last executing test programs: 53m11.423375813s ago: executing program 32 (id=9): syz_emit_ethernet(0x4a, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6003000000142f00fe8000000000000000000000000000bbfe8000000000000000000000000000aa00", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000001290780000"], 0x0) r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi1\x00', 0x400, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) syz_open_pts(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee7, 0x8031, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000feffffff000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000040000000850000007b00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r6, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) 52m58.393968182s ago: executing program 33 (id=24): syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) socket$kcm(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYRESDEC], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = gettid() ioprio_get$pid(0x2, r0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/99, 0x63, 0x91e) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x35451d7003101a08, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETOWNER(r5, 0x400454cc, 0xee00) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x103900, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000300)={0x0, 0x0, 0x2c, 0xf3, 0x104, 0x1}) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events.local\x00', 0x0, 0x0) syslog(0x3, &(0x7f0000000700)=""/231, 0xe7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) 52m41.032485981s ago: executing program 2 (id=25): fsopen(&(0x7f00000002c0)='gfs2\x00', 0x1) 52m40.633068603s ago: executing program 2 (id=27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e22, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001340)={0x14, r2, 0x100, 0x70bd28, 0x25dfdbff}, 0x14}}, 0x4008010) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) read(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1000001, 0x8013, r3, 0xf6695000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x6000400) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x6}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x106}, 0x1c) writev(r4, &(0x7f0000000080)=[{&(0x7f0000000100)="5514377d925cfac68fa5e905ccd2593d6d0f37d8422f54e9fbc8881033b7e59b0ce2a896d5c195741b964850ca7444d0926630715341d8ef0611e595745d05bb0484b65adfe33ed3639e7722ef74b92df54d886779faf3deee20a0724362221a9fc4a7f86a07042dd5875131ff0d57107a01db1964be5dd15d8d3be6fd3209f87210f2e9de528884797a1c43157c6f56349e263c79cb13df66409f7cd33b9ebb000fd19d5521eab9eb89ad56a45108b1d3179077413d0e16044c0fe0", 0xbc}, {&(0x7f00000003c0)="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", 0xf44}], 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0}, &(0x7f00000001c0)=0x40) 52m40.114322853s ago: executing program 2 (id=28): prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) pwritev(r0, &(0x7f0000001400)=[{&(0x7f0000001500)="b425bf5d4cba66498fc6c032aba9201f50007ad611780073a56b8a123a43a6a2be4db2c1949280d484b42bd54d3ca62ec61ee44f87", 0x35}, {&(0x7f0000000100)="b6a7c8307d6903db8281447c3af7f10ec460247db4ad01ba028db6b6ded9e8151cc474046c7e7c94fd491f27eae72fea5eb88589c77a5d7d7db058c5da35e33b95f13702c30736a06202dde58d871c2f99a4007a7852f2cf6cd5cf5d5c826fbdf4e3acecb4f901e06c9f0c58ef22403c9ee7dd4deee248da6147db16b6a0006ed4b30cb6c0448bb4", 0x88}, {&(0x7f0000001540)="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", 0x13d}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="b11912663c0bdc3b5f25eb06da2b7b427bba6c79f4f73866feb8da75873b484d0829624f4163a286b744d1da679bc486a58f637d88fa28a131214d8d7e71e89b3cb740c0cf17b9495cbbd68682f3f097c11824527104405eabf204ae7606593709fbda7c1ef159a58cf94a17619afd4663aa7dd260d51d979056fbdfdd2b7fb440e91192f93cfef4106c6cffa0aaa16d9aebb434838647e4a928c3744c", 0x9d}, {&(0x7f0000001380)="aca5f76c59f1708c7aa2a774d58ac460fd6a471746a43a6a88472998bff9f178b8d3ee121d27fb5a8bd0987dd87768f4fbc75a78f9655e720dc54b1ec5eb669190e871531a8cb4ed9a3165b45e", 0x4d}], 0x6, 0x10, 0x100) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0xc}) ioctl$XFS_IOC_RTGROUP_GEOMETRY(r1, 0xc0805841, &(0x7f0000001440)={0x6, 0xda9, 0x7, 0x8, 0x1ff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f00000001c0)='grpquota') r2 = creat(&(0x7f0000000440)='./file0/file0\x00', 0x188) quotactl_fd$Q_SETINFO(r2, 0xffffffff80000601, 0xee01, &(0x7f0000000300)={0xfffffffffffffffc, 0x5, 0x1, 0x2}) openat$audio(0xffffff9c, 0x0, 0x200100, 0x0) 52m39.982713541s ago: executing program 2 (id=29): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x80015b1b) 52m39.523240118s ago: executing program 2 (id=30): mkdir(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="ff", 0x1, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x200000000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 51m54.190375134s ago: executing program 34 (id=30): mkdir(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) request_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="ff", 0x1, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x200000000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 51m13.336332003s ago: executing program 4 (id=103): r0 = socket$nl_generic(0x10, 0x3, 0x10) futex(0x0, 0x8, 0x82, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000040)={'wlan1\x00', @random="0200ac7f7f00"}) 51m11.883922436s ago: executing program 4 (id=104): openat$ptmx(0xffffff9c, 0x0, 0x531000, 0x0) 51m11.624660621s ago: executing program 4 (id=105): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1\x00', &(0x7f0000000200)=@ethtool_link_settings={0x4b, 0xfffffff9, 0x6b, 0x0, 0x9, 0x5, 0xe, 0xa, 0xfd, 0xc, [0x5, 0x100, 0x8, 0x1, 0x4aaf, 0x3, 0x3, 0x8]}}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000000, 0x200000005c831, r0, 0xffffd000) 51m11.321784388s ago: executing program 4 (id=106): rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000007000000000000000080001f850000007500000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0xb, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xe) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 51m10.501423376s ago: executing program 4 (id=107): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={0x24, 0x25, 0x301, 0x670bd24, 0x25dfdbfb, {0x20}, [@typed={0xf, 0x15e, 0x0, 0x0, @binary="79857f734228a97ee62057"}]}, 0x24}, 0x1, 0x0, 0x0, 0x40008840}, 0x0) 51m10.161805465s ago: executing program 4 (id=108): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0x0, 0x9c3fa077fa966179, 0x12, 0x0, {{0x7e}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x4040800) r4 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg$inet(r4, &(0x7f0000000c40)=[{{&(0x7f0000000200)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}}], 0x1, 0x20000054) r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x40000032, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe94b89fc43c3328eae0cae1f5eba329e6f216"}) readv(r5, 0x0, 0x0) 50m53.980814926s ago: executing program 3 (id=119): socket$nl_generic(0x10, 0x3, 0x10) ptrace$pokeuser(0x6, 0x0, 0x118, 0x137db) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x10}]}]}, 0x54}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB='t\x00\x00\x00\n'], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 50m53.761713048s ago: executing program 3 (id=120): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f3000000000080001400000000114000000020a0901"], 0xd4}}, 0x8818) write$binfmt_misc(r2, &(0x7f0000000000), 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0) 50m51.156671918s ago: executing program 3 (id=121): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="2c385a7af3", 0x5) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0", 0x25}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085", 0xcb}], 0x2}], 0x1, 0x4) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1}, 0x0) 50m49.992381635s ago: executing program 3 (id=122): r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x1, 0x0) write$proc_mixer(r0, &(0x7f0000000100)=[{'LINE3', @val={' \'', 'Master Capture Switch'}}], 0x33) 50m49.863375482s ago: executing program 3 (id=123): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x2}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000600)) r4 = dup(r2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x220002, 0x0) r6 = fcntl$dupfd(r1, 0x0, r5) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/251, 0x0, 0xe000}) ioctl$VHOST_NET_SET_BACKEND(r6, 0x4008af30, &(0x7f0000000080)={0x0, r4}) 50m47.163575007s ago: executing program 3 (id=124): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000440)={0x18, 0x110, 0xfa00, {0xffffffffffffffff, 0x7fffdfff, 0x12, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @ib={0x1b, 0x3e8, 0x1, {"fd31999600"}, 0x4, 0x4f, 0x7}}}, 0x118) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39}, 0x94) prlimit64(0x0, 0xb, &(0x7f0000000280)={0x8, 0xf}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) capset(0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGPKT(r1, 0x40045431, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x2) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000062c0)=@base={0xa, 0x8001, 0x9, 0x8}, 0x50) bpf$BPF_GET_MAP_INFO(0x15, &(0x7f0000000080)={r5, 0xfffffe38}, 0x10) 50m24.49987351s ago: executing program 35 (id=108): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0x0, 0x9c3fa077fa966179, 0x12, 0x0, {{0x7e}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x4040800) r4 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg$inet(r4, &(0x7f0000000c40)=[{{&(0x7f0000000200)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}}], 0x1, 0x20000054) r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x40000032, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fe94b89fc43c3328eae0cae1f5eba329e6f216"}) readv(r5, 0x0, 0x0) 50m1.315531254s ago: executing program 36 (id=124): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000440)={0x18, 0x110, 0xfa00, {0xffffffffffffffff, 0x7fffdfff, 0x12, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @ib={0x1b, 0x3e8, 0x1, {"fd31999600"}, 0x4, 0x4f, 0x7}}}, 0x118) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39}, 0x94) prlimit64(0x0, 0xb, &(0x7f0000000280)={0x8, 0xf}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) capset(0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGPKT(r1, 0x40045431, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x2) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000062c0)=@base={0xa, 0x8001, 0x9, 0x8}, 0x50) bpf$BPF_GET_MAP_INFO(0x15, &(0x7f0000000080)={r5, 0xfffffe38}, 0x10) 47m34.643403821s ago: executing program 6 (id=290): r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)=ANY=[@ANYBLOB="bb00"]) 47m34.55182173s ago: executing program 6 (id=291): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r1, 0x0) accept4$vsock_stream(r1, 0x0, 0x0, 0x800) 47m31.790884865s ago: executing program 6 (id=294): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x4) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x32, 0xffffffffffffffff, 0x91c6b000) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) read$FUSE(r0, &(0x7f0000000d00)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0x10113}], 0x1) 47m28.909868393s ago: executing program 6 (id=300): r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f00000001c0)={0xa, 0x4e20, 0x80000, @dev={0xfe, 0x80, '\x00', 0x20}, 0xfffffffe}, 0x1c, 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000000000029000000370000002f94"], 0x18}, 0x40440c0) 47m27.827971491s ago: executing program 6 (id=301): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x10) 47m27.581515935s ago: executing program 6 (id=302): socket$packet(0x11, 0x3, 0x300) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af83, &(0x7f00000003c0)={0x1}) 46m41.934648782s ago: executing program 37 (id=302): socket$packet(0x11, 0x3, 0x300) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af83, &(0x7f00000003c0)={0x1}) 44m59.739759823s ago: executing program 7 (id=440): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x400) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000000000000008000000700000014f7ffff0900000009000000af010000a2b90000010000001000000008000000020000008af7ffff0600000009000000f7"]) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000002c0)={&(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000040), 0x2, r2}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000580)={0x401, 0x1, &(0x7f0000000180)=[r2], &(0x7f00000000c0)=[0x3], &(0x7f0000000640)=[r3], &(0x7f0000000340), 0x0, 0x3}) 44m59.47259414s ago: executing program 7 (id=441): creat(&(0x7f00000000c0)='./file0\x00', 0xf4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x34014c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dc150f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000c6d90000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20, 0x0, 0x0, {0x0, 0x1a}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80101, 0x101) setresuid(0x0, 0xee00, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) 44m56.883515058s ago: executing program 7 (id=442): clock_nanosleep(0x7, 0x0, &(0x7f0000002180), 0x0) 44m56.793812517s ago: executing program 7 (id=443): r0 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) socket(0x2, 0x80805, 0x0) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0}, 0x0) 44m42.192964294s ago: executing program 7 (id=451): creat(&(0x7f00000000c0)='./file0\x00', 0xf4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x34014c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dc150f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000c6d90000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20, 0x0, 0x0, {0x0, 0x1a}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80101, 0x101) setresuid(0x0, 0xee00, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) 44m39.502367183s ago: executing program 7 (id=453): socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/llc/core\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) getrusage(0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) mmap(&(0x7f0000215000/0x3000)=nil, 0x3000, 0x8, 0x6011, r3, 0xffffffffffffc000) 43m54.514029804s ago: executing program 38 (id=453): socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/llc/core\x00') prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) getrusage(0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) mmap(&(0x7f0000215000/0x3000)=nil, 0x3000, 0x8, 0x6011, r3, 0xffffffffffffc000) 33m16.431217872s ago: executing program 5 (id=1621): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r3 = io_uring_setup(0x3450, &(0x7f0000000080)={0x0, 0x1539, 0x0, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) mremap(&(0x7f00003eb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000003000/0x1000)=nil) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002700)=""/4096, 0x1000}], 0x0, 0x1}, 0x20) 33m8.033093405s ago: executing program 5 (id=1626): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x3, 0x4) sendto(r0, 0x0, 0x0, 0x6008041, &(0x7f0000000300)=@l2tp={0x2, 0x0, @multicast1, 0x1}, 0x80) 33m7.792740328s ago: executing program 5 (id=1627): r0 = socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$ITER_CREATE(0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @local, 0x2}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171, 0x0, 0x0, 0x11}}], 0x400000000000172, 0x4001c00) 32m54.262930945s ago: executing program 5 (id=1655): sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0), 0x3) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9) getsockopt$bt_hci(r0, 0x11a, 0x5, 0x0, &(0x7f0000000040)) 32m54.139786372s ago: executing program 5 (id=1656): r0 = socket$igmp(0x2, 0x3, 0x2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001, 0x50, r0, 0xf9f70000) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001080)={'macsec0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newqdisc={0x24, 0x25, 0x4ee4e6a52ff56541, 0x0, 0x1000000, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0xc801}, 0x8000) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x2}) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='syz', r1) 32m54.003378679s ago: executing program 5 (id=1657): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0xc000) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='quota,grpquota_block_hardlimit=3']) 32m8.450768577s ago: executing program 39 (id=1657): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0xc000) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='quota,grpquota_block_hardlimit=3']) 30m26.346234276s ago: executing program 8 (id=1800): semop(0x0, &(0x7f00000010c0)=[{0x1, 0x8001, 0x1000}, {0x1, 0x5b7a, 0x2000}], 0x2) semop(0x0, &(0x7f00000000c0)=[{0x3, 