------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Not tainted 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 000000000000054f x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : ffff00007fbce948 x4 : 0000000000015ff5 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b99 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 000000000000057f x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9a ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 00000000000005af x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9b ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 00000000000005df x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9c ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 000000000000060f x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9d ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000002bb x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000008 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9e ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000372 x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000008 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1b9f ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 000000000000027b x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000008 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba0 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 00000000000006cf x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba1 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000b623faec721a x14: 0000000000000292 x13: 0000000000000292 x12: 0000000000000000 x11: 0000000000000001 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000008 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba2 ]--- __do_kernel_fault: 21389 callbacks suppressed ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000b5951bd071c6 x14: 00000000000000b2 x13: 00000000000000b2 x12: 0000000000000000 x11: 0000000000000001 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : ffff00007fbce948 x4 : 0000000000000009 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba3 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 00008d3c5c972c90 x14: 00000000000002e6 x13: 00000000000002e6 x12: 0000000000000000 x11: 000000000000000c x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000003 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba4 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 000000000000025e x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba5 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 000000000000026c x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000002 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba6 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000a78006aad1d6 x14: 00000000000001ce x13: 00000000000001ce x12: 0000000000000000 x11: 0000000000000004 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba7 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000a52510768e16 x14: 00000000000002a2 x13: 00000000000002a2 x12: 0000000000000000 x11: 0000000000000005 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba8 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000ace098309698 x14: 00000000000002f4 x13: 00000000000002f4 x12: 0000000000000000 x11: 0000000000000003 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1ba9 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 000098737205a384 x14: 0000000000000192 x13: 0000000000000192 x12: 0000000000000000 x11: 0000000000000009 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000002 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1baa ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 000008f5c5dd9c10 x12: 0023e33299b1d6e6 x11: ffff800011d0a300 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bab ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000002b2 x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : fcff00001f9bec00 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bac ]--- __do_kernel_fault: 29884 callbacks suppressed ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000b540f3925c8a x14: 000000000000007f x13: 000000000000007f x12: 0000000000000000 x11: 0000000000000001 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : ffff00007fbb6948 x4 : 0000000000000009 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bad ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000a7bab6dc8b56 x14: 00000000000001d5 x13: 00000000000001d5 x12: 0000000000000000 x11: 0000000000000004 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000004 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bae ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000001bc x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000002 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1baf ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 00000000000009a1 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb0 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 000000000000023a x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000004 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb1 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 000089c3a9dab0a2 x14: 000000000000031f x13: 000000000000031f x12: 0000000000000000 x11: 000000000000000d x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000003 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb2 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000001f6 x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000003 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb3 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000001bd x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000002 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb4 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000310 x13: 0000000000000001 x12: 0000000000000000 x11: 0000000000000000 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : f1ff00001f9be400 x6 : 00000000299e115b x5 : 0000000000000002 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb5 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000ac1 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb6 ]--- __do_kernel_fault: 42438 callbacks suppressed ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000af2 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : ffff00007fbb6948 x4 : 0000000000015ff5 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb7 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000b22 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb8 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000b52 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bb9 