last executing test programs: 1h11m17.109315077s ago: executing program 1 (id=996): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x841}, 0x8000) 1h11m16.999066343s ago: executing program 1 (id=997): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000900)) socket(0x1, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) 1h11m16.867452799s ago: executing program 1 (id=998): prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x4100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x3, 0xa, 0xa}) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000180)=r1) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000240)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0xc01064c5, &(0x7f0000000340)={&(0x7f0000000300)=[r2, 0x0, r3, r4, r5, r6], 0x6}) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) fcntl$addseals(r0, 0x409, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x11, &(0x7f0000000380)=0x8000, 0x4) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {0x0}]}) timer_create(0x3, &(0x7f0000000440)={0x0, 0x1e, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000480)) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000004c0)={r8, 0x32}) r9 = fcntl$dupfd(r0, 0x406, r0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r10 = fspick(r9, &(0x7f0000000500)='./file0\x00', 0x0) ioctl$FIONCLEX(r10, 0x5450) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_CHILD_SUBREAPER(0x25) 1h11m16.677135159s ago: executing program 1 (id=999): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000280)='./file0/bus\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x5451, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) renameat2(r0, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f00000003c0)='./bus\x00', 0x0) 1h11m16.557226436s ago: executing program 1 (id=1000): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x8000, 0xb4f, 0x300, 0x1daf6}, 0x10) (fail_nth: 8) setsockopt$packet_int(r0, 0x107, 0x13, 0x0, 0x0) 1h11m16.337345597s ago: executing program 1 (id=1001): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x841}, 0x8000) 1h11m16.337056177s ago: executing program 32 (id=1001): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x841}, 0x8000) 1h8m42.23739389s ago: executing program 2 (id=1298): r0 = openat$vsock(0xffffff9c, 0x0, 0x200000, 0x0) close_range(r0, r0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x5452, &(0x7f0000000040)=0x7ff) 1h8m42.0471014s ago: executing program 2 (id=1300): r0 = syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000780), 0x0, 0x0) close$binfmt(r1) socket$inet_udp(0x2, 0x2, 0x0) connect$l2tp(r1, &(0x7f0000000080)={0x2, 0x0, @local, 0x3}, 0x10) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x138, 0x0, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x3}]}, @CTA_SYNPROXY={0x44, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x77}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xdf}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xe}]}, @CTA_NAT_DST={0x84, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast2}, @CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xe6d}, @CTA_SYNPROXY={0x24, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_SEQ_ADJ_ORIG={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x38}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x0]}]}, 0x138}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) 1h8m41.818603212s ago: executing program 2 (id=1301): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r1) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xac, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private0}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6df}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffff01}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x6e30e4ae83943943}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x800}, 0x40d0) 1h8m41.638704611s ago: executing program 2 (id=1302): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) (fail_nth: 1) 1h8m41.558706795s ago: executing program 2 (id=1303): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="c00000003c0bffff", @ANYRES64=r4, @ANYBLOB="040000000000000000010000000000000d0000000f0000007465616d5f736c6176655f30000000000100000000000000f9ffffffffffffff010000000600000025000000000000000500000000000000da8c0000000000000d0000000f0000007465616d5f736c6176655f30000000000300000000000000400700000000000003000000090000002d272b00000000000200000000000000080000000000000004000000030000002e2f245d00000000"], 0xc0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/psched\x00') ioctl$BTRFS_IOC_SEND(r3, 0x40489426, &(0x7f0000000240)={{r1}, 0x7, &(0x7f00000000c0)=[0x80, 0x0, 0xd, 0x0, 0x6, 0x8000000000000, 0x9], 0x1, 0x6}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000002380)={0x1, &(0x7f00000002c0)=[{0x402, 0x1, 0xe}]}, 0x8) dup3(r2, r5, 0x0) (async) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20000840}, 0x40010) (async) r6 = dup3(r1, r0, 0x0) (async) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {0x2}, 0x5}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000000080)={0x8}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) (async) write$eventfd(r6, 0x0, 0x0) 1h8m41.358081656s ago: executing program 2 (id=1305): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000003c40)={0x0, 0x0, &(0x7f0000003c00)={&(0x7f0000003bc0)={0x14}, 0x14}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') fcntl$lock(r2, 0x7, &(0x7f0000000040)) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) write$binfmt_misc(r1, &(0x7f0000000200), 0xfffffcdd) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) r3 = socket(0x2b, 0x80801, 0x1) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x16, 0x0, &(0x7f0000000100)) 1h7m55.942407468s ago: executing program 33 (id=1305): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000003c40)={0x0, 0x0, &(0x7f0000003c00)={&(0x7f0000003bc0)={0x14}, 0x14}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') fcntl$lock(r2, 0x7, &(0x7f0000000040)) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) write$binfmt_misc(r1, &(0x7f0000000200), 0xfffffcdd) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) r3 = socket(0x2b, 0x80801, 0x1) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x16, 0x0, &(0x7f0000000100)) 48m42.091588903s ago: executing program 0 (id=4727): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='veth1_vlan\x00', 0x10) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4041}, 0x24004095) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b395388901de7e2f672676e5cba7d5", @ANYRES16, @ANYBLOB="00032abd7000fcdbdf251a00000006002100610000000700210062620000"], 0x24}, 0x1, 0x0, 0x0, 0x40804}, 0x4000800) sendmsg$IPSET_CMD_TEST(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb4, 0xb, 0x6, 0x3, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffa}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0xe}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1d}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}, @IPSET_ATTR_MARK={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40004}, 0x40) 48m41.987153509s ago: executing program 0 (id=4728): ioctl$TIOCSRS485(0xffffffffffffffff, 0x5451, 0x0) 48m41.927839831s ago: executing program 0 (id=4729): r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8, 0x191840) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2}, 0xfd}, 0x18) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x200, 0x70bd26, 0x25dfdbfd}, 0x14}}, 0x2000c001) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x2, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) close_range(r0, 0xffffffffffffffff, 0x0) 48m41.827635697s ago: executing program 0 (id=4730): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x32f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) 48m41.716149712s ago: executing program 0 (id=4731): r0 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000ac0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) (fail_nth: 1) 48m41.488246454s ago: executing program 0 (id=4732): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4041}, 0x24004095) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b395388901de7e2f672676e5cba7d5", @ANYRES16, @ANYBLOB="00032abd7000fcdbdf251a00000006002100610000000700210062620000"], 0x24}, 0x1, 0x0, 0x0, 0x40804}, 0x4000800) sendmsg$IPSET_CMD_TEST(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb4, 0xb, 0x6, 0x3, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffa}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0xe}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1d}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}, @IPSET_ATTR_MARK={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40004}, 0x40) 48m41.485565574s ago: executing program 34 (id=4732): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4041}, 0x24004095) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b395388901de7e2f672676e5cba7d5", @ANYRES16, @ANYBLOB="00032abd7000fcdbdf251a00000006002100610000000700210062620000"], 0x24}, 0x1, 0x0, 0x0, 0x40804}, 0x4000800) sendmsg$IPSET_CMD_TEST(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb4, 0xb, 0x6, 0x3, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffa}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0xe}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1d}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}, @IPSET_ATTR_MARK={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40004}, 0x40) 48m24.64663419s ago: executing program 3 (id=4778): r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8, 0x191840) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000440)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3, {0x2}, 0xfd}, 0x18) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x2000c001) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x4000) close_range(r0, 0xffffffffffffffff, 0x0) 48m24.515396787s ago: executing program 3 (id=4779): r0 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)={'veth1_to_hsr\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)={'ip6erspan0\x00'}) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x53, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000100)={0x5, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40086437, &(0x7f0000000140)={r2, 0x6}) r3 = io_uring_setup(0x3bd3, &(0x7f0000000180)={0x0, 0xe9cd, 0x4000, 0x3, 0x6b}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x31110, r3, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000200), 0xb7e, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r4, 0xc0884123, &(0x7f0000000240)={0x1, "347d27340ed2eb3b14d9cdc202f11925c9a5adab2dd3abea2297d1f6106b30c68bc007368585f01d4d64eefd689acb92181e7042d2d5df1b696b6e383b58d4b3", {0x3, 0x200}}) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r3, 0xe, &(0x7f0000000440)={0x8, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/26, 0x1a}, {&(0x7f0000000340)=""/74, 0x4a}], &(0x7f0000000400)=[0x1a19200000000, 0xfffffffffffffff7], 0x2}, 0x20) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x1, 0x6, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000600)={&(0x7f0000000480)=[0x0, 0x0, 0x0], 0x3, r5}) r6 = semget$private(0x0, 0x0, 0x150) semctl$GETZCNT(r6, 0x2, 0xf, &(0x7f0000000680)=""/56) r7 = openat$mice(0xffffff9c, &(0x7f00000006c0), 0x400201) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r7, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r8, 0x100, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) recvmsg$inet_nvme(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000840)=""/193, 0xc1}, {&(0x7f0000000940)=""/167, 0xa7}, {&(0x7f0000000a00)=""/35, 0x23}, {&(0x7f0000000a40)=""/18, 0x12}], 0x4, &(0x7f0000000ac0)=""/205, 0xcd}, 0x40012000) r9 = syz_clone3(&(0x7f0000000e40)={0x100810000, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x3a}, &(0x7f0000000cc0)=""/201, 0xc9, &(0x7f0000000dc0)=""/16, &(0x7f0000000e00)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3, {r7}}, 0x58) ptrace$getregset(0x4204, r9, 0x3, &(0x7f0000000f00)={&(0x7f0000000ec0)=""/49, 0x31}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r7, 0x8983, &(0x7f0000000f40)) ioctl$DRM_IOCTL_IRQ_BUSID(r7, 0xc0106403, &(0x7f0000000f80)={0x0, 0x6, 0x8, 0x101}) openat$binderfs(0xffffff9c, &(0x7f0000000fc0)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r7, 0x3ba0, &(0x7f0000001000)={0x48}) syz_open_dev$mouse(&(0x7f0000001080), 0x476, 0x0) r10 = syz_io_uring_setup(0x2356, &(0x7f00000010c0)={0x0, 0xfa4b, 0x40, 0x2, 0x3ab, 0x0, r3}, &(0x7f0000001140), &(0x7f0000001180)) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r10, 0xe, &(0x7f00000013c0)={0x2, 0x0, &(0x7f0000001340)=[{&(0x7f00000011c0)=""/98, 0x62}, {&(0x7f0000001240)=""/23, 0x17}, {&(0x7f0000001280)=""/145, 0x91}], &(0x7f0000001380)=[0x57005beb, 0x5, 0x5], 0x3}, 0x20) r11 = accept$packet(r7, 0x0, &(0x7f0000001400)) setsockopt$packet_fanout_data(r11, 0x107, 0x16, &(0x7f0000001480)={0x5, &(0x7f0000001440)=[{0xc, 0x99, 0xb, 0x1}, {0x4, 0x5, 0xe9, 0x3}, {0x0, 0x0, 0x5, 0xfffffffe}, {0x1000, 0x2, 0x0, 0x7}, {0x40, 0x0, 0x8}]}, 0x8) 48m24.224790871s ago: executing program 3 (id=4780): r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x38bdc3, 0x0) close(r1) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x14, 0x1, 0x1, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8050) getsockopt(r0, 0x1, 0x6, 0x0, &(0x7f0000000040)) 48m24.005311543s ago: executing program 3 (id=4782): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) (fail_nth: 11) 48m23.809632643s ago: executing program 3 (id=4784): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000003c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r1, 0x0, 0xffffffffffffffff, 0x1}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x100000a, 0x31, r2, 0x8000000) (fail_nth: 11) 48m23.518568647s ago: executing program 3 (id=4786): syz_open_dev$sndpcmc(&(0x7f0000000000), 0x9, 0x420c1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001000)) sendmsg$nl_netfilter(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x21, 0xa, 0x101, 0x0, 0x8}, 0x14}, 0x1, 0x0, 0x0, 0x8841}, 0x40804) 48m23.518285657s ago: executing program 35 (id=4786): syz_open_dev$sndpcmc(&(0x7f0000000000), 0x9, 0x420c1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001000)) sendmsg$nl_netfilter(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x21, 0xa, 0x101, 0x0, 0x8}, 0x14}, 0x1, 0x0, 0x0, 0x8841}, 0x40804) 44m37.826416697s ago: executing program 5 (id=5498): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) read$watch_queue(r1, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) (async) r2 = dup2(r0, r0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x8, 0x0, 0x3, 0x0, 0x0, "e7e2c588128f114c7e6c997cdce0a3f4b0adcc"}) (async) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) (async) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$SW_SYNC_IOC_CREATE_FENCE(r7, 0xc0285700, &(0x7f00000000c0)={0x8, "eb9d9aa846db0f83be5b43e01ec0bf6a29d64151c7b6a602471edcc28f7e81b3"}) (async) r8 = socket$can_j1939(0x1d, 0x2, 0x7) r9 = dup(r8) sendmsg$ETHTOOL_MSG_PAUSE_SET(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) bind$can_j1939(r4, &(0x7f0000000080)={0x1d, r5, 0x1, {0x1}, 0x2}, 0x18) r10 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x6ac502, 0x19d) write$P9_RRENAMEAT(r10, &(0x7f0000000100)={0x7}, 0x0) (async) r11 = open$dir(&(0x7f0000000040)='./file1\x00', 0x60001, 0x102) close_range(r11, r3, 0x0) r12 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r12, 0x11, 0x67, &(0x7f0000000240)=0x6, 0x4) (async) sendto$inet6(r12, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) (async) r13 = memfd_create(&(0x7f0000000000)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00]\xd8\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\xdb\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\xee\xe0\xa8,PC\'@\xb2\xacd\xff\xa0\x88\xa0\xe0\xe7t4\x92\xcc*\xd5\x8a\x8d\x89\xed\xe6\x81\xfco\xf7\x8d\xc1\v\x1b\x18?m\xcd1M\xd6\xec\x17e\xc3.a\xea\xbd\x9cA\x9c.\"XS\x9b\t\xfb\n\x8b\xcf\xae\xbb>', 0x0) ioctl$TUNGETVNETLE(r13, 0x5452, &(0x7f00000002c0)) (async) sendmsg$SMC_PNETID_GET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd2a, 0x25dfdbf9}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x44081) (async) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="100000001114002427bd7000fddbdf25"], 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) (async) ioctl$TCSETAW(r3, 0x5450, 0x0) 44m36.507294785s ago: executing program 5 (id=5502): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x40040, 0x0) r1 = signalfd(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$LOOP_SET_FD(r0, 0x5450, 0xffffffffffffffff) r2 = openat$vsock(0xffffff9c, &(0x7f0000000140), 0x250105, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x671}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4804}, 0x20000890) (async) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x17) (async) r4 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0) keyctl$setperm(0x5, r4, 0x9012100) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r4, r5, 0x89) (async) r6 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380), 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000440)='\x00', r6) add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)="dee7030022cf5c6c7bc31bd2599759fafa9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x83, r6) r7 = socket(0x2, 0x2, 0x0) connect$unix(r7, &(0x7f0000000a80), 0x10) getsockname$unix(r7, &(0x7f0000000000)=@abs, &(0x7f0000001200)=0x8) (async) r8 = socket(0x2, 0x1, 0x0) bind(r8, &(0x7f0000000000), 0x10) (async) listen(r8, 0x0) (async) r9 = accept$inet(r8, 0x0, 0x0) (async) r10 = socket(0x2, 0x1, 0x0) connect$unix(r10, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x1e) r11 = dup2(r10, r10) setsockopt$sock_linger(r11, 0xffff, 0x80, &(0x7f0000000100)={0x401}, 0x8) dup2(r9, r10) keyctl$search(0xa, r6, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x1, 0x2e}, 0xffffffffffffffff) 44m33.855867421s ago: executing program 5 (id=5504): pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) r1 = epoll_create1(0x80000) syslog(0x0, 0x0, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) write$P9_RWRITE(r0, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0xf0}, 0xb) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000200)={0x2000}) r3 = openat$tun(0xffffff9c, &(0x7f0000000240), 0x10000, 0x0) ioctl$SIOCGSKNS(r3, 0x894c, &(0x7f0000000280)={'veth1\x00', 0x200}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8885) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000005c0)={'batadv_slave_0\x00'}) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r6 = openat$cuse(0xffffff9c, &(0x7f0000000600), 0x2, 0x0) write$FUSE_ENTRY(r6, &(0x7f00000006c0)={0x90, 0x0, 0x0, {0x2, 0x0, 0x8, 0xe, 0xba, 0x0, {0x2, 0x9, 0x1, 0x3, 0x6, 0x5a82, 0x5, 0xc33, 0xa00, 0x2000, 0x8, 0x0, 0x0, 0xfffffffa, 0x5}}}, 0x90) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82187201, &(0x7f0000000780)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) read$FUSE(r6, &(0x7f00000009c0)={0x2020}, 0x2020) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000002a40)={0x1, 0x1, [@multicast]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000002a80)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000002b40)={'ip6tnl0\x00', &(0x7f0000002ac0)={'syztnl0\x00', r7, 0x4, 0x4, 0x0, 0x6005240a, 0x3, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x10, 0xffff, 0x7}}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000002b80)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000002cc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000002ec0)={r8, 0x0, "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", "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"}) 44m33.313547769s ago: executing program 5 (id=5507): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001c40)='veth1_vlan\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4041}, 0x24004095) sendmsg$NL80211_CMD_SET_REG(r2, 0x0, 0x4000800) sendmsg$IPSET_CMD_TEST(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xac, 0xb, 0x6, 0x3, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffa}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0xe}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1d}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}, @IPSET_ATTR_MARK={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}]}, 0xac}, 0x1, 0x0, 0x0, 0x40004}, 0x40) setregid(0x0, 0x0) 44m30.126952052s ago: executing program 5 (id=5509): r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fchmod(r0, 0xd4) 44m30.016390128s ago: executing program 5 (id=5510): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000180)=0x4a56688b, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000080)={0x0, 'batadv_slave_1\x00', {0x5}, 