0x3, 0x1800}, {0x1, 0xbbdd, 0x1000}], 0x2) 30m26.253228181s ago: executing program 8 (id=1801): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = eventfd(0xfffffff9) read(r0, &(0x7f0000000340)=""/131, 0x83) 30m26.150931437s ago: executing program 8 (id=1802): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="5a68ac6f611d765e6945c810ebfa0e81ceb3dc4c43c215ebd015af003afaf21393a2977cab52e35904000000a88ab75b175c12cf29c48c2d4b45c1dc73113beeb9b3a73cd0415b0436839a7b9b3f3668430e86897b662145659c78b24257c346d2b6b0c0e6a04f27f25fe956c74e6a5bd151eb4435ccce91425414c14a75acaaeac29b41", 0x84}], 0x1) 30m26.051035153s ago: executing program 8 (id=1803): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xfffffffffffffee6}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24040045) r0 = io_uring_setup(0x1195, &(0x7f0000000040)={0x0, 0x2150, 0xc000, 0x3, 0xce}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001480)}], 0x1) io_uring_enter(r0, 0x2219, 0xcf74, 0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 30m25.91974653s ago: executing program 8 (id=1804): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x10, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007000000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000c500000095"], &(0x7f0000000640)='syzkaller\x00', 0x8, 0x94, &(0x7f0000000240)=""/148}, 0x94) 30m25.822182005s ago: executing program 8 (id=1805): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x6, 0x0, 0x0) 29m40.631944238s ago: executing program 40 (id=1805): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x6, 0x0, 0x0) 27m58.573431914s ago: executing program 0 (id=1871): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="10797fcd6cd957d2b903c6bf46b4abf3629ff075475e4bd6e43be1712bf8b4dc", 0x20) r1 = accept4(r0, 0x0, 0x0, 0x80000) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000480)=""/92, 0x5c}], 0x1}, 0x2002) sendto$packet(r1, &(0x7f0000000400)="8e664e65d75685d687b43c788a3befe008", 0x11, 0x4004004, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[], 0x80}, 0x1, 0x0, 0x0, 0x40008c0}, 0x4040121) 27m57.21285674s ago: executing program 0 (id=1872): r0 = socket$packet(0x11, 0x2, 0x300) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x0, 0xfff, 0x7fffffff, 0x3}, 0x10) 27m57.111419115s ago: executing program 0 (id=1873): bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)=""/4091, &(0x7f0000001000)=0xffb) 27m56.982733292s ago: executing program 0 (id=1874): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x18e101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) 27m56.84321286s ago: executing program 0 (id=1875): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7031b0008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x2000300, 0xe, 0x0, &(0x7f0000000400)="63eced8e460100000001acf12a04", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 27m56.337122789s ago: executing program 0 (id=1876): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) utimes(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) timerfd_create(0x2, 0x80000) 27m56.336911119s ago: executing program 41 (id=1876): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) utimes(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) timerfd_create(0x2, 0x80000) 3.6322343s ago: executing program 9 (id=4498): socket$inet6_udp(0xa, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x180) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'U-', 0x7}, 0x16, 0x3) 3.474349001s ago: executing program 9 (id=4499): r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl(r0, 0x2, &(0x7f0000000100)) (fail_nth: 1) 3.402863475s ago: executing program 1 (id=4500): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) close(r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000380)={0x1d, r3, 0x4, {0x2, 0x0, 0x2}, 0xfd}, 0x18) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xc8, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x7}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xffffffff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xd}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xfffffff1}]}, 0xc8}, 0x1, 0x0, 0x0, 0x2000884c}, 0x400c850) 3.312248461s ago: executing program 9 (id=4501): r0 = socket(0x1d, 0x2, 0x6) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESTOP(r1, 0x5450, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r2, 0x2, {0x2, 0x0, 0x2}}, 0x18) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc4}, 0x48000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0x5451, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x4080) 2.212713064s ago: executing program 1 (id=4502): r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000200)={0x1d, 0x0, 0x4, {0x2, 0xf0, 0x3}, 0xfe}, 0x18) r1 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) getsockname$l2tp(r2, 0x0, &(0x7f00000000c0)) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x70) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x11000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000f00)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ib={0x1b, 0xf, 0x37, {"c5cdc1bf6120454bf8193e32befd20d0"}, 0x972d, 0xc8, 0x9}}}, 0x118) close_range(r4, 0xffffffffffffffff, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r7, 0x0) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = dup3(r7, r6, 0x0) accept$unix(r8, 0x0, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00042dbd7000ffdbdf251f000009005c00c1931e9f09818d051bbaea339e3685f585a31144b29e48e537b5c18b27a3e4e54dd0e79b9a3eb82ca3e2f861b14a0bf4bb42d6745ddfa582cd03e5ebb908ee794458e25a9526afe0364d494ee704e98c7450f27aa6f40ac7bf7a316e2f426925ca322e8b09f1e8d70959848f5f0d9dbfe49213091ff46aab1ea475cc1d470270b9fced8a5b463b5889c4ce9b7a1c78a4f48e8e94eea98108669a6e4698289c320eaedc7febcf9c274f7bf84729a14916a4a6c970067fe946bf84d9645cd20149e42a4b0e3bad7b8d5fbcfe78e535cf8c506814818c02db1ca88fb118874c"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x48000) 2.153109878s ago: executing program 9 (id=4503): socket$inet6_udp(0xa, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x180) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'U-', 0x7}, 0x16, 0x3) 1.96969987s ago: executing program 9 (id=4504): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, 0x0, 0x800) getpeername(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000040)=0x80) close(r3) r4 = socket$unix(0x1, 0x1, 0x0) openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) syz_open_dev$dmmidi(&(0x7f0000000080), 0x200, 0x40002) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) socket(0x1d, 0x2, 0x6) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x4) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = gettid() sendmsg$netlink(r3, &(0x7f0000000200)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000300)={0xd4, 0x1d, 0x1, 0x70bd2a, 0x25dfdbff, "", [@nested={0x16, 0x59, 0x0, 0x1, [@generic="bf62c9c5e7249a5fa210", @nested={0x4, 0x150}, @nested={0x4, 0x80}]}, @nested={0x8b, 0x18, 0x0, 0x1, [@nested={0x4, 0x10c}, @generic="32fbd248f0220f2a8aa44a9d8d8c8ba6d6a7992db09d0a16a0151983713523eedfc6e9b802e17c79aae7a7a81477e5ae336434dc6304a404afbd09204b5d93c5abe952b3ec0ec2d8bc3e3143c4e22708cb01ce830f043ec537489193f0332a1effffea86169db09f2695b45995cf3fdb79ba852214d45b5bc18b6a0f650cddaf4b294a"]}, @nested={0x20, 0x6a, 0x0, 0x1, [@typed={0x4, 0x135}, @typed={0x8, 0xc6, 0x0, 0x0, @pid=r6}, @typed={0x8, 0xbc, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x14e, 0x0, 0x0, @u32=0x2}]}]}, 0xd4}], 0x1, 0x0, 0x0, 0x4081}, 0x4000080) r7 = accept4$inet(r3, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r7, 0x0, 0x0) 1.653954891s ago: executing program 9 (id=4505): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1c1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x4) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, r2, {0x7, 0x29, 0x9, 0xffffffff9080edc4, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}}, 0x34) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x200041, 0x0) close(r4) socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x80c0}, 0x800) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x2c) ioctl$NILFS_IOCTL_GET_BDESCS(r1, 0xc0186e87, &(0x7f0000001480)={&(0x7f00000013c0)=[{0x10, 0x6, 0xffffffff80000001, 0x15, 0xcce}, {0x8000, 0x6f88, 0x7, 0xff, 0x10001}, {0x200000, 0x3, 0x6, 0x8, 0x8}, {0x5, 0x5, 0x3fffffff80000, 0x7}], 0x4, 0x28, 0x8, 0xffffffffffffffff}) syz_fuse_handle_req(r0, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006380)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f00000003c0)={0x0, "5caf75f7fe1362d0cc42b40c738d50fb"}) 882.449682ms ago: executing program 1 (id=4506): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) close(r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xc8, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x7}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xffffffff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x3}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xd}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xfffffff1}]}, 0xc8}, 0x1, 0x0, 0x0, 0x2000884c}, 0x400c850) 709.871623ms ago: executing program 1 (id=4507): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, 0x0, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x89901) close(r2) r3 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000300)={0x5a4, 0x7, 0x7}) sendmsg$NL80211_CMD_GET_KEY(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="08002bbd7000fbd7000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x400c000}, 0x48000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000fc0)=ANY=[@ANYRESOCT=r5, @ANYRES16=r0, @ANYBLOB="010100000000fcdbdf252b00000008000300", @ANYRES32=r5, @ANYBLOB="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"], 0x9c}, 0x1, 0x0, 0x0, 0x200640c0}, 0x4004880) r6 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r7 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000040), 0x2040, 0x0) r8 = getpid() kcmp$KCMP_EPOLL_TFD(r8, r8, 0x2, r7, 0x0) r9 = syz_open_dev$mouse(&(0x7f0000001340), 0x0, 0x4400c0) write$USERIO_CMD_REGISTER(r9, 0x0, 0x0) r10 = socket$xdp(0x2c, 0x3, 0x0) ioctl$XFS_IOC_BULKSTAT(r10, 0x8040587f, 0x0) r11 = openat$binder_debug(0xffffff9c, &(0x7f0000000540)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r12 = openat$pfkey(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$UI_GET_VERSION(r12, 0x5450, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r11, 0x8008700d, &(0x7f00000002c0)) sendmsg$nfc_llcp(r11, &(0x7f0000000480)={&(0x7f0000000200)={0x27, 0x0, 0x0, 0x3, 0x2, 0x6, "1b9aa571afa2c71f88eeb3177086481ff5fa2c062d584e7f4280e74579ae26f7ed46a91d5be03ba30da53906d205d2ce83b8db337101263d546ec0b9a9aa4d", 0x38}, 0x58, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f00000005c0)="488351b711a8f1cc0ea13b54ab5fb98d3ee0d691d1740df9be250d408ffddb27e76f4edf626d9e20519f7d9e0220a2001fe821018e9263e896206cd260caa2082791d2c6facaa02617e9bb11e9ec2733f6da31def665c386e8d757466a9fea7454fff3840c8a7dcef1c0a0fee6926c3c8ba8d18bed927f8118153bcbeaed96c64e19a8f415cd477968e9dc712f557a6d2ff1a1725fcacf1120062f68a229df7fa5ae81f3435ef6c83cdab2e72238907fc4ce2e602519a84931f2eebe989e04b60d6de7b0b04fed17863a5c1a"}, {&(0x7f0000000140)="51fdbe2aa9ec59f8c9b70244b8c9921e4db0f5617b45abf89709d1a2e6426b594778334b", 0x24}, {&(0x7f00000006c0)="dfc760539ab61b66e07747c097ff0f2b71af39ec0fc3319dab57ee3d917a56390dfa34085c509573ecc57cf630f4c10b68d90229236ffa1727ed5de7420f94670d9eda6d87", 0x45}, {&(0x7f0000000740)="59b92ed5a4677d5d0678af4535b80bbaa8fbb7f9923faff52e734ec8f9294fb394e9907e03dd33cf68691c0213b658fe19c4add7afd95831f31e059d61cd57e49315270ac2d295e3a76b25097c080955dee49f062e1d69f8a1a3b01f6a2e5196df55f47bdd594268ae8cdbb99775c3db0827f3c24ef286fb95801d94377ed6e627985371e9156131cc7812978b35889e612efbe0d6cf30fb086d20fc3d7df7b404c3f72fe28746f8176c57f06c761cc3079383472b3325b30500d12302e165131f052f6813b0e67431172db11d89017bd1", 0xb}, {&(0x7f00000003c0)="f0239367d3f463242e0fa0c39eabe7521047020ae46c2de9a0600248ea5f27f9030a2543024717d4cc87a0fbb80b11b1cdbba2253720aa384ac3254bc07dff5d3cbcf00c1a7da827ef9703d2addba8c0a4f82c979d4a54cebca272836e949193ab027439d5f6", 0x66}, {&(0x7f00000008c0)="e2260f676ccdfd8ee6ec18a4e4c8b1cdc2fb60d3ff80a7f9e5eeba4f0836e7cd839ef4e3ae296bccce18ef6120407ec4b782e5881c1e84f8ea5a5986d84a8c01666b8b058e66cb490d92ebd88fbc82b61253153e4c74a3dbf58e7c2b616842c0cc4aa59b02d212651f73b303eb9ffc11ec5e0b9ae5a10d9085c778", 0x7b}, {&(0x7f0000000940)="5dd5020d1fbc466a3e8bd23d80cca9351f44463ece1582806953e81dfd108e2027d4cc70b4168924a4389e71fffd78a2930d32a2", 0x34}], 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="440000001701000004000000579ad2bc061a6fdde43c5acfe700d0896a6ad5abf7d957032878350f879efbf09f2ba93e7067678e00"/65], 0x44, 0x845}, 0x24000000) sendmsg$NL80211_CMD_TESTMODE(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001580)=ANY=[@ANYRES64=r0, @ANYRES16=0x0, @ANYRESOCT=r1, @ANYRESOCT, @ANYBLOB="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"], 0x1c0}, 0x1, 0x0, 0x0, 0x4000}, 0x20004090) fsetxattr$trusted_overlay_nlink(r11, &(0x7f0000000b80), &(0x7f0000000bc0)={'U-', 0xfffffffffffffffe}, 0x16, 0x1) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="080027bd7000fbdbdf256200000000000300", @ANYRES32=r5, @ANYBLOB="134717fbfaf4529bb3a1c97a72969d43aae62b2fdf3c237af86f26865fab04234cd7f2f215f6aa0161d6ae1cfaa04cf474864c6c8ca6ad1b0d6413e70617634f59a0ddc731806e8cc2efecd63d6efc86fc91e1c14a900cd4c84971dc359a4ee4c2de7700ae8c9318aaad54205a3f26edcbc380c6f46a27375bd014e273f741e9037c"], 0x1c}, 0x1, 0x0, 0x0, 0x4044004}, 0x1) 120.386043ms ago: executing program 1 (id=4508): openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(0xffffffffffffffff, 0xc0045009, &(0x7f0000000080)=0xffffffff) 0s ago: executing program 1 (id=4509): r0 = openat$ttyS3(0xffffff9c, &(0x7f00000000c0), 0x345400, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$selinux_user(0xffffff9c, &(0x7f00000022c0), 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000002f40)) setuid(r2) syz_clone(0x80080, &(0x7f0000000240)="6fdf79cc6848df32f9e8613e5e6148eb5db953247e8e88fe53fd44a0320f1ad5d2b72986c1fcc2a3020b322a519e597012904ead06141f29e8d846ee5a695617dbe2c854be53c8caf3a3e1f9b80a78477e48cab72f845dd5e692c8331adac4cf3fa49ca254145cd848d41ebec45a076c360a924a609ac4823b6b193b8c9fbb82fb1acfe11ab87991f59566d78b87cb3805d75b4b51b126430212c7374037135428530f47a4ec096bd99b10c3dab006f089f5b2adf5029f55363b2f7bba32bebcf46402b21fb7fefaafb460a2791ffeeb22de847738811bd7c51a7bdc00fba6f215774d61f982a8da3aa6e683ab84fe2e", 0xf0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="48b3de87d0f99361d9551e3d0b99416ec4e1beeb81b6750bb5b5b72be2dc4c519578776c56ed1c06352dd8622821f01c67") sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfc}, 0x1c}}, 0x400c854) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) r5 = syz_open_dev$audion(&(0x7f00000015c0), 0xaad, 0x200440) close(r5) socket$nl_sock_diag(0x10, 0x3, 0x4) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r7, 0x0) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = accept4$inet(r8, 0x0, 0x0, 0x0) sendmsg$sock(r9, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) write$cgroup_devices(r4, &(0x7f0000000340)=ANY=[], 0xffdd) write$selinux_context(r4, &(0x7f0000000000)='system_u:object_r:ldconfig_cache_t:s0\x00', 0x26) getuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x0) ioctl$TUNSETPERSIST(r11, 0x5450, 0x0) fchown(r0, r10, 0x0) kernel console output (not intermixed with test programs): 60>] (sys_removexattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3171.107051][T24548] Exception stack(0xebef9fa8 to 0xebef9ff0) [ 3171.107096][T24548] 9fa0: 00000000 00000000 20000080 20000200 00000000 00000000 [ 3171.107136][T24548] 9fc0: 00000000 00000000 0012ed04 000000eb 00346378 00000000 003d0f00 76ef10dc [ 3171.107166][T24548] 9fe0: 76ef0e88 76ef0e78 00018bc4 00130300 [ 3173.639510][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 3173.639945][ T28] audit: type=1400 audit(3429.562:7953): avc: denied { create } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3173.652141][ T28] audit: type=1400 audit(3429.572:7954): avc: denied { ioctl } for pid=24553 comm="syz.9.4192" path="socket:[48845]" dev="sockfs" ino=48845 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3173.657099][ T28] audit: type=1400 audit(3429.572:7955): avc: denied { bind } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3173.662527][ T28] audit: type=1400 audit(3429.582:7956): avc: denied { write } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3173.674510][ T28] audit: type=1400 audit(3429.592:7957): avc: denied { create } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3173.676308][ T28] audit: type=1400 audit(3429.592:7958): avc: denied { write } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3173.677918][ T28] audit: type=1400 audit(3429.592:7959): avc: denied { module_request } for pid=24553 comm="syz.9.4192" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3173.820768][ T28] audit: type=1400 audit(3429.742:7960): avc: denied { read } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3173.866654][ T28] audit: type=1400 audit(3429.782:7961): avc: denied { write } for pid=24553 comm="syz.9.4192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3174.746046][T24556] FAULT_INJECTION: forcing a failure. [ 3174.746046][T24556] name failslab, interval 1, probability 0, space 0, times 0 [ 3174.746604][T24556] CPU: 1 UID: 0 PID: 24556 Comm: syz.1.4191 Tainted: G L syzkaller #0 PREEMPT [ 3174.746715][T24556] Tainted: [L]=SOFTLOCKUP [ 3174.746735][T24556] Hardware name: ARM-Versatile Express [ 3174.746757][T24556] Call trace: [ 3174.746803][T24556] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3174.746977][T24556] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3174.747037][T24556] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3174.747101][T24556] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3174.747206][T24556] r7:00000dc0 r6:00000000 r5:83393100 r4:82b17d48 [ 3174.747244][T24556] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3174.747400][T24556] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3174.747526][T24556] r8:82b1ed04 r7:00000dc0 r6:00000000 r5:00000000 r4:830e49c0 [ 3174.747564][T24556] [<8054ee98>] (should_failslab) from [<8052c210>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 3174.747650][T24556] [<8052c1bc>] (kmem_cache_alloc_noprof) from [<807752e8>] (fuse_request_alloc+0x24/0x84) [ 3174.747757][T24556] r10:83393100 r9:00000001 r8:82b1ed04 r7:85ac7f00 r6:85ac7f00 r5:82ce5b44 [ 3174.747779][T24556] r4:8617a600 [ 3174.747796][T24556] [<807752c4>] (fuse_request_alloc) from [<80775a8c>] (fuse_get_req+0x1b4/0x2d8) [ 3174.747894][T24556] r7:85ac7f00 r6:eb371df8 r5:00000000 r4:8617a600 [ 3174.747916][T24556] [<807758d8>] (fuse_get_req) from [<807789e0>] (__fuse_simple_request+0x54/0x520) [ 3174.747986][T24556] r10:8367b200 r9:00000001 r8:82b1ed04 r7:83393100 r6:eb371df8 r5:8617a600 [ 3174.748048][T24556] r4:85ac7f00 [ 3174.748963][T24556] [<8077898c>] (__fuse_simple_request) from [<8078ac98>] (fuse_readdir_uncached+0x104/0x380) [ 3174.749175][T24556] r8:00000000 r7:eb371f58 r6:00001000 r5:840a9000 r4:85ac7f00 [ 3174.749195][T24556] [<8078ab94>] (fuse_readdir_uncached) from [<8078b064>] (fuse_readdir+0x150/0x758) [ 3174.749287][T24556] r10:ffedc048 r9:eb371f58 r8:00000048 r7:ffedc018 r6:decf0044 r5:8367b200 [ 3174.749434][T24556] r4:85bf6400 [ 3174.749561][T24556] [<8078af14>] (fuse_readdir) from [<8059d020>] (iterate_dir+0xa8/0x248) [ 3174.749813][T24556] r10:0000008d r9:83393100 r8:8367b280 r7:8367b200 r6:eb371f58 r5:838d9d80 [ 3174.749831][T24556] r4:00000000 [ 3174.749864][T24556] [<8059cf78>] (iterate_dir) from [<8059d234>] (sys_getdents+0x74/0x124) [ 3174.749924][T24556] r8:8020029c r7:838d9d80 r6:00000000 r5:00000000 r4:838d9d83 [ 3174.749938][T24556] [<8059d1c0>] (sys_getdents) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3174.749980][T24556] Exception stack(0xeb371fa8 to 0xeb371ff0) [ 3174.750016][T24556] 1fa0: 00000000 00000000 00000004 00000000 00000000 00000000 [ 3174.750048][T24556] 1fc0: 00000000 00000000 0012ed04 0000008d 00346378 00000000 00000001 76ef10dc [ 3174.750100][T24556] 1fe0: 76ef0e88 76ef0e78 00018bc4 00130300 [ 3174.750130][T24556] r7:0000008d r6:0012ed04 r5:00000000 r4:00000000 [ 3174.962179][ T28] audit: type=1400 audit(3430.882:7962): avc: denied { read } for pid=24557 comm="syz.9.4193" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3177.901936][T24584] fuse: Bad value for 'user_id' [ 3177.903161][T24584] fuse: Bad value for 'user_id' [ 3179.223961][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 3179.227370][ T28] audit: type=1400 audit(3435.142:8028): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.235031][ T28] audit: type=1400 audit(3435.152:8029): avc: denied { read write open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.243410][ T28] audit: type=1400 audit(3435.162:8030): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.321784][ T28] audit: type=1400 audit(3435.242:8031): avc: denied { create } for pid=24589 comm="syz.1.4206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3179.340114][ T28] audit: type=1400 audit(3435.262:8032): avc: denied { write } for pid=24589 comm="syz.1.4206" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3179.346023][ T28] audit: type=1400 audit(3435.262:8033): avc: denied { write open } for pid=24589 comm="syz.1.4206" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3179.413585][ T28] audit: type=1400 audit(3435.332:8034): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.416849][ T28] audit: type=1400 audit(3435.332:8035): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.440031][ T28] audit: type=1400 audit(3435.342:8036): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3179.553758][ T28] audit: type=1400 audit(3435.462:8037): avc: denied { read write } for pid=24591 comm="syz.1.4207" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3181.447880][T24598] FAULT_INJECTION: forcing a failure. [ 3181.447880][T24598] name failslab, interval 1, probability 0, space 0, times 0 [ 3181.449846][T24598] CPU: 0 UID: 0 PID: 24598 Comm: syz.9.4209 Tainted: G L syzkaller #0 PREEMPT [ 3181.449924][T24598] Tainted: [L]=SOFTLOCKUP [ 3181.449936][T24598] Hardware name: ARM-Versatile Express [ 3181.449949][T24598] Call trace: [ 3181.449976][T24598] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3181.450046][T24598] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3181.450056][T24598] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3181.450087][T24598] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3181.450123][T24598] r7:00000000 r6:00000000 r5:85956200 r4:82b17d48 [ 3181.450131][T24598] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3181.450168][T24598] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3181.450213][T24598] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000011 [ 3181.450222][T24598] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3181.450256][T24598] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3181.450310][T24598] r10:00000fff r9:8685b000 r8:00000000 r7:836ba330 r6:8663b328 r5:840a9ffc [ 3181.450334][T24598] r4:840a9ff6 [ 3181.450353][T24598] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3181.450409][T24598] r9:8685b000 r8:00000000 r7:836ba330 r6:8663b328 r5:00001000 r4:840a9ff7 [ 3181.450437][T24598] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3181.450506][T24598] r5:00001000 r4:840a9000 [ 3181.450572][T24598] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3181.450640][T24598] r10:00000000 r9:00000005 r8:8663b300 r7:40806685 r6:81cda174 r5:00000004 [ 3181.450656][T24598] r4:8663b328 r3:828d1400 [ 3181.450665][T24598] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3181.450709][T24598] r10:85956200 r9:00000005 r8:8663b300 r7:00000000 r6:00000000 r5:40806685 [ 3181.450720][T24598] r4:8663b300 [ 3181.450728][T24598] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3181.450763][T24598] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3181.450830][T24598] r7:00000000 r6:40806685 r5:8663b301 r4:00000000 [ 3181.450855][T24598] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3181.450905][T24598] Exception stack(0xec025fa8 to 0xec025ff0) [ 3181.450959][T24598] 5fa0: 00000000 00000000 00000005 40806685 00000000 00000000 [ 3181.450979][T24598] 5fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3181.450994][T24598] 5fe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3181.451015][T24598] r10:00000036 r9:85956200 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3181.451042][T24598] r4:00000000 [ 3181.479030][T24598] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3181.650807][T24592] FAULT_INJECTION: forcing a failure. [ 3181.650807][T24592] name failslab, interval 1, probability 0, space 0, times 0 [ 3181.651195][T24592] CPU: 1 UID: 0 PID: 24592 Comm: syz.1.4207 Tainted: G L syzkaller #0 PREEMPT [ 3181.651279][T24592] Tainted: [L]=SOFTLOCKUP [ 3181.651350][T24592] Hardware name: ARM-Versatile Express [ 3181.651380][T24592] Call trace: [ 3181.651422][T24592] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3181.651577][T24592] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3181.651700][T24592] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3181.651839][T24592] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3181.651954][T24592] r7:00000dc0 r6:00000000 r5:86ea0000 r4:82b17d48 [ 3181.652039][T24592] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3181.652266][T24592] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3181.652421][T24592] r8:82b1ed04 r7:00000dc0 r6:00000000 r5:00000000 r4:830e49c0 [ 3181.652557][T24592] [<8054ee98>] (should_failslab) from [<8052c210>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 3181.652747][T24592] [<8052c1bc>] (kmem_cache_alloc_noprof) from [<807752e8>] (fuse_request_alloc+0x24/0x84) [ 3181.652904][T24592] r10:86ea0000 r9:00000001 r8:82b1ed04 r7:8677e400 r6:8677e400 r5:82ce5b44 [ 3181.652931][T24592] r4:87452200 [ 3181.652949][T24592] [<807752c4>] (fuse_request_alloc) from [<80775a8c>] (fuse_get_req+0x1b4/0x2d8) [ 3181.653092][T24592] r7:8677e400 r6:ec10ddf8 r5:00000000 r4:87452200 [ 3181.653187][T24592] [<807758d8>] (fuse_get_req) from [<807789e0>] (__fuse_simple_request+0x54/0x520) [ 3181.653353][T24592] r10:8367ad80 r9:00000001 r8:82b1ed04 r7:86ea0000 r6:ec10ddf8 r5:87452200 [ 3181.653380][T24592] r4:8677e400 [ 3181.653398][T24592] [<8077898c>] (__fuse_simple_request) from [<8078ac98>] (fuse_readdir_uncached+0x104/0x380) [ 3181.653506][T24592] r8:00000000 r7:ec10df58 r6:00001000 r5:846b2000 r4:8677e400 [ 3181.653650][T24592] [<8078ab94>] (fuse_readdir_uncached) from [<8078b064>] (fuse_readdir+0x150/0x758) [ 3181.653762][T24592] r10:000000d9 r9:ec10df58 r8:8367ae00 r7:8367ad80 r6:ec10df58 r5:8367ad80 [ 3181.653824][T24592] r4:86a0ca80 [ 3181.653842][T24592] [<8078af14>] (fuse_readdir) from [<8059d020>] (iterate_dir+0xa8/0x248) [ 3181.653981][T24592] r10:000000d9 r9:86ea0000 r8:8367ae00 r7:8367ad80 r6:ec10df58 r5:83326f80 [ 3181.654040][T24592] r4:00000000 [ 3181.654114][T24592] [<8059cf78>] (iterate_dir) from [<8059d358>] (sys_getdents64+0x74/0x124) [ 3181.654223][T24592] r8:8020029c r7:83326f80 r6:00000000 r5:00000000 r4:83326f83 [ 3181.654296][T24592] [<8059d2e4>] (sys_getdents64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3181.654391][T24592] Exception stack(0xec10dfa8 to 0xec10dff0) [ 3181.654569][T24592] dfa0: 00000000 00000000 00000004 00000000 00000000 00000000 [ 3181.654803][T24592] dfc0: 00000000 00000000 0012ed04 000000d9 003462d8 00000000 00000001 76f120dc [ 3181.654844][T24592] dfe0: 76f11e88 76f11e78 00018bc4 00130300 [ 3181.654881][T24592] r7:000000d9 r6:0012ed04 r5:00000000 r4:00000000 [ 3184.352892][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 3184.359209][ T28] audit: type=1400 audit(3440.272:8062): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3184.365640][ T28] audit: type=1400 audit(3440.282:8063): avc: denied { read write open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3184.374671][ T28] audit: type=1400 audit(3440.292:8064): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3184.483791][ T28] audit: type=1400 audit(3440.402:8065): avc: denied { read write } for pid=24606 comm="syz.1.4211" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3184.485603][ T28] audit: type=1400 audit(3440.402:8066): avc: denied { open } for pid=24606 comm="syz.1.4211" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3184.505373][ T28] audit: type=1400 audit(3440.422:8067): avc: denied { mounton } for pid=24606 comm="syz.1.4211" path="/549/file0" dev="tmpfs" ino=2934 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3184.531385][ T28] audit: type=1400 audit(3440.442:8068): avc: denied { mount } for pid=24606 comm="syz.1.4211" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3186.615293][ T28] audit: type=1400 audit(3442.532:8069): avc: denied { unmount } for pid=20258 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3186.653904][ T28] audit: type=1400 audit(3442.572:8070): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3186.656689][ T28] audit: type=1400 audit(3442.572:8071): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3191.597710][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 3191.606259][ T28] audit: type=1400 audit(3447.512:8130): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3191.609126][ T28] audit: type=1400 audit(3447.512:8131): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3191.612655][ T28] audit: type=1400 audit(3447.522:8132): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3191.674057][ T28] audit: type=1400 audit(3447.592:8133): avc: denied { create } for pid=24629 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3191.691073][ T28] audit: type=1400 audit(3447.612:8134): avc: denied { bind } for pid=24629 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3191.696533][ T28] audit: type=1400 audit(3447.612:8135): avc: denied { setopt } for pid=24629 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3191.709101][ T28] audit: type=1400 audit(3447.622:8136): avc: denied { accept } for pid=24629 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3191.713125][ T28] audit: type=1400 audit(3447.632:8137): avc: denied { write } for pid=24629 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3191.750732][ T28] audit: type=1400 audit(3447.672:8138): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3191.753090][ T28] audit: type=1400 audit(3447.672:8139): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3193.660486][T24644] FAULT_INJECTION: forcing a failure. [ 3193.660486][T24644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3193.660800][T24644] CPU: 0 UID: 0 PID: 24644 Comm: syz.9.4224 Tainted: G L syzkaller #0 PREEMPT [ 3193.660867][T24644] Tainted: [L]=SOFTLOCKUP [ 3193.660877][T24644] Hardware name: ARM-Versatile Express [ 3193.660889][T24644] Call trace: [ 3193.660915][T24644] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3193.661111][T24644] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3193.661278][T24644] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3193.661325][T24644] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3193.661363][T24644] r7:00000000 r6:00000000 r5:858fbd40 r4:82b4edc8 [ 3193.661465][T24644] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3193.661559][T24644] [<809ccb70>] (should_fail_ex) from [<809ccda8>] (should_fail+0x14/0x18) [ 3193.661601][T24644] r8:76fdff08 r7:00000000 r6:00000000 r5:ec155f68 r4:00000002 [ 3193.661610][T24644] [<809ccd94>] (should_fail) from [<809ccdc8>] (should_fail_usercopy+0x1c/0x20) [ 3193.661693][T24644] [<809ccdac>] (should_fail_usercopy) from [<805bf348>] (simple_read_from_buffer+0x80/0x140) [ 3193.661826][T24644] [<805bf2c8>] (simple_read_from_buffer) from [<80643810>] (proc_fail_nth_read+0xb8/0x108) [ 3193.661922][T24644] r10:80643758 r9:00000001 r8:00000002 r7:ec155f68 r6:0000000f r5:76fdff08 [ 3193.661962][T24644] r4:858fbd40 r3:ec155e9f [ 3193.662105][T24644] [<80643758>] (proc_fail_nth_read) from [<805808a0>] (vfs_read+0xc0/0x328) [ 3193.662202][T24644] r8:858fbd40 r7:ec155f68 r6:76fdff08 r5:86a82a80 r4:0000000f [ 3193.662258][T24644] [<805807e0>] (vfs_read) from [<80581534>] (ksys_read+0x74/0xec) [ 3193.662299][T24644] r10:00000003 r9:858fbd40 r8:8020029c r7:00000000 r6:00000000 r5:86a82a80 [ 3193.662309][T24644] r4:86a82a83 [ 3193.662317][T24644] [<805814c0>] (ksys_read) from [<805815bc>] (sys_read+0x10/0x14) [ 3193.662381][T24644] r7:00000003 r6:00000000 r5:00000000 r4:00000000 [ 3193.662483][T24644] [<805815ac>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3193.662740][T24644] Exception stack(0xec155fa8 to 0xec155ff0) [ 3193.662781][T24644] 5fa0: 00000000 00000000 00000006 76fdff08 0000000f 00000000 [ 3193.663033][T24644] 5fc0: 00000000 00000000 00000000 00000003 003462d8 00000000 00000001 76fe00dc [ 3193.663240][T24644] 5fe0: 76fdfe58 76fdfe44 0010b524 00112108 [ 3196.747870][ T28] kauditd_printk_skb: 91 callbacks suppressed [ 3196.748753][ T28] audit: type=1400 audit(3452.662:8231): avc: denied { module_request } for pid=24656 comm="syz.9.4229" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3196.831152][ T28] audit: type=1400 audit(3452.752:8232): avc: denied { read } for pid=24656 comm="syz.9.