][ T29] audit: type=1400 audit(365.090:443): avc: denied { write } for pid=5894 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 365.174991][ T29] audit: type=1400 audit(365.090:444): avc: denied { setopt } for pid=5894 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 365.302754][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.303496][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.305960][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.307388][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.307758][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.307894][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.308026][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.308126][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.308240][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.308341][ T3787] hid-generic 0004:0008:0008.0002: unknown main item tag 0x0 [ 365.334774][ T3787] hid-generic 0004:0008:0008.0002: hidraw0: HID vffff80.00 Device [syz1] on syz1 [ 365.568760][ T29] audit: type=1400 audit(365.490:445): avc: denied { connect } for pid=5905 comm="syz.1.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 365.684946][ T5908] fuse: Bad value for 'fd' [ 368.468542][ T5918] FAULT_INJECTION: forcing a failure. [ 368.468542][ T5918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 368.469650][ T5918] CPU: 0 UID: 0 PID: 5918 Comm: syz.0.755 Not tainted syzkaller #0 PREEMPT [ 368.469718][ T5918] Hardware name: ARM-Versatile Express [ 368.469733][ T5918] Call trace: [ 368.469756][ T5918] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 368.469819][ T5918] r7:20000100 r6:00000000 r5:60000013 r4:82252424 [ 368.469829][ T5918] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 368.469857][ T5918] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 368.469885][ T5918] r5:83841800 r4:8294f590 [ 368.469924][ T5918] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 368.469957][ T5918] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 368.469991][ T5918] r8:8020029c r7:20000100 r6:eca81ef4 r5:00000010 r4:00000010 [ 368.469999][ T5918] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 368.470026][ T5918] [<80986bb4>] (should_fail_usercopy) from [<81557234>] (move_addr_to_kernel+0x34/0xf8) [ 368.470057][ T5918] [<81557200>] (move_addr_to_kernel) from [<815585c0>] (__sys_connect+0x5c/0xc8) [ 368.470086][ T5918] r7:20000100 r6:00000010 r5:85b95c01 r4:00000003 [ 368.470094][ T5918] [<81558564>] (__sys_connect) from [<8155863c>] (sys_connect+0x10/0x14) [ 368.470123][ T5918] r7:0000011b r6:00130918 r5:00000000 r4:00000000 [ 368.470131][ T5918] [<8155862c>] (sys_connect) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 368.470154][ T5918] Exception stack(0xeca81fa8 to 0xeca81ff0) [ 368.470177][ T5918] 1fa0: 00000000 00000000 00000003 20000100 00000010 00000000 [ 368.470195][ T5918] 1fc0: 00000000 00000000 00130918 0000011b 00300000 00000000 00006364 76f270bc [ 368.470208][ T5918] 1fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 368.549514][ T5920] fuse: Bad value for 'fd' [ 368.650051][ T29] audit: type=1400 audit(368.570:446): avc: denied { setattr } for pid=5921 comm="syz.0.757" name="RAW" dev="sockfs" ino=8964 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 369.407096][ T29] audit: type=1400 audit(369.320:447): avc: denied { write } for pid=5928 comm="syz.1.760" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 371.829240][ T29] audit: type=1400 audit(371.750:448): avc: denied { sqpoll } for pid=5940 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 379.059769][ T5996] FAULT_INJECTION: forcing a failure. [ 379.059769][ T5996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.061216][ T5996] CPU: 0 UID: 0 PID: 5996 Comm: syz.1.778 Not tainted syzkaller #0 PREEMPT [ 379.061287][ T5996] Hardware name: ARM-Versatile Express [ 379.061303][ T5996] Call trace: [ 379.061326][ T5996] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 379.061398][ T5996] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 379.061409][ T5996] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 379.061474][ T5996] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 379.061502][ T5996] r5:83b78c00 r4:8294f590 [ 379.061510][ T5996] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 379.061541][ T5996] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 379.061574][ T5996] r8:76f83f30 r7:00000000 r6:00000000 r5:ecbf5f68 r4:00000002 [ 379.061582][ T5996] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 379.061609][ T5996] [<80986bb4>] (should_fail_usercopy) from [<8059a0d4>] (simple_read_from_buffer+0x80/0x13c) [ 379.061640][ T5996] [<8059a054>] (simple_read_from_buffer) from [<806161fc>] (proc_fail_nth_read+0xb8/0x108) [ 379.061674][ T5996] r10:00000001 r9:80616144 r8:00000002 r7:ecbf5f68 r6:0000000f r5:76f83f30 [ 379.061685][ T5996] r4:83b78c00 r3:ecbf5e9f [ 379.061693][ T5996] [<80616144>] (proc_fail_nth_read) from [<8055f084>] (vfs_read+0x98/0x324) [ 379.061725][ T5996] r8:76f83f30 r7:ecbf5f68 r6:83b78c00 r5:0000000f r4:85aa8b40 [ 379.061733][ T5996] [<8055efec>] (vfs_read) from [<8055fd94>] (ksys_read+0x74/0xe8) [ 379.061765][ T5996] r10:00000003 r9:83b78c00 r8:8020029c r7:00000000 r6:00000000 r5:85aa8b40 [ 379.061774][ T5996] r4:85aa8b43 [ 379.061782][ T5996] [<8055fd20>] (ksys_read) from [<8055fe18>] (sys_read+0x10/0x14) [ 379.061815][ T5996] r7:00000003 r6:00000004 r5:76f83f30 r4:0000000f [ 379.061824][ T5996] [<8055fe08>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 379.061848][ T5996] Exception stack(0xecbf5fa8 to 0xecbf5ff0) [ 379.061870][ T5996] 5fa0: 0000000f 76f83f30 00000004 76f83f30 0000000f 00000000 [ 379.061919][ T5996] 5fc0: 0000000f 76f83f30 00000004 00000003 00300000 00000000 00006364 76f840bc [ 379.061949][ T5996] 5fe0: 00000158 76f83ed0 000d862c 0013083c [ 389.849846][ T29] audit: type=1400 audit(389.770:449): avc: denied { setattr } for pid=6042 comm="syz.1.795" path="socket:[9139]" dev="sockfs" ino=9139 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 402.462489][ T6133] FAULT_INJECTION: forcing a failure. [ 402.462489][ T6133] name failslab, interval 1, probability 0, space 0, times 0 [ 402.465396][ T6133] CPU: 0 UID: 0 PID: 6133 Comm: syz.1.826 Not tainted syzkaller #0 PREEMPT [ 402.465523][ T6133] Hardware name: ARM-Versatile Express [ 402.465553][ T6133] Call trace: [ 402.465601][ T6133] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 402.465722][ T6133] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 402.465742][ T6133] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 402.465800][ T6133] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 402.465858][ T6133] r5:83836c00 r4:82918810 [ 402.465878][ T6133] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 402.466152][ T6133] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 402.466260][ T6133] r8:83836c00 r7:00000000 r6:00000cc0 r5:ffffffff r4:832ad240 [ 402.466281][ T6133] [<8052efe0>] (should_failslab) from [<8050f578>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 402.466348][ T6133] [<8050f528>] (kmem_cache_alloc_node_noprof) from [<81564214>] (__alloc_skb+0x138/0x160) [ 402.466420][ T6133] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:832ad240 r5:ffffffff [ 402.466442][ T6133] r4:828060c0 [ 402.466458][ T6133] [<815640dc>] (__alloc_skb) from [<81686038>] (netlink_alloc_large_skb+0x8c/0xa4) [ 402.466530][ T6133] r8:00000000 r7:8587f800 r6:00000002 r5:850a3180 r4:00000140 [ 402.466550][ T6133] [<81685fac>] (netlink_alloc_large_skb) from [<816867f8>] (netlink_sendmsg+0x134/0x444) [ 402.466611][ T6133] r5:850a3180 r4:ed3d9e68 [ 402.466631][ T6133] [<816866c4>] (netlink_sendmsg) from [<81556a04>] (__sock_sendmsg+0x44/0x78) [ 402.466748][ T6133] r10:81e48540 r9:20001940 r8:00000000 r7:850a3180 r6:850a3180 r5:ed3d9e68 [ 402.466770][ T6133] r4:00000000 [ 402.466787][ T6133] [<815569c0>] (__sock_sendmsg) from [<81556af0>] (sock_write_iter+0xb8/0x104) [ 402.466853][ T6133] r7:850a3180 r6:84e0e240 r5:ed3d9f08 r4:ed3d9ef0 [ 402.466871][ T6133] [<81556a38>] (sock_write_iter) from [<8055fc78>] (vfs_write+0x3a4/0x44c) [ 402.466944][ T6133] r7:83836c00 r6:00000002 r5:84e0e240 r4:00004004 [ 402.466966][ T6133] [<8055f8d4>] (vfs_write) from [<8055fee4>] (ksys_write+0xc8/0xe8) [ 402.467036][ T6133] r10:00000004 r9:83836c00 r8:8020029c r7:00000002 r6:20001940 r5:84e0e240 [ 402.467059][ T6133] r4:84e0e241 [ 402.467077][ T6133] [<8055fe1c>] (ksys_write) from [<8055ff14>] (sys_write+0x10/0x14) [ 402.467147][ T6133] r7:00000004 r6:00130918 r5:00000000 r4:00000000 [ 402.467168][ T6133] [<8055ff04>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 402.467219][ T6133] Exception stack(0xed3d9fa8 to 0xed3d9ff0) [ 402.467269][ T6133] 9fa0: 00000000 00000000 00000003 20001940 00000002 00000000 [ 402.467306][ T6133] 9fc0: 00000000 00000000 00130918 00000004 00300000 00000000 00006364 76f840bc [ 402.467334][ T6133] 9fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 404.964665][ T29] audit: type=1400 audit(404.880:450): avc: denied { create } for pid=6147 comm="syz.0.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 410.127541][ T29] audit: type=1400 audit(410.040:451): avc: denied { getopt } for pid=6186 comm="syz.1.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 419.679615][ T29] audit: type=1400 audit(419.600:452): avc: denied { ioctl } for pid=6249 comm="syz.1.863" path="socket:[10192]" dev="sockfs" ino=10192 ioctlcmd=0x941e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 420.872984][ T29] audit: type=1400 audit(420.790:453): avc: denied { read } for pid=6257 comm="syz.1.865" path="socket:[10498]" dev="sockfs" ino=10498 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 430.747871][ T29] audit: type=1400 audit(430.670:454): avc: denied { ioctl } for pid=6285 comm="syz.0.873" path="socket:[10525]" dev="sockfs" ino=10525 ioctlcmd=0x5409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 436.824959][ T29] audit: type=1400 audit(436.740:455): avc: denied { mount } for pid=6323 comm="syz.0.885" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 442.969242][ T6354] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6354 comm=syz.1.895 [ 450.931508][ T6419] FAULT_INJECTION: forcing a failure. [ 450.931508][ T6419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 450.932008][ T6419] CPU: 0 UID: 0 PID: 6419 Comm: syz.1.913 Not tainted syzkaller #0 PREEMPT [ 450.932109][ T6419] Hardware name: ARM-Versatile Express [ 450.932137][ T6419] Call trace: [ 450.932195][ T6419] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 450.932322][ T6419] r7:ee171e20 r6:00000000 r5:60000013 r4:82252424 [ 450.932343][ T6419] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 450.932403][ T6419] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 450.932459][ T6419] r5:8406ec00 r4:8294f590 [ 450.932475][ T6419] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 450.932602][ T6419] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 450.932770][ T6419] r8:00040010 r7:ee171e20 r6:20000340 r5:00000000 r4:ee171f20 [ 450.932852][ T6419] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 450.932923][ T6419] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 450.933077][ T6419] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 450.933308][ T6419] r8:00040010 r7:00000000 r6:850a5180 r5:ee171f20 r4:ee171e64 [ 450.933331][ T6419] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 450.933462][ T6419] r10:00000128 r9:8406ec00 r8:84ebd840 r7:00040010 r6:20000340 r5:84ebd841 [ 450.933488][ T6419] r4:00000003 [ 450.933505][ T6419] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 450.933579][ T6419] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 450.933622][ T6419] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 450.933681][ T6419] Exception stack(0xee171fa8 to 0xee171ff0) [ 450.933799][ T6419] 1fa0: 00000000 00000000 00000003 20000340 00040010 00000000 [ 450.933987][ T6419] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f840bc [ 450.934090][ T6419] 1fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 452.605572][ T6432] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6432 comm=syz.1.918 [ 452.845766][ T29] audit: type=1400 audit(452.760:456): avc: denied { connect } for pid=6431 comm="syz.0.