0x2}) 43m44.386326923s ago: executing program 36 (id=5510): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000180)=0x4a56688b, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000080)={0x0, 'batadv_slave_1\x00', {0x5}, 0x2}) 37m50.68337599s ago: executing program 4 (id=6690): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "364537bc45a66a84c67b4b7d50fee760"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "f5c35a694a2835f5de751a9a02ed29c6"}, @NL80211_ATTR_PMK={0x14, 0xfe, "d63df298871f35640a28ee3bb602890e"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "d017d8a891789b6194dd7525e32b1754"}]}, 0x84}}, 0x400c0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000200)=0x8, 0x4) sendmsg$GTP_CMD_ECHOREQ(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8040) 37m50.2878994s ago: executing program 4 (id=6692): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendto(r0, &(0x7f0000000e00)="e80b201b6f92effd", 0x8, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x64, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x64}}, 0x20028890) 37m49.182533807s ago: executing program 4 (id=6693): r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt(r0, 0x1, 0x6, 0x0, &(0x7f0000000040)) r1 = openat$full(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r3 = openat$sw_sync_info(0xffffff9c, &(0x7f00000004c0), 0x141123, 0x0) ioctl$TIOCSRS485(r3, 0x5451, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) shutdown(r4, 0x0) recvmsg(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x1000) ioctl$PIO_UNIMAP(r2, 0x5452, &(0x7f0000000040)={0xfedc, 0x0}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000000) ioctl$FIONCLEX(r0, 0x5450) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f00000001c0)={{0x978, 0x8}}, 0x10) 37m48.507218122s ago: executing program 4 (id=6696): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) (fail_nth: 12) 37m48.203881718s ago: executing program 4 (id=6697): r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1ff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000140)={0x1, 0x101}) syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000003c0)='ns/mnt\x00') ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$ttynull(0xffffff9c, &(0x7f0000000300), 0x20000, 0x0) ioctl$VT_WAITACTIVE(r4, 0x5607) r5 = openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socket$nl_audit(0x10, 0x3, 0x9) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r6, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x100, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001680)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$unix(r3, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0x5451, 0x0) r7 = accept$unix(r3, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) fcntl$dupfd(r1, 0x605, r9) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @empty}, 0x8, 0x0, 0x0, 0x0, 0xff, &(0x7f00000000c0)='sit0\x00', 0x0, 0xfffffffffffffff8, 0xb}) close_range(r7, r8, 0x0) memfd_create(&(0x7f0000000000)='\xfa\x00', 0x0) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600), 0x803f, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r10, 0x3304) 37m47.946592121s ago: executing program 4 (id=6699): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0xc020) 37m47.946054391s ago: executing program 37 (id=6699): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0xc020) 20m8.906400513s ago: executing program 6 (id=8896): timer_create(0x4, &(0x7f0000000100)={0x0, 0x25, 0x1, @thr={&(0x7f0000000000)="d5b85f2e3986", &(0x7f0000000040)="e23ff591cf363267e1459383a716fed99cf389dfc24789ad31b1469a0364dc5d45c5debd7adaab1bcec5244847c9a9989603e1ee7f84f1b731a6a5e76ac3d78bb2ae3ea553c2df2d01381c1716e9e3532dc4c7b50450e38ac640dfdb493e13723c50ad92e4762a440e03919388f41fdb130676e85fa380de9cbb12551b1e2a680bc91786cbec8ae784ead81bd99332f02c0bd05a22a36d29103375"}}, &(0x7f0000000140)) r0 = openat$full(0xffffff9c, &(0x7f0000000180), 0x201, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@timestamp, @timestamp, @sack_perm], 0x3) socket$inet6_icmp(0xa, 0x2, 0x3a) mq_notify(r0, &(0x7f0000000380)={0x0, 0x9, 0x2, @thr={&(0x7f0000000200)="fa2d4596e3ab84ab0a2f6770b3ea17f5343aabc8d95288c4d3ecda47ee3b5929dd339a8af98094a0857b6252d70d310b9ff9756f5912b9d1a153947951d9b51df5fee6074ef7023249a85b3f1d2f59d6a0a26d40d83a163a03b83c134af0dec2f5320e5442d706553157c79a9ef6f74bfbda7d6337e481854053fd67700b4b78a2b7fce37d21ecdfdf046c81a4b163fe74f11734142b288644b4220f", &(0x7f00000002c0)="2edee262bc4cf2953790f3c72c50becb5e3940abaf329f7a9feed22896bd5cb22de278668d1171303caaf3cf8577ed9d4b8a56f2de6b80cfe6d1db885786922549ee80b0e0b20253d2f6c7bdc37af7cc7c034c1b8bd351f16f8f91e90a4203eebb78f861eafc28b4cfbfd4a2c36393f7ebd87e4bc81c4bf9a55bbb2ab160ea410b8342e564cb63"}}) r1 = msgget$private(0x0, 0x400) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) io_setup(0x4, &(0x7f0000000440)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) io_setup(0x0, &(0x7f0000000480)) msgctl$IPC_RMID(r1, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000004c0)={0x2a, 0x4, 0x0, {0x2, 0x9, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) msgctl$IPC_RMID(r1, 0x0) r2 = getpgid(0xffffffffffffffff) r3 = getpgrp(r2) write$tcp_congestion(r0, &(0x7f0000000500)='lp\x00', 0x3) openat$ptmx(0xffffff9c, &(0x7f0000000540), 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000580)=0x8001, 0x12) r4 = openat$sequencer(0xffffff9c, &(0x7f00000005c0), 0x4400c1, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000600), &(0x7f0000000640)={0x0, 0xfb, 0xfa, 0x5, 0x2, "63ef9b69700d03c4abaf13734ecc0541", "ebd180128dea9968d4b4909fc845fa22b9f12d7e6f902997ee6316869b3a8c886f53110043d41ee087d7b213e90ecb929cd833a38a6138cdad5c40fbfd915afbb2c92ee2bcd4aa01c53bdfedffc8e1f55cc5bbe1906cc5fe41b9fbf166b149efe802b25207c42561cb21de030279a5e9e2e5750544dfe371ae8d1fb33e22e55dc096f1c1e50253400a61b970403ff0783c274d91b028bec6379ab416468f4a7711dbf87fe0285d5b63f04c1bb998fbadffe5de70e91147725b67bc32be87ca1bfc81e8e9877384c1060b6de8ada8cf18b867a6f28952c04281653da3265718c3bb0192b805"}, 0xfa, 0x3) write$binfmt_elf64(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xb, 0xff, 0x0, 0x5, 0x100, 0x3, 0x3e, 0x6, 0x18d, 0x40, 0xac, 0x4, 0x101, 0x38, 0x2, 0xff, 0x1, 0x3}, [{0x7, 0x8, 0x4, 0x9f, 0x6a39c023, 0x5, 0x5, 0x5}, {0x4, 0x4, 0x8, 0x7, 0x72b8, 0x5, 0x2}], "72ad8aef3eb68daa33cc2bb56d9efba19e10d0cafb0543e03d14922518815f8e65a442f107e8c8600305e5a2aced4e54edc597a94e2c0cc45a56aef11f96ff6317ce26550f6d2b9dc20a2a815d8fb9a500de01d94e7de498855fb6de1a724d675d8475786d969d70f35e1839f049ad7986810497556bec64dd7a164ee4b9ed8c0907500f7e5e6df98474b7dcb9c60d42befa70d56b64b54be1645b3b4813c691fc778c4975c66f81e87de6927925c5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x75f) read$usbfs(r0, &(0x7f0000000ec0)=""/58, 0x3a) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000fc0), &(0x7f0000001000)=0x0, &(0x7f0000001040)) r7 = geteuid() read$FUSE(r0, &(0x7f0000001080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) msgctl$IPC_SET(r1, 0x1, &(0x7f00000030c0)={{0x3, r5, r6, r7, r9, 0x1, 0xfffb}, 0x0, 0x0, 0x1ff, 0x2, 0xffffffff, 0x6, 0xe, 0xe, 0x8, 0xfffa, r2, r3}) syz_genetlink_get_family_id$wireguard(&(0x7f0000003140), r0) setresuid(r5, r5, r8) msgget$private(0x0, 0x1c4) 20m2.704504184s ago: executing program 7 (id=8908): r0 = io_uring_setup(0x6b20, &(0x7f0000000140)={0x0, 0xfffffffe, 0x0, 0x800, 0x16}) r1 = socket(0x2b, 0x1, 0x1) ioctl$SIOCGETMIFCNT_IN6(r1, 0x89e0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x1, 0x20000000) io_uring_enter(r0, 0x5e4c, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 20m1.21770005s ago: executing program 7 (id=8909): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000280)=""/221, 0xdd) close(r0) 20m1.01674628s ago: executing program 7 (id=8910): openat$cuse(0xffffff9c, &(0x7f0000000580), 0x2, 0x0) setreuid(0x0, 0xee00) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="00022dbd7000fedbdf2501000000060001004e210000080006000000000014000900fc02000000000000010400040002000000060001004e2400000500020002000000"], 0x58}, 0x1, 0x0, 0x0, 0x2000c000}, 0x8000) 20m0.82435177s ago: executing program 7 (id=8911): pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCGIFHWADDR(r0, 0x5421, &(0x7f0000000000)={'veth1_to_hsr\x00'}) r1 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x805}, 0x0) close(r1) r4 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_ERRQUEUE(r4, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) r5 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) r6 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000140), 0x140, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup3(r7, r6, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r6, 0x0, 0x0) close(r5) r8 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r8, 0x100, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x50) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r8, 0x300, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5b4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000000) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x203c0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x641, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)=@random={'system.', 'uxex\xdc\t\xec4r\x1dsyz\x00'}) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x4c, r8, 0x400, 0x70bd28, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000080) ioctl$mixer_OSS_ALSAEMULVER(r9, 0x80044df9, &(0x7f00000015c0)) 20m0.486906808s ago: executing program 7 (id=8912): syz_usb_connect(0x0, 0x24, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x6, {{0xa, 0x4e22, 0xffffffff, @mcast2, 0x23}}}, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2d, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) r4 = dup3(r2, r3, 0x0) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) connect$can_bcm(r5, &(0x7f0000000080)={0x1d, r6}, 0x10) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x1d, 0x0, &(0x7f0000002200)) 20m0.203915952s ago: executing program 7 (id=8913): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)={0x4b, 0x0, 0x300, 0x70bd25, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x40802) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x57}, 0x1, 0x0, 0x0, 0x40000d0}, 0x4000) (fail_nth: 1) 20m0.005720553s ago: executing program 38 (id=8913): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)={0x4b, 0x0, 0x300, 0x70bd25, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x40802) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x57}, 0x1, 0x0, 0x0, 0x40000d0}, 0x4000) (fail_nth: 1) 19m57.779054117s ago: executing program 6 (id=8915): openat$cuse(0xffffff9c, &(0x7f0000000580), 0x2, 0x0) setreuid(0x0, 0xee00) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="00022dbd7000fedbdf2501000000060001004e210000080006000000000014000900fc02000000000000010400040002000000060001004e2400000500020002000000"], 0x58}, 0x1, 0x0, 0x0, 0x2000c000}, 0x8000) 19m50.955536489s ago: executing program 6 (id=8916): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r2) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r2}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha512_mb\x00'}}, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r4, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r4, r5) r7 = socket$unix(0x1, 0x1, 0x0) accept4$inet6(r6, 0x0, &(0x7f0000001180), 0x800) connect$unix(r7, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, &(0x7f0000000080)) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)={0x4b, 0x0, 0x300, 0x70bd25, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x40802) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x57}, 0x1, 0x0, 0x0, 0x40000d0}, 0x4000) 19m43.597605738s ago: executing program 6 (id=8917): syz_usb_connect(0x0, 0x24, 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000040)=0x5, 0x4) bind$inet6(r1, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x6, {{0xa, 0x4e22, 0xffffffff, @mcast2, 0x23}}}, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2d, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) r4 = dup3(r2, r3, 0x0) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) connect$can_bcm(r5, &(0x7f0000000080)={0x1d, r6}, 0x10) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x1d, 0x0, &(0x7f0000002200)) 19m40.416668082s ago: executing program 6 (id=8921): r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x3, 0xc9d, 0x8, 0x1b212838, 0x10, "391a79361be44bcbaca24a731729d5ee0c4fed"}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r1, &(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000000c0)=0x80) r3 = socket$netlink(0x10, 0x3, 0x5) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r3, 0xf504, 0x0) r4 = epoll_create(0x80) r5 = dup3(r0, r4, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000100)=0x0) sendmmsg$nfc_llcp(r5, &(0x7f0000000440)=[{&(0x7f0000000140)={0x27, r6, 0x0, 0x3, 0x6, 0x8, "d05f8a5873af43d1afc6fdd69b04b85185711792d369874f0a6b23d148ea8673bba20143232cf86c1041a9d53d509dc8f4a798bd9ef20249fb2d271ee3c91b", 0x23}, 0x58, &(0x7f0000000380)=[{&(0x7f00000001c0)="86a6bfc4bdec5ed469819a71dcf6add5a64f83f545d6e502d00f3d22f4c4f50923160876ad45ac3b7ec5cd37255bfad62ebb9382c02730003d08cb161d2639d04313a4bdf3848974f96a5a9922059ddad75cba50eb7c411756df482d0db3a97dd0ffba24e179520acc5269f4d19cc230f8f3ebe25a595649d2ed04b1b2002fdac976c9fbc79687d3affcac608f7f79fc6f", 0x91}, {&(0x7f0000000280)="8fc306d2d117adb32e4acd34e1a9db7747c709e86e47292ab973c2d0d75e2940a0898190bccd24d3e013af10c1c587c0cba74c99e7cc46db9d31f5bc873a6e5bb8fd79d2c1953c276c6078dc1dad85204a8ec0e4b4f294b243a3863a1bcacf47fc86d6e670ae966793f06ff37c2c58968a011c1a578016e9bf4ffd9bd8eeed253f2bf16c47b131ca8bc21a3387ade65334af52c06bd3ece635f21935a1e0cac55faabfb3f86e8ee5ac6766774d98525b6a", 0xb1}], 0x2, &(0x7f00000003c0)={0x5c, 0x88, 0x5, "8dfe880884e4a33e09b3cfa24ce61791ac5b2c1c46e37f10c27ecf55c045db805ba42594ad47fca8ea4d36a0e65c019a80027bbd513dec551e376705c55304c61b6ff2fb6ee8f4f84b9b88ef80e1"}, 0x5c, 0x4000004}], 0x1, 0x800) accept$unix(r5, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r5) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x64, r7, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x10) openat$dir(0xffffff9c, &(0x7f00000006c0)='./file0\x00', 0x200700, 0x47) write$binfmt_format(r5, &(0x7f0000000740)='0\x00', 0x2) shutdown(r3, 0x1) sendmsg$NFNL_MSG_CTHELPER_NEW(r5, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x40, 0x0, 0x9, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1c}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x81}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x7}}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xfff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0), r3) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000c40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000c00)={&(0x7f0000000900)={0x2dc, r8, 0x800, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xa}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe46}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0xe4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x7}, @TIPC_NLA_NODE_ID={0x35, 0x3, "84024bb0f8cac1ea43b076298183fedd0c823c970243016bcc5b2e5151c00ad7c3bdaf8d87b8920c903033126a278ccd17"}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "81d86ae68557c187dbe4c73e013b48cffd1e59692df110162dc2d46b8f2ade0c"}}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "a40f272bd3c78d10b2f5b69c2e8798cc7c321fb4cf21"}}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x7fff}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}]}, @TIPC_NLA_BEARER={0x160, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010101}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x38}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @private0}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00', 0x84}}, {0x14, 0x2, @in={0x2, 0x4e22, @private=0xa010102}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x9e, @mcast2, 0x7f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'eth', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}]}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x4840}, 0x20000050) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r9, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x48, 0x7, 0x6, 0x401, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4008000}, 0x40090) socketpair(0x2c, 0x0, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$HIDIOCSUSAGES(r5, 0x501c4814, &(0x7f0000000e00)={{0x1, 0x2, 0x9, 0x8000, 0x7ff, 0x5}, 0x87, [0x3, 0x7f, 0x5, 0x6, 0x43ff8e9c, 0x1, 0x6b2a, 0x3, 0x5, 0x1, 0x7, 0x80000000, 0x80, 0x9, 0x0, 0xd1, 0x7f, 0x1, 0xc4c2, 0x0, 0x9, 0x9f, 0x400, 0x81, 0x7, 0xffff8001, 0x7, 0x2, 0x6, 0x81, 0x9ee, 0x2, 0xb0, 0x24, 0x7fff, 0xfffffff6, 0x4, 0x6f0ba78f, 0x0, 0x4, 0x3a6, 0x8, 0x8, 0x800, 0x6, 0x2, 0x1, 0x3, 0x4d6ec4b4, 0x6, 0xffff, 0x2, 0x8001, 0x8bd, 0x9, 0xffff0001, 0x5, 0x8, 0xa, 0x7ff, 0x2, 0xcd36, 0xe753, 0x9, 0x9, 0xfffffff3, 0x7, 0x2, 0x80000001, 0x5, 0x4, 0x1, 0x2, 0xd, 0x8001, 0x6, 0xfffffffc, 0x15c0, 0x6, 0x7030, 0x3, 0x5, 0x4, 0xdb, 0x8, 0x7fff, 0xb8, 0x5, 0x6, 0x200, 0x7, 0xa6b, 0xd, 0xb, 0xa5c, 0x5, 0x4, 0xd2, 0x182b, 0x2, 0xe287, 0x5, 0x765b, 0x19, 0x9, 0xd, 0x5, 0x2, 0x80000001, 0x4, 0x0, 0x4d, 0x8, 0x2, 0x0, 0x2, 0x10001, 0x4, 0x101, 0x9, 0x1, 0x5, 0x4d, 0x15, 0xb, 0x7, 0xffff, 0x4, 0x7fffffff, 0xa503, 0x1, 0x7, 0x0, 0x9, 0xffff, 0x9, 0xfffff02b, 0x3, 0x9, 0x2, 0x9, 0x3ff, 0x6, 0x0, 0x80000001, 0x9a480a7, 0xf, 0x0, 0x100, 0x2, 0x100, 0x4, 0xcf, 0x2, 0x3, 0x4, 0x9, 0x8, 0x8, 0x8, 0x8701, 0x4, 0x80000000, 0x800, 0x2b, 0x10000, 0x8001, 0x8, 0x1800000, 0x1, 0x59e259fe, 0x1ff, 0x0, 0x392, 0x0, 0x0, 0x61, 0x6, 0x7f, 0x4, 0x0, 0x31f, 0x80, 0x6, 0xc0000000, 0x44f, 0x7f, 0x3c26, 0x7, 0x0, 0x1, 0x3, 0x3, 0x3, 0x101, 0xe, 0x2, 0x2c, 0x1, 0x3, 0x1, 0x7, 0x0, 0x8, 0x8001, 0x9, 0x8, 0x6, 0xf, 0x28b0, 0xb9e, 0x8000, 0x3, 0x0, 0x6, 0x9, 0x9000000, 0x1, 0x7fffffff, 0x6, 0x2, 0x9, 0x10001, 0x0, 0x4, 0xfff, 0x8001, 0x2, 0x2, 0xa, 0xfffffffd, 0x80000001, 0x1ff, 0x5, 0x4, 0x7fff, 0xb, 0x1000, 0x3, 0x49a, 0x6, 0x4, 0x7, 0x7e2, 0x2, 0xffff7fff, 0xbff0, 0x3b, 0x5, 0x3b8, 0xbf2, 0x2, 0xd, 0x8, 0x8, 0x80, 0xc52, 0x2, 0x7, 0x3, 0x5, 0x8000, 0x8, 0x0, 0x80, 0x7, 0x0, 0x2, 0x4, 0xfffffff9, 0x8, 0xfffffffc, 0x2, 0x7fffffff, 0xffffffff, 0x2, 0x3, 0x9, 0x80, 0x9, 0xfffffffe, 0x7e19, 0xa411, 0x7ff, 0x7, 0x97, 0x5, 0x8, 0x4, 0x5ac5, 0x2, 0x37, 0x9, 0x485c, 0x2602b2a8, 0x1, 0x0, 0xffffffff, 0x1, 0x2, 0xe75f, 0x8fc, 0x1, 0x2, 0x0, 0xe, 0x4, 0x54, 0x6, 0x475d, 0x80f, 0xfffff7f0, 0x8, 0x1, 0x15f9, 0x19, 0x6, 0x8, 0xffffff81, 0x7, 0x4, 0x0, 0xf, 0x100, 0x5, 0x1, 0x9, 0x81, 0x6, 0x4, 0x1ff, 0xa, 0x8, 0x9, 0x4, 0xfffffffa, 0x4, 0x8, 0x9, 0x5, 0x5, 0x1c, 0x100, 0x10, 0x2, 0x40, 0x2, 0x5, 0x0, 0x8, 0x2, 0x80, 0x1, 0x7, 0xa3c, 0x1, 0x7, 0x7, 0x5, 0x9, 0x3ff, 0x6, 0x80000000, 0x5f0c, 0x4, 0x1, 0x8, 0x80, 0x5, 0x8, 0x4, 0x6, 0x9, 0x50, 0x2, 0x0, 0x4, 0x2, 0x1, 0xa, 0x7, 0x7, 0x69, 0x4, 0x1, 0x0, 0x9, 0x4, 0x9, 0x200, 0xfffffff7, 0x6, 0x6, 0xff, 0x9, 0x6, 0x7, 0xd6, 0x1, 0x6567, 0x6, 0x4, 0x7f, 0x7ff, 0x1, 0xdc3, 0xc, 0x2, 0xb, 0x3, 0x6, 0x2, 0x5, 0x423, 0x7, 0xffff, 0x7, 0x9, 0x7fffffff, 0x1, 0x3f, 0x2, 0x1, 0xa, 0x3, 0xfff, 0x4f7e8000, 0x7, 0xfffffffb, 0x8, 0x1, 0x9, 0x9, 0xffff, 0x5, 0x81f7, 0x82f9, 0x7, 0x0, 0x86, 0xf7, 0xdff, 0x7, 0x6, 0x100, 0x1, 0x4, 0xcb4, 0xe36c, 0x0, 0xfff, 0xfff, 0x4, 0x10, 0x3, 0x2, 0x80000000, 0xcaa33b8, 0x79e, 0x6, 0x10001, 0x8, 0x2, 0xffff, 0xa, 0x4, 0xe, 0x8, 0x8, 0xd, 0xffffff11, 0x2, 0x7, 0x2, 0x225, 0x4, 0x200, 0x7, 0x1, 0x8, 0x10001, 0x101, 0x7, 0x3bdd, 0x5, 0x3, 0x3, 0x8, 0x2, 0x3, 0xffffff81, 0x8, 0x987, 0x7f9, 0x7b2c, 0x7, 0xfffffffb, 0x9, 0xd37, 0xd, 0x1, 0xfffffc01, 0x3, 0x2, 0x3ff, 0x9, 0x7fff, 0x0, 0x5, 0xebc6, 0xf, 0xf, 0x7f, 0x5, 0x3, 0x7, 0x3, 0x4, 0x0, 0x6, 0x2, 0x6, 0x10, 0x2, 0x8000, 0xffffd947, 0xb1, 0x3, 0x10001, 0xfff, 0x0, 0x5, 0x7fffffff, 0x7, 0x8000, 0x6, 0x85, 0x9, 0x8, 0x4a, 0x10, 0xffffffff, 0xb, 0x8000, 0x2, 0xe, 0x0, 0x9, 0x23, 0xfffffffe, 0x0, 0x7, 0x3, 0xca5c, 0x200, 0x9, 0x4, 0xfffffff7, 0xd7, 0x4, 0x7fffffff, 0xf2, 0x401, 0x6, 0x7, 0xfff, 0x7, 0x401, 0x1, 0x431, 0xffff, 0x80000000, 0x200, 0x3, 0x9, 0x4000000, 0x5, 0x3, 0x5, 0x80, 0x6, 0x8000, 0x3, 0x4, 0xff, 0xdc8b, 0x5, 0x0, 0x6, 0x1, 0x1000, 0xc3bf, 0x9, 0x40, 0x0, 0x9, 0x5, 0x1, 0x10001, 0x4, 0xffffffb7, 0x3, 0x3, 0x2, 0x8001, 0x7, 0x8, 0x4d7, 0x4, 0x0, 0x4, 0xffffff8b, 0x5, 0x10, 0x2, 0x1, 0x5, 0x1, 0x83d6d08d, 0x100, 0x0, 0x8, 0x1, 0x5, 0x1, 0x52584580, 0x5, 0x80000001, 0x101, 0x2, 0x6, 0xb9, 0x9, 0x8, 0x4, 0xd9c1, 0x2, 0x37be, 0x40a, 0xc, 0x4, 0xbd, 0x7, 0x1ff, 0x5, 0x56e, 0x3, 0x8, 0x2, 0xfffffff8, 0x7, 0x5, 0x9, 0x7, 0x400, 0x4, 0x495d, 0xffffffb2, 0x4, 0x0, 0xe7, 0x3, 0x7fffffff, 0x5, 0x2, 0x1, 0x80, 0x800, 0x2, 0x5, 0x800, 0xffffffff, 0x0, 0xc362, 0x8, 0x5, 0x418d, 0xb5, 0x800, 0x5, 0x3, 0x8, 0x80000001, 0xdaf6, 0xde6, 0xb, 0x7, 0x1, 0x2, 0xfffffffd, 0xb08, 0x9, 0xcc85, 0x4e76, 0x500, 0x0, 0x1, 0x1, 0x8df, 0x2e940000, 