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3196.842084][ T28] audit: type=1400 audit(3452.762:8233): avc: denied { ioctl } for pid=24656 comm="syz.9.4229" path="socket:[49471]" dev="sockfs" ino=49471 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3196.858706][ T28] audit: type=1400 audit(3452.772:8234): avc: denied { create } for pid=24656 comm="syz.9.4229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3196.862321][ T28] audit: type=1400 audit(3452.782:8235): avc: denied { ioctl } for pid=24656 comm="syz.9.4229" path="socket:[49471]" dev="sockfs" ino=49471 ioctlcmd=0x5866 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3197.022240][ T28] audit: type=1400 audit(3452.942:8236): avc: denied { read } for pid=24664 comm="syz.9.4230" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3197.056616][ T28] audit: type=1400 audit(3452.972:8237): avc: denied { read open } for pid=24664 comm="syz.9.4230" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3197.057149][ T28] audit: type=1400 audit(3452.972:8238): avc: denied { create } for pid=24664 comm="syz.9.4230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3197.062063][ T28] audit: type=1400 audit(3452.982:8239): avc: denied { ioctl } for pid=24664 comm="syz.9.4230" path="socket:[49478]" dev="sockfs" ino=49478 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3197.091115][ T28] audit: type=1400 audit(3452.992:8240): avc: denied { bind } for pid=24664 comm="syz.9.4230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3201.840958][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 3201.841550][ T28] audit: type=1400 audit(3457.762:8269): avc: denied { unmount } for pid=23678 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3202.035056][ T28] audit: type=1400 audit(3457.952:8270): avc: denied { read write } for pid=24683 comm="syz.9.4237" name="001" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3202.039303][ T28] audit: type=1400 audit(3457.962:8271): avc: denied { read write open } for pid=24683 comm="syz.9.4237" path="/dev/bus/usb/002/001" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3202.252220][ T28] audit: type=1400 audit(3458.172:8272): avc: denied { create } for pid=24683 comm="syz.9.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3202.267277][ T28] audit: type=1400 audit(3458.182:8273): avc: denied { getopt } for pid=24683 comm="syz.9.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3202.300643][ T28] audit: type=1400 audit(3458.222:8274): avc: denied { write } for pid=24683 comm="syz.9.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3202.304691][ T28] audit: type=1400 audit(3458.222:8275): avc: denied { read write } for pid=24683 comm="syz.9.4237" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3202.306093][ T28] audit: type=1400 audit(3458.222:8276): avc: denied { ioctl open } for pid=24683 comm="syz.9.4237" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3202.363722][T24684] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=24684 comm=syz.9.4237 [ 3202.381419][ T28] audit: type=1400 audit(3458.302:8277): avc: denied { create } for pid=24683 comm="syz.9.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3202.392158][ T28] audit: type=1400 audit(3458.312:8278): avc: denied { write } for pid=24683 comm="syz.9.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3207.704496][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 3207.705776][ T28] audit: type=1400 audit(3463.622:8298): avc: denied { unmount } for pid=23678 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3208.323633][ T28] audit: type=1400 audit(3464.242:8299): avc: denied { create } for pid=24695 comm="syz.9.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3208.342761][ T28] audit: type=1400 audit(3464.262:8300): avc: denied { bind } for pid=24695 comm="syz.9.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3208.353597][ T28] audit: type=1400 audit(3464.272:8301): avc: denied { setopt } for pid=24695 comm="syz.9.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3208.364596][ T28] audit: type=1400 audit(3464.282:8302): avc: denied { accept } for pid=24695 comm="syz.9.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3208.404554][ T28] audit: type=1400 audit(3464.322:8303): avc: denied { write } for pid=24695 comm="syz.9.4242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3208.570130][ T28] audit: type=1400 audit(3464.482:8304): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3208.590109][ T28] audit: type=1400 audit(3464.482:8305): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3208.622561][ T28] audit: type=1400 audit(3464.542:8306): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3208.751422][ T28] audit: type=1400 audit(3464.672:8307): avc: denied { read } for pid=24697 comm="syz.9.4244" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3208.794251][T24698] FAULT_INJECTION: forcing a failure. [ 3208.794251][T24698] name failslab, interval 1, probability 0, space 0, times 0 [ 3208.794895][T24698] CPU: 0 UID: 0 PID: 24698 Comm: syz.9.4244 Tainted: G L syzkaller #0 PREEMPT [ 3208.795008][T24698] Tainted: [L]=SOFTLOCKUP [ 3208.795028][T24698] Hardware name: ARM-Versatile Express [ 3208.795054][T24698] Call trace: [ 3208.795104][T24698] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3208.795390][T24698] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3208.795562][T24698] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3208.795731][T24698] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3208.795933][T24698] r7:00000000 r6:00000000 r5:858fbd40 r4:82b17d48 [ 3208.795978][T24698] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3208.796096][T24698] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3208.796221][T24698] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001d [ 3208.796286][T24698] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3208.796360][T24698] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3208.796546][T24698] r10:00000fff r9:830c0000 r8:00000000 r7:834c1770 r6:838d67a8 r5:846b2ffc [ 3208.796662][T24698] r4:846b2fea [ 3208.796711][T24698] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3208.796927][T24698] r9:830c0000 r8:00000000 r7:834c1770 r6:838d67a8 r5:00001000 r4:846b2feb [ 3208.796951][T24698] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3208.797064][T24698] r5:00001000 r4:846b2000 [ 3208.797175][T24698] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3208.797350][T24698] r10:00000000 r9:00000003 r8:838d6780 r7:00003b71 r6:81cda174 r5:00000004 [ 3208.797383][T24698] r4:838d67a8 r3:828d1400 [ 3208.797432][T24698] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3208.797576][T24698] r10:858fbd40 r9:00000003 r8:838d6780 r7:00000000 r6:00000000 r5:00003b71 [ 3208.797839][T24698] r4:838d6780 [ 3208.797889][T24698] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3208.798007][T24698] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3208.798352][T24698] r7:00000000 r6:00003b71 r5:838d6781 r4:00000000 [ 3208.798419][T24698] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3208.798481][T24698] Exception stack(0xec9f5fa8 to 0xec9f5ff0) [ 3208.798526][T24698] 5fa0: 00000000 00000000 00000003 00003b71 00000000 00000000 [ 3208.798573][T24698] 5fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3208.798604][T24698] 5fe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3208.798646][T24698] r10:00000036 r9:858fbd40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3208.798667][T24698] r4:00000000 [ 3208.979444][T24698] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3211.112465][T24710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24710 comm=syz.9.4248 [ 3211.914169][T24715] FAULT_INJECTION: forcing a failure. [ 3211.914169][T24715] name failslab, interval 1, probability 0, space 0, times 0 [ 3211.914718][T24715] CPU: 0 UID: 0 PID: 24715 Comm: syz.1.4251 Tainted: G L syzkaller #0 PREEMPT [ 3211.914814][T24715] Tainted: [L]=SOFTLOCKUP [ 3211.914834][T24715] Hardware name: ARM-Versatile Express [ 3211.914857][T24715] Call trace: [ 3211.914904][T24715] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3211.915033][T24715] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3211.915053][T24715] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3211.915144][T24715] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3211.915243][T24715] r7:00000000 r6:00000000 r5:83a024c0 r4:82b17d48 [ 3211.915265][T24715] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3211.915338][T24715] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3211.915435][T24715] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000019 [ 3211.915551][T24715] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3211.915637][T24715] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3211.915725][T24715] r10:00000fff r9:83810800 r8:00000000 r7:83656908 r6:8663b1a8 r5:84093ffd [ 3211.915749][T24715] r4:84093fef [ 3211.915768][T24715] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3211.916040][T24715] r9:83810800 r8:00000000 r7:83656908 r6:8663b1a8 r5:00001000 r4:84093ff0 [ 3211.916072][T24715] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3211.916162][T24715] r5:00001000 r4:84093000 [ 3211.916237][T24715] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3211.916439][T24715] r10:00000000 r9:00000003 r8:8663b180 r7:00008933 r6:81cda174 r5:00000004 [ 3211.916477][T24715] r4:8663b1a8 r3:828d1400 [ 3211.916534][T24715] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3211.916634][T24715] r10:83a024c0 r9:00000003 r8:8663b180 r7:200001c0 r6:200001c0 r5:00008933 [ 3211.916661][T24715] r4:8663b180 [ 3211.916678][T24715] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3211.916748][T24715] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3211.916821][T24715] r7:200001c0 r6:00008933 r5:8663b181 r4:00000000 [ 3211.916839][T24715] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3211.916891][T24715] Exception stack(0xeca09fa8 to 0xeca09ff0) [ 3211.916932][T24715] 9fa0: 00000000 00000000 00000003 00008933 200001c0 00000000 [ 3211.916973][T24715] 9fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f120dc [ 3211.917269][T24715] 9fe0: 76f11e88 76f11e78 00018bc4 00130300 [ 3211.917330][T24715] r10:00000036 r9:83a024c0 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3211.917369][T24715] r4:00000000 [ 3211.917535][T24715] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3212.775993][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 3212.776456][ T28] audit: type=1400 audit(3468.692:8356): avc: denied { read } for pid=24719 comm="syz.1.4253" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3212.823166][ T28] audit: type=1400 audit(3468.742:8357): avc: denied { read open } for pid=24719 comm="syz.1.4253" path="net:[4026532762]" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3212.835292][ T28] audit: type=1400 audit(3468.752:8358): avc: denied { create } for pid=24719 comm="syz.1.4253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3212.912933][ T28] audit: type=1400 audit(3468.822:8359): avc: denied { create } for pid=24719 comm="syz.1.4253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3212.916805][ T28] audit: type=1400 audit(3468.822:8360): avc: denied { write } for pid=24719 comm="syz.1.4253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3212.916911][ T28] audit: type=1400 audit(3468.822:8361): avc: denied { read } for pid=24719 comm="syz.1.4253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3213.042243][ T28] audit: type=1400 audit(3468.952:8362): avc: denied { read write } for pid=24719 comm="syz.1.4253" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3213.045901][ T28] audit: type=1400 audit(3468.952:8363): avc: denied { open } for pid=24719 comm="syz.1.4253" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3213.392986][ T28] audit: type=1400 audit(3469.192:8364): avc: denied { ioctl } for pid=24719 comm="syz.1.4253" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3213.424011][ T28] audit: type=1400 audit(3469.342:8365): avc: denied { read } for pid=24719 comm="syz.1.4253" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3217.999756][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 3218.000159][ T28] audit: type=1400 audit(3473.922:8408): avc: denied { execmem } for pid=24767 comm="syz.9.4259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3219.189483][T24720] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 3219.193009][ T28] audit: type=1400 audit(3475.112:8409): avc: denied { module_request } for pid=24719 comm="syz.1.4253" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3219.362405][ T28] audit: type=1400 audit(3475.282:8410): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3219.364233][ T28] audit: type=1400 audit(3475.282:8411): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3219.366076][ T28] audit: type=1400 audit(3475.282:8412): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3219.464235][ T28] audit: type=1400 audit(3475.382:8413): avc: denied { read } for pid=24772 comm="syz.1.4260" name="admmidi2" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3219.480827][ T28] audit: type=1400 audit(3475.402:8414): avc: denied { read open } for pid=24772 comm="syz.1.4260" path="/dev/admmidi2" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3219.487130][ T28] audit: type=1400 audit(3475.402:8415): avc: denied { write } for pid=24772 comm="syz.1.4260" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3219.496369][ T28] audit: type=1400 audit(3475.412:8416): avc: denied { ioctl } for pid=24772 comm="syz.1.4260" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3219.762112][ T28] audit: type=1400 audit(3475.682:8417): avc: denied { module_request } for pid=24767 comm="syz.9.4259" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3223.223237][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 3223.224439][ T28] audit: type=1400 audit(3479.142:8471): avc: denied { read } for pid=24802 comm="syz.9.4271" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3223.237692][ T28] audit: type=1400 audit(3479.152:8472): avc: denied { open } for pid=24802 comm="syz.9.4271" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3223.259496][ T28] audit: type=1400 audit(3479.182:8473): avc: denied { ioctl } for pid=24802 comm="syz.9.4271" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3223.323682][ T28] audit: type=1400 audit(3479.242:8474): avc: denied { unmount } for pid=20258 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3223.357657][ T28] audit: type=1400 audit(3479.272:8475): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3223.360017][ T28] audit: type=1400 audit(3479.272:8476): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3223.368075][ T28] audit: type=1400 audit(3479.282:8477): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3223.503708][ T28] audit: type=1400 audit(3479.422:8478): avc: denied { create } for pid=24806 comm="syz.9.4272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3223.542297][ T28] audit: type=1400 audit(3479.462:8479): avc: denied { read } for pid=24807 comm="syz.1.4273" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3223.544156][ T28] audit: type=1400 audit(3479.462:8480): avc: denied { read open } for pid=24807 comm="syz.1.4273" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3225.574239][T24824] FAULT_INJECTION: forcing a failure. [ 3225.574239][T24824] name failslab, interval 1, probability 0, space 0, times 0 [ 3225.582173][T24824] CPU: 1 UID: 0 PID: 24824 Comm: syz.1.4279 Tainted: G L syzkaller #0 PREEMPT [ 3225.582336][T24824] Tainted: [L]=SOFTLOCKUP [ 3225.582394][T24824] Hardware name: ARM-Versatile Express [ 3225.582424][T24824] Call trace: [ 3225.582481][T24824] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3225.582603][T24824] r7:60000113 r6:60000113 r5:8231b914 r4:00000000 [ 3225.582666][T24824] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3225.582735][T24824] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3225.582797][T24824] r7:00000000 r6:00000000 r5:858eee40 r4:82b17d48 [ 3225.582813][T24824] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3225.582895][T24824] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3225.583003][T24824] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000011 [ 3225.583024][T24824] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3225.583084][T24824] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3225.583160][T24824] r10:00000fff r9:86366800 r8:00000000 r7:8575c000 r6:861aa128 r5:85911ffc [ 3225.583183][T24824] r4:85911ff6 [ 3225.583200][T24824] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3225.583302][T24824] r9:86366800 r8:00000000 r7:8575c000 r6:861aa128 r5:00001000 r4:85911ff7 [ 3225.583328][T24824] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3225.583393][T24824] r5:00001000 r4:85911000 [ 3225.583411][T24824] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3225.583485][T24824] r10:00000000 r9:00000003 r8:861aa100 r7:40806685 