last executing test programs: 54.685502216s ago: executing program 1 (id=56): r0 = openat$selinux_context(0xffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$FIOCLEX(r0, 0x5451) (fail_nth: 2) 54.557747887s ago: executing program 1 (id=57): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}]}]}, 0x4c}}, 0x24040015) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb0020416}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x86}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x24004000}, 0x480c1) r6 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1c80c0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) close(r7) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000001340)=ANY=[@ANYBLOB="69af82d6", @ANYRES16=0x0, @ANYBLOB="0000000000000000000016000000"], 0x14}}, 0x200008c0) 53.800433275s ago: executing program 1 (id=58): openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x101000, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000180)={{0x10, 0x54}, {0x3, 0x7}, 0x6, 0x5, 0xf}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r2) r3 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) pipe(&(0x7f00000015c0)={0xffffffffffffffff}) dup3(r3, r4, 0x0) mkdirat(r2, &(0x7f0000000140)='./file0\x00', 0x0) faccessat(r4, &(0x7f0000000280)='./file0\x00', 0x0) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r7, 0x0) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = dup3(r7, r6, 0x0) r9 = accept4(r8, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r9, 0x5421, 0x20000000) sendmsg$NL80211_CMD_NOTIFY_RADAR(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001800)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 53.684948525s ago: executing program 1 (id=59): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') close(r0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$unix(0x1, 0x5, 0x0) dup2(r3, r4) sendmsg$NL80211_CMD_PROBE_CLIENT(r4, &(0x7f0000004180)={0x0, 0x0, &(0x7f0000004140)={&(0x7f00000040c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r5 = openat$cgroup_procs(r1, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 9.562952208s ago: executing program 1 (id=107): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000400)={0x0, 0x4}, 0x4) 9.219592318s ago: executing program 1 (id=117): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xc000, 0x0, 0xfffffffffffffe30, 0x0, 0x0, 0x0) 5.589336872s ago: executing program 0 (id=121): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg2\x00', 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f00000009c0)=0x1234, 0x4) 2.749191135s ago: executing program 0 (id=122): sched_setscheduler(0x0, 0x5, &(0x7f000000d380)) ioprio_set$pid(0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/172, 0xac}], 0x1, 0x0, 0x0) 2.389758767s ago: executing program 0 (id=123): syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x0) io_setup(0x6, &(0x7f0000001380)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/3\x00') io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000100)={0x1000000, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 2.01887446s ago: executing program 0 (id=124): socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000070000100000000000000000007000000", @ANYRES32=r1, @ANYBLOB="0c0001800800010003000100100001800c00048008000200000000001000"], 0x44}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="580000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000800200380012800b0001006272696467650000280002800c002300fbffffffffffffff05002400000000010500240001000000060027"], 0x58}}, 0x0) 938.664296ms ago: executing program 0 (id=125): fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_usb_connect(0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000e518a708ac0501859d200000690109022f00010000000009040000000e010000152403"], 0x0) 0s ago: executing program 0 (id=126): r0 = syz_clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_pidfd_open(r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0xff07) kernel console output (not intermixed with test programs): [ 154.252072][ T31] audit: type=1400 audit(154.180:68): avc: denied { read write } for pid=2996 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 154.254760][ T31] audit: type=1400 audit(154.190:69): avc: denied { open } for pid=2996 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:49870' (ED25519) to the list of known hosts. [ 163.752576][ T31] audit: type=1400 audit(163.680:70): avc: denied { name_bind } for pid=2997 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 166.009483][ T31] audit: type=1400 audit(165.930:71): avc: denied { execute } for pid=2999 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 166.010747][ T31] audit: type=1400 audit(165.940:72): avc: denied { execute_no_trans } for pid=2999 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 168.705356][ T31] audit: type=1400 audit(168.640:73): avc: denied { mounton } for pid=2999 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 168.710777][ T31] audit: type=1400 audit(168.640:74): avc: denied { mount } for pid=2999 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 168.728547][ T2999] cgroup: Unknown subsys name 'net' [ 168.737292][ T31] audit: type=1400 audit(168.670:75): avc: denied { unmount } for pid=2999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 168.997366][ T2999] cgroup: Unknown subsys name 'hugetlb' [ 168.998469][ T2999] cgroup: Unknown subsys name 'rlimit' [ 169.307235][ T31] audit: type=1400 audit(169.240:76): avc: denied { setattr } for pid=2999 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 169.312142][ T31] audit: type=1400 audit(169.240:77): avc: denied { mounton } for pid=2999 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 169.313369][ T31] audit: type=1400 audit(169.240:78): avc: denied { mount } for pid=2999 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 169.518438][ T3001] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 169.520250][ T31] audit: type=1400 audit(169.450:79): avc: denied { relabelto } for pid=3001 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 169.524479][ T31] audit: type=1400 audit(169.460:80): avc: denied { write } for pid=3001 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 169.557406][ T31] audit: type=1400 audit(169.490:81): avc: denied { read } for pid=2999 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 169.562433][ T31] audit: type=1400 audit(169.490:82): avc: denied { open } for pid=2999 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 176.450435][ T2999] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 