last executing test programs: 4m10.33903374s ago: executing program 1 (id=792): r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x416, 0x70bd29, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x24000005) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x17c, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x42a3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1a}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x12}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x121}]}, @TIPC_NLA_LINK={0x94, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab7e}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xce0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7e3}]}]}, @TIPC_NLA_NODE={0x60, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4e5}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "7d540c75b63519ac0c3c9de92f7efdbd64b1a4aa919a7a645c8fd07678"}}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8787}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x20000800}, 0x4) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r0) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x7c, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x404c000}, 0x4000080) (async) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3e8, 0x400, 0x70bd2c, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x840}, 0x0) (async) bind(r3, &(0x7f0000000600)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e23, 0x1}}, 0x80) r4 = syz_open_dev$sndpcmp(&(0x7f0000000680), 0x5, 0x101000) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r4, 0x800c4151, &(0x7f0000000740)={0x0, &(0x7f00000006c0)="11bfcaf8c5c0de5516b16b94ca9f67bbca8c5b2d76b95d8e267bece3174367073ddc73125f6df50bbf2302ffa0157578039078354cff96d159cb25758ec2162cceb626c193509f0c564bccb5bfa764", 0x4f}) (async) r5 = openat2(r0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x400000, 0xa, 0xc}, 0x18) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000800)={0x18}) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880), r0) sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x24, r7, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x1) (async, rerun: 32) r8 = openat$dlm_control(0xffffff9c, &(0x7f0000000980), 0x200180, 0x0) (rerun: 32) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000a00), r6) sendmsg$BATADV_CMD_GET_VLAN(r8, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r9, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x24}}, 0x2400c805) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000b00)={0x2, 'veth1_to_batadv\x00', {0x5b0}, 0x100}) (async) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@private2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000033c0)={{{@in6=@private2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f00000034c0)=0xe8) (async) r12 = syz_clone3(&(0x7f0000004700)={0x110004000, &(0x7f0000003580), &(0x7f00000035c0), &(0x7f0000003600), {}, &(0x7f0000003640)=""/4096, 0x1000, &(0x7f0000004640)=""/92, &(0x7f00000046c0)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x5, {r8}}, 0x58) syz_clone3(&(0x7f0000004b80)={0x10100, &(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)=0x0, {0x15}, &(0x7f00000049c0)=""/84, 0x54, &(0x7f0000004a40)=""/207, &(0x7f0000004b40)=[0x0, 0x0], 0x2, {r8}}, 0x58) r14 = openat$drirender128(0xffffff9c, &(0x7f0000004e80), 0xc0040, 0x0) r15 = openat$sequencer2(0xffffff9c, &(0x7f0000004ec0), 0x80001, 0x0) (async, rerun: 64) r16 = socket$unix(0x1, 0x2, 0x0) (async, rerun: 64) r17 = openat$dir(0xffffff9c, &(0x7f0000004f00)='./file0\x00', 0x42bc0, 0x80) (async, rerun: 64) r18 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000004f40)={0x1b, 0x0, 0x0, 0xfff, 0x0, r8, 0x1, '\x00', 0x0, r5, 0x1, 0x4}, 0x50) (rerun: 64) sendmsg$netlink(r8, &(0x7f0000005880)={&(0x7f0000000b40)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000004e40)=[{&(0x7f0000000cc0)={0x3a4, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, "", [@nested={0x5f, 0x1, 0x0, 0x1, [@typed={0x8, 0x116, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x9, 0x52, 0x0, 0x0, @str='syz0\x00'}, @nested={0x4, 0x11a}, @nested={0x4, 0x140}, @generic="8308dc471a0f81068302557609f7fef32a1c0df63f9b727d75455c", @nested={0x4, 0x20}, @typed={0x13, 0xab, 0x0, 0x0, @str='broadcast-link\x00'}, @typed={0x8, 0xf8, 0x0, 0x0, @fd=r5}, @nested={0x4, 0x115}]}, @typed={0xa, 0x6d, 0x0, 0x0, @str='-[*$\'\x00'}, @nested={0x11a, 0xd2, 0x0, 0x1, [@typed={0x14, 0x15, 0x0, 0x0, @ipv6=@loopback}, @typed={0x5a, 0xf3, 0x0, 0x0, @binary="e984fef6ea8afe65efdd59bd0f15731332751474c8863ae0a1d787938a0a7a5be891ac68f71ae3c4eae08af21f7d3d9bcbe8ba9ae7e598473e3c924d6cee3125c485ca899be6f20028c64c4ad3dc3e21e3c56c463962"}, @typed={0x8, 0x8b, 0x0, 0x0, @uid=r10}, @nested={0x4, 0x6a}, @nested={0x4, 0x12a3}, @nested={0x4, 0xff}, @generic="f033ddd09f33dc622ab199fc89b650c7da4816361c8455bcfc6049c0ab988a68dd621edb25fad5ec423fa6c64eab52e4f27dc3b8ad9bf684296fcde64211e8a215d15c98a3f7c0224ec1dcf227a20ed9acf93575eda9ef5ad11d6afe6d49f2d5a7c03c774807a3f030c8e7b73649bc16fd11c18ceaa42e1df20f3711da23fbda5dfcbe90fa4628e8f5c7d3cdc264", @nested={0x4, 0x15}]}, @nested={0x14a, 0x135, 0x0, 0x1, [@generic="fe7b1a59b9b8e77066718a588c7369f65f5244c9aeac2973b6e583733c3358a577903283b806ad025518ff613789e6856664d97de367ac2cb1e0df3aee50aa0ca3bd9988ba39259f9dba5aefffa4cb2379c14c130574a25bedb8b1740198accff76f3aac5305fe444c9ee47bd6bab6e43e71cca87e903a521c51510e3410ae72caf39fe533290ecfc4da4856c6cc03477f0ac61e0cef5e85039094728eabf257493ecc56f54c34e115465d0854defba59696e630933f6441c0c02d72d1dc96d375e7609818e7963e2c5f4b216cc3db6d", @nested={0x4, 0x109}, @nested={0x4, 0xda}, @typed={0x4, 0x36}, @nested={0x4, 0x128}, @typed={0x8, 0x147, 0x0, 0x0, @pid}, @typed={0x4, 0x9}, @generic="f189ea5cbf25963dd5dcae0067382713e298970e6f1e84ee689c3dfe97a976c679d3d2530aa2a8ec77b64cc6d23b1716f6567799d7a99dff92e5d71df42a7eb99e78e31a1e7c2803861c", @typed={0xc, 0xa3, 0x0, 0x0, @u64=0x3}, @nested={0x4, 0x89}]}, @generic="29f615bad317699dfef5", @generic="4e50c1090f9cb911a9f4831b5ddff1c9424bad6f2c2479f33a45f96802d3db2515f216fc3b314026572f9370e6e3063e89d7f64af727989233bea70c31a34f73a14b3a711b41b01eadf476fb770fcb3960a921d2ecb0d975c8da063a5a7758a1902dc091225f76fbdd3b32775720b291ec89aeb81e572a02ef7bff016d6d8b8b97221c68e7a45d30eb76c5c6d729022b0da5bbe269674b3c01c1fb37e221719ad29b3efbae610f09a96c65d0d3ff8144e342d9c114"]}, 0x3a4}, {&(0x7f0000001080)={0x2330, 0x16, 0x100, 0x70bd29, 0x25dfdbff, "", [@nested={0x1024, 0x116, 0x0, 0x1, [@nested={0x4, 0x12c}, @typed={0xc, 0x80, 0x0, 0x0, @u64=0x8000000000000001}, @nested={0x4, 0x130}, @nested={0x4, 0x108}, @nested={0x4, 0xd8}, @generic="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", @nested={0x4, 0xdd}]}, @nested={0x1224, 0x74, 0x0, 0x1, [@generic="bcee794d9594e051f14fef479d57a5d86ba0f107e40f7c4e624fb52ee4032a66f841c89cf72fbc4bea744b79de7fd963abbe684b0a91f7f1ff4f456477cc56ab7e03d6eedbb602e6f7accdd02c4d903fcb586c14870a59feafae5e14ef067af91131b08ad2dcd5fd4310a8190cad0dc0429a9bf5c58d252dd5ea892893a11535f345858178a24577052f0644f69b83c1da6379c1c6f584b68ec516e1fc8bb2aa1c86f98052f35fbaff17e5650b2b343815620f046519def82e3ced143a569962", @typed={0x8, 0xd2, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @nested={0x4, 0x145}, @typed={0x66, 0x108, 0x0, 0x0, @binary="30d6084f959da8c1a94b2ab56bfbdf38f1d57921937237bec9ee17691c290abb551d74b5b698afa11f6a55ebcdafb78ea2a7df5e601ffd095907ca19f5bdb0651a6f92d4d4cbec15e406f83f5ff24646e7f185b34aad34cc64952f33fabc9db5c3b5"}, @typed={0x8, 0x40, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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", @nested={0x4, 0x13f}, @nested={0x4, 0xed}, @nested={0x4, 0x50}, @typed={0xd7, 0x89, 0x0, 0x0, @binary="1614ced15ba5184dc36b6d09cd07ab03c06e46169bf1558a0ff1314b1cd0ab8b01b8bda0f156492282dc88e0539a5a52578e42024db458e39009a537947fa5821a07467277e4323093980c0c0b1a715149456d1e81079431bd9685a75f2fbc53b230ce91fc01123c67644a239d8db28918c28706615e7920ee17a5d549b5cc95feed5c13fd4b3dcf10248591046232df22d2fdff4778186b99a0d48da4be067ea71be9768c3511d512f6bed057e1df6ded2521394fe76ea65c29847313371f26fb729db9729951fc9bce5d0123a35bf8ccf90e"}]}, @generic="beccadee7780c9138446a7df3088caa28f32d058b44c678c45a18f132e895a526ed47489b64985ce234b933761a77446d8e31150127dacf4b2049aaed69b33fbd348c3d3c86a76a2633b8dcbcb4aab5d64d1d0e14f2eb7a8bf7ce822e368429c46bd5dc2c3ccdbabf9c03b893fcae232e7098890878758f1392f51a576b5130244635ca878b4fbb11cdf72a9376e292fa70ad894dbd62f1db52b5632219d949fbc67d6c74df7eec2c22d3d4dbec5424802b6269bc877c18a3ff6990368ce60e4a9ff4090138adc5ef0c99bffe1cec52e2b5c9246e16a2bf3"]}, 0x2330}, {&(0x7f0000003500)={0x6c, 0x2b, 0x300, 0x70bd27, 0x25dfdbfb, "", [@typed={0xb, 0x14d, 0x0, 0x0, @str='_&^![{\x00'}, @generic="a0f0cf7d873b6c686eb63b15dd13214e", @typed={0x8, 0xb3, 0x0, 0x0, @uid=r11}, @nested={0x38, 0xf9, 0x0, 0x1, [@typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@local}, @nested={0x4, 0x82}, @typed={0xc, 0xe, 0x0, 0x0, @u64=0x6}, @generic="e4bfe109f0671c17bfcb96a37269829a"]}]}, 0x6c}, {&(0x7f0000004780)={0x180, 0x39, 0x400, 0x70bd2a, 0x25dfdbff, "", [@nested={0x16d, 0x131, 0x0, 0x1, [@typed={0x8, 0xbc, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @typed={0x8, 0x43, 0x0, 0x0, @pid=r12}, @generic="919c92f4e20874a8230d2cd29659feb7fb1c54174dd76522c19cc7490ead48323b71f81d74a279e40bd0e874cc31e4d1219e9433ca6443d6fbb9d46f2d9120b8c45ac354b63906253460540474d01856a420b8ef1c514b0cb8310053b044e09329ccc32f868d612ed2313e34cc45c61d17d135e5080441369d5c2131415246c4a598d97efa313bf3fcb2a450983a95e4df50", @generic="fb012269c1179de3af771fcf5bc4c93ed233c53dd72d31c7be961c2e377d8b1aa7ccb1534b54fa1b321edb42f1ce025a9e581051cfe23a3767991b3a3c38942c1e90846e1a35bd070a9784574437535667eaf37141a6bcd76e2c188aee847fb5aa75a0cbbb5baafe03caabbf9935eaeb236a33be8cca235daf6c0bc9480c3b265c3d682e4b92591beafb7316a4d5e31aae05f39230a4f0a9974b8051ded5913815108984fba066fc079e4d40d8d9a911dd8692a9ba065b36adeb9d24bec92e0eedc3c3556b2950"]}]}, 0x180}, {&(0x7f0000004c00)={0x19c, 0x3b, 0x200, 0x70bd29, 0x25dfdbfd, "", [@typed={0x4, 0xaa}, @typed={0xc, 0x11a, 0x0, 0x0, @u64=0x9}, @typed={0x4, 0x132}, @typed={0x7, 0xe0, 0x0, 0x0, @str='ib\x00'}, @typed={0x8, 0x109, 0x0, 0x0, @pid=r13}, @nested={0x167, 0xd4, 0x0, 0x1, [@typed={0x4, 0xf5}, @generic="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", @generic="26b6169f542c47f820d781785784d84a97ccaa7435560e916cbfe22a2a87d1f043d9cf3f8b46a379994351aac6c75a0fc8ee422b10bb1baf4f96436fdeff89690e7006a5fd6a6c005b85ca07685d4a5bfe1c1a46312cd47d09c446f3d90974ebc43263"]}]}, 0x19c}, {&(0x7f0000004dc0)={0x7c, 0x1b, 0x8, 0x70bd28, 0x25dfdbff, "", [@nested={0xc, 0x0, 0x0, 0x1, [@nested={0x4, 0xfe}, @nested={0x4, 0x3d}]}, @typed={0x8, 0x1, 0x0, 0x0, @ipv4=@loopback}, @generic="6ffce6bb7470527c1b523443", @nested={0x4b, 0xcb, 0x0, 0x1, [@generic="9d2bd1f1f8185b03f55b301770d6587500d1d54c6fd766d9a2d84d65863fada79736b6ce1029127b6b3ff91749e0fca9826d39e40050d987d349e9df6b3c14c7db7a44", @typed={0x4, 0x7d}]}]}, 0x7c}], 0x6, &(0x7f0000005780)=[@rights={{0x24, 0x1, 0x1, [r14, r8, r6, r0, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r15, r16, r4, r4, r4, r17, r5, r18]}}, @rights={{0x14, 0x1, 0x1, [r5, r3]}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x18}}], 0xe4, 0x40000}, 0x48c5) 4m9.651467253s ago: executing program 1 (id=793): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x50) 4m9.550511901s ago: executing program 1 (id=794): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3, {0x2, 0x1}}, 0x18) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) 4m8.440603098s ago: executing program 1 (id=795): unshare(0x68040200) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) 4m8.220913755s ago: executing program 1 (id=796): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0x17c, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in=@remote, 0x0, 0xfffd, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@tmpl={0xc4, 0x5, [{{@in=@local, 0x0, 0x2b}, 0x0, @in=@broadcast}, {{@in6=@remote, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x7}, {{@in=@loopback, 0x0, 0x6c}, 0x0, @in=@local, 0x4000}]}]}, 0x17c}}, 0x4040000) 4m8.040896159s ago: executing program 1 (id=797): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3f0, 0x110, 0x1f8, 0x1f8, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @rand_addr, @rand_addr, 0x8}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x5}}}, {{@arp={@remote, @private, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 'gre0\x00', 'pimreg\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @mac=@random="8249ca4ee4e7", @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x2}}}}, 0x440) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open_tree(0xffffffffffffff9c, 0x0, 0x89901) 3m22.798112102s ago: executing program 32 (id=797): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x104, 0x4, 0x3f0, 0x110, 0x1f8, 0x1f8, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @rand_addr, @rand_addr, 0x8}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x5}}}, {{@arp={@remote, @private, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 'gre0\x00', 'pimreg\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @mac=@random="8249ca4ee4e7", @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0x4}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x2}}}}, 0x440) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open_tree(0xffffffffffffff9c, 0x0, 0x89901) 5.928300539s ago: executing program 0 (id=1264): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x1ff, 0x5]}, 0x8) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82187201, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300), r0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r2, 0x820, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x24040884) close(r0) r3 = accept$unix(r1, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000540), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x200}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4000090) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000006c0), r0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x2c, r5, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8044}, 0x8044) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$BLKFRAGET(r0, 0x1265, &(0x7f00000007c0)) timer_create(0x3, &(0x7f0000000800)={0x0, 0x19, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000840)=0x0) timer_settime(r6, 0x0, &(0x7f0000000880)={{0x0, 0x989680}}, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='attr\x00') r8 = syz_genetlink_get_family_id$team(&(0x7f0000000940), r0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000a40)={'syztnl1\x00', &(0x7f00000009c0)={'ip_vti0\x00', 0x0, 0x700, 0x11, 0x1000, 0x6, {{0xa, 0x4, 0x3, 0x0, 0x28, 0x68, 0x0, 0x5, 0x2f, 0x0, @multicast1, @empty, {[@timestamp={0x44, 0x14, 0x9f, 0x0, 0x1, [0x10001, 0x1, 0x7, 0x8]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000b40)={'syztnl0\x00', &(0x7f0000000a80)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0x2, 0xfffffff9, {{0x1c, 0x4, 0x0, 0x7, 0x70, 0x68, 0x0, 0xff, 0x4, 0x0, @empty, @remote, {[@rr={0x7, 0x27, 0x7f, [@dev={0xac, 0x14, 0x14, 0x1c}, @multicast2, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @multicast1, @loopback, @remote]}, @rr={0x7, 0x13, 0x62, [@multicast1, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010102, @loopback]}, @ssrr={0x89, 0x1f, 0xde, [@remote, @empty, @local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @remote]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000b80)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @remote}, &(0x7f0000000c00)=0xc) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000cc0)={'sit0\x00', &(0x7f0000000c40)={'syztnl1\x00', 0x0, 0x7, 0x10, 0x8, 0x54, {{0x14, 0x4, 0x3, 0x3, 0x50, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast1, @loopback, {[@timestamp_addr={0x44, 0xc, 0x52, 0x1, 0x9, [{@multicast2}]}, @noop, @generic={0x83, 0xf, "7620cdbd7c1ea0a0ef07acec85"}, @rr={0x7, 0x13, 0x98, [@multicast1, @multicast1, @multicast1, @rand_addr=0x64010100]}, @noop, @timestamp={0x44, 0xc, 0x6e, 0x0, 0x7, [0x1ff, 0x7fff]}]}}}}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000d00)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r7, &(0x7f0000001180)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d40)={0x3e0, r8, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r9}, {0x94, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x7, 0x3, 0x9, 0x8}]}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x0, 0x6, 0x7, 0xc}, {0xfffa, 0x7, 0x2, 0x9}, {0x8, 0x5, 0x9, 0xfffffffb}, {0x1ff, 0x3, 0x8, 0x292}]}}}]}}, {{0x8, 0x1, r10}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r11}}, {0x8}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x19c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r15}}, {0x8}}}]}}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x4d000}, 0x4080) r16 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001200), r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000012c0)={&(0x7f00000011c0), 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x24, r16, 0x100, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x480c0}, 0x2400c044) syz_genetlink_get_family_id$devlink(&(0x7f0000001300), r0) r17 = dup3(r0, r0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r17, &(0x7f0000001480)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001440)={&(0x7f00000013c0)={0x68, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0xd}}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}, @SEG6_ATTR_DST={0x14, 0x1, @private0}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x841) 5.438219117s ago: executing program 0 (id=1267): r0 = io_uring_setup(0x2dd9, &(0x7f0000000080)={0x0, 0x62c3, 0x10, 0x1, 0x119}) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3, {0x2, 0x1}}, 0x18) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, 0x0, 0x0, 0x0) openat$binder_debug(0xffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 4.772184169s ago: executing program 0 (id=1269): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000600), 0x1, 0x0) close$binfmt(r0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000cc0)={0x7, 0x0, 0x800, 0x70bd27, 0x65dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x60000000}, 0x20004810) 4.570195305s ago: executing program 0 (id=1272): sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20040080}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') fchdir(r0) exit(0xffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2c, r2, 0x61f3d6293b7647c9, 0x70bd2b, 0x24dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x2, 0xfd83, 0x1, @rand_addr=' \x01\x00', @local, 0x20, 0x700, 0x8, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) r5 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) bind$can_j1939(r5, &(0x7f0000000380)={0x1d, r6, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa8, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x28, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) getpeername$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000640)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000880)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)={0x1ac, r2, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x80}, 0x4000014) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack_irc', 0x0, 0x0) close_range(r10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$SOCK_DESTROY(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40044001}, 0x44014) openat$full(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) 1.961457777s ago: executing program 0 (id=1279): r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f000000a8c0)={0x0, 0x0, &(0x7f000000a880)={&(0x7f000000a800)={0x14, 0x0, 0x300, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400}, 0x48000) (fail_nth: 4) 1.487561824s ago: executing program 2 (id=1281): syz_open_dev$hiddev(&(0x7f0000000000), 0x85d3, 0x240) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x5451, 0x0) r4 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000140), 0x8002, 0x0) write$binfmt_format(r4, &(0x7f00000000c0)='1\x00', 0x2) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) r5 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) getsockname$netlink(r5, 0x0, &(0x7f0000004340)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x6ea202, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_CREATE_OPEN(r6, &(0x7f00000001c0)={0xa0, 0x0, 0x0, {{0x6, 0x2, 0x9, 0x3, 0x5, 0x6, {0x4, 0x3, 0x87b9, 0x1a8, 0x9, 0xfffffffffffffff8, 0x7, 0x9, 0xbf596d5, 0x2000, 0x8, 0x0, 0x0, 0x349, 0x5}}, {0x0, 0x10}}}, 0xa0) ioctl$EVIOCGUNIQ(r6, 0x80404508, &(0x7f0000000280)=""/4096) 1.240858463s ago: executing program 2 (id=1282): r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x80) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r2, 0x20, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x20000000) r3 = syz_open_dev$ndb(&(0x7f0000000400), 0x0, 0x8000) ioctl$BLKDISCARDZEROES(r3, 0x127c, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack_irc', 0x0, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) timerfd_settime(r4, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) ioctl$TCSETSW(r0, 0x5421, &(0x7f0000000f80)={0xffffff, 0x100000, 0x0, 0xfffffffc, 0x0, "a6f7a9be30c2525dcebdbec75fc89608539289"}) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000040)={0x2}) syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x80) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) (async) close_range(r1, 0xffffffffffffffff, 0x0) (async) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r2, 0x20, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x20000000) (async) syz_open_dev$ndb(&(0x7f0000000400), 0x0, 0x8000) (async) ioctl$BLKDISCARDZEROES(r3, 0x127c, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack_irc', 0x0, 0x0) (async) close_range(r4, 0xffffffffffffffff, 0x0) (async) timerfd_create(0x0, 0x0) (async) timerfd_settime(r4, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) (async) ioctl$TCSETSW(r0, 0x5421, &(0x7f0000000f80)={0xffffff, 0x100000, 0x0, 0xfffffffc, 0x0, "a6f7a9be30c2525dcebdbec75fc89608539289"}) (async) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000040)={0x2}) (async) 871.702572ms ago: executing program 2 (id=1283): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) close(r0) r1 = openat$selinux_mls(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x800000000b}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000000c0)="41ba6e8229091de131abd761dccd69e9c3a0f3905c4f83b0a745e40410a7b7d44a716c3d1a79179da83ece45b61730261fd9013d5e629107744da27864e7927ba6e1cd1c54983ae021d70e5a932da3ed235690c06c38b1a20ddf00b1aaa4e85111ab2b0f82470fd52134333e863cb203d63fbda5f9282eebdec226b0374d588346d60bb2c1b46f86a1b3a3c5f8cab6ba58bbcc934bb9cf8fd90bd7a2b2e474662b559c92edcbcf2b502887101e267e1506f8a87eea76cfc58163261439ac5bd20b9aa3a3c47c69bd692e314dc3c91eff73995fd743a95a284cc844da7af941f690dc6884ac2e3c9125c8ceace63c396ad7e76a600d8866bc03a5269baa44664f") r2 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0xaa) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5451, 0x0) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f0000000200)={0x60, 0x5, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0xb, &(0x7f0000000000)=[{0x8000, 0x100000000, 0x9}, {0x3ff, 0x801, 0x1}], 0x2, 0x6, 0x44, 0x4c, 0x45, 0x42}) r5 = syz_open_pts(r2, 0x20000) ioctl$TIOCL_SELLOADLUT(r5, 0x541c, &(0x7f0000000280)={0x5, 0x5, 0x4, 0x200, 0x8001}) 641.33763ms ago: executing program 2 (id=1284): r0 = io_uring_setup(0x2dd9, &(0x7f0000000080)={0x0, 0x62c3, 0x10, 0x1, 0x119}) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3, {0x2, 0x1}}, 0x18) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$binder_debug(0xffffff9c, 0x0, 0x0, 0x0) 358.592472ms ago: executing program 2 (id=1285): openat$ptmx(0xffffff9c, &(0x7f0000000100), 0x2000, 0x0) r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080), 0xfffffff7, 0xd0000) r2 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000240)={{0x7, 0x4, 0x3, 0xf, '\x00', 0x39}, 0x4, 0x40, 0x3, r2, 0x5, 0x7, 'syz0\x00', &(0x7f0000000140)=['cgroup2\x00', 'cgroup2\x00', 'R:,-\x00', 'R:,-\x00', '$\x00'], 