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 453.088411][ T29] audit: type=1400 audit(453.010:457): avc: denied { read } for pid=6440 comm="syz.0.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 455.954451][ T29] audit: type=1400 audit(455.870:458): avc: denied { bind } for pid=6480 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 455.959987][ T29] audit: type=1400 audit(455.880:459): avc: denied { ioctl } for pid=6480 comm="syz.1.927" path="socket:[10850]" dev="sockfs" ino=10850 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 455.962304][ T29] audit: type=1400 audit(455.880:460): avc: denied { write } for pid=6480 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 456.171960][ T29] audit: type=1400 audit(456.090:461): avc: denied { read } for pid=6482 comm="syz.1.928" path="socket:[11493]" dev="sockfs" ino=11493 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 458.107383][ T6509] FAULT_INJECTION: forcing a failure. [ 458.107383][ T6509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.107787][ T6509] CPU: 1 UID: 0 PID: 6509 Comm: syz.0.937 Not tainted syzkaller #0 PREEMPT [ 458.107881][ T6509] Hardware name: ARM-Versatile Express [ 458.107937][ T6509] Call trace: [ 458.107984][ T6509] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 458.108098][ T6509] r7:ee471e20 r6:00000000 r5:60000013 r4:82252424 [ 458.108119][ T6509] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 458.108174][ T6509] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 458.108232][ T6509] r5:83811800 r4:8294f590 [ 458.108247][ T6509] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 458.109980][ T6509] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 458.110620][ T6509] r8:00008020 r7:ee471e20 r6:20000300 r5:00000000 r4:ee471f20 [ 458.110652][ T6509] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 458.110719][ T6509] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 458.110784][ T6509] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 458.110849][ T6509] r8:00008020 r7:00000000 r6:8364c000 r5:ee471f20 r4:ee471e64 [ 458.110869][ T6509] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 458.111036][ T6509] r10:00000128 r9:83811800 r8:84e05a80 r7:00008020 r6:20000300 r5:84e05a81 [ 458.111070][ T6509] r4:00000003 [ 458.111091][ T6509] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 458.111165][ T6509] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 458.111183][ T6509] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 458.111232][ T6509] Exception stack(0xee471fa8 to 0xee471ff0) [ 458.111280][ T6509] 1fa0: 00000000 00000000 00000003 20000300 00008020 00000000 [ 458.111317][ T6509] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 458.111346][ T6509] 1fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 458.244766][ T29] audit: type=1400 audit(458.160:462): avc: denied { lock } for pid=6511 comm="syz.0.938" path="socket:[11562]" dev="sockfs" ino=11562 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 460.550634][ T6522] FAULT_INJECTION: forcing a failure. [ 460.550634][ T6522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.552802][ T6522] CPU: 0 UID: 0 PID: 6522 Comm: syz.0.941 Not tainted syzkaller #0 PREEMPT [ 460.552892][ T6522] Hardware name: ARM-Versatile Express [ 460.552918][ T6522] Call trace: [ 460.552961][ T6522] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 460.553197][ T6522] r7:76f26b58 r6:00000000 r5:60000013 r4:82252424 [ 460.553221][ T6522] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 460.553285][ T6522] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 460.553346][ T6522] r5:855b0000 r4:8294f590 [ 460.553364][ T6522] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 460.553427][ T6522] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 460.553492][ T6522] r8:b5003587 r7:76f26b58 r6:76f26b38 r5:ee4c1f58 r4:76f26b38 [ 460.553510][ T6522] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 460.553563][ T6522] [<80986bb4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 460.553625][ T6522] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 460.553693][ T6522] r9:fffffe00 r8:b5003587 r7:855b0830 r6:76f26b38 r5:ee4c1fb0 r4:855b0000 [ 460.553712][ T6522] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 460.553760][ T6522] Exception stack(0xee4c1fb0 to 0xee4c1ff8) [ 460.553831][ T6522] 1fa0: 00000003 20000180 00008000 00000000 [ 460.553965][ T6522] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 460.553998][ T6522] 1fe0: 76f26ec0 76f26eb0 0001928c 0013296c 60000010 00000003 [ 460.554079][ T6522] r10:00000128 r9:855b0000 r8:8020029c r7:00000128 r6:00130918 r5:00000000 [ 460.554099][ T6522] r4:00000000 [ 462.547433][ T6551] FAULT_INJECTION: forcing a failure. [ 462.547433][ T6551] name failslab, interval 1, probability 0, space 0, times 0 [ 462.547931][ T6551] CPU: 1 UID: 0 PID: 6551 Comm: syz.1.954 Not tainted syzkaller #0 PREEMPT [ 462.548042][ T6551] Hardware name: ARM-Versatile Express [ 462.548074][ T6551] Call trace: [ 462.548124][ T6551] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 462.548237][ T6551] r7:00000d40 r6:00000000 r5:60000013 r4:82252424 [ 462.548258][ T6551] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 462.548324][ T6551] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 462.548382][ T6551] r5:855b1800 r4:82918810 [ 462.548490][ T6551] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 462.548650][ T6551] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 462.549038][ T6551] r8:00000000 r7:00000d40 r6:00000023 r5:85aa6ffc r4:83001240 [ 462.549226][ T6551] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 462.549461][ T6551] [<8050a498>] (__kmalloc_noprof) from [<807d31d0>] (tomoyo_encode2+0x64/0xf0) [ 462.549875][ T6551] r10:00000fff r9:8309e400 r8:00000000 r7:834d5ee0 r6:84ebd268 r5:85aa6ffc [ 462.549962][ T6551] r4:85aa6fe4 [ 462.550147][ T6551] [<807d316c>] (tomoyo_encode2) from [<807d3280>] (tomoyo_encode+0x24/0x30) [ 462.550255][ T6551] r9:8309e400 r8:00000000 r7:834d5ee0 r6:84ebd268 r5:00001000 r4:85aa6fe5 [ 462.550298][ T6551] [<807d325c>] (tomoyo_encode) from [<807d330c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 462.550358][ T6551] r5:00001000 r4:85aa6000 [ 462.550376][ T6551] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf40c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 462.550454][ T6551] r10:855b1800 r9:00000000 r8:84ebd240 r7:00005450 r6:00000004 r5:81cd65c8 [ 462.550478][ T6551] r4:84ebd268 r3:826c1240 [ 462.550496][ T6551] [<807cf340>] (tomoyo_path_number_perm) from [<807d3cec>] (tomoyo_file_ioctl+0x1c/0x20) [ 462.550561][ T6551] r9:00000003 r8:84ebd240 r7:00000000 r6:00000000 r5:00005450 r4:84ebd240 [ 462.550580][ T6551] [<807d3cd0>] (tomoyo_file_ioctl) from [<807805b0>] (security_file_ioctl+0x64/0x1e4) [ 462.550636][ T6551] [<8078054c>] (security_file_ioctl) from [<80578844>] (sys_ioctl+0x4c/0xba0) [ 462.550700][ T6551] r7:00000000 r6:84ebd241 r5:00000000 r4:00005450 [ 462.550719][ T6551] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 462.550766][ T6551] Exception stack(0xee671fa8 to 0xee671ff0) [ 462.550805][ T6551] 1fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 462.550840][ T6551] 1fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f840bc [ 462.550899][ T6551] 1fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 462.550998][ T6551] r10:00000036 r9:855b1800 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 462.551096][ T6551] r4:00000000 [ 462.553739][ T6551] ERROR: Out of memory at tomoyo_realpath_from_path. [ 465.618776][ T6581] FAULT_INJECTION: forcing a failure. [ 465.618776][ T6581] name failslab, interval 1, probability 0, space 0, times 0 [ 465.622236][ T6581] CPU: 1 UID: 0 PID: 6581 Comm: syz.0.962 Not tainted syzkaller #0 PREEMPT [ 465.622322][ T6581] Hardware name: ARM-Versatile Express [ 465.622337][ T6581] Call trace: [ 465.622361][ T6581] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 465.622442][ T6581] r7:00000d40 r6:00000000 r5:60000013 r4:82252424 [ 465.622454][ T6581] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 465.622488][ T6581] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 465.622520][ T6581] r5:84063000 r4:82918810 [ 465.622529][ T6581] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 465.622563][ T6581] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 465.622605][ T6581] r8:00000000 r7:00000d40 r6:00000022 r5:85ab4ffc r4:83001240 [ 465.622640][ T6581] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 465.622675][ T6581] [<8050a498>] (__kmalloc_noprof) from [<807d31d0>] (tomoyo_encode2+0x64/0xf0) [ 465.622715][ T6581] r10:00000fff r9:8309e400 r8:00000000 r7:8342e4c8 r6:84e0e3e8 r5:85ab4ffc [ 465.622727][ T6581] r4:85ab4fe5 [ 465.622736][ T6581] [<807d316c>] (tomoyo_encode2) from [<807d3280>] (tomoyo_encode+0x24/0x30) [ 465.622771][ T6581] r9:8309e400 r8:00000000 r7:8342e4c8 r6:84e0e3e8 r5:00001000 r4:85ab4fe6 [ 465.622780][ T6581] [<807d325c>] (tomoyo_encode) from [<807d330c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 465.622809][ T6581] r5:00001000 r4:85ab4000 [ 465.622818][ T6581] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf40c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 465.622853][ T6581] r10:84063000 r9:00000000 r8:84e0e3c0 r7:c004510e r6:00000004 r5:81cd65c8 [ 465.622866][ T6581] r4:84e0e3e8 r3:826c1240 [ 465.622875][ T6581] [<807cf340>] (tomoyo_path_number_perm) from [<807d3cec>] (tomoyo_file_ioctl+0x1c/0x20) [ 465.622910][ T6581] r9:00000003 r8:84e0e3c0 r7:200000c0 r6:200000c0 r5:c004510e r4:84e0e3c0 [ 465.622920][ T6581] [<807d3cd0>] (tomoyo_file_ioctl) from [<807805b0>] (security_file_ioctl+0x64/0x1e4) [ 465.622949][ T6581] [<8078054c>] (security_file_ioctl) from [<80578844>] (sys_ioctl+0x4c/0xba0) [ 465.622983][ T6581] r7:200000c0 r6:84e0e3c1 r5:00000000 r4:c004510e [ 465.622992][ T6581] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 465.623017][ T6581] Exception stack(0xee61dfa8 to 0xee61dff0) [ 465.623043][ T6581] dfa0: 00000000 00000000 00000003 c004510e 200000c0 00000000 [ 465.623062][ T6581] dfc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f270bc [ 465.623078][ T6581] dfe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 465.623098][ T6581] r10:00000036 r9:84063000 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 465.623109][ T6581] r4:00000000 [ 465.638740][ T6581] ERROR: Out of memory at tomoyo_realpath_from_path. [ 466.009098][ T29] audit: type=1400 audit(465.930:463): avc: denied { shutdown } for pid=6590 comm="syz.0.