178.447296][ T31] audit: type=1400 audit(178.380:83): avc: denied { execmem } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 178.519590][ T31] audit: type=1400 audit(178.450:84): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 178.520665][ T31] audit: type=1400 audit(178.450:85): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 178.532171][ T31] audit: type=1400 audit(178.460:86): avc: denied { read } for pid=3004 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 178.533068][ T31] audit: type=1400 audit(178.460:87): avc: denied { open } for pid=3004 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 178.535773][ T31] audit: type=1400 audit(178.470:88): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 178.557068][ T31] audit: type=1400 audit(178.490:89): avc: denied { module_request } for pid=3005 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 178.642532][ T31] audit: type=1400 audit(178.570:90): avc: denied { sys_module } for pid=3004 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 179.365716][ T31] audit: type=1400 audit(179.300:91): avc: denied { ioctl } for pid=3004 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 180.748615][ T3004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.757232][ T3005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.765108][ T3005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.768135][ T3004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.647450][ T3005] hsr_slave_0: entered promiscuous mode [ 181.651106][ T3005] hsr_slave_1: entered promiscuous mode [ 181.843458][ T3004] hsr_slave_0: entered promiscuous mode [ 181.845691][ T3004] hsr_slave_1: entered promiscuous mode [ 181.847527][ T3004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.847983][ T3004] Cannot create hsr debugfs directory [ 181.987943][ T31] audit: type=1400 audit(181.920:92): avc: denied { create } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.996513][ T3005] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 182.025948][ T3005] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 182.038140][ T3005] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 182.049056][ T3005] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 182.217103][ T3004] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 182.236966][ T3004] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 182.248773][ T3004] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 182.259458][ T3004] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 182.891122][ T3005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.016182][ T3004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.089462][ T3004] veth0_vlan: entered promiscuous mode [ 186.128653][ T3005] veth0_vlan: entered promiscuous mode [ 186.137829][ T3004] veth1_vlan: entered promiscuous mode [ 186.170270][ T3005] veth1_vlan: entered promiscuous mode [ 186.225500][ T3004] veth0_macvtap: entered promiscuous mode [ 186.241054][ T3004] veth1_macvtap: entered promiscuous mode [ 186.257070][ T3005] veth0_macvtap: entered promiscuous mode [ 186.270394][ T3005] veth1_macvtap: entered promiscuous mode [ 186.335266][ T3004] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.336021][ T3004] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.336371][ T3004] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.336705][ T3004] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.379507][ T3005] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.379985][ T3005] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.380282][ T3005] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.380554][ T3005] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.477642][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 186.477686][ T31] audit: type=1400 audit(186.410:95): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 186.500114][ T31] audit: type=1400 audit(186.430:96): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/syzkaller.oIANLt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 186.512733][ T31] audit: type=1400 audit(186.440:97): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 186.529476][ T31] audit: type=1400 audit(186.460:98): avc: denied { unmount } for pid=3004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 186.536503][ T31] audit: type=1400 audit(186.470:99): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 186.564517][ T31] audit: type=1400 audit(186.500:100): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 186.722273][ T31] audit: type=1400 audit(186.650:101): avc: denied { read write } for pid=3004 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 186.723425][ T31] audit: type=1400 audit(186.650:102): avc: denied { open } for pid=3004 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 186.724627][ T31] audit: type=1400 audit(186.650:103): avc: denied { ioctl } for pid=3004 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 186.884566][ T3687] FAULT_INJECTION: forcing a failure. [ 186.884566][ T3687] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 186.886028][ T3687] CPU: 1 PID: 3687 Comm: syz.1.2 Not tainted 6.10.0-syzkaller #0 [ 186.886767][ T3687] Hardware name: ARM-Versatile Express [ 186.887299][ T3687] Call trace: [ 186.888685][ T3688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=3688 comm=syz.0.1 [ 186.888310][ T3687] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 186.889805][ T3687] r7:00000000 r6:821d282c r5:60000013 r4:81fe69a4 [ 186.890847][ T3687] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 186.891491][ T3687] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 186.892021][ T3687] r5:00000000 r4:82749c94 [ 186.892267][ T3687] [<81904e6c>] (dump_stack) from [<808ba0e4>] (should_fail_ex+0x18c/0x1dc) [ 186.892625][ T3687] [<808b9f58>] (should_fail_ex) from [<808ba148>] (should_fail+0x14/0x18) [ 186.892986][ T3687] r6:821d282c r5:20000180 r4:82edd000 [ 186.893217][ T3687] [<808ba134>] (should_fail) from [<808ba168>] (should_fail_usercopy+0x1c/0x20) [ 186.893660][ T3687] [<808ba14c>] (should_fail_usercopy) from [<808c01b4>] (strncpy_from_user+0x20/0x194) [ 186.894141][ T3687] [<808c0194>] (strncpy_from_user) from [<805103f8>] (getname_flags.part.0+0x44/0x18c) [ 186.894612][ T3687] r10:0000006b r9:837c8000 r8:8020029c r7:00000000 r6:821d282c r5:20000180 [ 186.895057][ T3687] r4:82edd000 [ 186.895209][ T3687] [<805103b4>] (getname_flags.part.0) from [<80515448>] (getname_flags+0x3c/0x50) [ 186.895657][ T3687] r9:837c8000 r8:8020029c r7:dfe49ec0 r6:00000900 r5:00000000 