r6:81cda174 r5:00000004 [ 3225.583511][T24824] r4:861aa128 r3:828d1400 [ 3225.583530][T24824] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3225.583658][T24824] r10:858eee40 r9:00000003 r8:861aa100 r7:20000200 r6:20000200 r5:40806685 [ 3225.583687][T24824] r4:861aa100 [ 3225.583717][T24824] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3225.583786][T24824] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3225.583861][T24824] r7:20000200 r6:40806685 r5:861aa101 r4:00000000 [ 3225.583890][T24824] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3225.583970][T24824] Exception stack(0xe438dfa8 to 0xe438dff0) [ 3225.584017][T24824] dfa0: 00000000 00000000 00000003 40806685 20000200 00000000 [ 3225.584074][T24824] dfc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76f120dc [ 3225.584104][T24824] dfe0: 76f11e88 76f11e78 00018bc4 00130300 [ 3225.584139][T24824] r10:00000036 r9:858eee40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3225.584159][T24824] r4:00000000 [ 3225.629098][T24824] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3226.502193][T24838] FAULT_INJECTION: forcing a failure. [ 3226.502193][T24838] name failslab, interval 1, probability 0, space 0, times 0 [ 3226.506646][T24838] CPU: 1 UID: 0 PID: 24838 Comm: syz.9.4283 Tainted: G L syzkaller #0 PREEMPT [ 3226.506809][T24838] Tainted: [L]=SOFTLOCKUP [ 3226.506831][T24838] Hardware name: ARM-Versatile Express [ 3226.506857][T24838] Call trace: [ 3226.506906][T24838] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3226.507027][T24838] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3226.507048][T24838] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3226.507109][T24838] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3226.507177][T24838] r7:00000000 r6:00000000 r5:859555c0 r4:82b17d48 [ 3226.507196][T24838] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3226.507267][T24838] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3226.507358][T24838] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000019 [ 3226.507380][T24838] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3226.507444][T24838] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3226.507530][T24838] r10:00000fff r9:83810800 r8:00000000 r7:8371dbb0 r6:838d7a28 r5:85911ffd [ 3226.507554][T24838] r4:85911fef [ 3226.507574][T24838] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3226.507656][T24838] r9:83810800 r8:00000000 r7:8371dbb0 r6:838d7a28 r5:00001000 r4:85911ff0 [ 3226.507677][T24838] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3226.507760][T24838] r5:00001000 r4:85911000 [ 3226.507778][T24838] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3226.507861][T24838] r10:00000000 r9:00000003 r8:838d7a00 r7:00008935 r6:81cda174 r5:00000004 [ 3226.507886][T24838] r4:838d7a28 r3:828d1400 [ 3226.507905][T24838] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3226.508059][T24838] r10:859555c0 r9:00000003 r8:838d7a00 r7:20001780 r6:20001780 r5:00008935 [ 3226.508155][T24838] r4:838d7a00 [ 3226.508183][T24838] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3226.508269][T24838] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3226.508350][T24838] r7:20001780 r6:00008935 r5:838d7a01 r4:00000000 [ 3226.508372][T24838] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3226.508430][T24838] Exception stack(0xe4385fa8 to 0xe4385ff0) [ 3226.508474][T24838] 5fa0: 00000000 00000000 00000003 00008935 20001780 00000000 [ 3226.508515][T24838] 5fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3226.508546][T24838] 5fe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3226.508587][T24838] r10:00000036 r9:859555c0 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3226.508610][T24838] r4:00000000 [ 3226.582541][T24838] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3227.673140][T24852] FAULT_INJECTION: forcing a failure. [ 3227.673140][T24852] name failslab, interval 1, probability 0, space 0, times 0 [ 3227.673782][T24852] CPU: 0 UID: 0 PID: 24852 Comm: syz.9.4286 Tainted: G L syzkaller #0 PREEMPT [ 3227.673889][T24852] Tainted: [L]=SOFTLOCKUP [ 3227.673911][T24852] Hardware name: ARM-Versatile Express [ 3227.673937][T24852] Call trace: [ 3227.673989][T24852] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3227.674164][T24852] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3227.674274][T24852] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3227.674378][T24852] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3227.674453][T24852] r7:00000000 r6:00000000 r5:8594bd40 r4:82b17d48 [ 3227.674974][T24852] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3227.675098][T24852] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3227.675192][T24852] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001d [ 3227.675214][T24852] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3227.675481][T24852] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3227.675635][T24852] r10:00000fff r9:830c0000 r8:00000000 r7:834e0a18 r6:861aa3a8 r5:85911ffc [ 3227.675725][T24852] r4:85911fea [ 3227.675939][T24852] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3227.676069][T24852] r9:830c0000 r8:00000000 r7:834e0a18 r6:861aa3a8 r5:00001000 r4:85911feb [ 3227.676122][T24852] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3227.676253][T24852] r5:00001000 r4:85911000 [ 3227.676438][T24852] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3227.676534][T24852] r10:00000000 r9:00000003 r8:861aa380 r7:4018641b r6:81cda174 r5:00000004 [ 3227.676601][T24852] r4:861aa3a8 r3:828d1400 [ 3227.676623][T24852] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3227.676843][T24852] r10:8594bd40 r9:00000003 r8:861aa380 r7:20000040 r6:20000040 r5:4018641b [ 3227.676924][T24852] r4:861aa380 [ 3227.676943][T24852] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3227.677140][T24852] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3227.677272][T24852] r7:20000040 r6:4018641b r5:861aa381 r4:00000000 [ 3227.677346][T24852] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3227.680611][T24852] Exception stack(0xea501fa8 to 0xea501ff0) [ 3227.680675][T24852] 1fa0: 00000000 00000000 00000003 4018641b 20000040 00000000 [ 3227.680731][T24852] 1fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3227.680763][T24852] 1fe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3227.680805][T24852] r10:00000036 r9:8594bd40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3227.680826][T24852] r4:00000000 [ 3227.749397][T24852] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3228.243691][ T28] kauditd_printk_skb: 160 callbacks suppressed [ 3228.244158][ T28] audit: type=1400 audit(3484.162:8641): avc: denied { module_request } for pid=24854 comm="syz.9.4287" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3228.262384][ T28] audit: type=1400 audit(3484.182:8642): avc: denied { read } for pid=24843 comm="syz.1.4285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3228.276670][ T28] audit: type=1400 audit(3484.192:8643): avc: denied { write } for pid=24843 comm="syz.1.4285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3228.290610][ T28] audit: type=1400 audit(3484.212:8644): avc: denied { module_request } for pid=24843 comm="syz.1.4285" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3228.310842][ T28] audit: type=1400 audit(3484.232:8645): avc: denied { write } for pid=24843 comm="syz.1.4285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3228.421095][ T28] audit: type=1400 audit(3484.332:8646): avc: denied { sys_module } for pid=24854 comm="syz.9.4287" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3228.431573][ T28] audit: type=1400 audit(3484.352:8647): avc: denied { module_request } for pid=24854 comm="syz.9.4287" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3228.665548][ T28] audit: type=1400 audit(3484.582:8648): avc: denied { read } for pid=24843 comm="syz.1.4285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3228.690856][ T28] audit: type=1400 audit(3484.612:8649): avc: denied { write } for pid=24843 comm="syz.1.4285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3228.747434][ T28] audit: type=1400 audit(3484.662:8650): avc: denied { read } for pid=24860 comm="syz.9.4288" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3232.399609][T24876] SELinux: failed to load policy [ 3232.403586][T24876] SELinux: failed to load policy [ 3232.409375][T24876] SELinux: failed to load policy [ 3232.414761][T24876] SELinux: failed to load policy [ 3232.430241][T24876] SELinux: failed to load policy [ 3232.431874][T24876] SELinux: failed to load policy [ 3232.445606][T24876] SELinux: failed to load policy [ 3232.460738][T24876] SELinux: failed to load policy [ 3232.461482][T24876] SELinux: failed to load policy [ 3232.462057][T24876] SELinux: failed to load policy [ 3233.285641][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 3233.286035][ T28] audit: type=1400 audit(3489.192:8730): avc: denied { read } for pid=24886 comm="syz.1.4296" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3233.292886][ T28] audit: type=1400 audit(3489.212:8731): avc: denied { open } for pid=24886 comm="syz.1.4296" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3233.414476][ T28] audit: type=1400 audit(3489.332:8732): avc: denied { ioctl } for pid=24884 comm="syz.9.4295" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3233.437413][ T28] audit: type=1400 audit(3489.352:8733): avc: denied { create } for pid=24886 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3233.440071][ T28] audit: type=1400 audit(3489.352:8734): avc: denied { write } for pid=24886 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3233.515953][ T28] audit: type=1400 audit(3489.432:8735): avc: denied { create } for pid=24886 comm="syz.1.4296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3233.618018][ T28] audit: type=1400 audit(3489.532:8736): avc: denied { create } for pid=24890 comm="syz.9.4297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3233.625501][ T28] audit: type=1400 audit(3489.542:8737): avc: denied { ioctl } for pid=24890 comm="syz.9.4297" path="socket:[49888]" dev="sockfs" ino=49888 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3233.637262][ T28] audit: type=1400 audit(3489.552:8738): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3233.641842][ T28] audit: type=1400 audit(3489.572:8739): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3237.534586][T24920] FAULT_INJECTION: forcing a failure. [ 3237.534586][T24920] name failslab, interval 1, probability 0, space 0, times 0 [ 3237.538676][T24920] CPU: 1 UID: 0 PID: 24920 Comm: syz.9.4308 Tainted: G L syzkaller #0 PREEMPT [ 3237.538841][T24920] Tainted: [L]=SOFTLOCKUP [ 3237.538866][T24920] Hardware name: ARM-Versatile Express [ 3237.538893][T24920] Call trace: [ 3237.538941][T24920] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3237.539055][T24920] r7:60000113 r6:60000113 r5:8231b914 r4:00000000 [ 3237.539075][T24920] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3237.539134][T24920] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3237.539200][T24920] r7:00000000 r6:00000000 r5:8594bd40 r4:82b17d48 [ 3237.539218][T24920] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3237.539285][T24920] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3237.539365][T24920] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:00000021 [ 3237.539385][T24920] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3237.539448][T24920] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3237.539530][T24920] r10:00000fff r9:830c0000 r8:00000000 r7:834e0d48 r6:838d7ea8 r5:86d3bffc [ 3237.539553][T24920] r4:86d3bfe6 [ 3237.539571][T24920] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3237.539647][T24920] r9:830c0000 r8:00000000 r7:834e0d48 r6:838d7ea8 r5:00001000 r4:86d3bfe7 [ 3237.539666][T24920] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3237.539747][T24920] r5:00001000 r4:86d3b000 [ 3237.539766][T24920] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3237.539846][T24920] r10:00000000 r9:00000005 r8:838d7e80 r7:00003b86 r6:81cda174 r5:00000004 [ 3237.539870][T24920] r4:838d7ea8 r3:828d1400 [ 3237.539887][T24920] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3237.539959][T24920] r10:8594bd40 r9:00000005 r8:838d7e80 r7:00000000 r6:00000000 r5:00003b86 [ 3237.539983][T24920] r4:838d7e80 [ 3237.539999][T24920] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3237.540059][T24920] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3237.540128][T24920] r7:00000000 r6:00003b86 r5:838d7e81 r4:00000000 [ 3237.540146][T24920] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3237.540198][T24920] Exception stack(0xea601fa8 to 0xea601ff0) [ 3237.540240][T24920] 1fa0: 00000000 00000000 00000005 00003b86 00000000 00000000 [ 3237.540276][T24920] 1fc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3237.540307][T24920] 1fe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3237.540345][T24920] r10:00000036 r9:8594bd40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3237.540366][T24920] r4:00000000 [ 3237.577988][T24920] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3238.396013][ T28] kauditd_printk_skb: 73 callbacks suppressed [ 3238.397122][ T28] audit: type=1400 audit(3494.312:8813): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3238.413822][ T28] audit: type=1400 audit(3494.332:8814): avc: denied { read write open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3238.417187][ T28] audit: type=1400 audit(3494.332:8815): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3238.501422][ T28] audit: type=1400 audit(3494.422:8816): avc: denied { create } for pid=24927 comm="syz.1.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3238.557415][ T28] audit: type=1400 audit(3494.472:8817): avc: denied { bind } for pid=24927 comm="syz.1.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3238.567811][ T28] audit: type=1400 audit(3494.482:8818): avc: denied { setopt } for pid=24927 comm="syz.1.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3238.573704][ T28] audit: type=1400 audit(3494.492:8819): avc: denied { accept } for pid=24927 comm="syz.1.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3238.577446][ T28] audit: type=1400 audit(3494.492:8820): avc: denied { write } for pid=24927 comm="syz.1.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3238.603281][ T28] audit: type=1400 audit(3494.522:8821): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3238.604071][ T28] audit: type=1400 audit(3494.522:8822): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3243.433664][ T28] kauditd_printk_skb: 91 callbacks suppressed [ 3243.433860][ T28] audit: type=1400 audit(3499.352:8914): avc: denied { read } for pid=24951 comm="syz.1.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3243.498404][ T28] audit: type=1400 audit(3499.412:8915): avc: denied { write } for pid=24951 comm="syz.1.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3243.531399][ T28] audit: type=1400 audit(3499.452:8916): avc: denied { ioctl } for pid=24951 comm="syz.1.4318" path="socket:[50517]" dev="sockfs" ino=50517 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3243.542590][ T28] audit: type=1400 audit(3499.462:8917): avc: denied { module_request } for pid=24951 comm="syz.1.4318" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3243.830779][ T28] audit: type=1400 audit(3499.752:8918): avc: denied { sys_module } for pid=24951 comm="syz.1.4318" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3243.838860][ T28] audit: type=1400 audit(3499.752:8919): avc: denied { module_request } for pid=24951 comm="syz.1.4318" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3244.002089][ T28] audit: type=1400 audit(3499.922:8920): avc: denied { write } for pid=24951 comm="syz.1.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3244.015683][ T28] audit: type=1400 audit(3499.932:8921): avc: denied { module_request } for pid=24951 comm="syz.1.4318" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3244.265008][ T28] audit: type=1400 audit(3500.182:8922): avc: denied { read } for pid=24951 comm="syz.1.