0x5, 0x7, 0x1, 0x2, 0x4, 0x1, 0x6, 0x7f, 0xc, 0x7, 0x7, 0xeddb, 0xf4, 0xffffff80, 0x9, 0x4, 0x2, 0x8, 0x3870, 0xfffffffe, 0xa, 0x80000000, 0x1ff, 0x1ff, 0x1, 0x879, 0x7, 0x4, 0x5, 0x8, 0xffff, 0xffffff01, 0x2, 0x8000, 0x3, 0xfffffff2, 0x39b3, 0x4d0d, 0x3ee29b87, 0x1, 0x720, 0x7, 0x800, 0x4, 0x0, 0x9, 0x3, 0x1bb2ca6c, 0x8, 0x2d, 0x7, 0x733, 0x6, 0x100, 0x8, 0x400000, 0x1, 0x9, 0x7, 0xbb4, 0xc, 0x6, 0x6, 0x5, 0xda3, 0xffff, 0x3ff, 0x0, 0xb59, 0xfffffffb, 0x3, 0xff, 0x7, 0x5, 0x4, 0x39a77641, 0x3, 0x3, 0x8, 0xc272, 0xffff7fff, 0x81, 0x100, 0x1, 0xfffffffb, 0x40000000, 0x10000, 0x800, 0xfff, 0x4, 0x9, 0x1, 0xfffffffb, 0x14, 0x4, 0x10000, 0x9, 0x7, 0x0, 0x1, 0x6, 0xc, 0x101, 0xe0e, 0x80, 0x9, 0xffff, 0xc, 0x7, 0x5, 0xc, 0x3, 0x2, 0xffff, 0x974b, 0x24000000, 0x8000, 0x8, 0x0, 0x9, 0x0, 0x3, 0xfffffffa, 0xe445, 0x2, 0x6f2, 0x7fff, 0x6, 0xffffffff, 0x7fffffff, 0x6, 0x5, 0x6, 0x9, 0x6, 0x17, 0x6, 0x80000000, 0x7ff, 0x1, 0xffff, 0xfffffcbf, 0x3, 0x81, 0xe0000, 0x400, 0x0, 0x6, 0x101, 0x7fffffff, 0xd9, 0x0, 0x4, 0x4, 0x7, 0xfffffff7, 0x7, 0xffffe074, 0xfffff67d, 0x1, 0x8, 0x7ff, 0xffff, 0xde0, 0x7, 0xfffffff9, 0x2098febd, 0x100, 0x3eee, 0x4, 0x1000, 0x5, 0x9, 0x0, 0x40, 0x0, 0x7, 0x8, 0x8, 0x5, 0x8001, 0x5f7, 0x8, 0x401, 0x3, 0x4, 0x0, 0x6, 0x9, 0x7, 0xffffff44, 0x4592, 0xaa98, 0xeb4d, 0x7, 0x4, 0x5, 0x7923e95c, 0xd329, 0xfffff0fa, 0x8, 0x0, 0x4, 0x800, 0x7, 0x2, 0x2, 0x6, 0xea, 0xe, 0x60, 0x1ff, 0x769e, 0x93c, 0x0, 0x7, 0x6, 0x18, 0x9, 0x7, 0x2, 0x4, 0x4, 0x6, 0xf85, 0x9, 0xd4, 0x0, 0x0, 0x3, 0xfff, 0x8, 0x7, 0x6, 0xacd, 0x9, 0x3, 0x8, 0x80000000, 0x2, 0xffff, 0x8, 0xcb05, 0xf, 0xd0, 0x8a, 0x8, 0xdd, 0x3, 0x1, 0x4, 0x7, 0xffffffff, 0xfffffffd, 0x6, 0x9, 0x0, 0x9, 0x1, 0x400, 0x6, 0x80000000, 0x8, 0x0, 0xa, 0x56, 0x47, 0x80000000, 0xfffffff9, 0x0, 0xfffffc00, 0x8001, 0x9, 0x0, 0xffff, 0x7, 0x3, 0x7, 0xfffffffd, 0x3, 0x2, 0x6, 0x0, 0x3, 0x800, 0x7fff, 0x7b, 0xe051, 0x1, 0x0, 0xbbf, 0x3e1, 0x0, 0x5, 0x87a, 0x0, 0xe, 0x2ef, 0x6, 0x523, 0x8, 0x7fffffff, 0x2, 0xfffffffc, 0x55b, 0x4, 0x2883c9da, 0x80000001, 0x3, 0x6, 0x9, 0x9, 0x8, 0x4, 0x7fffffff, 0x3, 0x6, 0xa, 0x80000001, 0x38000, 0x100, 0x0, 0x7, 0x2da22290]}) r12 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000001e40), 0x200000, 0x0) getsockopt$inet6_mreq(r11, 0x29, 0x1c, &(0x7f0000001f00)={@mcast2, 0x0}, &(0x7f0000001f40)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000002080)={'gretap0\x00', &(0x7f0000001f80)={'tunl0\x00', r2, 0x40, 0x7, 0x1, 0xc12f, {{0x29, 0x4, 0x3, 0x11, 0xa4, 0x65, 0x0, 0x8, 0x2f, 0x0, @remote, @multicast2, {[@cipso={0x86, 0x4e, 0xffffffffffffffff, [{0x1, 0x3, "af"}, {0x0, 0x2}, {0x0, 0x7, "38eb6c8423"}, {0x2, 0xb, "67710c7a28b3d74940"}, {0x5, 0x12, "e1376b1ec0490d0fff771540a6905894"}, {0x2, 0xf, "75a24ebaec8593c03e9ab1d8d2"}, {0x6, 0x6, "0474c4ca"}, {0x1, 0x4, '\r='}, {0x6, 0x6, "c7a97243"}]}, @rr={0x7, 0x7, 0xaf, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x20, 0xbf, 0x0, 0x6, [0x4, 0x1, 0x0, 0xa, 0x2, 0x5, 0x72]}, @timestamp={0x44, 0x14, 0xae, 0x0, 0x6, [0xfffffffa, 0x80, 0xbe, 0x39]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000020c0)={'batadv_slave_1\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r12, &(0x7f0000002900)={&(0x7f0000001e80)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000028c0)={&(0x7f0000002100)={0x7ac, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xd}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r14}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x3, 0x0, 0x4, 0x9}, {0x4, 0x9, 0x0, 0x1}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r2}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xa05}}}]}}, {{0x8, 0x1, r2}, {0x1bc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x3, 0x9, 0x7, 0x8001}, {0x7, 0x9, 0xd, 0x3}, {0x9, 0xdf, 0x80, 0x10001}, {0x7, 0x9, 0x7}, {0x8, 0x3, 0xff, 0xcd1c}, {0x1, 0x6, 0x95, 0x9}, {0x4, 0x6, 0xa7, 0x9}, {0x9, 0x6}, {0x40, 0x8, 0x1, 0x5}]}}}]}}, {{0x8, 0x1, r2}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9a50}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r2}, {0x1fc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r15}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8a}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}]}, 0x7ac}, 0x1, 0x0, 0x0, 0x4}, 0x24004891) 19m39.083973581s ago: executing program 6 (id=8924): r0 = openat$full(0xffffff9c, &(0x7f0000000180), 0x201, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@timestamp, @timestamp, @sack_perm], 0x3) mq_notify(r0, &(0x7f0000000380)={0x0, 0x9, 0x2, @thr={&(0x7f0000000200)="fa2d4596e3ab84ab0a2f6770b3ea17f5343aabc8d95288c4d3ecda47ee3b5929dd339a8af98094a0857b6252d70d310b9ff9756f5912b9d1a153947951d9b51df5fee6074ef7023249a85b3f1d2f59d6a0a26d40d83a163a03b83c134af0dec2f5320e5442d706553157c79a9ef6f74bfbda7d6337e481854053fd67700b4b78a2b7fce37d21ecdfdf046c81a4b163fe74f11734142b288644b4220f", &(0x7f00000002c0)="2edee262bc4cf2953790f3c72c50becb5e3940abaf329f7a9feed22896bd5cb22de278668d1171303caaf3cf8577ed9d4b8a56f2de6b80cfe6d1db885786922549ee80b0e0b20253d2f6c7bdc37af7cc7c034c1b8bd351f16f8f91e90a4203eebb78f861eafc28b4cfbfd4a2c36393f7ebd87e4bc81c4bf9a55bbb2ab160ea410b8342e564cb63"}}) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000004c0)={0x2a, 0x4, 0x0, {0x2, 0x9, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) write$tcp_congestion(r0, &(0x7f0000000500)='lp\x00', 0x3) write$cgroup_int(r0, &(0x7f0000000580)=0x8001, 0x12) write$binfmt_elf64(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xb, 0xff, 0x0, 0x5, 0x100, 0x3, 0x3e, 0x6, 0x18d, 0x40, 0xac, 0x4, 0x101, 0x38, 0x2, 0xff, 0x1, 0x3}, [{0x7, 0x8, 0x4, 0x9f, 0x6a39c023, 0x5, 0x5, 0x5}, {0x4, 0x4, 0x8, 0x7, 0x72b8, 0x5, 0x2}], "72ad8aef3eb68daa33cc2bb56d9efba19e10d0cafb0543e03d14922518815f8e65a442f107e8c8600305e5a2aced4e54edc597a94e2c0cc45a56aef11f96ff6317ce26550f6d2b9dc20a2a815d8fb9a500de01d94e7de498855fb6de1a724d675d8475786d969d70f35e1839f049ad7986810497556bec64dd7a164ee4b9ed8c0907500f7e5e6df98474b7dcb9c60d42befa70d56b64b54be1645b3b4813c691fc778c4975c66f81e87de6927925c5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x75f) 19m39.082394941s ago: executing program 39 (id=8924): r0 = openat$full(0xffffff9c, &(0x7f0000000180), 0x201, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@timestamp, @timestamp, @sack_perm], 0x3) mq_notify(r0, &(0x7f0000000380)={0x0, 0x9, 0x2, @thr={&(0x7f0000000200)="fa2d4596e3ab84ab0a2f6770b3ea17f5343aabc8d95288c4d3ecda47ee3b5929dd339a8af98094a0857b6252d70d310b9ff9756f5912b9d1a153947951d9b51df5fee6074ef7023249a85b3f1d2f59d6a0a26d40d83a163a03b83c134af0dec2f5320e5442d706553157c79a9ef6f74bfbda7d6337e481854053fd67700b4b78a2b7fce37d21ecdfdf046c81a4b163fe74f11734142b288644b4220f", &(0x7f00000002c0)="2edee262bc4cf2953790f3c72c50becb5e3940abaf329f7a9feed22896bd5cb22de278668d1171303caaf3cf8577ed9d4b8a56f2de6b80cfe6d1db885786922549ee80b0e0b20253d2f6c7bdc37af7cc7c034c1b8bd351f16f8f91e90a4203eebb78f861eafc28b4cfbfd4a2c36393f7ebd87e4bc81c4bf9a55bbb2ab160ea410b8342e564cb63"}}) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000004c0)={0x2a, 0x4, 0x0, {0x2, 0x9, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) write$tcp_congestion(r0, &(0x7f0000000500)='lp\x00', 0x3) write$cgroup_int(r0, &(0x7f0000000580)=0x8001, 0x12) write$binfmt_elf64(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xb, 0xff, 0x0, 0x5, 0x100, 0x3, 0x3e, 0x6, 0x18d, 0x40, 0xac, 0x4, 0x101, 0x38, 0x2, 0xff, 0x1, 0x3}, [{0x7, 0x8, 0x4, 0x9f, 0x6a39c023, 0x5, 0x5, 0x5}, {0x4, 0x4, 0x8, 0x7, 0x72b8, 0x5, 0x2}], "72ad8aef3eb68daa33cc2bb56d9efba19e10d0cafb0543e03d14922518815f8e65a442f107e8c8600305e5a2aced4e54edc597a94e2c0cc45a56aef11f96ff6317ce26550f6d2b9dc20a2a815d8fb9a500de01d94e7de498855fb6de1a724d675d8475786d969d70f35e1839f049ad7986810497556bec64dd7a164ee4b9ed8c0907500f7e5e6df98474b7dcb9c60d42befa70d56b64b54be1645b3b4813c691fc778c4975c66f81e87de6927925c5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x75f) 13.647620327s ago: executing program 9 (id=11783): timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000008c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 9.640672604s ago: executing program 8 (id=11785): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) fgetxattr(r0, &(0x7f0000000540)=@known='security.selinux\x00', 0x0, 0x0) 9.459728693s ago: executing program 9 (id=11786): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8ab8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000500)="e0d6bb4ee2dbd89da573425576ea", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 8.145409191s ago: executing program 8 (id=11787): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v'], 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a2, &(0x7f0000000000)='bridge0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000010000d042abd70000000000200000000", @ANYRES32=r3, @ANYBLOB="60c000000c02040024001280110001006272696467655f736c617665000000000c0005800500200001"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4) syz_emit_ethernet(0x4e, &(0x7f0000002e40)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd607428dd00183afffe8000000000000000000100000000000000000000000000018900907800000000fe"], 0x0) 6.873736046s ago: executing program 9 (id=11788): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi3\x00', 0x2000, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000080)={'dt2801\x00', [0x2f00, 0x7, 0x1, 0xa, 0x12, 0x0, 0x1, 0x9, 0x1000, 0x1, 0x8, 0x1, 0x6, 0x4, 0x3, 0x6, 0xfffffffd, 0x9, 0x9, 0x1, 0x3ff, 0x10000, 0x800, 0xe2df, 0x3, 0x1, 0x4, 0x4, 0x7, 0x5, 0x5]}) 5.04501218s ago: executing program 8 (id=11789): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/comedi4\x00', 0x181001, 0x0) ioctl$COMEDI_INSNLIST(r0, 0x8010640b, &(0x7f0000000000)={0x1f, 0x0}) 4.225759322s ago: executing program 9 (id=11790): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x458, 0x5011, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x394}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00220508"], 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) close(0x3) syz_open_dev$hiddev(&(0x7f0000000140), 0x0, 0x20000) 3.158530818s ago: executing program 8 (id=11791): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0x801, 0x200, 0xfffffffc, {0x0, 0x0, 0x0, 0x0, 0x400de}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), r1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="78030000", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r4], 0x378}}, 0x0) 2.91382993s ago: executing program 9 (id=11792): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./cgroup/../file0/file0/file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100)=0x1, 0x12) 1.197007349s ago: executing program 8 (id=11793): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/comedi4\x00', 0x40000, 0x0) ioctl$COMEDI_INSNLIST(r0, 0x8010640b, &(0x7f00001859c0)={0xfdfd, &(0x7f0000185780)=[{0x4000000, 0x0, 0x0, 0x0, 0x3}]}) 657.459886ms ago: executing program 9 (id=11794): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi3\x00', 0x2000, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000140)={'8255\x00', [0xfffffffb, 0x2166, 0x2, 0x100000, 0x88d6, 0x8f, 0xfffffffd, 0x100010, 0x1000002, 0xffffffff, 0x200, 0x8, 0x6, 0x1, 0x7, 0x7, 0x9, 0x3, 0x3, 0x101, 0x100, 0x3, 0x80, 0x6, 0xb, 0x1, 0x5721, 0x7db, 0x8, 0x7]}) ioctl$COMEDI_BUFINFO(r0, 0xc02c640e, &(0x7f0000000000)={0x1, 0x80, 0x2, 0x1, 0x6, 0x800, 0x1}) 0s ago: executing program 8 (id=11795): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi3\x00', 0x2000, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000140)={'8255\x00', [0xfffffffb, 0x2166, 0x2, 0x100000, 0x88d6, 0x8f, 0xfffffffd, 0x100010, 0x1000002, 0xffffffff, 0x200, 0x8, 0x6, 0x1, 0x7, 0x7, 0x9, 0x3, 0x3, 0x101, 0x100, 0x3, 0x80, 0x6, 0xb, 0x1, 0x5721, 0x7db, 0x8, 0x7]}) kernel console output (not intermixed with test programs): 000003691.120:46753): avc: denied { ioctl } for pid=16334 comm="syz.9.11452" path="socket:[126540]" dev="sockfs" ino=126540 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4595.757766][ T31] audit: type=1400 audit(2000003691.140:46754): avc: denied { bind } for pid=16334 comm="syz.9.11452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4595.769194][ T31] audit: type=1400 audit(2000003691.150:46755): avc: denied { write } for pid=16334 comm="syz.9.11452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4595.777936][ T31] audit: type=1400 audit(2000003691.160:46756): avc: denied { read write } for pid=16335 comm="syz.8.11451" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4595.778361][ T31] audit: type=1400 audit(2000003691.160:46757): avc: denied { read write open } for pid=16335 comm="syz.8.11451" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4595.788041][ T31] audit: type=1400 audit(2000003691.170:46758): avc: denied { write } for pid=16334 comm="syz.9.11452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4595.793662][ T31] audit: type=1400 audit(2000003691.180:46759): avc: denied { write } for pid=16335 comm="syz.8.11451" name="nbd8" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4595.801083][ T31] audit: type=1400 audit(2000003691.180:46760): avc: denied { write open } for pid=16335 comm="syz.8.11451" path="/dev/nbd8" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4596.283440][ T31] audit: type=1400 audit(2000003691.670:46761): avc: denied { write } for pid=16334 comm="syz.9.11452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4600.735701][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 4600.736432][ T31] audit: type=1400 audit(2000003696.120:46794): avc: denied { write } for pid=16359 comm="syz.8.11461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4603.062168][ T31] audit: type=1400 audit(2000003698.440:46795): avc: denied { unmount } for pid=14856 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4603.583350][ T31] audit: type=1400 audit(2000003698.970:46796): avc: denied { create } for pid=16376 comm="syz.9.11467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4603.601460][ T31] audit: type=1400 audit(2000003698.980:46797): avc: denied { ioctl } for pid=16376 comm="syz.9.11467" path="socket:[126587]" dev="sockfs" ino=126587 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4603.613009][ T31] audit: type=1400 audit(2000003699.000:46798): avc: denied { bind } for pid=16376 comm="syz.9.11467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4603.647884][ T31] audit: type=1400 audit(2000003699.030:46799): avc: denied { write } for pid=16376 comm="syz.9.11467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4603.666457][ T31] audit: type=1400 audit(2000003699.050:46800): avc: denied { write } for pid=16376 comm="syz.9.11467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4604.146227][ T31] audit: type=1400 audit(2000003699.530:46801): avc: denied { read } for pid=16381 comm="syz.8.11469" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4604.152780][ T31] audit: type=1400 audit(2000003699.540:46802): avc: denied { read open } for pid=16381 comm="syz.8.11469" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4604.165477][ T31] audit: type=1400 audit(2000003699.550:46803): avc: denied { write } for pid=16376 comm="syz.9.11467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4604.179254][T16382] FAULT_INJECTION: forcing a failure. [ 4604.179254][T16382] name failslab, interval 1, probability 0, space 0, times 0 [ 4604.179570][T16382] CPU: 0 UID: 0 PID: 16382 Comm: syz.8.11469 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4604.179609][T16382] Hardware name: ARM-Versatile Express [ 4604.179623][T16382] Call trace: [ 4604.179683][T16382] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4604.179740][T16382] r7:00000d40 r6:00000000 r5:60000013 r4:8225c190 [ 4604.179750][T16382] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4604.179776][T16382] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4604.179802][T16382] r5:844dc800 r4:82919c40 [ 4604.179809][T16382] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4604.179838][T16382] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4604.179872][T16382] r8:844dc800 r7:00000d40 r6:860c0868 r5:0000001a r4:83001240 [ 4604.180006][T16382] [<805239a8>] (should_failslab) from [<805087a4>] (__kmalloc_noprof+0x9c/0x458) [ 4604.180095][T16382] [<80508708>] (__kmalloc_noprof) from [<807c1ee4>] (tomoyo_encode2+0x64/0xf0) [ 4604.180167][T16382] r10:00000fff r9:8309f800 r8:00000000 r7:850f4f68 r6:860c0868 r5:838c7ffd [ 4604.180315][T16382] r4:838c7fee [ 4604.180337][T16382] [<807c1e80>] (tomoyo_encode2) from [<807c1f94>] (tomoyo_encode+0x24/0x30) [ 4604.180384][T16382] r9:8309f800 r8:00000000 r7:850f4f68 r6:860c0868 r5:00001000 r4:838c7fef [ 4604.180410][T16382] [<807c1f70>] (tomoyo_encode) from [<807c2020>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4604.180671][T16382] r5:00001000 r4:838c7000 [ 4604.180685][T16382] [<807c1fa0>] (tomoyo_realpath_from_path) from [<807be120>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4604.180813][T16382] r10:844dc800 r9:00000000 r8:00000003 r7:80406409 r6:00000004 r5:81cd65f8 [ 4604.180905][T16382] r4:860c0868 r3:826c0200 [ 4604.181050][T16382] [<807be054>] (tomoyo_path_number_perm) from [<807c2a00>] (tomoyo_file_ioctl+0x1c/0x20) [ 4604.181121][T16382] r9:860c0840 r8:00000003 r7:00000000 r6:00000000 r5:80406409 r4:860c0840 [ 4604.181141][T16382] [<807c29e4>] (tomoyo_file_ioctl) from [<8076f984>] (security_file_ioctl+0x64/0x1e4) [ 4604.181186][T16382] [<8076f920>] (security_file_ioctl) from [<8056f088>] (sys_ioctl+0x4c/0xdc8) [ 4604.181235][T16382] r7:00000000 r6:860c0841 r5:00000000 r4:80406409 [ 4604.181249][T16382] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4604.181286][T16382] Exception stack(0xec44dfa8 to 0xec44dff0) [ 4604.181323][T16382] dfa0: 00000000 00000000 00000003 80406409 00000000 00000000 [ 4604.181350][T16382] dfc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b950bc [ 4604.181371][T16382] dfe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4604.181399][T16382] r10:00000036 r9:844dc800 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4604.181417][T16382] r4:00000000 [ 4604.186029][T16382] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4605.803442][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 4605.803923][ T31] audit: type=1400 audit(2000003701.190:46807): avc: denied { read } for pid=16387 comm="syz.8.11471" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4605.809533][ T31] audit: type=1400 audit(2000003701.190:46808): avc: denied { read open } for pid=16387 comm="syz.8.11471" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4605.824710][ T31] audit: type=1400 audit(2000003701.210:46809): avc: denied { create } for pid=16387 comm="syz.8.11471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4605.832596][ T31] audit: type=1400 audit(2000003701.220:46810): avc: denied { ioctl } for pid=16387 comm="syz.8.11471" path="socket:[126606]" dev="sockfs" ino=126606 ioctlcmd=0x9432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4605.839289][ T31] audit: type=1400 audit(2000003701.220:46811): avc: denied { ioctl } for pid=16387 comm="syz.8.11471" path="socket:[126606]" dev="sockfs" ino=126606 ioctlcmd=0x6409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4605.977977][ T31] audit: type=1400 audit(2000003701.360:46812): avc: denied { read } for pid=16389 comm="syz.9.11472" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4605.983483][ T31] audit: type=1400 audit(2000003701.370:46813): avc: denied { read open } for pid=16389 comm="syz.9.11472" path="net:[4026532656]" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4605.990229][ T31] audit: type=1400 audit(2000003701.370:46814): avc: denied { create } for pid=16389 comm="syz.9.11472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4606.166659][ T31] audit: type=1400 audit(2000003701.550:46815): avc: denied { create } for pid=16391 comm="syz.8.11473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4606.498478][ T31] audit: type=1400 audit(2000003701.880:46816): avc: denied { create } for pid=16395 comm="syz.9.11476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4609.373448][T16415] FAULT_INJECTION: forcing a failure. [ 4609.373448][T16415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4609.375143][T16415] CPU: 1 UID: 0 PID: 16415 Comm: syz.8.11482 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4609.375239][T16415] Hardware name: ARM-Versatile Express [ 4609.375259][T16415] Call trace: [ 4609.375295][T16415] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4609.375392][T16415] r7:20000140 r6:00000000 r5:60000013 r4:8225c190 [ 4609.375407][T16415] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4609.375450][T16415] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4609.375496][T16415] r5:844da400 r4:82950690 [ 