r4:20000180 [ 186.896122][ T3687] [<8051540c>] (getname_flags) from [<80509038>] (vfs_fstatat+0x44/0xe8) [ 186.896524][ T3687] r5:ffffff9c r4:20000180 [ 186.896940][ T3687] [<80508ff4>] (vfs_fstatat) from [<80509234>] (__do_sys_newlstat+0x4c/0x84) [ 186.897431][ T3687] r8:8020029c r7:0000006b r6:0012e720 r5:00000000 r4:20000180 [ 186.897844][ T3687] [<805091e8>] (__do_sys_newlstat) from [<805093a4>] (sys_newlstat+0x10/0x14) [ 186.898631][ T3687] r5:00000000 r4:00000000 [ 186.898833][ T3687] [<80509394>] (sys_newlstat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 186.899397][ T3687] Exception stack(0xdfe49fa8 to 0xdfe49ff0) [ 186.899818][ T3687] 9fa0: 00000000 00000000 20000180 00000000 00000000 00000000 [ 186.900377][ T3687] 9fc0: 00000000 00000000 0012e720 0000006b 7e8fe766 7e8fe767 003d0f00 76ba00bc [ 186.900754][ T3687] 9fe0: 76b9fec8 76b9feb8 00018444 001306b0 [ 186.910566][ T3688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=3688 comm=syz.0.1 [ 186.920323][ T3688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3688 comm=syz.0.1 [ 186.928016][ T31] audit: type=1400 audit(186.860:104): avc: denied { create } for pid=3686 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 187.081018][ T3694] FAULT_INJECTION: forcing a failure. [ 187.081018][ T3694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.081437][ T3694] CPU: 0 PID: 3694 Comm: syz.1.3 Not tainted 6.10.0-syzkaller #0 [ 187.081889][ T3694] Hardware name: ARM-Versatile Express [ 187.082367][ T3694] Call trace: [ 187.082622][ T3694] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 187.083245][ T3694] r7:20000280 r6:dff25e30 r5:60000013 r4:81fe69a4 [ 187.083537][ T3694] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 187.084123][ T3694] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 187.084726][ T3694] r5:00000000 r4:82749c94 [ 187.085127][ T3694] [<81904e6c>] (dump_stack) from [<808ba0e4>] (should_fail_ex+0x18c/0x1dc) [ 187.085808][ T3694] [<808b9f58>] (should_fail_ex) from [<808ba148>] (should_fail+0x14/0x18) [ 187.086503][ T3694] r6:dff25e30 r5:00000000 r4:dff25f38 [ 187.086871][ T3694] [<808ba134>] (should_fail) from [<808ba168>] (should_fail_usercopy+0x1c/0x20) [ 187.087311][ T3694] [<808ba14c>] (should_fail_usercopy) from [<813dddb8>] (copy_msghdr_from_user+0x50/0x130) [ 187.087770][ T3694] [<813ddd68>] (copy_msghdr_from_user) from [<813ddf10>] (___sys_sendmsg+0x78/0xd0) [ 187.088531][ T3694] r8:00000000 r7:00000000 r6:832f1180 r5:dff25f38 r4:dff25e74 [ 187.088958][ T3694] [<813dde98>] (___sys_sendmsg) from [<813de44c>] (sys_sendmsg+0x78/0xbc) [ 187.089376][ T3694] r10:00000128 r9:84115400 r8:8020029c r7:00000000 r6:20000280 r5:832f1180 [ 187.089915][ T3694] r4:00000000 [ 187.090238][ T3694] [<813de3d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 187.090839][ T3694] Exception stack(0xdff25fa8 to 0xdff25ff0) [ 187.091112][ T3694] 5fa0: 00000000 00000000 00000003 20000280 00000000 00000000 [ 187.091915][ T3694] 5fc0: 00000000 00000000 0012e720 00000128 7e8fe766 7e8fe767 003d0f00 76ba00bc [ 187.092544][ T3694] 5fe0: 76b9fec8 76b9feb8 00018444 001306b0 [ 187.092915][ T3694] r7:00000128 r6:0012e720 r5:00000000 r4:00000000 [ 190.329910][ T3722] could not allocate digest TFM handle cmac(xtea) [ 190.459233][ T3729] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3729 comm=syz.0.13 [ 191.651808][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 191.651900][ T31] audit: type=1400 audit(191.580:137): avc: denied { create } for pid=3740 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 191.661241][ T31] audit: type=1400 audit(191.590:138): avc: denied { ioctl } for pid=3740 comm="syz.0.19" path="socket:[3247]" dev="sockfs" ino=3247 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 191.670759][ T31] audit: type=1400 audit(191.600:139): avc: denied { setopt } for pid=3740 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 191.685775][ T31] audit: type=1400 audit(191.610:140): avc: denied { create } for pid=3740 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 191.686697][ T31] audit: type=1400 audit(191.620:141): avc: denied { write } for pid=3740 comm="syz.0.19" path="socket:[3250]" dev="sockfs" ino=3250 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 191.695379][ T31] audit: type=1400 audit(191.620:142): avc: denied { write } for pid=3740 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 191.928520][ T31] audit: type=1400 audit(191.860:143): avc: denied { write } for pid=3748 comm="syz.0.22" name="arp" dev="proc" ino=4026532672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 191.949714][ T31] audit: type=1400 audit(191.880:144): avc: denied { create } for pid=3748 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 191.953446][ T31] audit: type=1400 audit(191.890:145): avc: denied { write } for pid=3748 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 192.007333][ T31] audit: type=1400 audit(191.940:146): avc: denied { write } for pid=3750 comm="syz.1.23" path="socket:[2239]" dev="sockfs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 194.379911][ T3779] FAULT_INJECTION: forcing a failure. [ 194.379911][ T3779] name failslab, interval 1, probability 0, space 0, times 0 [ 194.380785][ T3779] CPU: 0 PID: 3779 Comm: syz.0.33 Not tainted 6.10.0-syzkaller #0 [ 194.381177][ T3779] Hardware name: ARM-Versatile Express [ 194.381542][ T3779] Call trace: [ 194.381830][ T3779] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 194.382288][ T3779] r7:837c8000 r6:00000dc0 r5:60000013 r4:81fe69a4 [ 194.382593][ T3779] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 194.383000][ T3779] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 194.383389][ T3779] r5:00000000 r4:827160d4 [ 194.383751][ T3779] [<81904e6c>] (dump_stack) from [<808ba0e4>] (should_fail_ex+0x18c/0x1dc) [ 194.384152][ T3779] [<808b9f58>] (should_fail_ex) from [<804d9608>] (__should_failslab+0x6c/0x80) [ 194.384567][ T3779] r6:00000dc0 r5:851d1b40 r4:82c9c600 [ 194.384828][ T3779] [<804d959c>] (__should_failslab) from [<804bc9e0>] (should_failslab+0x10/0x20) [ 194.385450][ T3779] [<804bc9d0>] (should_failslab) from [<804bec5c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 194.387633][ T3779] [<804bec10>] (kmem_cache_alloc_noprof) from [<806e8670>] (security_file_alloc+0x30/0xcc) [ 194.388252][ T3779] r10:00000142 r9:837c8000 r8:82605c00 r7:828bc0c8 r6:851d1b40 r5:851d1b40 [ 194.389251][ T3779] r4:851d1b40 [ 194.389435][ T3779] [<806e8640>] (security_file_alloc) from [<805036f0>] (init_file+0x48/0xd4) [ 194.389819][ T3779] r9:837c8000 r8:82605c00 