last executing test programs: 4m38.35681551s ago: executing program 0 (id=358): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@dev={0xfe, 0x80, '\x00', 0x40}, @remote, @remote, 0x3, 0x2, 0x5, 0x400, 0xb7, 0x81, r2}) syz_emit_ethernet(0x82, &(0x7f0000000040)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x80}, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x48, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x500, {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @private1, @private2, [@hopopts={0x3a, 0x1, '\x00', [@calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0x80}}]}]}}}}}}}, 0x0) 4m38.107722643s ago: executing program 0 (id=359): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0xa0201, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000001340)) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$dsp(r1, &(0x7f00000002c0)=""/4096, 0x1000) write$dsp(r0, &(0x7f0000000180)="a528760891c351fa606c1428d758f38a5a7cb4b31c4c09289e9ebb6286784ca39cc8ddbe0f423e31ee1d7a858e9576fe298eeab57d37c3f7632894e02f", 0x80) 4m37.357102771s ago: executing program 0 (id=360): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000800), 0x8040, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000840)=0x18000000) 4m34.590891484s ago: executing program 0 (id=361): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2e, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004081}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd26, 0x8000006, {0x0, 0x0, 0x0, r7, {0x0, 0x6}, {}, {0x1, 0xa}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0xf, 0x8}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24008081}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[], 0x3c}}, 0x0) 4m34.055157472s ago: executing program 0 (id=362): r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0xffffffffffff6176, 0x80000) read$usbmon(r0, 0x0, 0x0) 4m31.299935774s ago: executing program 0 (id=363): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) 3m45.456006599s ago: executing program 32 (id=363): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) 3m30.330308129s ago: executing program 2 (id=402): r0 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0xc4042, 0x1ff) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0xffffffffffffffd6) 3m30.181212807s ago: executing program 2 (id=403): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="04"], 0x48}}, 0x0) 3m29.951431909s ago: executing program 2 (id=404): mmap$IORING_OFF_SQ_RING(&(0x7f000040d000/0x4000)=nil, 0x4000, 0xd, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) ioctl$TIOCMSET(r0, 0x5418, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xd) r3 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x57}) ioctl$DRM_IOCTL_MODE_CURSOR2(0xffffffffffffffff, 0xc02464bb, 0x0) syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x2, [], [0x3], [0x0, 0x9, 0x0, 0x802c8], [0x40000000000, 0x0, 0x0, 0x82f]}) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000300)={0x0, 0xfe72, &(0x7f0000000200)="952bb3e006ae9a4c3a"}) 3m9.750245961s ago: executing program 2 (id=406): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000140)={0x4c, 0x14, 0x101, 0x70bd25, 0x25dfdbfd, {0x1, 0xf, 0x8, 0x7, {0x4e24, 0x4e22, [0x3, 0x31, 0xffffff01, 0xc3], [0x6, 0x0, 0x40000000, 0x7], 0x0, [0xde, 0x7fffffff]}, 0x2, 0x3}}, 0x4c}, 0x1, 0x0, 0x0, 0x24048084}, 0x40000) 3m9.589966409s ago: executing program 2 (id=407): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0x80280, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = add_key(0x0, &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r3, 0xee00, 0xffffffffffffffff) keyctl$chown(0x4, r3, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 3m8.79720921s ago: executing program 2 (id=408): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1, 0x8}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001380)=@newtfilter={0xf0, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff3}, {}, {0x10, 0x10}}, [@filter_kind_options=@f_matchall={{0xd}, {0xbc, 0x2, [@TCA_MATCHALL_ACT={0x30, 0x2, [@m_ife={0x2c, 0x20, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_ACT={0x4}, @TCA_MATCHALL_ACT={0x74, 0x2, [@m_xt={0x70, 0x0, 0x0, 0x0, {{0x7}, {0x48, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x44, 0x6, {0x2, 'nat\x00', 0x8, 0x3, "47ff50a56be88c6014cd5af08c072c80cef64e678a873159f51e"}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20048084}, 0x2008c010) 3m8.284574416s ago: executing program 33 (id=408): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1, 0x8}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001380)=@newtfilter={0xf0, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff3}, {}, {0x10, 0x10}}, [@filter_kind_options=@f_matchall={{0xd}, {0xbc, 0x2, [@TCA_MATCHALL_ACT={0x30, 0x2, [@m_ife={0x2c, 0x20, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_MATCHALL_FLAGS={0x8}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_ACT={0x4}, @TCA_MATCHALL_ACT={0x74, 0x2, [@m_xt={0x70, 0x0, 0x0, 0x0, {{0x7}, {0x48, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x44, 0x6, {0x2, 'nat\x00', 0x8, 0x3, "47ff50a56be88c6014cd5af08c072c80cef64e678a873159f51e"}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}]}]}}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20048084}, 0x2008c010) 2m1.684839103s ago: executing program 1 (id=429): r0 = syz_usb_connect(0x3, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x41, 0x5f, 0xbc, 0x10, 0xe8d, 0xa7, 0xb531, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xd, 0x0, 0x0, 0xff}}]}}]}}, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000b24c8d20dc050100010001"], 0x0) 1m59.98747935s ago: executing program 1 (id=430): socket$l2tp(0x2, 0x2, 0x73) r0 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) 1m59.877520556s ago: executing program 1 (id=431): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000008c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9259}, [@IFLA_IFNAME={0x14, 0x3, 'macvtap0\x00'}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x8044) 1m59.78825669s ago: executing program 1 (id=432): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000000)={0x12}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0xffffffffffffff2b, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000008480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000085c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x140}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc804) 1m44.648923421s ago: executing program 1 (id=436): syz_usb_connect(0x0, 0x2d, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0xac, 0x90, 0xeb, 0x8, 0x421, 0x4c9, 0xfa39, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x15, 0x0, 0x1, 0x2, 0x2, 0xff, 0x9, [], [{{0x9, 0x5, 0xa, 0x10, 0x10, 0x5, 0x4, 0x5}}]}}]}}]}}, 0x0) 1m43.843512743s ago: executing program 1 (id=437): r0 = socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) socket$inet6(0xa, 0x1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080), 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 1m39.369034664s ago: executing program 3 (id=438): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xc8e}]}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000540)={0x0, 0xd4bb, 0x0, 0xfffffffd}, &(0x7f0000000380)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) sendmsg$inet(r3, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x20000090) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x80800}) listen(r3, 0x5) io_uring_enter(r4, 0x3517, 0xc2de, 0x9, 0x0, 0x0) 1m31.10936902s ago: executing program 3 (id=439): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x20, 0x9, 0x0, 0x9}, {0x6, 0x9, 0x0, 0xfffffffa}]}, 0x10) sendmmsg(r0, &(0x7f0000001c00), 0x400000000000159, 0x40840) 1m30.977103077s ago: executing program 3 (id=440): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@local, @dev}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x20, 0xfc, 0x2, 0x0, @rand_addr=0x1c, @multicast1=0xe0000300}, @dest_unreach={0x3, 0x6, 0x0, 0x0, 0xfa, 0x9, {0x5, 0x4, 0x0, 0x3d, 0xfff6, 0x65, 0x5, 0x1, 0x4, 0x3, @private=0xa010102, @local}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f00000000c0)={@multicast1=0x1c, @empty=0xe0000300, 0x0, "8a79348df081496d0420922f45a71c1daa8b610468cd140526c41efcd3a4a422", 0x3, 0x1, 0x85}, 0x3c) 1m30.941593969s ago: executing program 3 (id=441): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001600), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000001c80)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e23, 0x9, @rand_addr=' \x01\x00', 0x6}}}, 0xa0) 1m18.599159605s ago: executing program 3 (id=442): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) 1m18.51795395s ago: executing program 3 (id=443): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"/3590], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18}, 0xfffffdef) 1m18.327451009s ago: executing program 34 (id=443): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"/3590], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18}, 0xfffffdef) 58.280163683s ago: executing program 35 (id=437): r0 = socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) socket$inet6(0xa, 0x1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080), 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 13.605376278s ago: executing program 4 (id=487): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000086dd0505"], 0xfdef) 13.325146163s ago: executing program 4 (id=488): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_io_uring_setup(0x10e, &(0x7f0000000140)={0x0, 0x334e, 0x10, 0x3, 0x802}, &(0x7f00000003c0)=0x0, &(0x7f0000000300)=0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r1, 0x7277, 0x0, 0x28, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13.019586869s ago: executing program 4 (id=489): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f0000000640)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x3, 0x0, 0x30000, @loopback, @local, 0x8000, 0x0, 0x1, 0x6}}) 12.450506488s ago: executing program 4 (id=490): r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x80) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x0, 0x2, 0xbfdffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r4, 0x47f6, 0x0, 0x4, 0x0, 0x0) 5.605056601s ago: executing program 5 (id=494): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r0, 0x0, 0xd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000003c000b0000000000fcffffff04"], 0x24}}, 0x0) 5.497223197s ago: executing program 5 (id=495): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004400)=@getchain={0x24, 0x66, 0xfff1, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc, 0x10}, {0xfff2, 0xfff1}, {0xffff, 0x1ffef}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) 5.257465899s ago: executing program 5 (id=496): writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff0100000001", 0x15}], 0x1) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000000)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r0, 0x3ba0, &(0x7f00000004c0)={0x48, 0x2, r1, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_REPLACE(r0, 0x3ba0, &(0x7f0000000280)={0x48, 0x13, r2, 0x0, r1}) 5.03876684s ago: executing program 5 (id=497): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000280)=@polexpire={0xc0, 0x1b, 0x1, 0x70bd28, 0x0, {{{@in6=@private0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x84}, {}, {}, 0xfffffffc}}}, 0xc0}, 0x1, 0x0, 0x0, 0x4044001}, 0x0) 4.897591758s ago: executing program 5 (id=498): madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone3(&(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 4.549157045s ago: executing program 5 (id=499): sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x80, 0x0}, 0x4000) 269.598786ms ago: executing program 4 (id=500): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0xea60}, 0x10) connect$unix(r1, &(0x7f0000000080)=@file={0x1}, 0x6e) 0s ago: executing program 4 (id=501): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/comedi3\x00', 0xc00, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x40404f26, 0x5, 0x2, 0x401, 0xcf7, 0x9, 0xfff, 0x5c95239c, 0x5, 0x3bf, 0x802, 0x1600, 0x1, 0x20000001, 0x9, 0xe1cb, 0x6, 0x2f, 0x400, 0x195, 0x6, 0x0, 0xb, 0x402, 0x9, 0x3, 0x41, 0x5, 0x6, 0x8000003, 0xdffffffa]}) kernel console output (not intermixed with test programs): [ 53.545063][ T31] audit: type=1400 audit(53.460:56): avc: denied { read write } for pid=3113 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.552597][ T31] audit: type=1400 audit(53.460:57): avc: denied { open } for pid=3113 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:18151' (ED25519) to the list of known hosts. [ 65.011930][ T31] audit: type=1400 audit(64.920:58): avc: denied { name_bind } for pid=3116 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.888328][ T31] audit: type=1400 audit(66.800:59): avc: denied { execute } for pid=3117 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.921831][ T31] audit: type=1400 audit(66.830:60): avc: denied { execute_no_trans } for pid=3117 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.568894][ T31] audit: type=1400 audit(69.480:61): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.576388][ T31] audit: type=1400 audit(69.490:62): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.596929][ T3117] cgroup: Unknown subsys name 'net' [ 69.608003][ T31] audit: type=1400 audit(69.520:63): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.780875][ T3117] cgroup: Unknown subsys name 'cpuset' [ 69.787949][ T3117] cgroup: Unknown subsys name 'hugetlb' [ 69.789698][ T3117] cgroup: Unknown subsys name 'rlimit' [ 70.036354][ T31] audit: type=1400 audit(69.950:64): avc: denied { setattr } for pid=3117 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.040040][ T31] audit: type=1400 audit(69.950:65): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.044261][ T31] audit: type=1400 audit(69.960:66): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.219468][ T3119] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.225584][ T31] audit: type=1400 audit(70.140:67): avc: denied { relabelto } for pid=3119 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.229779][ T31] audit: type=1400 audit(70.140:68): avc: denied { write } for pid=3119 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.271874][ T31] audit: type=1400 audit(70.180:69): avc: denied { read } for pid=3117 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.281860][ T31] audit: type=1400 audit(70.190:70): avc: denied { open } for pid=3117 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.723388][ T3117] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.674986][ T31] audit: type=1400 audit(78.590:71): avc: denied { execmem } for pid=3120 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.745919][ T31] audit: type=1400 audit(78.660:72): avc: denied { read } for pid=3122 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.747605][ T31] audit: type=1400 audit(78.660:73): avc: denied { open } for pid=3122 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.757097][ T31] audit: type=1400 audit(78.670:74): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.785398][ T31] audit: type=1400 audit(78.700:75): avc: denied { module_request } for pid=3122 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.785757][ T31] audit: type=1400 audit(78.700:76): avc: denied { module_request } for pid=3123 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.868452][ T31] audit: type=1400 audit(78.780:77): avc: denied { sys_module } for pid=3122 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.558141][ T31] audit: type=1400 audit(79.470:78): avc: denied { ioctl } for pid=3122 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.739564][ T3122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.755242][ T3122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.020756][ T3123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.028524][ T3123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.697044][ T3122] hsr_slave_0: entered promiscuous mode [ 81.704556][ T3122] hsr_slave_1: entered promiscuous mode [ 82.059835][ T3123] hsr_slave_0: entered promiscuous mode [ 82.063201][ T3123] hsr_slave_1: entered promiscuous mode [ 82.066574][ T3123] debugfs: 'hsr0' already exists in 'hsr' [ 82.068547][ T3123] Cannot create hsr debugfs directory [ 82.231647][ T31] audit: type=1400 audit(82.140:79): avc: denied { create } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.236226][ T31] audit: type=1400 audit(82.150:80): avc: denied { write } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.247179][ T3122] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.295244][ T3122] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.307083][ T3122] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.327885][ T3122] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.588018][ T3123] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.604249][ T3123] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.614991][ T3123] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.626927][ T3123] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.283376][ T3122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.455227][ T3123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.013667][ T3122] veth0_vlan: entered promiscuous mode [ 86.028063][ T3122] veth1_vlan: entered promiscuous mode [ 86.069614][ T3122] veth0_macvtap: entered promiscuous mode [ 86.078720][ T3122] veth1_macvtap: entered promiscuous mode [ 86.140655][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.143332][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.143418][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.143452][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.196888][ T3123] veth0_vlan: entered promiscuous mode [ 86.247323][ T3123] veth1_vlan: entered promiscuous mode [ 86.303684][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 86.303941][ T31] audit: type=1400 audit(86.210:82): avc: denied { mount } for pid=3122 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.319295][ T31] audit: type=1400 audit(86.230:83): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/syzkaller.U6w893/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.348945][ T31] audit: type=1400 audit(86.260:84): avc: denied { mount } for pid=3122 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.369147][ T3123] veth0_macvtap: entered promiscuous mode [ 86.382932][ T3123] veth1_macvtap: entered promiscuous mode [ 86.384667][ T31] audit: type=1400 audit(86.290:85): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/syzkaller.U6w893/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.411999][ T31] audit: type=1400 audit(86.320:86): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/syzkaller.U6w893/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.459263][ T31] audit: type=1400 audit(86.370:87): avc: denied { unmount } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.466152][ T2971] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.466709][ T2971] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.466849][ T2971] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.466918][ T2971] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.495484][ T31] audit: type=1400 audit(86.410:88): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.509640][ T31] audit: type=1400 audit(86.410:89): avc: denied { mount } for pid=3122 comm="syz-executor" name="/" dev="gadgetfs" ino=2435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.510042][ T31] audit: type=1400 audit(86.420:90): avc: denied { mount } for pid=3122 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.517609][ T31] audit: type=1400 audit(86.430:91): avc: denied { mounton } for pid=3122 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.638550][ T3122] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.858138][ T3824] FAULT_INJECTION: forcing a failure. [ 87.858138][ T3824] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 87.861193][ T3824] CPU: 1 UID: 0 PID: 3824 Comm: syz.0.6 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 87.861659][ T3824] Hardware name: ARM-Versatile Express [ 87.861937][ T3824] Call trace: [ 87.862215][ T3824] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 87.863236][ T3824] r7:dfe35e20 r6:00000000 r5:60000013 r4:8226033c [ 87.863331][ T3824] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 87.863393][ T3824] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 87.863448][ T3824] r5:83ac6000 r4:8294f150 [ 87.863466][ T3824] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 87.863525][ T3824] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 87.863580][ T3824] r8:00008010 r7:dfe35e20 r6:20000e00 r5:00000000 r4:dfe35f20 [ 87.863597][ T3824] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 87.863643][ T3824] [<809723c0>] (should_fail_usercopy) from [<81545cc0>] (copy_msghdr_from_user+0x50/0x130) [ 87.863705][ T3824] [<81545c70>] (copy_msghdr_from_user) from [<81545e18>] (___sys_sendmsg+0x78/0xd0) [ 87.863766][ T3824] r8:00008010 r7:00000000 r6:85049400 r5:dfe35f20 r4:dfe35e64 [ 87.863783][ T3824] [<81545da0>] (___sys_sendmsg) from [<815462d4>] (__sys_sendmsg+0x8c/0xe0) [ 87.863873][ T3824] r10:00000128 r9:83ac6000 r8:856736c0 r7:00008010 r6:20000e00 r5:856736c1 [ 87.863902][ T3824] r4:00000006 [ 87.863921][ T3824] [<81546248>] (__sys_sendmsg) from [<8154633c>] (sys_sendmsg+0x14/0x18) [ 87.864009][ T3824] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 87.864025][ T3824] [<81546328>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 87.864146][ T3824] Exception stack(0xdfe35fa8 to 0xdfe35ff0) [ 87.864326][ T3824] 5fa0: 00000000 00000000 00000006 20000e00 00008010 00000000 [ 87.864383][ T3824] 5fc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f370bc [ 87.864411][ T3824] 5fe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 88.195487][ T3840] Zero length message leads to an empty skb [ 89.786476][ T3859] FAULT_INJECTION: forcing a failure. [ 89.786476][ T3859] name failslab, interval 1, probability 0, space 0, times 1 [ 89.794608][ T3859] CPU: 1 UID: 0 PID: 3859 Comm: syz.0.20 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 89.795259][ T3859] Hardware name: ARM-Versatile Express [ 89.796602][ T3859] Call trace: [ 89.799510][ T3859] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 89.801047][ T3859] r7:00000d40 r6:00000000 r5:60000013 r4:8226033c [ 89.801073][ T3859] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 89.801129][ T3859] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 89.801180][ T3859] r5:84efb000 r4:82917bc0 [ 89.801196][ T3859] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 89.801258][ T3859] [<80972180>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 89.801320][ T3859] r8:84efb000 r7:00000d40 r6:856736e8 r5:00000021 r4:83001240 [ 89.801338][ T3859] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 89.801418][ T3859] [<80503bb4>] (__kmalloc_noprof) from [<807c3234>] (tomoyo_encode2+0x64/0xf0) [ 89.801486][ T3859] r10:00000fff r9:8380a800 r8:00000000 r7:850765d8 r6:856736e8 r5:85741ffd [ 89.801583][ T3859] r4:85741fe7 [ 89.801604][ T3859] [<807c31d0>] (tomoyo_encode2) from [<807c32e4>] (tomoyo_encode+0x24/0x30) [ 89.801666][ T3859] r9:8380a800 r8:00000000 r7:850765d8 r6:856736e8 r5:00001000 r4:85741fe8 [ 89.801684][ T3859] [<807c32c0>] (tomoyo_encode) from [<807c3370>] (tomoyo_realpath_from_path+0x80/0x17c) [ 89.801736][ T3859] r5:00001000 r4:85741000 [ 89.801753][ T3859] [<807c32f0>] (tomoyo_realpath_from_path) from [<807bf470>] (tomoyo_path_number_perm+0xcc/0x22c) [ 89.801820][ T3859] r10:84efb000 r9:00000000 r8:856736c0 r7:c01864cb r6:00000004 r5:81cd6544 [ 89.801899][ T3859] r4:856736e8 r3:826c0200 [ 89.802015][ T3859] [<807bf3a4>] (tomoyo_path_number_perm) from [<807c3d50>] (tomoyo_file_ioctl+0x1c/0x20) [ 89.802083][ T3859] r9:00000004 r8:856736c0 r7:00000000 r6:00000000 r5:c01864cb r4:856736c0 [ 89.802103][ T3859] [<807c3d34>] (tomoyo_file_ioctl) from [<807705a4>] (security_file_ioctl+0x64/0x1e4) [ 89.802156][ T3859] [<80770540>] (security_file_ioctl) from [<8056cca4>] (sys_ioctl+0x4c/0xba0) [ 89.802214][ T3859] r7:00000000 r6:856736c1 r5:00000000 r4:c01864cb [ 89.802232][ T3859] [<8056cc58>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 89.802279][ T3859] Exception stack(0xdfe2dfa8 to 0xdfe2dff0) [ 89.802315][ T3859] dfa0: 00000000 00000000 00000004 c01864cb 00000000 00000000 [ 89.802346][ T3859] dfc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f370bc [ 89.802370][ T3859] dfe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 89.802401][ T3859] r10:00000036 r9:84efb000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 89.802484][ T3859] r4:00000000 [ 89.835103][ T3859] ERROR: Out of memory at tomoyo_realpath_from_path. [ 90.069041][ T3861] FAULT_INJECTION: forcing a failure. [ 90.069041][ T3861] name failslab, interval 1, probability 0, space 0, times 0 [ 90.073707][ T3861] CPU: 1 UID: 0 PID: 3861 Comm: syz.0.21 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 90.073808][ T3861] Hardware name: ARM-Versatile Express [ 90.073834][ T3861] Call trace: [ 90.075106][ T3861] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 90.081057][ T3861] r7:00400cc0 r6:00000000 r5:60000013 r4:8226033c [ 90.081118][ T3861] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 90.081194][ T3861] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 90.081255][ T3861] r5:84efb000 r4:82917bc0 [ 90.081271][ T3861] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 90.081433][ T3861] [<80972180>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 90.081504][ T3861] r8:00400cc0 r7:00400cc0 r6:00000000 r5:83002000 r4:00000014 [ 90.081522][ T3861] [<8051f254>] (should_failslab) from [<80502430>] (__kvmalloc_node_noprof+0xe4/0x5a0) [ 90.081570][ T3861] [<8050234c>] (__kvmalloc_node_noprof) from [<8058cbc0>] (simple_xattr_alloc+0x30/0x5c) [ 90.081635][ T3861] r10:00000000 r9:dfe2de5c r8:830cf5b0 r7:84196638 r6:8226033c r5:dfe2de5c [ 90.081654][ T3861] r4:00000000 [ 90.081669][ T3861] [<8058cb90>] (simple_xattr_alloc) from [<8058ccb4>] (simple_xattr_set+0x28/0x184) [ 90.081725][ T3861] r7:84196638 r6:8226033c r5:dfe2de5c r4:8226033c [ 90.081742][ T3861] [<8058cc8c>] (simple_xattr_set) from [<8049322c>] (shmem_xattr_handler_set+0x194/0x1a8) [ 90.081812][ T3861] r9:dfe2de5c r8:830cf5b0 r7:00000040 r6:830cf580 r5:84196658 r4:8226033c [ 90.081831][ T3861] [<80493098>] (shmem_xattr_handler_set) from [<8058aeb8>] (__vfs_setxattr+0xb4/0xc8) [ 90.081893][ T3861] r9:80493098 r8:00000000 r7:8226033c r6:834e2d48 r5:8291ed6c r4:84196658 [ 90.081910][ T3861] [<8058ae04>] (__vfs_setxattr) from [<8058b8e0>] (__vfs_setxattr_noperm+0x7c/0x204) [ 90.081968][ T3861] r9:8291ed6c r8:00000000 r7:84196658 r6:00000001 r5:dfe2de5c r4:834e2d48 [ 90.081987][ T3861] [<8058b864>] (__vfs_setxattr_noperm) from [<8058bb50>] (__vfs_setxattr_locked+0xe8/0x118) [ 90.082057][ T3861] r10:dfe2ddc0 r9:00000000 r8:84196658 r7:00000000 r6:dfe2de5c r5:8291ed6c [ 90.082077][ T3861] r4:834e2d48 [ 90.083351][ T3861] [<8058ba68>] (__vfs_setxattr_locked) from [<8058bc10>] (vfs_setxattr+0x90/0x180) [ 90.083471][ T3861] r8:8291ed6c r7:dfe2de5c r6:834e2d48 r5:841966d8 r4:dfe2de48 [ 90.083490][ T3861] [<8058bb80>] (vfs_setxattr) from [<8058bd94>] (do_setxattr+0x94/0x9c) [ 90.083551][ T3861] r10:000000e4 r9:834e2d48 r8:8291ed6c r7:00000000 r6:00000000 r5:dfe2de5c [ 90.083570][ T3861] r4:dfe2de48 [ 90.083769][ T3861] [<8058bd00>] (do_setxattr) from [<8058bfc4>] (file_setxattr+0x58/0x78) [ 90.083843][ T3861] r9:84efb000 r8:00000000 r7:00000003 r6:dfe2de48 r5:857f4000 r4:00000000 [ 90.083860][ T3861] [<8058bf6c>] (file_setxattr) from [<8058c1c8>] (path_setxattrat+0x104/0x17c) [ 90.083920][ T3861] r7:00000003 r6:857f4000 r5:857f4001 r4:00000000 [ 90.083940][ T3861] [<8058c0c4>] (path_setxattrat) from [<8058c440>] (sys_fsetxattr+0x30/0x38) [ 90.083999][ T3861] r8:8020029c r7:000000e4 r6:00130270 r5:00000000 r4:00000000 [ 90.084018][ T3861] [<8058c410>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 90.084072][ T3861] Exception stack(0xdfe2dfa8 to 0xdfe2dff0) [ 90.084136][ T3861] dfa0: 00000000 00000000 00000003 20000440 00000000 00000000 [ 90.084172][ T3861] dfc0: 00000000 00000000 00130270 000000e4 002e0000 00000000 00006364 76f370bc [ 90.084197][ T3861] dfe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 95.788825][ T3895] FAULT_INJECTION: forcing a failure. [ 95.788825][ T3895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.791713][ T3895] CPU: 1 UID: 0 PID: 3895 Comm: syz.1.35 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 95.791871][ T3895] Hardware name: ARM-Versatile Express [ 95.791898][ T3895] Call trace: [ 95.791946][ T3895] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 95.792077][ T3895] r7:00000000 r6:00000000 r5:60000013 r4:8226033c [ 95.792096][ T3895] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 95.792142][ T3895] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 95.792188][ T3895] r5:83a4b000 r4:8294f150 [ 95.792203][ T3895] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 95.792253][ T3895] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 95.792307][ T3895] r8:76f32f30 r7:00000000 r6:00000000 r5:dfe7df68 r4:00000002 [ 95.792322][ T3895] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 95.792365][ T3895] [<809723c0>] (should_fail_usercopy) from [<8058e610>] (simple_read_from_buffer+0x80/0x13c) [ 95.792416][ T3895] [<8058e590>] (simple_read_from_buffer) from [<8060851c>] (proc_fail_nth_read+0xb8/0x108) [ 95.792473][ T3895] r10:00000001 r9:80608464 r8:00000002 r7:dfe7df68 r6:0000000f r5:76f32f30 [ 95.792497][ T3895] r4:83a4b000 r3:dfe7de9f [ 95.792512][ T3895] [<80608464>] (proc_fail_nth_read) from [<8055342c>] (vfs_read+0x98/0x324) [ 95.792569][ T3895] r8:76f32f30 r7:dfe7df68 r6:83a4b000 r5:0000000f r4:848f4900 [ 95.792587][ T3895] [<80553394>] (vfs_read) from [<8055413c>] (ksys_read+0x74/0xe8) [ 95.792645][ T3895] r10:00000003 r9:83a4b000 r8:8020029c r7:00000000 r6:00000000 r5:848f4900 [ 95.792662][ T3895] r4:848f4903 [ 95.792679][ T3895] [<805540c8>] (ksys_read) from [<805541c0>] (sys_read+0x10/0x14) [ 95.792731][ T3895] r7:00000003 r6:00000004 r5:76f32f30 r4:0000000f [ 95.792745][ T3895] [<805541b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 95.792791][ T3895] Exception stack(0xdfe7dfa8 to 0xdfe7dff0) [ 95.792827][ T3895] dfa0: 0000000f 76f32f30 00000004 76f32f30 0000000f 00000000 [ 95.792872][ T3895] dfc0: 0000000f 76f32f30 00000004 00000003 002e0000 00000000 00006364 76f330bc [ 95.792898][ T3895] dfe0: 00000158 76f32ed0 000d80f4 00130194 [ 96.016039][ T3899] FAULT_INJECTION: forcing a failure. [ 96.016039][ T3899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.018341][ T3899] CPU: 0 UID: 0 PID: 3899 Comm: syz.0.37 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 96.019670][ T3899] Hardware name: ARM-Versatile Express [ 96.020124][ T3899] Call trace: [ 96.021261][ T3899] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 96.022744][ T3899] r7:00000000 r6:00000000 r5:60000013 r4:8226033c [ 96.022852][ T3899] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 96.022974][ T3899] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 96.023034][ T3899] r5:84efbc00 r4:8294f150 [ 96.023051][ T3899] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 96.023106][ T3899] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 96.023157][ T3899] r8:76f36f30 r7:00000000 r6:00000000 r5:dfe65f68 r4:00000002 [ 96.023171][ T3899] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 96.023215][ T3899] [<809723c0>] (should_fail_usercopy) from [<8058e610>] (simple_read_from_buffer+0x80/0x13c) [ 96.023265][ T3899] [<8058e590>] (simple_read_from_buffer) from [<8060851c>] (proc_fail_nth_read+0xb8/0x108) [ 96.023341][ T3899] r10:00000001 r9:80608464 r8:00000002 r7:dfe65f68 r6:0000000f r5:76f36f30 [ 96.023370][ T3899] r4:84efbc00 r3:dfe65e9f [ 96.023389][ T3899] [<80608464>] (proc_fail_nth_read) from [<8055342c>] (vfs_read+0x98/0x324) [ 96.023448][ T3899] r8:76f36f30 r7:dfe65f68 r6:84efbc00 r5:0000000f r4:857f4900 [ 96.023468][ T3899] [<80553394>] (vfs_read) from [<8055413c>] (ksys_read+0x74/0xe8) [ 96.023532][ T3899] r10:00000003 r9:84efbc00 r8:8020029c r7:00000000 r6:00000000 r5:857f4900 [ 96.023554][ T3899] r4:857f4903 [ 96.023570][ T3899] [<805540c8>] (ksys_read) from [<805541c0>] (sys_read+0x10/0x14) [ 96.023655][ T3899] r7:00000003 r6:00000004 r5:76f36f30 r4:0000000f [ 96.023670][ T3899] [<805541b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 96.023781][ T3899] Exception stack(0xdfe65fa8 to 0xdfe65ff0) [ 96.023971][ T3899] 5fa0: 0000000f 76f36f30 00000004 76f36f30 0000000f 00000000 [ 96.024020][ T3899] 5fc0: 0000000f 76f36f30 00000004 00000003 002e0000 00000000 00006364 76f370bc [ 96.024047][ T3899] 5fe0: 00000158 76f36ed0 000d80f4 00130194 [ 96.588216][ T3914] FAULT_INJECTION: forcing a failure. [ 96.588216][ T3914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.593469][ T3914] CPU: 1 UID: 0 PID: 3914 Comm: syz.0.43 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 96.593669][ T3914] Hardware name: ARM-Versatile Express [ 96.593696][ T3914] Call trace: [ 96.593745][ T3914] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 96.593862][ T3914] r7:dfe7de20 r6:00000000 r5:60000013 r4:8226033c [ 96.593881][ T3914] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 96.593933][ T3914] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 96.593986][ T3914] r5:83a48c00 r4:8294f150 [ 96.594001][ T3914] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 96.594056][ T3914] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 96.594118][ T3914] r8:00004000 r7:dfe7de20 r6:20000380 r5:00000000 r4:dfe7df20 [ 96.594136][ T3914] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 96.594185][ T3914] [<809723c0>] (should_fail_usercopy) from [<81545cc0>] (copy_msghdr_from_user+0x50/0x130) [ 96.594241][ T3914] [<81545c70>] (copy_msghdr_from_user) from [<81545e18>] (___sys_sendmsg+0x78/0xd0) [ 96.594304][ T3914] r8:00004000 r7:00000000 r6:85049180 r5:dfe7df20 r4:dfe7de64 [ 96.594322][ T3914] [<81545da0>] (___sys_sendmsg) from [<815462d4>] (__sys_sendmsg+0x8c/0xe0) [ 96.594388][ T3914] r10:00000128 r9:83a48c00 r8:848f4c00 r7:00004000 r6:20000380 r5:848f4c01 [ 96.594410][ T3914] r4:00000003 [ 96.594427][ T3914] [<81546248>] (__sys_sendmsg) from [<8154633c>] (sys_sendmsg+0x14/0x18) [ 96.594491][ T3914] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 96.594507][ T3914] [<81546328>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 96.594554][ T3914] Exception stack(0xdfe7dfa8 to 0xdfe7dff0) [ 96.594592][ T3914] dfa0: 00000000 00000000 00000003 20000380 00004000 00000000 [ 96.594628][ T3914] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f370bc [ 96.594655][ T3914] dfe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 96.860259][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 96.860673][ T31] audit: type=1400 audit(96.770:112): avc: denied { map } for pid=3919 comm="syz.0.46" path="socket:[2731]" dev="sockfs" ino=2731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 96.861777][ T31] audit: type=1400 audit(96.770:113): avc: denied { read } for pid=3919 comm="syz.0.46" path="socket:[2731]" dev="sockfs" ino=2731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 96.886112][ T31] audit: type=1400 audit(96.800:114): avc: denied { create } for pid=3919 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.984667][ T31] audit: type=1400 audit(96.900:115): avc: denied { write } for pid=3921 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 99.380013][ T31] audit: type=1400 audit(99.290:116): avc: denied { create } for pid=3954 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.402286][ T31] audit: type=1400 audit(99.310:117): avc: denied { ioctl } for pid=3954 comm="syz.1.51" path="socket:[2826]" dev="sockfs" ino=2826 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.644245][ T31] audit: type=1400 audit(99.560:118): avc: denied { ioctl } for pid=3962 comm="syz.1.54" path="socket:[2855]" dev="sockfs" ino=2855 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.651909][ T31] audit: type=1400 audit(99.560:119): avc: denied { getopt } for pid=3962 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.809931][ T31] audit: type=1400 audit(99.720:120): avc: denied { ioctl } for pid=3967 comm="syz.0.56" path="socket:[2868]" dev="sockfs" ino=2868 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.932856][ T3975] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.964735][ T31] audit: type=1400 audit(99.880:121): avc: denied { getopt } for pid=3971 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 100.700183][ T3985] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3985 comm=syz.0.60 [ 101.716710][ T4002] FAULT_INJECTION: forcing a failure. [ 101.716710][ T4002] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.723031][ T4002] CPU: 0 UID: 0 PID: 4002 Comm: syz.0.68 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 101.723131][ T4002] Hardware name: ARM-Versatile Express [ 101.723153][ T4002] Call trace: [ 101.723194][ T4002] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 101.723294][ T4002] r7:20000d40 r6:00000000 r5:60000013 r4:8226033c [ 101.723339][ T4002] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 101.723393][ T4002] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 101.723440][ T4002] r5:84efa400 r4:8294f150 [ 101.723453][ T4002] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 101.723525][ T4002] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 101.723651][ T4002] r8:00000000 r7:20000d40 r6:84b32240 r5:00000000 r4:df9fdf20 [ 101.723672][ T4002] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 101.723719][ T4002] [<809723c0>] (should_fail_usercopy) from [<808b5d1c>] (_copy_from_iter+0x6c/0x7c8) [ 101.723769][ T4002] [<808b5cb0>] (_copy_from_iter) from [<81670b84>] (netlink_sendmsg+0x18c/0x444) [ 101.723840][ T4002] r10:00000000 r9:00000000 r8:df9fdf30 r7:858d2000 r6:0000001c r5:84e7ad80 [ 101.723858][ T4002] r4:df9fdf20 [ 101.723906][ T4002] [<816709f8>] (netlink_sendmsg) from [<81542b20>] (__sock_sendmsg+0x44/0x78) [ 101.723981][ T4002] r10:00000000 r9:df9fddc4 r8:df9fddc4 r7:00000000 r6:850b9680 r5:df9fdf20 [ 101.723997][ T4002] r4:00000000 [ 101.724010][ T4002] [<81542adc>] (__sock_sendmsg) from [<81543e74>] (____sys_sendmsg+0x298/0x2cc) [ 101.724064][ T4002] r7:00000000 r6:850b9680 r5:00008010 r4:df9fdf20 [ 101.724079][ T4002] [<81543bdc>] (____sys_sendmsg) from [<81545e3c>] (___sys_sendmsg+0x9c/0xd0) [ 101.724135][ T4002] r10:df9fde24 r9:20000e00 r8:00008010 r7:00000000 r6:850b9680 r5:df9fdf20 [ 101.724156][ T4002] r4:00000000 [ 101.724170][ T4002] [<81545da0>] (___sys_sendmsg) from [<815462d4>] (__sys_sendmsg+0x8c/0xe0) [ 101.724345][ T4002] r10:00000128 r9:84efa400 r8:858653c0 r7:00008010 r6:20000e00 r5:858653c1 [ 101.724383][ T4002] r4:00000006 [ 101.724443][ T4002] [<81546248>] (__sys_sendmsg) from [<8154633c>] (sys_sendmsg+0x14/0x18) [ 101.724508][ T4002] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 101.724557][ T4002] [<81546328>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 101.724669][ T4002] Exception stack(0xdf9fdfa8 to 0xdf9fdff0) [ 101.724724][ T4002] dfa0: 00000000 00000000 00000006 20000e00 00008010 00000000 [ 101.724754][ T4002] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f370bc [ 101.724802][ T4002] dfe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 101.934592][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 101.935043][ T31] audit: type=1400 audit(101.850:123): avc: denied { create } for pid=4010 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.939831][ T31] audit: type=1400 audit(101.850:124): avc: denied { ioctl } for pid=4010 comm="syz.1.71" path="socket:[3368]" dev="sockfs" ino=3368 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 102.349805][ T4019] FAULT_INJECTION: forcing a failure. [ 102.349805][ T4019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.350237][ T4019] CPU: 0 UID: 0 PID: 4019 Comm: syz.1.74 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 102.350395][ T4019] Hardware name: ARM-Versatile Express [ 102.350421][ T4019] Call trace: [ 102.350468][ T4019] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 102.350708][ T4019] r7:00000000 r6:00000000 r5:60000013 r4:8226033c [ 102.350823][ T4019] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 102.351233][ T4019] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 102.351466][ T4019] r5:84efb000 r4:8294f150 [ 102.351510][ T4019] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 102.351603][ T4019] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 102.351758][ T4019] r8:76f32f30 r7:00000000 r6:00000000 r5:dfa7df68 r4:00000002 [ 102.351855][ T4019] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 102.351955][ T4019] [<809723c0>] (should_fail_usercopy) from [<8058e610>] (simple_read_from_buffer+0x80/0x13c) [ 102.352016][ T4019] [<8058e590>] (simple_read_from_buffer) from [<8060851c>] (proc_fail_nth_read+0xb8/0x108) [ 102.352088][ T4019] r10:00000001 r9:80608464 r8:00000002 r7:dfa7df68 r6:0000000f r5:76f32f30 [ 102.352110][ T4019] r4:84efb000 r3:dfa7de9f [ 102.352127][ T4019] [<80608464>] (proc_fail_nth_read) from [<8055342c>] (vfs_read+0x98/0x324) [ 102.352185][ T4019] r8:76f32f30 r7:dfa7df68 r6:84efb000 r5:0000000f r4:8585f240 [ 102.352200][ T4019] [<80553394>] (vfs_read) from [<8055413c>] (ksys_read+0x74/0xe8) [ 102.352256][ T4019] r10:00000003 r9:84efb000 r8:8020029c r7:00000000 r6:00000000 r5:8585f240 [ 102.352274][ T4019] r4:8585f243 [ 102.352289][ T4019] [<805540c8>] (ksys_read) from [<805541c0>] (sys_read+0x10/0x14) [ 102.352344][ T4019] r7:00000003 r6:00000005 r5:76f32f30 r4:0000000f [ 102.352359][ T4019] [<805541b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 102.352404][ T4019] Exception stack(0xdfa7dfa8 to 0xdfa7dff0) [ 102.352475][ T4019] dfa0: 0000000f 76f32f30 00000005 76f32f30 0000000f 00000000 [ 102.352511][ T4019] dfc0: 0000000f 76f32f30 00000005 00000003 002e0000 00000000 00006364 76f330bc [ 102.352537][ T4019] dfe0: 00000158 76f32ed0 000d80f4 00130194 [ 102.712694][ T3812] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 102.886129][ T3812] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 102.887567][ T3812] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 102.889765][ T3812] usb 1-1: Product: syz [ 102.890774][ T3812] usb 1-1: Manufacturer: syz [ 102.892124][ T3812] usb 1-1: SerialNumber: syz [ 103.839935][ T31] audit: type=1400 audit(103.750:125): avc: denied { create } for pid=4042 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.854152][ T31] audit: type=1400 audit(103.770:126): avc: denied { write } for pid=4042 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 107.352237][ T31] audit: type=1400 audit(107.260:127): avc: denied { ioctl } for pid=4058 comm="syz.1.84" path="socket:[3020]" dev="sockfs" ino=3020 ioctlcmd=0x8935 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 107.428509][ T31] audit: type=1400 audit(107.340:128): avc: denied { create } for pid=4060 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.446993][ T31] audit: type=1400 audit(107.360:129): avc: denied { bind } for pid=4060 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.631611][ T31] audit: type=1400 audit(107.540:130): avc: denied { accept } for pid=4060 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.657522][ T31] audit: type=1400 audit(107.570:131): avc: denied { write } for pid=4060 comm="syz.1.85" path="socket:[3431]" dev="sockfs" ino=3431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.764019][ T31] audit: type=1400 audit(107.680:132): avc: denied { ioctl } for pid=4067 comm="syz.1.86" path="socket:[3470]" dev="sockfs" ino=3470 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.770643][ T31] audit: type=1400 audit(107.680:133): avc: denied { create } for pid=4067 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 108.386819][ T31] audit: type=1400 audit(108.300:134): avc: denied { ioctl } for pid=4072 comm="syz.1.88" path="socket:[3479]" dev="sockfs" ino=3479 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.856372][ T31] audit: type=1400 audit(109.770:135): avc: denied { listen } for pid=4105 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 110.006063][ T31] audit: type=1400 audit(109.920:136): avc: denied { ioctl } for pid=4107 comm="syz.1.95" path="socket:[3505]" dev="sockfs" ino=3505 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 112.538229][ T44] usb 1-1: USB disconnect, device number 2 [ 112.653814][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 112.654158][ T31] audit: type=1400 audit(112.570:139): avc: denied { audit_write } for pid=4139 comm="syz.0.105" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 113.637261][ T4156] FAULT_INJECTION: forcing a failure. [ 113.637261][ T4156] name failslab, interval 1, probability 0, space 0, times 0 [ 113.639717][ T4156] CPU: 1 UID: 0 PID: 4156 Comm: syz.0.112 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 113.639855][ T4156] Hardware name: ARM-Versatile Express [ 113.639884][ T4156] Call trace: [ 113.639942][ T4156] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 113.640065][ T4156] r7:00000c40 r6:00000000 r5:60000013 r4:8226033c [ 113.640084][ T4156] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 113.640184][ T4156] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 113.640242][ T4156] r5:84ef8000 r4:82917bc0 [ 113.640257][ T4156] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 113.640310][ T4156] [<80972180>] (should_fail_ex) from [<8051f2c0>] (should_failslab+0x6c/0x94) [ 113.640368][ T4156] r8:84ef8000 r7:00000c40 r6:849ce568 r5:00001000 r4:830016c0 [ 113.640385][ T4156] [<8051f254>] (should_failslab) from [<80503c50>] (__kmalloc_noprof+0x9c/0x458) [ 113.640429][ T4156] [<80503bb4>] (__kmalloc_noprof) from [<807c332c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 113.640488][ T4156] r10:849ce540 r9:8309e400 r8:00000000 r7:834314c8 r6:849ce568 r5:00001000 [ 113.640505][ T4156] r4:00000000 [ 113.640521][ T4156] [<807c32f0>] (tomoyo_realpath_from_path) from [<807bf720>] (tomoyo_check_open_permission+0x150/0x1c0) [ 113.640581][ T4156] r10:849ce540 r9:00000006 r8:84e9ccc0 r7:00000002 r6:00000000 r5:849ce568 [ 113.640600][ T4156] r4:00000001 r3:00000001 [ 113.640616][ T4156] [<807bf5d0>] (tomoyo_check_open_permission) from [<807c41d4>] (tomoyo_file_open+0x34/0x38) [ 113.640671][ T4156] r9:00000000 r8:849ce568 r7:00000000 r6:83ca1a58 r5:81c1fbe0 r4:849ce540 [ 113.640692][ T4156] [<807c41a0>] (tomoyo_file_open) from [<807806a0>] (security_file_open+0x54/0x194) [ 113.640745][ T4156] r5:81c1fbe0 r4:849ce540 [ 113.640761][ T4156] [<8078064c>] (security_file_open) from [<8054dec8>] (do_dentry_open+0xe4/0x4d0) [ 113.640816][ T4156] r5:81c1fbe0 r4:849ce540 [ 113.640831][ T4156] [<8054dde4>] (do_dentry_open) from [<8054fe0c>] (vfs_open+0x2c/0xe8) [ 113.640947][ T4156] r9:00000000 r8:dfa79e58 r7:00000000 r6:849ce568 r5:8291ed6c r4:849ce540 [ 113.640969][ T4156] [<8054fde0>] (vfs_open) from [<805688f8>] (path_openat+0x30c/0x1150) [ 113.641030][ T4156] r6:dfa79f20 r5:8291ed6c r4:00000002 [ 113.641047][ T4156] [<805685ec>] (path_openat) from [<805697e8>] (do_filp_open+0xac/0x148) [ 113.641101][ T4156] r10:00000142 r9:832e5000 r8:00000001 r7:dfa79e58 r6:dfa79f20 r5:84ef8000 [ 113.641121][ T4156] r4:00000003 [ 113.641136][ T4156] [<8056973c>] (do_filp_open) from [<8055036c>] (do_sys_openat2+0x90/0xe0) [ 113.641224][ T4156] r9:84ef8000 r8:8020029c r7:00000003 r6:dfa79f58 r5:832e5000 r4:00000005 [ 113.641295][ T4156] [<805502dc>] (do_sys_openat2) from [<80550794>] (sys_openat+0x98/0xd4) [ 113.641352][ T4156] r7:00000142 r6:00130270 r5:20000000 r4:00000003 [ 113.641396][ T4156] [<805506fc>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 113.641442][ T4156] Exception stack(0xdfa79fa8 to 0xdfa79ff0) [ 113.641479][ T4156] 9fa0: 00000000 00000000 00000003 20000000 00000002 00000000 [ 113.641512][ T4156] 9fc0: 00000000 00000000 00130270 00000142 002e0000 00000000 00006364 76f370bc [ 113.641540][ T4156] 9fe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 113.641564][ T4156] r5:00000000 r4:00000000 [ 113.667953][ T4156] ERROR: Out of memory at tomoyo_realpath_from_path. [ 113.958599][ T31] audit: type=1400 audit(113.870:140): avc: denied { setopt } for pid=4150 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.708073][ T4173] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4173 comm=syz.1.116 [ 115.714518][ T31] audit: type=1400 audit(115.630:141): avc: denied { create } for pid=4172 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.738501][ T4173] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4173 comm=syz.1.116 [ 115.774920][ T31] audit: type=1400 audit(115.690:142): avc: denied { write } for pid=4172 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.793512][ T31] audit: type=1400 audit(115.710:143): avc: denied { ioctl } for pid=4172 comm="syz.1.116" path="socket:[3600]" dev="sockfs" ino=3600 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.854036][ T31] audit: type=1400 audit(115.770:144): avc: denied { read } for pid=4172 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.290823][ T4184] FAULT_INJECTION: forcing a failure. [ 116.290823][ T4184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.294303][ T4184] CPU: 0 UID: 0 PID: 4184 Comm: syz.0.120 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 116.294466][ T4184] Hardware name: ARM-Versatile Express [ 116.294494][ T4184] Call trace: [ 116.294550][ T4184] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 116.294712][ T4184] r7:00000000 r6:00000000 r5:60000013 r4:8226033c [ 116.294738][ T4184] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 116.294791][ T4184] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 116.294856][ T4184] r5:84ef8000 r4:8294f150 [ 116.294905][ T4184] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 116.294965][ T4184] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 116.295065][ T4184] r8:76f36f30 r7:00000000 r6:00000000 r5:dfb0df68 r4:00000002 [ 116.295088][ T4184] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 116.295138][ T4184] [<809723c0>] (should_fail_usercopy) from [<8058e610>] (simple_read_from_buffer+0x80/0x13c) [ 116.295198][ T4184] [<8058e590>] (simple_read_from_buffer) from [<8060851c>] (proc_fail_nth_read+0xb8/0x108) [ 116.295291][ T4184] r10:00000001 r9:80608464 r8:00000002 r7:dfb0df68 r6:0000000f r5:76f36f30 [ 116.295341][ T4184] r4:84ef8000 r3:dfb0de9f [ 116.295365][ T4184] [<80608464>] (proc_fail_nth_read) from [<8055342c>] (vfs_read+0x98/0x324) [ 116.295464][ T4184] r8:76f36f30 r7:dfb0df68 r6:84ef8000 r5:0000000f r4:85865d80 [ 116.295491][ T4184] [<80553394>] (vfs_read) from [<8055413c>] (ksys_read+0x74/0xe8) [ 116.295584][ T4184] r10:00000003 r9:84ef8000 r8:8020029c r7:00000000 r6:00000000 r5:85865d80 [ 116.295608][ T4184] r4:85865d83 [ 116.295737][ T4184] [<805540c8>] (ksys_read) from [<805541c0>] (sys_read+0x10/0x14) [ 116.295814][ T4184] r7:00000003 r6:00000004 r5:76f36f30 r4:0000000f [ 116.295833][ T4184] [<805541b0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.295910][ T4184] Exception stack(0xdfb0dfa8 to 0xdfb0dff0) [ 116.296131][ T4184] dfa0: 0000000f 76f36f30 00000004 76f36f30 0000000f 00000000 [ 116.296170][ T4184] dfc0: 0000000f 76f36f30 00000004 00000003 002e0000 00000000 00006364 76f370bc [ 116.296196][ T4184] dfe0: 00000158 76f36ed0 000d80f4 00130194 [ 119.223868][ T31] audit: type=1400 audit(119.140:145): avc: denied { ioctl } for pid=4207 comm="syz.1.129" path="socket:[4347]" dev="sockfs" ino=4347 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 119.711695][ T4215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=4215 comm=syz.1.132 [ 119.713507][ T4215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4215 comm=syz.1.132 [ 119.825348][ T31] audit: type=1400 audit(119.740:146): avc: denied { connect } for pid=4218 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 119.849253][ T4221] FAULT_INJECTION: forcing a failure. [ 119.849253][ T4221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.849658][ T4221] CPU: 0 UID: 0 PID: 4221 Comm: syz.0.135 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 119.849768][ T4221] Hardware name: ARM-Versatile Express [ 119.849795][ T4221] Call trace: [ 119.849916][ T4221] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 119.850141][ T4221] r7:00000000 r6:00000000 r5:60000013 r4:8226033c [ 119.850263][ T4221] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 119.850341][ T4221] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 119.850648][ T4221] r5:84efe000 r4:8294f150 [ 119.850742][ T4221] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 119.851346][ T4221] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 119.851677][ T4221] r8:85865540 r7:00000000 r6:85518000 r5:dfa79ecc r4:20002680 [ 119.851934][ T4221] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 119.852092][ T4221] [<809723c0>] (should_fail_usercopy) from [<815427f4>] (put_user_ifreq+0x18/0x6c) [ 119.852379][ T4221] [<815427dc>] (put_user_ifreq) from [<81544668>] (sock_ioctl+0x484/0x600) [ 119.852704][ T4221] r7:00000000 r6:85518000 r5:20002680 r4:000089f0 [ 119.852891][ T4221] [<815441e4>] (sock_ioctl) from [<8056cd88>] (sys_ioctl+0x130/0xba0) [ 119.852989][ T4221] r9:00000003 r8:85865540 r7:20002680 r6:85865541 r5:00000000 r4:000089f0 [ 119.853009][ T4221] [<8056cc58>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 119.853051][ T4221] Exception stack(0xdfa79fa8 to 0xdfa79ff0) [ 119.853091][ T4221] 9fa0: 00000000 00000000 00000003 000089f0 20002680 00000000 [ 119.853120][ T4221] 9fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f370bc [ 119.853143][ T4221] 9fe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 119.853173][ T4221] r10:00000036 r9:84efe000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 119.853189][ T4221] r4:00000000 [ 119.969621][ T4223] syz.0.136 uses obsolete (PF_INET,SOCK_PACKET) [ 120.044013][ T4225] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4225 comm=syz.0.137 [ 120.139612][ T31] audit: type=1400 audit(120.050:147): avc: denied { map_create } for pid=4226 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.114147][ T4242] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4242 comm=syz.0.142 [ 121.145706][ T4242] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4242 comm=syz.0.142 [ 122.021762][ T31] audit: type=1400 audit(121.930:148): avc: denied { write } for pid=4250 comm="syz.0.146" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.396585][ T4258] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4258 comm=syz.0.148 [ 122.421404][ T4258] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4258 comm=syz.0.148 [ 125.308348][ T4286] capability: warning: `syz.0.157' uses 32-bit capabilities (legacy support in use) [ 126.087006][ T4304] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 126.103923][ T31] audit: type=1400 audit(126.020:149): avc: denied { write } for pid=4303 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.253387][ T31] audit: type=1400 audit(126.160:150): avc: denied { allowed } for pid=4308 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 126.268543][ T31] audit: type=1400 audit(126.180:151): avc: denied { create } for pid=4308 comm="syz.0.166" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.275924][ T31] audit: type=1400 audit(126.190:152): avc: denied { map } for pid=4308 comm="syz.0.166" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.281756][ T31] audit: type=1400 audit(126.190:153): avc: denied { read write } for pid=4308 comm="syz.0.166" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 127.588532][ T4325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4325 comm=syz.1.171 [ 130.083495][ T31] audit: type=1400 audit(130.000:154): avc: denied { mounton } for pid=4343 comm="syz.0.178" path="/proc/196/cgroup" dev="proc" ino=3951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 130.365808][ C1] vkms_vblank_simulate: vblank timer overrun [ 130.460241][ T31] audit: type=1400 audit(130.370:155): avc: denied { setopt } for pid=4353 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 131.178290][ T4365] capability: warning: `syz.0.187' uses deprecated v2 capabilities in a way that may be insecure [ 131.186230][ T31] audit: type=1400 audit(131.100:156): avc: denied { create } for pid=4364 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 131.194713][ T31] audit: type=1400 audit(131.100:157): avc: denied { write } for pid=4364 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 131.469681][ T31] audit: type=1400 audit(131.380:158): avc: denied { setattr } for pid=4353 comm="syz.1.183" name="RAW" dev="sockfs" ino=3994 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 132.126764][ T31] audit: type=1400 audit(132.040:159): avc: denied { write } for pid=4386 comm="syz.0.192" path="socket:[4690]" dev="sockfs" ino=4690 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 132.129944][ T31] audit: type=1400 audit(132.040:160): avc: denied { read } for pid=4386 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.026312][ T31] audit: type=1400 audit(132.940:161): avc: denied { connect } for pid=4393 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 133.379757][ T31] audit: type=1400 audit(133.290:162): avc: denied { write } for pid=4399 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 136.733015][ T4433] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4433 comm=syz.0.206 [ 136.753334][ T4433] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4433 comm=syz.0.206 [ 138.337257][ T31] audit: type=1400 audit(138.250:163): avc: denied { mounton } for pid=4463 comm="syz.1.221" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 139.479005][ T31] audit: type=1400 audit(139.390:164): avc: denied { execute } for pid=4478 comm="syz.1.226" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 141.648483][ T31] audit: type=1400 audit(141.560:165): avc: denied { map_read map_write } for pid=4494 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1334:(snd_func_refer) error evaluating name ALSA lib conf.c:5180:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5703:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2666:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 144.686491][ T4521] netlink: 8 bytes leftover after parsing attributes in process `syz.1.243'. [ 144.689117][ T4521] netlink: 24 bytes leftover after parsing attributes in process `syz.1.243'. [ 145.332877][ T4540] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4540 comm=syz.0.249 [ 145.376113][ T4540] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4540 comm=syz.0.249 [ 145.959154][ T4550] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4550 comm=syz.1.254 [ 146.123879][ T4550] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4550 comm=syz.1.254 [ 146.286598][ T4552] syz.0.255(4552): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 148.434471][ T4606] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4606 comm=syz.1.275 [ 148.497803][ T4606] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=627 sclass=netlink_tcpdiag_socket pid=4606 comm=syz.1.275 [ 149.077763][ T31] audit: type=1400 audit(148.990:166): avc: denied { create } for pid=4615 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 149.648701][ T31] audit: type=1400 audit(149.560:167): avc: denied { nlmsg_write } for pid=4626 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 151.027848][ T31] audit: type=1400 audit(150.940:168): avc: denied { kexec_image_load } for pid=4661 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 151.896783][ T4686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4686 comm=syz.0.308 [ 153.926812][ T31] audit: type=1400 audit(153.840:169): avc: denied { setopt } for pid=4733 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 155.416205][ T31] audit: type=1400 audit(155.330:170): avc: denied { map } for pid=4742 comm="syz.0.334" path="socket:[5753]" dev="sockfs" ino=5753 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 158.193131][ T4755] FAULT_INJECTION: forcing a failure. [ 158.193131][ T4755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.195326][ T4755] CPU: 1 UID: 0 PID: 4755 Comm: syz.0.338 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 158.195464][ T4755] Hardware name: ARM-Versatile Express [ 158.195489][ T4755] Call trace: [ 158.195530][ T4755] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 158.196121][ T4755] r7:dfd4de20 r6:00000000 r5:60000013 r4:8226033c [ 158.196149][ T4755] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 158.196201][ T4755] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 158.196252][ T4755] r5:83a43000 r4:8294f150 [ 158.196288][ T4755] [<8021fb9c>] (dump_stack) from [<80972344>] (should_fail_ex+0x1c4/0x228) [ 158.196346][ T4755] [<80972180>] (should_fail_ex) from [<809723bc>] (should_fail+0x14/0x18) [ 158.196403][ T4755] r8:00000000 r7:dfd4de20 r6:200001c0 r5:00000000 r4:dfd4df20 [ 158.196421][ T4755] [<809723a8>] (should_fail) from [<809723dc>] (should_fail_usercopy+0x1c/0x20) [ 158.196494][ T4755] [<809723c0>] (should_fail_usercopy) from [<81545cc0>] (copy_msghdr_from_user+0x50/0x130) [ 158.196547][ T4755] [<81545c70>] (copy_msghdr_from_user) from [<81545e18>] (___sys_sendmsg+0x78/0xd0) [ 158.196603][ T4755] r8:00000000 r7:00000000 r6:850ab680 r5:dfd4df20 r4:dfd4de64 [ 158.196618][ T4755] [<81545da0>] (___sys_sendmsg) from [<815462d4>] (__sys_sendmsg+0x8c/0xe0) [ 158.196681][ T4755] r10:00000128 r9:83a43000 r8:8585b300 r7:00000000 r6:200001c0 r5:8585b301 [ 158.196699][ T4755] r4:00000004 [ 158.196714][ T4755] [<81546248>] (__sys_sendmsg) from [<8154633c>] (sys_sendmsg+0x14/0x18) [ 158.196773][ T4755] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 158.196788][ T4755] [<81546328>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 158.196833][ T4755] Exception stack(0xdfd4dfa8 to 0xdfd4dff0) [ 158.196867][ T4755] dfa0: 00000000 00000000 00000004 200001c0 00000000 00000000 [ 158.196904][ T4755] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f370bc [ 158.196930][ T4755] dfe0: 76f36ec0 76f36eb0 0001948c 001322c0 [ 159.197294][ T31] audit: type=1400 audit(159.110:171): avc: denied { create } for pid=4768 comm="syz.1.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 160.697291][ T4783] syzkaller0: entered promiscuous mode [ 160.698087][ T4783] syzkaller0: entered allmulticast mode [ 162.388217][ T4797] 8021q: adding VLAN 0 to HW filter on device bond1 [ 181.708012][ T31] audit: type=1400 audit(181.620:172): avc: denied { bind } for pid=4869 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 181.710256][ T31] audit: type=1400 audit(181.620:173): avc: denied { listen } for pid=4869 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 181.761736][ T31] audit: type=1400 audit(181.670:174): avc: denied { connect } for pid=4869 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 181.851714][ T31] audit: type=1400 audit(181.760:175): avc: denied { setopt } for pid=4869 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 181.852200][ T31] audit: type=1400 audit(181.760:176): avc: denied { write } for pid=4869 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.261616][ T23] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 182.443430][ T23] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 182.444732][ T23] usb 2-1: config 0 has no interface number 0 [ 182.445799][ T23] usb 2-1: New USB device found, idVendor=0b48, idProduct=1005, bcdDevice=8c.1e [ 182.447312][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 182.460477][ T23] usb 2-1: config 0 descriptor?? [ 190.833341][ T3070] usb 2-1: USB disconnect, device number 2 [ 193.297773][ T31] audit: type=1400 audit(193.210:177): avc: denied { write } for pid=4885 comm="syz.1.369" name="dev_mcast" dev="proc" ino=4026532732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 200.542000][ T23] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 200.706749][ T23] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 200.707118][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 200.711738][ T23] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 200.711905][ T23] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 200.712060][ T23] usb 2-1: Manufacturer: syz [ 200.716373][ T23] usb 2-1: config 0 descriptor?? [ 200.832313][ T23] rc_core: IR keymap rc-hauppauge not found [ 200.832783][ T23] Registered IR keymap rc-empty [ 200.836949][ T23] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 200.839841][ T23] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input4 [ 201.155608][ C1] igorplugusb 2-1:0.0: receive overflow invalid: 107 [ 201.370307][ T23] usb 2-1: USB disconnect, device number 3 [ 201.763285][ T4917] comedi comedi3: comedi_test: 20263 microvolt, 5 microsecond waveform attached [ 205.142134][ T10] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 205.338123][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 0, changing to 7 [ 205.339602][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 205.340764][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8A has an invalid bInterval 0, changing to 7 [ 205.343796][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8A has invalid wMaxPacketSize 0 [ 205.370652][ T10] usb 2-1: New USB device found, idVendor=0a07, idProduct=00d0, bcdDevice=10.13 [ 205.372317][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 205.375418][ T10] usb 2-1: Product: syz [ 205.376254][ T10] usb 2-1: Manufacturer: syz [ 205.377955][ T10] usb 2-1: SerialNumber: syz [ 205.384243][ T10] usb 2-1: config 0 descriptor?? [ 205.627922][ T10] adutux 2-1:0.0: ADU208 now attached to /dev/usb/adutux0 [ 205.649014][ T10] usb 2-1: USB disconnect, device number 4 [ 206.142476][ T31] audit: type=1400 audit(206.060:178): avc: denied { setopt } for pid=4947 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 206.276320][ T31] audit: type=1400 audit(206.190:179): avc: denied { create } for pid=4956 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.455635][ T31] audit: type=1400 audit(206.370:180): avc: denied { name_bind } for pid=4960 comm="syz.1.382" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 206.461853][ T31] audit: type=1400 audit(206.370:181): avc: denied { node_bind } for pid=4960 comm="syz.1.382" saddr=::1 src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 212.862776][ T3070] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 213.022230][ T3070] usb 2-1: Using ep0 maxpacket: 16 [ 213.049638][ T3070] usb 2-1: config 0 has an invalid interface number: 133 but max is 0 [ 213.049933][ T3070] usb 2-1: config 0 has no interface number 0 [ 213.050508][ T3070] usb 2-1: config 0 interface 133 has no altsetting 0 [ 213.117835][ T3070] usb 2-1: New USB device found, idVendor=04d8, idProduct=0082, bcdDevice=cb.68 [ 213.118117][ T3070] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 213.118372][ T3070] usb 2-1: Product: syz [ 213.118420][ T3070] usb 2-1: Manufacturer: syz [ 213.118446][ T3070] usb 2-1: SerialNumber: syz [ 213.126615][ T3070] usb 2-1: config 0 descriptor?? [ 213.145589][ T3070] ims_pcu 2-1:0.133: Missing CDC union descriptor [ 213.146035][ T3070] ims_pcu 2-1:0.133: probe with driver ims_pcu failed with error -22 [ 213.345391][ T9] usb 2-1: USB disconnect, device number 5 [ 214.576484][ T31] audit: type=1400 audit(214.490:182): avc: denied { read } for pid=4989 comm="syz.1.388" path="socket:[6626]" dev="sockfs" ino=6626 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 219.478093][ T4994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 219.484791][ T4994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.634403][ T4994] hsr_slave_0: entered promiscuous mode [ 220.636037][ T4994] hsr_slave_1: entered promiscuous mode [ 220.644152][ T4994] debugfs: 'hsr0' already exists in 'hsr' [ 220.651820][ T4994] Cannot create hsr debugfs directory [ 221.179494][ T4994] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 221.190826][ T4994] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 221.202635][ T4994] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 221.210169][ T4994] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 222.147277][ T4994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.317949][ T5339] syz_tun: entered allmulticast mode [ 225.448573][ T31] audit: type=1400 audit(225.360:183): avc: denied { create } for pid=5340 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 225.454958][ T31] audit: type=1400 audit(225.370:184): avc: denied { write } for pid=5340 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 226.165402][ T4994] veth0_vlan: entered promiscuous mode [ 226.215875][ T4994] veth1_vlan: entered promiscuous mode [ 226.346987][ T4994] veth0_macvtap: entered promiscuous mode [ 226.366989][ T4994] veth1_macvtap: entered promiscuous mode [ 226.509308][ T3813] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.511772][ T3813] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.515436][ T3813] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.519796][ T3813] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.899959][ T31] audit: type=1400 audit(228.810:185): avc: denied { read } for pid=5401 comm="syz.1.395" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.903669][ T31] audit: type=1400 audit(228.810:186): avc: denied { open } for pid=5401 comm="syz.1.395" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.924310][ T31] audit: type=1400 audit(228.840:187): avc: denied { ioctl } for pid=5401 comm="syz.1.395" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.931953][ T31] audit: type=1400 audit(228.840:188): avc: denied { set_context_mgr } for pid=5401 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 228.972147][ T31] audit: type=1400 audit(228.880:189): avc: denied { write } for pid=5401 comm="syz.1.395" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.978966][ T31] audit: type=1400 audit(228.890:190): avc: denied { map } for pid=5401 comm="syz.1.395" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 228.990186][ T31] audit: type=1400 audit(228.900:191): avc: denied { call } for pid=5401 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 228.993738][ T5425] binder_alloc: 5401: binder_alloc_buf size 17436 failed, no address space [ 228.995376][ T5425] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 230.444668][ T5431] comedi comedi3: comedi_config --init_data is deprecated [ 231.804044][ T31] audit: type=1400 audit(231.700:192): avc: denied { connect } for pid=5446 comm="syz.2.