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 466.058855][ T6593] FAULT_INJECTION: forcing a failure. [ 466.058855][ T6593] name failslab, interval 1, probability 0, space 0, times 0 [ 466.059904][ T6593] CPU: 1 UID: 0 PID: 6593 Comm: syz.0.967 Not tainted syzkaller #0 PREEMPT [ 466.059975][ T6593] Hardware name: ARM-Versatile Express [ 466.059991][ T6593] Call trace: [ 466.060017][ T6593] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 466.060082][ T6593] r7:00000dc0 r6:00000000 r5:60000013 r4:82252424 [ 466.060093][ T6593] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 466.060127][ T6593] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 466.060161][ T6593] r5:83830000 r4:82918810 [ 466.060170][ T6593] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 466.060207][ T6593] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 466.060253][ T6593] r8:00000000 r7:00000dc0 r6:00000064 r5:00000014 r4:83001300 [ 466.060264][ T6593] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 466.060299][ T6593] [<8050a498>] (__kmalloc_noprof) from [<8147569c>] (constrain_params_by_rules+0x88/0x500) [ 466.060344][ T6593] r10:ee73dd20 r9:8496cc00 r8:0000000c r7:8587b400 r6:8496cd94 r5:00000014 [ 466.060356][ T6593] r4:00000000 [ 466.060365][ T6593] [<81475614>] (constrain_params_by_rules) from [<81475cfc>] (snd_pcm_hw_refine+0x1e8/0x41c) [ 466.060413][ T6593] r10:ee73dd20 r9:824576c0 r8:0000000c r7:8587b630 r6:8496cd94 r5:00000014 [ 466.060425][ T6593] r4:8496cc00 [ 466.060435][ T6593] [<81475b14>] (snd_pcm_hw_refine) from [<8147d694>] (snd_pcm_hw_param_first+0x178/0x1ec) [ 466.060476][ T6593] r10:00000001 r9:824576c0 r8:00000002 r7:8421ae00 r6:00000000 r5:0000000a [ 466.060488][ T6593] r4:8496cc00 [ 466.060497][ T6593] [<8147d51c>] (snd_pcm_hw_param_first) from [<8148ea74>] (snd_pcm_hw_param_near.constprop.0+0x180/0x274) [ 466.060543][ T6593] r10:00000001 r9:824576c0 r8:8421ae00 r7:0000000a r6:8496ec00 r5:00000001 [ 466.060556][ T6593] r4:8496cc00 r3:00000000 [ 466.060566][ T6593] [<8148e8f4>] (snd_pcm_hw_param_near.constprop.0) from [<8148f134>] (snd_pcm_oss_change_params_locked+0x314/0xc88) [ 466.060609][ T6593] r10:00001f40 r9:00001f40 r8:8587b400 r7:8496ec00 r6:00001f40 r5:8421ae00 [ 466.060621][ T6593] r4:8496cc00 [ 466.060630][ T6593] [<8148ee20>] (snd_pcm_oss_change_params_locked) from [<8148fd18>] (snd_pcm_oss_get_active_substream+0x94/0xc0) [ 466.060674][ T6593] r10:83830000 r9:ee73ded4 r8:8587b6b8 r7:85b185c0 r6:85b185c4 r5:8421ae00 [ 466.060686][ T6593] r4:8421ae00 [ 466.060695][ T6593] [<8148fc84>] (snd_pcm_oss_get_active_substream) from [<814915ac>] (snd_pcm_oss_ioctl+0x9cc/0x1010) [ 466.060738][ T6593] r9:00000003 r8:84e0e6c0 r7:85b185c0 r6:20000700 r5:00000000 r4:80045002 [ 466.060746][ T6593] [<81490be0>] (snd_pcm_oss_ioctl) from [<80578928>] (sys_ioctl+0x130/0xba0) [ 466.060783][ T6593] r10:83830000 r9:00000003 r8:84e0e6c0 r7:20000700 r6:84e0e6c1 r5:00000000 [ 466.060794][ T6593] r4:80045002 [ 466.060801][ T6593] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 466.060825][ T6593] Exception stack(0xee73dfa8 to 0xee73dff0) [ 466.060846][ T6593] dfa0: 00000000 00000000 00000003 80045002 20000700 00000000 [ 466.060864][ T6593] dfc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f270bc [ 466.060878][ T6593] dfe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 466.060896][ T6593] r10:00000036 r9:83830000 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 466.060906][ T6593] r4:00000000 [ 466.622010][ T6595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6595 comm=syz.0.968 [ 467.329236][ T2885] hid (null): unknown global tag 0xb3 [ 467.330012][ T2885] hid (null): unknown global tag 0xe [ 467.332547][ T2885] hid (null): unknown global tag 0xd [ 467.333073][ T2885] hid (null): unknown global tag 0xc [ 467.345074][ T2885] hid_parser_main: 133 callbacks suppressed [ 467.349397][ T2885] hid-generic 0007:0005:0006.0003: unknown main item tag 0x1 [ 467.351201][ T2885] hid-generic 0007:0005:0006.0003: unexpected long global item [ 467.355702][ T2885] hid-generic 0007:0005:0006.0003: probe with driver hid-generic failed with error -22 [ 467.649686][ T6610] FAULT_INJECTION: forcing a failure. [ 467.649686][ T6610] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 467.650309][ T6610] CPU: 1 UID: 0 PID: 6610 Comm: syz.0.971 Not tainted syzkaller #0 PREEMPT [ 467.650402][ T6610] Hardware name: ARM-Versatile Express [ 467.650430][ T6610] Call trace: [ 467.650479][ T6610] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 467.650579][ T6610] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 467.650598][ T6610] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 467.650679][ T6610] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 467.650747][ T6610] r5:83830c00 r4:82918864 [ 467.650766][ T6610] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 467.650832][ T6610] [<80986974>] (should_fail_ex) from [<8052f0dc>] (should_fail_alloc_page+0x68/0x74) [ 467.650932][ T6610] r8:00000001 r7:00000000 r6:00000000 r5:00000cc0 r4:df9b5b38 [ 467.650957][ T6610] [<8052f074>] (should_fail_alloc_page) from [<804f713c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 467.651022][ T6610] [<804f70a8>] (prepare_alloc_pages.constprop.0) from [<804ff704>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 467.651096][ T6610] r10:832a6540 r9:00000000 r8:83830c00 r7:8614eda4 r6:00000cc0 r5:8365ba80 [ 467.651180][ T6610] r4:00000000 r3:df9b5b38 [ 467.651207][ T6610] [<804ff658>] (__alloc_frozen_pages_noprof) from [<80500844>] (get_free_pages_noprof+0x1c/0x74) [ 467.651284][ T6610] r10:832a6540 r9:00000510 r8:832a6544 r7:8614eda4 r6:837d7088 r5:8365ba80 [ 467.651307][ T6610] r4:8614ed8c [ 467.651326][ T6610] [<80500828>] (get_free_pages_noprof) from [<807a62e0>] (inode_doinit_with_dentry+0x234/0x4a0) [ 467.651404][ T6610] [<807a60ac>] (inode_doinit_with_dentry) from [<807a68c4>] (selinux_d_instantiate+0x20/0x24) [ 467.651471][ T6610] r10:00000000 r9:81d0d01c r8:83830c00 r7:81ccf150 r6:8365bae8 r5:837d7088 [ 467.651490][ T6610] r4:8365ba80 [ 467.651506][ T6610] [<807a68a4>] (selinux_d_instantiate) from [<807815b4>] (security_d_instantiate+0x178/0x190) [ 467.651559][ T6610] [<8078143c>] (security_d_instantiate) from [<8057dfa8>] (d_instantiate+0x30/0x54) [ 467.651617][ T6610] r5:837d7088 r4:8365ba80 [ 467.651664][ T6610] [<8057df78>] (d_instantiate) from [<80759f80>] (__debugfs_create_file+0x108/0x208) [ 467.651738][ T6610] r7:81ccf150 r6:8365ba80 r5:00008100 r4:837d7088 [ 467.651779][ T6610] [<80759e78>] (__debugfs_create_file) from [<8075a0b0>] (debugfs_create_file_full+0x30/0x38) [ 467.651855][ T6610] r10:83830c00 r9:00000001 r8:00000001 r7:8193ae58 r6:00000001 r5:00000001 [ 467.651876][ T6610] r4:85bff350 [ 467.651895][ T6610] [<8075a080>] (debugfs_create_file_full) from [<8098edd0>] (ref_tracker_dir_debugfs+0xe4/0x188) [ 467.651954][ T6610] [<8098ecec>] (ref_tracker_dir_debugfs) from [<81585dc4>] (alloc_netdev_mqs+0xc4/0x4ac) [ 467.652063][ T6610] r5:00000001 r4:85bff000 [ 467.652088][ T6610] [<81585d00>] (alloc_netdev_mqs) from [<819393dc>] (vlan_ioctl_handler+0x3a8/0x49c) [ 467.652169][ T6610] r10:83830c00 r9:00000001 r8:855a9000 r7:856c0f00 r6:00000003 r5:00000003 [ 467.652193][ T6610] r4:00000000 [ 467.652209][ T6610] [<81939034>] (vlan_ioctl_handler) from [<81557734>] (sock_ioctl+0x1f8/0x600) [ 467.652279][ T6610] r9:00000004 r8:8615b600 r7:8359f680 r6:856c0f00 r5:200000c0 r4:82c2c204 [ 467.652298][ T6610] [<8155753c>] (sock_ioctl) from [<80578928>] (sys_ioctl+0x130/0xba0) [ 467.652362][ T6610] r9:00000004 r8:8615b600 r7:200000c0 r6:8615b601 r5:00000000 r4:00008982 [ 467.652391][ T6610] [<805787f8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 467.652443][ T6610] Exception stack(0xdf9b5fa8 to 0xdf9b5ff0) [ 467.652483][ T6610] 5fa0: 00000000 00000000 00000004 00008982 200000c0 00000000 [ 467.652544][ T6610] 5fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f270bc [ 467.652590][ T6610] 5fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 467.652627][ T6610] r10:00000036 r9:83830c00 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 467.652647][ T6610] r4:00000000 [ 467.879317][ T29] audit: type=1400 audit(467.800:464): avc: denied { nlmsg_tty_audit } for pid=6613 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 468.329427][ T6626] FAULT_INJECTION: forcing a failure. [ 468.329427][ T6626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 468.329999][ T6626] CPU: 1 UID: 0 PID: 6626 Comm: syz.0.975 Not tainted syzkaller #0 PREEMPT [ 468.330092][ T6626] Hardware name: ARM-Versatile Express [ 468.330121][ T6626] Call trace: [ 468.330170][ T6626] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 468.330271][ T6626] r7:df9c5e20 r6:00000000 r5:60000013 r4:82252424 [ 468.330291][ T6626] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 468.330343][ T6626] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 468.330406][ T6626] r5:84c19800 r4:8294f590 [ 468.330423][ T6626] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 468.330481][ T6626] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 468.330548][ T6626] r8:00000000 r7:df9c5e20 r6:20000300 r5:00000000 r4:df9c5f20 [ 468.330565][ T6626] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 468.330618][ T6626] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 468.330680][ T6626] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 468.330743][ T6626] r8:00000000 r7:00000000 r6:8364d180 r5:df9c5f20 r4:df9c5e64 [ 468.330762][ T6626] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 468.330826][ T6626] r10:00000128 r9:84c19800 r8:84e0e300 r7:00000000 r6:20000300 r5:84e0e301 [ 468.330846][ T6626] r4:00000003 [ 468.330862][ T6626] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 468.331096][ T6626] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 468.331131][ T6626] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 468.331283][ T6626] Exception stack(0xdf9c5fa8 to 0xdf9c5ff0) [ 468.331381][ T6626] 5fa0: 00000000 00000000 00000003 20000300 00000000 00000000 [ 468.331634][ T6626] 5fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 468.331744][ T6626] 5fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 472.237275][ T29] audit: type=1400 audit(472.150:465): avc: denied { ioctl } for pid=6650 comm="syz.0.985" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 472.733443][ T29] audit: type=1400 audit(472.650:466): avc: denied { setattr } for pid=6653 comm="syz.0.986" name="NETLINK" dev="sockfs" ino=11252 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 474.459171][ T29] audit: type=1400 audit(474.380:467): avc: denied { connect } for pid=6663 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 474.468396][ T29] audit: type=1400 audit(474.380:468): avc: denied { accept } for pid=6663 