r7:85068d80 r6:00000002 r5:851d1b40 r4:851d1b40 [ 194.390177][ T3779] [<805036a8>] (init_file) from [<805037f4>] (alloc_empty_file+0x78/0x13c) [ 194.390586][ T3779] r7:85068d80 r6:00000002 r5:851d1b40 r4:821d2810 [ 194.390866][ T3779] [<8050377c>] (alloc_empty_file) from [<80515e18>] (path_openat+0x40/0x115c) [ 194.391430][ T3779] r8:e068de58 r7:e068df20 r6:e068df20 r5:837c8000 r4:82ff0000 [ 194.391813][ T3779] [<80515dd8>] (path_openat) from [<80516fd0>] (do_filp_open+0x9c/0x138) [ 194.394145][ T3779] r10:00000142 r9:837c8000 r8:00000001 r7:e068de58 r6:e068df20 r5:837c8000 [ 194.394566][ T3779] r4:82ff0000 [ 194.395623][ T3779] [<80516f34>] (do_filp_open) from [<804fe308>] (do_sys_openat2+0xbc/0xe4) [ 194.397805][ T3779] r8:8020029c r7:00000004 r6:00000006 r5:e068df58 r4:82ff0000 [ 194.398632][ T3779] [<804fe24c>] (do_sys_openat2) from [<804fe710>] (sys_openat+0x98/0xd4) [ 194.399274][ T3779] r7:00000142 r6:0012e720 r5:20000040 r4:00000004 [ 194.400087][ T3779] [<804fe678>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 194.400599][ T3779] Exception stack(0xe068dfa8 to 0xe068dff0) [ 194.401438][ T3779] dfa0: 00000000 00000000 00000004 20000040 00000002 00000000 [ 194.401893][ T3779] dfc0: 00000000 00000000 0012e720 00000142 7eed8766 7eed8767 003d0f00 76b4f0bc [ 194.402407][ T3779] dfe0: 76b4eec8 76b4eeb8 00018444 001306b0 [ 194.402897][ T3779] r5:00000000 r4:00000000 [ 194.824649][ T3788] FAULT_INJECTION: forcing a failure. [ 194.824649][ T3788] name failslab, interval 1, probability 0, space 0, times 0 [ 194.825244][ T3788] CPU: 0 PID: 3788 Comm: syz.1.36 Not tainted 6.10.0-syzkaller #0 [ 194.825548][ T3788] Hardware name: ARM-Versatile Express [ 194.825759][ T3788] Call trace: [ 194.825877][ T3788] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 194.826097][ T3788] r7:83732400 r6:00000cc0 r5:60000013 r4:81fe69a4 [ 194.826360][ T3788] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 194.826607][ T3788] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 194.826853][ T3788] r5:00000000 r4:827160d4 [ 194.826985][ T3788] [<81904e6c>] (dump_stack) from [<808ba0e4>] (should_fail_ex+0x18c/0x1dc) [ 194.827202][ T3788] [<808b9f58>] (should_fail_ex) from [<804d9608>] (__should_failslab+0x6c/0x80) [ 194.827409][ T3788] r6:00000cc0 r5:00004000 r4:82c026c0 [ 194.827623][ T3788] [<804d959c>] (__should_failslab) from [<804bc9e0>] (should_failslab+0x10/0x20) [ 194.827843][ T3788] [<804bc9d0>] (should_failslab) from [<804be5f0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 194.828243][ T3788] [<804be5a0>] (kmem_cache_alloc_node_noprof) from [<804a53f8>] (alloc_vmap_area+0x37c/0xdc8) [ 194.828616][ T3788] r10:ff800000 r9:00000001 r8:8260cad4 r7:00000000 r6:ff800000 r5:00004000 [ 194.828788][ T3788] r4:851d2d40 [ 194.828881][ T3788] [<804a507c>] (alloc_vmap_area) from [<804a5f0c>] (__get_vm_area_node.constprop.0+0xc8/0x11c) [ 194.829360][ T3788] r10:851d2d40 r9:df800000 r8:00000dc0 r7:ffffffff r6:00000001 r5:00000022 [ 194.829659][ T3788] r4:00004000 [ 194.829782][ T3788] [<804a5e44>] (__get_vm_area_node.constprop.0) from [<804a8b30>] (__vmalloc_node_range_noprof+0x94/0x5a0) [ 194.830149][ T3788] r10:00000000 r9:00000001 r8:ff800000 r7:ffffffff r6:00002284 r5:00000dc0 [ 194.830451][ T3788] r4:81fff574 [ 194.830548][ T3788] [<804a8a9c>] (__vmalloc_node_range_noprof) from [<804a92e0>] (vzalloc_noprof+0x6c/0x74) [ 194.831004][ T3788] r10:851d10c0 r9:8425f280 r8:828effec r7:8387f480 r6:84ed8738 r5:84ed8600 [ 194.831318][ T3788] r4:00000000 [ 194.831554][ T3788] [<804a9274>] (vzalloc_noprof) from [<8098245c>] (n_tty_open+0x18/0xa4) [ 194.831809][ T3788] r4:84ed8600 [ 194.832009][ T3788] [<80982444>] (n_tty_open) from [<80985a8c>] (tty_ldisc_open+0x44/0x88) [ 194.832284][ T3788] r7:8387f480 r6:84ed8738 r5:851d2dc0 r4:84ed8600 [ 194.832539][ T3788] [<80985a48>] (tty_ldisc_open) from [<809863b8>] (tty_ldisc_setup+0x1c/0x5c) [ 194.833302][ T3788] r7:8387f480 r6:84ed8600 r5:84ed9000 r4:84ed8600 [ 194.833642][ T3788] [<8098639c>] (tty_ldisc_setup) from [<8097fcf8>] (tty_init_dev.part.0+0xbc/0x1d0) [ 194.834034][ T3788] r7:8387f480 r6:00000000 r5:00000000 r4:84ed8600 [ 194.834373][ T3788] [<8097fc3c>] (tty_init_dev.part.0) from [<8097fe44>] (tty_init_dev+0x38/0x3c) [ 194.834780][ T3788] r7:821d7d1c r6:8393d858 r5:00000000 r4:8387f480 [ 194.835080][ T3788] [<8097fe0c>] (tty_init_dev) from [<8098a0b8>] (ptmx_open+0xa0/0x16c) [ 194.835421][ T3788] r5:851d10c0 r4:00000000 [ 194.835611][ T3788] [<8098a018>] (ptmx_open) from [<80507c58>] (chrdev_open+0xc0/0x220) [ 194.836012][ T3788] r9:00000004 r8:851d1130 r7:821d7d1c r6:851d10c0 r5:8393d858 r4:828efff4 [ 194.836523][ T3788] [<80507b98>] (chrdev_open) from [<804fbfd0>] (do_dentry_open+0x1e0/0x4d8) [ 194.837051][ T3788] r9:00000004 r8:851d1130 r7:80507b98 r6:8393d858 r5:00000000 r4:851d10c0 [ 194.837772][ T3788] [<804fbdf0>] (do_dentry_open) from [<804fde5c>] (vfs_open+0x2c/0xec) [ 194.838307][ T3788] r9:00000004 r8:e0559e58 r7:e0559f20 r6:851d1130 r5:8271bf24 r4:851d10c0 [ 194.839046][ T3788] [<804fde30>] (vfs_open) from [<805168a8>] (path_openat+0xad0/0x115c) [ 194.839596][ T3788] r6:00000000 r5:8271bf24 r4:00000000 [ 194.839967][ T3788] [<80515dd8>] (path_openat) from [<80516fd0>] (do_filp_open+0x9c/0x138) [ 194.840842][ T3788] r10:00000142 r9:83732400 r8:00000001 r7:e0559e58 r6:e0559f20 r5:83732400 [ 194.841150][ T3788] r4:82ff0000 [ 194.841455][ T3788] [<80516f34>] (do_filp_open) from [<804fe308>] (do_sys_openat2+0xbc/0xe4) [ 194.841796][ T3788] r8:8020029c r7:ffffff9c r6:00000004 r5:e0559f58 r4:82ff0000 [ 194.842106][ T3788] [<804fe24c>] (do_sys_openat2) from [<804fe710>] (sys_openat+0x98/0xd4) [ 194.842458][ T3788] r7:00000142 r6:0012e720 r5:200000c0 r4:ffffff9c [ 194.842724][ T3788] [<804fe678>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 194.843073][ T3788] Exception stack(0xe0559fa8 to 0xe0559ff0) [ 194.843397][ T3788] 9fa0: 00000000 00000000 ffffff9c 200000c0 00000000 00000000 [ 194.843757][ T3788] 9fc0: 00000000 00000000 0012e720 00000142 7e8fe766 7e8fe767 003d0f00 76ba00bc [ 194.844124][ T3788] 9fe0: 76b9fec8 76b9feb8 00018444 001306b0 [ 194.844427][ T3788] r5:00000000 r4:00000000 [ 194.849915][ T3788] syz.1.36: vmalloc error: size 8836, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 194.858545][ T3788] CPU: 0 PID: 3788 Comm: syz.1.36 Not tainted 6.10.0-syzkaller #0 [ 194.859152][ T3788] Hardware name: ARM-Versatile Express [ 194.859702][ T3788] Call trace: [ 194.860193][ T3788] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 194.861624][ T3788] r7:ffffffff r6:81fff53c r5:60000013 