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 234.526869][ T5453] dlm: no local IP address has been set [ 234.528136][ T5453] dlm: cannot start dlm midcomms -107 [ 252.874269][ T5461] ======================================================= [ 252.874269][ T5461] WARNING: The mand mount option has been deprecated and [ 252.874269][ T5461] and is ignored by this kernel. Remove the mand [ 252.874269][ T5461] option from the mount to silence this warning. [ 252.874269][ T5461] ======================================================= [ 253.046471][ T31] audit: type=1400 audit(252.960:193): avc: denied { unmount } for pid=4994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 253.532728][ T3813] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.590467][ T3813] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.639331][ T3813] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.779414][ T3813] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.130498][ T3813] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 254.139431][ T3813] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 254.154898][ T3813] bond0 (unregistering): Released all slaves [ 254.242905][ T3813] hsr_slave_0: left promiscuous mode [ 254.263652][ T3813] hsr_slave_1: left promiscuous mode [ 254.284843][ T3813] veth1_macvtap: left promiscuous mode [ 254.285855][ T3813] veth0_macvtap: left promiscuous mode [ 254.286583][ T3813] veth1_vlan: left promiscuous mode [ 254.287100][ T3813] veth0_vlan: left promiscuous mode [ 257.000348][ T5466] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.042621][ T3813] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.063885][ T5466] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.134188][ T3813] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.199862][ T3813] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.278043][ T3813] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.624019][ T3813] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 257.630110][ T3813] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 257.638389][ T3813] bond0 (unregistering): Released all slaves [ 257.656018][ T3813] bond1 (unregistering): Released all slaves [ 257.761628][ T3813] hsr_slave_0: left promiscuous mode [ 257.764157][ T3813] hsr_slave_1: left promiscuous mode [ 257.789428][ T3813] veth1_macvtap: left promiscuous mode [ 257.789860][ T3813] veth0_macvtap: left promiscuous mode [ 257.790324][ T3813] veth1_vlan: left promiscuous mode [ 257.790492][ T3813] veth0_vlan: left promiscuous mode [ 258.865026][ T5466] hsr_slave_0: entered promiscuous mode [ 258.874864][ T5466] hsr_slave_1: entered promiscuous mode [ 259.247104][ T5466] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 259.259849][ T5466] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 259.268351][ T5466] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 259.279551][ T5466] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 260.220791][ T5466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.588523][ T5466] veth0_vlan: entered promiscuous mode [ 264.645101][ T5466] veth1_vlan: entered promiscuous mode [ 264.752479][ T5466] veth0_macvtap: entered promiscuous mode [ 264.766789][ T5466] veth1_macvtap: entered promiscuous mode [ 264.867137][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.868533][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.879988][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.883459][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.834061][ T31] audit: type=1326 audit(268.750:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.3.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.834378][ T31] audit: type=1326 audit(268.750:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.3.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.884098][ T31] audit: type=1326 audit(268.760:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.3.409" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.884427][ T31] audit: type=1326 audit(268.760:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.3.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.884770][ T31] audit: type=1326 audit(268.760:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.3.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.956035][ T31] audit: type=1400 audit(268.870:199): avc: denied { name_bind } for pid=5891 comm="syz.1.412" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 300.332544][ T31] audit: type=1400 audit(300.240:200): avc: denied { block_suspend } for pid=6006 comm="syz.3.420" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 301.571475][ C0] hrtimer: interrupt took 9934784 ns [ 310.014912][ T31] audit: type=1400 audit(309.930:201): avc: denied { setopt } for pid=6014 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 310.770618][ T6026] netdevsim netdevsim3: Direct firmware load for @ failed with error -2 [ 310.772526][ T6026] netdevsim netdevsim3: Falling back to sysfs fallback for: @ [ 310.772842][ T31] audit: type=1400 audit(310.690:202): avc: denied { firmware_load } for pid=6025 comm="syz.3.425" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 320.531888][ T5930] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 320.692373][ T5930] usb 2-1: Using ep0 maxpacket: 16 [ 320.711597][ T5930] usb 2-1: config 0 has an invalid interface number: 13 but max is 0 [ 320.711864][ T5930] usb 2-1: config 0 has no interface number 0 [ 320.737175][ T5930] usb 2-1: New USB device found, idVendor=0e8d, idProduct=00a7, bcdDevice=b5.31 [ 320.737516][ T5930] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 320.737862][ T5930] usb 2-1: Product: syz [ 320.738022][ T5930] usb 2-1: Manufacturer: syz [ 320.738076][ T5930] usb 2-1: SerialNumber: syz [ 320.746981][ T5930] usb 2-1: config 0 descriptor?? [ 320.773332][ T5930] option 2-1:0.13: GSM modem (1-port) converter detected [ 320.979022][ T5930] usb 2-1: USB disconnect, device number 6 [ 320.986520][ T5930] option 2-1:0.13: device disconnected [ 321.441676][ T5930] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 321.601731][ T5930] usb 2-1: Using ep0 maxpacket: 32 [ 321.607419][ T5930] usb 2-1: config 0 has an invalid interface number: 13 but max is 0 [ 321.607676][ T5930] usb 2-1: config 0 has no interface number 0 [ 321.618905][ T5930] usb 2-1: New USB device found, idVendor=05dc, idProduct=0001, bcdDevice= 0.01 [ 321.619174][ T5930] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 321.619392][ T5930] usb 2-1: Product: syz [ 321.619556][ T5930] usb 2-1: Manufacturer: syz [ 321.619716][ T5930] usb 2-1: SerialNumber: syz [ 321.626246][ T5930] usb 2-1: config 0 descriptor?? [ 321.643011][ T5930] ums-jumpshot 2-1:0.13: USB Mass Storage device detected [ 321.651881][ T5930] ums-jumpshot 2-1:0.13: USB Mass Storage not supported on this host controller [ 321.685684][ T5930] ums-jumpshot 2-1:0.13: probe with driver ums-jumpshot failed with error -22 [ 321.838531][ T5930] usb 2-1: USB disconnect, device number 7 [ 321.936418][ T31] audit: type=1400 audit(321.850:203): avc: denied { bind } for pid=6072 comm="syz.1.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 321.938201][ T31] audit: type=1400 audit(321.850:204): avc: denied { node_bind } for pid=6072 comm="syz.1.430" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 322.022964][ T6075] macvtap0: entered allmulticast mode [ 322.023466][ T6075] veth0_macvtap: entered allmulticast mode [ 327.060045][ T31] audit: type=1400 audit(326.970:205): avc: denied { map } for pid=6083 comm="syz.3.433" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.959165][ T6087] process 'syz.3.434' launched './file1' with NULL argv: empty string added [ 330.988385][ T31] audit: type=1400 audit(330.890:206): avc: denied { execute_no_trans } for pid=6085 comm="syz.3.434" path="/13/file1" dev="tmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 333.908226][ T31] audit: type=1400 audit(333.820:207): avc: denied { checkpoint_restore } for pid=6088 comm="syz.3.435" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 335.803606][ T31] audit: type=1400 audit(335.720:208): avc: denied { create } for pid=6088 comm="syz.3.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 335.815338][ T31] audit: type=1400 audit(335.730:209): avc: denied { write } for pid=6088 comm="syz.3.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 337.552436][ T5857] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 337.702150][ T5857] usb 2-1: Using ep0 maxpacket: 8 [ 337.720624][ T5857] usb 2-1: config 0 has an invalid interface number: 21 but max is 0 [ 337.722956][ T5857] usb 2-1: config 0 has no interface number 0 [ 337.748788][ T5857] usb 2-1: New USB device found, idVendor=0421, idProduct=04c9, bcdDevice=fa.39 [ 337.750534][ T5857] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 337.754759][ T5857] usb 2-1: Product: syz [ 337.756531][ T5857] usb 2-1: Manufacturer: syz [ 337.758564][ T5857] usb 2-1: SerialNumber: syz [ 337.765800][ T5857] usb 2-1: config 0 descriptor?? [ 337.994847][ T5857] usb 2-1: bad CDC descriptors [ 338.008027][ T5857] cdc_acm 2-1:0.21: Zero length descriptor references [ 338.008441][ T5857] cdc_acm 2-1:0.21: probe with driver cdc_acm failed with error -22 [ 338.027875][ T5857] usb 2-1: USB disconnect, device number 8 [ 342.527505][ T31] audit: type=1400 audit(342.440:210): avc: denied { setopt } for pid=6115 comm="syz.3.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 350.916223][ T6122] syz_tun: entered allmulticast mode [ 363.370110][ T5466] syz_tun (unregistering): left allmulticast mode [ 363.556488][ T1056] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 363.629769][ T1056] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 363.713810][ T1056] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 363.776043][ T1056] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.184296][ T1056] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 364.190600][ T1056] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 364.198299][ T1056] bond0 (unregistering): Released all slaves [ 364.292487][ T1056] hsr_slave_0: left promiscuous mode [ 364.295402][ T1056] hsr_slave_1: left promiscuous mode [ 364.306482][ T1056] veth1_macvtap: left promiscuous mode [ 364.308270][ T1056] veth0_macvtap: left promiscuous mode [ 364.309388][ T1056] veth1_vlan: left promiscuous mode [ 364.310317][ T1056] veth0_vlan: left promiscuous mode [ 366.487957][ T6132] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 366.504218][ T6132] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.329630][ T6132] hsr_slave_0: entered promiscuous mode [ 367.330739][ T6132] hsr_slave_1: entered promiscuous mode [ 367.587498][ T6132] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 367.604351][ T6132] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 367.609188][ T6132] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 367.616691][ T6132] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 368.483424][ T6132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 372.559943][ T6132] veth0_vlan: entered promiscuous mode [ 372.579351][ T6132] veth1_vlan: entered promiscuous mode [ 372.648787][ T6132] veth0_macvtap: entered promiscuous mode [ 372.665103][ T6132] veth1_macvtap: entered promiscuous mode [ 372.723278][ T3813] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 372.723820][ T3813] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 372.723919][ T3813] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 372.724069][ T3813] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 372.945096][ T31] audit: type=1400 audit(372.860:211): avc: denied { connect } for pid=6529 comm="syz.4.444" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 373.318960][ T6537] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 373.324336][ T6537] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 373.410155][ T31] audit: type=1400 audit(373.320:212): avc: denied { bind } for pid=6540 comm="syz.4.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 375.951825][ T31] audit: type=1400 audit(375.870:213): avc: denied { write } for pid=6542 comm="syz.4.