4609.375508][T16415] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4609.375554][T16415] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4609.375601][T16415] r8:8020029c r7:20000140 r6:ec801ef4 r5:00000010 r4:00000010 [ 4609.375615][T16415] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4609.375651][T16415] [<8096bf58>] (should_fail_usercopy) from [<81531fec>] (move_addr_to_kernel+0x34/0xf8) [ 4609.375709][T16415] [<81531fb8>] (move_addr_to_kernel) from [<815331bc>] (__sys_connect+0x5c/0xc8) [ 4609.375759][T16415] r7:20000140 r6:00000010 r5:860c0901 r4:00000003 [ 4609.375772][T16415] [<81533160>] (__sys_connect) from [<81533238>] (sys_connect+0x10/0x14) [ 4609.375822][T16415] r7:0000011b r6:0012fef0 r5:00000000 r4:00000000 [ 4609.375836][T16415] [<81533228>] (sys_connect) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4609.375873][T16415] Exception stack(0xec801fa8 to 0xec801ff0) [ 4609.375905][T16415] 1fa0: 00000000 00000000 00000003 20000140 00000010 00000000 [ 4609.375936][T16415] 1fc0: 00000000 00000000 0012fef0 0000011b 002e0000 00000000 00006364 76b950bc [ 4609.375958][T16415] 1fe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4610.718047][T16436] FAULT_INJECTION: forcing a failure. [ 4610.718047][T16436] name failslab, interval 1, probability 0, space 0, times 0 [ 4610.719779][T16436] CPU: 1 UID: 0 PID: 16436 Comm: syz.8.11489 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4610.719882][T16436] Hardware name: ARM-Versatile Express [ 4610.719906][T16436] Call trace: [ 4610.719959][T16436] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4610.720057][T16436] r7:00404dc0 r6:00000000 r5:60000013 r4:8225c190 [ 4610.720079][T16436] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4610.720127][T16436] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4610.720178][T16436] r5:855e3c00 r4:82919c40 [ 4610.720195][T16436] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4610.720279][T16436] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4610.720348][T16436] r8:00404dc0 r7:00404dc0 r6:00000000 r5:830023c0 r4:0000074c [ 4610.720368][T16436] [<805239a8>] (should_failslab) from [<80506f84>] (__kvmalloc_node_noprof+0xe4/0x5a0) [ 4610.720423][T16436] [<80506ea0>] (__kvmalloc_node_noprof) from [<815609b8>] (alloc_netdev_mqs+0x64/0x4ec) [ 4610.720542][T16436] r10:855e3c00 r9:0000008c r8:81908ec8 r7:ec7bde84 r6:0000074c r5:00000001 [ 4610.720565][T16436] r4:00000000 [ 4610.720614][T16436] [<81560954>] (alloc_netdev_mqs) from [<81907448>] (vlan_ioctl_handler+0x3a8/0x4a0) [ 4610.720687][T16436] r10:855e3c00 r9:00000001 r8:84efb000 r7:856f0000 r6:00000001 r5:00000001 [ 4610.720707][T16436] r4:00000000 [ 4610.720724][T16436] [<819070a0>] (vlan_ioctl_handler) from [<81532330>] (sock_ioctl+0x1f8/0x600) [ 4610.720788][T16436] r9:860c0840 r8:00000005 r7:850b4a00 r6:856f0000 r5:20000040 r4:82c1c750 [ 4610.720807][T16436] [<81532138>] (sock_ioctl) from [<8056f16c>] (sys_ioctl+0x130/0xdc8) [ 4610.720871][T16436] r9:860c0840 r8:00000005 r7:20000040 r6:860c0841 r5:00000000 r4:00008982 [ 4610.720939][T16436] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4610.720989][T16436] Exception stack(0xec7bdfa8 to 0xec7bdff0) [ 4610.721022][T16436] dfa0: 00000000 00000000 00000005 00008982 20000040 00000000 [ 4610.721054][T16436] dfc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b950bc [ 4610.721082][T16436] dfe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4610.721113][T16436] r10:00000036 r9:855e3c00 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4610.721132][T16436] r4:00000000 [ 4610.875018][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 4610.875358][ T31] audit: type=1400 audit(2000003706.260:46878): avc: denied { write } for pid=16428 comm="syz.9.11488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4611.046923][ T31] audit: type=1400 audit(2000003706.430:46879): avc: denied { create } for pid=16438 comm="syz.8.11490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4611.365250][ T31] audit: type=1400 audit(2000003706.740:46880): avc: denied { read } for pid=16428 comm="syz.9.11488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4611.378992][ T31] audit: type=1400 audit(2000003706.760:46881): avc: denied { write } for pid=16428 comm="syz.9.11488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4611.587904][ T31] audit: type=1400 audit(2000003706.970:46882): avc: denied { create } for pid=16443 comm="syz.8.11492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4611.606012][ T31] audit: type=1400 audit(2000003706.990:46883): avc: denied { bind } for pid=16443 comm="syz.8.11492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4611.613941][ T31] audit: type=1400 audit(2000003707.000:46884): avc: denied { accept } for pid=16443 comm="syz.8.11492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4611.629298][T16444] FAULT_INJECTION: forcing a failure. [ 4611.629298][T16444] name failslab, interval 1, probability 0, space 0, times 0 [ 4611.635107][T16444] CPU: 1 UID: 0 PID: 16444 Comm: syz.8.11492 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4611.635246][T16444] Hardware name: ARM-Versatile Express [ 4611.635277][T16444] Call trace: [ 4611.635322][T16444] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4611.635439][T16444] r7:8448b000 r6:00000000 r5:60000013 r4:8225c190 [ 4611.635462][T16444] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4611.635512][T16444] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4611.635566][T16444] r5:8448b000 r4:82919c40 [ 4611.635583][T16444] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4611.635641][T16444] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4611.635711][T16444] r8:00000000 r7:8448b000 r6:00000d40 r5:850b4300 r4:830a8600 [ 4611.635731][T16444] [<805239a8>] (should_failslab) from [<80508420>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 4611.635786][T16444] [<805083d4>] (kmem_cache_alloc_noprof) from [<80779344>] (security_inode_alloc+0x30/0x1e8) [ 4611.635857][T16444] r10:850b4408 r9:00000000 r8:00000000 r7:00000c40 r6:8309f800 r5:850b4300 [ 4611.635875][T16444] r4:850b4300 [ 4611.635891][T16444] [<80779314>] (security_inode_alloc) from [<80578c24>] (inode_init_always_gfp+0x188/0x1dc) [ 4611.635956][T16444] r5:00000000 r4:850b4300 [ 4611.635974][T16444] [<80578a9c>] (inode_init_always_gfp) from [<8057c298>] (alloc_inode+0x40/0xcc) [ 4611.636040][T16444] r10:0000016e r9:860c09c0 r8:00000000 r7:00000000 r6:81e540c0 r5:8309f800 [ 4611.636060][T16444] r4:850b4300 r3:00000000 [ 4611.636076][T16444] [<8057c258>] (alloc_inode) from [<8152fdbc>] (sock_alloc+0x20/0x70) [ 4611.636141][T16444] r7:00000000 r6:ec931f5c r5:00080000 r4:850b4000 [ 4611.636158][T16444] [<8152fd9c>] (sock_alloc) from [<81532eb8>] (do_accept+0x64/0x174) [ 4611.636211][T16444] r5:00080000 r4:850b4000 [ 4611.636228][T16444] [<81532e54>] (do_accept) from [<81533050>] (__sys_accept4+0x88/0xf4) [ 4611.636328][T16444] r10:0000016e r9:860c09c0 r8:00000000 r7:00000000 r6:00000006 r5:00080000 [ 4611.636349][T16444] r4:860c09c1 [ 4611.636364][T16444] [<81532fc8>] (__sys_accept4) from [<815330cc>] (sys_accept4+0x10/0x14) [ 4611.636417][T16444] r9:8448b000 r8:8020029c r7:0000016e r6:0012fef0 r5:00000000 r4:00000000 [ 4611.636439][T16444] [<815330bc>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4611.636484][T16444] Exception stack(0xec931fa8 to 0xec931ff0) [ 4611.636523][T16444] 1fa0: 00000000 00000000 00000004 00000000 00000000 00080000 [ 4611.636551][T16444] 1fc0: 00000000 00000000 0012fef0 0000016e 002e0000 00000000 00006364 76b950bc [ 4611.636574][T16444] 1fe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4612.358902][ T31] audit: type=1400 audit(2000003707.740:46885): avc: denied { create } for pid=16447 comm="syz.8.11494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4612.375761][ T31] audit: type=1400 audit(2000003707.760:46886): avc: denied { prog_load } for pid=16447 comm="syz.8.11494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4612.384066][ T31] audit: type=1400 audit(2000003707.770:46887): avc: denied { bpf } for pid=16447 comm="syz.8.11494" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4616.013686][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 4616.014059][ T31] audit: type=1400 audit(2000003711.390:46949): avc: denied { unmount } for pid=15743 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4616.093217][ T31] audit: type=1400 audit(2000003711.470:46950): avc: denied { write } for pid=16480 comm="syz.9.11508" name="dev" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4616.097613][ T31] audit: type=1400 audit(2000003711.480:46951): avc: denied { write } for pid=16480 comm="syz.9.11508" path="/proc/339/net/dev" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4616.343086][ T31] audit: type=1400 audit(2000003711.730:46952): avc: denied { create } for pid=16483 comm="syz.8.11509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4616.351873][ T31] audit: type=1400 audit(2000003711.730:46953): avc: denied { write } for pid=16483 comm="syz.8.11509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4616.356615][ T31] audit: type=1400 audit(2000003711.740:46954): avc: denied { setopt } for pid=16483 comm="syz.8.11509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4616.364377][ T31] audit: type=1400 audit(2000003711.750:46955): avc: granted { setsecparam } for pid=16484 comm="syz.9.11510" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 4616.394783][ T31] audit: type=1400 audit(2000003711.770:46956): avc: denied { create } for pid=16484 comm="syz.9.11510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4616.404192][ T31] audit: type=1400 audit(2000003711.790:46957): avc: denied { write } for pid=16484 comm="syz.9.11510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4616.427877][ T31] audit: type=1400 audit(2000003711.810:46958): avc: denied { write } for pid=16484 comm="syz.9.11510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4617.054290][T16492] FAULT_INJECTION: forcing a failure. [ 4617.054290][T16492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4617.056211][T16492] CPU: 0 UID: 0 PID: 16492 Comm: syz.9.11513 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4617.056390][T16492] Hardware name: ARM-Versatile Express [ 4617.056418][T16492] Call trace: [ 4617.056460][T16492] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4617.056572][T16492] r7:00000003 r6:00000000 r5:60000013 r4:8225c190 [ 4617.056592][T16492] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4617.056645][T16492] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4617.056699][T16492] r5:855e0c00 r4:82950690 [ 4617.056715][T16492] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4617.056769][T16492] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4617.056824][T16492] r8:00000003 r7:00000003 r6:20000800 r5:85fcab40 r4:83c19c58 [ 4617.056841][T16492] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4617.056885][T16492] [<8096bf58>] (should_fail_usercopy) from [<8056d5ac>] (do_fcntl+0x210/0x860) [ 4617.056949][T16492] [<8056d39c>] (do_fcntl) from [<8056dc6c>] (sys_fcntl+0x70/0xd0) [ 4617.057008][T16492] r8:00000003 r7:20000800 r6:0000040c r5:00000000 r4:85fcab41 [ 4617.057027][T16492] [<8056dbfc>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4617.057072][T16492] Exception stack(0xece59fa8 to 0xece59ff0) [ 4617.057108][T16492] 9fa0: 00000000 00000000 00000003 0000040c 20000800 00000000 [ 4617.057140][T16492] 9fc0: 00000000 00000000 0012fef0 00000037 002e0000 00000000 00006364 76b9c0bc [ 4617.057166][T16492] 9fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4617.057199][T16492] r9:855e0c00 r8:8020029c r7:00000037 r6:0012fef0 r5:00000000 r4:00000000 [ 4622.520405][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 4622.522339][ T31] audit: type=1400 audit(2000003717.900:47003): avc: denied { create } for pid=16522 comm="syz.9.11524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4622.551899][ T31] audit: type=1400 audit(2000003717.930:47004): avc: denied { bind } for pid=16522 comm="syz.9.11524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4622.584687][ T31] audit: type=1400 audit(2000003717.970:47005): avc: denied { accept } for pid=16522 comm="syz.9.11524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4622.704302][ T31] audit: type=1400 audit(2000003718.090:47006): avc: denied { write } for pid=16524 comm="syz.8.11525" name="dev" dev="proc" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4622.708616][ T31] audit: type=1400 audit(2000003718.090:47007): avc: denied { write } for pid=16524 comm="syz.8.11525" path="/proc/150/net/dev" dev="proc" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4623.033904][ T31] audit: type=1400 audit(2000003718.420:47008): avc: denied { read write } for pid=16526 comm="syz.8.11526" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4623.039621][ T31] audit: type=1400 audit(2000003718.420:47009): avc: denied { read write open } for pid=16526 comm="syz.8.11526" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4623.069370][ T31] audit: type=1400 audit(2000003718.450:47010): avc: denied { mounton } for pid=16526 comm="syz.8.11526" path="/56/file0" dev="tmpfs" ino=310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4623.089993][ T31] audit: type=1400 audit(2000003718.470:47011): avc: denied { mount } for pid=16526 comm="syz.8.11526" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4623.169863][ T31] audit: type=1400 audit(2000003718.550:47012): avc: denied { create } for pid=16522 comm="syz.9.11524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4625.268607][T16533] FAULT_INJECTION: forcing a failure. [ 4625.268607][T16533] name failslab, interval 1, probability 0, space 0, times 0 [ 4625.270213][T16533] CPU: 1 UID: 0 PID: 16533 Comm: syz.9.11527 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4625.270321][T16533] Hardware name: ARM-Versatile Express [ 4625.270349][T16533] Call trace: [ 4625.270397][T16533] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4625.270511][T16533] r7:00000c40 r6:00000000 r5:60000013 r4:8225c190 [ 4625.270727][T16533] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4625.270863][T16533] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4625.271041][T16533] r5:844dc800 r4:82919c40 [ 4625.271059][T16533] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4625.271115][T16533] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4625.271184][T16533] r8:844dc800 r7:00000c40 r6:860c0f28 r5:00001000 r4:830016c0 [ 4625.271204][T16533] [<805239a8>] (should_failslab) from [<805087a4>] (__kmalloc_noprof+0x9c/0x458) [ 4625.271255][T16533] [<80508708>] (__kmalloc_noprof) from [<807c1fdc>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4625.271324][T16533] r10:844dc800 r9:8309e400 r8:00000000 r7:83412330 r6:860c0f28 r5:00001000 [ 4625.271344][T16533] r4:00000000 [ 4625.271359][T16533] [<807c1fa0>] (tomoyo_realpath_from_path) from [<807be120>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4625.271418][T16533] r10:844dc800 r9:00000000 r8:00000003 r7:0000541b r6:00000004 r5:81cd65f8 [ 4625.271442][T16533] r4:860c0f28 r3:826c0200 [ 4625.271458][T16533] [<807be054>] (tomoyo_path_number_perm) from [<807c2a00>] (tomoyo_file_ioctl+0x1c/0x20) [ 4625.271515][T16533] r9:860c0f00 r8:00000003 r7:20000200 r6:20000200 r5:0000541b r4:860c0f00 [ 4625.271535][T16533] [<807c29e4>] (tomoyo_file_ioctl) from [<8076f984>] (security_file_ioctl+0x64/0x1e4) [ 4625.271586][T16533] [<8076f920>] (security_file_ioctl) from [<8056f088>] (sys_ioctl+0x4c/0xdc8) [ 4625.271645][T16533] r7:20000200 r6:860c0f01 r5:00000000 r4:0000541b [ 4625.271662][T16533] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4625.271711][T16533] Exception stack(0xed075fa8 to 0xed075ff0) [ 4625.271758][T16533] 5fa0: 00000000 00000000 00000003 0000541b 20000200 00000000 [ 4625.271788][T16533] 5fc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b9c0bc [ 4625.271814][T16533] 5fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4625.271844][T16533] r10:00000036 r9:844dc800 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4625.271863][T16533] r4:00000000 [ 4625.299867][T16533] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4625.984748][T16540] FAULT_INJECTION: forcing a failure. [ 4625.984748][T16540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 4625.985876][T16540] CPU: 1 UID: 0 PID: 16540 Comm: syz.8.11530 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4625.985944][T16540] Hardware name: ARM-Versatile Express [ 4625.985957][T16540] Call trace: [ 4625.985977][T16540] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4625.986032][T16540] r7:00000000 r6:00000000 r5:60000013 r4:8225c190 [ 4625.986041][T16540] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4625.986066][T16540] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4625.986091][T16540] r5:844da400 r4:82919c94 [ 4625.986099][T16540] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4625.986124][T16540] [<8096bd18>] (should_fail_ex) from [<80523aa4>] (should_fail_alloc_page+0x68/0x74) [ 4625.986156][T16540] r8:00000001 r7:00000000 r6:00000000 r5:00140cc2 r4:ece59a08 [ 4625.986164][T16540] [<80523a3c>] (should_fail_alloc_page) from [<804f22cc>] (prepare_alloc_pages.constprop.0+0x94/0x1b4) [ 4625.986190][T16540] [<804f2238>] (prepare_alloc_pages.constprop.0) from [<804fa630>] (__alloc_frozen_pages_noprof+0xac/0x10d8) [ 4625.986221][T16540] r10:ece59ba8 r9:00000000 r8:844da400 r7:00000000 r6:00140cc2 r5:00000002 [ 4625.986231][T16540] r4:00000000 r3:ece59a08 [ 4625.986239][T16540] [<804fa584>] (__alloc_frozen_pages_noprof) from [<804fb6d0>] (__folio_alloc_noprof+0x14/0x6c) [ 4625.986271][T16540] r10:ece59ba8 r9:84c3da00 r8:85d80e00 r7:00000000 r6:0000000b r5:00000002 [ 4625.986279][T16540] r4:85d1ca58 [ 4625.986287][T16540] [<804fb6bc>] (__folio_alloc_noprof) from [<8049d878>] (shmem_get_folio_gfp.constprop.0+0x21c/0x864) [ 4625.986315][T16540] r5:00000002 r4:85d1ca58 [ 4625.986324][T16540] [<8049d65c>] (shmem_get_folio_gfp.constprop.0) from [<8049dff0>] (shmem_fault+0x80/0x35c) [ 4625.986352][T16540] r10:00000000 r9:85d80e00 r8:844da400 r7:00100cca r6:00000000 r5:85d1ca58 [ 4625.986361][T16540] r4:ece59ba8 [ 4625.986367][T16540] [<8049df70>] (shmem_fault) from [<804c57e8>] (__do_fault+0x44/0xfc) [ 4625.986429][T16540] r10:00000000 r9:85d80e00 r8:84c3da00 r7:00000000 r6:2000b000 r5:85d80e00 [ 4625.986453][T16540] r4:ece59ba8 [ 4625.986465][T16540] [<804c57a4>] (__do_fault) from [<804cc020>] (handle_mm_fault+0xa08/0x14d8) [ 4625.986499][T16540] r7:00000000 r6:2000b000 r5:844da400 r4:00000015 [ 4625.986508][T16540] [<804cb618>] (handle_mm_fault) from [<804be920>] (__get_user_pages+0x24c/0x6c4) [ 4625.986538][T16540] r10:00000000 r9:2000b000 r8:844da400 r7:00000000 r6:00000015 r5:85d80e00 [ 4625.986547][T16540] r4:00290101 [ 4625.986554][T16540] [<804be6d4>] (__get_user_pages) from [<804bfcc4>] (__gup_longterm_locked+0x2e0/0x990) [ 4625.986584][T16540] r10:ece59d74 r9:00290101 r8:84c3da00 r7:84c3da84 r6:2000b000 r5:85b66028 [ 4625.986592][T16540] r4:84c3da84 [ 4625.986599][T16540] [<804bf9e4>] (__gup_longterm_locked) from [<804c08a4>] (gup_fast_fallback+0x530/0x810) [ 4625.986629][T16540] r10:20001000 r9:00000000 r8:00000441 r7:844da400 r6:ffedc008 r5:ffedc008 [ 4625.986637][T16540] r4:20001000 [ 4625.986645][T16540] [<804c0374>] (gup_fast_fallback) from [<804c0c98>] (pin_user_pages_fast+0x50/0x60) [ 4625.986673][T16540] r10:85910800 r9:00000000 r8:ece59ea4 r7:85b66000 r6:00000441 r5:20001700 [ 4625.986746][T16540] r4:85b66000 [ 4625.986758][T16540] [<804c0c48>] (pin_user_pages_fast) from [<808a068c>] (io_pin_pages+0x68/0x124) [ 4625.986788][T16540] r6:ece59e2c r5:00000441 r4:20001700 [ 4625.986796][T16540] [<808a0624>] (io_pin_pages) from [<808911e8>] (io_sqe_buffer_register+0x78/0x6a0) [ 4625.986826][T16540] r7:fffff000 r6:20001700 r5:00000000 r4:00000000 [ 4625.986833][T16540] [<80891170>] (io_sqe_buffer_register) from [<80891d64>] (io_sqe_buffers_register+0x1d4/0x258) [ 4625.986864][T16540] r10:ece59ea4 r9:00000000 r8:ece59e9c r7:fffff000 r6:200002c8 r5:00000000 [ 4625.986873][T16540] r4:85910800 [ 4625.986880][T16540] [<80891b90>] (io_sqe_buffers_register) from [<8089f644>] (sys_io_uring_register+0x368/0x11b0) [ 4625.986909][T16540] r10:844da400 r9:0000011a r8:200002c0 r7:000001ab r6:00000000 r5:860c0c00 [ 4625.986918][T16540] r4:85910800 [ 4625.986925][T16540] [<8089f2dc>] (sys_io_uring_register) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4625.986951][T16540] Exception stack(0xece59fa8 to 0xece59ff0) [ 4625.986969][T16540] 9fa0: 00000000 00000000 00000003 00000000 200002c0 0000011a [ 4625.986985][T16540] 9fc0: 00000000 00000000 0012fef0 000001ab 002e0000 00000000 00006364 76b950bc [ 4625.986997][T16540] 9fe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4625.987013][T16540] r10:000001ab r9:844da400 r8:8020029c r7:000001ab