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 474.476669][ T29] audit: type=1400 audit(474.390:469): avc: denied { shutdown } for pid=6663 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 482.888784][ T6707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=6707 comm=syz.0.1004 [ 484.289268][ T6717] FAULT_INJECTION: forcing a failure. [ 484.289268][ T6717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.291689][ T6717] CPU: 0 UID: 0 PID: 6717 Comm: syz.0.1009 Not tainted syzkaller #0 PREEMPT [ 484.291825][ T6717] Hardware name: ARM-Versatile Express [ 484.291853][ T6717] Call trace: [ 484.291902][ T6717] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 484.292024][ T6717] r7:e42d5e20 r6:00000000 r5:60000013 r4:82252424 [ 484.292046][ T6717] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 484.292103][ T6717] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 484.292177][ T6717] r5:8406ec00 r4:8294f590 [ 484.292195][ T6717] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 484.292259][ T6717] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 484.292332][ T6717] r8:00040010 r7:e42d5e20 r6:20000340 r5:00000000 r4:e42d5f20 [ 484.292350][ T6717] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 484.292413][ T6717] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 484.292480][ T6717] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 484.292547][ T6717] r8:00040010 r7:00000000 r6:8359ea00 r5:e42d5f20 r4:e42d5e64 [ 484.292568][ T6717] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 484.292638][ T6717] r10:00000128 r9:8406ec00 r8:8615b000 r7:00040010 r6:20000340 r5:8615b001 [ 484.292661][ T6717] r4:00000003 [ 484.292679][ T6717] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 484.292745][ T6717] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 484.292764][ T6717] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 484.292816][ T6717] Exception stack(0xe42d5fa8 to 0xe42d5ff0) [ 484.292860][ T6717] 5fa0: 00000000 00000000 00000003 20000340 00040010 00000000 [ 484.292897][ T6717] 5fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 484.292928][ T6717] 5fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 485.982640][ T29] audit: type=1400 audit(485.900:470): avc: denied { create } for pid=6727 comm="syz.1.1014" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 486.009401][ T29] audit: type=1400 audit(485.930:471): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file5" dev="tmpfs" ino=2825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 489.194147][ T6762] FAULT_INJECTION: forcing a failure. [ 489.194147][ T6762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.194675][ T6762] CPU: 0 UID: 0 PID: 6762 Comm: syz.1.1026 Not tainted syzkaller #0 PREEMPT [ 489.194748][ T6762] Hardware name: ARM-Versatile Express [ 489.194774][ T6762] Call trace: [ 489.194889][ T6762] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 489.195048][ T6762] r7:00000000 r6:00000000 r5:60000113 r4:82252424 [ 489.195084][ T6762] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 489.195152][ T6762] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 489.195212][ T6762] r5:83831800 r4:82918864 [ 489.195251][ T6762] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 489.195316][ T6762] [<80986974>] (should_fail_ex) from [<8052f0dc>] (should_fail_alloc_page+0x68/0x74) [ 489.195424][ T6762] r8:00000001 r7:00000000 r6:00000000 r5:00440dc2 r4:ea4a9c38 [ 489.195465][ T6762] [<8052f074>] (should_fail_alloc_page) from [<804f713c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 489.195530][ T6762] [<804f70a8>] (prepare_alloc_pages.constprop.0) from [<804ff704>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 489.195650][ T6762] r10:ea4a9e58 r9:00000000 r8:83831800 r7:00000000 r6:00440dc2 r5:84e19a00 [ 489.195680][ T6762] r4:00000000 r3:ea4a9c38 [ 489.195698][ T6762] [<804ff658>] (__alloc_frozen_pages_noprof) from [<8050076c>] (__alloc_pages_noprof+0x10/0x60) [ 489.195771][ T6762] r10:ea4a9e58 r9:84ee7000 r8:86152280 r7:00000000 r6:20000000 r5:84e19a00 [ 489.195789][ T6762] r4:84e19a00 [ 489.195808][ T6762] [<8050075c>] (__alloc_pages_noprof) from [<804c977c>] (pte_alloc_one+0x28/0x104) [ 489.196234][ T6762] [<804c9754>] (pte_alloc_one) from [<804cb5a8>] (__pte_alloc+0x2c/0x100) [ 489.196751][ T6762] r5:854f1800 r4:84e19a00 [ 489.196783][ T6762] [<804cb57c>] (__pte_alloc) from [<804d0c78>] (handle_mm_fault+0xfb0/0x14e0) [ 489.196872][ T6762] r5:83831800 r4:00000214 [ 489.196900][ T6762] [<804cfcc8>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 489.197008][ T6762] r10:00000007 r9:84e19a00 r8:00000214 r7:20000000 r6:00000206 r5:20000100 [ 489.197033][ T6762] r4:ea4a9e58 [ 489.197052][ T6762] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 489.197132][ T6762] r10:0000011b r9:83831800 r8:80234648 r7:ea4a9e58 r6:20000100 r5:00000206 [ 489.197155][ T6762] r4:8281d0b8 [ 489.197172][ T6762] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 489.197235][ T6762] r9:83831800 r8:80234648 r7:ea4a9e58 r6:20000100 r5:00000206 r4:8281d0b8 [ 489.197254][ T6762] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 489.197295][ T6762] Exception stack(0xea4a9e58 to 0xea4a9ea0) [ 489.197331][ T6762] 9e40: ea4a9ef4 20000100 [ 489.197382][ T6762] 9e60: fffffff0 00000000 00000010 b5403587 ea4a9ef4 20000100 8020029c 83831800 [ 489.197423][ T6762] 9e80: 0000011b ea4a9eec 00000010 ea4a9eac 8155726c 81a301a8 00000013 ffffffff [ 489.197458][ T6762] r8:8020029c r7:ea4a9e8c r6:ffffffff r5:00000013 r4:81a301a8 [ 489.197478][ T6762] [<81557200>] (move_addr_to_kernel) from [<815585c0>] (__sys_connect+0x5c/0xc8) [ 489.197552][ T6762] r7:20000100 r6:00000010 r5:85913d81 r4:00000003 [ 489.197573][ T6762] [<81558564>] (__sys_connect) from [<8155863c>] (sys_connect+0x10/0x14) [ 489.197636][ T6762] r7:0000011b r6:00130918 r5:00000000 r4:00000000 [ 489.197653][ T6762] [<8155862c>] (sys_connect) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 489.197704][ T6762] Exception stack(0xea4a9fa8 to 0xea4a9ff0) [ 489.197735][ T6762] 9fa0: 00000000 00000000 00000003 20000100 00000010 00000000 [ 489.197771][ T6762] 9fc0: 00000000 00000000 00130918 0000011b 00300000 00000000 00006364 76f840bc [ 489.197800][ T6762] 9fe0: 76f83ec0 76f83eb0 0001928c 00132970 [ 489.800851][ T29] audit: type=1400 audit(489.720:472): avc: denied { write } for pid=6765 comm="syz.0.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 491.285263][ T6779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6779 comm=syz.0.1031 [ 491.452814][ T6784] serio: Serial port ptm0 [ 491.935070][ T6792] FAULT_INJECTION: forcing a failure. [ 491.935070][ T6792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.938110][ T6792] CPU: 0 UID: 0 PID: 6792 Comm: syz.0.1036 Not tainted syzkaller #0 PREEMPT [ 491.938184][ T6792] Hardware name: ARM-Versatile Express [ 491.938199][ T6792] Call trace: [ 491.938223][ T6792] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 491.938290][ T6792] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 491.938300][ T6792] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 491.938332][ T6792] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 491.938374][ T6792] r5:83830000 r4:8294f590 [ 491.938387][ T6792] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 491.938424][ T6792] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 491.938465][ T6792] r8:dfa61eb8 r7:00000000 r6:00000001 r5:76f26f30 r4:00000001 [ 491.938474][ T6792] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 491.938508][ T6792] [<80986bb4>] (should_fail_usercopy) from [<808cff58>] (kstrtouint_from_user+0x54/0x13c) [ 491.938606][ T6792] [<808cff04>] (kstrtouint_from_user) from [<806176b4>] (proc_fail_nth_write+0x40/0xf0) [ 491.938649][ T6792] r8:dfa61f68 r7:83830000 r6:00000001 r5:8615be40 r4:00000001 [ 491.938659][ T6792] [<80617674>] (proc_fail_nth_write) from [<8055f980>] (vfs_write+0xac/0x44c) [ 491.938694][ T6792] r5:8615be40 r4:80617674 [ 491.938703][ T6792] [<8055f8d4>] (vfs_write) from [<8055fe90>] (ksys_write+0x74/0xe8) [ 491.938745][ T6792] r10:00000004 r9:83830000 r8:8020029c r7:00000000 r6:00000002 r5:8615be40 [ 491.938757][ T6792] r4:8615be43 [ 491.938765][ T6792] [<8055fe1c>] (ksys_write) from [<8055ff14>] (sys_write+0x10/0x14) [ 491.938802][ T6792] r7:00000004 r6:00000005 r5:76f26f30 r4:00000001 [ 491.938811][ T6792] [<8055ff04>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 491.938839][ T6792] Exception stack(0xdfa61fa8 to 0xdfa61ff0) [ 491.938862][ T6792] 1fa0: 00000001 76f26f30 00000005 76f26f30 00000001 00000000 [ 491.938883][ T6792] 1fc0: 00000001 76f26f30 00000005 00000004 00300000 00000000 00006364 76f270bc [ 491.938933][ T6792] 1fe0: 00000158 76f26ed0 000d862c 00130904 [ 492.065272][ T6795] FAULT_INJECTION: forcing a failure. [ 492.065272][ T6795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 492.068952][ T6795] CPU: 0 UID: 0 PID: 6795 Comm: syz.0.1037 Not tainted syzkaller #0 PREEMPT [ 492.069053][ T6795] Hardware name: ARM-Versatile Express [ 492.069068][ T6795] Call trace: [ 492.069094][ T6795] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 492.069158][ T6795] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 492.069168][ T6795] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 492.069198][ T6795] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 492.069229][ T6795] r5:855b3000 r4:8294f590 [ 492.069237][ T6795] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 492.069271][ T6795] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 492.069316][ T6795] r8:76f26f30 r7:00000000 r6:00000000 r5:ea639f68 r4:00000002 [ 492.069326][ T6795] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 492.069356][ T6795] [<80986bb4>] (should_fail_usercopy) from [<8059a0d4>] (simple_read_from_buffer+0x80/0x13c) [ 492.069391][ T6795] [<8059a054>] (simple_read_from_buffer) from [<806161fc>] (proc_fail_nth_read+0xb8/0x108) [ 492.069428][ T6795] r10:00000001 r9:80616144 r8:00000002 r7:ea639f68 r6:0000000f r5:76f26f30 [ 492.069441][ T6795] r4:855b3000 r3:ea639e9f [ 492.069449][ T6795] [<80616144>] (proc_fail_nth_read) from [<8055f084>] (vfs_read+0x98/0x324) [ 492.069485][ T6795] r8:76f26f30 r7:ea639f68 r6:855b3000 r5:0000000f r4:8615bc00 [ 492.069494][ T6795] [<8055efec>] (vfs_read) from [<8055fd94>] (ksys_read+0x74/0xe8) [ 492.069529][ T6795] r10:00000003 r9:855b3000 r8:8020029c r7:00000000 r6:00000000 r5:8615bc00 [ 492.069540][ T6795] r4:8615bc03 [ 492.069548][ T6795] [<8055fd20>] (ksys_read) from [<8055fe18>] (sys_read+0x10/0x14) [ 492.069584][ T6795] r7:00000003 r6:00000004 r5:76f26f30 r4:0000000f [ 492.069593][ T6795] [<8055fe08>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 492.069619][ T6795] Exception stack(0xea639fa8 to 0xea639ff0) [ 492.069641][ T6795] 9fa0: 0000000f 76f26f30 00000004 76f26f30 0000000f 00000000 [ 492.069660][ T6795] 9fc0: 0000000f 76f26f30 00000004 00000003 00300000 00000000 00006364 76f270bc [ 492.069675][ T6795] 9fe0: 00000158 76f26ed0 000d862c 0013083c [ 494.012478][ T29] audit: type=1400 audit(493.930:473): avc: denied { setopt } for pid=6802 comm="syz.1.