0x1c}) r3 = fsmount(r0, 0x1, 0x0) r4 = openat$dlm_control(0xffffff9c, &(0x7f0000000040), 0x200001, 0x0) close(r4) memfd_create(&(0x7f0000000200)='R:,-\x00', 0x3) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) close_range(r3, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/fdt', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r5, 0x5450, 0x0) futex(&(0x7f0000000000), 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5450, 0x0) timer_create(0x0, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x16, &(0x7f0000000740)=0x201, 0x4) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r6, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) r7 = fcntl$dupfd(r6, 0x0, r6) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) recvmsg$can_raw(r10, &(0x7f00000001c0)={&(0x7f00000012c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) 128.29412ms ago: executing program 2 (id=1286): r0 = syz_socket_connect_nvme_tcp() sendto$inet_nvme_pdu(r0, &(0x7f0000000000)=@data_c2h={{0x7, 0x0, 0x18, 0x42, 0x9}, 0x8, 0x6, 0x8, 0xffffffff, "80529046"}, 0x80, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000080)) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) r2 = openat$full(0xffffff9c, &(0x7f00000000c0), 0x440, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000100)=0x1, 0x4) cachestat(r0, &(0x7f0000000140)={0x7041, 0x8}, &(0x7f0000000180), 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x1c, 0x17, {0x11, 0x800, @l2={'ib', 0x3a, 'veth0_vlan\x00'}}}}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) r3 = getpid() prlimit64(r3, 0xb, &(0x7f00000002c0)={0xe90, 0x2}, &(0x7f0000000300)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000380)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r2, &(0x7f0000000b40)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000b00)={&(0x7f00000003c0)={0x734, 0x0, 0x2, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x8, 0x19}}}}, [@NL80211_ATTR_TX_RATES={0x17c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xd0, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x2c, 0x2, [{0x2, 0x8}, {0x6, 0x4}, {0x7, 0x5}, {0x4, 0x2}, {0x7, 0x3}, {0x0, 0x9}, {0x7, 0x3}, {0x6}, {0x0, 0xa}, {0x4, 0x2}, {0x5, 0x1}, {0x0, 0x4}, {0x6}, {0x2, 0x4}, {0x1}, {0x2, 0x8}, {0x0, 0x3}, {0x5}, {0x7, 0x4}, {0x0, 0xa}, {0x5, 0x3}, {0x0, 0x6}, {0x0, 0x5}, {0x1, 0x7}, {0x2, 0x5}, {0x2, 0x1}, {0x4, 0x3}, {0x0, 0x4}, {0x2, 0x5}, {}, {0x3, 0x4}, {0x1}, {0x0, 0x6}, {0x0, 0x2}, {0x5, 0x2}, {0x3, 0x5}, {0x3, 0x4}, {0x3, 0x1}, {0x0, 0x2}, {0x7, 0x6}]}, @NL80211_TXRATE_HT={0x2e, 0x2, [{0x2, 0x6}, {0x1, 0x1}, {0x0, 0x5}, {0x6, 0x8}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x8}, {0x0, 0x2}, {0x0, 0x7}, {0x1, 0x5}, {0x1, 0x1}, {0x2, 0x7}, {0x4, 0x3}, {0x5, 0x8}, {0x1, 0x7}, {0x4, 0x3}, {0x4}, {0x4, 0xa}, {0x6, 0x8}, {0x1, 0x4}, {}, {0x0, 0x3}, {0x7, 0xa}, {0x6, 0x3}, {0x1, 0x8}, {0x0, 0x9}, {0x4, 0x9}, {0x1, 0x9}, {0x4, 0x8}, {0x3, 0x6}, {0x7, 0x4}, {0x7, 0x6}, {0x0, 0x6}, {0x5, 0x3}, {0x1, 0xa}, {0x6, 0x2}, {0x0, 0x6}, {0x6, 0x1}, {0x5, 0x6}, {0x6, 0x2}, {0x4}, {0x7, 0xa}]}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x2, 0x4, 0xb3, 0xa48, 0x52, 0x4fb, 0x4c, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x0, 0x3, 0x0, 0x2, 0xfb, 0x8, 0x5]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x2e, 0x2, [{0x5, 0x5}, {0x3, 0x8}, {0x0, 0x5}, {0x3, 0x5}, {0x6, 0x9}, {0x0, 0xa}, {0x1, 0x8}, {0x1, 0x9}, {0x3}, {0x6, 0xa}, {0x1, 0x8}, {0x1, 0x6}, {0x1, 0x1}, {0x7, 0x3}, {0x2}, {0x3, 0x7}, {0x5, 0x6}, {0x0, 0xa}, {0x1, 0x5}, {0x0, 0x3}, {0x1, 0x6}, {0x1, 0x5}, {0x0, 0x4}, {0x1, 0x4}, {0x1, 0x7}, {0x0, 0x8}, {0x0, 0x7}, {0x5, 0x3}, {0x2, 0x8}, {0x5, 0x2}, {0x1, 0x7}, {0x7, 0x4}, {0x3, 0x9}, {0x3, 0x6}, {0x5, 0x4}, {0x2, 0x9}, {0x2, 0x3}, {0x1, 0x3}, {0x7, 0x6}, {0x2, 0x8}, {0x0, 0x4}, {0x1, 0x5}]}, @NL80211_TXRATE_HT={0xd, 0x2, [{0x3, 0x6}, {0x5, 0x6}, {0x7, 0x6}, {0x2, 0x5}, {0x5, 0x5}, {0x3, 0x3}, {0x4, 0x8}, {0x4, 0x6}, {0x0, 0x8}]}]}, @NL80211_BAND_60GHZ={0x88, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xd, 0x1, [0xb, 0x5, 0x1b, 0x5, 0x30, 0x4, 0xc, 0x66, 0x12]}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x6, 0x3, 0xfffb, 0xc, 0x7ff, 0x8001, 0x2b3, 0x4]}}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x3, 0x8, 0x2, 0x1, 0xc98, 0x7, 0xdc, 0x8]}}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x6, 0x1b, 0xb, 0x3ff, 0x2, 0x7, 0x200, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x5e6, 0x80, 0x83cb, 0x5, 0x1, 0x2, 0xfff]}}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0xc, 0x77, 0x24, 0xc, 0xc, 0x6, 0x12, 0x1b, 0x1, 0x12, 0x48, 0xb, 0x4]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x6c, 0x60, 0x6, 0x5, 0x30, 0x1f, 0x1, 0x1, 0x18, 0x1d, 0x60, 0x48, 0x5, 0x4, 0x4, 0x1]}]}]}, @NL80211_ATTR_TX_RATES={0x94, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x2c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x18, 0x66, 0x2, 0x48, 0x24, 0x62, 0xc, 0xb, 0x30, 0xc, 0x1b, 0xc, 0x18, 0x48, 0xc, 0x60, 0x6c, 0x60, 0x2, 0xc]}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_6GHZ={0x64, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xe, 0x1, [0x6c, 0x60, 0x5, 0x16, 0x1, 0x6c, 0x36, 0x36, 0x4, 0xb]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x1, 0xffc0, 0x5, 0x7, 0x5, 0x100, 0x9b11, 0x101]}}, @NL80211_TXRATE_LEGACY={0x23, 0x1, [0x4, 0x4, 0x2, 0x30, 0x12, 0x4, 0x4, 0x6, 0x1b, 0x22, 0x24, 0x22, 0x36, 0x3, 0x0, 0x5, 0xb, 0x31aa4eb4e228a300, 0x48, 0x48, 0x6c, 0xb, 0x3, 0x60, 0x6a, 0x6c, 0x24, 0x6c, 0xc, 0x30, 0x18]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_GI={0x5}]}]}, @NL80211_ATTR_TX_RATES={0x128, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HE={0x14, 0x5, {[0x2, 0x6, 0x5, 0x4, 0xff, 0xfff7, 0x6, 0x9]}}]}, @NL80211_BAND_60GHZ={0x3c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x24, 0x2, [{0x3, 0x2}, {0x2, 0x9}, {0x0, 0x8}, {0x3, 0x8}, {0x0, 0x7}, {0x1, 0x3}, {0x2, 0x5}, {0x7, 0x7}, {0x0, 0xa}, {0x6, 0x1}, {0x2, 0x3}, {0x0, 0x9}, {0x7}, {0x4, 0x1}, {0x7, 0x2}, {0x6}, {0x4}, {0x1, 0x4}, {0x4, 0x4}, {0x3, 0x9}, {0x0, 0x8}, {0x6, 0x6}, {0x1, 0x6}, {0x7, 0x3}, {0x5, 0x6}, {0x4}, {0x1, 0xa}, {0x4, 0x6}, {0x4}, {0x0, 0x6}, {0x5, 0xa}, {0x1, 0x8}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x8, 0x6, 0x7, 0x6, 0x10, 0x9, 0x101]}}]}, @NL80211_BAND_60GHZ={0x14, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_60GHZ={0x14, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}]}, @NL80211_BAND_6GHZ={0x38, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{0x2, 0x5}, {0x1, 0x7}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0xc, 0x6c, 0x18, 0x48, 0x60, 0x12, 0xc, 0x4, 0x5, 0xb, 0x6, 0x30, 0x16, 0x1, 0x18, 0x1, 0x30, 0x5, 0xc, 0x48, 0x5, 0x4, 0x18, 0x5, 0x12, 0x5, 0x9, 0x2, 0x6]}]}, @NL80211_BAND_2GHZ={0x2c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x9, 0x7ff, 0x1, 0x9, 0x8, 0x101, 0x7ff]}}]}, @NL80211_BAND_6GHZ={0x44, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0xc, 0x30, 0x4, 0x0, 0xb, 0x18, 0x12, 0x18, 0x2, 0x3, 0x9, 0x3, 0x18, 0x9, 0x48, 0x30, 0x30, 0x9, 0xb, 0x24, 0x3, 0x1, 0x6, 0x8425c46a6b7b05cf, 0x30, 0x6, 0x12, 0x3, 0xb, 0x30, 0x5]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x1ff, 0x5, 0x55, 0x211d, 0xa, 0xf6d6, 0x101, 0x630e]}}]}]}, @NL80211_ATTR_TX_RATES={0x154, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}]}, @NL80211_BAND_6GHZ={0x14, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_60GHZ={0x8c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HE={0x14, 0x5, {[0x3, 0x116c, 0xb, 0x1, 0xbb9, 0x7f, 0x2, 0x9]}}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x2, 0x1b, 0x40134f5ca14bf57, 0x24, 0x6, 0xb, 0x36, 0x3, 0x9, 0xb, 0x36, 0x16, 0x24, 0x4, 0x16, 0x36, 0x6, 0x6c, 0x24, 0x36, 0x16, 0x1b, 0x1, 0x16, 0x60, 0x48]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0xfffa, 0x9d9a, 0x8f, 0x6, 0x203, 0x800, 0x0, 0x7]}}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x6, 0x9}, {0x0, 0x4}, {0x2, 0x9}, {0x1, 0x4}, {0x2, 0x6}, {0x5, 0x7}, {0x7, 0x4}, {0x6, 0x9}, {0x2, 0x7}, {0x1, 0x5}, {0x6, 0x6}, {0x6, 0x7}, {0x7, 0x4}, {0x3, 0x7}, {0x5, 0x8}, {0x2, 0x3}, {0x5, 0x8}, {0x6, 0x8}, {0x1, 0x9}, {0x5, 0x7}, {0x1, 0x6}, {0x5, 0x4}, {0x1, 0x7}, {0x5, 0xa}, {0x1, 0xa}, {0x6, 0xa}, {0x7, 0x1}, {0x2, 0x3}, {0x7, 0x2}, {0x0, 0x3}, {0x4, 0x7}, {0x5}, {0x7, 0x1}, {0x1, 0x7}, {0x7, 0x4}, {0x3, 0x8}, {0x7}, {0x4, 0x1}, {0x1, 0xa}, {0x0, 0x4}, {0x0, 0x3}, {0x0, 0x9}, {0x7, 0x2}, {0x3, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x28, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x82, 0x4, 0x82f, 0xc50, 0x3b9, 0x2, 0x2]}}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x44, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x3d, 0x2, [{0x4}, {0x5}, {0x7, 0x4}, {0x0, 0x3}, {0x2, 0x7}, {0x5, 0x9}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x5, 0x8}, {0x7, 0x7}, {0x4}, {0x2, 0x8}, {0x3, 0xa}, {0x1, 0x2}, {0x6, 0x9}, {0x3, 0x1}, {0x3, 0x5}, {0x2, 0x2}, {0x3, 0x8}, {0x3, 0x9}, {0x5}, {0x1, 0xa}, {0x0, 0x8}, {0x1, 0x8}, {0x1}, {0x1, 0x2}, {0x5, 0x3}, {0x5}, {0x5, 0x2}, {0x6}, {0x0, 0x7}, {0x0, 0x1}, {0x3, 0x3}, {0x1, 0xa}, {0x0, 0x6}, {0x4, 0x4}, {0x7}, {0x5, 0x1}, {0x2, 0x6}, {0x2, 0x9}, {0x1, 0x5}, {0x5, 0x1}, {0x2, 0x8}, {0x3, 0x8}, {0x6, 0x1}, {0x1, 0x1}, {0x0, 0x7}, {0x0, 0xa}, {0x2, 0x4}, {0x4, 0x1}, {0x5, 0x8}, {0x6, 0x1}, {0x1, 0x8}, {0x0, 0x4}, {0x5}, {0x7, 0xa}]}]}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x1a8, 0x664, 0x2, 0x7, 0x259, 0x6, 0x2]}}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0x30, 0xc]}]}]}, @NL80211_ATTR_TX_RATES={0x244, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x50, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x48, 0x6c, 0x2, 0x9, 0x3, 0xb, 0x2, 0x4, 0xb, 0x18, 0x18, 0x2, 0x18, 0x9, 0x12, 0x9, 0x2, 0x4, 0x30, 0x18]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x9, 0x9, 0x4, 0x3ff, 0xc77, 0x7, 0x4]}}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x1, 0x2, 0x16, 0x6, 0x1, 0xd, 0x3, 0x6, 0xb, 0x3, 0xc, 0x6c]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x2}, @NL80211_TXRATE_HE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x68, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x8, 0x80c1, 0xf972, 0xd83d, 0xf, 0xf24, 0x2]}}, @NL80211_TXRATE_HT={0x45, 0x2, [{0x2, 0xa}, {0x2, 0x1}, {0x1, 0x2}, {0x2, 0x6}, {0x3, 0x7}, {0x6}, {0x4, 0x7}, {0x1, 0x2}, {0x4, 0xa}, {0x2, 0x4}, {0x1, 0x8}, {0x4, 0x6}, {0x2, 0x4}, {0x4, 0x1}, {0x5, 0xa}, {0x2, 0x4}, {0x5, 0x2}, {0x1, 0x4}, {0x2, 0x7}, {0x4, 0x8}, {0x2, 0xa}, {0x4, 0x4}, {0x1, 0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x6, 0x7}, {0x2, 0x1}, {0x1, 0x9}, {0x4, 0x4}, {0x3, 0xa}, {0x7, 0xa}, {0x2, 0x3}, {0x1, 0xa}, {0x0, 0x9}, {0x1, 0x3}, {0x4, 0x6}, {0x6, 0x9}, {0x0, 0x3}, {0x3, 0x8}, {0x0, 0xa}, {0x0, 0x4}, {0x2, 0x1}, {0x5}, {0x5, 0xa}, {0x5, 0xa}, {0x5, 0x3}, {0x2, 0x7}, {0x0, 0x6}, {0x7, 0x5}, {0x0, 0x5}, {0x5, 0x1}, {0x6, 0x9}, {0x6, 0x9}, {0x1, 0x2}, {0x3, 0x9}, {0x1, 0x6}, {0x7, 0x5}, {0x4, 0x4}, {0x7, 0x8}, {0x0, 0x2}, {0x6, 0x1}, {0x2, 0x2}, {0x4, 0x3}, {0x4, 0x3}, {0x0, 0x4}]}]}, @NL80211_BAND_6GHZ={0x34, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff, 0x4, 0x1, 0x8, 0xfff4, 0x3, 0xee6, 0x6]}}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x3, 0x6, 0x6, 0x8, 0xcc97, 0x5, 0x7ff, 0x2]}}]}, @NL80211_BAND_60GHZ={0x84, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0x4, 0x1, 0x1, 0xd, 0x0, 0x6, 0x3]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8ce2, 0x7fe, 0x9, 0x0, 0x7, 0x3, 0x401, 0x8]}}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x9, 0x7, 0xc, 0x0, 0x93, 0x6, 0x10, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x4, 0x6, 0x5, 0x5, 0x101, 0x9, 0xeeb5]}}, @NL80211_TXRATE_HT={0x11, 0x2, [{0x3, 0x9}, {0x3, 0x8}, {0x0, 0x19}, {0x0, 0x4}, {0x5, 0x6}, {0x1, 0x5}, {}, {0x5}, {0x6, 0x9}, {0x7, 0x5}, {0x7, 0x6}, {0x7, 0xa}, {0x6, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x9, 0x7ff, 0x9, 0x8, 0x3a91, 0x0, 0x0, 0x5]}}]}, @NL80211_BAND_5GHZ={0x6c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6076, 0xfff, 0xb63, 0x8, 0x0, 0x5be, 0xa, 0x5]}}, @NL80211_TXRATE_LEGACY={0x22, 0x1, [0x4, 0x6, 0x1b, 0x48, 0x24, 0x30, 0x1b, 0x1, 0x16, 0x6, 0x5, 0x9, 0x18, 0x60, 0x6, 0x12, 0x30, 0x1, 0x3, 0xb, 0x4, 0x5, 0x0, 0x6, 0x16, 0x48, 0x6c, 0x1b, 0x2, 0x16]}, @NL80211_TXRATE_HT={0x1b, 0x2, [{0x7, 0x4}, {0x7, 0x9}, {0x5}, {0x3, 0x3}, {0x3, 0xa}, {0x0, 0x7}, {0x6, 0x7}, {0x3, 0x4}, {0x5, 0x8}, {0x3, 0x4}, {0x4, 0x9}, {0x4, 0x8}, {0x1, 0x1}, {0x7, 0x7}, {0x1, 0x4}, {0x3, 0x5}, {0x6, 0x7}, {0x7, 0x2}, {0x4, 0x9}, {0x7, 0x2}, {0x3}, {}, {0x7, 0x9}]}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x1, 0x7a, 0x5, 0x200, 0xf36f, 0x7f, 0x3, 0x8]}}]}, @NL80211_BAND_5GHZ={0x4}, @NL80211_BAND_6GHZ={0x1c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x8, 0x1, [0x60, 0x48, 0x41, 0x3]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_6GHZ={0x44, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HE_GI={0x5, 0x6, 0x2}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x16, 0x5, 0x62, 0x16, 0x3, 0x1b, 0x5, 0x18, 0x5, 0x30, 0x24, 0x60, 0x5, 0x5, 0x5d, 0xb, 0x18, 0x12, 0x30, 0x2, 0x16, 0x6c, 0x48, 0xb, 0x1, 0xc]}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}, @NL80211_ATTR_TX_RATES={0x3c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xe, 0x1, [0x0, 0x1b, 0x3, 0x0, 0x0, 0x18, 0xb, 0x2, 0x12, 0xc]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x4, 0x3, 0x9, 0x8c48, 0x6fa, 0x8, 0x7]}}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x2}]}]}]}, 0x734}}, 0x20000000) kcmp(r3, r3, 0x6, r1, r1) close_range(r0, r2, 0x2) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000b80)={0x0, 0x200, 0x7, 0x10}) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000fc0)={0x3, 0x0, 0x7, 0x7, 0x19d, &(0x7f0000000bc0)}) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000001000)=0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001080), r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000010c0)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000001100)={@rand_addr, @dev, 0x0}, &(0x7f0000001140)=0xc) getsockname$packet(r2, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000001280)={'syztnl1\x00', &(0x7f0000001200)={'ip6tnl0\x00', 0x0, 0x38, 0x5, 0x5, 0xcfdd, 0x4, @remote, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xe}}, 0x7800, 0x8, 0x2457, 0xffff}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000001440)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001400)={&(0x7f00000012c0)={0x10c, r5, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x800}, 0x0) statx(r2, &(0x7f0000001880)='./file0\x00', 0x4000, 0x2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000019c0)={0x0, 0x0}, &(0x7f0000001a00)=0xc) read$FUSE(r2, &(0x7f0000001a40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r14 = syz_open_dev$rtc(&(0x7f0000003a80), 0xa, 0x145ec3) sendmsg$unix(r2, &(0x7f0000005e80)={&(0x7f0000001480)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001840)=[{&(0x7f0000001500)="fb68474a43774fc3f43fee6683c7d2fd5cca3dc267238194ecf193c20bc53c1b05cc3b0695bdff39ed2d755fb100121a913febcccf91f5366d8d25dfe3f6a870b458deefbcca6b7c1a8b7c75f5e735c71a07bff9da0e988191a1666792f3ded77e84354990f454f3c563ee667e689447010ed829b5cb557b4b5ebe7036de8003b51610baa098a49371aca9a9c4ac49223ab82fc89b549871491ebb2ed5d8915cd5f496", 0xa3}, {&(0x7f00000015c0)="9fa20423e394b0d74f14cb7c3b7064ace17bf553077feda5910e5d2add7bcacd7575a99e1605501ef750dc1dff385b62e09e4c0808eaa737256d951a9b88eb372222bb1a9eda323857df18e17a1bc268eea3b541e419443802ca7ef74a7001703ec442ad16a496ec40e85131bdebe524095e47a9d558fd82605b48f5ae283cb48a4a193ca5f78256aff88b13ff426baf97f1addbc1c397c8bc1d5698273cacb4165dab0a", 0xa4}, {&(0x7f0000001680)="1cfe495066b715e5f68c0d2c3d212fe20ecddb73885e68db9df49b75e9e42db1f8eb3474eadc5b496a6346caec1d73a9660a16292f8138", 0x37}, {&(0x7f00000016c0)="aae419663bd27ad6aa2e66834d411b91", 0x10}, {&(0x7f0000001700)="45f507652373f4f036c5188053cf6672fef746844a11f674d194891e1cc596530ed408c8570f07bdab31185654e38c2e63b1eb0367f90cd0b08bc4ae3171eb3ae4129c658ad6f778d2d41fe6c21cdc902f9c53277ed9d317a0164159236545b3348d2c1ecb982d1a402c76d76238f1430eb966645adb26a2562f876d220ce2265fbf487f2bd4807c19a7f2c41ace913db7e6e652a008016a85e3b58ecd6bd1f5119507707c5b0d544404b830cbf8d2c58c2b4f3ea2c20948be", 0xb9}, {&(0x7f00000017c0)="526b2180aeecbe3fbffab297b1fb8c34b9814d1aa4a5f6b40b29a6b04bc68c5d32e08d08abeff2ed14f001aff0721848a451743f4ccf73bc809b5614fc51c9a5257d", 0x42}], 0x6, &(0x7f0000005dc0)=[@cred={{0x18, 0x1, 0x2, {r3, r10, r11}}}, @cred={{0x18, 0x1, 0x2, {r3, r12, r13}}}, @rights={{0x14, 0x1, 0x1, [r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r2, r0, r14, r1]}}, @cred={{0x18, 0x1, 0x2, {r3}}}, @cred={{0x18, 0x1, 0x2, {r3}}}, @cred={{0x18, 0x1, 0x2, {r3}}}], 0xa8, 0x4000}, 0x4008080) 0s ago: executing program 0 (id=1280): r0 = openat$comedi(0xffffff9c, &(0x7f0000000440)='/dev/comedi0\x00', 0x101001, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = dup2(r0, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r5, 0x0) r6 = dup3(r5, r4, 0x0) accept$inet(r6, 0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendto(r3, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x3, @local, 0x1}, 0x80) write$hidraw(0xffffffffffffffff, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 53.844329][ T29] audit: type=1400 audit(53.750:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.849113][ T29] audit: type=1400 audit(53.770:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32195' (ED25519) to the list of known hosts. [ 64.298002][ T29] audit: type=1400 audit(64.190:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.313021][ T29] audit: type=1400 audit(66.220:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.409545][ T29] audit: type=1400 audit(66.320:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.181640][ T29] audit: type=1400 audit(69.100:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.186212][ T29] audit: type=1400 audit(69.100:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.200559][ T3091] cgroup: Unknown subsys name 'net' [ 69.206244][ T29] audit: type=1400 audit(69.120:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.384459][ T3091] cgroup: Unknown subsys name 'cpuset' [ 69.391541][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 69.393450][ T3091] cgroup: Unknown subsys name 'rlimit' [ 69.584161][ T29] audit: type=1400 audit(69.500:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.586081][ T29] audit: type=1400 audit(69.500:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.589673][ T29] audit: type=1400 audit(69.510:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.730402][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.733875][ T29] audit: type=1400 audit(69.650:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.735709][ T29] audit: type=1400 audit(69.650:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.784104][ T29] audit: type=1400 audit(69.700:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.786602][ T29] audit: type=1400 audit(69.700:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.974896][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.937856][ T29] audit: type=1400 audit(78.850:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.005727][ T29] audit: type=1400 audit(78.920:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.009762][ T29] audit: type=1400 audit(78.930:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.021697][ T29] audit: type=1400 audit(78.940:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.051870][ T29] audit: type=1400 audit(78.970:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.053818][ T29] audit: type=1400 audit(78.970:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.140738][ T29] audit: type=1400 audit(79.060:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.738094][ T29] audit: type=1400 audit(79.650:78): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.030608][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.046335][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.164818][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.173817][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.081755][ T3097] hsr_slave_0: entered promiscuous mode [ 82.087081][ T3097] hsr_slave_1: entered promiscuous mode [ 82.184130][ T3096] hsr_slave_0: entered promiscuous mode [ 82.186449][ T3096] hsr_slave_1: entered promiscuous mode [ 82.193544][ T3096] debugfs: 'hsr0' already exists in 'hsr' [ 82.194692][ T3096] Cannot create hsr debugfs directory [ 82.706247][ T29] audit: type=1400 audit(82.620:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.713724][ T29] audit: type=1400 audit(82.630:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.734848][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.764360][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.775458][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.793543][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.865648][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.876361][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.895191][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.914560][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.651580][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.724021][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.302085][ T3096] veth0_vlan: entered promiscuous mode [ 86.326672][ T3096] veth1_vlan: entered promiscuous mode [ 86.391381][ T3097] veth0_vlan: entered promiscuous mode [ 86.412587][ T3097] veth1_vlan: entered promiscuous mode [ 86.435725][ T3096] veth0_macvtap: entered promiscuous mode [ 86.453907][ T3096] veth1_macvtap: entered promiscuous mode [ 86.495111][ T3097] veth0_macvtap: entered promiscuous mode [ 86.502419][ T3097] veth1_macvtap: entered promiscuous mode [ 86.523962][ T1307] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.524612][ T1307] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.524698][ T1307] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.524751][ T1307] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.611230][ T32] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.611998][ T32] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.612360][ T32] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.612551][ T32] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.674898][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 86.675927][ T29] audit: type=1400 audit(86.590:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.687804][ T29] audit: type=1400 audit(86.600:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.oggRIb/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.690448][ T29] audit: type=1400 audit(86.610:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.707667][ T29] audit: type=1400 audit(86.620:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.oggRIb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.727662][ T29] audit: type=1400 audit(86.640:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.oggRIb/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.745703][ T29] audit: type=1400 audit(86.660:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.752815][ T29] audit: type=1400 audit(86.670:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.755945][ T29] audit: type=1400 audit(86.670:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=3201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.768614][ T29] audit: type=1400 audit(86.680:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.768866][ T29] audit: type=1400 audit(86.680:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.853528][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.853554][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.579949][ T3808] Zero length message leads to an empty skb [ 94.227953][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 94.229165][ T29] audit: type=1400 audit(94.140:111): avc: denied { create } for pid=3847 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.234614][ T29] audit: type=1400 audit(94.150:112): avc: denied { setopt } for pid=3847 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.249579][ T29] audit: type=1400 audit(94.170:113): avc: denied { write } for pid=3847 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.259079][ T29] audit: type=1400 audit(94.180:114): avc: denied { ioctl } for pid=3847 comm="syz.0.19" path="socket:[3298]" dev="sockfs" ino=3298 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.261017][ T29] audit: type=1400 audit(94.180:115): avc: denied { bind } for pid=3847 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.423138][ T3853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3853 comm=syz.0.21 [ 94.425428][ T3853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3853 comm=syz.0.21 [ 94.431547][ T3853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3853 comm=syz.0.21 [ 98.382110][ T29] audit: type=1400 audit(98.300:116): avc: denied { write } for pid=3884 comm="syz.1.37" name="kcm" dev="proc" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 100.304341][ T29] audit: type=1400 audit(100.220:117): avc: denied { ioctl } for pid=3894 comm="syz.0.42" path="socket:[2371]" dev="sockfs" ino=2371 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.312186][ T29] audit: type=1400 audit(100.230:118): avc: denied { write } for pid=3894 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 101.343529][ T29] audit: type=1400 audit(101.260:119): avc: denied { create } for pid=3904 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.352184][ T29] audit: type=1400 audit(101.270:120): avc: denied { ioctl } for pid=3904 comm="syz.1.47" path="socket:[2398]" dev="sockfs" ino=2398 ioctlcmd=0x5601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.355603][ T3905] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 101.361911][ T29] audit: type=1400 audit(101.280:121): avc: denied { write } for pid=3904 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 104.326610][ T29] audit: type=1400 audit(104.240:122): avc: denied { create } for pid=3925 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.331351][ T29] audit: type=1400 audit(104.250:123): avc: denied { bind } for pid=3925 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.345553][ T29] audit: type=1400 audit(104.260:124): avc: denied { accept } for pid=3925 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.351269][ T29] audit: type=1400 audit(104.270:125): avc: denied { write } for pid=3925 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.362136][ T29] audit: type=1400 audit(104.280:126): avc: denied { create } for pid=3925 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.179741][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 106.179998][ T29] audit: type=1400 audit(106.100:128): avc: denied { prog_load } for pid=3937 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.182677][ T29] audit: type=1400 audit(106.100:129): avc: denied { bpf } for pid=3937 comm="syz.0.62" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 106.182875][ T29] audit: type=1400 audit(106.100:130): avc: denied { perfmon } for pid=3937 comm="syz.0.62" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 106.199188][ T29] audit: type=1400 audit(106.120:131): avc: denied { nlmsg_read } for pid=3937 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 106.208693][ T29] audit: type=1400 audit(106.130:132): avc: denied { create } for pid=3937 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 110.505792][ T3985] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3985 comm=syz.1.77 [ 111.940811][ T29] audit: type=1400 audit(111.860:133): avc: denied { create } for pid=3995 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 114.000948][ T29] audit: type=1400 audit(113.920:134): avc: denied { create } for pid=4014 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.999749][ T4027] FAULT_INJECTION: forcing a failure. [ 116.999749][ T4027] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 117.001124][ T4027] CPU: 1 UID: 0 PID: 4027 Comm: syz.0.94 Not tainted syzkaller #0 PREEMPT [ 117.001446][ T4027] Hardware name: ARM-Versatile Express [ 117.001718][ T4027] Call trace: [ 117.003044][ T4027] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 117.006107][ T4027] r7:eab61e20 r6:00000000 r5:60000013 r4:82252488 [ 117.006257][ T4027] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 117.006332][ T4027] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 117.006389][ T4027] r5:84143000 r4:8294f590 [ 117.006406][ T4027] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 117.006458][ T4027] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 117.006520][ T4027] r8:00024080 r7:eab61e20 r6:20000340 r5:00000000 r4:eab61f20 [ 117.006535][ T4027] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 117.006577][ T4027] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 117.006634][ T4027] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 117.006700][ T4027] r8:00024080 r7:00000000 r6:85049180 r5:eab61f20 r4:eab61e64 [ 117.006718][ T4027] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 117.006803][ T4027] r10:00000128 r9:84143000 r8:84fc3840 r7:00024080 r6:20000340 r5:84fc3841 [ 117.006831][ T4027] r4:00000003 [ 117.006847][ T4027] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 117.006930][ T4027] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 117.006948][ T4027] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 117.007161][ T4027] Exception stack(0xeab61fa8 to 0xeab61ff0) [ 117.007345][ T4027] 1fa0: 00000000 00000000 00000003 20000340 00024080 00000000 [ 117.007400][ T4027] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 117.007427][ T4027] 1fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 118.803565][ T29] audit: type=1400 audit(118.720:135): avc: denied { read } for pid=4042 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 120.305147][ T29] audit: type=1400 audit(120.220:136): avc: denied { wake_alarm } for pid=4045 comm="syz.1.102" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 128.134610][ T29] audit: type=1400 audit(128.050:137): avc: denied { create } for pid=4100 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 128.160581][ T29] audit: type=1400 audit(128.080:138): avc: denied { create } for pid=4100 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 128.680356][ T29] audit: type=1400 audit(128.600:139): avc: denied { write } for pid=4100 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 130.034916][ T29] audit: type=1400 audit(129.950:140): avc: denied { read write } for pid=4104 comm="syz.0.124" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.035396][ T29] audit: type=1400 audit(129.950:141): avc: denied { open } for pid=4104 comm="syz.0.124" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.044484][ T29] audit: type=1400 audit(129.960:142): avc: denied { ioctl } for pid=4104 comm="syz.0.124" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.045990][ T4105] binder: 4104:4105 ioctl c00c620f 20000500 returned -22 [ 130.718377][ T29] audit: type=1400 audit(130.640:143): avc: denied { create } for pid=4117 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 130.730340][ T29] audit: type=1400 audit(130.640:144): avc: denied { setattr } for pid=4117 comm="syz.1.129" name="SMC" dev="sockfs" ino=2747 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 130.733716][ T29] audit: type=1400 audit(130.650:145): avc: denied { ioctl } for pid=4117 comm="syz.1.129" path="socket:[2747]" dev="sockfs" ino=2747 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 130.753150][ T29] audit: type=1400 audit(130.670:146): avc: denied { ioctl } for pid=4117 comm="syz.1.129" path="socket:[2750]" dev="sockfs" ino=2750 ioctlcmd=0x9363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.806135][ T4135] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4135 comm=syz.0.135 [ 137.532552][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 137.533100][ T29] audit: type=1400 audit(137.450:149): avc: denied { write } for pid=4165 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 139.401509][ T29] audit: type=1800 audit(139.320:150): pid=4180 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.0.153" name="/dri/renderD128" dev="devtmpfs" ino=613 res=0 errno=0 [ 140.470794][ T10] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 140.624896][ T10] usb 1-1: config 0 has no interfaces? [ 140.625422][ T10] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 140.625587][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 140.631718][ T10] usb 1-1: config 0 descriptor?? [ 141.299509][ T3758] usb 1-1: USB disconnect, device number 2 [ 141.810023][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.810681][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.811083][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.812004][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.812237][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.812546][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.812800][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.813126][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.813389][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.813718][ T4207] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4207 comm=syz.1.159 [ 141.942258][ T29] audit: type=1400 audit(141.860:151): avc: denied { bind } for pid=4214 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 141.948481][ T29] audit: type=1400 audit(141.860:152): avc: denied { listen } for pid=4214 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 141.957904][ T29] audit: type=1400 audit(141.870:153): avc: denied { create } for pid=4214 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 141.961866][ T29] audit: type=1400 audit(141.880:154): avc: denied { write } for pid=4214 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 141.964929][ T29] audit: type=1400 audit(141.880:155): avc: denied { connect } for pid=4214 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 145.084851][ T4240] FAULT_INJECTION: forcing a failure. [ 145.084851][ T4240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.085300][ T4240] CPU: 0 UID: 0 PID: 4240 Comm: syz.1.172 Not tainted syzkaller #0 PREEMPT [ 145.085384][ T4240] Hardware name: ARM-Versatile Express [ 145.085406][ T4240] Call trace: [ 145.085445][ T4240] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 145.085546][ T4240] r7:ebe49e20 r6:00000000 r5:60000013 r4:82252488 [ 145.085633][ T4240] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 145.085890][ T4240] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 145.086007][ T4240] r5:85529800 r4:8294f590 [ 145.086022][ T4240] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 145.086242][ T4240] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 145.086426][ T4240] r8:00024080 r7:ebe49e20 r6:20000340 r5:00000000 r4:ebe49f20 [ 145.086547][ T4240] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 145.086731][ T4240] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 145.086782][ T4240] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 145.087095][ T4240] r8:00024080 r7:00000000 r6:850e6280 r5:ebe49f20 r4:ebe49e64 [ 145.087201][ T4240] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 145.087306][ T4240] r10:00000128 r9:85529800 r8:84cba540 r7:00024080 r6:20000340 r5:84cba541 [ 145.087513][ T4240] r4:00000003 [ 145.087600][ T4240] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 145.087700][ T4240] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 145.087717][ T4240] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 145.087784][ T4240] Exception stack(0xebe49fa8 to 0xebe49ff0) [ 145.087825][ T4240] 9fa0: 00000000 00000000 00000003 20000340 00024080 00000000 [ 145.087850][ T4240] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 145.087870][ T4240] 9fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 148.169159][ T29] audit: type=1400 audit(148.080:156): avc: denied { create } for pid=4250 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 148.378871][ T29] audit: type=1400 audit(148.290:157): avc: denied { append } for pid=4257 comm="syz.1.179" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.835909][ T29] audit: type=1400 audit(148.750:158): avc: denied { create } for pid=4263 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 148.842604][ T29] audit: type=1400 audit(148.760:159): avc: denied { ioctl } for pid=4263 comm="syz.1.182" path="socket:[3060]" dev="sockfs" ino=3060 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 149.204157][ T4277] selinux_netlink_send: 57 callbacks suppressed [ 149.205913][ T4277] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4277 comm=syz.1.187 [ 149.808071][ T29] audit: type=1400 audit(149.720:160): avc: denied { write } for pid=4290 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 149.813838][ T29] audit: type=1400 audit(149.730:161): avc: denied { connect } for pid=4290 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 150.778870][ T29] audit: type=1400 audit(150.700:162): avc: denied { create } for pid=4304 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 150.783107][ T29] audit: type=1400 audit(150.700:163): avc: denied { getopt } for pid=4304 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 151.813432][ T4320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4320 comm=syz.1.205 [ 152.322603][ T4331] FAULT_INJECTION: forcing a failure. [ 152.322603][ T4331] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.324744][ T4331] CPU: 1 UID: 0 PID: 4331 Comm: syz.1.210 Not tainted syzkaller #0 PREEMPT [ 152.325023][ T4331] Hardware name: ARM-Versatile Express [ 152.325281][ T4331] Call trace: [ 152.325569][ T4331] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 152.326568][ T4331] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 152.326663][ T4331] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 152.326723][ T4331] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 152.326780][ T4331] r5:84b20000 r4:8294f590 [ 152.326797][ T4331] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 152.326856][ T4331] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 152.326914][ T4331] r8:76f95f30 r7:00000000 r6:00000000 r5:ebec1f68 r4:00000002 [ 152.326931][ T4331] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 152.327086][ T4331] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 152.327145][ T4331] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 152.327235][ T4331] r10:00000001 r9:80615fb4 r8:00000002 r7:ebec1f68 r6:0000000f r5:76f95f30 [ 152.327271][ T4331] r4:84b20000 r3:ebec1e9f [ 152.327290][ T4331] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 152.327345][ T4331] r8:76f95f30 r7:ebec1f68 r6:84b20000 r5:0000000f r4:84fc3240 [ 152.327363][ T4331] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 152.327429][ T4331] r10:00000003 r9:84b20000 r8:8020029c r7:00000000 r6:00000000 r5:84fc3240 [ 152.327449][ T4331] r4:84fc3243 [ 152.327590][ T4331] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 152.327688][ T4331] r7:00000003 r6:00000007 r5:76f95f30 r4:0000000f [ 152.327706][ T4331] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 152.327833][ T4331] Exception stack(0xebec1fa8 to 0xebec1ff0) [ 152.327998][ T4331] 1fa0: 0000000f 76f95f30 00000007 76f95f30 0000000f 00000000 [ 152.328048][ T4331] 1fc0: 0000000f 76f95f30 00000007 00000003 00300000 00000000 00006364 76f960bc [ 152.328075][ T4331] 1fe0: 00000158 76f95ed0 000d81d0 001303dc [ 154.045966][ T29] audit: type=1400 audit(153.960:164): avc: denied { accept } for pid=4356 comm="syz.0.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 155.096046][ T29] audit: type=1400 audit(155.010:165): avc: denied { setopt } for pid=4367 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 157.155081][ T29] audit: type=1400 audit(157.070:166): avc: denied { map } for pid=4384 comm="syz.0.232" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5282 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 157.158264][ T29] audit: type=1400 audit(157.070:167): avc: denied { read write } for pid=4384 comm="syz.0.232" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5282 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 157.851722][ T29] audit: type=1400 audit(157.770:168): avc: denied { read } for pid=4388 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 158.013028][ T4401] fuse: Bad value for 'fd' [ 158.685735][ T29] audit: type=1400 audit(158.600:169): avc: denied { write } for pid=4405 comm="syz.1.237" path="socket:[4317]" dev="sockfs" ino=4317 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 160.386722][ T29] audit: type=1400 audit(160.300:170): avc: denied { create } for pid=4426 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 160.441060][ T4427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4427 comm=syz.0.245 [ 163.536526][ T4443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4443 comm=syz.1.249 [ 163.778843][ T4446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4446 comm=syz.0.250 [ 170.890605][ T29] audit: type=1400 audit(170.810:171): avc: denied { create } for pid=4495 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 171.010119][ T29] audit: type=1400 audit(170.930:172): avc: denied { write } for pid=4495 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 172.736443][ T29] audit: type=1400 audit(172.650:173): avc: denied { map_create } for pid=4522 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 172.742256][ T29] audit: type=1400 audit(172.660:174): avc: denied { map_read map_write } for pid=4522 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 173.042782][ T4530] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 173.146893][ T29] audit: type=1400 audit(173.060:175): avc: denied { map } for pid=4529 comm="syz.0.277" path="/dev/nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.149940][ T29] audit: type=1400 audit(173.060:176): avc: denied { execute } for pid=4529 comm="syz.0.277" path="/dev/nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.559279][ T4577] FAULT_INJECTION: forcing a failure. [ 179.559279][ T4577] name failslab, interval 1, probability 0, space 0, times 1 [ 179.559691][ T4577] CPU: 1 UID: 0 PID: 4577 Comm: syz.0.292 Not tainted syzkaller #0 PREEMPT [ 179.559786][ T4577] Hardware name: ARM-Versatile Express [ 179.559814][ T4577] Call trace: [ 179.559867][ T4577] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 179.559980][ T4577] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 179.560002][ T4577] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 179.560367][ T4577] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 179.560543][ T4577] r5:84b20000 r4:82918810 [ 179.560614][ T4577] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 179.560919][ T4577] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 179.561106][ T4577] r8:84b20000 r7:00000000 r6:00000cc0 r5:8291b72c r4:830a4cc0 [ 179.561263][ T4577] [<8052ee50>] (should_failslab) from [<8050eb54>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 179.561369][ T4577] [<8050eb08>] (kmem_cache_alloc_noprof) from [<8056178c>] (alloc_empty_file+0x54/0x13c) [ 179.561526][ T4577] r10:00000142 r9:832e6000 r8:82805cc0 r7:84d20500 r6:000400c0 r5:8291b72c [ 179.561938][ T4577] r4:82457898 [ 179.561998][ T4577] [<80561738>] (alloc_empty_file) from [<805740a8>] (path_openat+0x40/0x1150) [ 179.562525][ T4577] r8:ece61e58 r7:ece61e58 r6:ece61f20 r5:84b20000 r4:ffffff9c [ 179.562654][ T4577] [<80574068>] (path_openat) from [<80575264>] (do_filp_open+0xac/0x148) [ 179.563147][ T4577] r10:00000142 r9:832e6000 r8:00000000 r7:ece61e58 r6:ece61f20 r5:84b20000 [ 179.563175][ T4577] r4:ffffff9c [ 179.563193][ T4577] [<805751b8>] (do_filp_open) from [<8055be34>] (do_sys_openat2+0x90/0xe0) [ 179.563257][ T4577] r9:84b20000 r8:8020029c r7:ffffff9c r6:ece61f58 r5:832e6000 r4:00000005 [ 179.563277][ T4577] [<8055bda4>] (do_sys_openat2) from [<8055c25c>] (sys_openat+0x98/0xd4) [ 179.564262][ T4577] r7:00000142 r6:00000000 r5:76edfab0 r4:ffffff9c [ 179.564365][ T4577] [<8055c1c4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 179.564466][ T4577] Exception stack(0xece61fa8 to 0xece61ff0) [ 179.564521][ T4577] 1fa0: 000400c0 76edfab0 ffffff9c 76edfab0 000400c0 00000000 [ 179.564556][ T4577] 1fc0: 000400c0 76edfab0 00000000 00000142 00000000 00000000 00006364 76ee00bc [ 179.564583][ T4577] 1fe0: 81010101 76edfa68 000d81d0 00130198 [ 179.564611][ T4577] r5:76edfab0 r4:000400c0 [ 182.509155][ T4595] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pid=4595 comm=syz.0.299 [ 183.497719][ T3788] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 183.662468][ T3788] usb 1-1: config 0 has no interfaces? [ 183.662834][ T3788] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 183.663079][ T3788] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 183.671716][ T3788] usb 1-1: config 0 descriptor?? [ 183.910405][ T3788] usb 1-1: USB disconnect, device number 3 [ 185.247955][ T82] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 185.419110][ T82] usb 2-1: config 0 has no interfaces? [ 185.419350][ T82] usb 2-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 185.419572][ T82] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 185.423581][ T82] usb 2-1: config 0 descriptor?? [ 185.645831][ T41] usb 2-1: USB disconnect, device number 2 [ 185.766723][ T29] audit: type=1400 audit(185.680:177): avc: denied { nlmsg_write } for pid=4641 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 188.678069][ T82] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 188.838628][ T82] usb 2-1: config 0 has no interfaces? [ 188.838950][ T82] usb 2-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 188.839249][ T82] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 188.850145][ T82] usb 2-1: config 0 descriptor?? [ 189.079510][ T82] usb 2-1: USB disconnect, device number 3 [ 190.118319][ T4669] FAULT_INJECTION: forcing a failure. [ 190.118319][ T4669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.118714][ T4669] CPU: 1 UID: 0 PID: 4669 Comm: syz.0.319 Not tainted syzkaller #0 PREEMPT [ 190.118811][ T4669] Hardware name: ARM-Versatile Express [ 190.118836][ T4669] Call trace: [ 190.118884][ T4669] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 190.118995][ T4669] r7:ed27de20 r6:00000000 r5:60000013 r4:82252488 [ 190.119015][ T4669] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 190.119069][ T4669] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 190.119128][ T4669] r5:84b23000 r4:8294f590 [ 190.119145][ T4669] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 190.119199][ T4669] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 190.119345][ T4669] r8:04000000 r7:ed27de20 r6:200002c0 r5:00000000 r4:ed27df20 [ 190.119423][ T4669] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 190.119783][ T4669] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 190.119853][ T4669] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 190.120054][ T4669] r8:04000000 r7:00000000 r6:85048f00 r5:ed27df20 r4:ed27de64 [ 190.120201][ T4669] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 190.120354][ T4669] r10:00000128 r9:84b23000 r8:85970180 r7:04000000 r6:200002c0 r5:85970181 [ 190.120377][ T4669] r4:00000004 [ 190.120393][ T4669] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 190.120655][ T4669] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 190.120767][ T4669] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 190.120824][ T4669] Exception stack(0xed27dfa8 to 0xed27dff0) [ 190.120868][ T4669] dfa0: 00000000 00000000 00000004 200002c0 04000000 00000000 [ 190.120902][ T4669] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 190.120929][ T4669] dfe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 190.148989][ T29] audit: type=1400 audit(190.060:178): avc: denied { create } for pid=4668 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 196.358041][ T29] audit: type=1400 audit(196.270:179): avc: denied { getopt } for pid=4721 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 198.638361][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 198.794508][ T10] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 198.794870][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 