r4:81fe69a4 [ 194.862153][ T3788] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 194.862739][ T3788] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 194.863151][ T3788] r5:83732400 r4:00000000 [ 194.863463][ T3788] [<81904e6c>] (dump_stack) from [<804b1aa0>] (warn_alloc+0xd8/0x178) [ 194.863814][ T3788] [<804b19c8>] (warn_alloc) from [<804a8b64>] (__vmalloc_node_range_noprof+0xc8/0x5a0) [ 194.864291][ T3788] r3:00002284 r2:81fff53c [ 194.864601][ T3788] r6:00002284 r5:00000dc0 r4:81fff574 [ 194.864977][ T3788] [<804a8a9c>] (__vmalloc_node_range_noprof) from [<804a92e0>] (vzalloc_noprof+0x6c/0x74) [ 194.865578][ T3788] r10:851d10c0 r9:8425f280 r8:828effec r7:8387f480 r6:84ed8738 r5:84ed8600 [ 194.866150][ T3788] r4:00000000 [ 194.866400][ T3788] [<804a9274>] (vzalloc_noprof) from [<8098245c>] (n_tty_open+0x18/0xa4) [ 194.867289][ T3788] r4:84ed8600 [ 194.867490][ T3788] [<80982444>] (n_tty_open) from [<80985a8c>] (tty_ldisc_open+0x44/0x88) [ 194.868206][ T3788] r7:8387f480 r6:84ed8738 r5:851d2dc0 r4:84ed8600 [ 194.868498][ T3788] [<80985a48>] (tty_ldisc_open) from [<809863b8>] (tty_ldisc_setup+0x1c/0x5c) [ 194.868932][ T3788] r7:8387f480 r6:84ed8600 r5:84ed9000 r4:84ed8600 [ 194.869264][ T3788] [<8098639c>] (tty_ldisc_setup) from [<8097fcf8>] (tty_init_dev.part.0+0xbc/0x1d0) [ 194.869863][ T3788] r7:8387f480 r6:00000000 r5:00000000 r4:84ed8600 [ 194.870269][ T3788] [<8097fc3c>] (tty_init_dev.part.0) from [<8097fe44>] (tty_init_dev+0x38/0x3c) [ 194.870798][ T3788] r7:821d7d1c r6:8393d858 r5:00000000 r4:8387f480 [ 194.871077][ T3788] [<8097fe0c>] (tty_init_dev) from [<8098a0b8>] (ptmx_open+0xa0/0x16c) [ 194.872280][ T3788] r5:851d10c0 r4:00000000 [ 194.872562][ T3788] [<8098a018>] (ptmx_open) from [<80507c58>] (chrdev_open+0xc0/0x220) [ 194.873038][ T3788] r9:00000004 r8:851d1130 r7:821d7d1c r6:851d10c0 r5:8393d858 r4:828efff4 [ 194.873638][ T3788] [<80507b98>] (chrdev_open) from [<804fbfd0>] (do_dentry_open+0x1e0/0x4d8) [ 194.874158][ T3788] r9:00000004 r8:851d1130 r7:80507b98 r6:8393d858 r5:00000000 r4:851d10c0 [ 194.874741][ T3788] [<804fbdf0>] (do_dentry_open) from [<804fde5c>] (vfs_open+0x2c/0xec) [ 194.875285][ T3788] r9:00000004 r8:e0559e58 r7:e0559f20 r6:851d1130 r5:8271bf24 r4:851d10c0 [ 194.875759][ T3788] [<804fde30>] (vfs_open) from [<805168a8>] (path_openat+0xad0/0x115c) [ 194.876315][ T3788] r6:00000000 r5:8271bf24 r4:00000000 [ 194.876690][ T3788] [<80515dd8>] (path_openat) from [<80516fd0>] (do_filp_open+0x9c/0x138) [ 194.877444][ T3788] r10:00000142 r9:83732400 r8:00000001 r7:e0559e58 r6:e0559f20 r5:83732400 [ 194.878202][ T3788] r4:82ff0000 [ 194.878712][ T3788] [<80516f34>] (do_filp_open) from [<804fe308>] (do_sys_openat2+0xbc/0xe4) [ 194.879185][ T3788] r8:8020029c r7:ffffff9c r6:00000004 r5:e0559f58 r4:82ff0000 [ 194.879418][ T3788] [<804fe24c>] (do_sys_openat2) from [<804fe710>] (sys_openat+0x98/0xd4) [ 194.879871][ T3788] r7:00000142 r6:0012e720 r5:200000c0 r4:ffffff9c [ 194.880122][ T3788] [<804fe678>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 194.880617][ T3788] Exception stack(0xe0559fa8 to 0xe0559ff0) [ 194.881194][ T3788] 9fa0: 00000000 00000000 ffffff9c 200000c0 00000000 00000000 [ 194.882300][ T3788] 9fc0: 00000000 00000000 0012e720 00000142 7e8fe766 7e8fe767 003d0f00 76ba00bc [ 194.882858][ T3788] 9fe0: 76b9fec8 76b9feb8 00018444 001306b0 [ 194.883343][ T3788] r5:00000000 r4:00000000 [ 194.912745][ T3788] Mem-Info: [ 194.913599][ T3788] active_anon:1050 inactive_anon:0 isolated_anon:0 [ 194.913599][ T3788] active_file:256 inactive_file:34215 isolated_file:0 [ 194.913599][ T3788] unevictable:768 dirty:44 writeback:0 [ 194.913599][ T3788] slab_reclaimable:960 slab_unreclaimable:5138 [ 194.913599][ T3788] mapped:1704 shmem:808 pagetables:176 [ 194.913599][ T3788] sec_pagetables:0 bounce:0 [ 194.913599][ T3788] kernel_misc_reclaimable:0 [ 194.913599][ T3788] free:445094 free_pcp:1146 free_cma:4032 [ 194.920855][ T3788] Node 0 active_anon:4200kB inactive_anon:0kB active_file:1024kB inactive_file:136860kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:6816kB dirty:176kB writeback:0kB shmem:3232kB writeback_tmp:0kB kernel_stack:1456kB pagetables:704kB sec_pagetables:0kB all_unreclaimable? no [ 194.924545][ T3788] Normal free:1392676kB boost:0kB min:4780kB low:6208kB high:7636kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:584kB unevictable:0kB writepending:136kB present:1556480kB managed:1430116kB mlocked:0kB bounce:0kB free_pcp:4584kB local_pcp:1684kB free_cma:0kB [ 194.932140][ T3788] lowmem_reserve[]: 0 4224 0 [ 194.932759][ T3788] Normal: 3*4kB (UME) 1*8kB (E) 1*16kB (U) 0*32kB 2*64kB (UM) 1*128kB (U) 5*256kB (ME) 5*512kB (M) 6*1024kB (UME) 3*2048kB (ME) 336*4096kB (UM) = 1392676kB [ 194.934898][ T3788] 35279 total pagecache pages [ 194.935232][ T3788] 0 pages in swap cache [ 194.935458][ T3788] Free swap = 124996kB [ 194.935662][ T3788] Total swap = 124996kB [ 194.935974][ T3788] 524288 pages RAM [ 194.936262][ T3788] 135168 pages HighMem/MovableOnly [ 194.936522][ T3788] 31591 pages reserved [ 194.936715][ T3788] 4096 pages cma reserved [ 194.942830][ T3788] ptm ptm0: ldisc open failed (-12), clearing slot 0 [ 196.289013][ T3804] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3804 comm=syz.1.41 [ 196.643648][ T3813] Zero length message leads to an empty skb [ 197.851035][ T3840] FAULT_INJECTION: forcing a failure. [ 197.851035][ T3840] name failslab, interval 1, probability 0, space 0, times 0 [ 197.853340][ T3840] CPU: 1 PID: 3840 Comm: syz.1.56 Not tainted 6.10.0-syzkaller #0 [ 197.853926][ T3840] Hardware name: ARM-Versatile Express [ 197.854319][ T3840] Call trace: [ 197.854630][ T3840] [<818e7540>] (dump_backtrace) from [<818e763c>] (show_stack+0x18/0x1c) [ 197.855360][ T3840] r7:00000d40 r6:851d37f0 r5:60000013 r4:81fe69a4 [ 197.855825][ T3840] [<818e7624>] (show_stack) from [<81904e60>] (dump_stack_lvl+0x70/0x7c) [ 197.856305][ T3840] [<81904df0>] (dump_stack_lvl) from [<81904e84>] (dump_stack+0x18/0x1c) [ 197.857049][ T3840] r5:00000000 r4:827160d4 [ 197.857352][ T3840] [<81904e6c>] (dump_stack) from [<808ba0e4>] (should_fail_ex+0x18c/0x1dc) [ 197.857999][ T3840] [<808b9f58>] (should_fail_ex) from [<804d9608>] (__should_failslab+0x6c/0x80) [ 197.858810][ T3840] r6:851d37f0 r5:0000001d r4:82c01240 [ 197.859188][ T3840] [<804d959c>] (__should_failslab) from [<804bc9e0>] (should_failslab+0x10/0x20) [ 197.859804][ T3840] [<804bc9d0>] (should_failslab) from [<804befe0>] (__kmalloc_noprof+0x9c/0x458) [ 197.863363][ T3840] [<804bef44>] (__kmalloc_noprof) from [<80721508>] (tomoyo_encode2+0x64/0xf0) [ 