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 494.340169][ T6807] FAULT_INJECTION: forcing a failure. [ 494.340169][ T6807] name failslab, interval 1, probability 0, space 0, times 0 [ 494.340742][ T6807] CPU: 0 UID: 0 PID: 6807 Comm: syz.0.1041 Not tainted syzkaller #0 PREEMPT [ 494.340855][ T6807] Hardware name: ARM-Versatile Express [ 494.340886][ T6807] Call trace: [ 494.340937][ T6807] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 494.341061][ T6807] r7:00400cc0 r6:00000000 r5:60000013 r4:82252424 [ 494.341088][ T6807] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 494.341154][ T6807] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 494.341213][ T6807] r5:83836c00 r4:82918810 [ 494.341229][ T6807] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 494.341608][ T6807] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 494.341758][ T6807] r8:00000000 r7:00400cc0 r6:00000016 r5:00000015 r4:83002000 [ 494.341789][ T6807] [<8052efe0>] (should_failslab) from [<805115c0>] (__kmalloc_node_track_caller_noprof+0xa0/0x574) [ 494.342021][ T6807] [<80511520>] (__kmalloc_node_track_caller_noprof) from [<804a481c>] (kstrdup+0x38/0x64) [ 494.342167][ T6807] r10:00000001 r9:ea65de5c r8:830cf330 r7:80598794 r6:ea65de5c r5:00000015 [ 494.342328][ T6807] r4:00400cc0 [ 494.342565][ T6807] [<804a47e4>] (kstrdup) from [<80598794>] (simple_xattr_set+0x40/0x184) [ 494.342683][ T6807] r7:83be4038 r6:8615df00 r5:ea65de5c r4:85423a80 [ 494.342754][ T6807] [<80598754>] (simple_xattr_set) from [<8049c0ec>] (shmem_xattr_handler_set+0x194/0x1a8) [ 494.342831][ T6807] r9:ea65de5c r8:830cf330 r7:000000eb r6:830cf300 r5:83be4058 r4:85423a80 [ 494.342854][ T6807] [<8049bf58>] (shmem_xattr_handler_set) from [<8059696c>] (__vfs_setxattr+0xb4/0xc8) [ 494.342926][ T6807] r9:8049bf58 r8:000000ae r7:85423a80 r6:8341d220 r5:8291f61c r4:83be4058 [ 494.342948][ T6807] [<805968b8>] (__vfs_setxattr) from [<80597398>] (__vfs_setxattr_noperm+0x7c/0x204) [ 494.343129][ T6807] r9:8291f61c r8:85423a80 r7:83be4058 r6:00000001 r5:ea65de5c r4:8341d220 [ 494.343155][ T6807] [<8059731c>] (__vfs_setxattr_noperm) from [<80597608>] (__vfs_setxattr_locked+0xe8/0x118) [ 494.343227][ T6807] r10:ea65ddc0 r9:000000ae r8:83be4058 r7:85423a80 r6:ea65de5c r5:8291f61c [ 494.343252][ T6807] r4:8341d220 [ 494.343269][ T6807] [<80597520>] (__vfs_setxattr_locked) from [<805976c8>] (vfs_setxattr+0x90/0x180) [ 494.343504][ T6807] r8:8291f61c r7:ea65de5c r6:8341d220 r5:83be40d8 r4:ea65de48 [ 494.343654][ T6807] [<80597638>] (vfs_setxattr) from [<8059784c>] (do_setxattr+0x94/0x9c) [ 494.343775][ T6807] r10:000000e4 r9:8341d220 r8:8291f61c r7:85423a80 r6:000000ae r5:ea65de5c [ 494.343990][ T6807] r4:ea65de48 [ 494.344103][ T6807] [<805977b8>] (do_setxattr) from [<80597a88>] (file_setxattr+0x58/0x78) [ 494.344282][ T6807] r9:83836c00 r8:20002c80 r7:00000003 r6:ea65de48 r5:85913600 r4:00000000 [ 494.344333][ T6807] [<80597a30>] (file_setxattr) from [<80597c8c>] (path_setxattrat+0x104/0x17c) [ 494.344542][ T6807] r7:00000003 r6:85913600 r5:85913601 r4:00000000 [ 494.344790][ T6807] [<80597b88>] (path_setxattrat) from [<80597f04>] (sys_fsetxattr+0x30/0x38) [ 494.344918][ T6807] r8:8020029c r7:000000e4 r6:00130918 r5:00000000 r4:00000001 [ 494.344942][ T6807] [<80597ed4>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 494.345034][ T6807] Exception stack(0xea65dfa8 to 0xea65dff0) [ 494.345189][ T6807] dfa0: 00000001 00000000 00000003 20002c40 20002c80 000000ae [ 494.345279][ T6807] dfc0: 00000001 00000000 00130918 000000e4 00300000 00000000 00006364 76f270bc [ 494.345375][ T6807] dfe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 494.694014][ T29] audit: type=1400 audit(494.610:474): avc: denied { create } for pid=6810 comm="syz.0.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 495.311794][ T6822] : renamed from veth1_to_bond (while UP) [ 497.889997][ T6828] FAULT_INJECTION: forcing a failure. [ 497.889997][ T6828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.903811][ T6828] CPU: 0 UID: 0 PID: 6828 Comm: syz.1.1049 Not tainted syzkaller #0 PREEMPT [ 497.903940][ T6828] Hardware name: ARM-Versatile Express [ 497.903970][ T6828] Call trace: [ 497.904019][ T6828] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 497.904141][ T6828] r7:00006364 r6:00000000 r5:60000113 r4:82252424 [ 497.904166][ T6828] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 497.904226][ T6828] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 497.904285][ T6828] r5:83b7d400 r4:8294f590 [ 497.904302][ T6828] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 497.904371][ T6828] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 497.904439][ T6828] r8:00000000 r7:00006364 r6:76f840bc r5:83b7dc30 r4:76f83bb8 [ 497.904492][ T6828] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 497.904558][ T6828] [<80986bb4>] (should_fail_usercopy) from [<8022b414>] (setup_sigframe+0xe4/0x1c4) [ 497.904616][ T6828] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 497.904684][ T6828] r10:b5003500 r9:76f83bb8 r8:00000000 r7:83b7dc30 r6:76f83b38 r5:ea639fb0 [ 497.904706][ T6828] r4:83b7d400 [ 497.904723][ T6828] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 497.904775][ T6828] Exception stack(0xea639fb0 to 0xea639ff8) [ 497.904813][ T6828] 9fa0: 00000009 20000240 00040810 00000000 [ 497.904847][ T6828] 9fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f840bc [ 497.904881][ T6828] 9fe0: 76f83ec0 76f83eb0 0001928c 0013296c 60000010 00000009 [ 497.904931][ T6828] r10:00000128 r9:83b7d400 r8:8020029c r7:00000128 r6:00130918 r5:00000000 [ 497.904955][ T6828] r4:00000000 [ 498.233634][ T29] audit: type=1400 audit(498.150:475): avc: denied { mounton } for pid=6827 comm="syz.1.1049" path="/554/file0" dev="tmpfs" ino=2911 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 501.045284][ T29] audit: type=1400 audit(500.960:476): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 501.364185][ T5965] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.434543][ T5965] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.515547][ T5965] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.596740][ T29] audit: type=1400 audit(501.510:477): avc: denied { execute } for pid=6854 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 501.607093][ T29] audit: type=1400 audit(501.520:478): avc: denied { execute_no_trans } for pid=6854 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 501.624210][ T5965] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.673397][ T29] audit: type=1400 audit(501.590:479): avc: denied { mounton } for pid=6855 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 502.111165][ T5965] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 502.128150][ T5965] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 502.131562][ T5965] bond0 (unregistering): Released all slaves [ 502.236963][ T5965] hsr_slave_0: left promiscuous mode [ 502.257477][ T5965] hsr_slave_1: left promiscuous mode [ 502.269311][ T5965] veth1_macvtap: left promiscuous mode [ 502.277397][ T5965] veth0_macvtap: left promiscuous mode [ 502.278859][ T5965] veth1_vlan: left promiscuous mode [ 502.280235][ T5965] veth0_vlan: left promiscuous mode [ 502.996615][ T29] audit: type=1400 audit(502.910:480): avc: denied { write } for pid=6875 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 502.997043][ T29] audit: type=1400 audit(502.910:481): avc: denied { open } for pid=6875 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 503.343032][ T29] audit: type=1400 audit(503.260:482): avc: denied { search } for pid=6877 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 503.343442][ T29] audit: type=1400 audit(503.260:483): avc: denied { search } for pid=6877 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 503.343489][ T29] audit: type=1400 audit(503.260:484): avc: denied { search } for pid=6877 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 503.352630][ T29] audit: type=1400 audit(503.260:485): avc: denied { search } for pid=6877 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 505.231346][ T6855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 505.244406][ T6855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 506.819959][ T6855] hsr_slave_0: entered promiscuous mode [ 506.822123][ T6855] hsr_slave_1: entered promiscuous mode [ 507.338730][ T6855] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 507.360047][ T6855] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 507.368553][ T6855] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 507.381617][ T6855] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 508.050472][ T7241] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=7241 comm=syz.0.1067 [ 508.203656][ T7245] FAULT_INJECTION: forcing a failure. [ 508.203656][ T7245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 508.207481][ T7245] CPU: 0 UID: 0 PID: 7245 Comm: syz.0.1068 Not tainted syzkaller #0 PREEMPT [ 508.207659][ T7245] Hardware name: ARM-Versatile Express [ 508.207692][ T7245] Call trace: [ 508.207746][ T7245] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 508.207878][ T7245] r7:00000000 r6:00000000 r5:60000113 r4:82252424 [ 508.207925][ T7245] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 508.207989][ T7245] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 508.208054][ T7245] r5:8417ec00 r4:8294f590 [ 508.208074][ T7245] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 508.208144][ T7245] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 508.208219][ T7245] r8:8020029c r7:00000000 r6:824578b8 r5:20000000 r4:20000000 [ 508.208239][ T7245] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 508.208302][ T7245] [<80986bb4>] (should_fail_usercopy) from [<8098cc34>] (strncpy_from_user+0x20/0x1a0) [ 508.208371][ T7245] [<8098cc14>] (strncpy_from_user) from [<8056e6b0>] (getname_flags.part.0+0x44/0x18c) [ 508.208443][ T7245] r10:00000142 r9:8417ec00 r8:8020029c r7:00000000 r6:824578b8 r5:20000000 [ 508.208464][ T7245] r4:832e1000 [ 508.208482][ T7245] [<8056e66c>] (getname_flags.part.0) from [<80573704>] (getname_flags+0x3c/0x50) [ 508.208553][ T7245] r9:8417ec00 r8:8020029c r7:ffffff9c r6:eb825f58 r5:00000000 r4:20000000 [ 508.208572][ T7245] [<805736c8>] (getname_flags) from [<8055bf94>] (do_sys_openat2+0x60/0xe0) [ 508.208638][ T7245] r5:20000000 r4:00000000 [ 508.208657][ T7245] [<8055bf34>] (do_sys_openat2) from [<8055c3ec>] (sys_openat+0x98/0xd4) [ 508.208721][ T7245] r7:00000142 r6:00130918 r5:20000000 r4:ffffff9c [ 508.208741][ T7245] [<8055c354>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 508.208790][ T7245] Exception stack(0xeb825fa8 to 0xeb825ff0) [ 508.208837][ T7245] 5fa0: 00000000 00000000 ffffff9c 20000000 00000800 00000000 [ 508.208876][ T7245] 5fc0: 00000000 00000000 00130918 00000142 00300000 00000000 00006364 76f270bc [ 508.208907][ T7245] 5fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 508.208935][ T7245] r5:00000000 r4:00000000 [ 508.614480][ T6855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 511.311520][ T6855] veth0_vlan: entered promiscuous mode [ 511.343048][ T6855] veth1_vlan: entered promiscuous mode [ 511.435424][ T6855] veth0_macvtap: entered promiscuous mode [ 511.457208][ T6855] veth1_macvtap: entered promiscuous mode [ 