198.795702][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 198.796033][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 198.812029][ T10] usb 1-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 198.812347][ T10] usb 1-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 198.812654][ T10] usb 1-1: Manufacturer: syz [ 198.821298][ T10] usb 1-1: config 0 descriptor?? [ 199.299492][ T10] usbhid 1-1:0.0: can't add hid device: -71 [ 199.300349][ T10] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 199.306868][ T10] usb 1-1: USB disconnect, device number 4 [ 204.615818][ T4818] FAULT_INJECTION: forcing a failure. [ 204.615818][ T4818] name failslab, interval 1, probability 0, space 0, times 0 [ 204.616468][ T4818] CPU: 0 UID: 0 PID: 4818 Comm: syz.0.367 Not tainted syzkaller #0 PREEMPT [ 204.616580][ T4818] Hardware name: ARM-Versatile Express [ 204.616611][ T4818] Call trace: [ 204.616656][ T4818] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 204.616765][ T4818] r7:00000c40 r6:00000000 r5:60000013 r4:82252488 [ 204.616785][ T4818] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 204.616843][ T4818] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 204.616897][ T4818] r5:84b20c00 r4:82918810 [ 204.616913][ T4818] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 204.617022][ T4818] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 204.617087][ T4818] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 204.617106][ T4818] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 204.617157][ T4818] [<8050a304>] (__kmalloc_noprof) from [<807d3138>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 204.617223][ T4818] r10:84b20c00 r9:8309e400 r8:00000000 r7:83415dd0 r6:84cba868 r5:00001000 [ 204.617248][ T4818] r4:00000000 [ 204.617420][ T4818] [<807d30fc>] (tomoyo_realpath_from_path) from [<807cf27c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 204.617495][ T4818] r10:84b20c00 r9:00000000 r8:84cba840 r7:c4009420 r6:00000004 r5:81cd6588 [ 204.617528][ T4818] r4:84cba868 r3:826c1240 [ 204.617620][ T4818] [<807cf1b0>] (tomoyo_path_number_perm) from [<807d3b5c>] (tomoyo_file_ioctl+0x1c/0x20) [ 204.617691][ T4818] r9:00000003 r8:84cba840 r7:00000000 r6:00000000 r5:c4009420 r4:84cba840 [ 204.617712][ T4818] [<807d3b40>] (tomoyo_file_ioctl) from [<80780420>] (security_file_ioctl+0x64/0x1e4) [ 204.617952][ T4818] [<807803bc>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 204.618085][ T4818] r7:00000000 r6:84cba841 r5:00000000 r4:c4009420 [ 204.618108][ T4818] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 204.618296][ T4818] Exception stack(0xed805fa8 to 0xed805ff0) [ 204.618431][ T4818] 5fa0: 00000000 00000000 00000003 c4009420 00000000 00000000 [ 204.618663][ T4818] 5fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f010bc [ 204.618776][ T4818] 5fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 204.618877][ T4818] r10:00000036 r9:84b20c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 204.618899][ T4818] r4:00000000 [ 204.620238][ T4818] ERROR: Out of memory at tomoyo_realpath_from_path. [ 205.581008][ T29] audit: type=1400 audit(205.500:180): avc: denied { create } for pid=4828 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 205.793306][ T29] audit: type=1400 audit(205.710:181): avc: denied { accept } for pid=4832 comm="syz.1.374" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 205.955838][ T29] audit: type=1400 audit(205.870:182): avc: denied { getopt } for pid=4832 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 225.729911][ T4977] FAULT_INJECTION: forcing a failure. [ 225.729911][ T4977] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 225.730497][ T4977] CPU: 0 UID: 0 PID: 4977 Comm: syz.1.423 Not tainted syzkaller #0 PREEMPT [ 225.730603][ T4977] Hardware name: ARM-Versatile Express [ 225.730632][ T4977] Call trace: [ 225.730679][ T4977] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 225.730821][ T4977] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 225.730852][ T4977] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 225.730937][ T4977] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 225.731022][ T4977] r5:84b20000 r4:82918864 [ 225.731046][ T4977] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 225.731295][ T4977] [<80986bb4>] (should_fail_ex) from [<8052ef4c>] (should_fail_alloc_page+0x68/0x74) [ 225.731411][ T4977] r8:00000001 r7:00000000 r6:00000000 r5:00000dc0 r4:edfd1e00 [ 225.731475][ T4977] [<8052eee4>] (should_fail_alloc_page) from [<804f700c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 225.731552][ T4977] [<804f6f78>] (prepare_alloc_pages.constprop.0) from [<804ff5d4>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 225.731738][ T4977] r10:81cd55b4 r9:00000000 r8:84b20000 r7:00000000 r6:00000dc0 r5:85970780 [ 225.731839][ T4977] r4:00000000 r3:edfd1e00 [ 225.731974][ T4977] [<804ff528>] (__alloc_frozen_pages_noprof) from [<80500714>] (get_free_pages_noprof+0x1c/0x74) [ 225.732072][ T4977] r10:81cd55b4 r9:00000000 r8:edfd1f68 r7:00000000 r6:807ac3f0 r5:85970780 [ 225.732093][ T4977] r4:00000000 [ 225.732110][ T4977] [<805006f8>] (get_free_pages_noprof) from [<80500784>] (get_zeroed_page_noprof+0x18/0x1c) [ 225.732435][ T4977] [<8050076c>] (get_zeroed_page_noprof) from [<8059a0fc>] (simple_transaction_get+0x38/0x124) [ 225.732907][ T4977] [<8059a0c4>] (simple_transaction_get) from [<807ab6a0>] (selinux_transaction_write+0x40/0x7c) [ 225.733065][ T4977] r9:00000000 r8:edfd1f68 r7:84b20000 r6:807ac3f0 r5:85970780 r4:00000000 [ 225.733087][ T4977] [<807ab660>] (selinux_transaction_write) from [<8055f7f0>] (vfs_write+0xac/0x44c) [ 225.733204][ T4977] r7:84b20000 r6:00000000 r5:85970780 r4:807ab660 [ 225.733295][ T4977] [<8055f744>] (vfs_write) from [<8055fd00>] (ksys_write+0x74/0xe8) [ 225.733426][ T4977] r10:00000004 r9:84b20000 r8:8020029c r7:00000000 r6:00000000 r5:85970780 [ 225.733506][ T4977] r4:85970783 [ 225.733587][ T4977] [<8055fc8c>] (ksys_write) from [<8055fd84>] (sys_write+0x10/0x14) [ 225.733718][ T4977] r7:00000004 r6:001304b8 r5:00000000 r4:00000000 [ 225.733775][ T4977] [<8055fd74>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 225.733853][ T4977] Exception stack(0xedfd1fa8 to 0xedfd1ff0) [ 225.733905][ T4977] 1fa0: 00000000 00000000 00000003 00000000 00000000 00000000 [ 225.734033][ T4977] 1fc0: 00000000 00000000 001304b8 00000004 00300000 00000000 00006364 76f960bc [ 225.734283][ T4977] 1fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 234.181243][ T29] audit: type=1400 audit(234.100:183): avc: denied { read } for pid=5051 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 234.692362][ T29] audit: type=1400 audit(234.610:184): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 237.161539][ T29] audit: type=1400 audit(237.080:185): avc: denied { setopt } for pid=5077 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 241.225704][ T29] audit: type=1400 audit(241.140:186): avc: denied { accept } for pid=5104 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 241.230156][ T29] audit: type=1400 audit(241.150:187): avc: denied { setopt } for pid=5104 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 243.573501][ T29] audit: type=1400 audit(243.490:188): avc: denied { create } for pid=5123 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 244.825478][ T29] audit: type=1400 audit(244.740:189): avc: denied { setopt } for pid=5133 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 247.725147][ T5149] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5149 comm=syz.0.489 [ 252.190982][ T29] audit: type=1400 audit(252.110:190): avc: denied { create } for pid=5170 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 252.521007][ T82] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 252.688014][ T82] usb 2-1: Using ep0 maxpacket: 16 [ 252.695897][ T82] usb 2-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 252.696850][ T82] usb 2-1: config 0 interface 0 has no altsetting 0 [ 252.697935][ T82] usb 2-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 252.698753][ T82] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 252.703809][ T82] usb 2-1: config 0 descriptor?? [ 252.715714][ T82] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 255.544269][ T29] audit: type=1400 audit(255.460:191): avc: denied { ioctl } for pid=5187 comm="syz.0.503" path="cgroup:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 255.751646][ T5192] FAULT_INJECTION: forcing a failure. [ 255.751646][ T5192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 255.753619][ T5192] CPU: 1 UID: 0 PID: 5192 Comm: syz.0.505 Not tainted syzkaller #0 PREEMPT [ 255.753729][ T5192] Hardware name: ARM-Versatile Express [ 255.753757][ T5192] Call trace: [ 255.753801][ T5192] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 255.753923][ T5192] r7:dfa25e20 r6:00000000 r5:60000013 r4:82252488 [ 255.753945][ T5192] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 255.754002][ T5192] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 255.754061][ T5192] r5:8552d400 r4:8294f590 [ 255.754077][ T5192] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 255.754136][ T5192] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 255.754227][ T5192] r8:000000d0 r7:dfa25e20 r6:20000640 r5:00000000 r4:dfa25f20 [ 255.754261][ T5192] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 255.754309][ T5192] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 255.754366][ T5192] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 255.754423][ T5192] r8:000000d0 r7:00000000 r6:850e6c80 r5:dfa25f20 r4:dfa25e64 [ 255.754440][ T5192] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 255.754506][ T5192] r10:00000128 r9:8552d400 r8:84cbad80 r7:000000d0 r6:20000640 r5:84cbad81 [ 255.754539][ T5192] r4:00000003 [ 255.754558][ T5192] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 255.754629][ T5192] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 255.754647][ T5192] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 255.754729][ T5192] Exception stack(0xdfa25fa8 to 0xdfa25ff0) [ 255.754766][ T5192] 5fa0: 00000000 00000000 00000003 20000640 000000d0 00000000 [ 255.754799][ T5192] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 255.754826][ T5192] 5fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 255.954757][ T5196] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5196 comm=syz.0.507 [ 256.120505][ T5196] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5196 comm=syz.0.507 [ 256.504114][ T2883] usb 2-1: USB disconnect, device number 4 [ 257.090340][ T5218] FAULT_INJECTION: forcing a failure. [ 257.090340][ T5218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.090747][ T5218] CPU: 0 UID: 0 PID: 5218 Comm: syz.1.513 Not tainted syzkaller #0 PREEMPT [ 257.090838][ T5218] Hardware name: ARM-Versatile Express [ 257.090865][ T5218] Call trace: [ 257.090909][ T5218] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 257.091016][ T5218] r7:dfbe9e20 r6:00000000 r5:60000013 r4:82252488 [ 257.091037][ T5218] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 257.091093][ T5218] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 257.091150][ T5218] r5:83841800 r4:8294f590 [ 257.091196][ T5218] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 257.091302][ T5218] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 257.091362][ T5218] r8:00000000 r7:dfbe9e20 r6:20000180 r5:00000000 r4:dfbe9f20 [ 257.091380][ T5218] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 257.091478][ T5218] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 257.091599][ T5218] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 257.091672][ T5218] r8:00000000 r7:00000000 r6:850e7180 r5:dfbe9f20 r4:dfbe9e64 [ 257.091766][ T5218] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 257.091871][ T5218] r10:00000128 r9:83841800 r8:84cbad80 r7:00000000 r6:20000180 r5:84cbad81 [ 257.092101][ T5218] r4:00000004 [ 257.092419][ T5218] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 257.092504][ T5218] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 257.092545][ T5218] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 257.092676][ T5218] Exception stack(0xdfbe9fa8 to 0xdfbe9ff0) [ 257.092980][ T5218] 9fa0: 00000000 00000000 00000004 20000180 00000000 00000000 [ 257.093183][ T5218] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 257.093427][ T5218] 9fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 257.556137][ T29] audit: type=1400 audit(257.470:192): avc: denied { ioctl } for pid=5230 comm="syz.0.519" path="socket:[7526]" dev="sockfs" ino=7526 ioctlcmd=0x583b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 261.170420][ T29] audit: type=1400 audit(261.090:193): avc: denied { getopt } for pid=5291 comm="syz.1.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 265.296095][ T5351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5351 comm=syz.0.565 [ 270.951256][ T29] audit: type=1400 audit(270.870:194): avc: denied { bind } for pid=5415 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 270.965031][ T29] audit: type=1400 audit(270.880:195): avc: denied { ioctl } for pid=5415 comm="syz.1.592" path="socket:[7838]" dev="sockfs" ino=7838 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 271.265326][ T5428] FAULT_INJECTION: forcing a failure. [ 271.265326][ T5428] name failslab, interval 1, probability 0, space 0, times 0 [ 271.268407][ T5428] CPU: 0 UID: 0 PID: 5428 Comm: syz.1.595 Not tainted syzkaller #0 PREEMPT [ 271.268550][ T5428] Hardware name: ARM-Versatile Express [ 271.268579][ T5428] Call trace: [ 271.268627][ T5428] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 271.268742][ T5428] r7:00000c40 r6:00000000 r5:60000013 r4:82252488 [ 271.268764][ T5428] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 271.268819][ T5428] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 271.268877][ T5428] r5:83846c00 r4:82918810 [ 271.268893][ T5428] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 271.268951][ T5428] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 271.269014][ T5428] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 271.269032][ T5428] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 271.269090][ T5428] [<8050a304>] (__kmalloc_noprof) from [<807d3138>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 271.269152][ T5428] r10:83846c00 r9:8309e400 r8:00000000 r7:8342b2a8 r6:855330e8 r5:00001000 [ 271.269172][ T5428] r4:00000000 [ 271.269187][ T5428] [<807d30fc>] (tomoyo_realpath_from_path) from [<807cf27c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 271.269241][ T5428] r10:83846c00 r9:00000000 r8:855330c0 r7:00000002 r6:00000004 r5:81cd6588 [ 271.269265][ T5428] r4:855330e8 r3:826c1240 [ 271.269281][ T5428] [<807cf1b0>] (tomoyo_path_number_perm) from [<807d3b5c>] (tomoyo_file_ioctl+0x1c/0x20) [ 271.269339][ T5428] r9:00000003 r8:855330c0 r7:200001c0 r6:200001c0 r5:00000002 r4:855330c0 [ 271.269357][ T5428] [<807d3b40>] (tomoyo_file_ioctl) from [<80780420>] (security_file_ioctl+0x64/0x1e4) [ 271.269403][ T5428] [<807803bc>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 271.269455][ T5428] r7:200001c0 r6:855330c1 r5:00000000 r4:00000002 [ 271.269471][ T5428] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 271.269519][ T5428] Exception stack(0xea7a5fa8 to 0xea7a5ff0) [ 271.269550][ T5428] 5fa0: 00000000 00000000 00000003 00000002 200001c0 00000000 [ 271.269578][ T5428] 5fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f960bc [ 271.269601][ T5428] 5fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 271.269630][ T5428] r10:00000036 r9:83846c00 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 271.269648][ T5428] r4:00000000 [ 271.272695][ T5428] ERROR: Out of memory at tomoyo_realpath_from_path. [ 271.373802][ T29] audit: type=1400 audit(271.290:196): avc: denied { accept } for pid=5429 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 275.169846][ T29] audit: type=1400 audit(275.090:197): avc: denied { kexec_image_load } for pid=5471 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 275.276587][ T29] audit: type=1400 audit(275.190:198): avc: denied { getopt } for pid=5471 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 275.728680][ T2883] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 275.879420][ T2883] usb 2-1: Using ep0 maxpacket: 8 [ 275.895545][ T2883] usb 2-1: config 1 has an invalid descriptor of length 224, skipping remainder of the config [ 275.896003][ T2883] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 275.902006][ T2883] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 275.920939][ T2883] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 275.921262][ T2883] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 275.921532][ T2883] usb 2-1: Product: ᢅáªé³¿ä™Ÿâ¸¯é‡“孟⟫옜ﴊ紂」倃㇮á ê¸î€‚㚺싼㭜å¸å¨˜èƒ®ï‰±ã·˜ê£¸ç¢‹âŽ·ç¬‚ïµë• é©‡ãµì˜‚æ—衳帙鸒쩈쫬굂ዞ쟡笛뭚֛àµè¡§ï²çŒ°è£¦åŠ£ï’¼ã™°ï—¡é¡Šî‰™ã³—å‡ï€•眆ᣫæ¦î–§è…­Ò¦éª§ã“»å«ºâœ†å°§ê—¼åŒ‰ï¾´î»…➛朮㜄ݗ⡚謞렬àµá´©é†©ãˆ¹éŸµìª…ê¢ã¥‹ã”ºæ³™è«¹é¤¾á‰«ãš”ã˜è´ƒé´¤î´¿ã¡ç¼²åƒŽâ«©äŽ™êž‡ë¢—é¢…êŸ›ç£Œî´¡ã²ŒìŽ¶åµá½¶ä” [ 275.921691][ T2883] usb 2-1: Manufacturer: ꀔ倂鋗糒鼮兢㊅Ű䄡覿댔黻䬩盃ê˜ä•™ë„茘䵬蹌謜㸈å¼êµçŽÅ±åƒ‡î‹¥â­é¬•ᜬ㊷즷⠯門ﮕ뉪똠颚庖촉剘㛇ë®ã©†å´¸â¾¨ç™µç‹¾â¼šì·Ÿã€­êˆ¨î°¼ç»Œî¬Œî“¸èš´è³°ê£æŠ‡åŸ˜ïœ¬é’¦ä’³ã “ã•”â®à¼œà¥®æµ¸ç¤œíš¤ì¬°î•Œáž›î ²ê‰„íºì’¦ç„¥ [ 275.921737][ T2883] usb 2-1: SerialNumber: Р [ 276.288858][ T5477] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 276.291027][ T5477] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 276.351445][ T2883] usb 2-1: 0:2 : does not exist [ 276.370670][ T2883] usb 2-1: USB disconnect, device number 5 [ 277.201588][ T5509] FAULT_INJECTION: forcing a failure. [ 277.201588][ T5509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.203692][ T5509] CPU: 1 UID: 0 PID: 5509 Comm: syz.0.616 Not tainted syzkaller #0 PREEMPT [ 277.203798][ T5509] Hardware name: ARM-Versatile Express [ 277.203824][ T5509] Call trace: [ 277.203868][ T5509] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 277.203982][ T5509] r7:ea6cde20 r6:00000000 r5:60000013 r4:82252488 [ 277.204003][ T5509] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 277.204057][ T5509] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 277.204114][ T5509] r5:84146000 r4:8294f590 [ 277.204131][ T5509] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 277.204189][ T5509] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 277.204257][ T5509] r8:00048000 r7:ea6cde20 r6:2000a8c0 r5:00000000 r4:ea6cdf20 [ 277.204286][ T5509] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 277.204337][ T5509] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 277.204396][ T5509] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 277.204460][ T5509] r8:00048000 r7:00000000 r6:8505a500 r5:ea6cdf20 r4:ea6cde64 [ 277.204482][ T5509] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 277.204562][ T5509] r10:00000128 r9:84146000 r8:855336c0 r7:00048000 r6:2000a8c0 r5:855336c1 [ 277.204583][ T5509] r4:00000004 [ 277.204603][ T5509] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 277.204670][ T5509] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 277.204691][ T5509] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 277.204742][ T5509] Exception stack(0xea6cdfa8 to 0xea6cdff0) [ 277.204780][ T5509] dfa0: 00000000 00000000 00000004 2000a8c0 00048000 00000000 [ 277.204813][ T5509] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 277.204840][ T5509] dfe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 284.578938][ T5564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5564 comm=syz.0.636 [ 302.324284][ T29] audit: type=1400 audit(302.240:199): avc: denied { ioctl } for pid=5652 comm="syz.0.663" path="socket:[8149]" dev="sockfs" ino=8149 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 303.576648][ T5666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=136 sclass=netlink_route_socket pid=5666 comm=syz.0.668 [ 303.684963][ T29] audit: type=1400 audit(303.600:200): avc: denied { write } for pid=5667 comm="syz.0.669" path="socket:[8170]" dev="sockfs" ino=8170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 305.519924][ T5681] FAULT_INJECTION: forcing a failure. [ 305.519924][ T5681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.521862][ T5681] CPU: 1 UID: 0 PID: 5681 Comm: syz.1.673 Not tainted syzkaller #0 PREEMPT [ 305.521976][ T5681] Hardware name: ARM-Versatile Express [ 305.522000][ T5681] Call trace: [ 305.522038][ T5681] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 305.522148][ T5681] r7:ebb6de20 r6:00000000 r5:60000013 r4:82252488 [ 305.522200][ T5681] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 305.522300][ T5681] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 305.522380][ T5681] r5:85529800 r4:8294f590 [ 305.522402][ T5681] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 305.522474][ T5681] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 305.522554][ T5681] r8:00004040 r7:ebb6de20 r6:20000100 r5:00000000 r4:ebb6df20 [ 305.522573][ T5681] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 305.522624][ T5681] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 305.522680][ T5681] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 305.522736][ T5681] r8:00004040 r7:00000000 r6:8505af00 r5:ebb6df20 r4:ebb6de64 [ 305.522752][ T5681] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 305.522812][ T5681] r10:00000128 r9:85529800 r8:84da30c0 r7:00004040 r6:20000100 r5:84da30c1 [ 305.522829][ T5681] r4:00000003 [ 305.522844][ T5681] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 305.522904][ T5681] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 305.522920][ T5681] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 305.522964][ T5681] Exception stack(0xebb6dfa8 to 0xebb6dff0) [ 305.522998][ T5681] dfa0: 00000000 00000000 00000003 20000100 00004040 00000000 [ 305.523028][ T5681] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 305.523053][ T5681] dfe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 307.081207][ T29] audit: type=1400 audit(307.000:201): avc: denied { ioctl } for pid=5692 comm="syz.0.678" path="socket:[9232]" dev="sockfs" ino=9232 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 307.109263][ T29] audit: type=1400 audit(307.030:202): avc: denied { execute } for pid=5692 comm="syz.0.678" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 307.130819][ T5695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5695 comm=syz.0.678 [ 309.558583][ T3788] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 309.707726][ T3788] usb 1-1: Using ep0 maxpacket: 16 [ 309.719703][ T3788] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 309.720792][ T3788] usb 1-1: config 0 interface 0 has no altsetting 0 [ 309.721502][ T3788] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 309.722751][ T3788] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 309.729535][ T3788] usb 1-1: config 0 descriptor?? [ 309.748837][ T3788] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 312.252814][ T5718] capability: warning: `syz.1.684' uses deprecated v2 capabilities in a way that may be insecure [ 313.622410][ T82] usb 1-1: USB disconnect, device number 5 [ 315.369489][ T82] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 315.548297][ T82] usb 1-1: Using ep0 maxpacket: 16 [ 315.564050][ T82] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 315.565603][ T82] usb 1-1: config 0 interface 0 has no altsetting 0 [ 315.566492][ T82] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 315.567942][ T82] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 315.579055][ T82] usb 1-1: config 0 descriptor?? [ 315.588585][ T82] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 319.713825][ T29] audit: type=1400 audit(319.630:203): avc: denied { setopt } for pid=5765 comm="syz.1.