r6:0012fef0 r5:00000000 [ 4625.987021][T16540] r4:00000000 [ 4627.709125][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 4627.709516][ T31] audit: type=1400 audit(2000003723.090:47050): avc: denied { create } for pid=16554 comm="syz.9.11536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4627.734114][ T31] audit: type=1400 audit(2000003723.120:47051): avc: denied { bind } for pid=16554 comm="syz.9.11536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4627.749197][ T31] audit: type=1400 audit(2000003723.130:47052): avc: denied { module_request } for pid=16554 comm="syz.9.11536" kmod="crypto-ctr(sm4)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4627.874878][ T31] audit: type=1400 audit(2000003723.260:47053): avc: denied { create } for pid=16550 comm="syz.8.11535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4627.901468][ T31] audit: type=1400 audit(2000003723.280:47054): avc: denied { write } for pid=16550 comm="syz.8.11535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4627.905626][ T31] audit: type=1400 audit(2000003723.290:47055): avc: denied { read } for pid=16550 comm="syz.8.11535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4627.920090][ T31] audit: type=1400 audit(2000003723.300:47056): avc: denied { read } for pid=16550 comm="syz.8.11535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4628.065228][ T31] audit: type=1400 audit(2000003723.450:47057): avc: denied { module_request } for pid=16554 comm="syz.9.11536" kmod="crypto-ctr(sm4)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4628.245157][ T31] audit: type=1400 audit(2000003723.630:47058): avc: denied { setopt } for pid=16554 comm="syz.9.11536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4628.261749][ T31] audit: type=1400 audit(2000003723.640:47059): avc: denied { read } for pid=16554 comm="syz.9.11536" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4630.098386][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.105239][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4630.143870][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.146448][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4630.182682][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.186918][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4630.217075][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.218043][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4630.254241][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.257734][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4630.781080][T16568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4630.782618][T16568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4632.883828][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4632.885097][ T31] audit: type=1400 audit(2000003728.270:47118): avc: denied { allowed } for pid=16595 comm="syz.8.11545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4632.906126][ T31] audit: type=1400 audit(2000003728.290:47119): avc: denied { create } for pid=16595 comm="syz.8.11545" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4632.925110][ T31] audit: type=1400 audit(2000003728.310:47120): avc: denied { read } for pid=16595 comm="syz.8.11545" name="admmidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4632.934436][ T31] audit: type=1400 audit(2000003728.320:47121): avc: denied { read open } for pid=16595 comm="syz.8.11545" path="/dev/admmidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4633.443527][ T31] audit: type=1400 audit(2000003728.830:47122): avc: denied { read write } for pid=16597 comm="syz.9.11546" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4633.449480][ T31] audit: type=1400 audit(2000003728.830:47123): avc: denied { read write open } for pid=16597 comm="syz.9.11546" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4633.472452][ T31] audit: type=1400 audit(2000003728.850:47124): avc: denied { mounton } for pid=16597 comm="syz.9.11546" path="/160/file0" dev="tmpfs" ino=872 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4633.489171][ T31] audit: type=1400 audit(2000003728.870:47125): avc: denied { mount } for pid=16597 comm="syz.9.11546" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4633.505852][ T31] audit: type=1400 audit(2000003728.890:47126): avc: denied { read write } for pid=16595 comm="syz.8.11545" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4633.517259][ T31] audit: type=1400 audit(2000003728.900:47127): avc: denied { read write open } for pid=16595 comm="syz.8.11545" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4633.538081][T16599] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4633.541365][T16599] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4634.494182][T16604] netlink: 12 bytes leftover after parsing attributes in process `syz.8.11547'. [ 4638.048713][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 4638.053793][ T31] audit: type=1400 audit(2000003733.430:47206): avc: denied { read append } for pid=16630 comm="syz.9.11555" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4638.058369][ T31] audit: type=1400 audit(2000003733.430:47207): avc: denied { read open } for pid=16630 comm="syz.9.11555" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4638.068226][ T31] audit: type=1400 audit(2000003733.450:47208): avc: denied { ioctl } for pid=16630 comm="syz.9.11555" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0x620f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4638.448624][ T31] audit: type=1400 audit(2000003733.830:47209): avc: denied { create } for pid=16632 comm="syz.9.11556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4638.460020][ T31] audit: type=1400 audit(2000003733.840:47210): avc: denied { write } for pid=16632 comm="syz.9.11556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4638.471386][ T31] audit: type=1400 audit(2000003733.850:47211): avc: denied { module_request } for pid=16632 comm="syz.9.11556" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4638.755700][ T31] audit: type=1400 audit(2000003734.140:47212): avc: denied { read } for pid=16632 comm="syz.9.11556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4638.797728][ T31] audit: type=1400 audit(2000003734.180:47213): avc: denied { prog_load } for pid=16632 comm="syz.9.11556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4638.800160][ T31] audit: type=1400 audit(2000003734.180:47214): avc: denied { bpf } for pid=16632 comm="syz.9.11556" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4638.972694][ T31] audit: type=1400 audit(2000003734.360:47215): avc: denied { read write } for pid=16638 comm="syz.8.11557" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4641.295595][T16651] FAULT_INJECTION: forcing a failure. [ 4641.295595][T16651] name failslab, interval 1, probability 0, space 0, times 0 [ 4641.296818][T16651] CPU: 1 UID: 0 PID: 16651 Comm: syz.8.11562 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4641.296929][T16651] Hardware name: ARM-Versatile Express [ 4641.296954][T16651] Call trace: [ 4641.296993][T16651] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4641.297100][T16651] r7:00000c40 r6:00000000 r5:60000013 r4:8225c190 [ 4641.297145][T16651] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4641.297198][T16651] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4641.297251][T16651] r5:844de000 r4:82919c40 [ 4641.297268][T16651] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4641.297321][T16651] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4641.297384][T16651] r8:844de000 r7:00000c40 r6:84720628 r5:00001000 r4:830016c0 [ 4641.297402][T16651] [<805239a8>] (should_failslab) from [<805087a4>] (__kmalloc_noprof+0x9c/0x458) [ 4641.297481][T16651] [<80508708>] (__kmalloc_noprof) from [<807c1fdc>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4641.297551][T16651] r10:844de000 r9:8309f800 r8:00000000 r7:85197f68 r6:84720628 r5:00001000 [ 4641.297572][T16651] r4:00000000 [ 4641.297589][T16651] [<807c1fa0>] (tomoyo_realpath_from_path) from [<807be120>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4641.297742][T16651] r10:844de000 r9:00000000 r8:00000003 r7:00003ba0 r6:00000004 r5:81cd65f8 [ 4641.297772][T16651] r4:84720628 r3:826c0200 [ 4641.297788][T16651] [<807be054>] (tomoyo_path_number_perm) from [<807c2a00>] (tomoyo_file_ioctl+0x1c/0x20) [ 4641.297855][T16651] r9:84720600 r8:00000003 r7:00000000 r6:00000000 r5:00003ba0 r4:84720600 [ 4641.297871][T16651] [<807c29e4>] (tomoyo_file_ioctl) from [<8076f984>] (security_file_ioctl+0x64/0x1e4) [ 4641.297927][T16651] [<8076f920>] (security_file_ioctl) from [<8056f088>] (sys_ioctl+0x4c/0xdc8) [ 4641.297989][T16651] r7:00000000 r6:84720601 r5:00000000 r4:00003ba0 [ 4641.298008][T16651] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4641.298057][T16651] Exception stack(0xed605fa8 to 0xed605ff0) [ 4641.298091][T16651] 5fa0: 00000000 00000000 00000003 00003ba0 00000000 00000000 [ 4641.298126][T16651] 5fc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b950bc [ 4641.298152][T16651] 5fe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4641.298185][T16651] r10:00000036 r9:844de000 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4641.298204][T16651] r4:00000000 [ 4641.299919][T16651] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4642.233743][T16658] FAULT_INJECTION: forcing a failure. [ 4642.233743][T16658] name failslab, interval 1, probability 0, space 0, times 0 [ 4642.234258][T16658] CPU: 1 UID: 0 PID: 16658 Comm: syz.9.11565 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4642.234314][T16658] Hardware name: ARM-Versatile Express [ 4642.234338][T16658] Call trace: [ 4642.234381][T16658] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4642.234472][T16658] r7:00000c40 r6:00000000 r5:60000013 r4:8225c190 [ 4642.234490][T16658] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4642.234542][T16658] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4642.234594][T16658] r5:844dbc00 r4:82919c40 [ 4642.234610][T16658] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4642.234670][T16658] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4642.234735][T16658] r8:844dbc00 r7:00000c40 r6:847206e8 r5:00001000 r4:830016c0 [ 4642.234815][T16658] [<805239a8>] (should_failslab) from [<805087a4>] (__kmalloc_noprof+0x9c/0x458) [ 4642.234925][T16658] [<80508708>] (__kmalloc_noprof) from [<807c1fdc>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4642.235003][T16658] r10:844dbc00 r9:8309e400 r8:00000000 r7:834f3440 r6:847206e8 r5:00001000 [ 4642.235025][T16658] r4:00000000 [ 4642.235040][T16658] [<807c1fa0>] (tomoyo_realpath_from_path) from [<807be120>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4642.235104][T16658] r10:844dbc00 r9:00000000 r8:00000003 r7:c0286687 r6:00000004 r5:81cd65f8 [ 4642.235126][T16658] r4:847206e8 r3:826c0200 [ 4642.235142][T16658] [<807be054>] (tomoyo_path_number_perm) from [<807c2a00>] (tomoyo_file_ioctl+0x1c/0x20) [ 4642.235200][T16658] r9:847206c0 r8:00000003 r7:00000000 r6:00000000 r5:c0286687 r4:847206c0 [ 4642.235216][T16658] [<807c29e4>] (tomoyo_file_ioctl) from [<8076f984>] (security_file_ioctl+0x64/0x1e4) [ 4642.235271][T16658] [<8076f920>] (security_file_ioctl) from [<8056f088>] (sys_ioctl+0x4c/0xdc8) [ 4642.235336][T16658] r7:00000000 r6:847206c1 r5:00000000 r4:c0286687 [ 4642.235355][T16658] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4642.235426][T16658] Exception stack(0xed5e1fa8 to 0xed5e1ff0) [ 4642.235474][T16658] 1fa0: 00000000 00000000 00000003 c0286687 00000000 00000000 [ 4642.235525][T16658] 1fc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b9c0bc [ 4642.235557][T16658] 1fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4642.235608][T16658] r10:00000036 r9:844dbc00 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4642.235633][T16658] r4:00000000 [ 4642.235681][T16658] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4643.209388][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 4643.209968][ T31] audit: type=1400 audit(2000003738.590:47278): avc: denied { ioctl } for pid=16652 comm="syz.8.11563" path="socket:[127546]" dev="sockfs" ino=127546 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4643.219002][ T31] audit: type=1400 audit(2000003738.600:47279): avc: denied { module_request } for pid=16652 comm="syz.8.11563" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4643.523201][ T31] audit: type=1400 audit(2000003738.910:47280): avc: denied { sys_module } for pid=16652 comm="syz.8.11563" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4643.529026][ T31] audit: type=1400 audit(2000003738.910:47281): avc: denied { module_request } for pid=16652 comm="syz.8.11563" kmod="wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4643.719913][ T31] audit: type=1400 audit(2000003739.100:47282): avc: denied { write } for pid=16652 comm="syz.8.11563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4643.957704][ T31] audit: type=1400 audit(2000003739.340:47283): avc: denied { mounton } for pid=16665 comm="syz.9.11567" path="/170/file0" dev="tmpfs" ino=926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4643.963917][T16666] fuse: Bad value for 'fd' [ 4644.351541][ T31] audit: type=1400 audit(2000003739.730:47284): avc: denied { read write } for pid=16669 comm="syz.8.11569" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4644.373409][ T31] audit: type=1400 audit(2000003739.760:47285): avc: denied { read open } for pid=16669 comm="syz.8.11569" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4644.418687][ T31] audit: type=1400 audit(2000003739.800:47286): avc: denied { ioctl } for pid=16669 comm="syz.8.11569" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x540b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4644.429885][ T31] audit: type=1400 audit(2000003739.810:47287): avc: denied { create } for pid=16670 comm="syz.9.11570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4646.093890][T16682] FAULT_INJECTION: forcing a failure. [ 4646.093890][T16682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4646.094830][T16682] CPU: 1 UID: 0 PID: 16682 Comm: syz.9.11574 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4646.094897][T16682] Hardware name: ARM-Versatile Express [ 4646.094922][T16682] Call trace: [ 4646.095133][T16682] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4646.095289][T16682] r7:00000003 r6:00000000 r5:60000013 r4:8225c190 [ 4646.095434][T16682] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4646.095538][T16682] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4646.095810][T16682] r5:855e4800 r4:82950690 [ 4646.095967][T16682] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4646.096035][T16682] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4646.096098][T16682] r8:00000003 r7:00000003 r6:200008c0 r5:85fdbd80 r4:850b4a80 [ 4646.096118][T16682] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4646.096167][T16682] [<8096bf58>] (should_fail_usercopy) from [<8056d5ac>] (do_fcntl+0x210/0x860) [ 4646.096224][T16682] [<8056d39c>] (do_fcntl) from [<8056dc6c>] (sys_fcntl+0x70/0xd0) [ 4646.096319][T16682] r8:00000003 r7:200008c0 r6:0000040c r5:00000000 r4:85fdbd81 [ 4646.096341][T16682] [<8056dbfc>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4646.096452][T16682] Exception stack(0xed79dfa8 to 0xed79dff0) [ 4646.096571][T16682] dfa0: 00000000 00000000 00000003 0000040c 200008c0 00000000 [ 4646.096704][T16682] dfc0: 00000000 00000000 0012fef0 00000037 002e0000 00000000 00006364 76b9c0bc [ 4646.096761][T16682] dfe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4646.096877][T16682] r9:855e4800 r8:8020029c r7:00000037 r6:0012fef0 r5:00000000 r4:00000000 [ 4646.333777][T16684] netlink: 40 bytes leftover after parsing attributes in process `syz.8.11575'. [ 4646.516859][T16686] fuse: Bad value for 'user_id' [ 4646.517289][T16686] fuse: Bad value for 'user_id' [ 4649.438748][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 4649.439232][ T31] audit: type=1400 audit(2000003744.820:47356): avc: denied { read } for pid=16702 comm="syz.8.11582" name="mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4649.447893][ T31] audit: type=1400 audit(2000003744.840:47357): avc: denied { read open } for pid=16702 comm="syz.8.11582" path="/dev/mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4649.472744][T16703] FAULT_INJECTION: forcing a failure. [ 4649.472744][T16703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4649.473235][T16703] CPU: 1 UID: 0 PID: 16703 Comm: syz.8.11582 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4649.473295][T16703] Hardware name: ARM-Versatile Express [ 4649.473317][T16703] Call trace: [ 4649.473355][T16703] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4649.473450][T16703] r7:00000000 r6:00000000 r5:60000013 r4:8225c190 [ 4649.473469][T16703] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4649.473516][T16703] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4649.473563][T16703] r5:855e4800 r4:82950690 [ 4649.473580][T16703] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4649.473630][T16703] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4649.473695][T16703] r8:76b94f30 r7:00000000 r6:00000000 r5:ed829f68 r4:00000002 [ 4649.473711][T16703] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4649.473753][T16703] [<8096bf58>] (should_fail_usercopy) from [<80590d98>] (simple_read_from_buffer+0x80/0x13c) [ 4649.473800][T16703] [<80590d18>] (simple_read_from_buffer) from [<80608bd8>] (proc_fail_nth_read+0xb8/0x100) [ 4649.473860][T16703] r10:00000001 r9:80608b20 r8:00000002 r7:ed829f68 r6:0000000f r5:76b94f30 [ 4649.473879][T16703] r4:855e4800 r3:ed829e9f [ 4649.473893][T16703] [<80608b20>] (proc_fail_nth_read) from [<80555410>] (vfs_read+0x98/0x320) [ 4649.473947][T16703] r8:76b94f30 r7:ed829f68 r6:855e4800 r5:0000000f r4:84720b40 [ 4649.473965][T16703] [<80555378>] (vfs_read) from [<805560b8>] (ksys_read+0x74/0xe8) [ 4649.474017][T16703] r10:00000003 r9:855e4800 r8:8020029c r7:00000000 r6:00000000 r5:84720b40 [ 4649.474066][T16703] r4:84720b43 [ 4649.474087][T16703] [<80556044>] (ksys_read) from [<8055613c>] (sys_read+0x10/0x14) [ 4649.474135][T16703] r7:00000003 r6:00000004 r5:76b94f30 r4:0000000f [ 4649.474150][T16703] [<8055612c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4649.474187][T16703] Exception stack(0xed829fa8 to 0xed829ff0) [ 4649.474221][T16703] 9fa0: 0000000f 76b94f30 00000004 76b94f30 0000000f 00000000 [ 4649.474251][T16703] 9fc0: 0000000f 76b94f30 00000004 00000003 002e0000 00000000 00006364 76b950bc [ 4649.474275][T16703] 9fe0: 00000158 76b94ed0 000d7d70 0012fe14 [ 4649.681481][ T31] audit: type=1400 audit(2000003745.050:47358): avc: denied { create } for pid=16704 comm="syz.9.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4649.681956][ T31] audit: type=1400 audit(2000003745.060:47359): avc: denied { ioctl } for pid=16704 comm="syz.9.11583" path="socket:[127642]" dev="sockfs" ino=127642 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4649.723431][ T31] audit: type=1400 audit(2000003745.110:47360): avc: denied { ioctl } for pid=16704 comm="syz.9.11583" path="socket:[127642]" dev="sockfs" ino=127642 ioctlcmd=0x9414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4649.735514][ T31] audit: type=1400 audit(2000003745.120:47361): avc: denied { create } for pid=16704 comm="syz.9.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4649.755189][ T31] audit: type=1400 audit(2000003745.140:47362): avc: denied { create } for pid=16704 comm="syz.9.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4649.765371][ T31] audit: type=1400 audit(2000003745.150:47363): avc: denied { write } for pid=16704 comm="syz.9.