last executing test programs: 8.068786115s ago: executing program 1 (id=652): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x2, 0x1, 0x7, 0x2, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, r3, 0x20, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffd}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4a8ef36}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0xac}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) r4 = syz_open_dev$vcsu(&(0x7f0000000280), 0xe, 0x4a100) write$UHID_GET_REPORT_REPLY(r4, &(0x7f00000002c0)={0xa, {0x5, 0x55, 0x6}}, 0xa) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r2) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x7c, r5, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffffffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf78}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x18000}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}]}, 0x7c}}, 0x20000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000480)=0x8) r6 = openat$dlm_control(0xffffff9c, &(0x7f00000004c0), 0x40000, 0x0) r7 = openat$dlm_plock(0xffffff9c, &(0x7f0000000500), 0x0, 0x0) fcntl$setsig(r7, 0xa, 0x5) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r4) sendmsg$NL80211_CMD_LEAVE_OCB(r7, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x81d3c0ed3daab1ba}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x20, r8, 0x100, 0x70bd26, 0x4, {{}, {@void, @val={0xc, 0x99, {0x401, 0xb}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000054}, 0x20080050) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000680)={0x3, 'batadv0\x00', {0x6a92}}) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000700), r7) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x40, r9, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000044}, 0x40000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000800)={'wlan0\x00'}) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), r2) sendmsg$NL80211_CMD_GET_SURVEY(r6, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r10, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x5f34, 0x41}}}}, [""]}, 0x20}}, 0x0) r11 = openat(r7, &(0x7f0000000980)='./file0\x00', 0x20040, 0x0) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), r7) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r11, 0x89f8, &(0x7f0000000b00)={'gre0\x00', &(0x7f0000000a40)={'erspan0\x00', 0x0, 0x700, 0x700, 0x8, 0x7, {{0x1d, 0x4, 0x2, 0x0, 0x74, 0x64, 0x0, 0x7, 0x2f, 0x0, @empty, @remote, {[@timestamp_prespec={0x44, 0x34, 0xb4, 0x3, 0x3, [{@private=0xa010101, 0x2}, {@empty, 0x7}, {@multicast2, 0x6}, {@empty, 0x1000}, {@multicast1, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}]}, @timestamp_prespec={0x44, 0x14, 0xb1, 0x3, 0x2, [{@local, 0xffffffff}, {@broadcast, 0x8001}]}, @generic={0xc7, 0xf, "1799a52c06acda5cbb987de024"}, @generic={0x94, 0x7, "64db6166da"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000b40)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b80)={'syztnl2\x00', 0x0, 0x2f, 0xfd, 0xc9, 0x0, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, 0x20, 0x7, 0x7, 0xa8}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000c80)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r11, &(0x7f0000001580)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001540)={&(0x7f0000001380)={0x1c0, r12, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x4}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x40}, 0x4000830) 5.816888174s ago: executing program 1 (id=656): getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0xd5, "c929b83b1de1d48474849f36b2b460b717a18d9385a1984ead021113894be94f6a4cfc7e450dcd45c94344e491687051a3be06c3c0fdc4824d9c0d391103517aaa6cff9bc09449c61cdb33f487f9218f6d1156bcc463ab54280796799f51f2c1add1760b165648b4dd5bc60ac0bccd0e74925178f49609988a41b019e41f1c579ad66cfaa141cb26d80d390e297ef6cc3a68eaf387db122065cd18445f991c22374aecef00b6352bec1f2ab830d29b88a99b983cf8dcaee9b371b862fcb8c440854a351139023a47b8533d5ad801c1834a561c1dd4"}, &(0x7f0000000100)=0xf9) r0 = ioctl$USERFAULTFD_IOC_NEW(0xffffffffffffffff, 0xaa00) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x3) cachestat(r0, &(0x7f0000000180)={0x4, 0x5}, &(0x7f00000001c0), 0x0) r1 = syz_open_dev$audion(&(0x7f0000000200), 0x9, 0x204080) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000002c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x40, 0x700, 0x3, 0xe52, {{0x1e, 0x4, 0x1, 0x5, 0x78, 0x66, 0x0, 0x7, 0x4, 0x0, @multicast1, @loopback, {[@timestamp_prespec={0x44, 0x24, 0xb7, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0xffff49ee}, {@multicast2, 0x7}, {@remote, 0x10000}]}, @timestamp_addr={0x44, 0x1c, 0x6d, 0x1, 0x6, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x44}, 0xfffffffb}, {@rand_addr=0x64010100}]}, @timestamp={0x44, 0x18, 0x93, 0x0, 0x2, [0x3, 0x7, 0x200, 0x6, 0x1]}, @end, @lsrr={0x83, 0xb, 0x61, [@private=0xa010100, @multicast1]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'tunl0\x00', 0x0, 0x80, 0x7800, 0xa, 0x40, {{0x17, 0x4, 0x0, 0x7, 0x5c, 0x68, 0x0, 0xe, 0x4, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x15}, {[@cipso={0x86, 0x33, 0x3, [{0x0, 0x4, "ddf2"}, {0x6, 0x6, "a5151d92"}, {0x5, 0x9, "d2b4b2e4a6c4c5"}, {0x5, 0x8, "3b7dcc75f5c6"}, {0x5, 0xf, "206ec4d67a4141de4faeb5d0dc"}, {0x7, 0x3, 'Y'}]}, @ssrr={0x89, 0x13, 0x85, [@private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @broadcast]}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'veth1_macvtap\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000600)={'ip_vti0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x80, 0x8, 0x9, 0x2, {{0x12, 0x4, 0x2, 0x1, 0x48, 0x65, 0x0, 0xcf, 0x29, 0x0, @loopback, @multicast1, {[@noop, @generic={0x7, 0xf, "6a6ca15da114d915ef4c82ea77"}, @ssrr={0x89, 0x23, 0xee, [@loopback, @multicast1, @private=0xa010100, @loopback, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'tunl0\x00', 0x0, 0x7800, 0x20, 0xe06, 0xe4, {{0x16, 0x4, 0x3, 0x32, 0x58, 0x65, 0x0, 0x4, 0x29, 0x0, @broadcast, @multicast2, {[@noop, @end, @rr={0x7, 0x17, 0x43, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x38}, @local, @rand_addr=0x64010101]}, @end, @end, @ssrr={0x89, 0x7, 0xbd, [@loopback]}, @rr={0x7, 0x1f, 0xf, [@remote, @dev={0xac, 0x14, 0x14, 0x13}, @broadcast, @rand_addr=0x64010102, @local, @multicast1, @multicast2]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vxcan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000009c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000980)={&(0x7f0000000780)={0x1c4, r2, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) socket$nl_route(0x10, 0x3, 0x0) r12 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@initdev, @in6=@ipv4={""/10, ""/2, @local}}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000b40)={@remote, @loopback, @dev={0xfe, 0x80, '\x00', 0x41}, 0xcb, 0x0, 0x4, 0x500, 0x400, 0x40, r10}) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c00), r1) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r1, &(0x7f0000000f80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000c40)={0x2d0, r13, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x88f8}, @NL80211_ATTR_FRAME={0x29d, 0x33, @mgmt_frame=@auth={{{0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}, {0x9}, @broadcast, @device_a, @initial, {0xb}, @value=@ver_80211n={0x0, 0x92d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x0, 0x1, 0x19, @void, [{0xdd, 0xa9, "2c8252426d156f73d65db125bb8664208b3824a4c6d04fd3b7fb4450689f76f268ed177c8063170a07439ab4f4327abc047a9b85005b95c7a654fa601c1122a273080a0c4409d5d4fb82a69b0fcc4e0b6d5433dc7bae3a6e94231cf9e44a172501a518d0bd6315cbbdcc45e7f27a65e6f9c24cbec9e669b1c9117dfc50f3e4c77eddbaa621853ceb677ab2d45cb498b28212c94bb4230b0eaae2b99164252823f35d72b5b75278d889"}, {0xdd, 0xe4, "ad000d47be93143eed39752b791ca6234b172f07f0ae2363d22e358e65ae2bfd8664ee67746a657bfda01354564595f30f0f11be8a2fe6b49d1059fc14be0e2c542a83dde2e4ee43418546b209a529794808512832474e073e9158dd608e99fbf897765ae9b90cb1f0ca08abd4bbed6e6ff5d09b66a325feda8f109956a5ea6ddcfe18a0ba4a0d19d4a162f0eba7d916faffa0248a5e8b46d3e7596e314a07394c4842892c0e690df816cde8ef3577fc00cb06d211759f5e0529e8b075951e6dc485bd78683627f9c39492dbc75e982dc7913915d913b89d8cd15c137f10c402cd875fce"}, {0xdd, 0xe4, "a53c62197ef082740963b009cf7c6cd3354b9a83aace9f8a43da8863213af2b16bdb01b0ba14e0ddca557e7c405ea1b0fef52a5c550aa108ee4ffded43fd70a7297f19cb7d608563d8f32df289addc562fa2e94673feb83cc85fda6087f916e874e598b906a360bbd59a6e792912a26bfda04990a83a1bd5b3165b903c6865780a3e901ae992d0754bdc4b8e6fe06307825d4a7a54ecca75898faf308a2ef4257f7a6dfa64bdef822519520c47afb7c830b84de83f605464fcc3e99cda1781b7fe6a58893a899d81a565fbaf6f0c7f50d7236789a446a15b338265ec920a351a662e54fc"}]}}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x80}, 0x4000001) connect$can_bcm(r1, &(0x7f0000000fc0)={0x1d, r6}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000010c0)={'syztnl2\x00', &(0x7f0000001040)={'syztnl2\x00', r8, 0x2f, 0x0, 0x81, 0x0, 0x1e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x1, 0x30, 0x605c46f6, 0x746}}) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000001200)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001100)={0x88, r2, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) r15 = syz_genetlink_get_family_id$devlink(&(0x7f0000001280), r1) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000001400)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000013c0)={&(0x7f00000012c0)={0xf0, r15, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0xfffff5aa}, {0x6, 0x11, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x253}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x51bf}}]}, 0xf0}}, 0x20000000) syz_genetlink_get_family_id$wireguard(&(0x7f0000001440), r1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r12, 0x8983, &(0x7f0000001480)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000001540)={'ip_vti0\x00', &(0x7f00000014c0)={'syztnl1\x00', r14, 0x20, 0x7800, 0x2, 0x4, {{0xf, 0x4, 0x0, 0x2e, 0x3c, 0x64, 0x0, 0x7f, 0x4, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0x17, 0x39, [@private=0xa010100, @rand_addr=0x64010100, @private=0xa010100, @multicast2, @broadcast]}, @end, @lsrr={0x83, 0xf, 0x90, [@private=0xa010101, @remote, @rand_addr=0x64010101]}]}}}}}) 5.309779881s ago: executing program 0 (id=658): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000000), 0x8040, 0x0) close_range(r0, r0, 0x0) r1 = inotify_init() openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom1\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0x541b, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r3, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r4) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x5450, 0x0) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000580), 0x8, 0x0) ioctl$TIOCMSET(r5, 0x5450, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5a}, 0x10042) 4.859758685s ago: executing program 1 (id=659): mq_open(&(0x7f0000000000)='\x00', 0x800, 0x8, &(0x7f0000000040)={0x2, 0x0, 0x3, 0xffff}) (async) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x8, 0x7a, 0x18, 0x2, 0x3, 0x3, 0x3, 0x202, 0x38, 0x162, 0xca02, 0x3e1b, 0x20, 0x4, 0x225, 0x40, 0x2}, [{0x2, 0x800, 0xf, 0x9, 0x7, 0x200, 0x4, 0x101}, {0x7, 0xb, 0x2, 0x6, 0x8, 0x4, 0x9}, {0x1, 0x79e0, 0x101, 0x8, 0x2a, 0x9, 0x8}, {0x4, 0x7, 0x445c, 0x2, 0x9, 0x17, 0x18855179, 0x4}], "16e4477c755b88b3267f51997d9ad292f88a1920e69121cca77915521140a4b3a4b7368019ccc7a2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7e0) r0 = openat$snapshot(0xffffff9c, &(0x7f0000000880), 0x24100, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x2fa04000) r1 = openat2$dir(0xffffff9c, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x8002, 0x21, 0x18}, 0x18) (async) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000940)=0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000980)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchown(r1, r2, r4) (async) mq_open(&(0x7f00000029c0)='%@)-]!*\x00', 0x800, 0x50, &(0x7f0000002a00)={0x10000, 0x1000, 0x4, 0xcfff}) ioprio_get$uid(0x3, r3) r6 = openat$selinux_mls(0xffffff9c, &(0x7f0000002d00), 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002d40)={&(0x7f0000002a40)="54cf42d2ee087272e49d59c9a3dfb45aeb6b644703739a158dc2b4d43e2f32b4dfe5f51f88097ed2dd3383d10dcee741a01deb7c099afe3c328d11d13454dc5b0793b4680cde1b5db9b373c529ac6dbc0038e2fa30cb1843d1bf6463d1486f86d12c5d0a7bcea84fc0b5b4cbec3aacda797bfe717e14718ac01ce3f3536529761d5ba3230d644e45107877b43a19916ba1be34b202feb6c58b7aea1af81ba17095cc3baf62db6197c7f9e5000c253a392975c64fdf23b42a170a0707e2b18ccc01fdb8c100b203c3761384e89f26d1af327e45c97450c0ca3770f5978cd1562dbaecd627", &(0x7f0000002b40)=""/74, &(0x7f0000002bc0)="e622d20dca8e902d1e7d9216693d92db2fb932ba61c80fbcfd44f5570e61f24fae40be82d6da4b4a0368f1b4e5eab47c0601f2a1637caf60a62cc91020a92b41ea02595aded3ecb48d25ce20e8785a780508b68906fd556271eb38b46bc0567e100d14000d29d2e47e109123c263d92e0efc784f2cbe557ed3b48d29563263b751853078c284d8e26d02be2085dfcfda827b6effa43eadea2a73f73c5f0875437fedd2e43d0e0c18578bbce9d1ebca46e3b467", &(0x7f0000002c80)="d6b5194d449616487f35d923ced5bd8062134088fb85e449f6fa2a863bd85ac4bab88ae8bea2c95404550bb399e4c53831d3e0b71d8672a3b89fa23f0a2b4d271c12d56210994f06fc1f5c7df51b78b6e550ca91c1215281b2efe24f10f1d5726fa075328c2159a695b42b55d42067b16a6dac2c420aa1c5", 0x8, r6, 0x4}, 0x38) (async, rerun: 32) quotactl$Q_GETFMT(0xffffffff80000401, &(0x7f0000002d80)=@md0, r2, &(0x7f0000002dc0)) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002e00)) (async) write$P9_RSETATTR(r6, &(0x7f0000002e40)={0x7, 0x1b, 0x2}, 0x7) (async) sendmsg$NFNL_MSG_CTHELPER_NEW(r6, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002f40)={&(0x7f0000002ec0)={0x60, 0x0, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x4}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x4}}, @NFCTH_PRIV_DATA_LEN={0x8}]}, 0x60}}, 0x5) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x80010, r1, 0x8000000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x10c, &(0x7f0000002fc0), 0x0, 0x4) (async) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000003040), r6) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r6, &(0x7f0000003200)={&(0x7f0000003000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000031c0)={&(0x7f0000003080)={0x110, r8, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0xf851490e}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x3}, {0x8, 0x15, 0xa1cf}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x2}, {0x8, 0x15, 0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0xf66}, {0x8, 0x15, 0x2}}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000010}, 0x40) (async) openat$random(0xffffff9c, &(0x7f0000003240), 0x40, 0x0) (async) prlimit64(r5, 0xa, &(0x7f0000003280)={0x5, 0x80000001}, &(0x7f00000032c0)) (async) shutdown(r6, 0x0) sendto$unix(r6, &(0x7f0000003300)="43e4af18f0f9105ba5494ad5b803d770e312784894790c869355c53f7c51d5e4f7ab7f1e9cbda43181e4e2c16d9eee3d022e312287e131288ef54e9971548c84c7c73778bc776c", 0x47, 0x24044861, &(0x7f0000003380)=@file={0x0, './file0\x00'}, 0x6e) r9 = eventfd2(0xb, 0x0) fallocate(r9, 0x11, 0x7, 0xb95) (async, rerun: 32) recvmsg$can_bcm(r6, &(0x7f00000047c0)={&(0x7f0000003400)=@tipc=@name, 0x80, &(0x7f0000004740)=[{&(0x7f0000003480)=""/222, 0xde}, {&(0x7f0000003580)=""/165, 0xa5}, {&(0x7f0000003640)=""/225, 0xe1}, {&(0x7f0000003740)=""/4096, 0x1000}], 0x4, &(0x7f0000004780)=""/58, 0x3a}, 0x13201) (async, rerun: 32) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x100, &(0x7f0000004800)=0x2, 0x0, 0x4) (async, rerun: 64) syz_open_dev$audion(&(0x7f0000004840), 0x1, 0x107102) (rerun: 64) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000049c0)={@ifindex, r6, 0x2d, 0x20}, 0x20) 4.38268523s ago: executing program 1 (id=660): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000140), 0x3, 0x8640) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f0000000180)) close(r0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x3f9, 0x300, 0x70bd2b, 0x25dfdbfb, {0x1, 0x1}}, 0x18}}, 0x30) 3.861555336s ago: executing program 1 (id=661): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x20000001) (fail_nth: 3) 3.372214253s ago: executing program 1 (id=662): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window, @mss, @window, @window], 0x20000000000000e4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socket$kcm(0x29, 