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 320.583633][ T82] usb 1-1: USB disconnect, device number 6 [ 321.578213][ T3758] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 321.748042][ T3758] usb 1-1: Using ep0 maxpacket: 16 [ 321.756876][ T3758] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 321.757476][ T3758] usb 1-1: config 0 interface 0 has no altsetting 0 [ 321.757681][ T3758] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 321.757837][ T3758] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 321.763124][ T3758] usb 1-1: config 0 descriptor?? [ 321.775844][ T3758] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 325.776760][ T10] usb 1-1: USB disconnect, device number 7 [ 326.219138][ T5830] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5830 comm=syz.1.714 [ 328.298518][ T3788] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 328.459247][ T3788] usb 2-1: Using ep0 maxpacket: 16 [ 328.495835][ T3788] usb 2-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 328.496444][ T3788] usb 2-1: config 0 interface 0 has no altsetting 0 [ 328.496780][ T3788] usb 2-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 328.497717][ T3788] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 328.509233][ T3788] usb 2-1: config 0 descriptor?? [ 328.532803][ T3788] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 331.455944][ T29] audit: type=1400 audit(331.370:204): avc: denied { ioctl } for pid=5879 comm="syz.0.734" path="socket:[8786]" dev="sockfs" ino=8786 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 331.793478][ T29] audit: type=1400 audit(331.710:205): avc: denied { create } for pid=5883 comm="syz.0.736" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 331.810610][ T29] audit: type=1400 audit(331.730:206): avc: denied { mounton } for pid=5883 comm="syz.0.736" path="/proc/909/task" dev="proc" ino=9493 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 332.508879][ T3788] usb 2-1: USB disconnect, device number 6 [ 334.321947][ T29] audit: type=1400 audit(334.240:207): avc: denied { unlink } for pid=3096 comm="syz-executor" name="file0" dev="tmpfs" ino=1990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 334.492176][ T29] audit: type=1400 audit(334.410:208): avc: denied { getopt } for pid=5896 comm="syz.0.738" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 334.598327][ T29] audit: type=1400 audit(334.520:209): avc: denied { create } for pid=5898 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 335.368340][ T82] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 335.538306][ T82] usb 1-1: Using ep0 maxpacket: 16 [ 335.564822][ T82] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 335.565176][ T82] usb 1-1: config 0 interface 0 has no altsetting 0 [ 335.566095][ T82] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 335.566632][ T82] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 335.578226][ T82] usb 1-1: config 0 descriptor?? [ 335.604645][ T82] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 336.572948][ T5922] FAULT_INJECTION: forcing a failure. [ 336.572948][ T5922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.574165][ T5922] CPU: 0 UID: 0 PID: 5922 Comm: syz.1.746 Not tainted syzkaller #0 PREEMPT [ 336.574287][ T5922] Hardware name: ARM-Versatile Express [ 336.574326][ T5922] Call trace: [ 336.574363][ T5922] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 336.574434][ T5922] r7:ec3d9e20 r6:00000000 r5:60000013 r4:82252488 [ 336.574453][ T5922] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 336.574507][ T5922] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 336.574550][ T5922] r5:8552d400 r4:8294f590 [ 336.574558][ T5922] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 336.574589][ T5922] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 336.574616][ T5922] r8:00024080 r7:ec3d9e20 r6:20000340 r5:00000000 r4:ec3d9f20 [ 336.574623][ T5922] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 336.574644][ T5922] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 336.574689][ T5922] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 336.574739][ T5922] r8:00024080 r7:00000000 r6:850e7400 r5:ec3d9f20 r4:ec3d9e64 [ 336.574756][ T5922] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 336.574815][ T5922] r10:00000128 r9:8552d400 r8:8593fcc0 r7:00024080 r6:20000340 r5:8593fcc1 [ 336.574825][ T5922] r4:00000003 [ 336.574832][ T5922] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 336.574864][ T5922] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 336.574872][ T5922] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 336.574895][ T5922] Exception stack(0xec3d9fa8 to 0xec3d9ff0) [ 336.574915][ T5922] 9fa0: 00000000 00000000 00000003 20000340 00024080 00000000 [ 336.574931][ T5922] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 336.574943][ T5922] 9fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 339.393095][ T3787] usb 1-1: USB disconnect, device number 8 [ 340.718298][ T23] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 340.868158][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 340.880801][ T23] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 340.881277][ T23] usb 1-1: config 0 interface 0 has no altsetting 0 [ 340.881618][ T23] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 340.881679][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 340.889445][ T23] usb 1-1: config 0 descriptor?? [ 340.925194][ T23] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 346.803310][ T29] audit: type=1400 audit(346.720:210): avc: denied { bind } for pid=6002 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 346.812604][ T29] audit: type=1400 audit(346.730:211): avc: denied { node_bind } for pid=6002 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 346.823014][ T29] audit: type=1400 audit(346.740:212): avc: denied { connect } for pid=6002 comm="syz.1.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 347.543684][ T6009] FAULT_INJECTION: forcing a failure. [ 347.543684][ T6009] name failslab, interval 1, probability 0, space 0, times 0 [ 347.544218][ T6009] CPU: 1 UID: 0 PID: 6009 Comm: syz.1.767 Not tainted syzkaller #0 PREEMPT [ 347.544324][ T6009] Hardware name: ARM-Versatile Express [ 347.544352][ T6009] Call trace: [ 347.544400][ T6009] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 347.544728][ T6009] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 347.544770][ T6009] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 347.544885][ T6009] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 347.545010][ T6009] r5:83846c00 r4:82918810 [ 347.545029][ T6009] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 347.545132][ T6009] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 347.545242][ T6009] r8:83846c00 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 347.545281][ T6009] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 347.545404][ T6009] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564234>] (__alloc_skb+0x138/0x160) [ 347.545637][ T6009] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 347.545670][ T6009] r4:828060c0 [ 347.545719][ T6009] [<815640fc>] (__alloc_skb) from [<81686010>] (netlink_alloc_large_skb+0x8c/0xa4) [ 347.545800][ T6009] r8:00000000 r7:85875000 r6:00000014 r5:85055900 r4:00000140 [ 347.545820][ T6009] [<81685f84>] (netlink_alloc_large_skb) from [<816867d0>] (netlink_sendmsg+0x134/0x444) [ 347.545884][ T6009] r5:85055900 r4:ec83df20 [ 347.545923][ T6009] [<8168669c>] (netlink_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 347.545996][ T6009] r10:00000000 r9:ec83ddc4 r8:ec83ddc4 r7:00000000 r6:85055900 r5:ec83df20 [ 347.546016][ T6009] r4:00000000 [ 347.546033][ T6009] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 347.546154][ T6009] r7:00000000 r6:85055900 r5:00040000 r4:ec83df20 [ 347.546302][ T6009] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 347.546446][ T6009] r10:ec83de24 r9:20000280 r8:00040000 r7:00000000 r6:85055900 r5:ec83df20 [ 347.546578][ T6009] r4:00000000 [ 347.546672][ T6009] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 347.546792][ T6009] r10:00000128 r9:83846c00 r8:84da0900 r7:00040000 r6:20000280 r5:84da0901 [ 347.546816][ T6009] r4:00000004 [ 347.546834][ T6009] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 347.547108][ T6009] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 347.547161][ T6009] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 347.547376][ T6009] Exception stack(0xec83dfa8 to 0xec83dff0) [ 347.547452][ T6009] dfa0: 00000000 00000000 00000004 20000280 00040000 00000000 [ 347.547487][ T6009] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 347.547516][ T6009] dfe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 354.433590][ T6034] FAULT_INJECTION: forcing a failure. [ 354.433590][ T6034] name failslab, interval 1, probability 0, space 0, times 0 [ 354.435812][ T6034] CPU: 0 UID: 0 PID: 6034 Comm: syz.1.776 Not tainted syzkaller #0 PREEMPT [ 354.435938][ T6034] Hardware name: ARM-Versatile Express [ 354.435963][ T6034] Call trace: [ 354.436007][ T6034] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 354.436119][ T6034] r7:00000d40 r6:00000000 r5:60000013 r4:82252488 [ 354.436139][ T6034] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 354.436231][ T6034] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 354.436289][ T6034] r5:83b19800 r4:82918810 [ 354.436306][ T6034] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 354.436364][ T6034] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 354.436434][ T6034] r8:00000000 r7:00000d40 r6:0000001c r5:84d85ffc r4:83001240 [ 354.436454][ T6034] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 354.436512][ T6034] [<8050a304>] (__kmalloc_noprof) from [<807d3040>] (tomoyo_encode2+0x64/0xf0) [ 354.436589][ T6034] r10:00000fff r9:8309e400 r8:00000000 r7:834e4cc0 r6:84da33e8 r5:84d85ffc [ 354.436610][ T6034] r4:84d85feb [ 354.436627][ T6034] [<807d2fdc>] (tomoyo_encode2) from [<807d30f0>] (tomoyo_encode+0x24/0x30) [ 354.436689][ T6034] r9:8309e400 r8:00000000 r7:834e4cc0 r6:84da33e8 r5:00001000 r4:84d85fec [ 354.436708][ T6034] [<807d30cc>] (tomoyo_encode) from [<807d317c>] (tomoyo_realpath_from_path+0x80/0x17c) [ 354.436761][ T6034] r5:00001000 r4:84d85000 [ 354.436777][ T6034] [<807d30fc>] (tomoyo_realpath_from_path) from [<807cf27c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 354.436838][ T6034] r10:83b19800 r9:00000000 r8:84da33c0 r7:00005450 r6:00000004 r5:81cd6588 [ 354.436860][ T6034] r4:84da33e8 r3:826c1240 [ 354.436877][ T6034] [<807cf1b0>] (tomoyo_path_number_perm) from [<807d3b5c>] (tomoyo_file_ioctl+0x1c/0x20) [ 354.436956][ T6034] r9:00000003 r8:84da33c0 r7:00000000 r6:00000000 r5:00005450 r4:84da33c0 [ 354.437064][ T6034] [<807d3b40>] (tomoyo_file_ioctl) from [<80780420>] (security_file_ioctl+0x64/0x1e4) [ 354.437133][ T6034] [<807803bc>] (security_file_ioctl) from [<805786b4>] (sys_ioctl+0x4c/0xba0) [ 354.437219][ T6034] r7:00000000 r6:84da33c1 r5:00000000 r4:00005450 [ 354.437240][ T6034] [<80578668>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 354.437285][ T6034] Exception stack(0xec835fa8 to 0xec835ff0) [ 354.437321][ T6034] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 354.437352][ T6034] 5fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76f960bc [ 354.437374][ T6034] 5fe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 354.437407][ T6034] r10:00000036 r9:83b19800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 354.437424][ T6034] r4:00000000 [ 354.468801][ T6034] ERROR: Out of memory at tomoyo_realpath_from_path. [ 354.656419][ T3758] usb 1-1: USB disconnect, device number 9 [ 356.448407][ T3758] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 356.608245][ T3758] usb 1-1: Using ep0 maxpacket: 16 [ 356.618575][ T3758] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 356.618761][ T3758] usb 1-1: config 0 interface 0 has no altsetting 0 [ 356.618875][ T3758] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 356.618904][ T3758] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 356.622965][ T3758] usb 1-1: config 0 descriptor?? [ 356.638692][ T3758] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 357.494798][ T6066] FAULT_INJECTION: forcing a failure. [ 357.494798][ T6066] name failslab, interval 1, probability 0, space 0, times 0 [ 357.495292][ T6066] CPU: 1 UID: 0 PID: 6066 Comm: syz.1.784 Not tainted syzkaller #0 PREEMPT [ 357.495390][ T6066] Hardware name: ARM-Versatile Express [ 357.495415][ T6066] Call trace: [ 357.495468][ T6066] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 357.495582][ T6066] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 357.495602][ T6066] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 357.495653][ T6066] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 357.495700][ T6066] r5:8552b000 r4:82918810 [ 357.495716][ T6066] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 357.495769][ T6066] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 357.495968][ T6066] r8:8552b000 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 357.496055][ T6066] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 357.496207][ T6066] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564234>] (__alloc_skb+0x138/0x160) [ 357.496305][ T6066] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 357.496405][ T6066] r4:828060c0 [ 357.496564][ T6066] [<815640fc>] (__alloc_skb) from [<81686010>] (netlink_alloc_large_skb+0x8c/0xa4) [ 357.496698][ T6066] r8:00000000 r7:85985000 r6:0000001c r5:85198f00 r4:00000140 [ 357.496739][ T6066] [<81685f84>] (netlink_alloc_large_skb) from [<816867d0>] (netlink_sendmsg+0x134/0x444) [ 357.496923][ T6066] r5:85198f00 r4:ec94df20 [ 357.496956][ T6066] [<8168669c>] (netlink_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 357.497162][ T6066] r10:00000000 r9:ec94ddc4 r8:ec94ddc4 r7:00000000 r6:85198f00 r5:ec94df20 [ 357.497332][ T6066] r4:00000000 [ 357.497469][ T6066] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 357.497644][ T6066] r7:00000000 r6:85198f00 r5:000000d0 r4:ec94df20 [ 357.497810][ T6066] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 357.497931][ T6066] r10:ec94de24 r9:20000640 r8:000000d0 r7:00000000 r6:85198f00 r5:ec94df20 [ 357.497970][ T6066] r4:00000000 [ 357.498014][ T6066] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 357.498078][ T6066] r10:00000128 r9:8552b000 r8:858fc900 r7:000000d0 r6:20000640 r5:858fc901 [ 357.498096][ T6066] r4:00000003 [ 357.498111][ T6066] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 357.498194][ T6066] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 357.498216][ T6066] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 357.498268][ T6066] Exception stack(0xec94dfa8 to 0xec94dff0) [ 357.498396][ T6066] dfa0: 00000000 00000000 00000003 20000640 000000d0 00000000 [ 357.498470][ T6066] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f960bc [ 357.498496][ T6066] dfe0: 76f95ec0 76f95eb0 000195a4 00132510 [ 361.700847][ T29] audit: type=1400 audit(361.620:213): avc: denied { write } for pid=6079 comm="syz.1.789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 362.348359][ T6084] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1548 sclass=netlink_audit_socket pid=6084 comm=syz.1.790 [ 367.501972][ T6101] netlink: 'syz.1.795': attribute type 6 has an invalid length. [ 367.639349][ T29] audit: type=1400 audit(367.560:214): avc: denied { write } for pid=6122 comm="syz.1.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 367.644001][ T29] audit: type=1400 audit(367.560:215): avc: denied { nlmsg_write } for pid=6122 comm="syz.1.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 370.385906][ T23] usb 1-1: USB disconnect, device number 10 [ 392.160649][ T29] audit: type=1400 audit(392.080:216): avc: denied { name_bind } for pid=6154 comm="syz.0.804" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 392.161655][ T29] audit: type=1400 audit(392.080:217): avc: denied { node_bind } for pid=6154 comm="syz.0.804" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 392.691884][ T29] audit: type=1400 audit(392.610:218): avc: denied { ioctl } for pid=6162 comm="syz.0.806" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10603 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 394.551006][ T6166] netlink: 'syz.0.807': attribute type 6 has an invalid length. [ 395.071496][ T6168] tmpfs: Unsupported parameter 'huge' [ 398.809503][ T6176] syzkaller0: entered promiscuous mode [ 398.818513][ T6176] syzkaller0: entered allmulticast mode [ 399.849204][ T6187] netlink: 5 bytes leftover after parsing attributes in process `syz.0.814'. [ 399.851182][ T6187] 0ªî{X¹¦: renamed from gretap0 [ 399.856885][ T6187] 0ªî{X¹¦: entered allmulticast mode [ 399.868628][ T6187] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 415.816489][ T6213] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 415.835764][ T6213] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 416.991857][ T6213] hsr_slave_0: entered promiscuous mode [ 416.994080][ T6213] hsr_slave_1: entered promiscuous mode [ 417.010394][ T6213] debugfs: 'hsr0' already exists in 'hsr' [ 417.011128][ T6213] Cannot create hsr debugfs directory [ 417.366112][ T6213] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 417.394117][ T6213] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 417.403732][ T6213] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 417.414156][ T6213] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 418.406040][ T6213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.724142][ T6213] veth0_vlan: entered promiscuous mode [ 421.745772][ T6213] veth1_vlan: entered promiscuous mode [ 421.833155][ T6213] veth0_macvtap: entered promiscuous mode [ 421.850142][ T6213] veth1_macvtap: entered promiscuous mode [ 421.925296][ T1307] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.935002][ T1307] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.935214][ T1307] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.935337][ T1307] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.500051][ T6570] random: crng reseeded on system resumption [ 424.679812][ T6572] netlink: 68 bytes leftover after parsing attributes in process `syz.2.820'. [ 426.076516][ T38] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.131706][ T38] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.184797][ T38] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.253322][ T38] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.460958][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 426.465936][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 426.481460][ T38] bond0 (unregistering): Released all slaves [ 426.564201][ T38] hsr_slave_0: left promiscuous mode [ 426.568867][ T38] hsr_slave_1: left promiscuous mode [ 426.590923][ T38] veth1_macvtap: left promiscuous mode [ 426.593734][ T38] veth0_macvtap: left promiscuous mode [ 426.594918][ T38] veth1_vlan: left promiscuous mode [ 426.598212][ T38] veth0_vlan: left promiscuous mode [ 432.158309][ T29] audit: type=1400 audit(432.070:219): avc: denied { prog_run } for pid=6607 comm="syz.2.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 450.045385][ T6686] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.049152][ T6686] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 453.340348][ T6700] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 453.345694][ T6700] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 456.705949][ T6714] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 456.711982][ T6714] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 459.750144][ T6727] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 459.759337][ T6727] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 461.271669][ T6746] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 461.273912][ T6746] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 462.700599][ T6759] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 462.703410][ T6759] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 463.971828][ T6769] FAULT_INJECTION: forcing a failure. [ 463.971828][ T6769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.979244][ T6769] CPU: 0 UID: 0 PID: 6769 Comm: syz.2.862 Not tainted syzkaller #0 PREEMPT [ 463.979382][ T6769] Hardware name: ARM-Versatile Express [ 463.979408][ T6769] Call trace: [ 463.979448][ T6769] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 463.979558][ T6769] r7:00006364 r6:00000000 r5:60000013 r4:82252488 [ 463.979585][ T6769] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 463.979633][ T6769] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 463.979683][ T6769] r5:839c3000 r4:8294f590 [ 463.979697][ T6769] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 463.979747][ T6769] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 463.979798][ T6769] r8:00000000 r7:00006364 r6:76fe70bc r5:839c3830 r4:76fe6bb8 [ 463.979813][ T6769] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 463.979853][ T6769] [<80986df4>] (should_fail_usercopy) from [<8022b414>] (setup_sigframe+0xe4/0x1c4) [ 463.979902][ T6769] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 463.979961][ T6769] r10:b5003500 r9:76fe6bb8 r8:00000000 r7:839c3830 r6:76fe6b38 r5:e0031fb0 [ 463.979981][ T6769] r4:839c3000 [ 463.979996][ T6769] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 463.980039][ T6769] Exception stack(0xe0031fb0 to 0xe0031ff8) [ 463.980073][ T6769] 1fa0: 00000003 20000340 00024080 00000000 [ 463.980103][ T6769] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 463.980129][ T6769] 1fe0: 76fe6ec0 76fe6eb0 000195a4 0013250c 60000010 00000003 [ 463.980160][ T6769] r10:00000128 r9:839c3000 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 463.980177][ T6769] r4:00000000 [ 464.540258][ T23] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 464.727657][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 464.743988][ T23] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 464.744217][ T23] usb 1-1: config 0 interface 0 has no altsetting 0 [ 464.745544][ T23] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 464.746244][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 464.751462][ T23] usb 1-1: config 0 descriptor?? [ 464.771675][ T23] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 469.080353][ T9] usb 1-1: USB disconnect, device number 11 [ 470.968126][ T23] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 471.138094][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 471.146576][ T23] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 471.147418][ T23] usb 1-1: config 0 interface 0 has no altsetting 0 [ 471.147621][ T23] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 471.147781][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 471.154059][ T23] usb 1-1: config 0 descriptor?? [ 471.166342][ T23] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 474.944783][ T3788] usb 1-1: USB disconnect, device number 12 [ 475.231628][ T6868] FAULT_INJECTION: forcing a failure. [ 475.231628][ T6868] name failslab, interval 1, probability 0, space 0, times 0 [ 475.232062][ T6868] CPU: 1 UID: 0 PID: 6868 Comm: syz.0.879 Not tainted syzkaller #0 PREEMPT [ 475.232148][ T6868] Hardware name: ARM-Versatile Express [ 475.232173][ T6868] Call trace: [ 475.232216][ T6868] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 475.232337][ T6868] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 475.232355][ T6868] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 475.232404][ T6868] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 475.232457][ T6868] r5:83841800 r4:82918810 [ 475.232610][ T6868] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 475.232677][ T6868] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 475.232848][ T6868] r8:83841800 r7:00000000 r6:00000cc0 r5:ffffffff r4:830a7c00 [ 475.232919][ T6868] [<8052ee50>] (should_failslab) from [<8050f3e4>] (kmem_cache_alloc_node_noprof+0x50/0x448) [ 475.233055][ T6868] [<8050f394>] (kmem_cache_alloc_node_noprof) from [<81564234>] (__alloc_skb+0x138/0x160) [ 475.233204][ T6868] r10:00000000 r9:854e0000 r8:00000cc0 r7:00000000 r6:830a7c00 r5:ffffffff [ 475.233277][ T6868] r4:828060c0 [ 475.233322][ T6868] [<815640fc>] (__alloc_skb) from [<818ddf80>] (pfkey_sendmsg+0x74/0x2b4) [ 475.233453][ T6868] r8:84cfa400 r7:ea4c9f20 r6:00000000 r5:00000014 r4:00000000 [ 475.233474][ T6868] [<818ddf0c>] (pfkey_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 475.233536][ T6868] r10:00000000 r9:ea4c9dc4 r8:ea4c9dc4 r7:00000000 r6:85058f00 r5:ea4c9f20 [ 475.233599][ T6868] r4:00000000 [ 475.233664][ T6868] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 475.233865][ T6868] r7:00000000 r6:85058f00 r5:00048000 r4:ea4c9f20 [ 475.233889][ T6868] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 475.234125][ T6868] r10:ea4c9e24 r9:2000a8c0 r8:00048000 r7:00000000 r6:85058f00 r5:ea4c9f20 [ 475.234266][ T6868] r4:00000000 [ 475.234287][ T6868] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 475.234422][ T6868] r10:00000128 r9:83841800 r8:84fc3180 r7:00048000 r6:2000a8c0 r5:84fc3181 [ 475.234529][ T6868] r4:00000004 [ 475.234604][ T6868] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 475.234846][ T6868] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 475.235060][ T6868] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 475.235142][ T6868] Exception stack(0xea4c9fa8 to 0xea4c9ff0) [ 475.235187][ T6868] 9fa0: 00000000 00000000 00000004 2000a8c0 00048000 00000000 [ 475.235220][ T6868] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 475.235252][ T6868] 9fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 475.911363][ T3788] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 476.098830][ T3788] usb 1-1: Using ep0 maxpacket: 16 [ 476.126748][ T3788] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 476.131929][ T3788] usb 1-1: config 0 interface 0 has no altsetting 0 [ 476.132176][ T3788] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 476.133624][ T3788] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 476.138937][ T3788] usb 1-1: config 0 descriptor?? [ 476.150963][ T3788] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 476.479308][ T9] usb 1-1: USB disconnect, device number 13 [ 479.441996][ T29] audit: type=1400 audit(479.360:220): avc: denied { ioctl } for pid=6915 comm="syz.0.894" path="socket:[12326]" dev="sockfs" ino=12326 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 481.114498][ T29] audit: type=1400 audit(481.030:221): avc: denied { connect } for pid=6932 comm="syz.0.