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3244.270501][ T28] audit: type=1400 audit(3500.192:8923): avc: denied { write } for pid=24951 comm="syz.1.4318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3248.466648][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 3248.466961][ T28] audit: type=1400 audit(3504.382:8971): avc: denied { read write } for pid=24980 comm="syz.1.4325" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3248.477138][ T28] audit: type=1400 audit(3504.392:8972): avc: denied { read write open } for pid=24980 comm="syz.1.4325" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3250.032667][ T28] audit: type=1400 audit(3505.952:8973): avc: denied { read } for pid=24985 comm="syz.9.4327" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3250.035479][ T28] audit: type=1400 audit(3505.952:8974): avc: denied { open } for pid=24985 comm="syz.9.4327" path="net:[4026532665]" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3250.041390][ T28] audit: type=1400 audit(3505.962:8975): avc: denied { create } for pid=24985 comm="syz.9.4327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3250.976320][ T28] audit: type=1400 audit(3506.892:8976): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3250.978743][ T28] audit: type=1400 audit(3506.892:8977): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3250.981397][ T28] audit: type=1400 audit(3506.892:8978): avc: denied { ioctl } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3251.077818][ T28] audit: type=1400 audit(3506.992:8979): avc: denied { read write } for pid=24988 comm="syz.1.4328" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3251.081825][ T28] audit: type=1400 audit(3506.992:8980): avc: denied { open } for pid=24988 comm="syz.1.4328" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3253.670649][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 3253.671886][ T28] audit: type=1400 audit(3509.592:9014): avc: denied { read } for pid=25007 comm="syz.9.4337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3253.960479][ T28] audit: type=1400 audit(3509.882:9015): avc: denied { read write } for pid=25010 comm="syz.9.4338" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3253.962838][ T28] audit: type=1400 audit(3509.882:9016): avc: denied { open } for pid=25010 comm="syz.9.4338" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3253.990679][ T28] audit: type=1400 audit(3509.912:9017): avc: denied { read } for pid=25010 comm="syz.9.4338" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3253.994163][ T28] audit: type=1400 audit(3509.912:9018): avc: denied { open } for pid=25010 comm="syz.9.4338" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3254.002128][ T28] audit: type=1400 audit(3509.922:9019): avc: denied { write } for pid=25010 comm="syz.9.4338" name="mouse0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3254.011675][ T28] audit: type=1400 audit(3509.932:9020): avc: denied { create } for pid=25010 comm="syz.9.4338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3254.034491][ T28] audit: type=1400 audit(3509.952:9021): avc: denied { ioctl } for pid=25010 comm="syz.9.4338" path="/dev/full" dev="devtmpfs" ino=6 ioctlcmd=0x5100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3254.160701][ T28] audit: type=1400 audit(3510.082:9022): avc: denied { read write } for pid=20258 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3254.162100][ T28] audit: type=1400 audit(3510.082:9023): avc: denied { open } for pid=20258 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3254.215061][T25013] fuse: Bad value for 'fd' [ 3257.817826][ T8876] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3257.883336][ T8876] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3257.956910][ T8876] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3258.017613][ T8876] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3258.354398][ T8876] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3258.370301][ T8876] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3258.377771][ T8876] bond0 (unregistering): Released all slaves [ 3258.451830][ T8876] hsr_slave_0: left promiscuous mode [ 3258.464332][ T8876] hsr_slave_1: left promiscuous mode [ 3258.484977][ T8876] veth1_macvtap: left promiscuous mode [ 3258.485957][ T8876] veth0_macvtap: left promiscuous mode [ 3258.489896][ T8876] veth1_vlan: left promiscuous mode [ 3258.491034][ T8876] veth0_vlan: left promiscuous mode [ 3259.025503][ T28] kauditd_printk_skb: 56 callbacks suppressed [ 3259.025914][ T28] audit: type=1400 audit(3514.942:9080): avc: denied { module_request } for pid=25030 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3259.234367][ T28] audit: type=1400 audit(3515.152:9081): avc: denied { read } for pid=25056 comm="syz.9.4348" name="vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3259.244586][ T28] audit: type=1400 audit(3515.162:9082): avc: denied { read open } for pid=25056 comm="syz.9.4348" path="/dev/vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3259.271068][ T28] audit: type=1400 audit(3515.172:9083): avc: denied { create } for pid=25056 comm="syz.9.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3259.312513][ T28] audit: type=1400 audit(3515.202:9084): avc: denied { create } for pid=25056 comm="syz.9.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3259.372324][ T28] audit: type=1400 audit(3515.292:9085): avc: denied { sys_module } for pid=25030 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3259.375692][ T28] audit: type=1400 audit(3515.292:9086): avc: denied { create } for pid=25056 comm="syz.9.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3259.391390][ T28] audit: type=1400 audit(3515.312:9087): avc: denied { module_request } for pid=25030 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3259.430869][ T28] audit: type=1400 audit(3515.352:9088): avc: denied { ioctl } for pid=25056 comm="syz.9.4348" path="socket:[50768]" dev="sockfs" ino=50768 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3259.453926][ T28] audit: type=1400 audit(3515.362:9089): avc: denied { bind } for pid=25056 comm="syz.9.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3260.481542][T25112] FAULT_INJECTION: forcing a failure. [ 3260.481542][T25112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3260.481959][T25112] CPU: 1 UID: 0 PID: 25112 Comm: syz.9.4348 Tainted: G L syzkaller #0 PREEMPT [ 3260.482013][T25112] Tainted: [L]=SOFTLOCKUP [ 3260.482023][T25112] Hardware name: ARM-Versatile Express [ 3260.482037][T25112] Call trace: [ 3260.482065][T25112] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3260.482166][T25112] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3260.482179][T25112] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3260.482211][T25112] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3260.482275][T25112] r7:0000000c r6:00000000 r5:83b9a4c0 r4:82b4edc8 [ 3260.482286][T25112] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3260.482322][T25112] [<809ccb70>] (should_fail_ex) from [<809ccda8>] (should_fail+0x14/0x18) [ 3260.482359][T25112] r8:837b4040 r7:0000000c r6:76f9cde4 r5:eb01dee4 r4:0000000c [ 3260.482368][T25112] [<809ccd94>] (should_fail) from [<809ccdc8>] (should_fail_usercopy+0x1c/0x20) [ 3260.482398][T25112] [<809ccdac>] (should_fail_usercopy) from [<815dcbc8>] (move_addr_to_kernel+0x34/0xf8) [ 3260.482440][T25112] [<815dcb94>] (move_addr_to_kernel) from [<815de854>] (__sys_sendto+0xd0/0x160) [ 3260.482561][T25112] r7:76f9cde4 r6:86a81f81 r5:00000000 r4:00000000 [ 3260.482583][T25112] [<815de784>] (__sys_sendto) from [<815de900>] (sys_sendto+0x1c/0x24) [ 3260.482709][T25112] r9:83b9a4c0 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f9cde4 [ 3260.482725][T25112] [<815de8e4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3260.482756][T25112] Exception stack(0xeb01dfa8 to 0xeb01dff0) [ 3260.482778][T25112] dfa0: 76f9cde4 0000000c 00000003 76f9ce78 00000024 00000000 [ 3260.482801][T25112] dfc0: 76f9cde4 0000000c 00000000 00000122 76f9ce9c 00000000 76f9ce78 76f9e0dc [ 3260.482815][T25112] dfe0: 76f9cd78 76f9cd64 0010b524 00112108 [ 3260.885265][ T2956] 8021q: adding VLAN 0 to HW filter on device eth5 [ 3261.581712][T25030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3261.602967][T25030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3263.157304][ T2956] 8021q: adding VLAN 0 to HW filter on device eth6 [ 3263.491986][T25030] hsr_slave_0: entered promiscuous mode [ 3263.493705][T25030] hsr_slave_1: entered promiscuous mode [ 3264.080585][ T28] kauditd_printk_skb: 358 callbacks suppressed [ 3264.080944][ T28] audit: type=1400 audit(3519.992:9446): avc: denied { write } for pid=25279 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.081226][ T28] audit: type=1400 audit(3519.992:9447): avc: denied { write open } for pid=25279 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.102337][ T28] audit: type=1400 audit(3520.022:9448): avc: denied { read append } for pid=25291 comm="syz.9.4353" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.108916][ T28] audit: type=1400 audit(3520.022:9449): avc: denied { read append open } for pid=25291 comm="syz.9.4353" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.145470][ T28] audit: type=1400 audit(3520.052:9450): avc: denied { read write } for pid=25291 comm="syz.9.4353" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.167884][ T28] audit: type=1400 audit(3520.082:9451): avc: denied { open } for pid=25291 comm="syz.9.4353" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.234604][ T28] audit: type=1400 audit(3520.152:9452): avc: denied { create } for pid=25291 comm="syz.9.4353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3264.337521][ T28] audit: type=1400 audit(3520.252:9453): avc: denied { write } for pid=25335 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.349301][ T28] audit: type=1400 audit(3520.252:9454): avc: denied { open } for pid=25335 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3264.356647][ T28] audit: type=1400 audit(3520.272:9455): avc: denied { search } for pid=25335 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3264.633972][T25030] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3264.647681][T25030] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 3264.664265][T25030] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3264.674565][T25030] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 3264.694565][T25030] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3264.704015][T25030] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 3264.715743][T25030] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3264.736792][T25030] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 3265.962474][T25030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3267.669243][T25030] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3269.222880][ T28] kauditd_printk_skb: 521 callbacks suppressed [ 3269.236887][ T28] audit: type=1400 audit(3525.142:9977): avc: denied { search } for pid=25415 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.239790][ T28] audit: type=1400 audit(3525.152:9978): avc: denied { search } for pid=25415 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.244916][ T28] audit: type=1400 audit(3525.152:9979): avc: denied { search } for pid=25415 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.262891][ T28] audit: type=1400 audit(3525.152:9980): avc: denied { getattr } for pid=25415 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth6.link" dev="tmpfs" ino=207 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3269.263388][ T28] audit: type=1400 audit(3525.152:9981): avc: denied { search } for pid=25415 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.263727][ T28] audit: type=1400 audit(3525.152:9982): avc: denied { search } for pid=25415 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.263939][ T28] audit: type=1400 audit(3525.152:9983): avc: denied { search } for pid=25415 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.264160][ T28] audit: type=1400 audit(3525.152:9984): avc: denied { search } for pid=25415 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.264389][ T28] audit: type=1400 audit(3525.152:9985): avc: denied { remove_name } for pid=25415 comm="rm" name="resolv.conf.eth6.link" dev="tmpfs" ino=207 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3269.264590][ T28] audit: type=1400 audit(3525.152:9986): avc: denied { unlink } for pid=25415 comm="rm" name="resolv.conf.eth6.link" dev="tmpfs" ino=207 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3271.580400][T25030] veth0_vlan: entered promiscuous mode [ 3271.597879][T25030] veth1_vlan: entered promiscuous mode [ 3271.644385][T25030] veth0_macvtap: entered promiscuous mode [ 3271.675961][T25030] veth1_macvtap: entered promiscuous mode [ 3271.835361][T25384] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3271.835866][T25384] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3271.846400][T25384] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3271.846887][T25384] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3272.901339][T25457] faux_driver vkms: [drm] Unknown color mode 256; guessing buffer size. [ 3274.228663][ T28] kauditd_printk_skb: 678 callbacks suppressed [ 3274.229446][ T28] audit: type=1400 audit(3530.142:10665): avc: denied { bind } for pid=25474 comm="syz.1.4366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3274.259256][ T28] audit: type=1400 audit(3530.172:10666): avc: denied { write } for pid=25474 comm="syz.1.4366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3274.261715][ T28] audit: type=1400 audit(3530.182:10667): avc: denied { read } for pid=25474 comm="syz.1.4366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3274.274346][T25477] FAULT_INJECTION: forcing a failure. [ 3274.274346][T25477] name failslab, interval 1, probability 0, space 0, times 0 [ 3274.274951][T25477] CPU: 1 UID: 0 PID: 25477 Comm: syz.9.4367 Tainted: G L syzkaller #0 PREEMPT [ 3274.275096][T25477] Tainted: [L]=SOFTLOCKUP [ 3274.275123][T25477] Hardware name: ARM-Versatile Express [ 3274.275182][T25477] Call trace: [ 3274.275237][T25477] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3274.275367][T25477] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3274.275391][T25477] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3274.275447][T25477] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3274.275522][T25477] r7:00000000 r6:00000000 r5:858eee40 r4:82b17d48 [ 3274.275541][T25477] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3274.275606][T25477] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3274.275689][T25477] r8:00000000 r7:00000000 r6:83001240 r5:00000d40 r4:0000001d [ 3274.275713][T25477] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3274.275774][T25477] [<8052d0bc>] (__kmalloc_noprof) from [<8080ad80>] (tomoyo_encode2+0x64/0xec) [ 3274.275855][T25477] r10:00000fff r9:86256800 r8:00000000 r7:8569c000 r6:84dd29a8 r5:86d3bffc [ 3274.275879][T25477] r4:86d3bfea [ 3274.275899][T25477] [<8080ad1c>] (tomoyo_encode2) from [<8080ae2c>] (tomoyo_encode+0x24/0x30) [ 3274.275977][T25477] r9:86256800 r8:00000000 r7:8569c000 r6:84dd29a8 r5:00001000 r4:86d3bfeb [ 3274.276253][T25477] [<8080ae08>] (tomoyo_encode) from [<8080aeb8>] (tomoyo_realpath_from_path+0x80/0x16c) [ 3274.276350][T25477] r5:00001000 r4:86d3b000 [ 3274.276437][T25477] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3274.276542][T25477] r10:00000000 r9:00000003 r8:84dd2980 r7:40305829 r6:81cda174 r5:00000004 [ 3274.276589][T25477] r4:84dd29a8 r3:828d1400 [ 3274.276614][T25477] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3274.276693][T25477] r10:858eee40 r9:00000003 r8:84dd2980 r7:00000000 r6:00000000 r5:40305829 [ 3274.276724][T25477] r4:84dd2980 [ 3274.276746][T25477] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3274.276832][T25477] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3274.276911][T25477] r7:00000000 r6:40305829 r5:84dd2981 r4:00000000 [ 3274.276934][T25477] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3274.276989][T25477] Exception stack(0xebfbdfa8 to 0xebfbdff0) [ 3274.277092][T25477] dfa0: 00000000 00000000 00000003 40305829 00000000 00000000 [ 3274.277193][T25477] dfc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3274.277245][T25477] dfe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3274.277463][T25477] r10:00000036 r9:858eee40 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3274.277544][T25477] r4:00000000 [ 3274.277617][T25477] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3274.464622][ T28] audit: type=1400 audit(3530.382:10668): avc: denied { map_create } for pid=25478 comm="syz.9.4368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3274.483878][ T28] audit: type=1400 audit(3530.402:10669): avc: denied { create } for pid=25478 comm="syz.9.4368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3274.563334][ T28] audit: type=1400 audit(3530.482:10670): avc: denied { read write } for pid=25478 comm="syz.9.4368" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3274.565341][ T28] audit: type=1400 audit(3530.482:10671): avc: denied { open } for pid=25478 comm="syz.9.4368" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3274.602969][ T28] audit: type=1400 audit(3530.522:10672): avc: denied { ioctl } for pid=25478 comm="syz.9.4368" path="/dev/cuse" dev="devtmpfs" ino=90 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3274.749763][ T28] audit: type=1400 audit(3530.672:10673): avc: denied { write } for pid=25474 comm="syz.1.4366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3274.794407][ T28] audit: type=1400 audit(3530.712:10674): avc: denied { read open } for pid=25481 comm="syz.9.4369" path="net:[4026532665]" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3279.264746][ T28] kauditd_printk_skb: 71 callbacks suppressed [ 3279.265228][ T28] audit: type=1400 audit(3535.182:10744): avc: denied { create } for pid=25510 comm="syz.9.