0x2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000700), 0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) 2.690199099s ago: executing program 0 (id=663): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x3c, r0, 0x801, 0x0, 0x3, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "dc8799d86dbe88fef644a90d36"}]}, 0x3c}}, 0x0) 1.657631913s ago: executing program 0 (id=664): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000a00)={'wlan0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="02030c65420002000000ab5d71acedd7c9560385dcb1080084d7dc039806112405ce811cc352", 0xff88, 0x0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 769.6768ms ago: executing program 0 (id=665): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x481, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 550.017631ms ago: executing program 0 (id=666): socket$inet_mptcp(0x2, 0x1, 0x106) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000105002, 0x0) r0 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7734, 0x80, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2e, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x15523ea56aa22b9a, 0x0, 0x0, 0x0, 0x12345}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 0 (id=667): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000013000/0x4000)=nil, 0x3000, 0x3}) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000600)) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f0000000000)={0x60, 0x0, &(0x7f000007c000/0x4000)=nil, &(0x7f00002fb000/0xc00000)=nil, 0x0, 0x0, 0x0, 0xc, 0x0, 0x60, 0x0, 0x36}) kernel console output (not intermixed with test programs): tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.930661][ T31] audit: type=1400 audit(81.830:88): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="gadgetfs" ino=2166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.942952][ T31] audit: type=1400 audit(81.850:89): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.946929][ T31] audit: type=1400 audit(81.850:90): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.973139][ T3103] veth0_vlan: entered promiscuous mode [ 82.024834][ T3102] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.027555][ T3103] veth1_vlan: entered promiscuous mode [ 82.091644][ T3103] veth0_macvtap: entered promiscuous mode [ 82.127692][ T3103] veth1_macvtap: entered promiscuous mode [ 82.187018][ T3103] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.187413][ T3103] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.187670][ T3103] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.187859][ T3103] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.224829][ T3793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3793 comm=syz.0.1 [ 82.488362][ T3796] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 82.853033][ T3808] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3808 comm=syz.1.6 [ 83.553972][ T3821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3821 comm=syz.0.11 [ 83.934919][ T3828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3828 comm=syz.0.14 [ 84.281150][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 84.437821][ T23] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 84.446061][ T23] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 84.446472][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 84.446791][ T23] usb 1-1: SerialNumber: syz [ 85.095590][ T23] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 86.235703][ T3883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2057 sclass=netlink_route_socket pid=3883 comm=syz.0.22 [ 86.833738][ T94] usb 1-1: USB disconnect, device number 2 [ 86.835494][ T94] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 87.002421][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 87.002732][ T31] audit: type=1400 audit(86.910:122): avc: denied { read } for pid=3879 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 87.351574][ T31] audit: type=1400 audit(87.260:123): avc: denied { create } for pid=3917 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 87.542724][ T3924] Zero length message leads to an empty skb [ 87.998393][ T31] audit: type=1400 audit(87.900:124): avc: denied { create } for pid=3936 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.005817][ T31] audit: type=1400 audit(87.910:125): avc: denied { write } for pid=3936 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.592687][ T31] audit: type=1400 audit(88.500:126): avc: denied { create } for pid=3936 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 88.658636][ T31] audit: type=1400 audit(88.560:127): avc: denied { create } for pid=3936 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 89.116417][ T31] audit: type=1400 audit(89.020:128): avc: denied { create } for pid=3941 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.358423][ T31] audit: type=1400 audit(89.260:129): avc: denied { nlmsg_write } for pid=3951 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 89.427475][ T3954] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 89.457829][ T31] audit: type=1400 audit(89.360:130): avc: denied { prog_load } for pid=3953 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.460276][ T31] audit: type=1400 audit(89.360:131): avc: denied { bpf } for pid=3953 comm="syz.1.40" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.639021][ T3967] FAULT_INJECTION: forcing a failure. [ 89.639021][ T3967] name failslab, interval 1, probability 0, space 0, times 1 [ 89.642673][ T3967] CPU: 1 UID: 0 PID: 3967 Comm: syz.1.45 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 89.643072][ T3967] Hardware name: ARM-Versatile Express [ 89.643389][ T3967] Call trace: [ 89.643642][ T3967] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 89.644581][ T3967] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4f4 [ 89.644681][ T3967] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 89.644740][ T3967] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 89.644791][ T3967] r5:84b0bc00 r4:82919a80 [ 89.644806][ T3967] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 89.644860][ T3967] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 89.644924][ T3967] r8:84b0bc00 r7:00000c40 r6:8475ce68 r5:00001000 r4:830016c0 [ 89.644942][ T3967] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 89.644989][ T3967] [<80500f2c>] (__kmalloc_noprof) from [<807baf34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 89.645070][ T3967] r10:84b0bc00 r9:83359400 r8:00000000 r7:850377f8 r6:8475ce68 r5:00001000 [ 89.645096][ T3967] r4:00000000 [ 89.645112][ T3967] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 89.645172][ T3967] r10:84b0bc00 r9:00000000 r8:00000005 r7:0000894c r6:00000004 r5:81cd6278 [ 89.645192][ T3967] r4:8475ce68 r3:826c0200 [ 89.645206][ T3967] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 89.645269][ T3967] r9:8475ce40 r8:00000005 r7:00000000 r6:00000000 r5:0000894c r4:8475ce40 [ 89.645284][ T3967] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 89.645325][ T3967] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 89.645402][ T3967] r7:00000000 r6:8475ce41 r5:00000000 r4:0000894c [ 89.645418][ T3967] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 89.645531][ T3967] Exception stack(0xea8d9fa8 to 0xea8d9ff0) [ 89.645705][ T3967] 9fa0: 00000000 00000000 00000005 0000894c 00000000 00000000 [ 89.645756][ T3967] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b810bc [ 89.645783][ T3967] 9fe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 89.645847][ T3967] r10:00000036 r9:84b0bc00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 89.645866][ T3967] r4:00000000 [ 89.654620][ T3967] ERROR: Out of memory at tomoyo_realpath_from_path. [ 89.925406][ T3977] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 90.308659][ T3989] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 90.603552][ T3996] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3996 comm=syz.0.56 [ 91.220822][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 91.385461][ T9] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 91.391406][ T9] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 91.391717][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 91.391928][ T9] usb 2-1: SerialNumber: syz [ 92.040694][ T9] cdc_ether 2-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.1-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 92.887579][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 92.888375][ T31] audit: type=1400 audit(92.790:138): avc: denied { create } for pid=4038 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.893933][ T31] audit: type=1400 audit(92.800:139): avc: denied { setopt } for pid=4038 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 93.158093][ T9] usb 2-1: USB disconnect, device number 2 [ 93.164512][ T9] cdc_ether 2-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.1-1, CDC Ethernet Device [ 93.394490][ T31] audit: type=1400 audit(93.300:140): avc: denied { create } for pid=4056 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 93.904300][ T31] audit: type=1400 audit(93.810:141): avc: denied { wake_alarm } for pid=4064 comm="syz.1.72" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 95.724615][ T4097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2057 sclass=netlink_route_socket pid=4097 comm=syz.1.81 [ 96.035338][ T4102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4102 comm=syz.1.83 [ 96.187440][ T31] audit: type=1400 audit(96.090:142): avc: denied { create } for pid=4103 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 96.210450][ T31] audit: type=1400 audit(96.110:143): avc: denied { ioctl } for pid=4103 comm="syz.1.84" path="socket:[3547]" dev="sockfs" ino=3547 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 97.334428][ T31] audit: type=1400 audit(97.240:144): avc: denied { audit_write } for pid=4109 comm="syz.0.87" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 97.777349][ T31] audit: type=1400 audit(97.680:145): avc: denied { append } for pid=4118 comm="syz.1.90" name="usbmon0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 97.833807][ T31] audit: type=1400 audit(97.740:146): avc: denied { write } for pid=4118 comm="syz.1.90" name="raw6" dev="proc" ino=4026532730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 98.210178][ T1606] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 98.387533][ T1606] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 18 [ 98.396748][ T1606] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 98.398028][ T1606] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 98.400616][ T1606] usb 1-1: SerialNumber: syz [ 99.046971][ T1606] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 99.248811][ T4114] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 99.253953][ T4114] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 99.321911][ T31] audit: type=1400 audit(99.230:147): avc: denied { map_create } for pid=4138 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.325924][ T31] audit: type=1400 audit(99.230:148): avc: denied { map_read map_write } for pid=4138 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.353166][ T31] audit: type=1400 audit(99.260:149): avc: denied { create } for pid=4138 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 99.359033][ T31] audit: type=1400 audit(99.260:150): avc: denied { write } for pid=4138 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 100.345869][ T23] usb 1-1: USB disconnect, device number 3 [ 100.348218][ T23] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 101.354787][ T4177] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4177 comm=syz.1.98 [ 102.080468][ T4194] FAULT_INJECTION: forcing a failure. [ 102.080468][ T4194] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 102.081191][ T4194] CPU: 1 UID: 0 PID: 4194 Comm: syz.1.102 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 102.081282][ T4194] Hardware name: ARM-Versatile Express [ 102.081308][ T4194] Call trace: [ 102.081350][ T4194] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 102.081579][ T4194] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 102.081746][ T4194] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 102.082100][ T4194] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 102.082263][ T4194] r5:84f0d400 r4:82950610 [ 102.082354][ T4194] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 102.082597][ T4194] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 102.083106][ T4194] r8:76b80f30 r7:00000000 r6:00000000 r5:eb175f68 r4:00000002 [ 102.083130][ T4194] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 102.083210][ T4194] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 102.083970][ T4194] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 102.084589][ T4194] r10:00000001 r9:806017c4 r8:00000002 r7:eb175f68 r6:0000000f r5:76b80f30 [ 102.085135][ T4194] r4:84f0d400 r3:eb175e9f [ 102.085300][ T4194] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 102.085552][ T4194] r8:76b80f30 r7:eb175f68 r6:84f0d400 r5:0000000f r4:8475c900 [ 102.086408][ T4194] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 102.086480][ T4194] r10:00000003 r9:84f0d400 r8:8020029c r7:00000000 r6:00000000 r5:8475c900 [ 102.086847][ T4194] r4:8475c903 [ 102.087063][ T4194] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 102.087843][ T4194] r7:00000003 r6:00000005 r5:76b80f30 r4:0000000f [ 102.087866][ T4194] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 102.088219][ T4194] Exception stack(0xeb175fa8 to 0xeb175ff0) [ 102.088609][ T4194] 5fa0: 0000000f 76b80f30 00000005 76b80f30 0000000f 00000000 [ 102.088877][ T4194] 5fc0: 0000000f 76b80f30 00000005 00000003 002e0000 00000000 00006364 76b810bc [ 102.089003][ T4194] 5fe0: 00000158 76b80ed0 000d7df0 0012fe94 [ 102.364161][ T31] audit: type=1400 audit(102.270:151): avc: denied { setopt } for pid=4198 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.826885][ C0] vkms_vblank_simulate: vblank timer overrun [ 103.154984][ T4207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29612 sclass=netlink_route_socket pid=4207 comm=syz.1.107 [ 103.585284][ T4214] FAULT_INJECTION: forcing a failure. [ 103.585284][ T4214] name failslab, interval 1, probability 0, space 0, times 0 [ 103.587556][ T4214] CPU: 0 UID: 0 PID: 4214 Comm: syz.0.109 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 103.587687][ T4214] Hardware name: ARM-Versatile Express [ 103.587726][ T4214] Call trace: [ 103.587779][ T4214] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 103.587900][ T4214] r7:84b20000 r6:00000000 r5:60000013 r4:8225b4f4 [ 103.587921][ T4214] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 103.587976][ T4214] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 103.588072][ T4214] r5:84b20000 r4:82919a80 [ 103.588092][ T4214] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 103.588156][ T4214] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 103.588224][ T4214] r8:00000000 r7:84b20000 r6:00000cc0 r5:846e8e80 r4:830a8300 [ 103.588243][ T4214] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 103.588299][ T4214] [<80500bf8>] (kmem_cache_alloc_noprof) from [<804bba08>] (vm_area_dup+0x24/0x148) [ 103.588374][ T4214] r10:00000073 r9:00000001 r8:eb13dcc8 r7:20ff9000 r6:20ff9000 r5:846e8e80 [ 103.588395][ T4214] r4:846e8e80 [ 103.588412][ T4214] [<804bb9e4>] (vm_area_dup) from [<804e4654>] (__split_vma+0x8c/0x438) [ 103.588470][ T4214] r5:eb13dcc8 r4:846e8e80 [ 103.588489][ T4214] [<804e45c8>] (__split_vma) from [<804e4a74>] (vms_gather_munmap_vmas+0x74/0x404) [ 103.588556][ T4214] r10:00000073 r9:eb13df18 r8:eb13ddb8 r7:00000000 r6:20ff9000 r5:eb13dcc8 [ 103.588576][ T4214] r4:eb13dd74 [ 103.588592][ T4214] [<804e4a00>] (vms_gather_munmap_vmas) from [<804e6d88>] (__mmap_region+0x18c/0xccc) [ 103.588654][ T4214] r9:eb13df18 r8:840fcc00 r7:00000000 r6:20ff9000 r5:eb13dcc8 r4:846e8e80 [ 103.588673][ T4214] [<804e6bfc>] (__mmap_region) from [<804e8518>] (mmap_region+0x88/0x160) [ 103.588730][ T4214] r10:00000000 r9:840fcc00 r8:84b20000 r7:00001000 r6:20ff9000 r5:00000000 [ 103.588750][ T4214] r4:00000073 [ 103.588766][ T4214] [<804e8490>] (mmap_region) from [<804cd808>] (do_mmap+0x368/0x538) [ 103.588824][ T4214] r8:20ff9000 r7:84b20000 r6:00000003 r5:00000032 r4:00001000 [ 103.588841][ T4214] [<804cd4a0>] (do_mmap) from [<8049af64>] (vm_mmap_pgoff+0x124/0x1ec) [ 103.588904][ T4214] r10:840fcc00 r9:20ff9000 r8:00001000 r7:eb13df18 r6:00000000 r5:00000003 [ 103.588926][ T4214] r4:00000000 [ 103.588943][ T4214] [<8049ae40>] (vm_mmap_pgoff) from [<804cc9b8>] (ksys_mmap_pgoff+0x48/0xec) [ 103.589003][ T4214] r10:000000c0 r9:84b20000 r8:8020029c r7:20ff9000 r6:00001000 r5:00000003 [ 103.589022][ T4214] r4:00000032 [ 103.589039][ T4214] [<804cc970>] (ksys_mmap_pgoff) from [<804cca78>] (sys_mmap_pgoff+0x1c/0x24) [ 103.589346][ T4214] r8:8020029c r7:000000c0 r6:0012ff70 r5:08000000 r4:00000003 [ 103.589375][ T4214] [<804cca5c>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 103.589427][ T4214] Exception stack(0xeb13dfa8 to 0xeb13dff0) [ 103.589513][ T4214] dfa0: 00000003 08000000 20ff9000 00001000 00000003 00000032 [ 103.589558][ T4214] dfc0: 00000003 08000000 0012ff70 000000c0 002e0000 00000000 00006364 76b910bc [ 103.589585][ T4214] dfe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 104.416518][ T31] audit: type=1400 audit(104.320:152): avc: denied { ioctl } for pid=4220 comm="syz.0.113" path="socket:[3714]" dev="sockfs" ino=3714 ioctlcmd=0x450a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 106.388038][ T31] audit: type=1400 audit(106.290:153): avc: denied { read } for pid=4224 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.395476][ T31] audit: type=1400 audit(106.300:154): avc: denied { ioctl } for pid=4224 comm="syz.1.114" path="socket:[2645]" dev="sockfs" ino=2645 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.550753][ T31] audit: type=1400 audit(106.450:155): avc: denied { map } for pid=4230 comm="syz.0.117" path="socket:[3735]" dev="sockfs" ino=3735 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 106.557379][ T31] audit: type=1400 audit(106.460:156): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 106.646492][ T4234] FAULT_INJECTION: forcing a failure. [ 106.646492][ T4234] name failslab, interval 1, probability 0, space 0, times 0 [ 106.647653][ T4234] CPU: 1 UID: 0 PID: 4234 Comm: syz.1.118 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 106.647988][ T4234] Hardware name: ARM-Versatile Express [ 106.648248][ T4234] Call trace: [ 106.649098][ T4234] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 106.650508][ T4234] r7:84b25400 r6:00000000 r5:60000013 r4:8225b4f4 [ 106.650647][ T4234] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 106.650808][ T4234] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 106.650929][ T4234] r5:84b25400 r4:82919a80 [ 106.651102][ T4234] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 106.651190][ T4234] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 106.651279][ T4234] r8:00000000 r7:84b25400 r6:00000cc0 r5:8472dd80 r4:830a8300 [ 106.651750][ T4234] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 106.651803][ T4234] [<80500bf8>] (kmem_cache_alloc_noprof) from [<804bba08>] (vm_area_dup+0x24/0x148) [ 106.652205][ T4234] r10:002000ff r9:00000001 r8:eb29dcc8 r7:20400000 r6:20400000 r5:8472dd80 [ 106.652386][ T4234] r4:8472dd80 [ 106.652820][ T4234] [<804bb9e4>] (vm_area_dup) from [<804e4654>] (__split_vma+0x8c/0x438) [ 106.653391][ T4234] r5:eb29dcc8 r4:8472dd80 [ 106.653747][ T4234] [<804e45c8>] (__split_vma) from [<804e4a74>] (vms_gather_munmap_vmas+0x74/0x404) [ 106.653905][ T4234] r10:002000ff r9:eb29df18 r8:eb29ddb8 r7:00000000 r6:20400000 r5:eb29dcc8 [ 106.653929][ T4234] r4:eb29dd74 [ 106.654545][ T4234] [<804e4a00>] (vms_gather_munmap_vmas) from [<804e6d88>] (__mmap_region+0x18c/0xccc) [ 106.655231][ T4234] r9:eb29df18 r8:840fc000 r7:00000000 r6:20400000 r5:eb29dcc8 r4:8472dd80 [ 106.655845][ T4234] [<804e6bfc>] (__mmap_region) from [<804e8518>] (mmap_region+0x88/0x160) [ 106.656311][ T4234] r10:00000000 r9:840fc000 r8:84b25400 r7:00c00000 r6:20400000 r5:00000000 [ 106.656776][ T4234] r4:002000ff [ 106.656983][ T4234] [<804e8490>] (mmap_region) from [<804cd808>] (do_mmap+0x368/0x538) [ 106.657059][ T4234] r8:20400000 r7:84b25400 r6:02000007 r5:0401d031 r4:00c00000 [ 106.657079][ T4234] [<804cd4a0>] (do_mmap) from [<8049af64>] (vm_mmap_pgoff+0x124/0x1ec) [ 106.658150][ T4234] r10:840fc000 r9:20400000 r8:00c00000 r7:eb29df18 r6:00000000 r5:02000007 [ 106.658182][ T4234] r4:00000000 [ 106.658203][ T4234] [<8049ae40>] (vm_mmap_pgoff) from [<804cc9b8>] (ksys_mmap_pgoff+0x48/0xec) [ 106.659229][ T4234] r10:000000c0 r9:84b25400 r8:8020029c r7:20400000 r6:00c00000 r5:02000007 [ 106.659275][ T4234] r4:0401d031 [ 106.659435][ T4234] [<804cc970>] (ksys_mmap_pgoff) from [<804cca78>] (sys_mmap_pgoff+0x1c/0x24) [ 106.659638][ T4234] r8:8020029c r7:000000c0 r6:0012ff70 r5:00000000 r4:ffffffff [ 106.659653][ T4234] [<804cca5c>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 106.659810][ T4234] Exception stack(0xeb29dfa8 to 0xeb29dff0) [ 106.659968][ T4234] dfa0: ffffffff 00000000 20400000 00c00000 02000007 0401d031 [ 106.660026][ T4234] dfc0: ffffffff 00000000 0012ff70 000000c0 002e0000 00000000 00006364 76b810bc [ 106.660048][ T4234] dfe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 106.808832][ T4238] FAULT_INJECTION: forcing a failure. [ 106.808832][ T4238] name failslab, interval 1, probability 0, space 0, times 0 [ 106.813967][ T4238] CPU: 0 UID: 0 PID: 4238 Comm: syz.0.121 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 106.814109][ T4238] Hardware name: ARM-Versatile Express [ 106.814135][ T4238] Call trace: [ 106.814176][ T4238] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 106.814284][ T4238] r7:84b22400 r6:00000000 r5:60000013 r4:8225b4f4 [ 106.814304][ T4238] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 106.814382][ T4238] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 106.814437][ T4238] r5:84b22400 r4:82919a80 [ 106.814452][ T4238] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 106.814506][ T4238] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 106.814568][ T4238] r8:00000000 r7:84b22400 r6:00000cc0 r5:8309d800 r4:830a8c00 [ 106.814584][ T4238] [<8051c1b8>] (should_failslab) from [<80500910>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 106.814630][ T4238] [<805008c0>] (kmem_cache_alloc_lru_noprof) from [<80574b40>] (alloc_inode+0x68/0xcc) [ 106.814730][ T4238] r10:8309d800 r9:81c20e40 r8:85930060 r7:830af250 r6:81c20d88 r5:8309d800 [ 106.814750][ T4238] r4:85930060 [ 106.814764][ T4238] [<80574ad8>] (alloc_inode) from [<8058b584>] (path_from_stashed+0xdc/0x308) [ 106.814829][ T4238] r7:830af250 r6:eb111e84 r5:81c20e40 r4:85930060 [ 106.814847][ T4238] [<8058b4a8>] (path_from_stashed) from [<8059dfdc>] (open_namespace+0x44/0xbc) [ 106.814908][ T4238] r10:84b22400 r9:8598a0c0 r8:00000005 r7:8500fb80 r6:84b22400 r5:00000000 [ 106.814927][ T4238] r4:0000894c [ 106.814942][ T4238] [<8059df98>] (open_namespace) from [<8059e070>] (open_related_ns+0x1c/0x20) [ 106.814990][ T4238] r6:85930000 r5:00000000 r4:0000894c [ 106.815006][ T4238] [<8059e054>] (open_related_ns) from [<8152bad0>] (sock_ioctl+0x37c/0x600) [ 106.815053][ T4238] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 106.815112][ T4238] r9:8598a0c0 r8:00000005 r7:00000000 r6:8598a0c1 r5:00000000 r4:0000894c [ 106.815130][ T4238] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 106.815174][ T4238] Exception stack(0xeb111fa8 to 0xeb111ff0) [ 106.815212][ T4238] 1fa0: 00000000 00000000 00000005 0000894c 00000000 00000000 [ 106.815384][ T4238] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b910bc [ 106.815414][ T4238] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 106.815447][ T4238] r10:00000036 r9:84b22400 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 106.815465][ T4238] r4:00000000 [ 107.360923][ T31] audit: type=1400 audit(107.260:157): avc: denied { write } for pid=4247 comm="syz.1.123" path="socket:[2686]" dev="sockfs" ino=2686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 107.641752][ T31] audit: type=1400 audit(107.550:158): avc: denied { getopt } for pid=4254 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 108.498766][ T31] audit: type=1400 audit(108.400:159): avc: denied { ioctl } for pid=4260 comm="syz.1.127" path="socket:[3899]" dev="sockfs" ino=3899 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 108.586798][ T31] audit: type=1400 audit(108.490:160): avc: denied { read } for pid=4260 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 110.880506][ T4278] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4278 comm=syz.0.132 [ 111.073637][ T31] audit: type=1400 audit(110.980:161): avc: denied { setattr } for pid=4274 comm="syz.1.131" name="" dev="pipefs" ino=2761 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 111.178506][ T31] audit: type=1400 audit(111.080:162): avc: denied { setopt } for pid=4282 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 113.554857][ T31] audit: type=1400 audit(113.460:163): avc: denied { name_bind } for pid=4320 comm="syz.0.140" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 113.586298][ T4321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4321 comm=syz.0.140 [ 113.925061][ T4317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4317 comm=syz.1.139 [ 114.944776][ T31] audit: type=1400 audit(114.850:164): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 115.265560][ T31] audit: type=1400 audit(115.170:165): avc: denied { create } for pid=4342 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 115.328649][ T31] audit: type=1400 audit(115.230:166): avc: denied { getopt } for pid=4342 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 115.384281][ T4343] capability: warning: `syz.1.145' uses 32-bit capabilities (legacy support in use) [ 115.505228][ T4352] FAULT_INJECTION: forcing a failure. [ 115.505228][ T4352] name failslab, interval 1, probability 0, space 0, times 0 [ 115.506997][ T4352] CPU: 1 UID: 0 PID: 4352 Comm: syz.1.147 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 115.507104][ T4352] Hardware name: ARM-Versatile Express [ 115.507125][ T4352] Call trace: [ 115.507157][ T4352] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 115.507252][ T4352] r7:84afb000 r6:00000000 r5:60000013 r4:8225b4f4 [ 115.507267][ T4352] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 115.507307][ T4352] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 115.507349][ T4352] r5:84afb000 r4:82919a80 [ 115.507401][ T4352] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 115.507451][ T4352] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 115.507505][ T4352] r8:00000000 r7:84afb000 r6:00000cc0 r5:ffffffff r4:8329f300 [ 115.507518][ T4352] [<8051c1b8>] (should_failslab) from [<805005d8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 115.507556][ T4352] [<80500588>] (kmem_cache_alloc_node_noprof) from [<81538044>] (__alloc_skb+0x138/0x160) [ 115.507608][ T4352] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:8329f300 r5:ffffffff [ 115.507625][ T4352] r4:828060c0 [ 115.507638][ T4352] [<81537f0c>] (__alloc_skb) from [<81657de0>] (netlink_alloc_large_skb+0x88/0xa0) [ 115.507691][ T4352] r8:00000000 r7:859bc000 r6:00000014 r5:837cc280 r4:00000140 [ 115.507704][ T4352] [<81657d58>] (netlink_alloc_large_skb) from [<81658520>] (netlink_sendmsg+0x134/0x444) [ 115.507769][ T4352] r5:837cc280 r4:ec115f20 [ 115.507782][ T4352] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 115.507835][ T4352] r10:00000000 r9:ec115dc4 r8:ec115dc4 r7:00000000 r6:837cc280 r5:ec115f20 [ 115.507850][ T4352] r4:00000000 [ 115.507862][ T4352] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 115.507906][ T4352] r7:00000000 r6:837cc280 r5:00040000 r4:ec115f20 [ 115.507919][ T4352] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 115.508017][ T4352] r10:ec115e24 r9:20000300 r8:00040000 r7:00000000 r6:837cc280 r5:ec115f20 [ 115.508032][ T4352] r4:00000000 [ 115.508045][ T4352] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 115.508093][ T4352] r10:00000128 r9:84afb000 r8:8598ad80 r7:00040000 r6:20000300 r5:8598ad81 [ 115.508109][ T4352] r4:00000004 [ 115.508121][ T4352] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 115.508170][ T4352] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 115.508183][ T4352] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 115.508219][ T4352] Exception stack(0xec115fa8 to 0xec115ff0) [ 115.508249][ T4352] 5fa0: 00000000 00000000 00000004 20000300 00040000 00000000 [ 115.508279][ T4352] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b810bc [ 115.508299][ T4352] 5fe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 115.621183][ T4355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4355 comm=syz.1.148 [ 115.708583][ T31] audit: type=1400 audit(115.610:167): avc: denied { ioctl } for pid=4359 comm="syz.0.151" path="socket:[2843]" dev="sockfs" ino=2843 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.755160][ T31] audit: type=1400 audit(115.660:168): avc: denied { getopt } for pid=4358 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 118.478636][ T4374] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4374 comm=syz.0.155 [ 118.693837][ T4382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4382 comm=syz.0.158 [ 118.725781][ T31] audit: type=1400 audit(118.630:169): avc: denied { associate } for pid=4377 comm="syz.1.157" name="192" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 119.087816][ T31] audit: type=1400 audit(118.990:170): avc: denied { node_bind } for pid=4392 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 119.247554][ T4398] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4398 comm=syz.1.161 [ 120.099290][ T4419] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4419 comm=syz.1.165 [ 120.231500][ T31] audit: type=1400 audit(120.140:171): avc: denied { setopt } for pid=4421 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.557393][ T31] audit: type=1400 audit(120.460:172): avc: denied { append } for pid=4430 comm="syz.1.169" name="pfkey" dev="proc" ino=4026532758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 120.795094][ T31] audit: type=1400 audit(120.700:173): avc: denied { remount } for pid=4436 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 121.249435][ T31] audit: type=1400 audit(121.150:174): avc: denied { read } for pid=4449 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 121.555933][ T31] audit: type=1400 audit(121.450:175): avc: denied { ioctl } for pid=4449 comm="syz.1.175" path="socket:[4225]" dev="sockfs" ino=4225 ioctlcmd=0x660c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 121.656865][ T4459] FAULT_INJECTION: forcing a failure. [ 121.656865][ T4459] name failslab, interval 1, probability 0, space 0, times 0 [ 121.659256][ T4459] CPU: 1 UID: 0 PID: 4459 Comm: syz.0.176 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 121.659390][ T4459] Hardware name: ARM-Versatile Express [ 121.659417][ T4459] Call trace: [ 121.659509][ T4459] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 121.659643][ T4459] r7:84f0e000 r6:00000000 r5:60000013 r4:8225b4f4 [ 121.659664][ T4459] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 121.659715][ T4459] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 121.659764][ T4459] r5:84f0e000 r4:82919a80 [ 121.659779][ T4459] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 121.659832][ T4459] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 121.659976][ T4459] r8:00000000 r7:84f0e000 r6:00000cc0 r5:00000000 r4:830a8b40 [ 121.660002][ T4459] [<8051c1b8>] (should_failslab) from [<80500910>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 121.660049][ T4459] [<805008c0>] (kmem_cache_alloc_lru_noprof) from [<8056c4ec>] (__d_alloc+0x30/0x220) [ 121.660108][ T4459] r10:8309d800 r9:8245e83c r8:8309d800 r7:830af250 r6:ec495e84 r5:00000000 [ 121.660126][ T4459] r4:85930060 [ 121.660140][ T4459] [<8056c4bc>] (__d_alloc) from [<8056c758>] (d_alloc_anon+0x14/0x18) [ 121.660196][ T4459] r9:837d8848 r8:85930060 r7:830af250 r6:ec495e84 r5:00000000 r4:85930060 [ 121.660211][ T4459] [<8056c744>] (d_alloc_anon) from [<8058b5e8>] (path_from_stashed+0x140/0x308) [ 121.660271][ T4459] [<8058b4a8>] (path_from_stashed) from [<8059dfdc>] (open_namespace+0x44/0xbc) [ 121.660331][ T4459] r10:84f0e000 r9:85a80600 r8:00000005 r7:837d0000 r6:84f0e000 r5:00000000 [ 121.660348][ T4459] r4:0000894c [ 121.660362][ T4459] [<8059df98>] (open_namespace) from [<8059e070>] (open_related_ns+0x1c/0x20) [ 121.660412][ T4459] r6:85930000 r5:00000000 r4:0000894c [ 121.660428][ T4459] [<8059e054>] (open_related_ns) from [<8152bad0>] (sock_ioctl+0x37c/0x600) [ 121.660476][ T4459] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 121.660534][ T4459] r9:85a80600 r8:00000005 r7:00000000 r6:85a80601 r5:00000000 r4:0000894c [ 121.660553][ T4459] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 121.660597][ T4459] Exception stack(0xec495fa8 to 0xec495ff0) [ 121.660631][ T4459] 5fa0: 00000000 00000000 00000005 0000894c 00000000 00000000 [ 121.660671][ T4459] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b910bc [ 121.660698][ T4459] 5fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 121.660729][ T4459] r10:00000036 r9:84f0e000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 121.660746][ T4459] r4:00000000 [ 122.016745][ T4472] syz.1.180 uses obsolete (PF_INET,SOCK_PACKET) [ 122.847465][ T31] audit: type=1400 audit(122.750:176): avc: denied { write } for pid=4478 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.857196][ T31] audit: type=1400 audit(122.760:177): avc: denied { setopt } for pid=4478 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 122.861170][ T31] audit: type=1400 audit(122.760:178): avc: denied { write } for pid=4478 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 123.137900][ T4492] FAULT_INJECTION: forcing a failure. [ 123.137900][ T4492] name failslab, interval 1, probability 0, space 0, times 0 [ 123.140909][ T4492] CPU: 1 UID: 0 PID: 4492 Comm: syz.0.187 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 123.141022][ T4492] Hardware name: ARM-Versatile Express [ 123.141049][ T4492] Call trace: [ 123.141091][ T4492] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 123.141212][ T4492] r7:838b2400 r6:00000000 r5:60000013 r4:8225b4f4 [ 123.141234][ T4492] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 123.141282][ T4492] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 123.141334][ T4492] r5:838b2400 r4:82919a80 [ 123.141349][ T4492] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 123.141402][ T4492] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 123.141464][ T4492] r8:00000000 r7:838b2400 r6:00000cc0 r5:84ac9b00 r4:830a8300 [ 123.141482][ T4492] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 123.141529][ T4492] [<80500bf8>] (kmem_cache_alloc_noprof) from [<804bb9a4>] (vm_area_alloc+0x24/0x64) [ 123.141595][ T4492] r10:ec6a1cc8 r9:00000001 r8:ec6a1db8 r7:00000000 r6:20400000 r5:84ac9b00 [ 123.141616][ T4492] r4:8470c800 [ 123.141635][ T4492] [<804bb980>] (vm_area_alloc) from [<804e70dc>] (__mmap_region+0x4e0/0xccc) [ 123.141685][ T4492] r5:84797e00 r4:8470c800 [ 123.141702][ T4492] [<804e6bfc>] (__mmap_region) from [<804e8518>] (mmap_region+0x88/0x160) [ 123.141759][ T4492] r10:00000000 r9:84ac9b00 r8:838b2400 r7:00c00000 r6:20400000 r5:00000000 [ 123.141779][ T4492] r4:002000ff [ 123.141795][ T4492] [<804e8490>] (mmap_region) from [<804cd808>] (do_mmap+0x368/0x538) [ 123.141851][ T4492] r8:20400000 r7:838b2400 r6:02000007 r5:0401d031 r4:00c00000 [ 123.141870][ T4492] [<804cd4a0>] (do_mmap) from [<8049af64>] (vm_mmap_pgoff+0x124/0x1ec) [ 123.141934][ T4492] r10:84ac9b00 r9:20400000 r8:00c00000 r7:ec6a1f18 r6:00000000 r5:02000007 [ 123.141956][ T4492] r4:00000000 [ 123.141974][ T4492] [<8049ae40>] (vm_mmap_pgoff) from [<804cc9b8>] (ksys_mmap_pgoff+0x48/0xec) [ 123.142034][ T4492] r10:000000c0 r9:838b2400 r8:8020029c r7:20400000 r6:00c00000 r5:02000007 [ 123.142054][ T4492] r4:0401d031 [ 123.142068][ T4492] [<804cc970>] (ksys_mmap_pgoff) from [<804cca78>] (sys_mmap_pgoff+0x1c/0x24) [ 123.142121][ T4492] r8:8020029c r7:000000c0 r6:0012ff70 r5:00000000 r4:ffffffff [ 123.142136][ T4492] [<804cca5c>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 123.142180][ T4492] Exception stack(0xec6a1fa8 to 0xec6a1ff0) [ 123.142226][ T4492] 1fa0: ffffffff 00000000 20400000 00c00000 02000007 0401d031 [ 123.142266][ T4492] 1fc0: ffffffff 00000000 0012ff70 000000c0 002e0000 00000000 00006364 76b910bc [ 123.142291][ T4492] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 124.327544][ T4515] FAULT_INJECTION: forcing a failure. [ 124.327544][ T4515] name failslab, interval 1, probability 0, space 0, times 0 [ 124.330633][ T4515] CPU: 1 UID: 0 PID: 4515 Comm: syz.0.194 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 124.330767][ T4515] Hardware name: ARM-Versatile Express [ 124.330792][ T4515] Call trace: [ 124.330836][ T4515] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 124.330928][ T4515] r7:84f0d400 r6:00000000 r5:60000013 r4:8225b4f4 [ 124.330944][ T4515] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 124.330990][ T4515] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 124.331042][ T4515] r5:84f0d400 r4:82919a80 [ 124.331057][ T4515] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 124.331109][ T4515] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 124.331168][ T4515] r8:00000000 r7:84f0d400 r6:00000cc0 r5:85a81780 r4:830a8300 [ 124.331187][ T4515] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 124.331230][ T4515] [<80500bf8>] (kmem_cache_alloc_noprof) from [<804bba08>] (vm_area_dup+0x24/0x148) [ 124.331305][ T4515] r10:00000073 r9:00000000 r8:ec659cc8 r7:20ffa000 r6:82c2e348 r5:85a81780 [ 124.331327][ T4515] r4:85a81780 [ 124.331341][ T4515] [<804bb9e4>] (vm_area_dup) from [<804e4654>] (__split_vma+0x8c/0x438) [ 124.331394][ T4515] r5:85a81780 r4:85a81780 [ 124.331409][ T4515] [<804e45c8>] (__split_vma) from [<804e4ae0>] (vms_gather_munmap_vmas+0xe0/0x404) [ 124.331470][ T4515] r10:00000073 r9:00000000 r8:ec659db8 r7:82c2e344 r6:82c2e348 r5:85a81780 [ 124.331486][ T4515] r4:ec659d74 [ 124.331501][ T4515] [<804e4a00>] (vms_gather_munmap_vmas) from [<804e6d88>] (__mmap_region+0x18c/0xccc) [ 124.331559][ T4515] r9:ec659f18 r8:840fc000 r7:00000000 r6:20ff9000 r5:ec659cc8 r4:85a81780 [ 124.331576][ T4515] [<804e6bfc>] (__mmap_region) from [<804e8518>] (mmap_region+0x88/0x160) [ 124.331633][ T4515] r10:00000000 r9:840fc000 r8:84f0d400 r7:00001000 r6:20ff9000 r5:00000000 [ 124.331655][ T4515] r4:00000073 [ 124.331674][ T4515] [<804e8490>] (mmap_region) from [<804cd808>] (do_mmap+0x368/0x538) [ 124.331737][ T4515] r8:20ff9000 r7:84f0d400 r6:00000003 r5:00000032 r4:00001000 [ 124.331756][ T4515] [<804cd4a0>] (do_mmap) from [<8049af64>] (vm_mmap_pgoff+0x124/0x1ec) [ 124.331819][ T4515] r10:840fc000 r9:20ff9000 r8:00001000 r7:ec659f18 r6:00000000 r5:00000003 [ 124.331838][ T4515] r4:00000000 [ 124.331853][ T4515] [<8049ae40>] (vm_mmap_pgoff) from [<804cc9b8>] (ksys_mmap_pgoff+0x48/0xec) [ 124.331909][ T4515] r10:000000c0 r9:84f0d400 r8:8020029c r7:20ff9000 r6:00001000 r5:00000003 [ 124.331927][ T4515] r4:00000032 [ 124.331942][ T4515] [<804cc970>] (ksys_mmap_pgoff) from [<804cca78>] (sys_mmap_pgoff+0x1c/0x24) [ 124.331999][ T4515] r8:8020029c r7:000000c0 r6:0012ff70 r5:08000000 r4:00000003 [ 124.332015][ T4515] [<804cca5c>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 124.332060][ T4515] Exception stack(0xec659fa8 to 0xec659ff0) [ 124.332098][ T4515] 9fa0: 00000003 08000000 20ff9000 00001000 00000003 00000032 [ 124.332135][ T4515] 9fc0: 00000003 08000000 0012ff70 000000c0 002e0000 00000000 00006364 76b910bc [ 124.332164][ T4515] 9fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 124.693918][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 124.694291][ T31] audit: type=1400 audit(124.600:181): avc: denied { setattr } for pid=4522 comm="syz.0.198" name="KEY" dev="sockfs" ino=4360 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 124.997193][ T4528] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4528 comm=syz.0.199 [ 125.086227][ T31] audit: type=1400 audit(124.990:182): avc: denied { nlmsg_tty_audit } for pid=4529 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 125.439278][ T4542] FAULT_INJECTION: forcing a failure. [ 125.439278][ T4542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.449085][ T4542] CPU: 0 UID: 0 PID: 4542 Comm: syz.1.205 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 125.449210][ T4542] Hardware name: ARM-Versatile Express [ 125.449236][ T4542] Call trace: [ 125.449281][ T4542] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 125.449377][ T4542] r7:20000280 r6:00000000 r5:60000013 r4:8225b4f4 [ 125.449395][ T4542] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 125.449483][ T4542] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 125.449563][ T4542] r5:84f0d400 r4:82950610 [ 125.449579][ T4542] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 125.449658][ T4542] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 125.449713][ T4542] r8:00000000 r7:20000280 r6:84a44000 r5:00000000 r4:ec785f20 [ 125.449729][ T4542] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 125.449777][ T4542] [<80964e18>] (should_fail_usercopy) from [<808b4368>] (_copy_from_iter+0x6c/0x7c8) [ 125.449827][ T4542] [<808b42fc>] (_copy_from_iter) from [<81658578>] (netlink_sendmsg+0x18c/0x444) [ 125.449899][ T4542] r10:00000000 r9:00000000 r8:ec785f30 r7:85b21800 r6:00000014 r5:847b16c0 [ 125.449975][ T4542] r4:ec785f20 [ 125.450021][ T4542] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 125.450092][ T4542] r10:00000000 r9:ec785dc4 r8:ec785dc4 r7:00000000 r6:837d0780 r5:ec785f20 [ 125.450110][ T4542] r4:00000000 [ 125.450124][ T4542] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 125.450176][ T4542] r7:00000000 r6:837d0780 r5:00040000 r4:ec785f20 [ 125.450191][ T4542] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 125.450248][ T4542] r10:ec785e24 r9:20000300 r8:00040000 r7:00000000 r6:837d0780 r5:ec785f20 [ 125.450266][ T4542] r4:00000000 [ 125.450280][ T4542] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 125.450335][ T4542] r10:00000128 r9:84f0d400 r8:85a80c00 r7:00040000 r6:20000300 r5:85a80c01 [ 125.450353][ T4542] r4:00000004 [ 125.450369][ T4542] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 125.450422][ T4542] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 125.450438][ T4542] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 125.450480][ T4542] Exception stack(0xec785fa8 to 0xec785ff0) [ 125.450514][ T4542] 5fa0: 00000000 00000000 00000004 20000300 00040000 00000000 [ 125.450543][ T4542] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b810bc [ 125.450565][ T4542] 5fe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 125.615373][ T31] audit: type=1400 audit(125.520:183): avc: denied { prog_run } for pid=4543 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 125.909022][ T31] audit: type=1400 audit(125.810:184): avc: denied { create } for pid=4551 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.086620][ T4557] FAULT_INJECTION: forcing a failure. [ 127.086620][ T4557] name failslab, interval 1, probability 0, space 0, times 0 [ 127.089192][ T4557] CPU: 0 UID: 0 PID: 4557 Comm: syz.0.210 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 127.089270][ T4557] Hardware name: ARM-Versatile Express [ 127.089449][ T4557] Call trace: [ 127.089509][ T4557] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 127.089613][ T4557] r7:84afe000 r6:00000000 r5:60000013 r4:8225b4f4 [ 127.089633][ T4557] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 127.089684][ T4557] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 127.089737][ T4557] r5:84afe000 r4:82919a80 [ 127.089756][ T4557] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 127.089815][ T4557] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 127.089877][ T4557] r8:00000000 r7:84afe000 r6:00000cc0 r5:8291cd80 r4:830a8cc0 [ 127.089895][ T4557] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 127.089943][ T4557] [<80500bf8>] (kmem_cache_alloc_noprof) from [<80550494>] (alloc_empty_file+0x54/0x13c) [ 127.090018][ T4557] r10:84afe000 r9:85addc00 r8:82805cc0 r7:8414d880 r6:00000000 r5:8291cd80 [ 127.090041][ T4557] r4:8245e828 [ 127.090058][ T4557] [<80550440>] (alloc_empty_file) from [<8054a818>] (dentry_open+0x28/0x68) [ 127.090118][ T4557] r8:00000005 r7:837cdb80 r6:84afe000 r5:eca21e84 r4:00000007 [ 127.090136][ T4557] [<8054a7f0>] (dentry_open) from [<8059e004>] (open_namespace+0x6c/0xbc) [ 127.090189][ T4557] r5:00000000 r4:00000007 [ 127.090208][ T4557] [<8059df98>] (open_namespace) from [<8059e070>] (open_related_ns+0x1c/0x20) [ 127.090320][ T4557] r6:85930000 r5:00000000 r4:0000894c [ 127.090340][ T4557] [<8059e054>] (open_related_ns) from [<8152bad0>] (sock_ioctl+0x37c/0x600) [ 127.090468][ T4557] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 127.090607][ T4557] r9:85addc00 r8:00000005 r7:00000000 r6:85addc01 r5:00000000 r4:0000894c [ 127.090651][ T4557] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 127.090823][ T4557] Exception stack(0xeca21fa8 to 0xeca21ff0) [ 127.090934][ T4557] 1fa0: 00000000 00000000 00000005 0000894c 00000000 00000000 [ 127.090986][ T4557] 1fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b910bc [ 127.091051][ T4557] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 127.091153][ T4557] r10:00000036 r9:84afe000 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 127.091173][ T4557] r4:00000000 [ 128.974846][ T4568] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4568 comm=syz.0.214 [ 128.977157][ T4568] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4568 comm=syz.0.214 [ 131.090603][ T4584] FAULT_INJECTION: forcing a failure. [ 131.090603][ T4584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.094344][ T4584] CPU: 0 UID: 0 PID: 4584 Comm: syz.0.220 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 131.094422][ T4584] Hardware name: ARM-Versatile Express [ 131.094452][ T4584] Call trace: [ 131.094498][ T4584] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 131.094601][ T4584] r7:eca71ea4 r6:00000000 r5:60000013 r4:8225b4f4 [ 131.094620][ T4584] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 131.094665][ T4584] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 131.094762][ T4584] r5:84f08c00 r4:82950610 [ 131.094783][ T4584] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 131.094846][ T4584] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 131.094910][ T4584] r8:837cc280 r7:eca71ea4 r6:20000300 r5:eca71ea8 r4:eca71f20 [ 131.094925][ T4584] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 131.094973][ T4584] [<80964e18>] (should_fail_usercopy) from [<8152d230>] (copy_msghdr_from_user+0x50/0x130) [ 131.095041][ T4584] [<8152d1e0>] (copy_msghdr_from_user) from [<8152d444>] (___sys_recvmsg+0x64/0xbc) [ 131.095108][ T4584] r8:837cc280 r7:00002000 r6:20000300 r5:eca71f20 r4:eca71eac [ 131.095196][ T4584] [<8152d3e0>] (___sys_recvmsg) from [<8152db54>] (__sys_recvmsg+0x88/0xdc) [ 131.095462][ T4584] r8:85add9c0 r7:00002000 r6:20000300 r5:85add9c1 r4:00000003 [ 131.095559][ T4584] [<8152dacc>] (__sys_recvmsg) from [<8152dbbc>] (sys_recvmsg+0x14/0x18) [ 131.095660][ T4584] r8:8020029c r7:00000129 r6:0012ff70 r5:00000000 r4:00000000 [ 131.095767][ T4584] [<8152dba8>] (sys_recvmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 131.095939][ T4584] Exception stack(0xeca71fa8 to 0xeca71ff0) [ 131.096015][ T4584] 1fa0: 00000000 00000000 00000003 20000300 00002000 00000000 [ 131.096082][ T4584] 1fc0: 00000000 00000000 0012ff70 00000129 002e0000 00000000 00006364 76b910bc [ 131.096199][ T4584] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 131.659932][ C0] hrtimer: interrupt took 8418384 ns [ 132.061446][ C0] vkms_vblank_simulate: vblank timer overrun [ 133.660350][ T23] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 133.825004][ T23] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 133.826225][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 133.828532][ T23] usb 2-1: Product: syz [ 133.830713][ T23] usb 2-1: Manufacturer: syz [ 133.832978][ T23] usb 2-1: SerialNumber: syz [ 135.425112][ T4612] 8021q: VLANs not supported on ip6_vti0 [ 137.665382][ T31] audit: type=1400 audit(137.570:185): avc: denied { ioctl } for pid=4616 comm="syz.0.227" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5374 ioctlcmd=0x941e scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 138.290989][ T31] audit: type=1400 audit(138.190:186): avc: denied { setopt } for pid=4624 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 138.400853][ T4629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4629 comm=syz.0.231 [ 138.771877][ T4635] FAULT_INJECTION: forcing a failure. [ 138.771877][ T4635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 138.773245][ T4635] CPU: 0 UID: 0 PID: 4635 Comm: syz.0.234 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 138.773339][ T4635] Hardware name: ARM-Versatile Express [ 138.773368][ T4635] Call trace: [ 138.773407][ T4635] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 138.773476][ T4635] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 138.773484][ T4635] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 138.773509][ T4635] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 138.773534][ T4635] r5:84f0a400 r4:82950610 [ 138.773541][ T4635] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 138.773569][ T4635] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 138.773599][ T4635] r8:76b90f30 r7:00000000 r6:00000000 r5:dfa3df68 r4:00000002 [ 138.773606][ T4635] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 138.773631][ T4635] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 138.773661][ T4635] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 138.773696][ T4635] r10:00000001 r9:806017c4 r8:00000002 r7:dfa3df68 r6:0000000f r5:76b90f30 [ 138.773706][ T4635] r4:84f0a400 r3:dfa3de9f [ 138.773713][ T4635] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 138.773743][ T4635] r8:76b90f30 r7:dfa3df68 r6:84f0a400 r5:0000000f r4:85add240 [ 138.773751][ T4635] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 138.773779][ T4635] r10:00000003 r9:84f0a400 r8:8020029c r7:00000000 r6:00000000 r5:85add240 [ 138.773788][ T4635] r4:85add243 [ 138.773795][ T4635] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 138.773826][ T4635] r7:00000003 r6:00000005 r5:76b90f30 r4:0000000f [ 138.773843][ T4635] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 138.773887][ T4635] Exception stack(0xdfa3dfa8 to 0xdfa3dff0) [ 138.773906][ T4635] dfa0: 0000000f 76b90f30 00000005 76b90f30 0000000f 00000000 [ 138.773936][ T4635] dfc0: 0000000f 76b90f30 00000005 00000003 002e0000 00000000 00006364 76b910bc [ 138.773985][ T4635] dfe0: 00000158 76b90ed0 000d7df0 0012fe94 [ 139.435895][ T4644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4644 comm=syz.0.238 [ 139.540446][ T31] audit: type=1400 audit(139.440:187): avc: denied { setopt } for pid=4645 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.101910][ T31] audit: type=1400 audit(141.010:188): avc: denied { name_bind } for pid=4647 comm="syz.0.240" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 143.418970][ T94] usb 2-1: USB disconnect, device number 3 [ 143.686156][ T4650] FAULT_INJECTION: forcing a failure. [ 143.686156][ T4650] name failslab, interval 1, probability 0, space 0, times 0 [ 143.688728][ T4650] CPU: 0 UID: 0 PID: 4650 Comm: syz.0.241 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 143.688825][ T4650] Hardware name: ARM-Versatile Express [ 143.688851][ T4650] Call trace: [ 143.688889][ T4650] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 143.688984][ T4650] r7:84f08c00 r6:00000000 r5:60000013 r4:8225b4f4 [ 143.689009][ T4650] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 143.689061][ T4650] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 143.689120][ T4650] r5:84f08c00 r4:82919a80 [ 143.689136][ T4650] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 143.689193][ T4650] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 143.689322][ T4650] r8:00000000 r7:84f08c00 r6:00000dc0 r5:82ab357c r4:830ad780 [ 143.689342][ T4650] [<8051c1b8>] (should_failslab) from [<80500c44>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 143.689389][ T4650] [<80500bf8>] (kmem_cache_alloc_noprof) from [<80384d00>] (taskstats_exit+0x228/0x360) [ 143.689654][ T4650] r10:85556a00 r9:00000000 r8:eca21e90 r7:8320e400 r6:00000000 r5:82ab357c [ 143.689684][ T4650] r4:84f08c00 [ 143.689701][ T4650] [<80384ad8>] (taskstats_exit) from [<8025f278>] (do_exit+0x1ac/0xaa8) [ 143.689765][ T4650] r10:85556a00 r9:00000001 r8:eca21e90 r7:85556a00 r6:00000000 r5:84f08c00 [ 143.689786][ T4650] r4:00000000 [ 143.689802][ T4650] [<8025f0cc>] (do_exit) from [<8025fd34>] (do_group_exit+0x40/0x8c) [ 143.689848][ T4650] r7:00131fc0 [ 143.689866][ T4650] [<8025fcf4>] (do_group_exit) from [<80270a58>] (get_signal+0xa14/0xa38) [ 143.689921][ T4650] r7:00131fc0 r4:84f08c00 [ 143.689938][ T4650] [<80270044>] (get_signal) from [<8022ba18>] (do_work_pending+0x248/0x4f8) [ 143.690029][ T4650] r10:00000129 r9:fffffe00 r8:00131fbc r7:00131fc0 r6:00000001 r5:eca21fb0 [ 143.690051][ T4650] r4:84f08c00 [ 143.690068][ T4650] [<8022b7d0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 143.690115][ T4650] Exception stack(0xeca21fb0 to 0xeca21ff8) [ 143.690150][ T4650] 1fa0: 00000003 20000300 00002000 00000000 [ 143.690183][ T4650] 1fc0: 00000000 00000000 0012ff70 00000129 002e0000 00000000 00006364 76b910bc [ 143.690212][ T4650] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fbc 60000010 00000003 [ 143.690254][ T4650] r10:00000129 r9:84f08c00 r8:8020029c r7:00000129 r6:0012ff70 r5:00000000 [ 143.690379][ T4650] r4:00000000 [ 144.068350][ T4674] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4674 comm=syz.0.249 [ 144.073349][ T4674] syz.0.249(4674): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 146.692197][ T31] audit: type=1400 audit(146.600:189): avc: denied { read write } for pid=4688 comm="syz.0.252" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 146.694474][ T31] audit: type=1400 audit(146.600:190): avc: denied { open } for pid=4688 comm="syz.0.252" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 146.708878][ T31] audit: type=1400 audit(146.610:191): avc: denied { ioctl } for pid=4688 comm="syz.0.252" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x64c2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 147.479202][ T31] audit: type=1400 audit(147.380:192): avc: denied { checkpoint_restore } for pid=4692 comm="syz.1.254" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 147.618676][ T31] audit: type=1400 audit(147.520:193): avc: denied { shutdown } for pid=4707 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 147.636411][ T31] audit: type=1400 audit(147.540:194): avc: denied { ioctl } for pid=4707 comm="syz.0.261" path="socket:[5546]" dev="sockfs" ino=5546 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.534130][ T4716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4716 comm=syz.0.263 [ 153.081528][ T4733] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4733 comm=syz.1.270 [ 154.796525][ T31] audit: type=1400 audit(154.700:195): avc: denied { shutdown } for pid=4740 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 156.546536][ T4788] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4788 comm=syz.1.283 [ 156.779041][ T31] audit: type=1400 audit(156.680:196): avc: denied { setattr } for pid=4793 comm="syz.0.284" name="CAN_RAW" dev="sockfs" ino=4825 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.424637][ T4842] FAULT_INJECTION: forcing a failure. [ 158.424637][ T4842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.425255][ T4842] CPU: 1 UID: 0 PID: 4842 Comm: syz.1.301 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 158.425330][ T4842] Hardware name: ARM-Versatile Express [ 158.425356][ T4842] Call trace: [ 158.425400][ T4842] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 158.425578][ T4842] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 158.425629][ T4842] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 158.425727][ T4842] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 158.425904][ T4842] r5:84f08c00 r4:82950610 [ 158.425939][ T4842] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 158.426142][ T4842] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 158.426342][ T4842] r8:8020029c r7:00000000 r6:8245e848 r5:20000080 r4:20000080 [ 158.426446][ T4842] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 158.426560][ T4842] [<80964e18>] (should_fail_usercopy) from [<8096af00>] (strncpy_from_user+0x20/0x1a0) [ 158.426611][ T4842] [<8096aee0>] (strncpy_from_user) from [<8055d2c4>] (getname_flags.part.0+0x44/0x18c) [ 158.426922][ T4842] r10:00000142 r9:84f08c00 r8:8020029c r7:00000000 r6:8245e848 r5:20000080 [ 158.426996][ T4842] r4:83897000 [ 158.427938][ T4842] [<8055d280>] (getname_flags.part.0) from [<8056223c>] (getname_flags+0x3c/0x50) [ 158.428769][ T4842] r9:84f08c00 r8:8020029c r7:ffffff9c r6:dfc61f58 r5:00000000 r4:20000080 [ 158.429035][ T4842] [<80562200>] (getname_flags) from [<8054ac08>] (do_sys_openat2+0x60/0xe0) [ 158.429165][ T4842] r5:20000080 r4:00000000 [ 158.429185][ T4842] [<8054aba8>] (do_sys_openat2) from [<8054b060>] (sys_openat+0x98/0xd4) [ 158.429302][ T4842] r7:00000142 r6:0012ff70 r5:20000080 r4:ffffff9c [ 158.429363][ T4842] [<8054afc8>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 158.429527][ T4842] Exception stack(0xdfc61fa8 to 0xdfc61ff0) [ 158.429791][ T4842] 1fa0: 00000000 00000000 ffffff9c 20000080 00000002 00000000 [ 158.429966][ T4842] 1fc0: 00000000 00000000 0012ff70 00000142 002e0000 00000000 00006364 76b810bc [ 158.430144][ T4842] 1fe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 158.430557][ T4842] r5:00000000 r4:00000000 [ 158.530216][ T31] audit: type=1400 audit(158.420:197): avc: denied { getopt } for pid=4843 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 158.563016][ T31] audit: type=1400 audit(158.470:198): avc: denied { ioctl } for pid=4843 comm="syz.0.302" path="socket:[5696]" dev="sockfs" ino=5696 ioctlcmd=0x5010 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 158.722374][ T31] audit: type=1400 audit(158.630:199): avc: denied { ioctl } for pid=4843 comm="syz.0.302" path="socket:[5768]" dev="sockfs" ino=5768 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 158.968786][ T31] audit: type=1400 audit(158.870:200): avc: denied { getopt } for pid=4859 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 161.740409][ T31] audit: type=1400 audit(161.640:201): avc: denied { setopt } for pid=4868 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 164.581236][ T4896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=4896 comm=syz.0.316 [ 164.597448][ T31] audit: type=1400 audit(164.500:202): avc: denied { execute } for pid=4894 comm="syz.0.316" name="file0" dev="tmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 169.366223][ T4929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2570 sclass=netlink_route_socket pid=4929 comm=syz.1.326 [ 169.369234][ T4930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2570 sclass=netlink_route_socket pid=4930 comm=syz.1.326 [ 172.950791][ T4949] FAULT_INJECTION: forcing a failure. [ 172.950791][ T4949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.969526][ T4949] CPU: 0 UID: 0 PID: 4949 Comm: syz.0.332 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 172.969720][ T4949] Hardware name: ARM-Versatile Express [ 172.969749][ T4949] Call trace: [ 172.969790][ T4949] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 172.969903][ T4949] r7:dfa51e20 r6:00000000 r5:60000013 r4:8225b4f4 [ 172.969924][ T4949] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 172.969975][ T4949] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 172.970030][ T4949] r5:84f09800 r4:82950610 [ 172.970112][ T4949] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 172.971601][ T4949] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 172.971983][ T4949] r8:00004010 r7:dfa51e20 r6:20000300 r5:00000000 r4:dfa51f20 [ 172.972012][ T4949] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 172.972063][ T4949] [<80964e18>] (should_fail_usercopy) from [<8152d230>] (copy_msghdr_from_user+0x50/0x130) [ 172.972114][ T4949] [<8152d1e0>] (copy_msghdr_from_user) from [<8152d388>] (___sys_sendmsg+0x78/0xd0) [ 172.972173][ T4949] r8:00004010 r7:00000000 r6:850b7680 r5:dfa51f20 r4:dfa51e64 [ 172.972192][ T4949] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 172.972321][ T4949] r10:00000128 r9:84f09800 r8:85adea80 r7:00004010 r6:20000300 r5:85adea81 [ 172.972343][ T4949] r4:00000003 [ 172.972360][ T4949] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 172.972424][ T4949] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 172.972443][ T4949] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 172.972488][ T4949] Exception stack(0xdfa51fa8 to 0xdfa51ff0) [ 172.972524][ T4949] 1fa0: 00000000 00000000 00000003 20000300 00004010 00000000 [ 172.972557][ T4949] 1fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b910bc [ 172.972581][ T4949] 1fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 175.476678][ T4967] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4967 comm=syz.1.335 [ 176.470407][ T4971] FAULT_INJECTION: forcing a failure. [ 176.470407][ T4971] name failslab, interval 1, probability 0, space 0, times 0 [ 176.470857][ T4971] CPU: 0 UID: 0 PID: 4971 Comm: syz.1.337 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 176.470943][ T4971] Hardware name: ARM-Versatile Express [ 176.470967][ T4971] Call trace: [ 176.471009][ T4971] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 176.471107][ T4971] r7:84f08c00 r6:00000000 r5:60000013 r4:8225b4f4 [ 176.471283][ T4971] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 176.471604][ T4971] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 176.471675][ T4971] r5:84f08c00 r4:82919a80 [ 176.471693][ T4971] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 176.471790][ T4971] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 176.471901][ T4971] r8:00000000 r7:84f08c00 r6:00000dc0 r5:20000080 r4:83001240 [ 176.472150][ T4971] [<8051c1b8>] (should_failslab) from [<804ffff8>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 176.472225][ T4971] [<804fffac>] (__kmalloc_cache_noprof) from [<8055d354>] (getname_flags.part.0+0xd4/0x18c) [ 176.472334][ T4971] r10:00000142 r9:84f08c00 r8:8020029c r7:00000000 r6:8245e848 r5:20000080 [ 176.472355][ T4971] r4:83256000 [ 176.472395][ T4971] [<8055d280>] (getname_flags.part.0) from [<8056223c>] (getname_flags+0x3c/0x50) [ 176.472958][ T4971] r9:84f08c00 r8:8020029c r7:ffffff9c r6:dfa9df58 r5:00000000 r4:20000080 [ 176.473064][ T4971] [<80562200>] (getname_flags) from [<8054ac08>] (do_sys_openat2+0x60/0xe0) [ 176.473272][ T4971] r5:20000080 r4:00000000 [ 176.473317][ T4971] [<8054aba8>] (do_sys_openat2) from [<8054b060>] (sys_openat+0x98/0xd4) [ 176.473776][ T4971] r7:00000142 r6:0012ff70 r5:20000080 r4:ffffff9c [ 176.473814][ T4971] [<8054afc8>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 176.473894][ T4971] Exception stack(0xdfa9dfa8 to 0xdfa9dff0) [ 176.473929][ T4971] dfa0: 00000000 00000000 ffffff9c 20000080 00000002 00000000 [ 176.473957][ T4971] dfc0: 00000000 00000000 0012ff70 00000142 002e0000 00000000 00006364 76b810bc [ 176.473980][ T4971] dfe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 176.474005][ T4971] r5:00000000 r4:00000000 [ 183.160149][ T5016] FAULT_INJECTION: forcing a failure. [ 183.160149][ T5016] name failslab, interval 1, probability 0, space 0, times 0 [ 183.160647][ T5016] CPU: 0 UID: 0 PID: 5016 Comm: syz.0.355 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 183.160708][ T5016] Hardware name: ARM-Versatile Express [ 183.160735][ T5016] Call trace: [ 183.160778][ T5016] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 183.160985][ T5016] r7:84f0e000 r6:00000000 r5:60000013 r4:8225b4f4 [ 183.161012][ T5016] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 183.161252][ T5016] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 183.161700][ T5016] r5:84f0e000 r4:82919a80 [ 183.161733][ T5016] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 183.164866][ T5016] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 183.165004][ T5016] r8:00000000 r7:84f0e000 r6:00000cc0 r5:ffffffff r4:8329f300 [ 183.165024][ T5016] [<8051c1b8>] (should_failslab) from [<805005d8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 183.165071][ T5016] [<80500588>] (kmem_cache_alloc_node_noprof) from [<81538044>] (__alloc_skb+0x138/0x160) [ 183.165128][ T5016] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:8329f300 r5:ffffffff [ 183.165147][ T5016] r4:828060c0 [ 183.165164][ T5016] [<81537f0c>] (__alloc_skb) from [<81657de0>] (netlink_alloc_large_skb+0x88/0xa0) [ 183.165234][ T5016] r8:00000000 r7:8622f800 r6:00000014 r5:850b6c80 r4:00000140 [ 183.165252][ T5016] [<81657d58>] (netlink_alloc_large_skb) from [<81658520>] (netlink_sendmsg+0x134/0x444) [ 183.165303][ T5016] r5:850b6c80 r4:dfc75f20 [ 183.165426][ T5016] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 183.165498][ T5016] r10:00000000 r9:dfc75dc4 r8:dfc75dc4 r7:00000000 r6:850b6c80 r5:dfc75f20 [ 183.165517][ T5016] r4:00000000 [ 183.165533][ T5016] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 183.165588][ T5016] r7:00000000 r6:850b6c80 r5:00004010 r4:dfc75f20 [ 183.165604][ T5016] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 183.169697][ T5016] r10:dfc75e24 r9:20000300 r8:00004010 r7:00000000 r6:850b6c80 r5:dfc75f20 [ 183.169744][ T5016] r4:00000000 [ 183.169761][ T5016] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 183.169839][ T5016] r10:00000128 r9:84f0e000 r8:85ab33c0 r7:00004010 r6:20000300 r5:85ab33c1 [ 183.169856][ T5016] r4:00000003 [ 183.169871][ T5016] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 183.169924][ T5016] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 183.169939][ T5016] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 183.169987][ T5016] Exception stack(0xdfc75fa8 to 0xdfc75ff0) [ 183.170024][ T5016] 5fa0: 00000000 00000000 00000003 20000300 00004010 00000000 [ 183.170054][ T5016] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b910bc [ 183.170078][ T5016] 5fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 183.926661][ T31] audit: type=1107 audit(183.830:203): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='y ƺ"m.aX讝2z9P~T'0չh6kx7΅*:l l ' [ 186.539326][ T31] audit: type=1400 audit(186.440:204): avc: denied { nlmsg_read } for pid=5039 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 186.633520][ T31] audit: type=1400 audit(186.540:205): avc: denied { create } for pid=5039 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 186.654794][ T31] audit: type=1400 audit(186.550:206): avc: denied { accept } for pid=5039 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 187.391663][ T5054] FAULT_INJECTION: forcing a failure. [ 187.391663][ T5054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.392073][ T5054] CPU: 0 UID: 0 PID: 5054 Comm: syz.1.368 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 187.392117][ T5054] Hardware name: ARM-Versatile Express [ 187.392129][ T5054] Call trace: [ 187.392149][ T5054] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 187.392205][ T5054] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 187.392214][ T5054] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 187.392238][ T5054] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 187.392263][ T5054] r5:84f08000 r4:82950610 [ 187.392270][ T5054] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 187.392298][ T5054] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 187.392328][ T5054] r8:76b80f30 r7:00000000 r6:00000000 r5:dfb25f68 r4:00000002 [ 187.392335][ T5054] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 187.392359][ T5054] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 187.392386][ T5054] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 187.392421][ T5054] r10:00000001 r9:806017c4 r8:00000002 r7:dfb25f68 r6:0000000f r5:76b80f30 [ 187.392483][ T5054] r4:84f08000 r3:dfb25e9f [ 187.392585][ T5054] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 187.392682][ T5054] r8:76b80f30 r7:dfb25f68 r6:84f08000 r5:0000000f r4:85ac4180 [ 187.392741][ T5054] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 187.392875][ T5054] r10:00000003 r9:84f08000 r8:8020029c r7:00000000 r6:00000000 r5:85ac4180 [ 187.392901][ T5054] r4:85ac4183 [ 187.392949][ T5054] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 187.393064][ T5054] r7:00000003 r6:00000004 r5:76b80f30 r4:0000000f [ 187.393241][ T5054] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 187.393300][ T5054] Exception stack(0xdfb25fa8 to 0xdfb25ff0) [ 187.393388][ T5054] 5fa0: 0000000f 76b80f30 00000004 76b80f30 0000000f 00000000 [ 187.393575][ T5054] 5fc0: 0000000f 76b80f30 00000004 00000003 002e0000 00000000 00006364 76b810bc [ 187.393641][ T5054] 5fe0: 00000158 76b80ed0 000d7df0 0012fe94 [ 187.452953][ T31] audit: type=1400 audit(187.360:207): avc: denied { append } for pid=5052 comm="syz.0.369" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 190.354402][ T5079] binder: 5078:5079 ioctl c018620c 20000040 returned -1 [ 190.591185][ T5090] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5090 comm=syz.0.378 [ 191.492989][ T31] audit: type=1400 audit(191.400:208): avc: denied { connect } for pid=5091 comm="syz.0.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 192.420570][ C1] vkms_vblank_simulate: vblank timer overrun [ 196.794566][ T31] audit: type=1400 audit(196.700:209): avc: denied { audit_read } for pid=5135 comm="syz.0.394" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 196.975321][ T5140] FAULT_INJECTION: forcing a failure. [ 196.975321][ T5140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.977068][ T5140] CPU: 1 UID: 0 PID: 5140 Comm: syz.0.396 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 196.977187][ T5140] Hardware name: ARM-Versatile Express [ 196.977215][ T5140] Call trace: [ 196.977266][ T5140] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 196.977380][ T5140] r7:20000200 r6:00000000 r5:60000013 r4:8225b4f4 [ 196.977403][ T5140] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 196.977459][ T5140] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 196.977519][ T5140] r5:83afbc00 r4:82950610 [ 196.977537][ T5140] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 196.977600][ T5140] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 196.977668][ T5140] r8:0000000c r7:20000200 r6:dfcfde44 r5:0000000c r4:0000000c [ 196.977688][ T5140] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 196.977745][ T5140] [<80964e18>] (should_fail_usercopy) from [<81719020>] (copy_from_sockptr_offset.constprop.0+0x5c/0x11c) [ 196.977812][ T5140] [<81718fc4>] (copy_from_sockptr_offset.constprop.0) from [<8171af48>] (do_ip_setsockopt+0x818/0x12d0) [ 196.977880][ T5140] r8:0000000c r7:8171ba3c r6:dfcfde50 r5:8394e680 r4:00000025 [ 196.977902][ T5140] [<8171a734>] (do_ip_setsockopt) from [<8171ba3c>] (ip_setsockopt+0x3c/0x98) [ 196.977973][ T5140] r10:00000126 r9:83afbc00 r8:0000000c r7:837ce780 r6:8394e680 r5:0000000c [ 196.977996][ T5140] r4:00000025 [ 196.978013][ T5140] [<8171ba04>] (ip_setsockopt) from [<8175e1b4>] (udp_setsockopt+0x38/0x64) [ 196.978080][ T5140] r6:00000025 r5:00000000 r4:8175e17c [ 196.978099][ T5140] [<8175e180>] (udp_setsockopt) from [<8152e208>] (sock_common_setsockopt+0x38/0x40) [ 196.978160][ T5140] r4:8175e17c [ 196.978179][ T5140] [<8152e1d4>] (sock_common_setsockopt) from [<81529a98>] (do_sock_setsockopt+0x70/0xc8) [ 196.978242][ T5140] r4:8152e1d0 [ 196.978261][ T5140] [<81529a28>] (do_sock_setsockopt) from [<8152ce70>] (__sys_setsockopt+0x7c/0xc4) [ 196.978324][ T5140] r8:00000000 r7:85ad76c0 r6:85ad76c1 r5:00000025 r4:00000000 [ 196.978344][ T5140] [<8152cdf4>] (__sys_setsockopt) from [<8152ced4>] (sys_setsockopt+0x1c/0x24) [ 196.978408][ T5140] r8:8020029c r7:00000126 r6:0012ff70 r5:00000000 r4:0000000c [ 196.978427][ T5140] [<8152ceb8>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 196.978479][ T5140] Exception stack(0xdfcfdfa8 to 0xdfcfdff0) [ 196.978513][ T5140] dfa0: 0000000c 00000000 00000003 00000000 00000025 20000200 [ 196.978554][ T5140] dfc0: 0000000c 00000000 0012ff70 00000126 002e0000 00000000 00006364 76b910bc [ 196.978584][ T5140] dfe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 198.065699][ T31] audit: type=1400 audit(197.970:210): avc: denied { getopt } for pid=5155 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 200.056001][ T5174] FAULT_INJECTION: forcing a failure. [ 200.056001][ T5174] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.069033][ T5174] CPU: 1 UID: 0 PID: 5174 Comm: syz.0.408 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 200.069169][ T5174] Hardware name: ARM-Versatile Express [ 200.069199][ T5174] Call trace: [ 200.069256][ T5174] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 200.069358][ T5174] r7:20000240 r6:00000000 r5:60000013 r4:8225b4f4 [ 200.069379][ T5174] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 200.069429][ T5174] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 200.069519][ T5174] r5:84b0e000 r4:82950610 [ 200.069539][ T5174] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 200.069602][ T5174] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 200.069667][ T5174] r8:00000000 r7:20000240 r6:84a4f8c0 r5:00000000 r4:df9d5f20 [ 200.069686][ T5174] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 200.069736][ T5174] [<80964e18>] (should_fail_usercopy) from [<808b4368>] (_copy_from_iter+0x6c/0x7c8) [ 200.069791][ T5174] [<808b42fc>] (_copy_from_iter) from [<81658578>] (netlink_sendmsg+0x18c/0x444) [ 200.069910][ T5174] r10:00000000 r9:00000000 r8:df9d5f30 r7:85b1f000 r6:00000014 r5:833909c0 [ 200.069961][ T5174] r4:df9d5f20 [ 200.069981][ T5174] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 200.070051][ T5174] r10:00000000 r9:df9d5dc4 r8:df9d5dc4 r7:00000000 r6:837ce280 r5:df9d5f20 [ 200.070071][ T5174] r4:00000000 [ 200.070092][ T5174] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 200.070149][ T5174] r7:00000000 r6:837ce280 r5:00004010 r4:df9d5f20 [ 200.070168][ T5174] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 200.070240][ T5174] r10:df9d5e24 r9:20000300 r8:00004010 r7:00000000 r6:837ce280 r5:df9d5f20 [ 200.070261][ T5174] r4:00000000 [ 200.070278][ T5174] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 200.070340][ T5174] r10:00000128 r9:84b0e000 r8:85ad7840 r7:00004010 r6:20000300 r5:85ad7841 [ 200.070362][ T5174] r4:00000003 [ 200.070379][ T5174] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 200.070436][ T5174] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 200.070454][ T5174] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 200.070501][ T5174] Exception stack(0xdf9d5fa8 to 0xdf9d5ff0) [ 200.070541][ T5174] 5fa0: 00000000 00000000 00000003 20000300 00004010 00000000 [ 200.070571][ T5174] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b910bc [ 200.070596][ T5174] 5fe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 201.292074][ T31] audit: type=1400 audit(201.190:211): avc: denied { write } for pid=5181 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 203.203500][ C1] vkms_vblank_simulate: vblank timer overrun [ 204.773494][ T31] audit: type=1400 audit(204.680:212): avc: denied { ioctl } for pid=5217 comm="syz.1.424" path="socket:[6549]" dev="sockfs" ino=6549 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 207.866884][ T5232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5232 comm=syz.1.428 [ 208.752324][ T5255] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5255 comm=syz.0.436 [ 209.272721][ T31] audit: type=1400 audit(209.180:213): avc: denied { write } for pid=5254 comm="syz.0.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 209.504414][ T5261] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5261 comm=syz.1.438 [ 209.716221][ T31] audit: type=1400 audit(209.620:214): avc: denied { name_bind } for pid=5264 comm="syz.1.440" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 209.775924][ T5266] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5266 comm=syz.0.436 [ 210.546890][ T5282] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5282 comm=syz.1.448 [ 212.042388][ T5303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5303 comm=syz.1.454 [ 212.059130][ T5303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5303 comm=syz.1.454 [ 212.271995][ T31] audit: type=1400 audit(212.150:215): avc: denied { lock } for pid=5306 comm="syz.1.456" path="socket:[7735]" dev="sockfs" ino=7735 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 213.367565][ T31] audit: type=1400 audit(213.270:216): avc: denied { create } for pid=5332 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 213.376365][ T31] audit: type=1400 audit(213.280:217): avc: denied { write } for pid=5332 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 213.580396][ T94] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 213.730814][ T94] usb 2-1: Using ep0 maxpacket: 16 [ 213.747114][ T94] usb 2-1: config 4 has an invalid interface number: 192 but max is 3 [ 213.747529][ T94] usb 2-1: config 4 contains an unexpected descriptor of type 0x1, skipping [ 213.748123][ T94] usb 2-1: config 4 has an invalid interface number: 24 but max is 3 [ 213.748614][ T94] usb 2-1: config 4 has an invalid interface number: 178 but max is 3 [ 213.749001][ T94] usb 2-1: config 4 has an invalid interface number: 170 but max is 3 [ 213.749498][ T94] usb 2-1: config 4 has an invalid interface number: 23 but max is 3 [ 213.760793][ T94] usb 2-1: config 4 has an invalid descriptor of length 218, skipping remainder of the config [ 213.761176][ T94] usb 2-1: config 4 has 6 interfaces, different from the descriptor's value: 4 [ 213.761503][ T94] usb 2-1: config 4 has no interface number 0 [ 213.761771][ T94] usb 2-1: config 4 has no interface number 2 [ 213.761999][ T94] usb 2-1: config 4 has no interface number 3 [ 213.762206][ T94] usb 2-1: config 4 has no interface number 4 [ 213.762409][ T94] usb 2-1: config 4 has no interface number 5 [ 213.762882][ T94] usb 2-1: config 4 interface 192 altsetting 4 endpoint 0x2 has invalid wMaxPacketSize 0 [ 213.763232][ T94] usb 2-1: config 4 interface 192 altsetting 4 endpoint 0x4 has invalid maxpacket 1048, setting to 64 [ 213.763499][ T94] usb 2-1: config 4 interface 192 altsetting 4 has an invalid descriptor for endpoint zero, skipping [ 213.763946][ T94] usb 2-1: config 4 interface 192 altsetting 4 endpoint 0x5 has invalid maxpacket 512, setting to 64 [ 213.764235][ T94] usb 2-1: config 4 interface 192 altsetting 4 has a duplicate endpoint with address 0x9, skipping [ 213.764625][ T94] usb 2-1: config 4 interface 24 altsetting 128 has a duplicate endpoint with address 0x6, skipping [ 213.764715][ T94] usb 2-1: config 4 interface 24 altsetting 128 has 1 endpoint descriptor, different from the interface descriptor's value: 10 [ 213.764827][ T94] usb 2-1: too many endpoints for config 4 interface 178 altsetting 50: 54, using maximum allowed: 30 [ 213.764938][ T94] usb 2-1: config 4 interface 178 altsetting 50 bulk endpoint 0xB has invalid maxpacket 1024 [ 213.765064][ T94] usb 2-1: config 4 interface 178 altsetting 50 bulk endpoint 0x8D has invalid maxpacket 1024 [ 213.765138][ T94] usb 2-1: config 4 interface 178 altsetting 50 has a duplicate endpoint with address 0x6, skipping [ 213.765208][ T94] usb 2-1: config 4 interface 178 altsetting 50 has a duplicate endpoint with address 0x2, skipping [ 213.765270][ T94] usb 2-1: config 4 interface 178 altsetting 50 has an invalid descriptor for endpoint zero, skipping [ 213.765334][ T94] usb 2-1: config 4 interface 178 altsetting 50 has a duplicate endpoint with address 0x9, skipping [ 213.765396][ T94] usb 2-1: config 4 interface 178 altsetting 50 has a duplicate endpoint with address 0xA, skipping [ 213.765541][ T94] usb 2-1: config 4 interface 178 altsetting 50 has an invalid descriptor for endpoint zero, skipping [ 213.765611][ T94] usb 2-1: config 4 interface 178 altsetting 50 has 9 endpoint descriptors, different from the interface descriptor's value: 54 [ 213.765700][ T94] usb 2-1: config 4 interface 1 altsetting 184 has a duplicate endpoint with address 0x5, skipping [ 213.765817][ T94] usb 2-1: config 4 interface 1 altsetting 184 has a duplicate endpoint with address 0x1, skipping [ 213.765892][ T94] usb 2-1: config 4 interface 1 altsetting 184 has a duplicate endpoint with address 0xE, skipping [ 213.765958][ T94] usb 2-1: config 4 interface 1 altsetting 184 has an invalid descriptor for endpoint zero, skipping [ 213.766036][ T94] usb 2-1: config 4 interface 1 altsetting 184 has a duplicate endpoint with address 0x6, skipping [ 213.766105][ T94] usb 2-1: config 4 interface 1 altsetting 184 has 9 endpoint descriptors, different from the interface descriptor's value: 11 [ 213.766180][ T94] usb 2-1: config 4 interface 170 altsetting 180 has a duplicate endpoint with address 0xF, skipping [ 213.766259][ T94] usb 2-1: config 4 interface 170 altsetting 180 has a duplicate endpoint with address 0x8, skipping [ 213.766327][ T94] usb 