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 482.808326][ T3758] usb 1-1: new full-speed USB device number 14 using dummy_hcd [ 483.007740][ T3758] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 483.008256][ T3758] usb 1-1: can't read configurations, error -61 [ 483.143735][ T3758] usb 1-1: new full-speed USB device number 15 using dummy_hcd [ 483.335849][ T3758] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 483.336180][ T3758] usb 1-1: can't read configurations, error -61 [ 483.338446][ T3758] usb usb1-port1: attempt power cycle [ 483.687747][ T3758] usb 1-1: new full-speed USB device number 16 using dummy_hcd [ 483.743301][ T3758] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 483.743681][ T3758] usb 1-1: can't read configurations, error -61 [ 483.887882][ T3758] usb 1-1: new full-speed USB device number 17 using dummy_hcd [ 483.939070][ T3758] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 483.939433][ T3758] usb 1-1: can't read configurations, error -61 [ 483.942469][ T3758] usb usb1-port1: unable to enumerate USB device [ 489.058863][ T29] audit: type=1400 audit(488.970:222): avc: denied { accept } for pid=6962 comm="syz.2.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 493.558206][ T9] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 493.718556][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 493.744993][ T9] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 493.745377][ T9] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.745664][ T9] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 493.745830][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 493.753021][ T9] usb 1-1: config 0 descriptor?? [ 493.813999][ T9] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 493.963265][ T6995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 493.964899][ T6995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 494.164586][ T23] usb 1-1: USB disconnect, device number 18 [ 494.340543][ T7005] FAULT_INJECTION: forcing a failure. [ 494.340543][ T7005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 494.342532][ T7005] CPU: 1 UID: 0 PID: 7005 Comm: syz.0.918 Not tainted syzkaller #0 PREEMPT [ 494.342650][ T7005] Hardware name: ARM-Versatile Express [ 494.342675][ T7005] Call trace: [ 494.342716][ T7005] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 494.342822][ T7005] r7:eaa6de20 r6:00000000 r5:60000013 r4:82252488 [ 494.342842][ T7005] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 494.342892][ T7005] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 494.342943][ T7005] r5:83846c00 r4:8294f590 [ 494.342958][ T7005] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 494.343009][ T7005] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 494.343060][ T7005] r8:00040000 r7:eaa6de20 r6:20000280 r5:00000000 r4:eaa6df20 [ 494.343076][ T7005] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 494.343118][ T7005] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 494.343172][ T7005] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 494.343232][ T7005] r8:00040000 r7:00000000 r6:85059900 r5:eaa6df20 r4:eaa6de64 [ 494.343250][ T7005] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 494.343315][ T7005] r10:00000128 r9:83846c00 r8:84fc3b40 r7:00040000 r6:20000280 r5:84fc3b41 [ 494.343349][ T7005] r4:00000004 [ 494.343369][ T7005] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 494.343439][ T7005] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 494.343459][ T7005] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 494.343507][ T7005] Exception stack(0xeaa6dfa8 to 0xeaa6dff0) [ 494.343541][ T7005] dfa0: 00000000 00000000 00000004 20000280 00040000 00000000 [ 494.343572][ T7005] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 494.343597][ T7005] dfe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 495.076175][ T7011] FAULT_INJECTION: forcing a failure. [ 495.076175][ T7011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 495.078773][ T7011] CPU: 0 UID: 0 PID: 7011 Comm: syz.0.920 Not tainted syzkaller #0 PREEMPT [ 495.078915][ T7011] Hardware name: ARM-Versatile Express [ 495.078941][ T7011] Call trace: [ 495.078985][ T7011] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 495.079087][ T7011] r7:00000000 r6:00000000 r5:60000113 r4:82252488 [ 495.079105][ T7011] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 495.079154][ T7011] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 495.079204][ T7011] r5:83846c00 r4:8294f590 [ 495.079219][ T7011] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 495.079268][ T7011] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 495.079319][ T7011] r8:76edff30 r7:00000000 r6:00000000 r5:eaa91f68 r4:00000002 [ 495.079334][ T7011] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 495.079375][ T7011] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 495.079425][ T7011] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 495.079494][ T7011] r10:00000001 r9:80615fb4 r8:00000002 r7:eaa91f68 r6:0000000f r5:76edff30 [ 495.079517][ T7011] r4:83846c00 r3:eaa91e9f [ 495.079535][ T7011] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 495.079611][ T7011] r8:76edff30 r7:eaa91f68 r6:83846c00 r5:0000000f r4:84fc3600 [ 495.079629][ T7011] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 495.079718][ T7011] r10:00000003 r9:83846c00 r8:8020029c r7:00000000 r6:00000000 r5:84fc3600 [ 495.079739][ T7011] r4:84fc3603 [ 495.079757][ T7011] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 495.079812][ T7011] r7:00000003 r6:00000004 r5:76edff30 r4:0000000f [ 495.079829][ T7011] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 495.079874][ T7011] Exception stack(0xeaa91fa8 to 0xeaa91ff0) [ 495.079913][ T7011] 1fa0: 0000000f 76edff30 00000004 76edff30 0000000f 00000000 [ 495.079945][ T7011] 1fc0: 0000000f 76edff30 00000004 00000003 00300000 00000000 00006364 76ee00bc [ 495.080013][ T7011] 1fe0: 00000158 76edfed0 000d81d0 001303dc [ 495.532172][ C1] hrtimer: interrupt took 74653232 ns [ 495.609735][ T23] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 495.778004][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 495.795335][ T23] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 495.795633][ T23] usb 1-1: config 0 interface 0 has no altsetting 0 [ 495.795760][ T23] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 495.795849][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 495.799897][ T23] usb 1-1: config 0 descriptor?? [ 495.831303][ T23] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 495.864499][ T7021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7021 comm=syz.2.923 [ 496.015528][ T7027] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 496.016909][ T7027] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 496.332920][ T3758] usb 1-1: USB disconnect, device number 19 [ 496.703779][ T7040] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7040 comm=syz.2.926 [ 497.159219][ T7047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 497.160161][ T7047] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 498.641419][ T29] audit: type=1400 audit(498.560:223): avc: denied { getattr } for pid=7060 comm="syz.2.935" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 498.720301][ T7063] FAULT_INJECTION: forcing a failure. [ 498.720301][ T7063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 498.720623][ T7063] CPU: 1 UID: 0 PID: 7063 Comm: syz.2.936 Not tainted syzkaller #0 PREEMPT [ 498.720679][ T7063] Hardware name: ARM-Versatile Express [ 498.720692][ T7063] Call trace: [ 498.720717][ T7063] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 498.720786][ T7063] r7:eac91e20 r6:00000000 r5:60000013 r4:82252488 [ 498.720795][ T7063] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 498.720823][ T7063] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 498.720851][ T7063] r5:839c5400 r4:8294f590 [ 498.720858][ T7063] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 498.720886][ T7063] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 498.720913][ T7063] r8:04008004 r7:eac91e20 r6:20000200 r5:00000000 r4:eac91f20 [ 498.720921][ T7063] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 498.720944][ T7063] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 498.721045][ T7063] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 498.721144][ T7063] r8:04008004 r7:00000000 r6:85059180 r5:eac91f20 r4:eac91e64 [ 498.721233][ T7063] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 498.721370][ T7063] r10:00000128 r9:839c5400 r8:84fc3e40 r7:04008004 r6:20000200 r5:84fc3e41 [ 498.721584][ T7063] r4:00000003 [ 498.721636][ T7063] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 498.721823][ T7063] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 498.721952][ T7063] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 498.722264][ T7063] Exception stack(0xeac91fa8 to 0xeac91ff0) [ 498.722292][ T7063] 1fa0: 00000000 00000000 00000003 20000200 04008004 00000000 [ 498.722310][ T7063] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 498.722322][ T7063] 1fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 499.000477][ T7067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 499.005120][ T7067] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 499.576748][ T29] audit: type=1400 audit(499.490:224): avc: denied { map } for pid=7074 comm="syz.2.941" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 500.644659][ T29] audit: type=1400 audit(500.560:225): avc: denied { setopt } for pid=7104 comm="syz.2.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 500.665168][ T29] audit: type=1400 audit(500.580:226): avc: denied { connect } for pid=7104 comm="syz.2.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 502.893638][ T7118] SELinux: Context system_u:object_r:lastlog_t:s0 is not valid (left unmapped). [ 502.894800][ T29] audit: type=1400 audit(502.810:227): avc: denied { relabelto } for pid=7117 comm="syz.0.957" name="pcmC6D5c" dev="devtmpfs" ino=807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:lastlog_t:s0" [ 502.897204][ T29] audit: type=1400 audit(502.810:228): avc: denied { associate } for pid=7117 comm="syz.0.957" name="pcmC6D5c" dev="devtmpfs" ino=807 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:lastlog_t:s0" [ 507.131050][ T7161] FAULT_INJECTION: forcing a failure. [ 507.131050][ T7161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 507.133636][ T7161] CPU: 0 UID: 0 PID: 7161 Comm: syz.2.973 Not tainted syzkaller #0 PREEMPT [ 507.133741][ T7161] Hardware name: ARM-Versatile Express [ 507.133769][ T7161] Call trace: [ 507.133812][ T7161] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 507.133922][ T7161] r7:eb925e20 r6:00000000 r5:60000013 r4:82252488 [ 507.133942][ T7161] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 507.133995][ T7161] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 507.134052][ T7161] r5:839c1800 r4:8294f590 [ 507.134068][ T7161] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 507.134130][ T7161] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 507.134212][ T7161] r8:00004000 r7:eb925e20 r6:20000480 r5:00000000 r4:eb925f20 [ 507.134230][ T7161] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 507.134275][ T7161] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 507.134347][ T7161] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 507.134410][ T7161] r8:00004000 r7:00000000 r6:837d8f00 r5:eb925f20 r4:eb925e64 [ 507.134428][ T7161] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 507.134493][ T7161] r10:00000128 r9:839c1800 r8:85503c00 r7:00004000 r6:20000480 r5:85503c01 [ 507.134514][ T7161] r4:00000003 [ 507.134530][ T7161] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 507.134596][ T7161] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 507.134614][ T7161] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 507.134666][ T7161] Exception stack(0xeb925fa8 to 0xeb925ff0) [ 507.134701][ T7161] 5fa0: 00000000 00000000 00000003 20000480 00004000 00000000 [ 507.134735][ T7161] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 507.134762][ T7161] 5fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 511.379293][ T29] audit: type=1400 audit(511.300:229): avc: denied { getattr } for pid=7185 comm="syz.2.983" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12888 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 511.837606][ T41] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 511.987784][ T41] usb 1-1: Using ep0 maxpacket: 16 [ 511.999455][ T41] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 512.002287][ T41] usb 1-1: config 0 interface 0 has no altsetting 0 [ 512.005775][ T41] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 512.008824][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 512.021704][ T41] usb 1-1: config 0 descriptor?? [ 512.032911][ T41] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 512.375067][ T3758] usb 1-1: USB disconnect, device number 20 [ 513.972284][ T29] audit: type=1400 audit(513.890:230): avc: denied { create } for pid=7212 comm="syz.2.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 515.639570][ T29] audit: type=1400 audit(515.560:231): avc: denied { relabelfrom } for pid=7228 comm="syz.2.996" name="" dev="pipefs" ino=12103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 515.642274][ T7229] SELinux: Context system_u:object_r:usbmon_device_t:s0 is not valid (left unmapped). [ 515.644247][ T29] audit: type=1400 audit(515.560:232): avc: denied { relabelto } for pid=7228 comm="syz.2.996" name="" dev="pipefs" ino=12103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 515.956279][ T7234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 515.960420][ T7234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 518.318946][ T41] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 518.478077][ T41] usb 1-1: Using ep0 maxpacket: 16 [ 518.491742][ T41] usb 1-1: config 0 interface 0 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 518.492597][ T41] usb 1-1: config 0 interface 0 has no altsetting 0 [ 518.494693][ T41] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 518.496399][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 518.506732][ T41] usb 1-1: config 0 descriptor?? [ 518.515509][ T41] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 518.828935][ T3788] usb 1-1: USB disconnect, device number 21 [ 518.989801][ T7280] FAULT_INJECTION: forcing a failure. [ 518.989801][ T7280] name failslab, interval 1, probability 0, space 0, times 0 [ 518.990826][ T7280] CPU: 0 UID: 0 PID: 7280 Comm: syz.2.1011 Not tainted syzkaller #0 PREEMPT [ 518.990887][ T7280] Hardware name: ARM-Versatile Express [ 518.990901][ T7280] Call trace: [ 518.990922][ T7280] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 518.990987][ T7280] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 518.990997][ T7280] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 518.991025][ T7280] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 518.991054][ T7280] r5:84143c00 r4:82918810 [ 518.991062][ T7280] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 518.991091][ T7280] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 518.991126][ T7280] r8:84143c00 r7:00000000 r6:00000cc0 r5:76fe6ab0 r4:830a4a80 [ 518.991135][ T7280] [<8052ee50>] (should_failslab) from [<8050eb54>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 518.991166][ T7280] [<8050eb08>] (kmem_cache_alloc_noprof) from [<8056e504>] (getname_flags.part.0+0x28/0x18c) [ 518.991205][ T7280] r10:00000142 r9:84143c00 r8:8020029c r7:00000000 r6:824578b8 r5:76fe6ab0 [ 518.991215][ T7280] r4:76fe6ab0 [ 518.991222][ T7280] [<8056e4dc>] (getname_flags.part.0) from [<80573574>] (getname_flags+0x3c/0x50) [ 518.991256][ T7280] r9:84143c00 r8:8020029c r7:ffffff9c r6:ebad9f58 r5:00000000 r4:76fe6ab0 [ 518.991265][ T7280] [<80573538>] (getname_flags) from [<8055be04>] (do_sys_openat2+0x60/0xe0) [ 518.991293][ T7280] r5:76fe6ab0 r4:00000000 [ 518.991301][ T7280] [<8055bda4>] (do_sys_openat2) from [<8055c25c>] (sys_openat+0x98/0xd4) [ 518.991341][ T7280] r7:00000142 r6:00000000 r5:76fe6ab0 r4:ffffff9c [ 518.991349][ T7280] [<8055c1c4>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 518.991374][ T7280] Exception stack(0xebad9fa8 to 0xebad9ff0) [ 518.991394][ T7280] 9fa0: 52109c68 76fe6ab0 ffffff9c 76fe6ab0 52109c68 00000000 [ 518.991411][ T7280] 9fc0: 52109c68 76fe6ab0 00000000 00000142 00000000 00000000 00006364 76fe70bc [ 518.991424][ T7280] 9fe0: 81030303 76fe6a68 000d81d0 00130198 [ 518.991437][ T7280] r5:76fe6ab0 r4:52109c68 [ 519.566461][ T7281] FAULT_INJECTION: forcing a failure. [ 519.566461][ T7281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.567260][ T7281] CPU: 1 UID: 0 PID: 7281 Comm: syz.0.1010 Not tainted syzkaller #0 PREEMPT [ 519.567384][ T7281] Hardware name: ARM-Versatile Express [ 519.567410][ T7281] Call trace: [ 519.567450][ T7281] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 519.567554][ T7281] r7:76f00b58 r6:00000000 r5:60000013 r4:82252488 [ 519.567583][ T7281] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 519.567783][ T7281] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 519.567860][ T7281] r5:839c4800 r4:8294f590 [ 519.567876][ T7281] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 519.567931][ T7281] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 519.567984][ T7281] r8:b5003587 r7:76f00b58 r6:76f00b38 r5:ebcc5f58 r4:76f00b38 [ 519.568001][ T7281] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 519.568046][ T7281] [<80986df4>] (should_fail_usercopy) from [<8026ad70>] (copy_siginfo_to_user+0x1c/0xa4) [ 519.568098][ T7281] [<8026ad54>] (copy_siginfo_to_user) from [<8022bb50>] (do_work_pending+0x378/0x4e8) [ 519.568334][ T7281] r9:fffffe00 r8:b5003587 r7:839c5030 r6:76f00b38 r5:ebcc5fb0 r4:839c4800 [ 519.568427][ T7281] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 519.568610][ T7281] Exception stack(0xebcc5fb0 to 0xebcc5ff8) [ 519.568798][ T7281] 5fa0: 00000003 20000340 00024080 00000000 [ 519.568841][ T7281] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 519.569157][ T7281] 5fe0: 76f00ec0 76f00eb0 000195a4 0013250c 60000010 00000003 [ 519.569284][ T7281] r10:00000128 r9:839c4800 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 519.569396][ T7281] r4:00000000 [ 520.398862][ T7299] FAULT_INJECTION: forcing a failure. [ 520.398862][ T7299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 520.399130][ T7299] CPU: 1 UID: 0 PID: 7299 Comm: syz.2.1018 Not tainted syzkaller #0 PREEMPT [ 520.399182][ T7299] Hardware name: ARM-Versatile Express [ 520.399196][ T7299] Call trace: [ 520.399217][ T7299] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 520.399277][ T7299] r7:ebe89e20 r6:00000000 r5:60000013 r4:82252488 [ 520.399287][ T7299] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 520.399324][ T7299] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 520.399353][ T7299] r5:839c0c00 r4:8294f590 [ 520.399360][ T7299] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 520.399387][ T7299] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 520.399414][ T7299] r8:04010890 r7:ebe89e20 r6:20000040 r5:00000000 r4:ebe89f20 [ 520.399422][ T7299] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 520.399443][ T7299] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 520.399590][ T7299] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 520.399659][ T7299] r8:04010890 r7:00000000 r6:8505a500 r5:ebe89f20 r4:ebe89e64 [ 520.399864][ T7299] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 520.399960][ T7299] r10:00000128 r9:839c0c00 r8:859723c0 r7:04010890 r6:20000040 r5:859723c1 [ 520.399979][ T7299] r4:00000004 [ 520.400224][ T7299] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 520.400344][ T7299] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 520.400365][ T7299] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 520.400409][ T7299] Exception stack(0xebe89fa8 to 0xebe89ff0) [ 520.400509][ T7299] 9fa0: 00000000 00000000 00000004 20000040 04010890 00000000 [ 520.400761][ T7299] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 520.401080][ T7299] 9fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 520.577668][ T29] audit: type=1400 audit(520.490:233): avc: denied { create } for pid=7292 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 520.588444][ T29] audit: type=1400 audit(520.510:234): avc: denied { bind } for pid=7292 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 522.831962][ T29] audit: type=1400 audit(522.750:235): avc: denied { listen } for pid=7312 comm="syz.0.