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4649.794791][ T31] audit: type=1400 audit(2000003745.180:47364): avc: denied { module_request } for pid=16704 comm="syz.9.11583" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4649.987675][ T31] audit: type=1400 audit(2000003745.370:47365): avc: denied { create } for pid=16707 comm="syz.8.11584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4650.698724][T16712] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=272 sclass=netlink_audit_socket pid=16712 comm=syz.8.11584 [ 4650.877945][T16705] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4650.881340][T16705] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4653.390295][T16726] FAULT_INJECTION: forcing a failure. [ 4653.390295][T16726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4653.391295][T16726] CPU: 1 UID: 0 PID: 16726 Comm: syz.9.11590 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4653.391374][T16726] Hardware name: ARM-Versatile Express [ 4653.391401][T16726] Call trace: [ 4653.391444][T16726] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4653.391561][T16726] r7:ed995e20 r6:00000000 r5:60000013 r4:8225c190 [ 4653.391583][T16726] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4653.391642][T16726] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4653.391699][T16726] r5:855e2400 r4:82950690 [ 4653.391718][T16726] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4653.391777][T16726] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4653.391836][T16726] r8:00000001 r7:ed995e20 r6:20000e80 r5:00000000 r4:ed995f20 [ 4653.391855][T16726] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4653.391903][T16726] [<8096bf58>] (should_fail_usercopy) from [<81533c14>] (copy_msghdr_from_user+0x50/0x130) [ 4653.391973][T16726] [<81533bc4>] (copy_msghdr_from_user) from [<81533d6c>] (___sys_sendmsg+0x78/0xd0) [ 4653.392042][T16726] r8:00000001 r7:00000000 r6:8349cf00 r5:ed995f20 r4:ed995e64 [ 4653.392061][T16726] [<81533cf4>] (___sys_sendmsg) from [<81534228>] (__sys_sendmsg+0x8c/0xe0) [ 4653.392129][T16726] r10:00000128 r9:855e2400 r8:847209c0 r7:00000001 r6:20000e80 r5:847209c1 [ 4653.392151][T16726] r4:00000004 [ 4653.392167][T16726] [<8153419c>] (__sys_sendmsg) from [<81534290>] (sys_sendmsg+0x14/0x18) [ 4653.392229][T16726] r8:8020029c r7:00000128 r6:0012fef0 r5:00000000 r4:00000000 [ 4653.392272][T16726] [<8153427c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4653.392324][T16726] Exception stack(0xed995fa8 to 0xed995ff0) [ 4653.392359][T16726] 5fa0: 00000000 00000000 00000004 20000e80 00000001 00000000 [ 4653.392392][T16726] 5fc0: 00000000 00000000 0012fef0 00000128 002e0000 00000000 00006364 76b9c0bc [ 4653.392417][T16726] 5fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4654.465786][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 4654.466799][ T31] audit: type=1400 audit(2000003749.850:47416): avc: denied { create } for pid=16735 comm="syz.8.11594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4654.487471][ T31] audit: type=1400 audit(2000003749.870:47417): avc: denied { ioctl } for pid=16735 comm="syz.8.11594" path="socket:[127689]" dev="sockfs" ino=127689 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4654.509265][ T31] audit: type=1400 audit(2000003749.890:47418): avc: denied { read } for pid=16735 comm="syz.8.11594" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4654.515697][ T31] audit: type=1400 audit(2000003749.910:47419): avc: denied { read open } for pid=16735 comm="syz.8.11594" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4654.535520][ T31] audit: type=1400 audit(2000003749.920:47420): avc: denied { create } for pid=16735 comm="syz.8.11594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4654.839370][ T31] audit: type=1400 audit(2000003750.220:47421): avc: denied { read write } for pid=16737 comm="syz.8.11596" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4654.843003][ T31] audit: type=1400 audit(2000003750.230:47422): avc: denied { read write open } for pid=16737 comm="syz.8.11596" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4655.214794][ T31] audit: type=1400 audit(2000003750.600:47423): avc: denied { prog_load } for pid=16741 comm="syz.8.11597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4655.217285][ T31] audit: type=1400 audit(2000003750.600:47424): avc: denied { bpf } for pid=16741 comm="syz.8.11597" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4655.228038][ T31] audit: type=1400 audit(2000003750.610:47425): avc: denied { perfmon } for pid=16741 comm="syz.8.11597" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4655.653507][T16744] SELinux: Context system_u:object_r:smartcard_device_t:s0 is not valid (left unmapped). [ 4661.261348][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 4661.266175][ T31] audit: type=1400 audit(2000003756.640:47457): avc: denied { read } for pid=16759 comm="syz.8.11604" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.274765][ T31] audit: type=1400 audit(2000003756.660:47458): avc: denied { read open } for pid=16759 comm="syz.8.11604" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.287895][ T31] audit: type=1400 audit(2000003756.670:47459): avc: denied { ioctl } for pid=16759 comm="syz.8.11604" path="/dev/ttyS3" dev="devtmpfs" ino=607 ioctlcmd=0x7013 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.289635][ T31] audit: type=1400 audit(2000003756.670:47460): avc: denied { read write } for pid=16759 comm="syz.8.11604" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.301054][ T31] audit: type=1400 audit(2000003756.670:47461): avc: denied { read write open } for pid=16759 comm="syz.8.11604" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.306168][ T31] audit: type=1400 audit(2000003756.690:47462): avc: denied { mounton } for pid=16759 comm="syz.8.11604" path="/95/file0" dev="tmpfs" ino=513 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4661.312000][T16760] fuse: Bad value for 'group_id' [ 4661.312743][T16760] fuse: Bad value for 'group_id' [ 4661.316086][ T31] audit: type=1400 audit(2000003756.700:47463): avc: denied { ioctl } for pid=16759 comm="syz.8.11604" path="/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4661.365952][ T31] audit: type=1400 audit(2000003756.730:47464): avc: denied { read } for pid=16759 comm="syz.8.11604" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4661.385145][ T31] audit: type=1400 audit(2000003756.770:47465): avc: denied { read open } for pid=16759 comm="syz.8.11604" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4661.399289][ T31] audit: type=1400 audit(2000003756.780:47466): avc: denied { create } for pid=16759 comm="syz.8.11604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4666.369457][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 4666.376945][ T31] audit: type=1400 audit(2000003761.750:47545): avc: denied { create } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.391488][ T31] audit: type=1400 audit(2000003761.770:47546): avc: denied { write } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.413926][ T31] audit: type=1400 audit(2000003761.800:47547): avc: denied { module_request } for pid=16790 comm="syz.9.11617" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4666.694570][ T31] audit: type=1400 audit(2000003762.080:47548): avc: denied { read } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.796596][ T31] audit: type=1400 audit(2000003762.180:47549): avc: denied { create } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.819121][ T31] audit: type=1400 audit(2000003762.200:47550): avc: denied { write } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.827051][ T31] audit: type=1400 audit(2000003762.220:47551): avc: denied { module_request } for pid=16790 comm="syz.9.11617" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4666.834410][ T31] audit: type=1400 audit(2000003762.220:47552): avc: denied { create } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.875361][ T31] audit: type=1400 audit(2000003762.260:47553): avc: denied { write } for pid=16790 comm="syz.9.11617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4666.897053][ T31] audit: type=1400 audit(2000003762.280:47554): avc: denied { module_request } for pid=16790 comm="syz.9.11617" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4671.502905][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4671.503453][ T31] audit: type=1400 audit(2000003766.890:47598): avc: denied { sys_module } for pid=16817 comm="syz.8.11625" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4671.513034][ T31] audit: type=1400 audit(2000003766.900:47599): avc: denied { module_request } for pid=16817 comm="syz.8.11625" kmod=FFFFFFFF scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4671.756906][ T31] audit: type=1400 audit(2000003767.140:47600): avc: denied { read } for pid=16817 comm="syz.8.11625" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4671.771727][ T31] audit: type=1400 audit(2000003767.150:47601): avc: denied { read open } for pid=16817 comm="syz.8.11625" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4671.796198][ T31] audit: type=1400 audit(2000003767.180:47602): avc: denied { ioctl } for pid=16817 comm="syz.8.11625" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4671.846409][ T31] audit: type=1400 audit(2000003767.220:47603): avc: denied { create } for pid=16817 comm="syz.8.11625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4671.886626][ T31] audit: type=1400 audit(2000003767.270:47604): avc: denied { read write } for pid=16813 comm="syz.9.11624" name="udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4671.890012][ T31] audit: type=1400 audit(2000003767.270:47605): avc: denied { write } for pid=16817 comm="syz.8.11625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4671.901626][ T31] audit: type=1400 audit(2000003767.280:47606): avc: denied { read write open } for pid=16813 comm="syz.9.11624" path="/dev/udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4672.720371][ T31] audit: type=1400 audit(2000003768.100:47607): avc: denied { module_request } for pid=16828 comm="syz.9.11628" kmod="netdev-/selinux/checkr" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4673.814329][T16839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=16839 comm=syz.8.11631 [ 4677.033646][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 4677.034670][ T31] audit: type=1400 audit(2000003772.420:47622): avc: denied { module_request } for pid=16844 comm="syz.8.11633" kmod="netdev-/selinux/checkr" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4677.268785][ T31] audit: type=1400 audit(2000003772.650:47623): avc: denied { sys_module } for pid=16844 comm="syz.8.11633" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4677.272360][ T31] audit: type=1400 audit(2000003772.650:47624): avc: denied { module_request } for pid=16844 comm="syz.8.11633" kmod="/selinux/checkr" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4677.286514][ T31] audit: type=1400 audit(2000003772.670:47625): avc: denied { read write } for pid=16847 comm="syz.9.11634" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4677.291532][ T31] audit: type=1400 audit(2000003772.670:47626): avc: denied { read write open } for pid=16847 comm="syz.9.11634" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4677.296908][ T31] audit: type=1400 audit(2000003772.680:47627): avc: denied { mounton } for pid=16847 comm="syz.9.11634" path="/205/file0" dev="tmpfs" ino=1109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4677.342167][ T31] audit: type=1400 audit(2000003772.730:47628): avc: denied { mount } for pid=16847 comm="syz.9.11634" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4677.381433][ T31] audit: type=1400 audit(2000003772.760:47629): avc: denied { create } for pid=16847 comm="syz.9.11634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4677.396566][ T31] audit: type=1400 audit(2000003772.780:47630): avc: denied { ioctl } for pid=16847 comm="syz.9.11634" path="socket:[127851]" dev="sockfs" ino=127851 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4677.548379][ T31] audit: type=1400 audit(2000003772.930:47631): avc: denied { create } for pid=16844 comm="syz.8.11633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4682.143743][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 4682.144823][ T31] audit: type=1400 audit(2000003777.530:47669): avc: denied { create } for pid=16869 comm="syz.9.11641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.155913][ T31] audit: type=1400 audit(2000003777.540:47670): avc: denied { ioctl } for pid=16869 comm="syz.9.11641" path="socket:[128518]" dev="sockfs" ino=128518 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.171284][ T31] audit: type=1400 audit(2000003777.550:47671): avc: denied { bind } for pid=16869 comm="syz.9.11641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.175318][ T31] audit: type=1400 audit(2000003777.560:47672): avc: denied { write } for pid=16869 comm="syz.9.11641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.182383][ T31] audit: type=1400 audit(2000003777.560:47673): avc: denied { write } for pid=16869 comm="syz.9.11641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.198645][ T31] audit: type=1400 audit(2000003777.580:47674): avc: denied { write } for pid=16869 comm="syz.9.11641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.382173][ T31] audit: type=1400 audit(2000003777.750:47675): avc: denied { write } for pid=16867 comm="syz.8.11640" path="socket:[127882]" dev="sockfs" ino=127882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.384597][ T31] audit: type=1400 audit(2000003777.770:47676): avc: denied { write } for pid=16867 comm="syz.8.11640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.534112][ T31] audit: type=1400 audit(2000003777.920:47677): avc: denied { create } for pid=16872 comm="syz.9.11642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4682.816388][ T31] audit: type=1400 audit(2000003778.200:47678): avc: denied { allowed } for pid=16874 comm="syz.9.11643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4683.099839][T16877] FAULT_INJECTION: forcing a failure. [ 4683.099839][T16877] name failslab, interval 1, probability 0, space 0, times 0 [ 4683.103038][T16877] CPU: 0 UID: 0 PID: 16877 Comm: syz.8.11644 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4683.103138][T16877] Hardware name: ARM-Versatile Express [ 4683.103166][T16877] Call trace: [ 4683.103207][T16877] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4683.103309][T16877] r7:00000d40 r6:00000000 r5:60000013 r4:8225c190 [ 4683.103327][T16877] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4683.103372][T16877] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4683.103423][T16877] r5:844dbc00 r4:82919c40 [ 4683.103438][T16877] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4683.103490][T16877] [<8096bd18>] (should_fail_ex) from [<80523a14>] (should_failslab+0x6c/0x94) [ 4683.103550][T16877] r8:844dbc00 r7:00000d40 r6:84d3c028 r5:0000001f r4:83001240 [ 4683.103568][T16877] [<805239a8>] (should_failslab) from [<805087a4>] (__kmalloc_noprof+0x9c/0x458) [ 4683.103616][T16877] [<80508708>] (__kmalloc_noprof) from [<807c1ee4>] (tomoyo_encode2+0x64/0xf0) [ 4683.103678][T16877] r10:00000fff r9:8309e400 r8:00000000 r7:83414ee0 r6:84d3c028 r5:838c3ffc [ 4683.103700][T16877] r4:838c3fe8 [ 4683.103715][T16877] [<807c1e80>] (tomoyo_encode2) from [<807c1f94>] (tomoyo_encode+0x24/0x30) [ 4683.103768][T16877] r9:8309e400 r8:00000000 r7:83414ee0 r6:84d3c028 r5:00001000 r4:838c3fe9 [ 4683.103785][T16877] [<807c1f70>] (tomoyo_encode) from [<807c2020>] (tomoyo_realpath_from_path+0x80/0x17c) [ 4683.103834][T16877] r5:00001000 r4:838c3000 [ 4683.103848][T16877] [<807c1fa0>] (tomoyo_realpath_from_path) from [<807be120>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4683.103899][T16877] r10:844dbc00 r9:00000000 r8:00000003 r7:0000f518 r6:00000004 r5:81cd65f8 [ 4683.103924][T16877] r4:84d3c028 r3:826c0200 [ 4683.103941][T16877] [<807be054>] (tomoyo_path_number_perm) from [<807c2a00>] (tomoyo_file_ioctl+0x1c/0x20) [ 4683.103993][T16877] r9:84d3c000 r8:00000003 r7:00000000 r6:00000000 r5:0000f518 r4:84d3c000 [ 4683.104009][T16877] [<807c29e4>] (tomoyo_file_ioctl) from [<8076f984>] (security_file_ioctl+0x64/0x1e4) [ 4683.104057][T16877] [<8076f920>] (security_file_ioctl) from [<8056f088>] (sys_ioctl+0x4c/0xdc8) [ 4683.104109][T16877] r7:00000000 r6:84d3c001 r5:00000000 r4:0000f518 [ 4683.104126][T16877] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4683.104168][T16877] Exception stack(0xe001dfa8 to 0xe001dff0) [ 4683.104203][T16877] dfa0: 00000000 00000000 00000003 0000f518 00000000 00000000 [ 4683.104233][T16877] dfc0: 00000000 00000000 0012fef0 00000036 002e0000 00000000 00006364 76b950bc [ 4683.104288][T16877] dfe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4683.104317][T16877] r10:00000036 r9:844dbc00 r8:8020029c r7:00000036 r6:0012fef0 r5:00000000 [ 4683.104333][T16877] r4:00000000 [ 4683.125514][T16877] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4683.426500][T16879] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4683.429161][T16879] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4687.877710][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 4687.878104][ T31] audit: type=1400 audit(2000003783.260:47730): avc: denied { read } for pid=16906 comm="syz.8.11651" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4687.882957][ T31] audit: type=1400 audit(2000003783.270:47731): avc: denied { read open } for pid=16906 comm="syz.8.11651" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4687.891978][ T31] audit: type=1400 audit(2000003783.280:47732): avc: denied { create } for pid=16906 comm="syz.8.11651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4687.899228][ T31] audit: type=1400 audit(2000003783.280:47733): avc: denied { ioctl } for pid=16906 comm="syz.8.11651" path="socket:[127928]" dev="sockfs" ino=127928 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4687.906198][ T31] audit: type=1400 audit(2000003783.290:47734): avc: denied { module_request } for pid=16906 comm="syz.8.11651" kmod="netdev-wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4688.151687][ T31] audit: type=1400 audit(2000003783.530:47735): avc: denied { sys_module } for pid=16906 comm="syz.8.11651" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4688.157064][ T31] audit: type=1400 audit(2000003783.540:47736): avc: denied { module_request } for pid=16906 comm="syz.8.11651" kmod="wpan3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4688.315484][ T31] audit: type=1400 audit(2000003783.700:47737): avc: denied { create } for pid=16910 comm="syz.9.11652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4688.336708][T16911] FAULT_INJECTION: forcing a failure. [ 4688.336708][T16911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4688.348475][T16911] CPU: 1 UID: 0 PID: 16911 Comm: syz.9.11652 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4688.348627][T16911] Hardware name: ARM-Versatile Express [ 4688.348661][T16911] Call trace: [ 4688.348717][T16911] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4688.348834][T16911] r7:20000140 r6:00000000 r5:60000013 r4:8225c190 [ 4688.348854][T16911] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4688.348910][T16911] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4688.348968][T16911] r5:855e3000 r4:82950690 [ 4688.348986][T16911] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4688.349044][T16911] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4688.349103][T16911] r8:84d3c841 r7:20000140 r6:e0485ee4 r5:00000010 r4:00000010 [ 4688.349124][T16911] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4688.349173][T16911] [<8096bf58>] (should_fail_usercopy) from [<81531fec>] (move_addr_to_kernel+0x34/0xf8) [ 4688.349232][T16911] [<81531fb8>] (move_addr_to_kernel) from [<81533544>] (__sys_sendto+0xd0/0x160) [ 4688.349293][T16911] r7:20000140 r6:850b4a00 r5:20080014 r4:00000000 [ 4688.349312][T16911] [<81533474>] (__sys_sendto) from [<815335f0>] (sys_sendto+0x1c/0x24) [ 4688.349381][T16911] r9:855e3000 r8:8020029c r7:00000122 r6:0012fef0 r5:00000010 r4:20000140 [ 4688.349400][T16911] [<815335d4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4688.349447][T16911] Exception stack(0xe0485fa8 to 0xe0485ff0) [ 4688.349491][T16911] 5fa0: 20000140 00000010 00000003 20000040 00000000 20080014 [ 4688.349524][T16911] 5fc0: 20000140 00000010 0012fef0 00000122 002e0000 00000000 00006364 76b9c0bc [ 4688.349548][T16911] 5fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4688.448530][ T31] audit: type=1400 audit(2000003783.830:47738): avc: denied { write } for pid=16906 comm="syz.8.11651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4688.472995][ T31] audit: type=1400 audit(2000003783.860:47739): avc: denied { read } for pid=16906 comm="syz.8.11651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4689.006284][T16907] 8021q: VLANs not supported on ip6tnl0 [ 4691.326414][T16923] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4691.327157][T16923] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4691.327286][T16923] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4691.327410][T16923] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4693.300969][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 4693.303087][ T31] audit: type=1400 audit(2000003788.680:47786): avc: denied { create } for pid=16934 comm="syz.8.11662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4693.630082][ T31] audit: type=1400 audit(2000003789.010:47787): avc: denied { create } for pid=16936 comm="syz.8.11663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4693.639201][ T31] audit: type=1400 audit(2000003789.030:47788): avc: denied { ioctl } for pid=16936 comm="syz.8.11663" path="socket:[128652]" dev="sockfs" ino=128652 