2-1: config 4 interface 170 altsetting 180 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 213.766456][ T94] usb 2-1: config 4 interface 23 altsetting 152 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 213.766572][ T94] usb 2-1: config 4 interface 192 has no altsetting 0 [ 213.766757][ T94] usb 2-1: config 4 interface 24 has no altsetting 0 [ 213.766858][ T94] usb 2-1: config 4 interface 178 has no altsetting 0 [ 213.766971][ T94] usb 2-1: config 4 interface 1 has no altsetting 0 [ 213.767043][ T94] usb 2-1: config 4 interface 170 has no altsetting 0 [ 213.767102][ T94] usb 2-1: config 4 interface 23 has no altsetting 0 [ 213.901080][ T94] usb 2-1: New USB device found, idVendor=0ac8, idProduct=305b, bcdDevice= 5.6b [ 213.901496][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 213.901590][ T94] usb 2-1: Product: syz [ 213.901648][ T94] usb 2-1: Manufacturer: Ǡ᚞꧄쒏㚮龺㜌샩Ⱓㅟ퇋ﻇ퉄შᑭ뢤₷鵣徆䦎・絴⦺꟎⡆⯇벇혨膪继䢢笸鋪럕ၿ䠱㐞歛Ⓔ탌觰䛙핽䂝疗禤鋀第㌏㥫蒽Ṥꅄコ倅㊆᠁伄언湗׈ [ 213.901713][ T94] usb 2-1: SerialNumber: syz [ 214.212802][ T94] cdc_ether 2-1:4.23: skipping garbage [ 214.213244][ T94] cdc_ether 2-1:4.23: skipping garbage [ 214.213539][ T94] usb 2-1: bad CDC descriptors [ 214.224018][ T94] usb 2-1: USB disconnect, device number 4 [ 216.408610][ C0] vkms_vblank_simulate: vblank timer overrun [ 217.458648][ T31] audit: type=1400 audit(217.360:218): avc: denied { accept } for pid=5380 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 217.483676][ T5381] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5381 comm=syz.0.469 [ 217.814324][ T5388] FAULT_INJECTION: forcing a failure. [ 217.814324][ T5388] name failslab, interval 1, probability 0, space 0, times 0 [ 217.814795][ T5388] CPU: 0 UID: 0 PID: 5388 Comm: syz.1.472 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 217.814865][ T5388] Hardware name: ARM-Versatile Express [ 217.814893][ T5388] Call trace: [ 217.814932][ T5388] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 217.815075][ T5388] r7:84b0c800 r6:00000000 r5:60000013 r4:8225b4f4 [ 217.815098][ T5388] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 217.815165][ T5388] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 217.815224][ T5388] r5:84b0c800 r4:82919a80 [ 217.815256][ T5388] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 217.815315][ T5388] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 217.815375][ T5388] r8:00000000 r7:84b0c800 r6:00000dc0 r5:e02b1f20 r4:83001240 [ 217.815392][ T5388] [<8051c1b8>] (should_failslab) from [<804ffff8>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 217.815433][ T5388] [<804fffac>] (__kmalloc_cache_noprof) from [<81726510>] (tcp_sendmsg_fastopen+0x94/0x188) [ 217.815510][ T5388] r10:20000001 r9:e02b1f20 r8:00000000 r7:e02b1ce4 r6:00000000 r5:e02b1f20 [ 217.815535][ T5388] r4:841439c0 [ 217.815551][ T5388] [<8172647c>] (tcp_sendmsg_fastopen) from [<81726f24>] (tcp_sendmsg_locked+0x920/0x1030) [ 217.815602][ T5388] r8:841439c0 r7:00000000 r6:00000000 r5:00000000 r4:00000000 [ 217.815617][ T5388] [<81726604>] (tcp_sendmsg_locked) from [<81727664>] (tcp_sendmsg+0x30/0x44) [ 217.815668][ T5388] r10:00000000 r9:e02b1dc4 r8:e02b1dc4 r7:00000000 r6:00000000 r5:e02b1f20 [ 217.815686][ T5388] r4:841439c0 [ 217.815700][ T5388] [<81727634>] (tcp_sendmsg) from [<81806bb8>] (inet6_sendmsg+0x40/0x4c) [ 217.815751][ T5388] r7:00000000 r6:841439c0 r5:00000000 r4:e02b1f20 [ 217.815766][ T5388] [<81806b78>] (inet6_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 217.815858][ T5388] r7:00000000 r6:837d0f00 r5:e02b1f20 r4:00000000 [ 217.815875][ T5388] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 217.815926][ T5388] r7:00000000 r6:837d0f00 r5:20000001 r4:e02b1f20 [ 217.815942][ T5388] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 217.815998][ T5388] r10:e02b1e24 r9:20000d00 r8:20000001 r7:00000000 r6:837d0f00 r5:e02b1f20 [ 217.816017][ T5388] r4:00000000 [ 217.816032][ T5388] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 217.816087][ T5388] r10:00000128 r9:84b0c800 r8:85a80240 r7:20000001 r6:20000d00 r5:85a80241 [ 217.816122][ T5388] r4:00000004 [ 217.816141][ T5388] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 217.816196][ T5388] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 217.816213][ T5388] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 217.816260][ T5388] Exception stack(0xe02b1fa8 to 0xe02b1ff0) [ 217.816294][ T5388] 1fa0: 00000000 00000000 00000004 20000d00 20000001 00000000 [ 217.816326][ T5388] 1fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b810bc [ 217.816349][ T5388] 1fe0: 76b80ec0 76b80eb0 000193a4 00131fc0 [ 220.702632][ T5421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5421 comm=syz.1.482 [ 220.705069][ T5421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=5421 comm=syz.1.482 [ 223.152778][ T5440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5440 comm=syz.1.488 [ 223.154884][ T5440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=5440 comm=syz.1.488 [ 226.164783][ T5459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5459 comm=syz.0.495 [ 226.167023][ T5459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=5459 comm=syz.0.495 [ 227.952728][ T5473] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5473 comm=syz.1.500 [ 227.971620][ T5473] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=5473 comm=syz.1.500 [ 229.756587][ T31] audit: type=1400 audit(229.660:219): avc: denied { create } for pid=5483 comm="syz.1.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 230.875425][ T31] audit: type=1400 audit(230.780:220): avc: denied { bind } for pid=5494 comm="syz.1.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 230.876976][ T31] audit: type=1400 audit(230.780:221): avc: denied { name_bind } for pid=5494 comm="syz.1.508" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 230.880820][ T31] audit: type=1400 audit(230.790:222): avc: denied { node_bind } for pid=5494 comm="syz.1.508" saddr=172.30.0.2 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 233.997336][ T5516] netlink: 4 bytes leftover after parsing attributes in process `syz.1.518'. [ 234.032368][ T31] audit: type=1400 audit(233.940:223): avc: denied { mounton } for pid=5515 comm="syz.0.519" path="/proc/644/task" dev="proc" ino=7989 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 234.580803][ T23] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 234.601037][ T31] audit: type=1400 audit(234.490:224): avc: denied { setopt } for pid=5526 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 234.755045][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 234.809160][ T23] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 234.870099][ T23] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 234.871917][ T23] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 234.872951][ T23] usb 1-1: Product: syz [ 234.873737][ T23] usb 1-1: Manufacturer: syz [ 234.874824][ T23] usb 1-1: SerialNumber: syz [ 234.883473][ T23] usb 1-1: config 0 descriptor?? [ 234.910558][ T5522] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 234.922552][ T23] hub 1-1:0.0: bad descriptor, ignoring hub [ 234.923930][ T23] hub 1-1:0.0: probe with driver hub failed with error -5 [ 235.200759][ T1606] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 235.277503][ T23] usb 1-1: USB disconnect, device number 4 [ 235.426320][ T1606] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 235.426752][ T1606] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid maxpacket 24623, setting to 1024 [ 235.427039][ T1606] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 1024 [ 235.427142][ T1606] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 235.427196][ T1606] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 235.472695][ T5530] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 235.506321][ T1606] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 236.068148][ T1606] usb 2-1: USB disconnect, device number 5 [ 236.465856][ T5582] comedi: valid board names for 8255 driver are: [ 236.471066][ T5582] 8255 [ 236.471580][ T5582] comedi: valid board names for vmk80xx driver are: [ 236.471812][ T5582] vmk80xx [ 236.471881][ T5582] comedi: valid board names for usbduxsigma driver are: [ 236.471925][ T5582] usbduxsigma [ 236.471962][ T5582] comedi: valid board names for usbduxfast driver are: [ 236.472041][ T5582] usbduxfast [ 236.472096][ T5582] comedi: valid board names for usbdux driver are: [ 236.472142][ T5582] usbdux [ 236.472193][ T5582] comedi: valid board names for ni6501 driver are: [ 236.472279][ T5582] ni6501 [ 236.472355][ T5582] comedi: valid board names for dt9812 driver are: [ 236.472403][ T5582] dt9812 [ 236.472443][ T5582] comedi: valid board names for ni_labpc_cs driver are: [ 236.472488][ T5582] ni_labpc_cs [ 236.472528][ T5582] comedi: valid board names for ni_daq_700 driver are: [ 236.472573][ T5582] ni_daq_700 [ 236.472628][ T5582] comedi: valid board names for labpc_pci driver are: [ 236.472677][ T5582] labpc_pci [ 236.472722][ T5582] comedi: valid board names for adl_pci9118 driver are: [ 236.472874][ T5582] pci9118dg [ 236.472959][ T5582] pci9118hg [ 236.473011][ T5582] pci9118hr [ 236.473051][ T5582] comedi: valid board names for 8255_pci driver are: [ 236.473098][ T5582] 8255_pci [ 236.473137][ T5582] comedi: valid board names for comedi_parport driver are: [ 236.473177][ T5582] comedi_parport [ 236.473254][ T5582] comedi: valid board names for comedi_test driver are: [ 236.473334][ T5582] comedi_test [ 236.473378][ T5582] comedi: valid board names for comedi_bond driver are: [ 236.473426][ T5582] comedi_bond [ 237.243496][ T5591] tap0: tun_chr_ioctl cmd 1074025672 [ 237.243968][ T5591] tap0: ignored: set checksum enabled [ 237.267179][ T5585] netlink: 'syz.0.528': attribute type 1 has an invalid length. [ 237.404526][ T5585] 8021q: adding VLAN 0 to HW filter on device bond1 [ 237.503270][ T5585] vlan2: entered allmulticast mode [ 237.503727][ T5585] veth1: entered allmulticast mode [ 237.519387][ T5585] bond1: (slave vlan2): making interface the new active one [ 237.524485][ T5585] bond1: (slave vlan2): Enslaving as an active interface with an up link [ 237.844355][ T5633] syzkaller1: entered promiscuous mode [ 237.845114][ T5633] syzkaller1: entered allmulticast mode [ 237.851440][ T5634] input: syz1 as /devices/virtual/input/input6 [ 239.440974][ T3794] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 239.654370][ T3794] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 239.656946][ T3794] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 239.661716][ T3794] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 239.670323][ T3794] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 239.670667][ T3794] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 239.693336][ T3794] usb 1-1: config 0 descriptor?? [ 240.216419][ T3794] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x3 [ 240.245669][ T3794] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 242.060675][ T31] audit: type=1400 audit(241.960:225): avc: denied { map } for pid=5690 comm="syz.0.541" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 242.061168][ T31] audit: type=1400 audit(241.960:226): avc: denied { execute } for pid=5690 comm="syz.0.541" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 242.310644][ T45] usb 1-1: USB disconnect, device number 5 [ 242.701148][ T31] audit: type=1400 audit(242.610:227): avc: denied { map } for pid=5703 comm="syz.1.543" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 242.701649][ T31] audit: type=1400 audit(242.610:228): avc: denied { execute } for pid=5703 comm="syz.1.543" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 243.350116][ T1606] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 243.527030][ T1606] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 243.583324][ T1606] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.41 [ 243.583683][ T1606] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=11 [ 243.583764][ T1606] usb 2-1: Product: syz [ 243.583820][ T1606] usb 2-1: Manufacturer: syz [ 243.583909][ T1606] usb 2-1: SerialNumber: syz [ 243.630442][ T5708] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 243.847368][ T1606] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 6 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 244.090530][ T45] usb 2-1: USB disconnect, device number 6 [ 244.121534][ T45] usblp0: removed [ 246.416710][ T31] audit: type=1400 audit(246.320:229): avc: denied { connect } for pid=5734 comm="syz.0.549" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 246.970321][ T31] audit: type=1400 audit(246.870:230): avc: denied { set_context_mgr } for pid=5738 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 247.010379][ T31] audit: type=1400 audit(246.910:231): avc: denied { map } for pid=5738 comm="syz.1.551" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 247.027959][ T5740] binder: 5738:5740 unknown command 0 [ 247.028585][ T5740] binder: 5738:5740 ioctl c0306201 200003c0 returned -22 [ 247.054226][ T31] audit: type=1400 audit(246.960:232): avc: denied { call } for pid=5738 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 247.660733][ T5741] ALSA: mixer_oss: invalid OSS volume '' [ 248.207718][ T5757] netlink: 28 bytes leftover after parsing attributes in process `syz.0.557'. [ 248.210472][ T31] audit: type=1400 audit(248.110:233): avc: denied { setopt } for pid=5745 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 248.668794][ T31] audit: type=1400 audit(248.560:234): avc: denied { create } for pid=5762 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 248.677098][ T31] audit: type=1400 audit(248.580:235): avc: denied { write } for pid=5761 comm="syz.1.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.678954][ T31] audit: type=1400 audit(248.580:236): avc: denied { nlmsg_write } for pid=5761 comm="syz.1.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 252.891186][ T5798] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 253.161448][ T5798] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 253.164058][ T5798] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 253.176344][ T5798] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 253.178228][ T5798] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 253.180587][ T5798] usb 1-1: Manufacturer: syz [ 253.194983][ T5798] usb 1-1: config 0 descriptor?? [ 253.430951][ T5798] rc_core: IR keymap rc-hauppauge not found [ 253.440393][ T5798] Registered IR keymap rc-empty [ 253.478220][ T5798] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 253.483269][ T5798] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input7 [ 253.511124][ T5798] usb 1-1: USB disconnect, device number 6 [ 254.280636][ T4455] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 254.500227][ T4455] usb 1-1: Using ep0 maxpacket: 8 [ 254.535382][ T4455] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 254.535606][ T4455] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 254.535761][ T4455] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 254.535874][ T4455] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 254.536019][ T4455] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 254.536123][ T4455] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 254.838736][ T4455] usb 1-1: GET_CAPABILITIES returned 0 [ 254.850562][ T4455] usbtmc 1-1:16.0: can't read capabilities [ 255.017001][ T31] audit: type=1400 audit(254.900:237): avc: denied { map } for pid=5848 comm="syz.1.578" path="socket:[8192]" dev="sockfs" ino=8192 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.050541][ T5837] raw_sendmsg: syz.0.575 forgot to set AF_INET. Fix it! [ 255.159039][ T43] usb 1-1: USB disconnect, device number 7 [ 255.886286][ T31] audit: type=1400 audit(255.790:238): avc: denied { bind } for pid=5870 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.940241][ T43] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 256.110171][ T43] usb 2-1: Using ep0 maxpacket: 8 [ 256.133502][ T43] usb 2-1: config 0 has an invalid interface number: 55 but max is 0 [ 256.134721][ T43] usb 2-1: config 0 has no interface number 0 [ 256.136915][ T43] usb 2-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 256.140708][ T43] usb 2-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 256.150084][ T43] usb 2-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 256.152279][ T43] usb 2-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 256.155044][ T43] usb 2-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 256.156932][ T43] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 256.166857][ T43] usb 2-1: config 0 descriptor?? [ 256.190307][ T43] ldusb 2-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 256.419137][ T1606] usb 2-1: USB disconnect, device number 7 [ 256.424434][ T1606] ldusb 2-1:0.55: LD USB Device #0 now disconnected [ 256.558861][ T31] audit: type=1326 audit(256.450:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5879 comm="syz.0.583" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x0 [ 256.754270][ T31] audit: type=1400 audit(256.660:240): avc: denied { create } for pid=5889 comm="syz.1.