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 375.969007][ T6546] block device autoloading is deprecated and will be removed. [ 387.503915][ T6564] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.510955][ T6564] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.572749][ T6564] hsr_slave_0: entered promiscuous mode [ 388.582611][ T6564] hsr_slave_1: entered promiscuous mode [ 388.583750][ T6564] debugfs: 'hsr0' already exists in 'hsr' [ 388.583923][ T6564] Cannot create hsr debugfs directory [ 389.148208][ T6564] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 389.170334][ T6564] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 389.180131][ T6564] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 389.192036][ T6564] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 389.500595][ T31] audit: type=1400 audit(389.410:214): avc: denied { ioctl } for pid=6890 comm="syz.4.451" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=9411 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 390.022824][ T6903] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 390.023531][ T6903] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 390.317243][ T6564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.276818][ T6564] veth0_vlan: entered promiscuous mode [ 391.333145][ T6564] veth1_vlan: entered promiscuous mode [ 391.442603][ T6564] veth0_macvtap: entered promiscuous mode [ 391.473826][ T6564] veth1_macvtap: entered promiscuous mode [ 391.646233][ T3813] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.646680][ T3813] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.646824][ T3813] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.646972][ T3813] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 412.318284][ T6963] netlink: 8 bytes leftover after parsing attributes in process `syz.5.462'. [ 414.552469][ T6972] tmpfs: Unsupported parameter 'huge' [ 415.800515][ T31] audit: type=1400 audit(415.710:215): avc: denied { write } for pid=6981 comm="syz.5.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 416.756375][ T6991] netlink: 8 bytes leftover after parsing attributes in process `syz.5.472'. [ 417.845820][ T6113] syz_tun (unregistering): left allmulticast mode [ 418.055733][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.130122][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.215399][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.265212][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.571918][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 418.590100][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 418.596264][ T12] bond0 (unregistering): Released all slaves [ 418.669585][ T12] hsr_slave_0: left promiscuous mode [ 418.683164][ T12] hsr_slave_1: left promiscuous mode [ 418.697262][ T12] veth1_macvtap: left promiscuous mode [ 418.697956][ T12] veth0_macvtap: left allmulticast mode [ 418.698543][ T12] veth0_macvtap: left promiscuous mode [ 418.699088][ T12] veth1_vlan: left promiscuous mode [ 418.699680][ T12] veth0_vlan: left promiscuous mode [ 436.754910][ T7122] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 436.951771][ T31] audit: type=1400 audit(436.860:216): avc: denied { nlmsg_write } for pid=7128 comm="syz.5.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 441.940069][ T7155] comedi comedi3: 8255: I/O port conflict (0x40404f26,4) [ 441.952971][ T7155] 8<--- cut here --- [ 441.953073][ T7155] Unable to handle kernel paging request at virtual address fee00008 when write [ 441.953141][ T7155] [fee00008] *pgd=80000080007003, *pmd=00000000 [ 441.953846][ T7155] Internal error: Oops: a06 [#1] SMP ARM [ 441.956484][ T7155] Modules linked in: [ 441.956968][ T7155] CPU: 1 UID: 0 PID: 7155 Comm: syz.4.501 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 441.957419][ T7155] Hardware name: ARM-Versatile Express [ 441.957681][ T7155] PC is at subdev_8255_io+0x60/0x6c [ 441.959274][ T7155] LR is at subdev_8255_io+0x4c/0x6c [ 441.960635][ T7155] pc : [<813b8368>] lr : [<813b8354>] psr: 60000013 [ 441.961400][ T7155] sp : dfabdcb8 ip : dfabdcb8 fp : dfabdcd4 [ 441.961912][ T7155] r10: 00000001 r9 : 00000000 r8 : 00000084 [ 441.962258][ T7155] r7 : 00000005 r6 : 0000009b r5 : 841f3000 r4 : 00000008 [ 441.962661][ T7155] r3 : 0000009b r2 : fee00008 r1 : 00000001 r0 : 841f3000 [ 441.963246][ T7155] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 441.963658][ T7155] Control: 30c5387d Table: 8575f980 DAC: 00000000 [ 441.964032][ T7155] Register r0 information: slab kmalloc-192 start 841f3000 pointer offset 0 size 192 [ 441.966024][ T7155] Register r1 information: non-paged memory [ 441.966906][ T7155] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 441.967607][ T7155] Register r3 information: non-paged memory [ 441.967932][ T7155] Register r4 information: non-paged memory [ 441.968238][ T7155] Register r5 information: slab kmalloc-192 start 841f3000 pointer offset 0 size 192 [ 441.968900][ T7155] Register r6 information: non-paged memory [ 441.969394][ T7155] Register r7 information: non-paged memory [ 441.969705][ T7155] Register r8 information: non-paged memory [ 441.970169][ T7155] Register r9 information: NULL pointer [ 441.970523][ T7155] Register r10 information: non-paged memory [ 441.970883][ T7155] Register r11 information: 2-page vmalloc region starting at 0xdfabc000 allocated at kernel_clone+0xac/0x3ec [ 441.975482][ T7155] Register r12 information: 2-page vmalloc region starting at 0xdfabc000 allocated at kernel_clone+0xac/0x3ec [ 441.982388][ T7155] Process syz.4.501 (pid: 7155, stack limit = 0xdfabc000) [ 441.982839][ T7155] Stack: (0xdfabdcb8 to 0xdfabe000) [ 441.983157][ T7155] dca0: 813b8308 841f3000 [ 441.983757][ T7155] dcc0: 00000005 00000005 dfabdcf4 dfabdcd8 813b8040 813b8314 00000005 80503bc0 [ 441.984533][ T7155] dce0: 84f3e084 84f3e084 dfabdd14 dfabdcf8 813b8400 813b7ff4 84f3e084 841f3000 [ 441.985235][ T7155] dd00: dfabdda8 00000005 dfabdd54 dfabdd18 813b85f4 813b8380 82ae3d60 84e83a00 [ 441.985549][ T7155] dd20: 82821598 00000000 00000000 829d00c4 841f3000 841f3044 dfabdd90 841f3000 [ 441.985861][ T7155] dd40: 00000000 82b16f00 dfabdd8c dfabdd58 813a74f8 813b8544 200000c0 00000000 [ 441.986110][ T7155] dd60: dfabdd7c 200000c0 841f3000 b5403587 200000c0 8557d400 40946400 00000003 [ 441.986281][ T7155] dd80: dfabde4c dfabdd90 813a3078 813a73fc 35353238 00000000 00000000 00000000 [ 441.986556][ T7155] dda0: 00000000 40404f26 00000005 00000002 00000401 00000cf7 00000009 00000fff [ 441.986815][ T7155] ddc0: 5c95239c 00000005 000003bf 00000802 00001600 00000001 20000001 00000009 [ 441.987173][ T7155] dde0: 0000e1cb 00000006 0000002f 00000400 00000195 00000006 00000000 0000000b [ 441.987665][ T7155] de00: 00000402 00000009 00000003 00000041 00000005 00000006 08000003 dffffffa [ 441.988085][ T7155] de20: 00000000 19928e2d 00000000 84937a80 841f3000 200000c0 200000c0 8557d400 [ 441.988353][ T7155] de40: dfabdf14 dfabde50 813a4044 813a2f84 00000000 00000000 00000000 19928e2d [ 441.988577][ T7155] de60: 00000000 00000000 8247054c 0000005f 83c9ca58 841f3030 84119e1c 8557d400 [ 441.988828][ T7155] de80: dfabdee4 dfabde90 807977b4 8078db18 00000064 00000001 00000000 dfabdeac [ 441.989069][ T7155] dea0: 85d10910 83430198 00006400 0000000b dfabdea0 00000000 00000000 19928e2d [ 441.989319][ T7155] dec0: 84937a80 40946400 200000c0 200000c0 84937a80 00000003 dfabdef4 dfabdee8 [ 441.989551][ T7155] dee0: 807978d4 19928e2d dfabdf14 40946400 00000000 84937a81 200000c0 84937a80 [ 441.989804][ T7155] df00: 00000003 8557d400 dfabdfa4 dfabdf18 8056cd88 813a3a74 ecac8b10 8557d400 [ 441.990055][ T7155] df20: dfabdf3c dfabdf30 81a392b8 81a39188 dfabdf54 dfabdf40 8025e490 8028ef8c [ 441.990318][ T7155] df40: dfabdfb0 40000000 dfabdf84 dfabdf58 802229ec 8025e44c 00000000 8281cddc [ 441.990605][ T7155] df60: dfabdfb0 0014c820 ecac8b10 80222940 00000000 19928e2d dfabdfac 00000000 [ 441.991056][ T7155] df80: 00000000 002f6308 00000036 8020029c 8557d400 00000036 00000000 dfabdfa8 [ 441.991370][ T7155] dfa0: 80200060 8056cc64 00000000 00000000 00000003 40946400 200000c0 00000000 [ 441.991775][ T7155] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f4e0bc [ 441.992016][ T7155] dfe0: 76f4dec0 76f4deb0 0001948c 001322c0 60000010 00000003 00000000 00000000 [ 441.992324][ T7155] Call trace: [ 441.992468][ T7155] [<813b8308>] (subdev_8255_io) from [<813b8040>] (subdev_8255_do_config+0x58/0x60) [ 441.992807][ T7155] r7:00000005 r6:00000005 r5:841f3000 r4:813b8308 [ 441.993066][ T7155] [<813b7fe8>] (subdev_8255_do_config) from [<813b8400>] (subdev_8255_io_init+0x8c/0x9c) [ 441.993577][ T7155] r4:84f3e084 [ 441.993782][ T7155] [<813b8374>] (subdev_8255_io_init) from [<813b85f4>] (dev_8255_attach+0xbc/0x114) [ 441.994573][ T7155] r7:00000005 r6:dfabdda8 r5:841f3000 r4:84f3e084 [ 441.994717][ T7155] [<813b8538>] (dev_8255_attach) from [<813a74f8>] (comedi_device_attach+0x108/0x250) [ 441.995171][ T7155] r10:82b16f00 r9:00000000 r8:841f3000 r7:dfabdd90 r6:841f3044 r5:841f3000 [ 441.995598][ T7155] r4:829d00c4 [ 441.995872][ T7155] [<813a73f0>] (comedi_device_attach) from [<813a3078>] (do_devconfig_ioctl+0x100/0x220) [ 441.996261][ T7155] r10:00000003 r9:40946400 r8:8557d400 r7:200000c0 r6:b5403587 r5:841f3000 [ 441.996522][ T7155] r4:200000c0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 441.996667][ T7155] [<813a2f78>] (do_devconfig_ioctl) from [<813a4044>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 441.997531][ T7155] r8:8557d400 r7:200000c0 r6:200000c0 r5:841f3000 r4:84937a80 [ 441.998106][ T7155] [<813a3a68>] (comedi_unlocked_ioctl) from [<8056cd88>] (sys_ioctl+0x130/0xba0) [ 441.998552][ T7155] r10:8557d400 r9:00000003 r8:84937a80 r7:200000c0 r6:84937a81 r5:00000000 [ 441.998961][ T7155] r4:40946400 [ 441.999117][ T7155] [<8056cc58>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 441.999893][ T7155] Exception stack(0xdfabdfa8 to 0xdfabdff0) [ 442.000168][ T7155] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 442.000464][ T7155] dfc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f4e0bc [ 442.000766][ T7155] dfe0: 76f4dec0 76f4deb0 0001948c 001322c0 [ 442.001092][ T7155] r10:00000036 r9:8557d400 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 442.001496][ T7155] r4:00000000 [ 442.001908][ T7155] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 442.002497][ T7155] ---[ end trace 0000000000000000 ]--- [ 442.003108][ T7155] Kernel panic - not syncing: Fatal exception [ 442.004963][ T7155] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:21:20 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8226033c R02=00000001 R03=81a39af0 R04=00000006 R05=828f7848 R06=00000000 R07=828f7840 R08=84b65400 R09=00000028 R10=828f7848 R11=df801ee4 R12=df801ee8 R13=df801ed8 R14=8033d8ec R15=81a39b00 PSR=20010093 --C- A S svc32 s00=00000000 s01=1414ac00 d00=1414ac0000000000 s02=78da2caa s03=08000601 d01=0800060178da2caa s04=0418b003 s05=ffffffff d02=ffffffff0418b003 s06=18c00303 s07=34820800 d03=3482080018c00303 s08=0018c803 s09=d0030008 d04=d00300080018c803 s10=00080018 s11=0018d803 d05=0018d80300080018 s12=e0030008 s13=ffff0418 d06=ffff0418e0030008 s14=0303ffff s15=ff0418f0 d07=ff0418f00303ffff s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=08004690 s33=46980301 d16=4698030108004690 s34=03100800 s35=ff0446a0 d17=ff0446a003100800 s36=03ffffff s37=0046b003 d18=0046b00303ffffff s38=b8030008 s39=20080046 d19=20080046b8030008 s40=0446c003 s41=ffffffff d20=ffffffff0446c003 s42=46d00303 s43=03000800 d21=0300080046d00303 s44=080046d8 s45=46e00300 d22=46e00300080046d8 s46=03000800 s47=080046e8 d23=080046e803000800 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=e34010c2 s53=7a619df6 d26=7a619df6e34010c2 s54=6c286419 s55=44db9384 d27=44db93846c286419 s56=21ba7907 s57=4b4e2f5f d28=4b4e2f5f21ba7907 s58=0a24a7a2 s59=4d6d2ec4 d29=4d6d2ec40a24a7a2 s60=356b96c5 s61=b7886b83 d30=b7886b83356b96c5 s62=80395148 s63=6408b1c6 d31=6408b1c680395148 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83ec6840 R01=00000020 R02=eb76b000 R03=eb76b018 R04=83a63002 R05=83ec6840 R06=80a791fc R07=83a63038 R08=82826ee0 R09=00000000 R10=00000672 R11=dfabd91c R12=00000002 R13=dfabd910 R14=82959084 R15=80a7920c PSR=80000193 N--- A S svc32 s00=32663430 s01=29342c36 d00=29342c3632663430 s02=30282074 s03=34303478 d01=3430347830282074 s04=656e205d s05=76656474 d02=76656474656e205d s06=206d6973 s07=6474656e d03=6474656e206d6973 s08=69737665 s09=6e20356d d04=6e20356d69737665 s10=65647465 s11=6d697376 d05=6d69737665647465 s12=73203a33 s13=5b207465 d06=5b20746573203a33 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000