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 524.421708][ T7331] FAULT_INJECTION: forcing a failure. [ 524.421708][ T7331] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.428448][ T7331] CPU: 0 UID: 0 PID: 7331 Comm: syz.0.1029 Not tainted syzkaller #0 PREEMPT [ 524.428613][ T7331] Hardware name: ARM-Versatile Express [ 524.428656][ T7331] Call trace: [ 524.428708][ T7331] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 524.428843][ T7331] r7:00000009 r6:00000000 r5:60000013 r4:82252488 [ 524.428860][ T7331] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 524.428909][ T7331] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 524.428958][ T7331] r5:839c3000 r4:8294f590 [ 524.428973][ T7331] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 524.429031][ T7331] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 524.429088][ T7331] r8:00000000 r7:00000009 r6:824578b8 r5:20000200 r4:20000200 [ 524.429107][ T7331] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 524.429155][ T7331] [<80986df4>] (should_fail_usercopy) from [<8098ce74>] (strncpy_from_user+0x20/0x1a0) [ 524.429329][ T7331] [<8098ce54>] (strncpy_from_user) from [<8056e520>] (getname_flags.part.0+0x44/0x18c) [ 524.429440][ T7331] r10:00000145 r9:00000000 r8:00000000 r7:00000009 r6:824578b8 r5:20000200 [ 524.429466][ T7331] r4:8383e000 [ 524.429483][ T7331] [<8056e4dc>] (getname_flags.part.0) from [<80573574>] (getname_flags+0x3c/0x50) [ 524.429543][ T7331] r9:00000000 r8:00000000 r7:20000200 r6:00000003 r5:00000009 r4:20000200 [ 524.429592][ T7331] [<80573538>] (getname_flags) from [<80573b2c>] (user_path_at+0x2c/0x64) [ 524.429672][ T7331] r5:00000009 r4:ebad9f5c [ 524.429689][ T7331] [<80573b00>] (user_path_at) from [<8055b514>] (do_fchownat+0x68/0xf0) [ 524.429744][ T7331] r6:00000003 r5:00000009 r4:00001000 [ 524.429762][ T7331] [<8055b4ac>] (do_fchownat) from [<8055b5b8>] (sys_fchownat+0x1c/0x24) [ 524.429817][ T7331] r9:839c3000 r8:8020029c r7:00000145 r6:001304b8 r5:00000000 r4:00001000 [ 524.429836][ T7331] [<8055b59c>] (sys_fchownat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 524.429879][ T7331] Exception stack(0xebad9fa8 to 0xebad9ff0) [ 524.429919][ T7331] 9fa0: 00001000 00000000 00000003 20000200 00000000 00000000 [ 524.429950][ T7331] 9fc0: 00001000 00000000 001304b8 00000145 00300000 00000000 00006364 76f010bc [ 524.429972][ T7331] 9fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 526.800581][ T7345] FAULT_INJECTION: forcing a failure. [ 526.800581][ T7345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 526.809486][ T7345] CPU: 0 UID: 0 PID: 7345 Comm: syz.0.1035 Not tainted syzkaller #0 PREEMPT [ 526.809628][ T7345] Hardware name: ARM-Versatile Express [ 526.809649][ T7345] Call trace: [ 526.809686][ T7345] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 526.809781][ T7345] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 526.809798][ T7345] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 526.809842][ T7345] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 526.809890][ T7345] r5:839c5400 r4:82918864 [ 526.809903][ T7345] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 526.809948][ T7345] [<80986bb4>] (should_fail_ex) from [<8052ef4c>] (should_fail_alloc_page+0x68/0x74) [ 526.810006][ T7345] r8:00000001 r7:00000000 r6:00000000 r5:00140cca r4:ebd7dde8 [ 526.810021][ T7345] [<8052eee4>] (should_fail_alloc_page) from [<804f700c>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 526.810070][ T7345] [<804f6f78>] (prepare_alloc_pages.constprop.0) from [<804ff5d4>] (__alloc_frozen_pages_noprof+0xac/0x1104) [ 526.810130][ T7345] r10:ebd7dfb0 r9:00000000 r8:839c5400 r7:00000040 r6:00140cca r5:839c5400 [ 526.810149][ T7345] r4:00000000 r3:ebd7dde8 [ 526.810163][ T7345] [<804ff528>] (__alloc_frozen_pages_noprof) from [<805006a0>] (__folio_alloc_noprof+0x14/0x6c) [ 526.810283][ T7345] r10:ebd7dfb0 r9:858f7a00 r8:00000001 r7:00000040 r6:76efedfc r5:839c5400 [ 526.810302][ T7345] r4:00001255 [ 526.810316][ T7345] [<8050068c>] (__folio_alloc_noprof) from [<804d0884>] (handle_mm_fault+0xcec/0x14e0) [ 526.810374][ T7345] r5:839c5400 r4:00001255 [ 526.810387][ T7345] [<804cfb98>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 526.810446][ T7345] r10:00000002 r9:85865040 r8:00000255 r7:839c5400 r6:00000a07 r5:76efedfc [ 526.810462][ T7345] r4:ebd7dfb0 [ 526.810476][ T7345] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 526.810530][ T7345] r10:00006364 r9:00000000 r8:80234128 r7:ebd7dfb0 r6:76efedfc r5:00000a07 [ 526.810546][ T7345] r4:8281d0c8 [ 526.810559][ T7345] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 526.810604][ T7345] Exception stack(0xebd7dfb0 to 0xebd7dff8) [ 526.810633][ T7345] dfa0: ffffffff 0018934c 76f00edc 00000000 [ 526.810662][ T7345] dfc0: 002eeff4 76efeea0 002eec68 001892b0 002e8000 00000000 00006364 76f010bc [ 526.810688][ T7345] dfe0: 76efee9c 76efedd8 76f00e9c 000fe4b8 60000010 ffffffff [ 526.810715][ T7345] r8:826b8044 r7:839c5400 r6:ffffffff r5:60000010 r4:000fe4b8 [ 526.833957][ T7345] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 530.685617][ T7389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=7389 comm=syz.2.1053 [ 531.528394][ T29] audit: type=1400 audit(531.440:236): avc: denied { name_bind } for pid=7397 comm="syz.2.1055" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 532.453547][ T7425] FAULT_INJECTION: forcing a failure. [ 532.453547][ T7425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.454064][ T7425] CPU: 1 UID: 0 PID: 7425 Comm: syz.2.1060 Not tainted syzkaller #0 PREEMPT [ 532.454158][ T7425] Hardware name: ARM-Versatile Express [ 532.454282][ T7425] Call trace: [ 532.454361][ T7425] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 532.454470][ T7425] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 532.454488][ T7425] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 532.454543][ T7425] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 532.455026][ T7425] r5:83842400 r4:8294f590 [ 532.455086][ T7425] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 532.455163][ T7425] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 532.455300][ T7425] r8:76fe6f30 r7:00000000 r6:00000000 r5:ec32df68 r4:00000002 [ 532.455366][ T7425] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 532.455474][ T7425] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 532.455671][ T7425] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 532.455763][ T7425] r10:00000001 r9:80615fb4 r8:00000002 r7:ec32df68 r6:0000000f r5:76fe6f30 [ 532.455788][ T7425] r4:83842400 r3:ec32de9f [ 532.455808][ T7425] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 532.455908][ T7425] r8:76fe6f30 r7:ec32df68 r6:83842400 r5:0000000f r4:85972600 [ 532.456015][ T7425] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 532.456099][ T7425] r10:00000003 r9:83842400 r8:8020029c r7:00000000 r6:00000000 r5:85972600 [ 532.456219][ T7425] r4:85972603 [ 532.456543][ T7425] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 532.456931][ T7425] r7:00000003 r6:00000004 r5:76fe6f30 r4:0000000f [ 532.456982][ T7425] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 532.457304][ T7425] Exception stack(0xec32dfa8 to 0xec32dff0) [ 532.457420][ T7425] dfa0: 0000000f 76fe6f30 00000004 76fe6f30 0000000f 00000000 [ 532.457479][ T7425] dfc0: 0000000f 76fe6f30 00000004 00000003 00300000 00000000 00006364 76fe70bc [ 532.457529][ T7425] dfe0: 00000158 76fe6ed0 000d81d0 001303dc [ 535.492876][ T7447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2051 sclass=netlink_tcpdiag_socket pid=7447 comm=syz.0.1068 [ 535.522405][ T29] audit: type=1400 audit(535.440:237): avc: denied { associate } for pid=7446 comm="syz.0.1068" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 535.526475][ T29] audit: type=1400 audit(535.440:238): avc: denied { append } for pid=7446 comm="syz.0.1068" name="pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 540.518436][ T41] usb 1-1: new low-speed USB device number 22 using dummy_hcd [ 540.688325][ T41] usb 1-1: config 1 has an invalid descriptor of length 163, skipping remainder of the config [ 540.688564][ T41] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 547.446526][ T29] audit: type=1400 audit(547.360:239): avc: denied { mounton } for pid=7504 comm="syz.2.1089" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 547.600063][ T29] audit: type=1400 audit(547.520:240): avc: denied { accept } for pid=7506 comm="syz.2.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 550.345803][ T41] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 550.346221][ T41] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 550.346559][ T41] usb 1-1: Product: syz [ 550.364352][ T41] usb 1-1: can't set config #1, error -71 [ 550.381440][ T41] usb 1-1: USB disconnect, device number 22 [ 550.483066][ T29] audit: type=1400 audit(550.400:241): avc: denied { read } for pid=7524 comm="syz.0.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 550.493119][ T29] audit: type=1400 audit(550.410:242): avc: denied { nlmsg_read } for pid=7524 comm="syz.0.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 550.705677][ T7528] FAULT_INJECTION: forcing a failure. [ 550.705677][ T7528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 550.706213][ T7528] CPU: 0 UID: 0 PID: 7528 Comm: syz.0.1094 Not tainted syzkaller #0 PREEMPT [ 550.706302][ T7528] Hardware name: ARM-Versatile Express [ 550.706350][ T7528] Call trace: [ 550.706392][ T7528] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 550.706502][ T7528] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 550.706521][ T7528] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 550.706722][ T7528] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 550.706826][ T7528] r5:839c0c00 r4:8294f590 [ 550.706964][ T7528] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 550.707141][ T7528] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 550.707352][ T7528] r8:76f00f30 r7:00000000 r6:00000000 r5:ecc25f68 r4:00000002 [ 550.707638][ T7528] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 550.707711][ T7528] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 550.707805][ T7528] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 550.707868][ T7528] r10:00000001 r9:80615fb4 r8:00000002 r7:ecc25f68 r6:0000000f r5:76f00f30 [ 550.707887][ T7528] r4:839c0c00 r3:ecc25e9f [ 550.707901][ T7528] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 550.708034][ T7528] r8:76f00f30 r7:ecc25f68 r6:839c0c00 r5:0000000f r4:8486f6c0 [ 550.708060][ T7528] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 550.708124][ T7528] r10:00000003 r9:839c0c00 r8:8020029c r7:00000000 r6:00000000 r5:8486f6c0 [ 550.708144][ T7528] r4:8486f6c3 [ 550.708232][ T7528] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 550.708409][ T7528] r7:00000003 r6:00000004 r5:76f00f30 r4:0000000f [ 550.708566][ T7528] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 550.708626][ T7528] Exception stack(0xecc25fa8 to 0xecc25ff0) [ 550.708780][ T7528] 5fa0: 0000000f 76f00f30 00000004 76f00f30 0000000f 00000000 [ 550.708909][ T7528] 5fc0: 0000000f 76f00f30 00000004 00000003 00300000 00000000 00006364 76f010bc [ 550.708994][ T7528] 5fe0: 00000158 76f00ed0 000d81d0 001303dc [ 550.876586][ T7534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=7534 comm=syz.0.1096 [ 552.261960][ T29] audit: type=1400 audit(552.180:243): avc: denied { write } for pid=7551 comm="syz.2.1102" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 552.491830][ T29] audit: type=1400 audit(552.410:244): avc: denied { getopt } for pid=7557 comm="syz.2.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 552.930665][ T7565] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7565 comm=syz.2.1107 [ 553.151693][ T7570] FAULT_INJECTION: forcing a failure. [ 553.151693][ T7570] name failslab, interval 1, probability 0, space 0, times 0 [ 553.152012][ T7570] CPU: 1 UID: 0 PID: 7570 Comm: syz.2.1108 Not tainted syzkaller #0 PREEMPT [ 553.152061][ T7570] Hardware name: ARM-Versatile Express [ 553.152074][ T7570] Call trace: [ 553.152096][ T7570] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 553.152156][ T7570] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 553.152165][ T7570] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 553.152190][ T7570] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 553.152215][ T7570] r5:8567d400 r4:82918810 [ 553.152222][ T7570] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 553.152249][ T7570] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 553.152289][ T7570] r8:00000028 r7:00000000 r6:00000dc0 r5:ecdb9e98 r4:83001240 [ 553.152297][ T7570] [<8052ee50>] (should_failslab) from [<8050f828>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 553.152324][ T7570] [<8050f7dc>] (__kmalloc_cache_noprof) from [<817590d8>] (tcp_sendmsg_fastopen+0x94/0x188) [ 553.152358][ T7570] r10:20000000 r9:ecdb9e98 r8:ecdb9ee4 r7:ecdb9dd4 r6:00000000 r5:ecdb9e98 [ 553.152367][ T7570] r4:85ad39c0 [ 553.152375][ T7570] [<81759044>] (tcp_sendmsg_fastopen) from [<81759bc4>] (tcp_sendmsg_locked+0x9f8/0xfd8) [ 553.152402][ T7570] r8:85ad39c0 r7:00000000 r6:00000000 r5:00000000 r4:00000000 [ 553.152410][ T7570] [<817591cc>] (tcp_sendmsg_locked) from [<8175a1d4>] (tcp_sendmsg+0x30/0x44) [ 553.152438][ T7570] r10:00000122 r9:84cbae40 r8:84cbae41 r7:20000000 r6:00000000 r5:ecdb9e98 [ 553.152446][ T7570] r4:85ad39c0 [ 553.152454][ T7570] [<8175a1a4>] (tcp_sendmsg) from [<8183f1c0>] (inet6_sendmsg+0x40/0x4c) [ 553.152482][ T7570] r7:20000000 r6:85ad39c0 r5:00000000 r4:ecdb9e98 [ 553.152490][ T7570] [<8183f180>] (inet6_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 553.152519][ T7570] r7:20000000 r6:83572280 r5:ecdb9e98 r4:00000000 [ 553.152527][ T7570] [<815569e0>] (__sock_sendmsg) from [<815589a8>] (__sys_sendto+0x110/0x160) [ 553.152554][ T7570] r7:20000000 r6:83572280 r5:20000000 r4:00000000 [ 553.152561][ T7570] [<81558898>] (__sys_sendto) from [<81558a14>] (sys_sendto+0x1c/0x24) [ 553.152590][ T7570] r9:8567d400 r8:8020029c r7:00000122 r6:001304b8 r5:00000020 r4:20000000 [ 553.152597][ T7570] [<815589f8>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 553.152619][ T7570] Exception stack(0xecdb9fa8 to 0xecdb9ff0) [ 553.152638][ T7570] 9fa0: 20000000 00000020 00000005 00000000 00000000 20000000 [ 553.152653][ T7570] 9fc0: 20000000 00000020 001304b8 00000122 00300000 00000000 00006364 76fe70bc [ 553.152665][ T7570] 9fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 553.463881][ T29] audit: type=1400 audit(553.380:245): avc: denied { map } for pid=7576 comm="syz.0.1112" path="socket:[14643]" dev="sockfs" ino=14643 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 555.696578][ T7608] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7608 comm=syz.0.1118 [ 559.014128][ T29] audit: type=1400 audit(558.930:246): avc: denied { map } for pid=7635 comm="syz.0.1128" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 559.016731][ T29] audit: type=1400 audit(558.930:247): avc: denied { execute } for pid=7635 comm="syz.0.1128" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 559.086106][ T7638] FAULT_INJECTION: forcing a failure. [ 559.086106][ T7638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.086454][ T7638] CPU: 0 UID: 0 PID: 7638 Comm: syz.0.1129 Not tainted syzkaller #0 PREEMPT [ 559.086546][ T7638] Hardware name: ARM-Versatile Express [ 559.086560][ T7638] Call trace: [ 559.086611][ T7638] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 559.086671][ T7638] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 559.086690][ T7638] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 559.086738][ T7638] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 559.086791][ T7638] r5:839c3000 r4:8294f590 [ 559.086807][ T7638] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 559.086838][ T7638] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 559.086865][ T7638] r8:76f00f30 r7:00000000 r6:00000000 r5:ed24df68 r4:00000002 [ 559.086873][ T7638] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 559.086894][ T7638] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 559.086929][ T7638] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 559.087045][ T7638] r10:00000001 r9:80615fb4 r8:00000002 r7:ed24df68 r6:0000000f r5:76f00f30 [ 559.087058][ T7638] r4:839c3000 r3:ed24de9f [ 559.087068][ T7638] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 559.087102][ T7638] r8:76f00f30 r7:ed24df68 r6:839c3000 r5:0000000f r4:85503cc0 [ 559.087198][ T7638] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 559.087283][ T7638] r10:00000003 r9:839c3000 r8:8020029c r7:00000000 r6:00000000 r5:85503cc0 [ 559.087392][ T7638] r4:85503cc3 [ 559.087532][ T7638] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 559.087652][ T7638] r7:00000003 r6:00000006 r5:76f00f30 r4:0000000f [ 559.087720][ T7638] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 559.087748][ T7638] Exception stack(0xed24dfa8 to 0xed24dff0) [ 559.087789][ T7638] dfa0: 0000000f 76f00f30 00000006 76f00f30 0000000f 00000000 [ 559.087821][ T7638] dfc0: 0000000f 76f00f30 00000006 00000003 00300000 00000000 00006364 76f010bc [ 559.088089][ T7638] dfe0: 00000158 76f00ed0 000d81d0 001303dc [ 560.353225][ T7650] FAULT_INJECTION: forcing a failure. [ 560.353225][ T7650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 560.353632][ T7650] CPU: 1 UID: 0 PID: 7650 Comm: syz.2.1135 Not tainted syzkaller #0 PREEMPT [ 560.353714][ T7650] Hardware name: ARM-Versatile Express [ 560.353781][ T7650] Call trace: [ 560.353872][ T7650] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 560.353999][ T7650] r7:ed249e20 r6:00000000 r5:60000113 r4:82252488 [ 560.354018][ T7650] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 560.354067][ T7650] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 560.354131][ T7650] r5:839c5400 r4:8294f590 [ 560.354148][ T7650] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 560.354242][ T7650] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 560.354310][ T7650] r8:00004000 r7:ed249e20 r6:20000480 r5:00000000 r4:ed249f20 [ 560.354327][ T7650] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 560.354369][ T7650] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 560.354466][ T7650] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 560.354577][ T7650] r8:00004000 r7:00000000 r6:850fec80 r5:ed249f20 r4:ed249e64 [ 560.354595][ T7650] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 560.354661][ T7650] r10:00000128 r9:839c5400 r8:85503000 r7:00004000 r6:20000480 r5:85503001 [ 560.354680][ T7650] r4:00000003 [ 560.354695][ T7650] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 560.354754][ T7650] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 560.354770][ T7650] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 560.354818][ T7650] Exception stack(0xed249fa8 to 0xed249ff0) [ 560.354858][ T7650] 9fa0: 00000000 00000000 00000003 20000480 00004000 00000000 [ 560.354890][ T7650] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 560.354914][ T7650] 9fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 561.761407][ T7659] FAULT_INJECTION: forcing a failure. [ 561.761407][ T7659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 561.762024][ T7659] CPU: 0 UID: 0 PID: 7659 Comm: syz.2.1138 Not tainted syzkaller #0 PREEMPT [ 561.762128][ T7659] Hardware name: ARM-Versatile Express [ 561.762155][ T7659] Call trace: [ 561.762235][ T7659] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 561.762346][ T7659] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 561.762367][ T7659] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 561.762423][ T7659] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 561.762484][ T7659] r5:839c0000 r4:8294f590 [ 561.762500][ T7659] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 561.762678][ T7659] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 561.762888][ T7659] r8:76fe6f30 r7:00000000 r6:00000000 r5:ed369f68 r4:00000002 [ 561.762991][ T7659] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 561.763244][ T7659] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 561.763338][ T7659] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 561.763448][ T7659] r10:00000001 r9:80615fb4 r8:00000002 r7:ed369f68 r6:0000000f r5:76fe6f30 [ 561.763681][ T7659] r4:839c0000 r3:ed369e9f [ 561.763769][ T7659] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 561.763918][ T7659] r8:76fe6f30 r7:ed369f68 r6:839c0000 r5:0000000f r4:85503d80 [ 561.763940][ T7659] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 561.764041][ T7659] r10:00000003 r9:839c0000 r8:8020029c r7:00000000 r6:00000000 r5:85503d80 [ 561.764144][ T7659] r4:85503d83 [ 561.764238][ T7659] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 561.764368][ T7659] r7:00000003 r6:00000003 r5:76fe6f30 r4:0000000f [ 561.764569][ T7659] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 561.764723][ T7659] Exception stack(0xed369fa8 to 0xed369ff0) [ 561.764813][ T7659] 9fa0: 0000000f 76fe6f30 00000003 76fe6f30 0000000f 00000000 [ 561.764848][ T7659] 9fc0: 0000000f 76fe6f30 00000003 00000003 00300000 00000000 00006364 76fe70bc [ 561.764876][ T7659] 9fe0: 00000158 76fe6ed0 000d81d0 001303dc [ 563.654649][ T7670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7670 comm=syz.0.1142 [ 567.170333][ T29] audit: type=1400 audit(567.080:248): avc: denied { create } for pid=7705 comm="syz.0.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 567.185088][ T29] audit: type=1400 audit(567.100:249): avc: denied { bind } for pid=7705 comm="syz.0.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 567.677883][ T29] audit: type=1400 audit(567.590:250): avc: denied { accept } for pid=7705 comm="syz.0.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 568.257861][ T29] audit: type=1400 audit(568.170:251): avc: denied { create } for pid=7708 comm="syz.2.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 569.361770][ T7722] FAULT_INJECTION: forcing a failure. [ 569.361770][ T7722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.362249][ T7722] CPU: 0 UID: 0 PID: 7722 Comm: syz.2.1160 Not tainted syzkaller #0 PREEMPT [ 569.362338][ T7722] Hardware name: ARM-Versatile Express [ 569.362365][ T7722] Call trace: [ 569.362410][ T7722] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 569.362510][ T7722] r7:00000000 r6:00000000 r5:60000013 r4:82252488 [ 569.362532][ T7722] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 569.362595][ T7722] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 569.362788][ T7722] r5:839c3c00 r4:8294f590 [ 569.362857][ T7722] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 569.363108][ T7722] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 569.363247][ T7722] r8:76fe6f30 r7:00000000 r6:00000000 r5:ed33df68 r4:00000002 [ 569.363429][ T7722] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 569.363566][ T7722] [<80986df4>] (should_fail_usercopy) from [<80599f44>] (simple_read_from_buffer+0x80/0x13c) [ 569.363634][ T7722] [<80599ec4>] (simple_read_from_buffer) from [<8061606c>] (proc_fail_nth_read+0xb8/0x108) [ 569.363777][ T7722] r10:00000001 r9:80615fb4 r8:00000002 r7:ed33df68 r6:0000000f r5:76fe6f30 [ 569.363804][ T7722] r4:839c3c00 r3:ed33de9f [ 569.363824][ T7722] [<80615fb4>] (proc_fail_nth_read) from [<8055eef4>] (vfs_read+0x98/0x324) [ 569.363975][ T7722] r8:76fe6f30 r7:ed33df68 r6:839c3c00 r5:0000000f r4:85503cc0 [ 569.364259][ T7722] [<8055ee5c>] (vfs_read) from [<8055fc04>] (ksys_read+0x74/0xe8) [ 569.364384][ T7722] r10:00000003 r9:839c3c00 r8:8020029c r7:00000000 r6:00000000 r5:85503cc0 [ 569.364433][ T7722] r4:85503cc3 [ 569.364455][ T7722] [<8055fb90>] (ksys_read) from [<8055fc88>] (sys_read+0x10/0x14) [ 569.364716][ T7722] r7:00000003 r6:00000004 r5:76fe6f30 r4:0000000f [ 569.365179][ T7722] [<8055fc78>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 569.365254][ T7722] Exception stack(0xed33dfa8 to 0xed33dff0) [ 569.365446][ T7722] dfa0: 0000000f 76fe6f30 00000004 76fe6f30 0000000f 00000000 [ 569.365831][ T7722] dfc0: 0000000f 76fe6f30 00000004 00000003 00300000 00000000 00006364 76fe70bc [ 569.365894][ T7722] dfe0: 00000158 76fe6ed0 000d81d0 001303dc [ 575.131028][ T29] audit: type=1400 audit(575.050:252): avc: denied { getopt } for pid=7799 comm="syz.2.