197.864149][ T3840] r10:00000fff r9:8340ac00 r8:00000000 r7:830086e8 r6:851d37f0 r5:8410affc [ 197.864849][ T3840] r4:8410afea [ 197.865293][ T3840] [<807214a4>] (tomoyo_encode2) from [<807215b8>] (tomoyo_encode+0x24/0x30) [ 197.865865][ T3840] r9:8340ac00 r8:00000000 r7:830086e8 r6:851d37f0 r5:00001000 r4:8410afeb [ 197.866395][ T3840] [<80721594>] (tomoyo_encode) from [<80721644>] (tomoyo_realpath_from_path+0x80/0x17c) [ 197.867005][ T3840] r5:00001000 r4:8410a000 [ 197.867309][ T3840] [<807215c4>] (tomoyo_realpath_from_path) from [<8071d744>] (tomoyo_path_number_perm+0xcc/0x22c) [ 197.868181][ T3840] r10:837c9800 r9:00000000 r8:851d3780 r7:00005451 r6:00000004 r5:81ad0da8 [ 197.868761][ T3840] r4:851d37f0 r3:824b3380 [ 197.869088][ T3840] [<8071d678>] (tomoyo_path_number_perm) from [<80722010>] (tomoyo_file_ioctl+0x1c/0x20) [ 197.869860][ T3840] r9:00000003 r8:851d3780 r7:851d3780 r6:00005451 r5:00000000 r4:821d41e4 [ 197.870443][ T3840] [<80721ff4>] (tomoyo_file_ioctl) from [<806e4fe0>] (security_file_ioctl+0x40/0x5c) [ 197.871017][ T3840] [<806e4fa0>] (security_file_ioctl) from [<8051a814>] (sys_ioctl+0x50/0xda4) [ 197.871807][ T3840] r7:00000000 r6:851d3781 r5:00000000 r4:00005451 [ 197.872349][ T3840] [<8051a7c4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 197.873078][ T3840] Exception stack(0xea889fa8 to 0xea889ff0) [ 197.873713][ T3840] 9fa0: 00000000 00000000 00000003 00005451 00000000 00000000 [ 197.874612][ T3840] 9fc0: 00000000 00000000 0012e720 00000036 7e8fe766 7e8fe767 003d0f00 76ba00bc [ 197.875082][ T3840] 9fe0: 76b9fec8 76b9feb8 00018444 001306b0 [ 197.875449][ T3840] r10:00000036 r9:837c9800 r8:8020029c r7:00000036 r6:0012e720 r5:00000000 [ 197.875990][ T3840] r4:00000000 [ 197.878910][ T3840] ERROR: Out of memory at tomoyo_realpath_from_path. [ 198.628576][ T3842] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 198.830149][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 198.830252][ T31] audit: type=1400 audit(198.760:160): avc: denied { map_create } for pid=3851 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 199.037160][ T31] audit: type=1400 audit(198.970:161): avc: denied { ioctl } for pid=3855 comm="syz.0.61" path="socket:[2595]" dev="sockfs" ino=2595 ioctlcmd=0x3b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 199.498437][ T3864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3864 comm=syz.0.63 [ 200.318111][ T31] audit: type=1400 audit(200.250:162): avc: denied { listen } for pid=3871 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 200.539946][ T31] audit: type=1400 audit(200.470:163): avc: denied { ioctl } for pid=3871 comm="syz.0.66" path="socket:[2634]" dev="sockfs" ino=2634 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 200.559445][ T31] audit: type=1400 audit(200.490:164): avc: denied { getopt } for pid=3871 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 200.767367][ T3877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=3877 comm=syz.0.67 [ 200.843276][ T31] audit: type=1400 audit(200.770:165): avc: denied { mount } for pid=3876 comm="syz.0.67" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 200.845662][ T31] audit: type=1400 audit(200.780:166): avc: denied { bpf } for pid=3876 comm="syz.0.67" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 200.848043][ T31] audit: type=1400 audit(200.780:167): avc: denied { map_read map_write } for pid=3876 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 200.882068][ T31] audit: type=1400 audit(200.810:168): avc: denied { unmount } for pid=3004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 200.937460][ T31] audit: type=1400 audit(200.870:169): avc: denied { create } for pid=3880 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 202.493925][ T3895] can: request_module (can-proto-0) failed. [ 202.608268][ T3898] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 205.653966][ T3684] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 205.843723][ T3684] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 23808, setting to 64 [ 205.844846][ T3684] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 205.845687][ T3684] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 205.846050][ T3684] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 205.855174][ T3684] usb 1-1: config 0 descriptor?? [ 205.874470][ T3684] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 220.357206][ T3683] usb 1-1: USB disconnect, device number 2 [ 220.482732][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 220.482826][ T31] audit: type=1400 audit(220.410:174): avc: denied { ioctl } for pid=3940 comm="syz.0.81" path="socket:[2701]" dev="sockfs" ino=2701 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 221.035649][ T31] audit: type=1400 audit(220.970:175): avc: denied { unmount } for pid=3004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 222.553388][ T3684] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 222.732505][ T3684] usb 1-1: Using ep0 maxpacket: 16 [ 222.760152][ T3684] usb 1-1: New USB device found, idVendor=0582, idProduct=05e6, bcdDevice=4e.00 [ 222.763655][ T3684] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 222.765458][ T3684] usb 1-1: Product: syz [ 222.766318][ T3684] usb 1-1: Manufacturer: syz [ 222.767218][ T3684] usb 1-1: SerialNumber: syz [ 222.772865][ T3684] usb 1-1: config 0 descriptor?? [ 223.232376][ T3684] usb 1-1: USB disconnect, device number 3 [ 223.384308][ T31] audit: type=1400 audit(223.320:176): avc: denied { ioctl } for pid=3981 comm="syz.0.87" path="socket:[2740]" dev="sockfs" ino=2740 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 224.241074][ T31] audit: type=1400 audit(224.170:177): avc: denied { setopt } for pid=3987 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 224.832324][ T31] audit: type=1400 audit(224.760:178): avc: denied { prog_load } for pid=4005 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 225.142984][ T1448] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 225.337974][ T1448] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 225.340838][ T1448] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 225.351253][ T1448] usb 1-1: config 0 descriptor?? [ 225.360150][ T1448] cp210x 1-1:0.0: cp210x converter detected [ 225.728207][ T1448] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -32 [ 225.728726][ T1448] cp210x 1-1:0.0: querying part number failed [ 225.729944][ T31] audit: type=1400 audit(225.660:179): avc: denied { read write } for pid=4005 comm="syz.0.90" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 