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3279.274018][ T28] audit: type=1400 audit(3535.192:10745): avc: denied { getopt } for pid=25510 comm="syz.9.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3279.318936][ T28] audit: type=1400 audit(3535.232:10746): avc: denied { create } for pid=25510 comm="syz.9.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3279.319310][ T28] audit: type=1400 audit(3535.232:10747): avc: denied { write } for pid=25510 comm="syz.9.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3279.327305][ T28] audit: type=1400 audit(3535.242:10748): avc: denied { read } for pid=25510 comm="syz.9.4377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3279.856012][ T28] audit: type=1400 audit(3535.772:10749): avc: denied { ioctl } for pid=25510 comm="syz.9.4377" path="/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x9370 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3279.964508][ T28] audit: type=1400 audit(3535.882:10750): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3279.966014][ T28] audit: type=1400 audit(3535.882:10751): avc: denied { read write open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3279.967050][ T28] audit: type=1400 audit(3535.882:10752): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3280.045583][ T28] audit: type=1400 audit(3535.962:10753): avc: denied { create } for pid=25515 comm="syz.1.4378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3284.346706][ T28] kauditd_printk_skb: 121 callbacks suppressed [ 3284.347128][ T28] audit: type=1400 audit(3540.262:10875): avc: denied { create } for pid=25567 comm="syz.1.4393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3284.380509][ T28] audit: type=1400 audit(3540.302:10876): avc: denied { write } for pid=25567 comm="syz.1.4393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3284.435665][ T28] audit: type=1400 audit(3540.352:10877): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.437847][ T28] audit: type=1400 audit(3540.352:10878): avc: denied { open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.443748][ T28] audit: type=1400 audit(3540.352:10879): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.594762][ T28] audit: type=1400 audit(3540.512:10880): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.597750][ T28] audit: type=1400 audit(3540.512:10881): avc: denied { open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.610327][ T28] audit: type=1400 audit(3540.512:10882): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.683039][ T28] audit: type=1400 audit(3540.602:10883): avc: denied { read write } for pid=25572 comm="syz.1.4395" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3284.686761][ T28] audit: type=1400 audit(3540.602:10884): avc: denied { open } for pid=25572 comm="syz.1.4395" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3285.559289][T17634] usb 2-1: new full-speed USB device number 35 using dummy_hcd [ 3285.688975][T17634] usb 2-1: device descriptor read/64, error -71 [ 3285.929136][T17634] usb 2-1: new full-speed USB device number 36 using dummy_hcd [ 3286.058946][T17634] usb 2-1: device descriptor read/64, error -71 [ 3286.172047][T17634] usb usb2-port1: attempt power cycle [ 3286.509328][T17634] usb 2-1: new full-speed USB device number 37 using dummy_hcd [ 3286.532898][T17634] usb 2-1: device descriptor read/8, error -71 [ 3286.769567][T17634] usb 2-1: new full-speed USB device number 38 using dummy_hcd [ 3286.791141][T17634] usb 2-1: device descriptor read/8, error -71 [ 3286.899981][T17634] usb usb2-port1: unable to enumerate USB device [ 3290.793962][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 3290.798878][ T28] audit: type=1400 audit(3546.712:10894): avc: denied { read write } for pid=25579 comm="syz.9.4396" name="mouse0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3290.799246][ T28] audit: type=1400 audit(3546.712:10895): avc: denied { open } for pid=25579 comm="syz.9.4396" path="/dev/input/mouse0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3291.308725][ T28] audit: type=1400 audit(3547.222:10896): avc: denied { ioctl } for pid=25579 comm="syz.9.4396" path="/dev/input/mouse0" dev="devtmpfs" ino=729 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3291.340713][ T28] audit: type=1400 audit(3547.262:10897): avc: denied { write } for pid=25579 comm="syz.9.4396" name="protocols" dev="proc" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3291.352637][ T28] audit: type=1400 audit(3547.272:10898): avc: denied { create } for pid=25579 comm="syz.9.4396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3291.575021][ T28] audit: type=1400 audit(3547.492:10899): avc: denied { create } for pid=25584 comm="syz.9.4398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3291.586773][ T28] audit: type=1400 audit(3547.502:10900): avc: denied { write } for pid=25584 comm="syz.9.4398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3291.597815][ T28] audit: type=1400 audit(3547.512:10901): avc: denied { create } for pid=25584 comm="syz.9.4398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3291.811402][ T28] audit: type=1400 audit(3547.732:10902): avc: denied { create } for pid=25588 comm="syz.9.4400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3291.814992][ T28] audit: type=1400 audit(3547.732:10903): avc: denied { ioctl } for pid=25588 comm="syz.9.4400" path="socket:[51737]" dev="sockfs" ino=51737 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3295.807712][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 3295.807982][ T28] audit: type=1400 audit(3551.722:10939): avc: denied { sys_module } for pid=25598 comm="syz.1.4402" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3295.808461][ T28] audit: type=1400 audit(3551.722:10940): avc: denied { module_request } for pid=25598 comm="syz.1.4402" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3295.918013][ T28] audit: type=1400 audit(3551.832:10941): avc: denied { read } for pid=25605 comm="syz.9.4405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3295.932791][ T28] audit: type=1400 audit(3551.852:10942): avc: denied { create } for pid=25598 comm="syz.1.4402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3295.934511][ T28] audit: type=1400 audit(3551.852:10943): avc: denied { write } for pid=25598 comm="syz.1.4402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3295.936943][ T28] audit: type=1400 audit(3551.852:10944): avc: denied { module_request } for pid=25598 comm="syz.1.4402" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3295.952406][ T28] audit: type=1400 audit(3551.872:10945): avc: denied { read } for pid=25605 comm="syz.9.4405" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3295.967746][ T28] audit: type=1400 audit(3551.882:10946): avc: denied { read open } for pid=25605 comm="syz.9.4405" path="net:[4026532665]" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3295.971724][ T28] audit: type=1400 audit(3551.892:10947): avc: denied { create } for pid=25605 comm="syz.9.4405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3295.984365][ T28] audit: type=1400 audit(3551.902:10948): avc: denied { create } for pid=25605 comm="syz.9.4405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3300.859561][T25644] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=359 sclass=netlink_audit_socket pid=25644 comm=syz.1.4416 [ 3300.865734][ T28] kauditd_printk_skb: 100 callbacks suppressed [ 3300.866087][ T28] audit: type=1400 audit(3556.782:11049): avc: denied { read write } for pid=25643 comm="syz.1.4416" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3300.866411][ T28] audit: type=1400 audit(3556.782:11050): avc: denied { open } for pid=25643 comm="syz.1.4416" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3300.903228][ T28] audit: type=1400 audit(3556.822:11051): avc: denied { ioctl } for pid=25643 comm="syz.1.4416" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x8935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3300.930931][ T28] audit: type=1400 audit(3556.852:11052): avc: denied { create } for pid=25643 comm="syz.1.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3300.944447][ T28] audit: type=1400 audit(3556.862:11053): avc: denied { create } for pid=25643 comm="syz.1.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3300.966041][ T28] audit: type=1400 audit(3556.882:11054): avc: denied { write } for pid=25643 comm="syz.1.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3300.989962][ T28] audit: type=1400 audit(3556.902:11055): avc: denied { write } for pid=25643 comm="syz.1.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3301.038081][ T28] audit: type=1400 audit(3556.952:11056): avc: denied { mounton } for pid=25636 comm="syz.9.4414" path="/216/file0" dev="tmpfs" ino=1151 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3301.044978][ T28] audit: type=1400 audit(3556.962:11057): avc: denied { mount } for pid=25636 comm="syz.9.4414" name="/" dev="ramfs" ino=52446 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3301.053882][ T28] audit: type=1400 audit(3556.962:11058): avc: denied { remount } for pid=25636 comm="syz.9.4414" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3301.207994][T25650] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=152 sclass=netlink_audit_socket pid=25650 comm=syz.9.4418 [ 3302.240590][T25665] FAULT_INJECTION: forcing a failure. [ 3302.240590][T25665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3302.240848][T25665] CPU: 1 UID: 0 PID: 25665 Comm: syz.9.4423 Tainted: G L syzkaller #0 PREEMPT [ 3302.240910][T25665] Tainted: [L]=SOFTLOCKUP [ 3302.240922][T25665] Hardware name: ARM-Versatile Express [ 3302.240937][T25665] Call trace: [ 3302.240968][T25665] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3302.241108][T25665] r7:60000113 r6:60000113 r5:8231b914 r4:00000000 [ 3302.241135][T25665] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3302.241172][T25665] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3302.241209][T25665] r7:00000001 r6:00000000 r5:86d4d5c0 r4:82b17d9c [ 3302.241218][T25665] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3302.241256][T25665] [<809ccb70>] (should_fail_ex) from [<8054ef94>] (should_fail_alloc_page+0x68/0x74) [ 3302.241312][T25665] r8:ec94ddbc r7:00000001 r6:00000000 r5:00140cca r4:ec94ddc8 [ 3302.241335][T25665] [<8054ef2c>] (should_fail_alloc_page) from [<80514bb4>] (prepare_alloc_pages+0xf8/0x1b4) [ 3302.241393][T25665] [<80514abc>] (prepare_alloc_pages) from [<8051dc80>] (__alloc_frozen_pages_noprof+0xb0/0x161c) [ 3302.241441][T25665] r10:00000000 r9:86d4d5c0 r8:76e00000 r7:76e00000 r6:00140cca r5:00000000 [ 3302.241465][T25665] r4:ec94deb8 [ 3302.241532][T25665] [<8051dbd0>] (__alloc_frozen_pages_noprof) from [<8051f260>] (__folio_alloc_noprof+0x14/0x6c) [ 3302.241672][T25665] r10:00000040 r9:87480780 r8:76e00000 r7:76e00000 r6:869ede80 r5:00000000 [ 3302.241813][T25665] r4:ec94deb8 [ 3302.242341][T25665] [<8051f24c>] (__folio_alloc_noprof) from [<804e95e0>] (do_anonymous_page+0xf0/0x648) [ 3302.242458][T25665] r5:00000000 r4:ec94deb8 [ 3302.242469][T25665] [<804e94f0>] (do_anonymous_page) from [<804ec4a8>] (handle_mm_fault+0x5bc/0x6b8) [ 3302.242638][T25665] r10:00000040 r9:00000000 r8:00000000 r7:ec94dfb0 r6:76e00008 r5:86d4d5c0 [ 3302.242659][T25665] r4:00001255 [ 3302.243085][T25665] [<804ebeec>] (handle_mm_fault) from [<802330d8>] (do_page_fault+0x21c/0x4d0) [ 3302.243238][T25665] r10:00000002 r9:87480780 r8:00000255 r7:86d4d5c0 r6:00000a07 r5:76e00008 [ 3302.243254][T25665] r4:ec94dfb0 [ 3302.243265][T25665] [<80232ebc>] (do_page_fault) from [<8023355c>] (do_DataAbort+0x38/0xac) [ 3302.243311][T25665] r10:76f00000 r9:00001000 r8:80232ebc r7:ec94dfb0 r6:76e00008 r5:00000a07 [ 3302.243409][T25665] r4:82a1c390 [ 3302.243421][T25665] [<80233524>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 3302.243454][T25665] Exception stack(0xec94dfb0 to 0xec94dff8) [ 3302.243540][T25665] dfa0: 76e00000 00021000 00000000 ffffffff [ 3302.243597][T25665] dfc0: 76e00000 00021000 00100000 00040000 00310000 00001000 76f00000 001cd194 [ 3302.243619][T25665] dfe0: 00000000 76fdecc0 001138a0 001138ec a0000010 ffffffff [ 3302.243648][T25665] r8:828c8044 r7:86d4d5c0 r6:ffffffff r5:a0000010 r4:001138ec [ 3302.244434][T25665] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 3305.925222][ T28] kauditd_printk_skb: 166 callbacks suppressed [ 3305.925559][ T28] audit: type=1400 audit(3561.842:11223): avc: denied { sys_module } for pid=25684 comm="syz.1.4429" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3305.925828][ T28] audit: type=1400 audit(3561.842:11224): avc: denied { ioctl } for pid=25684 comm="syz.1.4429" path="socket:[51876]" dev="sockfs" ino=51876 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3305.926060][ T28] audit: type=1400 audit(3561.842:11225): avc: denied { module_request } for pid=25684 comm="syz.1.4429" kmod="wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3305.960761][ T28] audit: type=1400 audit(3561.872:11226): avc: denied { read } for pid=25697 comm="syz.9.4433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3305.966136][ T28] audit: type=1400 audit(3561.882:11227): avc: denied { module_request } for pid=25684 comm="syz.1.4429" kmod="netdev-wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3306.078719][ T28] audit: type=1400 audit(3561.992:11228): avc: denied { create } for pid=25697 comm="syz.9.4433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3306.302179][ T28] audit: type=1400 audit(3562.222:11229): avc: denied { sys_module } for pid=25684 comm="syz.1.4429" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3306.305281][ T28] audit: type=1400 audit(3562.222:11230): avc: denied { module_request } for pid=25684 comm="syz.1.4429" kmod="wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3306.398824][ T28] audit: type=1400 audit(3562.312:11231): avc: denied { write } for pid=25684 comm="syz.1.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3306.401282][ T28] audit: type=1400 audit(3562.322:11232): avc: denied { read } for pid=25708 comm="syz.9.4434" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3308.281585][T25729] fuse: Unknown parameter 'grou00000000000000000000' [ 3308.832906][T25737] FAULT_INJECTION: forcing a failure. [ 3308.832906][T25737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3308.833600][T25737] CPU: 1 UID: 0 PID: 25737 Comm: syz.1.4444 Tainted: G L syzkaller #0 PREEMPT [ 3308.833958][T25737] Tainted: [L]=SOFTLOCKUP [ 3308.834015][T25737] Hardware name: ARM-Versatile Express [ 3308.834079][T25737] Call trace: [ 3308.834165][T25737] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3308.834363][T25737] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3308.834386][T25737] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3308.834447][T25737] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3308.834513][T25737] r7:00000000 r6:00000000 r5:858eee40 r4:82b4edc8 [ 3308.834529][T25737] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3308.834615][T25737] [<809ccb70>] (should_fail_ex) from [<809ccda8>] (should_fail+0x14/0x18) [ 3308.834690][T25737] r8:00000000 r7:00000000 r6:000000b4 r5:20000180 r4:861336c0 [ 3308.834716][T25737] [<809ccd94>] (should_fail) from [<809ccdc8>] (should_fail_usercopy+0x1c/0x20) [ 3308.834792][T25737] [<809ccdac>] (should_fail_usercopy) from [<809d2d50>] (strncpy_from_user+0x20/0x1b0) [ 3308.834894][T25737] [<809d2d30>] (strncpy_from_user) from [<80590058>] (do_getname+0x4c/0x14c) [ 3308.834982][T25737] r10:861336cc r9:858eee40 r8:00000000 r7:00000000 r6:20000180 r5:825228b8 [ 3308.835002][T25737] r4:861336c0 [ 3308.835021][T25737] [<8059000c>] (do_getname) from [<80595b8c>] (getname_flags+0x14/0x18) [ 3308.835093][T25737] r10:00000142 r9:858eee40 r8:8020029c r7:20000180 r6:ffffff9c r5:ecac9f50 [ 3308.835117][T25737] r4:00000000 r3:00000001 [ 3308.835135][T25737] [<80595b78>] (getname_flags) from [<8057d788>] (do_sys_openat2+0x64/0xf0) [ 3308.835193][T25737] [<8057d724>] (do_sys_openat2) from [<8057db8c>] (sys_openat+0x80/0xd0) [ 3308.835339][T25737] r7:00000142 r6:00000000 r5:20000180 r4:ffffff9c [ 3308.835458][T25737] [<8057db0c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3308.835521][T25737] Exception stack(0xecac9fa8 to 0xecac9ff0) [ 3308.835693][T25737] 9fa0: 00000000 00000000 ffffff9c 20000180 00101001 00000000 [ 3308.835908][T25737] 9fc0: 00000000 00000000 0012ed04 00000142 003462d8 00000000 00000001 76fb50dc [ 3308.835951][T25737] 9fe0: 76fb4e88 76fb4e78 00018bc4 00130300 [ 3308.836093][T25737] r6:0012ed04 r5:00000000 r4:00000000 [ 3311.054490][ T28] kauditd_printk_skb: 164 callbacks suppressed [ 3311.055231][ T28] audit: type=1400 audit(3566.972:11397): avc: denied { read } for pid=25767 comm="syz.9.4454" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3311.069369][ T28] audit: type=1400 audit(3566.982:11398): avc: denied { read open } for pid=25767 comm="syz.9.4454" path="net:[4026532665]" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3311.075248][ T28] audit: type=1400 audit(3566.992:11399): avc: denied { create } for pid=25767 comm="syz.9.