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000b08deacfca6c x14: 00000000000001d1 x13: 00000000000001d1 x12: 0000000000000000 x11: 0000000000000002 x10: 8a0ce5c9500984d8 x9 : 7c0594f8f6dad678 x8 : f1ff00001f46bc68 x7 : ffff00007fbc1180 x6 : 00000000299e115b x5 : 0000000000000001 x4 : 0000000000000009 x3 : ffffffffffffefff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bba ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000bb2 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bbb ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000be2 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bbc ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000c12 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bbd ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000c42 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bbe ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000c72 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bbf ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000030 x14: ffffffffffffffff x13: ffff800012916728 x12: ffff800012916716 x11: ffff8000126ebe60 x10: fffffffffffc0000 x9 : ffff800014f03880 x8 : 697620746120746c x7 : 000000000000000f x6 : 00000000ffffeca1 x5 : ffff800014f03630 x4 : 0000000000000000 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc0 ]--- __do_kernel_fault: 56182 callbacks suppressed ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000cd3 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : ffff00007fbb6948 x4 : 0000000000015ff5 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc1 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000d03 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc2 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000d33 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc3 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000d63 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc4 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000d93 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc5 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000dc3 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc6 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000df3 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc7 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000e23 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc8 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000e53 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bc9 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000e83 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bca ]--- __do_kernel_fault: 52090 callbacks suppressed ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000eb4 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : ffff00007fbce948 x4 : 0000000000015ff5 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bcb ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000ee4 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : ffff00007fbce948 x4 : 0000000000015ff5 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bcc ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000f14 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bcd ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000f44 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bce ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000f74 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bcf ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000fa4 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bd0 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 0 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 0 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000000fd4 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bd1 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000001004 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bd2 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000001034 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bd3 ]--- ------------[ cut here ]------------ Ignoring spurious kernel translation fault at virtual address ffff8007d99970a0 WARNING: CPU: 1 PID: 9905 at arch/arm64/mm/fault.c:373 __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 Modules linked in: CPU: 1 PID: 9905 Comm: syz-executor.0 Tainted: G W 5.12.0-rc4-syzkaller-00007-g7acac4b3196c #0 Hardware name: linux,dummy-virt (DT) pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--) pc : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 lr : __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 sp : ffff800014f03880 x29: ffff800014f03880 x28: f1ff00001f46adc0 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 x23: 0000000080400009 x22: ffff8007d99970a0 x21: 0000000000000025 x20: ffff800014f03950 x19: 0000000097840005 x18: 00000000fffffffb x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000020 x14: 6c656e72656b2073 x13: 0000000000001064 x12: ffff800014f03530 x11: ffff80001279be70 x10: 00000000ffffe000 x9 : ffff80001279be70 x8 : ffff8000126ebe70 x7 : ffff80001279be70 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000015ff5 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f1ff00001f46adc0 Call trace: __do_kernel_fault+0x16c/0x1dc arch/arm64/mm/fault.c:373 do_bad_area arch/arm64/mm/fault.c:474 [inline] do_translation_fault+0x58/0xc0 arch/arm64/mm/fault.c:674 do_mem_abort+0x44/0xbc arch/arm64/mm/fault.c:805 el1_abort+0x40/0x6c arch/arm64/kernel/entry-common.c:167 el1_sync_handler+0xac/0xd0 arch/arm64/kernel/entry-common.c:259 el1_sync+0x70/0x100 arch/arm64/kernel/entry.S:656 __ethtool_get_link_ksettings+0x84/0xec net/ethtool/ioctl.c:446 linkinfo_prepare_data+0x68/0x100 net/ethtool/linkinfo.c:37 ethnl_default_notify+0xb8/0x2ec net/ethtool/netlink.c:586 ethtool_notify+0x60/0x110 net/ethtool/netlink.c:656 ethtool_set_link_ksettings+0x140/0x1d0 net/ethtool/ioctl.c:620 dev_ethtool+0xae8/0x223c net/ethtool/ioctl.c:2842 dev_ioctl+0x4ec/0x5f0 net/core/dev_ioctl.c:440 sock_do_ioctl+0x114/0x2b0 net/socket.c:1062 sock_ioctl+0x28c/0x4a0 net/socket.c:1179 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __arm64_sys_ioctl+0xa8/0xec fs/ioctl.c:739 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall arch/arm64/kernel/syscall.c:49 [inline] el0_svc_common.constprop.0+0x60/0x120 arch/arm64/kernel/syscall.c:129 do_el0_svc+0x74/0x90 arch/arm64/kernel/syscall.c:168 el0_svc+0x2c/0x54 arch/arm64/kernel/entry-common.c:416 el0_sync_handler+0x1a4/0x1b0 arch/arm64/kernel/entry-common.c:432 el0_sync+0x18c/0x1c0 arch/arm64/kernel/entry.S:699 ---[ end trace 3ab0403d964e1bd4 ]---