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4693.658332][ T31] audit: type=1400 audit(2000003789.040:47789): avc: denied { bind } for pid=16936 comm="syz.8.11663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4693.664925][ T31] audit: type=1400 audit(2000003789.050:47790): avc: denied { write } for pid=16936 comm="syz.8.11663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4693.675219][ T31] audit: type=1400 audit(2000003789.060:47791): avc: denied { write } for pid=16936 comm="syz.8.11663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4694.039339][ T31] audit: type=1400 audit(2000003789.420:47792): avc: denied { read write } for pid=16938 comm="syz.8.11664" name="uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4694.043255][ T31] audit: type=1400 audit(2000003789.430:47793): avc: denied { read write open } for pid=16938 comm="syz.8.11664" path="/dev/uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4694.050156][ T31] audit: type=1400 audit(2000003789.430:47794): avc: denied { ioctl } for pid=16938 comm="syz.8.11664" path="/dev/uinput" dev="devtmpfs" ino=696 ioctlcmd=0x55c9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4694.076622][ T31] audit: type=1400 audit(2000003789.460:47795): avc: denied { create } for pid=16938 comm="syz.8.11664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4698.948761][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 4698.949209][ T31] audit: type=1400 audit(2000003794.330:47852): avc: denied { read } for pid=16965 comm="syz.9.11675" name="vsock" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.959269][ T31] audit: type=1400 audit(2000003794.340:47853): avc: denied { read open } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.994747][ T31] audit: type=1400 audit(2000003794.350:47854): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x6610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.995254][ T31] audit: type=1400 audit(2000003794.360:47855): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.995425][ T31] audit: type=1400 audit(2000003794.360:47856): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x4593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.995517][ T31] audit: type=1400 audit(2000003794.370:47857): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x540f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4698.995592][ T31] audit: type=1400 audit(2000003794.380:47858): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x5204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.012385][ T31] audit: type=1400 audit(2000003794.400:47859): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.025978][ T31] audit: type=1400 audit(2000003794.410:47860): avc: denied { ioctl } for pid=16965 comm="syz.9.11675" path="/dev/vsock" dev="devtmpfs" ino=754 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.056152][ T31] audit: type=1400 audit(2000003794.430:47861): avc: denied { read write } for pid=16965 comm="syz.9.11675" name="vsock" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4704.023656][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 4704.024175][ T31] audit: type=1400 audit(2000003799.410:47931): avc: denied { write } for pid=16998 comm="syz.8.11687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4704.387526][ T31] audit: type=1400 audit(2000003799.770:47932): avc: denied { create } for pid=17003 comm="syz.8.11688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4704.412126][ T31] audit: type=1400 audit(2000003799.800:47933): avc: denied { ioctl } for pid=17003 comm="syz.8.11688" path="socket:[128771]" dev="sockfs" ino=128771 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4704.417707][ T31] audit: type=1400 audit(2000003799.800:47934): avc: denied { bind } for pid=17003 comm="syz.8.11688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4704.429038][ T31] audit: type=1400 audit(2000003799.810:47935): avc: denied { write } for pid=17003 comm="syz.8.11688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4704.457689][ T31] audit: type=1400 audit(2000003799.840:47936): avc: denied { write } for pid=17003 comm="syz.8.11688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4704.469788][ T31] audit: type=1400 audit(2000003799.850:47937): avc: denied { write } for pid=17003 comm="syz.8.11688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4705.013446][ T31] audit: type=1400 audit(2000003800.400:47938): avc: denied { read write } for pid=17007 comm="syz.8.11690" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4705.017066][ T31] audit: type=1400 audit(2000003800.400:47939): avc: denied { read write open } for pid=17007 comm="syz.8.11690" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4705.037171][ T31] audit: type=1400 audit(2000003800.420:47940): avc: denied { mounton } for pid=17007 comm="syz.8.11690" path="/143/file0" dev="tmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4708.507370][T17034] FAULT_INJECTION: forcing a failure. [ 4708.507370][T17034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4708.507870][T17034] CPU: 1 UID: 0 PID: 17034 Comm: syz.9.11698 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4708.507955][T17034] Hardware name: ARM-Versatile Express [ 4708.507983][T17034] Call trace: [ 4708.508026][T17034] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4708.508203][T17034] r7:20000140 r6:00000000 r5:60000013 r4:8225c190 [ 4708.508412][T17034] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4708.508518][T17034] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4708.508582][T17034] r5:844dbc00 r4:82950690 [ 4708.508761][T17034] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4708.508883][T17034] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4708.509036][T17034] r8:84720541 r7:20000140 r6:eaae9ee4 r5:00000010 r4:00000010 [ 4708.509062][T17034] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4708.509145][T17034] [<8096bf58>] (should_fail_usercopy) from [<81531fec>] (move_addr_to_kernel+0x34/0xf8) [ 4708.509385][T17034] [<81531fb8>] (move_addr_to_kernel) from [<81533544>] (__sys_sendto+0xd0/0x160) [ 4708.509530][T17034] r7:20000140 r6:8349cc80 r5:20080014 r4:00000000 [ 4708.509626][T17034] [<81533474>] (__sys_sendto) from [<815335f0>] (sys_sendto+0x1c/0x24) [ 4708.509762][T17034] r9:844dbc00 r8:8020029c r7:00000122 r6:0012fef0 r5:00000010 r4:20000140 [ 4708.509844][T17034] [<815335d4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4708.509942][T17034] Exception stack(0xeaae9fa8 to 0xeaae9ff0) [ 4708.510074][T17034] 9fa0: 20000140 00000010 00000003 20000040 00000006 20080014 [ 4708.510286][T17034] 9fc0: 20000140 00000010 0012fef0 00000122 002e0000 00000000 00006364 76b9c0bc [ 4708.510374][T17034] 9fe0: 76b9bec0 76b9beb0 000193a4 00131f40 [ 4709.243962][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 4709.244520][ T31] audit: type=1400 audit(2000003804.630:48007): avc: denied { write } for pid=17039 comm="syz.9.11701" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4709.266846][ T31] audit: type=1400 audit(2000003804.640:48008): avc: denied { write open } for pid=17039 comm="syz.9.11701" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4709.282359][ T31] audit: type=1400 audit(2000003804.670:48009): avc: denied { create } for pid=17040 comm="syz.8.11702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4709.308039][ T31] audit: type=1400 audit(2000003804.690:48010): avc: denied { getopt } for pid=17040 comm="syz.8.11702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4709.310037][ T31] audit: type=1400 audit(2000003804.690:48011): avc: denied { mac_admin } for pid=17039 comm="syz.9.11701" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4709.327442][ T31] audit: type=1400 audit(2000003804.710:48012): avc: denied { relabelto } for pid=17039 comm="syz.9.11701" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4709.330316][ T31] audit: type=1400 audit(2000003804.710:48013): avc: denied { associate } for pid=17039 comm="syz.9.11701" name="dlm_plock" dev="devtmpfs" ino=87 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:smartcard_device_t:s0" [ 4709.355557][ T31] audit: type=1400 audit(2000003804.740:48014): avc: denied { write } for pid=17040 comm="syz.8.11702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4709.365374][ T31] audit: type=1400 audit(2000003804.750:48015): avc: denied { write } for pid=17040 comm="syz.8.11702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4709.379801][ T31] audit: type=1400 audit(2000003804.760:48016): avc: denied { ioctl } for pid=17039 comm="syz.9.11701" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4710.882963][T17054] FAULT_INJECTION: forcing a failure. [ 4710.882963][T17054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4710.885024][T17054] CPU: 0 UID: 0 PID: 17054 Comm: syz.8.11706 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4710.885155][T17054] Hardware name: ARM-Versatile Express [ 4710.885177][T17054] Call trace: [ 4710.885219][T17054] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4710.885320][T17054] r7:eac2de20 r6:00000000 r5:60000013 r4:8225c190 [ 4710.885336][T17054] [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c) [ 4710.885377][T17054] [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c) [ 4710.885421][T17054] r5:8448d400 r4:82950690 [ 4710.885433][T17054] [<8021fd94>] (dump_stack) from [<8096bedc>] (should_fail_ex+0x1c4/0x228) [ 4710.885477][T17054] [<8096bd18>] (should_fail_ex) from [<8096bf54>] (should_fail+0x14/0x18) [ 4710.885521][T17054] r8:00000080 r7:eac2de20 r6:20000600 r5:00000000 r4:eac2df20 [ 4710.885534][T17054] [<8096bf40>] (should_fail) from [<8096bf74>] (should_fail_usercopy+0x1c/0x20) [ 4710.885573][T17054] [<8096bf58>] (should_fail_usercopy) from [<81533c14>] (copy_msghdr_from_user+0x50/0x130) [ 4710.885622][T17054] [<81533bc4>] (copy_msghdr_from_user) from [<81533d6c>] (___sys_sendmsg+0x78/0xd0) [ 4710.885673][T17054] r8:00000080 r7:00000000 r6:8511a000 r5:eac2df20 r4:eac2de64 [ 4710.885686][T17054] [<81533cf4>] (___sys_sendmsg) from [<81534228>] (__sys_sendmsg+0x8c/0xe0) [ 4710.885740][T17054] r10:00000128 r9:8448d400 r8:84d3cb40 r7:00000080 r6:20000600 r5:84d3cb41 [ 4710.885755][T17054] r4:00000004 [ 4710.885768][T17054] [<8153419c>] (__sys_sendmsg) from [<81534290>] (sys_sendmsg+0x14/0x18) [ 4710.885824][T17054] r8:8020029c r7:00000128 r6:0012fef0 r5:00000000 r4:00000000 [ 4710.885837][T17054] [<8153427c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4710.885875][T17054] Exception stack(0xeac2dfa8 to 0xeac2dff0) [ 4710.885908][T17054] dfa0: 00000000 00000000 00000004 20000600 00000080 00000000 [ 4710.885935][T17054] dfc0: 00000000 00000000 0012fef0 00000128 002e0000 00000000 00006364 76b950bc [ 4710.885955][T17054] dfe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4711.090232][T17055] fuse: Unknown parameter 'grou00000000000000000000' [ 4712.374942][T17068] fuse: Unknown parameter 'grou00000000000000000000' [ 4714.296603][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 4714.296984][ T31] audit: type=1400 audit(2000003809.680:48106): avc: denied { write } for pid=17079 comm="syz.8.11718" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4714.313806][ T31] audit: type=1400 audit(2000003809.700:48107): avc: denied { write open } for pid=17079 comm="syz.8.11718" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4714.326666][ T31] audit: type=1400 audit(2000003809.710:48108): avc: denied { mac_admin } for pid=17079 comm="syz.8.11718" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4714.345037][ T31] audit: type=1400 audit(2000003809.730:48109): avc: denied { relabelto } for pid=17079 comm="syz.8.11718" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4714.348156][ T31] audit: type=1400 audit(2000003809.730:48110): avc: denied { associate } for pid=17079 comm="syz.8.11718" name="dlm_plock" dev="devtmpfs" ino=87 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:smartcard_device_t:s0" [ 4714.369141][ T31] audit: type=1400 audit(2000003809.750:48111): avc: denied { ioctl } for pid=17079 comm="syz.8.11718" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4714.417404][ T31] audit: type=1400 audit(2000003809.800:48112): avc: denied { create } for pid=17079 comm="syz.8.11718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4714.429127][ T31] audit: type=1400 audit(2000003809.810:48113): avc: denied { write } for pid=17079 comm="syz.8.11718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4714.435509][ T31] audit: type=1400 audit(2000003809.820:48114): avc: denied { read } for pid=17079 comm="syz.8.11718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4714.454556][ T31] audit: type=1400 audit(2000003809.840:48115): avc: denied { create } for pid=17079 comm="syz.8.11718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4714.762625][T17083] fuse: Unknown parameter 'grou00000000000000000000' [ 4716.252508][T17093] fuse: Unknown parameter 'group_i00000000000000000000' [ 4719.302947][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 4719.307002][ T31] audit: type=1400 audit(2000003814.690:48190): avc: denied { write } for pid=17105 comm="syz.8.11729" path="socket:[129230]" dev="sockfs" ino=129230 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4719.313667][ T31] audit: type=1400 audit(2000003814.700:48191): avc: denied { write } for pid=17105 comm="syz.8.11729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4719.333976][ T31] audit: type=1400 audit(2000003814.720:48192): avc: denied { write } for pid=17098 comm="syz.9.11726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4719.666642][ T31] audit: type=1400 audit(2000003815.050:48193): avc: denied { read } for pid=17111 comm="syz.8.11731" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4719.669981][ T31] audit: type=1400 audit(2000003815.050:48194): avc: denied { read open } for pid=17111 comm="syz.8.11731" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4719.675783][ T31] audit: type=1400 audit(2000003815.060:48195): avc: denied { create } for pid=17111 comm="syz.8.11731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4720.102857][ T31] audit: type=1400 audit(2000003815.490:48196): avc: denied { create } for pid=17115 comm="syz.9.11733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4720.123096][ T31] audit: type=1400 audit(2000003815.500:48197): avc: denied { create } for pid=17115 comm="syz.9.11733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4720.139424][ T31] audit: type=1400 audit(2000003815.510:48198): avc: denied { write } for pid=17115 comm="syz.9.11733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4720.159813][ T31] audit: type=1400 audit(2000003815.540:48199): avc: denied { module_request } for pid=17115 comm="syz.9.11733" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4724.476512][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 4724.485718][ T31] audit: type=1400 audit(2000003819.860:48232): avc: denied { ioctl } for pid=17130 comm="syz.9.11737" path="socket:[129283]" dev="sockfs" ino=129283 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4724.528759][ T31] audit: type=1400 audit(2000003819.910:48233): avc: denied { module_request } for pid=17130 comm="syz.9.11737" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4724.883632][ T31] audit: type=1400 audit(2000003820.260:48234): avc: denied { sys_module } for pid=17130 comm="syz.9.11737" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4724.910351][ T31] audit: type=1400 audit(2000003820.290:48235): avc: denied { module_request } for pid=17130 comm="syz.9.11737" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4725.031797][ T31] audit: type=1400 audit(2000003820.410:48236): avc: denied { bind } for pid=17130 comm="syz.9.11737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4725.055676][ T31] audit: type=1400 audit(2000003820.440:48237): avc: denied { write } for pid=17130 comm="syz.9.11737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4725.136580][ T31] audit: type=1400 audit(2000003820.520:48238): avc: denied { write } for pid=17130 comm="syz.9.11737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4725.231392][ T31] audit: type=1400 audit(2000003820.610:48239): avc: denied { create } for pid=17137 comm="syz.8.11738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4725.245053][ T31] audit: type=1400 audit(2000003820.630:48240): avc: denied { ioctl } for pid=17137 comm="syz.8.11738" path="socket:[129291]" dev="sockfs" ino=129291 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4725.265382][ T31] audit: type=1400 audit(2000003820.650:48241): avc: denied { bind } for pid=17137 comm="syz.8.11738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4729.486346][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 4729.487360][ T31] audit: type=1400 audit(2000003824.870:48296): avc: denied { mount } for pid=17158 comm="syz.8.11746" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4729.521963][ T31] audit: type=1400 audit(2000003824.910:48297): avc: denied { create } for pid=17158 comm="syz.8.11746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4729.536443][ T31] audit: type=1400 audit(2000003824.920:48298): avc: denied { ioctl } for pid=17158 comm="syz.8.11746" path="socket:[129345]" dev="sockfs" ino=129345 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4729.586618][ T31] audit: type=1400 audit(2000003824.970:48299): avc: denied { unmount } for pid=15743 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4729.864194][ T31] audit: type=1400 audit(2000003825.250:48300): avc: denied { read write } for pid=17162 comm="syz.8.11747" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4729.869565][ T31] audit: type=1400 audit(2000003825.250:48301): avc: denied { read write open } for pid=17162 comm="syz.8.11747" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4729.883834][ T31] audit: type=1400 audit(2000003825.270:48302): avc: denied { mounton } for pid=17162 comm="syz.8.11747" path="/181/file0" dev="tmpfs" ino=960 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4729.886072][T17163] fuse: Unknown parameter 'group_id00000000000000000000' [ 4729.948111][ T31] audit: type=1400 audit(2000003825.330:48303): avc: denied { ioctl } for pid=17154 comm="syz.9.11745" path="socket:[128996]" dev="sockfs" ino=128996 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4729.967960][ T31] audit: type=1400 audit(2000003825.350:48304): avc: denied { module_request } for pid=17154 comm="syz.9.11745" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4730.307859][ T31] audit: type=1400 audit(2000003825.690:48305): avc: denied { sys_module } for pid=17154 comm="syz.9.11745" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4731.776434][T17176] fuse: Unknown parameter 'group_id00000000000000000000' [ 4733.895093][T17186] fuse: Bad value for 'user_id' [ 4733.895474][T17186] fuse: Bad value for 'user_id' [ 4734.625538][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 4734.626019][ T31] audit: type=1400 audit(2000003830.010:48365): avc: denied { read } for pid=17189 comm="syz.8.11759" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4734.636840][ T31] audit: type=1400 audit(2000003830.020:48366): avc: denied { read open } for pid=17189 comm="syz.8.11759" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4734.651375][ T31] audit: type=1400 audit(2000003830.030:48367): avc: denied { create } for pid=17189 comm="syz.8.11759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4735.052513][ T31] audit: type=1400 audit(2000003830.440:48368): avc: denied { write } for pid=17191 comm="syz.8.11760" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4735.057582][ T31] audit: type=1400 audit(2000003830.440:48369): avc: denied { write open } for pid=17191 comm="syz.8.11760" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4735.094340][ T31] audit: type=1400 audit(2000003830.480:48370): avc: denied { mac_admin } for pid=17191 comm="syz.8.11760" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4735.098643][ T31] audit: type=1400 audit(2000003830.480:48371): avc: denied { relabelto } for pid=17191 comm="syz.8.11760" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4735.114605][ T31] audit: type=1400 audit(2000003830.500:48372): avc: denied { associate } for pid=17191 comm="syz.8.11760" name="dlm_plock" dev="devtmpfs" ino=87 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:smartcard_device_t:s0" [ 4735.134051][ T31] audit: type=1400 audit(2000003830.520:48373): avc: denied { ioctl } for pid=17191 comm="syz.8.11760" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4735.192849][ T31] audit: type=1400 audit(2000003830.580:48374): avc: denied { create } for pid=17191 comm="syz.8.11760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4735.826349][T17197] fuse: Bad value for 'user_id' [ 4735.826719][T17197] fuse: Bad value