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3311.097836][ T28] audit: type=1400 audit(3567.012:11400): avc: denied { create } for pid=25767 comm="syz.9.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3311.103458][ T28] audit: type=1400 audit(3567.022:11401): avc: denied { write } for pid=25767 comm="syz.9.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3311.123134][ T28] audit: type=1400 audit(3567.042:11402): avc: denied { module_request } for pid=25767 comm="syz.9.4454" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3311.297805][ T28] audit: type=1400 audit(3567.212:11403): avc: denied { read } for pid=25767 comm="syz.9.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3311.320861][ T28] audit: type=1400 audit(3567.242:11404): avc: denied { read } for pid=25767 comm="syz.9.4454" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3311.326479][ T28] audit: type=1400 audit(3567.242:11405): avc: denied { open } for pid=25767 comm="syz.9.4454" path="net:[4026532665]" dev="nsfs" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3311.340901][ T28] audit: type=1400 audit(3567.262:11406): avc: denied { create } for pid=25767 comm="syz.9.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3312.541405][T25779] fuse: Unknown parameter 'grou00000000000000000000' [ 3313.994826][T25796] fuse: Unknown parameter 'group_i00000000000000000000' [ 3314.197336][T25798] FAULT_INJECTION: forcing a failure. [ 3314.197336][T25798] name failslab, interval 1, probability 0, space 0, times 0 [ 3314.198031][T25798] CPU: 1 UID: 0 PID: 25798 Comm: syz.1.4463 Tainted: G L syzkaller #0 PREEMPT [ 3314.198233][T25798] Tainted: [L]=SOFTLOCKUP [ 3314.198483][T25798] Hardware name: ARM-Versatile Express [ 3314.198575][T25798] Call trace: [ 3314.198658][T25798] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3314.198868][T25798] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3314.198919][T25798] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3314.199044][T25798] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3314.199283][T25798] r7:00000cc0 r6:00000000 r5:84788000 r4:82b17d48 [ 3314.199406][T25798] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3314.199569][T25798] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3314.199713][T25798] r8:ecda9c9c r7:00000cc0 r6:00000000 r5:00000000 r4:83006840 [ 3314.199765][T25798] [<8054ee98>] (should_failslab) from [<8052c210>] (kmem_cache_alloc_noprof+0x54/0x3b8) [ 3314.199854][T25798] [<8052c1bc>] (kmem_cache_alloc_noprof) from [<81adc9ec>] (mas_alloc_nodes+0xd4/0x10c) [ 3314.199957][T25798] r10:20000000 r9:20ffcfff r8:ecda9c9c r7:20ffd000 r6:00000cc0 r5:00000001 [ 3314.200090][T25798] r4:ecda9c9c [ 3314.200265][T25798] [<81adc918>] (mas_alloc_nodes) from [<81adff38>] (mas_preallocate+0x17c/0x25c) [ 3314.200493][T25798] r7:20ffd000 r6:00000cc0 r5:86a04880 r4:ecda9c9c [ 3314.200527][T25798] [<81adfdbc>] (mas_preallocate) from [<8050e390>] (__split_vma+0x144/0x434) [ 3314.200610][T25798] r6:82e4498c r5:86a04880 r4:860a6680 [ 3314.200716][T25798] [<8050e24c>] (__split_vma) from [<8050e6f4>] (vms_gather_munmap_vmas+0x74/0x4fc) [ 3314.200803][T25798] r10:ecda9f18 r9:87485a40 r8:ecda9df0 r7:00000001 r6:20ffd000 r5:ecda9dac [ 3314.200964][T25798] r4:00000000 [ 3314.201097][T25798] [<8050e680>] (vms_gather_munmap_vmas) from [<805102e8>] (__mmap_region+0x1cc/0xe64) [ 3314.201311][T25798] r10:ecda9f18 r9:87485a40 r8:ecda9f18 r7:00000001 r6:20ffd000 r5:ecda9c9c [ 3314.201461][T25798] r4:00000000 [ 3314.201673][T25798] [<8051011c>] (__mmap_region) from [<80512664>] (mmap_region+0xac/0x1a4) [ 3314.201917][T25798] r10:00000000 r9:002020fb r8:ecda9f18 r7:00001000 r6:20ffd000 r5:84788000 [ 3314.202217][T25798] r4:00000000 [ 3314.202353][T25798] [<805125b8>] (mmap_region) from [<804f5080>] (do_mmap+0x3d8/0x53c) [ 3314.202550][T25798] r9:87485a40 r8:84788000 r7:20ffd000 r6:0700000b r5:00007031 r4:00001000 [ 3314.202663][T25798] [<804f4ca8>] (do_mmap) from [<804bdf58>] (vm_mmap_pgoff+0x128/0x20c) [ 3314.202793][T25798] r10:87485a40 r9:20ffd000 r8:00001000 r7:ecda9f18 r6:00000000 r5:0700000b [ 3314.203013][T25798] r4:00000000 [ 3314.203061][T25798] [<804bde30>] (vm_mmap_pgoff) from [<804f4440>] (ksys_mmap_pgoff+0x48/0xec) [ 3314.203224][T25798] r10:000000c0 r9:84788000 r8:8020029c r7:20ffd000 r6:00001000 r5:0700000b [ 3314.203420][T25798] r4:00007031 [ 3314.203640][T25798] [<804f43f8>] (ksys_mmap_pgoff) from [<804f4500>] (sys_mmap_pgoff+0x1c/0x24) [ 3314.203755][T25798] r8:8020029c r7:000000c0 r6:0012ed04 r5:000000ff r4:00000003 [ 3314.203925][T25798] [<804f44e4>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3314.204144][T25798] Exception stack(0xecda9fa8 to 0xecda9ff0) [ 3314.204477][T25798] 9fa0: 00000003 000000ff 20ffd000 00001000 0700000b 00007031 [ 3314.204560][T25798] 9fc0: 00000003 000000ff 0012ed04 000000c0 003462d8 00000000 00000001 76fb50dc [ 3314.204688][T25798] 9fe0: 76fb4e88 76fb4e78 00018bc4 00130300 [ 3314.859947][T25806] fuse: Unknown parameter 'group_i00000000000000000000' [ 3315.825554][T25816] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4470'. [ 3316.025374][T25820] fuse: Unknown parameter 'group_i00000000000000000000' [ 3316.058697][ T28] kauditd_printk_skb: 172 callbacks suppressed [ 3316.059067][ T28] audit: type=1400 audit(3571.972:11579): avc: denied { write } for pid=25819 comm="syz.1.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3316.122487][ T28] audit: type=1400 audit(3572.042:11580): avc: denied { create } for pid=25819 comm="syz.1.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3316.155942][ T28] audit: type=1400 audit(3572.072:11581): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3316.157259][ T28] audit: type=1400 audit(3572.072:11582): avc: denied { read write open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3316.164621][ T28] audit: type=1400 audit(3572.072:11583): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3316.236362][ T28] audit: type=1400 audit(3572.152:11584): avc: denied { read } for pid=25824 comm="syz.1.4474" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3316.244488][ T28] audit: type=1400 audit(3572.162:11585): avc: denied { open } for pid=25824 comm="syz.1.4474" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3316.256909][ T28] audit: type=1400 audit(3572.172:11586): avc: denied { create } for pid=25824 comm="syz.1.4474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3316.350696][ T28] audit: type=1400 audit(3572.272:11587): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3316.352555][ T28] audit: type=1400 audit(3572.272:11588): avc: denied { read write open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.189946][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 3322.190366][ T28] audit: type=1400 audit(3578.112:11654): avc: denied { unmount } for pid=25030 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3322.210297][ T28] audit: type=1400 audit(3578.132:11655): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.210795][ T28] audit: type=1400 audit(3578.132:11656): avc: denied { read write open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.214831][ T28] audit: type=1400 audit(3578.132:11657): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.279474][ T28] audit: type=1400 audit(3578.192:11658): avc: denied { create } for pid=25862 comm="syz.1.4489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3322.303234][ T28] audit: type=1400 audit(3578.222:11659): avc: denied { create } for pid=25862 comm="syz.1.4489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3322.312956][ T28] audit: type=1400 audit(3578.222:11660): avc: denied { write } for pid=25862 comm="syz.1.4489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3322.313434][ T28] audit: type=1400 audit(3578.232:11661): avc: denied { write } for pid=25862 comm="syz.1.4489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3322.347652][ T28] audit: type=1400 audit(3578.262:11662): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.352209][ T28] audit: type=1400 audit(3578.262:11663): avc: denied { open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.812408][T25870] fuse: Bad value for 'user_id' [ 3322.815025][T25870] fuse: Bad value for 'user_id' [ 3324.269924][T25881] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=25881 comm=syz.1.4496 [ 3326.035672][T25888] fuse: Bad value for 'user_id' [ 3326.036949][T25888] fuse: Bad value for 'user_id' [ 3326.146348][T25890] FAULT_INJECTION: forcing a failure. [ 3326.146348][T25890] name failslab, interval 1, probability 0, space 0, times 0 [ 3326.148146][T25890] CPU: 0 UID: 0 PID: 25890 Comm: syz.9.4499 Tainted: G L syzkaller #0 PREEMPT [ 3326.148289][T25890] Tainted: [L]=SOFTLOCKUP [ 3326.148310][T25890] Hardware name: ARM-Versatile Express [ 3326.148333][T25890] Call trace: [ 3326.148373][T25890] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3326.148476][T25890] r7:60000013 r6:60000013 r5:8231b914 r4:00000000 [ 3326.148493][T25890] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3326.148541][T25890] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3326.148639][T25890] r7:00000000 r6:00000000 r5:86ea1880 r4:82b17d48 [ 3326.148714][T25890] [<8021e334>] (dump_stack) from [<809ccd30>] (should_fail_ex+0x1c0/0x224) [ 3326.148776][T25890] [<809ccb70>] (should_fail_ex) from [<8054ef04>] (should_failslab+0x6c/0x94) [ 3326.148847][T25890] r8:00000000 r7:00000000 r6:830016c0 r5:00000c40 r4:00001000 [ 3326.148864][T25890] [<8054ee98>] (should_failslab) from [<8052d160>] (__kmalloc_noprof+0xa4/0x39c) [ 3326.148917][T25890] [<8052d0bc>] (__kmalloc_noprof) from [<8080ae74>] (tomoyo_realpath_from_path+0x3c/0x16c) [ 3326.148990][T25890] r10:00000000 r9:83810800 r8:00000000 r7:85777dd0 r6:861aa7a8 r5:00001000 [ 3326.149008][T25890] r4:00000000 [ 3326.149051][T25890] [<8080ae38>] (tomoyo_realpath_from_path) from [<80806f3c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3326.149127][T25890] r10:00000000 r9:00000003 r8:861aa780 r7:00000002 r6:81cda174 r5:00000004 [ 3326.149149][T25890] r4:861aa7a8 r3:828d1400 [ 3326.149163][T25890] [<80806e70>] (tomoyo_path_number_perm) from [<8080b890>] (tomoyo_file_ioctl+0x1c/0x20) [ 3326.149228][T25890] r10:86ea1880 r9:00000003 r8:861aa780 r7:20000100 r6:20000100 r5:00000002 [ 3326.149248][T25890] r4:861aa780 [ 3326.149262][T25890] [<8080b874>] (tomoyo_file_ioctl) from [<807b69ec>] (security_file_ioctl+0x80/0x1d4) [ 3326.149315][T25890] [<807b696c>] (security_file_ioctl) from [<8059bf34>] (sys_ioctl+0x4c/0xb5c) [ 3326.149386][T25890] r7:20000100 r6:00000002 r5:861aa781 r4:00000000 [ 3326.149402][T25890] [<8059bee8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3326.149448][T25890] Exception stack(0xed40dfa8 to 0xed40dff0) [ 3326.149485][T25890] dfa0: 00000000 00000000 00000003 00000002 20000100 00000000 [ 3326.149519][T25890] dfc0: 00000000 00000000 0012ed04 00000036 003462d8 00000000 00000001 76fe00dc [ 3326.149546][T25890] dfe0: 76fdfe88 76fdfe78 00018bc4 00130300 [ 3326.149580][T25890] r10:00000036 r9:86ea1880 r8:8020029c r7:00000036 r6:0012ed04 r5:00000000 [ 3326.149599][T25890] r4:00000000 [ 3326.169210][T25890] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3327.332145][ T28] kauditd_printk_skb: 87 callbacks suppressed [ 3327.333968][ T28] audit: type=1400 audit(3583.252:11751): avc: denied { read write } for pid=25030 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3327.336008][ T28] audit: type=1400 audit(3583.252:11752): avc: denied { open } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3327.339149][ T28] audit: type=1400 audit(3583.252:11753): avc: denied { ioctl } for pid=25030 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3327.459808][ T28] audit: type=1400 audit(3583.372:11754): avc: denied { create } for pid=25895 comm="syz.1.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3327.462939][ T28] audit: type=1400 audit(3583.382:11755): avc: denied { bind } for pid=25895 comm="syz.1.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3327.501105][ T28] audit: type=1400 audit(3583.422:11756): avc: denied { read write } for pid=25896 comm="syz.9.4503" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3327.503798][ T28] audit: type=1400 audit(3583.422:11757): avc: denied { open } for pid=25896 comm="syz.9.4503" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3327.514285][ T28] audit: type=1400 audit(3583.432:11758): avc: denied { mounton } for pid=25896 comm="syz.9.4503" path="/257/file0" dev="tmpfs" ino=1370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3327.517160][ T28] audit: type=1400 audit(3583.432:11759): avc: denied { read } for pid=25895 comm="syz.1.4502" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3327.523092][T25898] fuse: Bad value for 'user_id' [ 3327.523441][T25898] fuse: Bad value for 'user_id' [ 3327.548911][ T28] audit: type=1400 audit(3583.462:11760): avc: denied { read open } for pid=25895 comm="syz.1.4502" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3329.661802][T25919] ------------[ cut here ]------------ [ 3329.662300][T25919] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.1.4509/25919 [ 3329.664917][T25919] Modules linked in: [ 3329.665982][T25919] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3329.666943][T25919] CPU: 1 UID: 3327 PID: 25919 Comm: syz.1.4509 Tainted: G L syzkaller #0 PREEMPT [ 3329.668130][T25919] Tainted: [L]=SOFTLOCKUP [ 3329.668317][T25919] Hardware name: ARM-Versatile Express [ 3329.668539][T25919] Call trace: [ 3329.668829][T25919] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 3329.669270][T25919] r7:82a1e6fc r6:00000000 r5:8231b914 r4:00000001 [ 3329.669641][T25919] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 3329.669982][T25919] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 3329.670316][T25919] r7:82a1e6fc r6:00000000 r5:858eee40 r4:82c7bd3c [ 3329.670546][T25919] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 3329.671111][T25919] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 3329.671513][T25919] r7:80265f80 [ 3329.671591][T25919] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 3329.671782][T25919] r3:82a0b544 r2:00000001 r1:823023fc r0:82309cdc [ 3329.671892][T25919] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 3329.672121][T25919] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 3329.672326][T25919] r8:00000009 r7:8230aed8 r6:ed5e9de4 r5:858eee40 r4:00000000 [ 3329.672483][T25919] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 3329.672702][T25919] r10:858ef534 r9:00000000 r8:ed5e9e90 r7:858ef710 r6:00000080 r5:858eee40 [ 3329.672879][T25919] r4:858eee40 [ 3329.672968][T25919] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 3329.673213][T25919] r8:ed5e9e90 r7:858ef710 r6:833e3a40 r5:858eee40 r4:86d54980 [ 3329.673365][T25919] [<802572f8>] (do_exit) from [<80257fa8>] (do_group_exit+0x40/0x8c) [ 3329.673506][T25919] r7:86480fc0 [ 3329.673585][T25919] [<80257f68>] (do_group_exit) from [<80268fd0>] (get_signal+0xa8c/0xab4) [ 3329.673807][T25919] r7:0000000a r4:858eee40 [ 3329.673911][T25919] [<80268544>] (get_signal) from [<8022a648>] (do_work_pending+0x11c/0x4e8) [ 3329.674117][T25919] r10:b5403587 r9:1fffffa0 r8:fffffff2 r7:858ef6ac r6:00000000 r5:ed5e9fb0 [ 3329.674291][T25919] r4:858eee40 [ 3329.674376][T25919] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 3329.674574][T25919] Exception stack(0xed5e9fb0 to 0xed5e9ff8) [ 3329.674715][T25919] 9fa0: 20000380 00000000 200002d0 200002dc [ 3329.674890][T25919] 9fc0: 20000380 00310000 200002d0 00000000 003462d8 00000000 00000001 76fb50dc [ 3329.675085][T25919] 9fe0: 00000000 20000298 0010b4c4 0010b4d0 60000010 ffffffff [ 3329.675277][T25919] r10:00000001 r9:858eee40 r8:00000000 r7:858eee40 r6:ffffffff r5:60000010 [ 3329.675483][T25919] r4:0010b4d0 [ 3329.677868][T25919] Rebooting in 86400 seconds..