225.734113][ T1448] usb 1-1: cp210x converter now attached to ttyUSB0 [ 225.739000][ T31] audit: type=1400 audit(225.670:180): avc: denied { open } for pid=4005 comm="syz.0.90" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 225.747459][ T1448] usb 1-1: USB disconnect, device number 4 [ 225.762846][ T1448] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 225.764037][ T1448] cp210x 1-1:0.0: device disconnected [ 226.116524][ T4034] loop0: detected capacity change from 0 to 7 [ 226.512304][ T31] audit: type=1400 audit(226.440:181): avc: denied { setopt } for pid=4044 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 226.587529][ T31] audit: type=1400 audit(226.520:182): avc: denied { create } for pid=4046 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 227.513807][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 227.565495][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 227.648566][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 227.726289][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 227.846959][ C0] vkms_vblank_simulate: vblank timer overrun [ 227.980668][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 227.988442][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 227.992509][ T11] bond0 (unregistering): Released all slaves [ 228.085890][ T11] hsr_slave_0: left promiscuous mode [ 228.093987][ T11] hsr_slave_1: left promiscuous mode [ 228.100504][ T11] veth1_macvtap: left promiscuous mode [ 228.103196][ T11] veth0_macvtap: left promiscuous mode [ 228.103701][ T11] veth1_vlan: left promiscuous mode [ 228.104147][ T11] veth0_vlan: left promiscuous mode [ 229.748529][ T4064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.767339][ T4064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.090922][ T4064] hsr_slave_0: entered promiscuous mode [ 231.094025][ T4064] hsr_slave_1: entered promiscuous mode [ 231.095780][ T4064] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 231.096241][ T4064] Cannot create hsr debugfs directory [ 231.908575][ T4064] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 231.921340][ T4064] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 231.933740][ T4064] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 231.939515][ T4064] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 232.538546][ T4227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.563607][ T4227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.905103][ T4064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.730185][ T4227] hsr_slave_0: entered promiscuous mode [ 233.744229][ T4227] hsr_slave_1: entered promiscuous mode [ 233.745971][ T4227] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 233.746498][ T4227] Cannot create hsr debugfs directory [ 234.026034][ T4227] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.087158][ T4227] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.156571][ T4227] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.229238][ T4227] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.334578][ T4227] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 234.338424][ T4227] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 234.353674][ T4227] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 234.358214][ T4227] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 235.180303][ T4227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.284300][ T4064] veth0_vlan: entered promiscuous mode [ 237.337487][ T4064] veth1_vlan: entered promiscuous mode [ 237.445320][ T4064] veth0_macvtap: entered promiscuous mode [ 237.458931][ T4064] veth1_macvtap: entered promiscuous mode [ 237.525823][ T4064] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.526544][ T4064] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.527044][ T4064] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.527425][ T4064] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.905292][ T31] audit: type=1400 audit(237.830:183): avc: denied { perfmon } for pid=4819 comm="syz.0.110" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 237.971995][ T31] audit: type=1400 audit(237.900:184): avc: denied { prog_run } for pid=4819 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 239.613655][ T31] audit: type=1400 audit(239.540:185): avc: denied { bind } for pid=4841 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 239.632092][ T31] audit: type=1400 audit(239.540:186): avc: denied { name_bind } for pid=4841 comm="syz.0.113" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 239.634742][ T31] audit: type=1400 audit(239.570:187): avc: denied { node_bind } for pid=4841 comm="syz.0.113" saddr=172.20.20.187 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 239.918392][ T31] audit: type=1400 audit(239.850:188): avc: denied { execute } for pid=4844 comm="syz.0.114" name="file0" dev="tmpfs" ino=47 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 239.952232][ T4845] process 'syz.0.114' launched './file0' with NULL argv: empty string added [ 239.958170][ T31] audit: type=1400 audit(239.890:189): avc: denied { execute_no_trans } for pid=4844 comm="syz.0.114" path="/6/file0" dev="tmpfs" ino=47 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 241.672024][ T4227] veth0_vlan: entered promiscuous mode [ 241.687653][ T4227] veth1_vlan: entered promiscuous mode [ 241.959151][ T4227] veth0_macvtap: entered promiscuous mode [ 241.985504][ T4227] veth1_macvtap: entered promiscuous mode [ 242.465460][ T4227] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.466054][ T4227] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.466438][ T4227] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.466847][ T4227] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.404615][ T31] audit: type=1400 audit(246.340:190): avc: denied { map } for pid=4873 comm="syz.0.119" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5256 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 246.405790][ T31] audit: type=1400 audit(246.340:191): avc: denied { read write } for pid=4873 comm="syz.0.119" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5256 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 251.972079][ T10] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 252.162364][ T10] usb 1-1: Using ep0 maxpacket: 8 [ 252.213227][ T10] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 252.218267][ T10] usb 1-1: New USB device found, idVendor=05ac, idProduct=8501, bcdDevice=20.9d [ 252.219040][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=105 [ 252.219565][ T10] usb 1-1: SerialNumber: syz [ 252.223600][ T10] usb 1-1: config 0 descriptor?? [ 252.448686][ T89] usb 1-1: USB disconnect, device number 5 [ 252.683089][ T4909] 8<--- cut here --- [ 252.685446][ T4909] Unable to handle kernel NULL pointer dereference at virtual address 00000008 when read [ 252.694450][ T4909] [00000008] *pgd=85346003, *pmd=fed4c003 [ 252.712533][ T4909] Internal error: Oops: 205 [#1] PREEMPT SMP ARM [ 252.713140][ T4909] Modules linked in: [ 252.713532][ T4909] CPU: 1 PID: 4909 Comm: syz.0.126 Not tainted 6.10.0-syzkaller #0 [ 252.713955][ T4909] Hardware name: ARM-Versatile Express [ 252.714294][ T4909] PC is at path_from_stashed+0x1c/0x308 [ 252.714673][ T4909] LR is at open_namespace+0x44/0xbc [ 252.715071][ T4909] pc : [<8053b05c>] lr : [<8054d800>] psr: 80000013 [ 252.715482][ T4909] sp : dfae5e80 ip : 837dc800 fp : dfae5ec4 [ 252.715808][ T4909] r10: 837dc800 r9 : 00000003 r8 : 84a4d0c0 [ 252.716190][ T4909] r7 : 82caa250 r6 : 837dc800 r5 : 00000000 r4 : 85197bb8 [ 252.716703][ T4909] r3 : dfae5ecc r2 : 00000008 r1 : 82c95800 r0 : 00000008 [ 252.717280][ T4909] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 252.717673][ T4909] Control: 30c5387d Table: 8538edc0 DAC: 00000000 [ 252.718436][ T4909] Register r0 information: non-paged memory [ 252.719133][ T4909] Register r1 information: slab kmalloc-1k start 82c95800 pointer offset 0 size 1024 [ 252.720161][ T4909] Register r2 information: non-paged memory [ 252.720489][ T4909] Register r3 information: 2-page vmalloc region starting at 0xdfae4000 allocated at kernel_clone+0xac/0x3e4 [ 252.721039][ T4909] Register r4 information: slab anon_vma_chain start 85197bb8 pointer offset 0 size 40 [ 252.721792][ T4909] Register r5 information: NULL pointer [ 252.722109][ T4909] Register r6 information: slab task_struct start 837dc800 pointer offset 0 size 3072 [ 252.722743][ T4909] Register r7 information: slab mnt_cache start 82caa240 pointer offset 16 size 184 [ 252.723093][ T4909] Register r8 information: slab filp start 84a4d0c0 pointer offset 0 size 160 [ 252.723399][ T4909] Register r9 information: non-paged memory [ 252.723566][ T4909] Register r10 information: slab task_struct start 837dc800 pointer offset 0 size 3072 [ 252.723855][ T4909] Register r11 information: 2-page vmalloc region starting at 0xdfae4000 allocated at kernel_clone+0xac/0x3e4 [ 252.724247][ T4909] Register r12 information: slab task_struct start 837dc800 pointer offset 0 size 3072 [ 252.724558][ T4909] Process syz.0.126 (pid: 4909, stack limit = 0xdfae4000) [ 252.724969][ T4909] Stack: (0xdfae5e80 to 0xdfae6000) [ 252.725179][ T4909] 5e80: 837da400 00000008 dfae5eb4 dfae5e98 806e6a64 804065ac 00000009 85197bb8 [ 252.725512][ T4909] 5ea0: 00000000 837dc800 837dac80 84a4d0c0 00000003 837dc800 dfae5ef4 dfae5ec8 [ 252.725739][ T4909] 5ec0: 8054d800 8053b04c dfae5ef4 00000000 00000000 8dfedb04 85197bb8 85197bb8 [ 252.725973][ T4909] 5ee0: 837da400 00000008 dfae5f14 dfae5ef8 80552824 8054d7c8 0000ff07 00000000 [ 252.726196][ T4909] 5f00: 84a4d0c1 00000000 dfae5fa4 dfae5f18 8051a8f8 805526ac 837dc800 00000001 [ 252.726494][ T4909] 5f20: ecac8b10 837dc800 dfae5f44 dfae5f38 8190639c 8190626c dfae5f5c dfae5f48 [ 252.726762][ T4909] 5f40: 8024b544 8027aebc 40000000 dfae5fb0 dfae5f84 dfae5f60 80202dd8 8024b500 [ 252.727012][ T4909] 5f60: 8261c90c dfae5fb0 0014ab60 ecac8b10 80202cc0 8dfedb04 dfae5fac 00000000 [ 252.727205][ T4909] 5f80: 00000000 002662dc 00000036 8020029c 837dc800 00000036 00000000 dfae5fa8 [ 252.727613][ T4909] 5fa0: 80200060 8051a7d0 00000000 00000000 00000003 0000ff07 00000000 00000000 [ 252.727920][ T4909] 5fc0: 00000000 00000000 002662dc 00000036 7ef17766 7ef17767 003d0f00 76b420bc [ 252.728169][ T4909] 5fe0: 76b41ec8 76b41eb8 00018444 001306b0 60000010 00000003 00000000 00000000 [ 252.728408][ T4909] Call trace: [ 252.728535][ T4909] [<8053b040>] (path_from_stashed) from [<8054d800>] (open_namespace+0x44/0xbc) [ 252.728887][ T4909] r10:837dc800 r9:00000003 r8:84a4d0c0 r7:837dac80 r6:837dc800 r5:00000000 [ 252.729235][ T4909] r4:85197bb8 [ 252.729358][ T4909] [<8054d7bc>] (open_namespace) from [<80552824>] (pidfd_ioctl+0x184/0x4c4) [ 252.729561][ T4909] r6:00000008 r5:837da400 r4:85197bb8 [ 252.729840][ T4909] [<805526a0>] (pidfd_ioctl) from [<8051a8f8>] (sys_ioctl+0x134/0xda4) [ 252.730270][ T4909] r7:00000000 r6:84a4d0c1 r5:00000000 r4:0000ff07 [ 252.730845][ T4909] [<8051a7c4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 252.731100][ T4909] Exception stack(0xdfae5fa8 to 0xdfae5ff0) [ 252.731556][ T4909] 5fa0: 00000000 00000000 00000003 0000ff07 00000000 00000000 [ 252.732166][ T4909] 5fc0: 00000000 00000000 002662dc 00000036 7ef17766 7ef17767 003d0f00 76b420bc [ 252.735751][ T4909] 5fe0: 76b41ec8 76b41eb8 00018444 001306b0 [ 252.740969][ T4909] r10:00000036 r9:837dc800 r8:8020029c r7:00000036 r6:002662dc r5:00000000 [ 252.742127][ T4909] r4:00000000 [ 252.742601][ T4909] Code: e24dd01c e1a07001 e5911004 ee1dcf70 (e5905000) [ 252.792064][ T4909] ---[ end trace 0000000000000000 ]--- [ 252.792950][ T4909] Kernel panic - not syncing: Fatal exception [ 252.794841][ T4909] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:35:47 Registers: info registers vcpu 0 CPU#0 R00=82c9a418 R01=dddd38c0 R02=00091b94 R03=df80a000 R04=82c9a418 R05=0000001b R06=81b0f9cc R07=0000001c R08=00000001 R09=82eee000 R10=828b298c R11=df801f74 R12=df801f78 R13=df801f60 R14=802c771c R15=808c5c3c PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005227e9 s17=00000000 d08=00000000005227e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00756d6d s33=080027dc d16=080027dc00756d6d s34=01c70800 s35=00028002 d17=0002800201c70800 s36=08000008 s37=00000300 d18=0000030008000008 s38=08031808 s39=bc000800 d19=bc00080008031808 s40=06060114 s41=00000008 d20=0000000806060114 s42=82080001 s43=000201ee d21=000201ee82080001 s44=08100205 s45=000b8003 d22=000b800308100205 s46=03019008 s47=08000b88 d23=08000b8803019008 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=fbc7f43a s53=c1d0b589 d26=c1d0b589fbc7f43a s54=4a5effba s55=287e5d36 d27=287e5d364a5effba s56=177ed609 s57=6cd6c76c d28=6cd6c76c177ed609 s58=79469cf4 s59=91095b81 d29=91095b8179469cf4 s60=af79f791 s61=d81d914a d30=d81d914aaf79f791 s62=a831e9c9 s63=4209cf4c d31=4209cf4ca831e9c9 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=81fe69a4 R02=00000003 R03=80003000 R04=ffedc000 R05=84991800 R06=deffd6e0 R07=f404571f R08=00000001 R09=00000000 R10=827e8f00 R11=dfa2984c R12=ffedc400 R13=dfa29820 R14=00000000 R15=818b96f0 PSR=20000013 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000