for 'user_id' [ 4738.724128][T17210] fuse: Bad value for 'user_id' [ 4738.724524][T17210] fuse: Bad value for 'user_id' [ 4739.649372][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4739.651117][ T31] audit: type=1400 audit(2000003835.030:48418): avc: denied { write } for pid=17214 comm="syz.8.11770" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4739.656094][ T31] audit: type=1400 audit(2000003835.040:48419): avc: denied { write open } for pid=17214 comm="syz.8.11770" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4739.705827][ T31] audit: type=1400 audit(2000003835.090:48420): avc: denied { mac_admin } for pid=17214 comm="syz.8.11770" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4739.707930][ T31] audit: type=1400 audit(2000003835.090:48421): avc: denied { relabelto } for pid=17214 comm="syz.8.11770" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4739.734817][ T31] audit: type=1400 audit(2000003835.120:48422): avc: denied { associate } for pid=17214 comm="syz.8.11770" name="dlm_plock" dev="devtmpfs" ino=87 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:smartcard_device_t:s0" [ 4739.765401][ T31] audit: type=1400 audit(2000003835.150:48423): avc: denied { ioctl } for pid=17214 comm="syz.8.11770" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:smartcard_device_t:s0" [ 4739.813134][ T31] audit: type=1400 audit(2000003835.200:48424): avc: denied { create } for pid=17216 comm="syz.9.11771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4739.816896][ T31] audit: type=1400 audit(2000003835.200:48425): avc: denied { create } for pid=17214 comm="syz.8.11770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4739.820358][ T31] audit: type=1400 audit(2000003835.200:48426): avc: denied { write } for pid=17214 comm="syz.8.11770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4739.828782][ T31] audit: type=1400 audit(2000003835.210:48427): avc: denied { ioctl } for pid=17216 comm="syz.9.11771" path="socket:[129389]" dev="sockfs" ino=129389 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4741.135308][T17223] comedi: valid board names for 8255 driver are: [ 4741.135706][T17223] 8255 [ 4741.141516][T17223] comedi: valid board names for vmk80xx driver are: [ 4741.141826][T17223] vmk80xx [ 4741.142068][T17223] comedi: valid board names for usbduxsigma driver are: [ 4741.142179][T17223] usbduxsigma [ 4741.142231][T17223] comedi: valid board names for usbduxfast driver are: [ 4741.142283][T17223] usbduxfast [ 4741.142326][T17223] comedi: valid board names for usbdux driver are: [ 4741.142396][T17223] usbdux [ 4741.142449][T17223] comedi: valid board names for ni6501 driver are: [ 4741.142497][T17223] ni6501 [ 4741.142558][T17223] comedi: valid board names for dt9812 driver are: [ 4741.142613][T17223] dt9812 [ 4741.142711][T17223] comedi: valid board names for ni_labpc_cs driver are: [ 4741.142807][T17223] ni_labpc_cs [ 4741.142860][T17223] comedi: valid board names for ni_daq_700 driver are: [ 4741.142952][T17223] ni_daq_700 [ 4741.143002][T17223] comedi: valid board names for labpc_pci driver are: [ 4741.143051][T17223] labpc_pci [ 4741.143097][T17223] comedi: valid board names for adl_pci9118 driver are: [ 4741.143171][T17223] pci9118dg [ 4741.143284][T17223] pci9118hg [ 4741.143337][T17223] pci9118hr [ 4741.143383][T17223] comedi: valid board names for 8255_pci driver are: [ 4741.143475][T17223] 8255_pci [ 4741.143566][T17223] comedi: valid board names for comedi_parport driver are: [ 4741.143715][T17223] comedi_parport [ 4741.143807][T17223] comedi: valid board names for comedi_test driver are: [ 4741.143935][T17223] comedi_test [ 4741.143985][T17223] comedi: valid board names for comedi_bond driver are: [ 4741.144031][T17223] comedi_bond [ 4742.555361][T17230] comedi: valid board names for 8255 driver are: [ 4742.557570][T17230] 8255 [ 4742.563129][T17230] comedi: valid board names for vmk80xx driver are: [ 4742.563799][T17230] vmk80xx [ 4742.564318][T17230] comedi: valid board names for usbduxsigma driver are: [ 4742.565031][T17230] usbduxsigma [ 4742.565512][T17230] comedi: valid board names for usbduxfast driver are: [ 4742.566973][T17230] usbduxfast [ 4742.567890][T17230] comedi: valid board names for usbdux driver are: [ 4742.568525][T17230] usbdux [ 4742.569173][T17230] comedi: valid board names for ni6501 driver are: [ 4742.569786][T17230] ni6501 [ 4742.570252][T17230] comedi: valid board names for dt9812 driver are: [ 4742.572005][T17230] dt9812 [ 4742.572502][T17230] comedi: valid board names for ni_labpc_cs driver are: [ 4742.573068][T17230] ni_labpc_cs [ 4742.573626][T17230] comedi: valid board names for ni_daq_700 driver are: [ 4742.574344][T17230] ni_daq_700 [ 4742.574936][T17230] comedi: valid board names for labpc_pci driver are: [ 4742.575447][T17230] labpc_pci [ 4742.575852][T17230] comedi: valid board names for adl_pci9118 driver are: [ 4742.576427][T17230] pci9118dg [ 4742.578104][T17230] pci9118hg [ 4742.578492][T17230] pci9118hr [ 4742.578838][T17230] comedi: valid board names for 8255_pci driver are: [ 4742.579285][T17230] 8255_pci [ 4742.579608][T17230] comedi: valid board names for comedi_parport driver are: [ 4742.580040][T17230] comedi_parport [ 4742.580864][T17230] comedi: valid board names for comedi_test driver are: [ 4742.581326][T17230] comedi_test [ 4742.581666][T17230] comedi: valid board names for comedi_bond driver are: [ 4742.582395][T17230] comedi_bond [ 4743.716917][T17237] netlink: 'syz.8.11779': attribute type 10 has an invalid length. [ 4743.719246][T17237] syz_tun: entered promiscuous mode [ 4745.028945][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 4745.029439][ T31] audit: type=1400 audit(2000003840.410:48470): avc: denied { write } for pid=17238 comm="syz.9.11780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4745.660417][T17252] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 4745.859926][ T31] audit: type=1400 audit(2000003841.240:48471): avc: denied { prog_load } for pid=17250 comm="syz.8.11782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4745.862567][ T31] audit: type=1400 audit(2000003841.240:48472): avc: denied { bpf } for pid=17250 comm="syz.8.11782" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4745.885110][ T31] audit: type=1400 audit(2000003841.250:48473): avc: denied { perfmon } for pid=17250 comm="syz.8.11782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4745.887315][ T31] audit: type=1400 audit(2000003841.270:48474): avc: denied { perfmon } for pid=17250 comm="syz.8.11782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4745.899106][ T31] audit: type=1400 audit(2000003841.270:48475): avc: denied { perfmon } for pid=17250 comm="syz.8.11782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4745.927020][ T31] audit: type=1400 audit(2000003841.300:48476): avc: denied { perfmon } for pid=17250 comm="syz.8.11782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4745.935790][ T31] audit: type=1400 audit(2000003841.300:48477): avc: denied { bpf } for pid=17250 comm="syz.8.11782" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.086278][ T31] audit: type=1400 audit(2000003841.440:48478): avc: denied { bpf } for pid=17250 comm="syz.8.11782" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.103264][ T31] audit: type=1400 audit(2000003841.470:48479): avc: denied { prog_run } for pid=17250 comm="syz.8.11782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4750.947426][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 4750.955236][ T31] audit: type=1400 audit(2000003846.330:48481): avc: denied { map_create } for pid=17262 comm="syz.8.11785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4751.133802][ T31] audit: type=1400 audit(2000003846.500:48482): avc: denied { map_read map_write } for pid=17262 comm="syz.8.11785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4752.035205][ T31] audit: type=1400 audit(2000003847.410:48483): avc: denied { map_create } for pid=17264 comm="syz.9.11786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4752.041888][ T31] audit: type=1400 audit(2000003847.410:48484): avc: denied { perfmon } for pid=17264 comm="syz.9.11786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4752.054243][ T31] audit: type=1400 audit(2000003847.420:48485): avc: denied { map_read map_write } for pid=17264 comm="syz.9.11786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4752.195534][ T31] audit: type=1400 audit(2000003847.580:48486): avc: denied { prog_load } for pid=17264 comm="syz.9.11786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4752.204116][ T31] audit: type=1400 audit(2000003847.590:48487): avc: denied { bpf } for pid=17264 comm="syz.9.11786" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4752.323062][ T31] audit: type=1400 audit(2000003847.700:48488): avc: denied { module_request } for pid=17265 comm="syz.8.11787" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4752.332554][ T31] audit: type=1400 audit(2000003847.720:48489): avc: denied { perfmon } for pid=17264 comm="syz.9.11786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4752.421612][ T31] audit: type=1400 audit(2000003847.730:48490): avc: denied { perfmon } for pid=17264 comm="syz.9.11786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4752.527162][T17266] Illegal XDP return value 4294967274 on prog (id 38) dev N/A, expect packet loss! [ 4754.883396][T17274] comedi: valid board names for 8255 driver are: [ 4754.884543][T17274] 8255 [ 4754.884808][T17274] comedi: valid board names for vmk80xx driver are: [ 4754.884972][T17274] vmk80xx [ 4754.885117][T17274] comedi: valid board names for usbduxsigma driver are: [ 4754.885257][T17274] usbduxsigma [ 4754.885395][T17274] comedi: valid board names for usbduxfast driver are: [ 4754.885535][T17274] usbduxfast [ 4754.885672][T17274] comedi: valid board names for usbdux driver are: [ 4754.885814][T17274] usbdux [ 4754.885957][T17274] comedi: valid board names for ni6501 driver are: [ 4754.886096][T17274] ni6501 [ 4754.886233][T17274] comedi: valid board names for dt9812 driver are: [ 4754.886372][T17274] dt9812 [ 4754.886508][T17274] comedi: valid board names for ni_labpc_cs driver are: [ 4754.886647][T17274] ni_labpc_cs [ 4754.886786][T17274] comedi: valid board names for ni_daq_700 driver are: [ 4754.886923][T17274] ni_daq_700 [ 4754.887067][T17274] comedi: valid board names for labpc_pci driver are: [ 4754.887205][T17274] labpc_pci [ 4754.887341][T17274] comedi: valid board names for adl_pci9118 driver are: [ 4754.887480][T17274] pci9118dg [ 4754.887615][T17274] pci9118hg [ 4754.887753][T17274] pci9118hr [ 4754.887891][T17274] comedi: valid board names for 8255_pci driver are: [ 4754.888035][T17274] 8255_pci [ 4754.888171][T17274] comedi: valid board names for comedi_parport driver are: [ 4754.888335][T17274] comedi_parport [ 4754.888476][T17274] comedi: valid board names for comedi_test driver are: [ 4754.888614][T17274] comedi_test [ 4754.888752][T17274] comedi: valid board names for comedi_bond driver are: [ 4754.888895][T17274] comedi_bond [ 4756.029838][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 4756.030323][ T31] audit: type=1400 audit(2000003851.410:48502): avc: denied { read write } for pid=17275 comm="syz.9.11790" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4756.126179][ T31] audit: type=1400 audit(2000003851.500:48503): avc: denied { read write open } for pid=17275 comm="syz.9.11790" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4756.127314][ T31] audit: type=1400 audit(2000003851.500:48504): avc: denied { ioctl } for pid=17275 comm="syz.9.11790" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4756.137817][ T31] audit: type=1400 audit(2000003851.500:48505): avc: denied { ioctl } for pid=17275 comm="syz.9.11790" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4756.146867][T17277] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4756.164775][T17277] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4757.635795][T17282] syz_tun: left promiscuous mode [ 4757.948189][ T31] audit: type=1400 audit(2000003853.330:48506): avc: denied { create } for pid=17281 comm="syz.8.11791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4757.998429][ T31] audit: type=1400 audit(2000003853.380:48507): avc: denied { write } for pid=17281 comm="syz.8.11791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4758.014791][ T31] audit: type=1400 audit(2000003853.400:48508): avc: denied { read } for pid=17281 comm="syz.8.11791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4758.017085][ T31] audit: type=1400 audit(2000003853.400:48509): avc: denied { read } for pid=17281 comm="syz.8.11791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4758.121542][ T31] audit: type=1400 audit(2000003853.410:48510): avc: denied { create } for pid=17281 comm="syz.8.11791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4758.156750][ T31] audit: type=1400 audit(2000003853.530:48511): avc: denied { ioctl } for pid=17281 comm="syz.8.11791" path="socket:[130207]" dev="sockfs" ino=130207 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4760.397396][T17291] comedi comedi3: 8255: I/O port conflict (0xfffffffb,4) [ 4760.414449][T17291] 8<--- cut here --- [ 4760.414861][T17291] Unable to handle kernel paging request at virtual address fee02169 when write [ 4760.415004][T17291] [fee02169] *pgd=80000080007003, *pmd=00000000 [ 4760.415998][T17291] Internal error: Oops: a06 [#1] SMP ARM [ 4760.417836][T17291] Modules linked in: [ 4760.418385][T17291] CPU: 0 UID: 0 PID: 17291 Comm: syz.8.11795 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 4760.418833][T17291] Hardware name: ARM-Versatile Express [ 4760.419111][T17291] PC is at subdev_8255_io+0x60/0x6c [ 4760.419576][T17291] LR is at subdev_8255_io+0x4c/0x6c [ 4760.419852][T17291] pc : [<813a5ab0>] lr : [<813a5a9c>] psr: 60000013 [ 4760.420709][T17291] sp : eb815cc0 ip : eb815cc0 fp : eb815cdc [ 4760.421797][T17291] r10: 00000001 r9 : 00000000 r8 : 00000084 [ 4760.422363][T17291] r7 : 00002166 r6 : 0000009b r5 : 8414c3c0 r4 : 00002169 [ 4760.422748][T17291] r3 : 0000009b r2 : fee02169 r1 : 00000001 r0 : 8414c3c0 [ 4760.423193][T17291] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 4760.423622][T17291] Control: 30c5387d Table: 856c5e40 DAC: fffffffd [ 4760.424003][T17291] Register r0 information: slab kmalloc-192 start 8414c3c0 pointer offset 0 size 192 [ 4760.425351][T17291] Register r1 information: non-paged memory [ 4760.425968][T17291] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4760.426623][T17291] Register r3 information: non-paged memory [ 4760.426943][T17291] Register r4 information: non-paged memory [ 4760.427259][T17291] Register r5 information: slab kmalloc-192 start 8414c3c0 pointer offset 0 size 192 [ 4760.427898][T17291] Register r6 information: non-paged memory [ 4760.428223][T17291] Register r7 information: non-paged memory [ 4760.428573][T17291] Register r8 information: non-paged memory [ 4760.428911][T17291] Register r9 information: NULL pointer [ 4760.429215][T17291] Register r10 information: non-paged memory [ 4760.429539][T17291] Register r11 information: 2-page vmalloc region starting at 0xeb814000 allocated at kernel_clone+0xac/0x3e4 [ 4760.430090][T17291] Register r12 information: 2-page vmalloc region starting at 0xeb814000 allocated at kernel_clone+0xac/0x3e4 [ 4760.430931][T17291] Process syz.8.11795 (pid: 17291, stack limit = 0xeb814000) [ 4760.431518][T17291] Stack: (0xeb815cc0 to 0xeb816000) [ 4760.431810][T17291] 5cc0: 813a5a50 8414c3c0 00002166 00002166 eb815cfc eb815ce0 813a5788 813a5a5c [ 4760.432179][T17291] 5ce0: 00002166 80508714 832e4084 832e4084 eb815d1c eb815d00 813a5b48 813a573c [ 4760.432584][T17291] 5d00: 832e4084 8414c3c0 eb815db0 00002166 eb815d5c eb815d20 813a5d3c 813a5ac8 [ 4760.432963][T17291] 5d20: 00000000 83ff7580 82822670 00000000 00000000 829c52b0 8414c3c0 00000000 [ 4760.433343][T17291] 5d40: eb815d98 8414c3c0 00000000 82b15078 eb815d94 eb815d60 81394c60 813a5c8c [ 4760.433742][T17291] 5d60: 20000140 00000000 eb815d84 20000140 8414c3c0 b5403587 20000140 85bb4800 [ 4760.434127][T17291] 5d80: 40946400 00000003 eb815e4c eb815d98 813908f0 81394b68 35353238 00000000 [ 4760.434490][T17291] 5da0: 00000000 00000000 00000000 fffffffb 00002166 00000002 00100000 000088d6 [ 4760.434905][T17291] 5dc0: 0000008f fffffffd 00100010 01000002 ffffffff 00000200 00000008 00000006 [ 4760.435322][T17291] 5de0: 00000001 00000007 00000007 00000009 00000003 00000003 00000101 00000100 [ 4760.435700][T17291] 5e00: 00000003 00000080 00000006 0000000b 00000001 00005721 000007db 00000008 [ 4760.436124][T17291] 5e20: 00000007 00000000 00000000 89d0b55c 00000000 85fdb9c0 8414c3c0 20000140 [ 4760.436520][T17291] 5e40: eb815f14 eb815e50 813918a4 81390824 00000000 eb815e54 eb815e54 89d0b55c [ 4760.436956][T17291] 5e60: 00000000 00000000 8246a3fc 0000005f 840a8258 8414c3f0 841598c4 85bb4800 [ 4760.437328][T17291] 5e80: eb815ee4 eb815e90 8079688c 8078cb7c 00000064 00000001 00000000 eb815eac [ 4760.437731][T17291] 5ea0: 85ca3e50 834f3c38 00006400 0000000b eb815ea0 00000000 eb815d30 89d0b55c [ 4760.438115][T17291] 5ec0: 85fdb9c0 40946400 20000140 20000140 00000003 85fdb9c0 eb815ef4 eb815ee8 [ 4760.438478][T17291] 5ee0: 807969ac 89d0b55c eb815f14 40946400 00000000 85fdb9c1 20000140 00000003 [ 4760.438860][T17291] 5f00: 85fdb9c0 85bb4800 eb815fa4 eb815f18 8056f16c 813912d4 ecac8b10 85bb4800 [ 4760.439235][T17291] 5f20: eb815f3c eb815f30 81a2db68 81a2da38 eb815f54 eb815f40 8026203c 802935d8 [ 4760.439594][T17291] 5f40: eb815fb0 40000000 eb815f84 eb815f58 802229ec 80261ff8 00000000 8281d09c [ 4760.439989][T17291] 5f60: eb815fb0 0014c4a0 ecac8b10 80222940 00000000 89d0b55c eb815fac 00000000 [ 4760.440429][T17291] 5f80: 00000000 002f6300 00000036 8020029c 85bb4800 00000036 00000000 eb815fa8 [ 4760.441220][T17291] 5fa0: 80200060 8056f048 00000000 00000000 00000003 40946400 20000140 00000000 [ 4760.441900][T17291] 5fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b950bc [ 4760.442277][T17291] 5fe0: 76b94ec0 76b94eb0 000193a4 00131f40 60000010 00000003 00000000 00000000 [ 4760.442794][T17291] Call trace: [ 4760.443079][T17291] [<813a5a50>] (subdev_8255_io) from [<813a5788>] (subdev_8255_do_config+0x58/0x60) [ 4760.443565][T17291] r7:00002166 r6:00002166 r5:8414c3c0 r4:813a5a50 [ 4760.443890][T17291] [<813a5730>] (subdev_8255_do_config) from [<813a5b48>] (subdev_8255_io_init+0x8c/0x9c) [ 4760.444428][T17291] r4:832e4084 [ 4760.444668][T17291] [<813a5abc>] (subdev_8255_io_init) from [<813a5d3c>] (dev_8255_attach+0xbc/0x114) [ 4760.445126][T17291] r7:00002166 r6:eb815db0 r5:8414c3c0 r4:832e4084 [ 4760.445482][T17291] [<813a5c80>] (dev_8255_attach) from [<81394c60>] (comedi_device_attach+0x104/0x240) [ 4760.445958][T17291] r10:82b15078 r9:00000000 r8:8414c3c0 r7:eb815d98 r6:00000000 r5:8414c3c0 [ 4760.446315][T17291] r4:829c52b0 [ 4760.446561][T17291] [<81394b5c>] (comedi_device_attach) from [<813908f0>] (do_devconfig_ioctl+0xd8/0x1e0) [ 4760.447011][T17291] r10:00000003 r9:40946400 r8:85bb4800 r7:20000140 r6:b5403587 r5:8414c3c0 [ 4760.447436][T17291] r4:20000140 [ 4760.447650][T17291] [<81390818>] (do_devconfig_ioctl) from [<813918a4>] (comedi_unlocked_ioctl+0x5dc/0x1b94) [ 4760.448088][T17291] r6:20000140 r5:8414c3c0 r4:85fdb9c0 [ 4760.448371][T17291] [<813912c8>] (comedi_unlocked_ioctl) from [<8056f16c>] (sys_ioctl+0x130/0xdc8) [ 4760.448810][T17291] r10:85bb4800 r9:85fdb9c0 r8:00000003 r7:20000140 r6:85fdb9c1 r5:00000000 [ 4760.449171][T17291] r4:40946400 [ 4760.449375][T17291] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4760.449779][T17291] Exception stack(0xeb815fa8 to 0xeb815ff0) [ 4760.450093][T17291] 5fa0: 00000000 00000000 00000003 40946400 20000140 00000000 [ 4760.450489][T17291] 5fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b950bc [ 4760.451139][T17291] 5fe0: 76b94ec0 76b94eb0 000193a4 00131f40 [ 4760.451754][T17291] r10:00000036 r9:85bb4800 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 4760.452140][T17291] r4:00000000 [ 4760.452620][T17291] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 4760.453371][T17291] ---[ end trace 0000000000000000 ]--- [ 4760.454195][T17291] Kernel panic - not syncing: Fatal exception [ 4760.456920][T17291] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:06:38 Registers: info registers vcpu 0 CPU#0 R00=83802c40 R01=0000003a R02=eba03000 R03=00000000 R04=838b4038 R05=83802c40 R06=80a719d0 R07=838b4042 R08=82828458 R09=00000000 R10=00007263 R11=eb815924 R12=00000002 R13=eb815918 R14=8295a2fc R15=80a71a28 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000200 R02=85766c00 R03=81885e6c R04=85766c00 R05=00000001 R06=857bb800 R07=860856c0 R08=df805dcc R09=00000040 R10=ddde3e88 R11=df805dc4 R12=df805d88 R13=df805c30 R14=81a2db48 R15=81883e6c PSR=20000113 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000