511.521676][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 511.522026][ T29] audit: type=1400 audit(511.440:499): avc: denied { append } for pid=7292 comm="syz.0.1072" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 511.609540][ T5978] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.610018][ T5978] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.612273][ T5978] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.615273][ T5978] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.703559][ T29] audit: type=1400 audit(511.620:500): avc: denied { mounton } for pid=6855 comm="syz-executor" path="/syzkaller.wbeZVk/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 511.708651][ T29] audit: type=1400 audit(511.630:501): avc: denied { mount } for pid=6855 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 511.719545][ T29] audit: type=1400 audit(511.640:502): avc: denied { mount } for pid=6855 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 511.733293][ T29] audit: type=1400 audit(511.640:503): avc: denied { mounton } for pid=6855 comm="syz-executor" path="/syzkaller.wbeZVk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 511.735581][ T29] audit: type=1400 audit(511.650:504): avc: denied { mounton } for pid=6855 comm="syz-executor" path="/syzkaller.wbeZVk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13600 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 511.767953][ T29] audit: type=1400 audit(511.680:505): avc: denied { unmount } for pid=6855 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 511.778759][ T29] audit: type=1400 audit(511.690:506): avc: denied { mounton } for pid=6855 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 511.790108][ T29] audit: type=1400 audit(511.700:507): avc: denied { mount } for pid=6855 comm="syz-executor" name="/" dev="gadgetfs" ino=2249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 511.793968][ T29] audit: type=1400 audit(511.710:508): avc: denied { mount } for pid=6855 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 515.008105][ T7321] FAULT_INJECTION: forcing a failure. [ 515.008105][ T7321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.010225][ T7327] FAULT_INJECTION: forcing a failure. [ 515.010225][ T7327] name failslab, interval 1, probability 0, space 0, times 0 [ 515.010444][ T7321] CPU: 1 UID: 0 PID: 7321 Comm: syz.0.1083 Not tainted syzkaller #0 PREEMPT [ 515.010563][ T7321] Hardware name: ARM-Versatile Express [ 515.010594][ T7321] Call trace: [ 515.010683][ T7321] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 515.010803][ T7321] r7:b5403587 r6:00000000 r5:60000013 r4:82252424 [ 515.010826][ T7321] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 515.010880][ T7321] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 515.010939][ T7321] r5:83830c00 r4:8294f590 [ 515.010956][ T7321] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 515.011020][ T7321] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 515.011093][ T7321] r8:00000000 r7:b5403587 r6:00000000 r5:83831430 r4:76f26ca0 [ 515.011114][ T7321] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 515.011175][ T7321] [<80986bb4>] (should_fail_usercopy) from [<8022b2e4>] (preserve_vfp_context+0x78/0xc4) [ 515.011239][ T7321] [<8022b26c>] (preserve_vfp_context) from [<8022b49c>] (setup_sigframe+0x16c/0x1c4) [ 515.011297][ T7321] r5:83831430 r4:76f26bb8 [ 515.011318][ T7321] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 515.011394][ T7321] r10:b5403587 r9:76f26bb8 r8:00000000 r7:83831430 r6:76f26b38 r5:eb80dfb0 [ 515.011416][ T7321] r4:83830c00 [ 515.011433][ T7321] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 515.011483][ T7321] Exception stack(0xeb80dfb0 to 0xeb80dff8) [ 515.011523][ T7321] dfa0: 00000003 200001c0 00008004 00000000 [ 515.011560][ T7321] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 515.011593][ T7321] dfe0: 76f26ec0 76f26eb0 0001928c 0013296c 60000010 00000003 [ 515.011630][ T7321] r10:00000128 r9:83830c00 r8:8020029c r7:00000128 r6:00130918 r5:00000000 [ 515.011651][ T7321] r4:00000000 [ 515.011742][ T7327] CPU: 0 UID: 0 PID: 7327 Comm: syz.2.1084 Not tainted syzkaller #0 PREEMPT [ 515.011855][ T7327] Hardware name: ARM-Versatile Express [ 515.011886][ T7327] Call trace: [ 515.012073][ T7327] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 515.012285][ T7327] r7:00000c40 r6:00000000 r5:60000013 r4:82252424 [ 515.012345][ T7327] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 515.012440][ T7327] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 515.012501][ T7327] r5:8417ec00 r4:82918810 [ 515.012549][ T7327] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 515.012643][ T7327] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 515.012775][ T7327] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 515.012800][ T7327] [<8052efe0>] (should_failslab) from [<8050a534>] (__kmalloc_noprof+0x9c/0x568) [ 515.012923][ T7327] [<8050a498>] (__kmalloc_noprof) from [<807d32c8>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 515.012998][ T7327] r10:84ebd900 r9:8309e400 r8:00000000 r7:83409bb0 r6:84ebd928 r5:00001000 [ 515.013022][ T7327] r4:00000000 [ 515.013037][ T7327] [<807d328c>] (tomoyo_realpath_from_path) from [<807cf6bc>] (tomoyo_check_open_permission+0x150/0x1c0) [ 515.013211][ T7327] r10:84ebd900 r9:00000006 r8:8492c600 r7:00000002 r6:00000000 r5:84ebd928 [ 515.013419][ T7327] r4:00000001 r3:00000001 [ 515.013613][ T7327] [<807cf56c>] (tomoyo_check_open_permission) from [<807d4170>] (tomoyo_file_open+0x34/0x38) [ 515.013806][ T7327] r9:00000000 r8:84ebd928 r7:00000000 r6:8327c448 r5:81c1fb2c r4:84ebd900 [ 515.013922][ T7327] [<807d413c>] (tomoyo_file_open) from [<80790540>] (security_file_open+0x54/0x194) [ 515.014049][ T7327] r5:81c1fb2c r4:84ebd900 [ 515.014068][ T7327] [<807904ec>] (security_file_open) from [<80559b20>] (do_dentry_open+0xe4/0x4d0) [ 515.014168][ T7327] r5:81c1fb2c r4:84ebd900 [ 515.014216][ T7327] [<80559a3c>] (do_dentry_open) from [<8055ba64>] (vfs_open+0x2c/0xe8) [ 515.014343][ T7327] r9:00000000 r8:eb889e58 r7:00000000 r6:84ebd928 r5:8291f61c r4:84ebd900 [ 515.014433][ T7327] [<8055ba38>] (vfs_open) from [<80574504>] (path_openat+0x30c/0x1150) [ 515.014494][ T7327] r6:eb889f20 r5:8291f61c r4:00000002 [ 515.014511][ T7327] [<805741f8>] (path_openat) from [<805753f4>] (do_filp_open+0xac/0x148) [ 515.014588][ T7327] r10:00000142 r9:83857000 r8:00000001 r7:eb889e58 r6:eb889f20 r5:8417ec00 [ 515.014720][ T7327] r4:ffffffff [ 515.014742][ T7327] [<80575348>] (do_filp_open) from [<8055bfc4>] (do_sys_openat2+0x90/0xe0) [ 515.014864][ T7327] r9:8417ec00 r8:8020029c r7:ffffffff r6:eb889f58 r5:83857000 r4:00000005 [ 515.014887][ T7327] [<8055bf34>] (do_sys_openat2) from [<8055c3ec>] (sys_openat+0x98/0xd4) [ 515.015036][ T7327] r7:00000142 r6:00130918 r5:20000000 r4:ffffffff [ 515.015167][ T7327] [<8055c354>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 515.015323][ T7327] Exception stack(0xeb889fa8 to 0xeb889ff0) [ 515.015368][ T7327] 9fa0: 00000000 00000000 ffffffff 20000000 00000002 00000000 [ 515.015539][ T7327] 9fc0: 00000000 00000000 00130918 00000142 00300000 00000000 00006364 76fcd0bc [ 515.015639][ T7327] 9fe0: 76fccec0 76fcceb0 0001928c 00132970 [ 515.015781][ T7327] r5:00000000 r4:00000000 [ 515.022815][ T7327] ERROR: Out of memory at tomoyo_realpath_from_path. [ 516.798598][ T7348] FAULT_INJECTION: forcing a failure. [ 516.798598][ T7348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 516.800483][ T7348] CPU: 1 UID: 0 PID: 7348 Comm: syz.2.1091 Not tainted syzkaller #0 PREEMPT [ 516.800593][ T7348] Hardware name: ARM-Versatile Express [ 516.800623][ T7348] Call trace: [ 516.800672][ T7348] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 516.800782][ T7348] r7:ebbd1e20 r6:00000000 r5:60000013 r4:82252424 [ 516.800804][ T7348] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 516.800859][ T7348] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 516.800916][ T7348] r5:83b89800 r4:8294f590 [ 516.800932][ T7348] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 516.800997][ T7348] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 516.801066][ T7348] r8:00004010 r7:ebbd1e20 r6:20000380 r5:00000000 r4:ebbd1f20 [ 516.801085][ T7348] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 516.801136][ T7348] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 516.801196][ T7348] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 516.801260][ T7348] r8:00004010 r7:00000000 r6:8366b180 r5:ebbd1f20 r4:ebbd1e64 [ 516.801281][ T7348] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 516.801362][ T7348] r10:00000128 r9:83b89800 r8:8491c0c0 r7:00004010 r6:20000380 r5:8491c0c1 [ 516.801388][ T7348] r4:00000003 [ 516.801405][ T7348] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 516.801474][ T7348] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 516.801495][ T7348] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 516.801548][ T7348] Exception stack(0xebbd1fa8 to 0xebbd1ff0) [ 516.801589][ T7348] 1fa0: 00000000 00000000 00000003 20000380 00004010 00000000 [ 516.801757][ T7348] 1fc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76fcd0bc [ 516.801801][ T7348] 1fe0: 76fccec0 76fcceb0 0001928c 00132970 [ 519.378398][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 519.378864][ T29] audit: type=1400 audit(519.300:513): avc: denied { create } for pid=7376 comm="syz.0.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 519.746597][ T7384] FAULT_INJECTION: forcing a failure. [ 519.746597][ T7384] name failslab, interval 1, probability 0, space 0, times 0 [ 519.747576][ T7384] CPU: 1 UID: 0 PID: 7384 Comm: syz.0.1104 Not tainted syzkaller #0 PREEMPT [ 519.747645][ T7384] Hardware name: ARM-Versatile Express [ 519.747660][ T7384] Call trace: [ 519.747683][ T7384] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 519.747746][ T7384] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 519.747756][ T7384] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 519.747784][ T7384] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 519.747813][ T7384] r5:83b7d400 r4:82918810 [ 519.747821][ T7384] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 519.747853][ T7384] [<80986974>] (should_fail_ex) from [<8052f04c>] (should_failslab+0x6c/0x94) [ 519.747892][ T7384] r8:83b7d400 r7:00000000 r6:00000cc0 r5:20000040 r4:830a4a80 [ 519.747928][ T7384] [<8052efe0>] (should_failslab) from [<8050ece8>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 519.747959][ T7384] [<8050ec9c>] (kmem_cache_alloc_noprof) from [<8056e694>] (getname_flags.part.0+0x28/0x18c) [ 519.748005][ T7384] r10:00000142 r9:83b7d400 r8:8020029c r7:00000000 r6:824578b8 r5:20000040 [ 519.748016][ T7384] r4:20000040 [ 519.748024][ T7384] [<8056e66c>] (getname_flags.part.0) from [<80573704>] (getname_flags+0x3c/0x50) [ 519.748061][ T7384] r9:83b7d400 r8:8020029c r7:ffffff9c r6:ebd41f58 r5:00000000 r4:20000040 [ 519.748070][ T7384] [<805736c8>] (getname_flags) from [<8055bf94>] (do_sys_openat2+0x60/0xe0) [ 519.748101][ T7384] r5:20000040 r4:00000000 [ 519.748116][ T7384] [<8055bf34>] (do_sys_openat2) from [<8055c3ec>] (sys_openat+0x98/0xd4) [ 519.748147][ T7384] r7:00000142 r6:00130918 r5:20000040 r4:ffffff9c [ 519.748155][ T7384] [<8055c354>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 519.748179][ T7384] Exception stack(0xebd41fa8 to 0xebd41ff0) [ 519.748202][ T7384] 1fa0: 00000000 00000000 ffffff9c 20000040 00000000 00000000 [ 519.748221][ T7384] 1fc0: 00000000 00000000 00130918 00000142 00300000 00000000 00006364 76f270bc [ 519.748234][ T7384] 1fe0: 76f26ec0 76f26eb0 0001928c 00132970 [ 519.748247][ T7384] r5:00000000 r4:00000000 [ 520.025202][ T7392] can: request_module (can-proto-4) failed. [ 520.057250][ T29] audit: type=1400 audit(519.970:514): avc: denied { map } for pid=7391 comm="syz.2.1106" path="socket:[13162]" dev="sockfs" ino=13162 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 520.745117][ T7410] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1112'. [ 525.422953][ T29] audit: type=1400 audit(525.340:515): avc: denied { prog_run } for pid=7454 comm="syz.0.