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 259.450227][ T5869] usb 1-1: new full-speed USB device number 8 using dummy_hcd [ 259.626728][ T5869] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 259.627136][ T5869] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 259.627405][ T5869] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 259.627598][ T5869] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 259.863300][ T5869] usb 1-1: usb_control_msg returned -32 [ 259.864244][ T5869] usbtmc 1-1:16.0: can't read capabilities [ 261.576346][ T5930] syzkaller0: entered promiscuous mode [ 261.576810][ T5930] syzkaller0: entered allmulticast mode [ 262.775305][ T5939] misc userio: Begin command sent, but we're already running [ 263.840054][ T1606] atkbd serio2: keyboard reset failed on [ 265.410500][ T9] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 265.591054][ T9] usb 2-1: Using ep0 maxpacket: 32 [ 265.665043][ T9] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 265.746631][ T9] usb 2-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 265.747069][ T9] usb 2-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 265.747393][ T9] usb 2-1: Product: syz [ 265.747468][ T9] usb 2-1: Manufacturer: syz [ 265.747532][ T9] usb 2-1: SerialNumber: syz [ 265.753731][ T9] usb 2-1: config 0 descriptor?? [ 265.799217][ T5950] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 265.874050][ T9] hub 2-1:0.0: bad descriptor, ignoring hub [ 265.874453][ T9] hub 2-1:0.0: probe with driver hub failed with error -5 [ 266.211310][ T2889] usb 2-1: USB disconnect, device number 8 [ 266.561639][ T2889] usb 2-1: new full-speed USB device number 9 using dummy_hcd [ 266.732415][ T2889] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x85 has invalid maxpacket 1024, setting to 64 [ 266.749087][ T2889] usb 2-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 266.752048][ T2889] usb 2-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 266.753913][ T2889] usb 2-1: Product: syz [ 266.754678][ T2889] usb 2-1: Manufacturer: syz [ 266.755457][ T2889] usb 2-1: SerialNumber: syz [ 266.770961][ T2889] usb 2-1: config 0 descriptor?? [ 266.787121][ T5950] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 266.792479][ T2889] hub 2-1:0.0: bad descriptor, ignoring hub [ 266.793872][ T2889] hub 2-1:0.0: probe with driver hub failed with error -5 [ 267.120670][ T45] usb 2-1: USB disconnect, device number 9 [ 268.554295][ T5991] block nbd1: NBD_DISCONNECT [ 268.607524][ T5990] block nbd1: Disconnected due to user request. [ 268.627725][ T5990] block nbd1: shutting down sockets [ 270.291480][ T4455] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 270.466014][ T4455] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 270.466549][ T4455] usb 2-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 270.471351][ T4455] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 270.471931][ T4455] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 52, changing to 9 [ 270.472033][ T4455] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8241, setting to 1024 [ 270.497460][ T4455] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 270.497859][ T4455] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 270.500482][ T4455] usb 2-1: Product: syz [ 270.500739][ T4455] usb 2-1: Manufacturer: syz [ 270.518924][ T4455] cdc_wdm 2-1:1.0: skipping garbage [ 270.519319][ T4455] cdc_wdm 2-1:1.0: skipping garbage [ 270.529429][ T4455] cdc_wdm 2-1:1.0: cdc-wdm1: USB WDM device [ 270.732902][ T4455] usb 2-1: USB disconnect, device number 10 [ 271.181705][ T31] audit: type=1400 audit(271.090:241): avc: denied { bind } for pid=6025 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 271.184578][ T31] audit: type=1400 audit(271.090:242): avc: denied { name_bind } for pid=6025 comm="syz.1.609" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 271.187179][ T31] audit: type=1400 audit(271.090:243): avc: denied { node_bind } for pid=6025 comm="syz.1.609" saddr=127.0.0.1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 271.770252][ T5694] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 271.921413][ T5694] usb 2-1: Using ep0 maxpacket: 8 [ 271.946600][ T5694] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 271.948597][ T5694] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 271.950300][ T5694] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 271.955290][ T5694] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 271.956768][ T5694] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 271.957798][ T5694] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 272.188762][ T5694] usb 2-1: GET_CAPABILITIES returned 0 [ 272.190453][ T5694] usbtmc 2-1:16.0: can't read capabilities [ 272.415383][ T5694] usb 2-1: USB disconnect, device number 11 [ 273.676012][ T23] usb 1-1: USB disconnect, device number 8 [ 273.880859][ T5694] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 274.070602][ T5694] usb 2-1: Using ep0 maxpacket: 16 [ 274.140151][ T5694] usb 2-1: New USB device found, idVendor=1604, idProduct=8007, bcdDevice=af.a6 [ 274.141342][ T5694] usb 2-1: New USB device strings: Mfr=1, Product=23, SerialNumber=3 [ 274.142385][ T5694] usb 2-1: Product: syz [ 274.143219][ T5694] usb 2-1: Manufacturer: syz [ 274.143993][ T5694] usb 2-1: SerialNumber: syz [ 274.151514][ T5694] usb 2-1: config 0 descriptor?? [ 274.395603][ T5694] usb 2-1: USB disconnect, device number 12 [ 275.142670][ T5694] usb 2-1: new full-speed USB device number 13 using dummy_hcd [ 275.333431][ T5694] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 275.337594][ T5694] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 275.339205][ T5694] usb 2-1: New USB device found, idVendor=05d8, idProduct=810a, bcdDevice=92.b8 [ 275.340807][ T5694] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 275.346138][ T5694] usb 2-1: config 0 descriptor?? [ 275.592338][ T11] usb 2-1: USB disconnect, device number 13 [ 276.994540][ T6238] binder: 6234:6238 ioctl c0306201 20000640 returned -22 [ 277.713249][ T5694] usb 2-1: new low-speed USB device number 14 using dummy_hcd [ 277.874394][ T5694] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 277.876491][ T5694] usb 2-1: config 0 has no interface number 0 [ 277.892659][ T5694] usb 2-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 277.894193][ T5694] usb 2-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid maxpacket 159, setting to 8 [ 277.899808][ T5694] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 277.901342][ T5694] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 277.907373][ T5694] usb 2-1: config 0 descriptor?? [ 277.926587][ T6243] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 277.940525][ T5694] iowarrior 2-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 278.190334][ T5694] usb 2-1: USB disconnect, device number 14 [ 278.377494][ T6261] bond0: entered allmulticast mode [ 278.378854][ T6261] bond_slave_0: entered allmulticast mode [ 278.385683][ T6261] bond_slave_1: entered allmulticast mode [ 278.672393][ T31] audit: type=1400 audit(278.580:244): avc: denied { write } for pid=6262 comm="syz.1.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 280.451014][ T6296] netlink: 'syz.1.636': attribute type 10 has an invalid length. [ 280.455485][ T6296] netlink: 40 bytes leftover after parsing attributes in process `syz.1.636'. [ 280.494875][ T6296] A link change request failed with some changes committed already. Interface netdevsim3 may have been left with an inconsistent configuration, please check. [ 280.905795][ T31] audit: type=1400 audit(280.810:245): avc: denied { recv } for pid=3097 comm="syz-executor" saddr=127.0.0.1 src=35500 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 280.953663][ T31] audit: type=1400 audit(280.860:246): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=35500 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 281.814038][ T31] audit: type=1400 audit(281.720:247): avc: denied { create } for pid=6312 comm="syz.1.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.819350][ T31] audit: type=1400 audit(281.720:248): avc: denied { bind } for pid=6312 comm="syz.1.642" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.822140][ T31] audit: type=1400 audit(281.720:249): avc: denied { name_bind } for pid=6312 comm="syz.1.642" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 281.841171][ T31] audit: type=1400 audit(281.750:250): avc: denied { setopt } for pid=6312 comm="syz.1.642" laddr=172.20.20.170 lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.851775][ T31] audit: type=1400 audit(281.760:251): avc: denied { write } for pid=6312 comm="syz.1.642" laddr=172.20.20.170 lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 282.520518][ T5694] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 282.681436][ T5694] usb 1-1: Using ep0 maxpacket: 32 [ 282.695261][ T5694] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 282.696672][ T5694] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 282.697916][ T5694] usb 1-1: New USB device found, idVendor=1e71, idProduct=200f, bcdDevice= 0.00 [ 282.699107][ T5694] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 282.711826][ T5694] usb 1-1: config 0 descriptor?? [ 282.960880][ T5694] usbhid 1-1:0.0: can't add hid device: -71 [ 282.971876][ T5694] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 282.978316][ T5694] usb 1-1: USB disconnect, device number 9 [ 284.244428][ T31] audit: type=1400 audit(284.150:252): avc: denied { lock } for pid=6354 comm="syz.1.651" path="socket:[8591]" dev="sockfs" ino=8591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 285.234762][ T31] audit: type=1400 audit(285.140:253): avc: denied { ioctl } for pid=6357 comm="syz.1.652" path="socket:[8601]" dev="sockfs" ino=8601 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.675572][ T6376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6376 comm=syz.0.655 [ 288.806174][ T6394] FAULT_INJECTION: forcing a failure. [ 288.806174][ T6394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.806645][ T6394] CPU: 0 UID: 0 PID: 6394 Comm: syz.1.661 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 288.806757][ T6394] Hardware name: ARM-Versatile Express [ 288.806784][ T6394] Call trace: [ 288.806827][ T6394] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 288.806917][ T6394] r7:00000000 r6:00000000 r5:60000013 r4:8225b4f4 [ 288.806934][ T6394] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 288.806995][ T6394] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 288.807137][ T6394] r5:86225400 r4:82950610 [ 288.807219][ T6394] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 288.807484][ T6394] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 288.807550][ T6394] r8:76b80f30 r7:00000000 r6:00000000 r5:dfd35f68 r4:00000002 [ 288.807714][ T6394] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 288.808368][ T6394] [<80964e18>] (should_fail_usercopy) from [<80589618>] (simple_read_from_buffer+0x80/0x13c) [ 288.808427][ T6394] [<80589598>] (simple_read_from_buffer) from [<8060187c>] (proc_fail_nth_read+0xb8/0x100) [ 288.810239][ T6394] r10:00000001 r9:806017c4 r8:00000002 r7:dfd35f68 r6:0000000f r5:76b80f30 [ 288.810264][ T6394] r4:86225400 r3:dfd35e9f [ 288.810377][ T6394] [<806017c4>] (proc_fail_nth_read) from [<8054dc90>] (vfs_read+0x98/0x320) [ 288.810438][ T6394] r8:76b80f30 r7:dfd35f68 r6:86225400 r5:0000000f r4:8643ee40 [ 288.810453][ T6394] [<8054dbf8>] (vfs_read) from [<8054e938>] (ksys_read+0x74/0xe8) [ 288.810503][ T6394] r10:00000003 r9:86225400 r8:8020029c r7:00000000 r6:00000000 r5:8643ee40 [ 288.810519][ T6394] r4:8643ee43 [ 288.810532][ T6394] [<8054e8c4>] (ksys_read) from [<8054e9bc>] (sys_read+0x10/0x14) [ 288.810657][ T6394] r7:00000003 r6:00000005 r5:76b80f30 r4:0000000f [ 288.810718][ T6394] [<8054e9ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 288.810765][ T6394] Exception stack(0xdfd35fa8 to 0xdfd35ff0) [ 288.810799][ T6394] 5fa0: 0000000f 76b80f30 00000005 76b80f30 0000000f 00000000 [ 288.810828][ T6394] 5fc0: 0000000f 76b80f30 00000005 00000003 002e0000 00000000 00006364 76b810bc [ 288.810851][ T6394] 5fe0: 00000158 76b80ed0 000d7df0 0012fe94 [ 291.719016][ T6408] random: crng reseeded on system resumption [ 292.922570][ T6412] ------------[ cut here ]------------ [ 292.923363][ T6412] WARNING: CPU: 0 PID: 6412 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 292.924331][ T6412] Modules linked in: [ 292.928561][ T6412] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 292.929165][ T6412] CPU: 0 UID: 0 PID: 6412 Comm: syz.0.667 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 292.929765][ T6412] Hardware name: ARM-Versatile Express [ 292.930335][ T6412] Call trace: [ 292.930559][ T6412] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 292.930965][ T6412] r7:00000000 r6:8282083c r5:00000000 r4:8225b4f4 [ 292.931591][ T6412] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 292.932080][ T6412] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 292.932413][ T6412] r5:00000000 r4:82a6dd18 [ 292.932600][ T6412] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 292.932874][ T6412] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 292.934116][ T6412] r3:8280c684 r2:00000001 r1:8224203c r0:822499d4 [ 292.934389][ T6412] r7:804bc144 [ 292.934640][ T6412] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 292.935761][ T6412] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 292.936448][ T6412] r8:00000009 r7:822752cc r6:dfcfdd1c r5:86221800 r4:00000000 [ 292.937036][ T6412] [<802587e8>] (warn_slowpath_fmt) from [<804bc144>] (kunmap_local_indexed+0x20c/0x224) [ 292.938172][ T6412] r10:00000000 r9:decbf000 r8:deb5f6a4 r7:00a00000 r6:00000003 r5:86221800 [ 292.938900][ T6412] r4:ffefd000 [ 292.939082][ T6412] [<804bbf38>] (kunmap_local_indexed) from [<805373a8>] (move_pages+0xb24/0x19c8) [ 292.939755][ T6412] r7:00a00000 r6:fffffff0 r5:8479c7c4 r4:84aca400 [ 292.940376][ T6412] [<80536884>] (move_pages) from [<805be4dc>] (userfaultfd_ioctl+0xff8/0x21c4) [ 292.940948][ T6412] r10:84aca400 r9:dfcfde98 r8:21000000 r7:00000001 r6:00000000 r5:20000100 [ 292.941254][ T6412] r4:85f6c000 [ 292.941399][ T6412] [<805bd4e4>] (userfaultfd_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 292.941763][ T6412] r10:86221800 r9:8643ec00 r8:00000003 r7:20000100 r6:8643ec01 r5:00000000 [ 292.942312][ T6412] r4:c028aa05 [ 292.942556][ T6412] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 292.942959][ T6412] Exception stack(0xdfcfdfa8 to 0xdfcfdff0) [ 292.943224][ T6412] dfa0: 00000000 00000000 00000003 c028aa05 20000100 00000000 [ 292.944003][ T6412] dfc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b910bc [ 292.944705][ T6412] dfe0: 76b90ec0 76b90eb0 000193a4 00131fc0 [ 292.944955][ T6412] r10:00000036 r9:86221800 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 292.945267][ T6412] r4:00000000 [ 292.947779][ T6412] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:40:52 Registers: info registers vcpu 0 CPU#0 R00=83fb87c0 R01=00000000 R02=fffffff0 R03=82ad1ce4 R04=00000002 R05=83fb87c0 R06=838e2b40 R07=00000002 R08=00000000 R09=00000000 R10=00000007 R11=df8019ac R12=df8019b0 R13=df801928 R14=8078ab60 R15=80789f6c PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=dddda000 R01=00000001 R02=0002f574 R03=84afec00 R04=df989a2c R05=df989a24 R06=8022ce50 R07=00000000 R08=00000000 R09=846fdf00 R10=00000000 R11=df989a9c R12=df989a40 R13=df989a40 R14=20000193 R15=808cf24c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000