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 583.416539][ T7835] FAULT_INJECTION: forcing a failure. [ 583.416539][ T7835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 583.417026][ T7835] CPU: 0 UID: 0 PID: 7835 Comm: syz.0.1190 Not tainted syzkaller #0 PREEMPT [ 583.417122][ T7835] Hardware name: ARM-Versatile Express [ 583.417171][ T7835] Call trace: [ 583.417219][ T7835] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 583.417331][ T7835] r7:b5403587 r6:00000000 r5:60000113 r4:82252488 [ 583.417375][ T7835] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 583.417430][ T7835] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 583.417485][ T7835] r5:83841800 r4:8294f590 [ 583.417502][ T7835] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 583.417572][ T7835] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 583.417624][ T7835] r8:00000000 r7:b5403587 r6:00000000 r5:83842030 r4:76f00bb8 [ 583.417639][ T7835] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 583.417763][ T7835] [<80986df4>] (should_fail_usercopy) from [<8022b454>] (setup_sigframe+0x124/0x1c4) [ 583.418538][ T7835] [<8022b330>] (setup_sigframe) from [<8022bbc4>] (do_work_pending+0x3ec/0x4e8) [ 583.418675][ T7835] r10:b5403587 r9:76f00bb8 r8:00000000 r7:83842030 r6:76f00b38 r5:dffe5fb0 [ 583.418736][ T7835] r4:83841800 [ 583.418947][ T7835] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 583.419042][ T7835] Exception stack(0xdffe5fb0 to 0xdffe5ff8) [ 583.419376][ T7835] 5fa0: 00000003 20000340 00024080 00000000 [ 583.419412][ T7835] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 583.419526][ T7835] 5fe0: 76f00ec0 76f00eb0 000195a4 0013250c 60000010 00000003 [ 583.419654][ T7835] r10:00000128 r9:83841800 r8:8020029c r7:00000128 r6:001304b8 r5:00000000 [ 583.419677][ T7835] r4:00000000 [ 584.462157][ T29] audit: type=1400 audit(584.380:253): avc: denied { setattr } for pid=7850 comm="syz.2.1195" name="" dev="pipefs" ino=14300 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 584.477872][ T2883] usb 1-1: new full-speed USB device number 23 using dummy_hcd [ 584.515928][ T29] audit: type=1400 audit(584.430:254): avc: denied { audit_write } for pid=7850 comm="syz.2.1195" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 584.659621][ T2883] usb 1-1: config 0 has no interfaces? [ 584.659987][ T2883] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 584.660050][ T2883] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 584.663607][ T2883] usb 1-1: config 0 descriptor?? [ 585.282361][ T3788] usb 1-1: USB disconnect, device number 23 [ 589.600862][ T29] audit: type=1400 audit(589.520:255): avc: denied { write } for pid=7934 comm="syz.0.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 590.458339][ T29] audit: type=1400 audit(590.370:256): avc: denied { write } for pid=7941 comm="syz.0.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 590.552864][ T7950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7950 comm=syz.0.1210 [ 591.685636][ T7962] FAULT_INJECTION: forcing a failure. [ 591.685636][ T7962] name failslab, interval 1, probability 0, space 0, times 0 [ 591.688622][ T7962] CPU: 1 UID: 0 PID: 7962 Comm: syz.0.1216 Not tainted syzkaller #0 PREEMPT [ 591.688744][ T7962] Hardware name: ARM-Versatile Express [ 591.688768][ T7962] Call trace: [ 591.688808][ T7962] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 591.688921][ T7962] r7:00000c40 r6:00000000 r5:60000013 r4:82252488 [ 591.688941][ T7962] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 591.688992][ T7962] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 591.689046][ T7962] r5:8567d400 r4:82918810 [ 591.689061][ T7962] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 591.689189][ T7962] [<80986bb4>] (should_fail_ex) from [<8052eebc>] (should_failslab+0x6c/0x94) [ 591.689266][ T7962] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 591.689284][ T7962] [<8052ee50>] (should_failslab) from [<8050a3a0>] (__kmalloc_noprof+0x9c/0x568) [ 591.689337][ T7962] [<8050a304>] (__kmalloc_noprof) from [<807d3138>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 591.689399][ T7962] r10:fffff000 r9:8309e400 r8:00000000 r7:834bc3b8 r6:ea481f5c r5:00001000 [ 591.689420][ T7962] r4:00000000 [ 591.689436][ T7962] [<807d30fc>] (tomoyo_realpath_from_path) from [<807cf27c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 591.689494][ T7962] r10:fffff000 r9:00000000 r8:8291f61c r7:00000000 r6:00000006 r5:81cd6588 [ 591.689517][ T7962] r4:ea481f5c r3:826c1240 [ 591.689535][ T7962] [<807cf1b0>] (tomoyo_path_number_perm) from [<807d3c30>] (tomoyo_path_chown+0x6c/0x78) [ 591.689597][ T7962] r9:833d24c8 r8:8291f61c r7:00000000 r6:00000000 r5:ea481f5c r4:00000000 [ 591.689615][ T7962] [<807d3bc4>] (tomoyo_path_chown) from [<8078ab48>] (security_path_chown+0x6c/0x1fc) [ 591.689679][ T7962] r5:00000000 r4:ea481f5c [ 591.689696][ T7962] [<8078aadc>] (security_path_chown) from [<8055b3cc>] (chown_common+0x168/0x248) [ 591.689756][ T7962] r7:00000000 r6:833d2448 r5:ea481f5c r4:00000000 [ 591.689776][ T7962] [<8055b264>] (chown_common) from [<8055b570>] (do_fchownat+0xc4/0xf0) [ 591.689836][ T7962] r10:00000145 r9:00000000 r8:00000000 r7:20000200 r6:00000003 r5:00000009 [ 591.689859][ T7962] r4:00000000 [ 591.689874][ T7962] [<8055b4ac>] (do_fchownat) from [<8055b5b8>] (sys_fchownat+0x1c/0x24) [ 591.689934][ T7962] r9:8567d400 r8:8020029c r7:00000145 r6:001304b8 r5:00000000 r4:00001000 [ 591.689951][ T7962] [<8055b59c>] (sys_fchownat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 591.690001][ T7962] Exception stack(0xea481fa8 to 0xea481ff0) [ 591.690037][ T7962] 1fa0: 00001000 00000000 00000003 20000200 00000000 00000000 [ 591.690067][ T7962] 1fc0: 00001000 00000000 001304b8 00000145 00300000 00000000 00006364 76f010bc [ 591.690093][ T7962] 1fe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 591.714800][ T7962] ERROR: Out of memory at tomoyo_realpath_from_path. [ 593.915400][ T7981] FAULT_INJECTION: forcing a failure. [ 593.915400][ T7981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 593.916827][ T7981] CPU: 1 UID: 0 PID: 7981 Comm: syz.2.1223 Not tainted syzkaller #0 PREEMPT [ 593.916914][ T7981] Hardware name: ARM-Versatile Express [ 593.916948][ T7981] Call trace: [ 593.917080][ T7981] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 593.917205][ T7981] r7:20000200 r6:00000000 r5:60000013 r4:82252488 [ 593.917225][ T7981] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 593.917280][ T7981] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 593.917338][ T7981] r5:85678c00 r4:8294f590 [ 593.917381][ T7981] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 593.917450][ T7981] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 593.917512][ T7981] r8:00000000 r7:20000200 r6:84a42fc0 r5:00000000 r4:ea4f1f20 [ 593.917532][ T7981] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 593.917597][ T7981] [<80986df4>] (should_fail_usercopy) from [<808c74c4>] (_copy_from_iter+0x6c/0x7d8) [ 593.917660][ T7981] [<808c7458>] (_copy_from_iter) from [<81686828>] (netlink_sendmsg+0x18c/0x444) [ 593.917742][ T7981] r10:00000000 r9:00000000 r8:ea4f1f30 r7:84ceb400 r6:00000014 r5:8597f240 [ 593.917762][ T7981] r4:ea4f1f20 [ 593.917779][ T7981] [<8168669c>] (netlink_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 593.917857][ T7981] r10:00000000 r9:ea4f1dc4 r8:ea4f1dc4 r7:00000000 r6:83573180 r5:ea4f1f20 [ 593.917878][ T7981] r4:00000000 [ 593.917894][ T7981] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 593.917951][ T7981] r7:00000000 r6:83573180 r5:00040000 r4:ea4f1f20 [ 593.917967][ T7981] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 593.918024][ T7981] r10:ea4f1e24 r9:20000280 r8:00040000 r7:00000000 r6:83573180 r5:ea4f1f20 [ 593.918040][ T7981] r4:00000000 [ 593.918055][ T7981] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 593.918119][ T7981] r10:00000128 r9:85678c00 r8:84da39c0 r7:00040000 r6:20000280 r5:84da39c1 [ 593.918139][ T7981] r4:00000004 [ 593.918157][ T7981] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 593.918276][ T7981] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 593.918300][ T7981] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 593.918366][ T7981] Exception stack(0xea4f1fa8 to 0xea4f1ff0) [ 593.918406][ T7981] 1fa0: 00000000 00000000 00000004 20000280 00040000 00000000 [ 593.918440][ T7981] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 593.918466][ T7981] 1fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 594.382071][ T29] audit: type=1400 audit(594.300:257): avc: denied { bind } for pid=7986 comm="syz.2.1226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 594.568916][ T7989] fuse: Bad value for 'fd' [ 594.963636][ T29] audit: type=1400 audit(594.880:258): avc: denied { ioctl } for pid=7990 comm="syz.0.1228" path="socket:[15098]" dev="sockfs" ino=15098 ioctlcmd=0x9434 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 598.935100][ T29] audit: type=1400 audit(598.850:259): avc: denied { setopt } for pid=8018 comm="syz.0.1236" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 598.942337][ T8021] batadv_slave_0: entered allmulticast mode [ 601.515197][ T8039] FAULT_INJECTION: forcing a failure. [ 601.515197][ T8039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 601.516227][ T8039] CPU: 1 UID: 0 PID: 8039 Comm: syz.2.1243 Not tainted syzkaller #0 PREEMPT [ 601.516294][ T8039] Hardware name: ARM-Versatile Express [ 601.516307][ T8039] Call trace: [ 601.516328][ T8039] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 601.516393][ T8039] r7:20000180 r6:00000000 r5:60000013 r4:82252488 [ 601.516402][ T8039] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 601.516428][ T8039] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 601.516456][ T8039] r5:8567bc00 r4:8294f590 [ 601.516463][ T8039] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 601.516534][ T8039] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 601.516565][ T8039] r8:00000000 r7:20000180 r6:84a43200 r5:00000000 r4:ea751f20 [ 601.516573][ T8039] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 601.516594][ T8039] [<80986df4>] (should_fail_usercopy) from [<808c74c4>] (_copy_from_iter+0x6c/0x7d8) [ 601.516622][ T8039] [<808c7458>] (_copy_from_iter) from [<81686828>] (netlink_sendmsg+0x18c/0x444) [ 601.516661][ T8039] r10:00000000 r9:00000000 r8:ea751f30 r7:84ce9c00 r6:0000001c r5:8597f540 [ 601.516671][ T8039] r4:ea751f20 [ 601.516678][ T8039] [<8168669c>] (netlink_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 601.516737][ T8039] r10:00000000 r9:ea751dc4 r8:ea751dc4 r7:00000000 r6:850e6f00 r5:ea751f20 [ 601.516747][ T8039] r4:00000000 [ 601.516754][ T8039] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 601.516782][ T8039] r7:00000000 r6:850e6f00 r5:000000d0 r4:ea751f20 [ 601.516790][ T8039] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 601.516820][ T8039] r10:ea751e24 r9:20000640 r8:000000d0 r7:00000000 r6:850e6f00 r5:ea751f20 [ 601.516829][ T8039] r4:00000000 [ 601.516836][ T8039] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 601.516867][ T8039] r10:00000128 r9:8567bc00 r8:8597a300 r7:000000d0 r6:20000640 r5:8597a301 [ 601.516876][ T8039] r4:00000003 [ 601.516883][ T8039] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 601.516914][ T8039] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 601.516921][ T8039] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 601.516944][ T8039] Exception stack(0xea751fa8 to 0xea751ff0) [ 601.517008][ T8039] 1fa0: 00000000 00000000 00000003 20000640 000000d0 00000000 [ 601.517028][ T8039] 1fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe70bc [ 601.517041][ T8039] 1fe0: 76fe6ec0 76fe6eb0 000195a4 00132510 [ 605.401605][ T8064] SELinux: Context system_u:object_r:updpwd_exec_t:s0 is not valid (left unmapped). [ 605.407394][ T29] audit: type=1400 audit(605.320:260): avc: denied { relabelto } for pid=8063 comm="syz.2.1252" name="pcmC6D5c" dev="devtmpfs" ino=807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 605.407582][ T29] audit: type=1400 audit(605.320:261): avc: denied { associate } for pid=8063 comm="syz.2.1252" name="pcmC6D5c" dev="devtmpfs" ino=807 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:updpwd_exec_t:s0" [ 606.411261][ T29] audit: type=1400 audit(606.330:262): avc: denied { read } for pid=8069 comm="syz.0.1255" path="socket:[15650]" dev="sockfs" ino=15650 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 606.918129][ T8075] netlink: 240 bytes leftover after parsing attributes in process `syz.0.1255'. [ 608.808962][ T8089] FAULT_INJECTION: forcing a failure. [ 608.808962][ T8089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.810580][ T8089] CPU: 0 UID: 0 PID: 8089 Comm: syz.0.1262 Not tainted syzkaller #0 PREEMPT [ 608.810682][ T8089] Hardware name: ARM-Versatile Express [ 608.810706][ T8089] Call trace: [ 608.810747][ T8089] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 608.810857][ T8089] r7:ea84de20 r6:00000000 r5:60000013 r4:82252488 [ 608.810878][ T8089] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 608.810930][ T8089] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 608.810985][ T8089] r5:839c5400 r4:8294f590 [ 608.811002][ T8089] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 608.811054][ T8089] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 608.811108][ T8089] r8:00000004 r7:ea84de20 r6:200002c0 r5:00000000 r4:ea84df20 [ 608.811125][ T8089] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 608.811167][ T8089] [<80986df4>] (should_fail_usercopy) from [<81559038>] (copy_msghdr_from_user+0x50/0x130) [ 608.811223][ T8089] [<81558fe8>] (copy_msghdr_from_user) from [<81559190>] (___sys_sendmsg+0x78/0xd0) [ 608.811358][ T8089] r8:00000004 r7:00000000 r6:850e2500 r5:ea84df20 r4:ea84de64 [ 608.811379][ T8089] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 608.811443][ T8089] r10:00000128 r9:839c5400 r8:85503c00 r7:00000004 r6:200002c0 r5:85503c01 [ 608.811463][ T8089] r4:00000004 [ 608.811478][ T8089] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 608.811538][ T8089] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 608.811555][ T8089] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 608.811611][ T8089] Exception stack(0xea84dfa8 to 0xea84dff0) [ 608.811648][ T8089] dfa0: 00000000 00000000 00000004 200002c0 00000004 00000000 [ 608.811680][ T8089] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 608.811705][ T8089] dfe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 613.863304][ T8136] FAULT_INJECTION: forcing a failure. [ 613.863304][ T8136] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 613.865300][ T8136] CPU: 0 UID: 0 PID: 8136 Comm: syz.0.1279 Not tainted syzkaller #0 PREEMPT [ 613.865417][ T8136] Hardware name: ARM-Versatile Express [ 613.865442][ T8136] Call trace: [ 613.865484][ T8136] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 613.865602][ T8136] r7:2000a800 r6:00000000 r5:60000013 r4:82252488 [ 613.865623][ T8136] [<80201b08>] (show_stack) from [<8021f93c>] (dump_stack_lvl+0x70/0x7c) [ 613.865676][ T8136] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 613.865733][ T8136] r5:839c4800 r4:8294f590 [ 613.865750][ T8136] [<8021f948>] (dump_stack) from [<80986d78>] (should_fail_ex+0x1c4/0x228) [ 613.865805][ T8136] [<80986bb4>] (should_fail_ex) from [<80986df0>] (should_fail+0x14/0x18) [ 613.865861][ T8136] r8:00000000 r7:2000a800 r6:84223440 r5:00000000 r4:84cbbf00 [ 613.865878][ T8136] [<80986ddc>] (should_fail) from [<80986e10>] (should_fail_usercopy+0x1c/0x20) [ 613.865924][ T8136] [<80986df4>] (should_fail_usercopy) from [<808c74c4>] (_copy_from_iter+0x6c/0x7d8) [ 613.865979][ T8136] [<808c7458>] (_copy_from_iter) from [<818ddfac>] (pfkey_sendmsg+0xa0/0x2b4) [ 613.866047][ T8136] r10:00000000 r9:854e0000 r8:84cf8c00 r7:eab2df30 r6:00000000 r5:00000014 [ 613.866066][ T8136] r4:84cbbf00 [ 613.866082][ T8136] [<818ddf0c>] (pfkey_sendmsg) from [<81556a24>] (__sock_sendmsg+0x44/0x78) [ 613.866148][ T8136] r10:00000000 r9:eab2ddc4 r8:eab2ddc4 r7:00000000 r6:850e2500 r5:eab2df20 [ 613.866192][ T8136] r4:00000000 [ 613.866211][ T8136] [<815569e0>] (__sock_sendmsg) from [<815571ec>] (____sys_sendmsg+0x298/0x2cc) [ 613.866271][ T8136] r7:00000000 r6:850e2500 r5:00048000 r4:eab2df20 [ 613.866289][ T8136] [<81556f54>] (____sys_sendmsg) from [<815591b4>] (___sys_sendmsg+0x9c/0xd0) [ 613.866356][ T8136] r10:eab2de24 r9:2000a8c0 r8:00048000 r7:00000000 r6:850e2500 r5:eab2df20 [ 613.866376][ T8136] r4:00000000 [ 613.866395][ T8136] [<81559118>] (___sys_sendmsg) from [<8155964c>] (__sys_sendmsg+0x8c/0xe0) [ 613.866462][ T8136] r10:00000128 r9:839c4800 r8:85503cc0 r7:00048000 r6:2000a8c0 r5:85503cc1 [ 613.866482][ T8136] r4:00000004 [ 613.866499][ T8136] [<815595c0>] (__sys_sendmsg) from [<815596b4>] (sys_sendmsg+0x14/0x18) [ 613.866638][ T8136] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 613.866657][ T8136] [<815596a0>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 613.866708][ T8136] Exception stack(0xeab2dfa8 to 0xeab2dff0) [ 613.866746][ T8136] dfa0: 00000000 00000000 00000004 2000a8c0 00048000 00000000 [ 613.866780][ T8136] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76f010bc [ 613.866807][ T8136] dfe0: 76f00ec0 76f00eb0 000195a4 00132510 [ 614.189743][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.252933][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.332687][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.393419][ T29] audit: type=1404 audit(614.310:263): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 614.438314][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.458205][ T29] audit: type=1400 audit(614.380:264): avc: denied { create } for pid=8146 comm="syz.2.1281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 614.590341][ T29] audit: type=1400 audit(614.500:265): avc: denied { sys_module } for pid=8140 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 614.593429][ T29] audit: type=1400 audit(614.510:266): avc: denied { module_request } for pid=8140 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 614.593795][ T29] audit: type=1400 audit(614.510:267): avc: denied { sys_module } for pid=8140 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 614.715408][ T29] audit: type=1400 audit(614.630:268): avc: denied { read } for pid=8162 comm="syz.2.1282" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 614.731784][ T29] audit: type=1400 audit(614.650:269): avc: denied { create } for pid=8162 comm="syz.2.1282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 614.738980][ T29] audit: type=1400 audit(614.660:270): avc: denied { read } for pid=8162 comm="syz.2.1282" name="nbd2" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 614.768877][ T29] audit: type=1400 audit(614.690:271): avc: denied { read } for pid=8162 comm="syz.2.1282" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 614.777947][ T29] audit: type=1400 audit(614.690:272): avc: denied { create } for pid=8162 comm="syz.2.1282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 614.784435][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 614.795526][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 614.806634][ T12] bond0 (unregistering): Released all slaves [ 614.929991][ T12] hsr_slave_0: left promiscuous mode [ 614.932882][ T12] hsr_slave_1: left promiscuous mode [ 614.945765][ T12] veth1_macvtap: left promiscuous mode [ 614.949448][ T12] veth0_macvtap: left promiscuous mode [ 614.954244][ T12] veth1_vlan: left promiscuous mode [ 614.959704][ T12] veth0_vlan: left promiscuous mode [ 615.293487][ T12] batadv_slave_0 (unregistering): left allmulticast mode [ 616.464323][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 616.545097][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 616.611603][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 616.662675][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 616.919157][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 616.925351][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 616.936275][ T12] bond0 (unregistering): Released all slaves [ 617.036075][ T12] hsr_slave_0: left promiscuous mode [ 617.040610][ T12] hsr_slave_1: left promiscuous mode [ 617.049254][ T12] veth1_macvtap: left promiscuous mode [ 617.050754][ T12] veth0_macvtap: left promiscuous mode [ 617.051245][ T12] veth1_vlan: left promiscuous mode [ 617.051402][ T12] veth0_vlan: left promiscuous mode [ 619.426377][ T29] kauditd_printk_skb: 202 callbacks suppressed [ 619.426798][ T29] audit: type=1400 audit(619.340:475): avc: denied { write } for pid=8241 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 619.713783][ T29] audit: type=1400 audit(619.630:476): avc: denied { write } for pid=8243 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 619.858968][ T29] audit: type=1400 audit(619.780:477): avc: denied { write } for pid=8244 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 619.876004][ T29] audit: type=1400 audit(619.790:478): avc: denied { search } for pid=8244 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.899934][ T29] audit: type=1400 audit(619.820:479): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.904063][ T29] audit: type=1400 audit(619.820:480): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.910009][ T29] audit: type=1400 audit(619.820:481): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.910888][ T29] audit: type=1400 audit(619.830:482): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.915491][ T29] audit: type=1400 audit(619.830:483): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 619.916059][ T29] audit: type=1400 audit(619.830:484): avc: denied { search } for pid=8245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.413152][ T29] kauditd_printk_skb: 218 callbacks suppressed [ 631.415987][ T29] audit: type=1400 audit(631.330:703): avc: denied { write } for pid=8296 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 631.428781][ T29] audit: type=1400 audit(631.340:704): avc: denied { search } for pid=8296 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.446743][ T29] audit: type=1400 audit(631.360:705): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.449947][ T29] audit: type=1400 audit(631.370:706): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.452368][ T29] audit: type=1400 audit(631.370:707): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.452685][ T29] audit: type=1400 audit(631.370:708): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.455545][ T29] audit: type=1400 audit(631.370:709): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.456921][ T29] audit: type=1400 audit(631.370:710): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.458533][ T29] audit: type=1400 audit(631.370:711): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 631.462601][ T29] audit: type=1400 audit(631.380:712): avc: denied { search } for pid=8297 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.513320][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 636.516022][ T29] audit: type=1400 audit(636.430:986): avc: denied { search } for pid=8330 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.572274][ T29] audit: type=1400 audit(636.490:987): avc: denied { search } for pid=8325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.702870][ T29] audit: type=1400 audit(636.620:988): avc: denied { write } for pid=8332 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 636.718068][ T29] audit: type=1400 audit(636.630:989): avc: denied { search } for pid=8332 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.733710][ T29] audit: type=1400 audit(636.650:990): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.735910][ T29] audit: type=1400 audit(636.650:991): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.737604][ T29] audit: type=1400 audit(636.650:992): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.742444][ T29] audit: type=1400 audit(636.660:993): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.742944][ T29] audit: type=1400 audit(636.660:994): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 636.743330][ T29] audit: type=1400 audit(636.660:995): avc: denied { search } for pid=8333 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 VM DIAGNOSIS: 00:15:00 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82252488 R02=00068b21 R03=80239cc0 R04=8281b400 R05=00000000 R06=8281b400 R07=8280c6d0 R08=00000000 R09=00000000 R10=00000000 R11=82801f34 R12=82801f38 R13=82801f28 R14=80228714 R15=80239cc8 PSR=600d0093 -ZC- A S svc32 s00=72657475 s01=76612073 d00=7661207372657475 s02=00000001 s03=76f4ca88 d01=76f4ca8800000001 s04=c8000000 s05=c8000000 d02=c8000000c8000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=c0000800 d04=c000080000000000 s10=08000000 s11=80400000 d05=8040000008000000 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82252488 R02=00101481 R03=80239cc0 R04=83216000 R05=00000001 R06=83216000 R07=8280c6d0 R08=00000001 R09=00000000 R10=00000000 R11=df865f64 R12=df865f68 R13=df865f58 R14=80228714 R15=80239cc8 PSR=60000093 -ZC- A S svc32 s00=2e393631 s01=2e343532 d00=2e3435322e393631 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010