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 527.563750][ T7463] FAULT_INJECTION: forcing a failure. [ 527.563750][ T7463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.585800][ T7463] CPU: 1 UID: 0 PID: 7463 Comm: syz.0.1123 Not tainted syzkaller #0 PREEMPT [ 527.586040][ T7463] Hardware name: ARM-Versatile Express [ 527.586072][ T7463] Call trace: [ 527.586121][ T7463] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 527.586252][ T7463] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 527.586274][ T7463] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 527.586337][ T7463] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 527.586410][ T7463] r5:832eec00 r4:8294f590 [ 527.586429][ T7463] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 527.586499][ T7463] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 527.586571][ T7463] r8:76f26f30 r7:00000000 r6:00000000 r5:ebefdf68 r4:00000002 [ 527.586591][ T7463] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 527.586651][ T7463] [<80986bb4>] (should_fail_usercopy) from [<8059a0d4>] (simple_read_from_buffer+0x80/0x13c) [ 527.586719][ T7463] [<8059a054>] (simple_read_from_buffer) from [<806161fc>] (proc_fail_nth_read+0xb8/0x108) [ 527.586793][ T7463] r10:00000001 r9:80616144 r8:00000002 r7:ebefdf68 r6:0000000f r5:76f26f30 [ 527.586821][ T7463] r4:832eec00 r3:ebefde9f [ 527.586842][ T7463] [<80616144>] (proc_fail_nth_read) from [<8055f084>] (vfs_read+0x98/0x324) [ 527.586913][ T7463] r8:76f26f30 r7:ebefdf68 r6:832eec00 r5:0000000f r4:86158300 [ 527.586935][ T7463] [<8055efec>] (vfs_read) from [<8055fd94>] (ksys_read+0x74/0xe8) [ 527.593568][ T7463] r10:00000003 r9:832eec00 r8:8020029c r7:00000000 r6:00000000 r5:86158300 [ 527.594055][ T7463] r4:86158303 [ 527.594082][ T7463] [<8055fd20>] (ksys_read) from [<8055fe18>] (sys_read+0x10/0x14) [ 527.594198][ T7463] r7:00000003 r6:00000004 r5:76f26f30 r4:0000000f [ 527.594218][ T7463] [<8055fe08>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 527.594273][ T7463] Exception stack(0xebefdfa8 to 0xebefdff0) [ 527.594331][ T7463] dfa0: 0000000f 76f26f30 00000004 76f26f30 0000000f 00000000 [ 527.594370][ T7463] dfc0: 0000000f 76f26f30 00000004 00000003 00300000 00000000 00006364 76f270bc [ 527.594408][ T7463] dfe0: 00000158 76f26ed0 000d862c 0013083c [ 528.484201][ T7469] FAULT_INJECTION: forcing a failure. [ 528.484201][ T7469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 528.484632][ T7469] CPU: 0 UID: 0 PID: 7469 Comm: syz.0.1125 Not tainted syzkaller #0 PREEMPT [ 528.484744][ T7469] Hardware name: ARM-Versatile Express [ 528.484804][ T7469] Call trace: [ 528.484858][ T7469] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 528.484994][ T7469] r7:00000000 r6:00000000 r5:60000013 r4:82252424 [ 528.485019][ T7469] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 528.485079][ T7469] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 528.485136][ T7469] r5:83830000 r4:8294f590 [ 528.485154][ T7469] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 528.485333][ T7469] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 528.485488][ T7469] r8:76f05f30 r7:00000000 r6:00000000 r5:ebf49f68 r4:00000002 [ 528.485736][ T7469] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 528.485839][ T7469] [<80986bb4>] (should_fail_usercopy) from [<8059a0d4>] (simple_read_from_buffer+0x80/0x13c) [ 528.486274][ T7469] [<8059a054>] (simple_read_from_buffer) from [<806161fc>] (proc_fail_nth_read+0xb8/0x108) [ 528.486462][ T7469] r10:00000001 r9:80616144 r8:00000002 r7:ebf49f68 r6:0000000f r5:76f05f30 [ 528.486518][ T7469] r4:83830000 r3:ebf49e9f [ 528.486597][ T7469] [<80616144>] (proc_fail_nth_read) from [<8055f084>] (vfs_read+0x98/0x324) [ 528.486667][ T7469] r8:76f05f30 r7:ebf49f68 r6:83830000 r5:0000000f r4:85b95540 [ 528.486705][ T7469] [<8055efec>] (vfs_read) from [<8055fd94>] (ksys_read+0x74/0xe8) [ 528.486790][ T7469] r10:00000003 r9:83830000 r8:8020029c r7:00000000 r6:00000000 r5:85b95540 [ 528.486809][ T7469] r4:85b95543 [ 528.486826][ T7469] [<8055fd20>] (ksys_read) from [<8055fe18>] (sys_read+0x10/0x14) [ 528.486887][ T7469] r7:00000003 r6:00000004 r5:76f05f30 r4:0000000f [ 528.486903][ T7469] [<8055fe08>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 528.486950][ T7469] Exception stack(0xebf49fa8 to 0xebf49ff0) [ 528.487027][ T7469] 9fa0: 0000000f 76f05f30 00000004 76f05f30 0000000f 00000000 [ 528.487130][ T7469] 9fc0: 0000000f 76f05f30 00000004 00000003 00300000 00000000 00006364 76f060bc [ 528.487161][ T7469] 9fe0: 00000158 76f05ed0 000d862c 0013083c [ 541.042252][ T7550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7550 comm=syz.2.1144 [ 555.719731][ T7628] FAULT_INJECTION: forcing a failure. [ 555.719731][ T7628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.720236][ T7628] CPU: 0 UID: 0 PID: 7628 Comm: syz.0.1172 Not tainted syzkaller #0 PREEMPT [ 555.720342][ T7628] Hardware name: ARM-Versatile Express [ 555.720374][ T7628] Call trace: [ 555.720436][ T7628] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 555.720570][ T7628] r7:76f26b58 r6:00000000 r5:60000013 r4:82252424 [ 555.720593][ T7628] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 555.720652][ T7628] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 555.720712][ T7628] r5:84c19800 r4:8294f590 [ 555.720731][ T7628] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 555.720800][ T7628] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 555.720876][ T7628] r8:b5003587 r7:76f26b58 r6:76f26b38 r5:e835df58 r4:76f26b38 [ 555.720895][ T7628] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 555.720952][ T7628] [<80986bb4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 555.721014][ T7628] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 555.721093][ T7628] r9:fffffe00 r8:b5003587 r7:84c1a030 r6:76f26b38 r5:e835dfb0 r4:84c19800 [ 555.721115][ T7628] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 555.721172][ T7628] Exception stack(0xe835dfb0 to 0xe835dff8) [ 555.721212][ T7628] dfa0: 00000003 20000240 0000cc00 00000000 [ 555.721252][ T7628] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76f270bc [ 555.721286][ T7628] dfe0: 76f26ec0 76f26eb0 0001928c 0013296c 60000010 00000003 [ 555.721325][ T7628] r10:00000128 r9:84c19800 r8:8020029c r7:00000128 r6:00130918 r5:00000000 [ 555.721348][ T7628] r4:00000000 [ 558.388535][ T29] audit: type=1400 audit(558.290:516): avc: denied { block_suspend } for pid=7645 comm="syz.2.1178" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 558.947252][ T29] audit: type=1400 audit(558.860:517): avc: denied { setopt } for pid=7654 comm="syz.2.1180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 559.458305][ C1] vkms_vblank_simulate: vblank timer overrun [ 561.422413][ C1] vkms_vblank_simulate: vblank timer overrun [ 562.176548][ C1] vkms_vblank_simulate: vblank timer overrun [ 573.113703][ T5984] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.294865][ T5984] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.532549][ T5984] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.689701][ T5984] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.145376][ T5984] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 574.169030][ T5984] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 574.192122][ T5984] bond0 (unregistering): Released all slaves [ 574.300957][ T5984] hsr_slave_0: left promiscuous mode [ 574.308375][ T5984] hsr_slave_1: left promiscuous mode [ 574.338415][ T5984] veth1_macvtap: left promiscuous mode [ 574.339785][ T5984] veth0_macvtap: left promiscuous mode [ 574.341301][ T5984] veth1_vlan: left promiscuous mode [ 574.342445][ T5984] veth0_vlan: left promiscuous mode [ 577.942486][ T7760] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 577.951218][ T7760] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 579.334437][ T7760] hsr_slave_0: entered promiscuous mode [ 579.340037][ T7760] hsr_slave_1: entered promiscuous mode [ 579.355494][ T7760] debugfs: 'hsr0' already exists in 'hsr' [ 579.358379][ T7760] Cannot create hsr debugfs directory [ 580.234288][ T7760] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 580.250238][ T7760] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 580.262482][ T7760] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 580.275767][ T7760] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 581.611633][ T7760] 8021q: adding VLAN 0 to HW filter on device bond0 [ 586.450129][ T7760] veth0_vlan: entered promiscuous mode [ 586.508805][ T7760] veth1_vlan: entered promiscuous mode [ 586.589864][ T7760] veth0_macvtap: entered promiscuous mode [ 586.605510][ T7760] veth1_macvtap: entered promiscuous mode [ 586.703870][ T5967] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.704548][ T5967] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.704673][ T5967] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.704756][ T5967] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 590.963320][ C1] hrtimer: interrupt took 65490272 ns [ 593.910614][ C0] vkms_vblank_simulate: vblank timer overrun [ 593.974613][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.026461][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.074473][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.206245][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.278604][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.490135][ C0] vkms_vblank_simulate: vblank timer overrun [ 594.744204][ C0] vkms_vblank_simulate: vblank timer overrun [ 595.586478][ C0] vkms_vblank_simulate: vblank timer overrun [ 616.036608][ T29] audit: type=1400 audit(615.920:518): avc: denied { bind } for pid=8385 comm="syz.0.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 616.044730][ T29] audit: type=1400 audit(615.960:519): avc: denied { read } for pid=8385 comm="syz.0.1304" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 655.267954][ T8551] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1368'. [ 702.651190][ T29] audit: type=1400 audit(702.570:520): avc: denied { create } for pid=8744 comm="syz.0.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 704.573548][ C1] vkms_vblank_simulate: vblank timer overrun [ 704.641937][ C1] vkms_vblank_simulate: vblank timer overrun [ 707.402665][ C1] vkms_vblank_simulate: vblank timer overrun [ 708.266722][ C1] vkms_vblank_simulate: vblank timer overrun [ 715.462568][ T29] audit: type=1400 audit(715.360:521): avc: denied { create } for pid=8815 comm="syz.2.1468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 716.178132][ C1] vkms_vblank_simulate: vblank timer overrun [ 717.946708][ C1] vkms_vblank_simulate: vblank timer overrun [ 718.346658][ C1] vkms_vblank_simulate: vblank timer overrun [ 719.324225][ C1] vkms_vblank_simulate: vblank timer overrun [ 719.978182][ C1] vkms_vblank_simulate: vblank timer overrun [ 723.563620][ T8846] FAULT_INJECTION: forcing a failure. [ 723.563620][ T8846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 723.576438][ T8846] CPU: 1 UID: 0 PID: 8846 Comm: syz.2.1479 Not tainted syzkaller #0 PREEMPT [ 723.576580][ T8846] Hardware name: ARM-Versatile Express [ 723.576606][ T8846] Call trace: [ 723.576649][ T8846] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 723.576759][ T8846] r7:ed68de20 r6:00000000 r5:60000013 r4:82252424 [ 723.576777][ T8846] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 723.576826][ T8846] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 723.576876][ T8846] r5:8473b000 r4:8294f590 [ 723.576891][ T8846] [<8021f8bc>] (dump_stack) from [<80986b38>] (should_fail_ex+0x1c4/0x228) [ 723.576947][ T8846] [<80986974>] (should_fail_ex) from [<80986bb0>] (should_fail+0x14/0x18) [ 723.577008][ T8846] r8:00040010 r7:ed68de20 r6:20000c00 r5:00000000 r4:ed68df20 [ 723.577023][ T8846] [<80986b9c>] (should_fail) from [<80986bd0>] (should_fail_usercopy+0x1c/0x20) [ 723.577072][ T8846] [<80986bb4>] (should_fail_usercopy) from [<81559018>] (copy_msghdr_from_user+0x50/0x130) [ 723.577129][ T8846] [<81558fc8>] (copy_msghdr_from_user) from [<81559170>] (___sys_sendmsg+0x78/0xd0) [ 723.577197][ T8846] r8:00040010 r7:00000000 r6:8366a000 r5:ed68df20 r4:ed68de64 [ 723.577214][ T8846] [<815590f8>] (___sys_sendmsg) from [<8155962c>] (__sys_sendmsg+0x8c/0xe0) [ 723.577275][ T8846] r10:00000128 r9:8473b000 r8:85913000 r7:00040010 r6:20000c00 r5:85913001 [ 723.577294][ T8846] r4:00000003 [ 723.577309][ T8846] [<815595a0>] (__sys_sendmsg) from [<81559694>] (sys_sendmsg+0x14/0x18) [ 723.577368][ T8846] r8:8020029c r7:00000128 r6:00130918 r5:00000000 r4:00000000 [ 723.577384][ T8846] [<81559680>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 723.577429][ T8846] Exception stack(0xed68dfa8 to 0xed68dff0) [ 723.577468][ T8846] dfa0: 00000000 00000000 00000003 20000c00 00040010 00000000 [ 723.577501][ T8846] dfc0: 00000000 00000000 00130918 00000128 00300000 00000000 00006364 76fcd0bc [ 723.577526][ T8846] dfe0: 76fccec0 76fcceb0 0001928c 00132970 [ 740.773449][ T29] audit: type=1400 audit(740.680:522): avc: denied { mount } for pid=8899 comm="syz.2.1498" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 740.790653][ T8900] ======================================================= [ 740.790653][ T8900] WARNING: The mand mount option has been deprecated and [ 740.790653][ T8900] and is ignored by this kernel. Remove the mand [ 740.790653][ T8900] option from the mount to silence this warning. [ 740.790653][ T8900] ======================================================= [ 740.794036][ T29] audit: type=1400 audit(740.710:523): avc: denied { remount } for pid=8899 comm="syz.2.1498" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 740.945291][ T29] audit: type=1400 audit(740.860:524): avc: denied { unmount } for pid=6855 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 751.664821][ T29] audit: type=1400 audit(751.570:525): avc: denied { create } for pid=8936 comm="syz.0.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 751.992214][ T29] audit: type=1400 audit(751.910:526): avc: denied { create } for pid=8936 comm="syz.0.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 751.999492][ T29] audit: type=1400 audit(751.910:527): avc: denied { setopt } for pid=8936 comm="syz.0.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 755.876757][ T8979] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 755.880000][ T8979] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 756.823506][ T8987] process 'syz.0.1531' launched './file0' with NULL argv: empty string added [ 756.834415][ T29] audit: type=1400 audit(756.740:528): avc: denied { execute_no_trans } for pid=8986 comm="syz.0.1531" path="/139/file0" dev="tmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 760.411639][ T29] audit: type=1400 audit(760.330:529): avc: denied { bind } for pid=8998 comm="syz.0.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 761.334894][ T29] audit: type=1400 audit(761.250:530): avc: denied { write } for pid=9007 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 761.338718][ T29] audit: type=1400 audit(761.260:531): avc: denied { nlmsg_write } for pid=9007 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 761.499992][ T29] audit: type=1400 audit(761.420:532): avc: denied { bind } for pid=8982 comm="syz.2.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 762.062779][ T29] audit: type=1400 audit(761.980:533): avc: denied { map_read map_write } for pid=9014 comm="syz.0.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 787.502964][ T9041] syzkaller0: entered promiscuous mode [ 787.507426][ T9041] syzkaller0: entered allmulticast mode [ 789.104050][ T9050] syz.0.1548 (9050): drop_caches: 2 [ 798.598111][ T9056] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1550'. [ 799.331293][ T9066] netlink: 'syz.0.1554': attribute type 10 has an invalid length. [ 799.334408][ T9066] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1554'. [ 799.339442][ T9066] vxcan0: entered promiscuous mode [ 799.342967][ T9066] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 800.218580][ T29] audit: type=1326 audit(800.130:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.225201][ T29] audit: type=1326 audit(800.140:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.232150][ T29] audit: type=1326 audit(800.140:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.299526][ T29] audit: type=1326 audit(800.220:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.302796][ T29] audit: type=1326 audit(800.220:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.323428][ T29] audit: type=1326 audit(800.230:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.327821][ T29] audit: type=1326 audit(800.250:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.329928][ T29] audit: type=1326 audit(800.250:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.357638][ T29] audit: type=1326 audit(800.270:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 800.819264][ T29] audit: type=1326 audit(800.720:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.2.1557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 802.061471][ T9080] syz.2.1557 uses obsolete (PF_INET,SOCK_PACKET) [ 802.861875][ T9086] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1559'. [ 803.666971][ T9097] ------------[ cut here ]------------ [ 803.667659][ T9097] WARNING: CPU: 1 PID: 9097 at kernel/bpf/verifier.c:21445 bpf_check+0x2dd4/0x2f50 [ 803.669674][ T9097] verifier bug: error during ctx access conversion (2) [ 803.669991][ T9097] Modules linked in: [ 803.670762][ T9097] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 803.671181][ T9097] CPU: 1 UID: 0 PID: 9097 Comm: syz.2.1562 Not tainted syzkaller #0 PREEMPT [ 803.671437][ T9097] Hardware name: ARM-Versatile Express [ 803.671613][ T9097] Call trace: [ 803.671752][ T9097] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 803.672231][ T9097] r7:822406c0 r6:84738c00 r5:00000000 r4:82252424 [ 803.672491][ T9097] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 803.674539][ T9097] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 803.674917][ T9097] r5:00000000 r4:82a78d18 [ 803.675092][ T9097] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 803.675398][ T9097] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 803.675699][ T9097] r7:80400044 [ 803.675898][ T9097] [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c) [ 803.676249][ T9097] r3:8280c684 r2:00000001 r1:82238c24 r0:822406c0 [ 803.676496][ T9097] [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188) [ 803.676838][ T9097] [<80252a2c>] (__warn) from [<80252d9c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 803.677212][ T9097] r8:00000009 r7:82258d80 r6:dfc95bfc r5:84738c00 r4:00000000 [ 803.677512][ T9097] [<80252bb8>] (warn_slowpath_fmt) from [<80400044>] (bpf_check+0x2dd4/0x2f50) [ 803.677929][ T9097] r10:00000000 r9:85a48000 r8:00000008 r7:00000002 r6:00000002 r5:dfc91058 [ 803.686099][ T9097] r4:00000002 [ 803.686404][ T9097] [<803fd270>] (bpf_check) from [<803d1438>] (bpf_prog_load+0x650/0xd74) [ 803.686820][ T9097] r10:dfc95d90 r9:84738c00 r8:85649730 r7:dfc95d50 r6:00000000 r5:00000000 [ 803.687250][ T9097] r4:dfc95eb0 [ 803.687441][ T9097] [<803d0de8>] (bpf_prog_load) from [<803d3290>] (__sys_bpf+0xab8/0x2240) [ 803.687839][ T9097] r10:20000080 r9:84738c00 r8:dfc95ea8 r7:00000000 r6:00000005 r5:dfc95e80 [ 803.688216][ T9097] r4:00000094 [ 803.688392][ T9097] [<803d27d8>] (__sys_bpf) from [<803d4fb8>] (sys_bpf+0x2c/0x48) [ 803.688750][ T9097] r10:00000182 r9:84738c00 r8:8020029c r7:00000182 r6:00316308 r5:00000000 [ 803.689084][ T9097] r4:00000000 [ 803.689269][ T9097] [<803d4f8c>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 803.689607][ T9097] Exception stack(0xdfc95fa8 to 0xdfc95ff0) [ 803.689886][ T9097] 5fa0: 00000000 00000000 00000005 20000080 00000094 00000000 [ 803.690372][ T9097] 5fc0: 00000000 00000000 00316308 00000182 00300000 00000000 00006364 76fcd0bc [ 803.690720][ T9097] 5fe0: 76fccec0 76fcceb0 0001928c 00132970 [ 803.692911][ T9097] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:21:55 Registers: info registers vcpu 0 CPU#0 R00=882bc000 R01=ede77000 R02=00000001 R03=80239bf8 R04=7f045000 R05=00000001 R06=82acb1c4 R07=82aca5a0 R08=7f045000 R09=ede77000 R10=8280c9b4 R11=eaf25d9c R12=eaf25da0 R13=eaf25d70 R14=80230af0 R15=80239c10 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=841f4440 R01=00000078 R02=eaedb000 R03=00000000 R04=82abc155 R05=841f4440 R06=80a8ec84 R07=82abc159 R08=82827128 R09=00000000 R10=00000b29 R11=dfc958c8 R12=00000002 R13=dfc958bc R14=82959484 R15=80a8ecdc PSR=80000093 N--- A S svc32 s00=18000000 s01=00000000 d00=0000000018000000 s02=00000000 s03=0000001d d01=0000001d00000000 s04=71184e00 s05=00000000 d02=0000000071184e00 s06=95000000 s07=00000000 d03=0000000095000000 s08=80000000 s09=00000000 d04=0000000080000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000100 d07=0000010000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=72be5d74 s33=80deb1fe d16=80deb1fe72be5d74 s34=9bdc06a7 s35=c19bf274 d17=c19bf2749bdc06a7 s36=b97008fd s37=786a9a6f d18=786a9a6fb97008fd s38=4e3df0ea s39=e42cd2fc d19=e42cd2fc4e3df0ea s40=edac1a70 s41=59e239fd d20=59e239fdedac1a70 s42=dbc24c4e s43=c2ad9162 d21=c2ad9162dbc24c4e s44=4e1db583 s45=3fab3c47 d22=3fab3c474e1db583 s46=89db7849 s47=2c5855b2 d23=2c5855b289db7849 s48=8b46b21e s49=0a8f735f d24=0a8f735f8b46b21e s50=a6784772 s51=20940036 d25=20940036a6784772 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000