last executing test programs: 11.521115446s ago: executing program 1 (id=437): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000001e80)=0x6, 0x4) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r0, &(0x7f00000000c0)="3f03fe7f0300120006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 11.342318578s ago: executing program 1 (id=438): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 11.269424841s ago: executing program 1 (id=439): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x4010e501, 0x0) 11.157204842s ago: executing program 1 (id=441): ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f00000002c0)={0xc}) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP(0xffffffffffffffff, 0x3b85, &(0x7f0000000180)={0x28, 0x7, r1, 0x0, &(0x7f0000000100)='\x00', 0x1, 0x7}) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_UNMAP(0xffffffffffffffff, 0x3b86, &(0x7f0000000240)={0x18, r3, 0x7, 0x7}) 11.065608739s ago: executing program 1 (id=443): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @multicast1}}}}, &(0x7f0000000200)=0xb0) 10.968585397s ago: executing program 1 (id=444): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x7, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.642595932s ago: executing program 0 (id=452): ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f00000002c0)={0xc}) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP(0xffffffffffffffff, 0x3b85, &(0x7f0000000180)={0x28, 0x7, r1, 0x0, &(0x7f0000000100)='\x00', 0x1, 0x7}) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_UNMAP(0xffffffffffffffff, 0x3b86, &(0x7f0000000240)={0x18, r3, 0x7, 0x7}) 3.458377885s ago: executing program 0 (id=453): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc08, 0x3, 0x1e8, 0xc, 0x5002004a, 0xb, 0x310, 0xea02, 0x3d0, 0x3c8, 0x3c8, 0x3d0, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'erspan0\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x248) 3.095571942s ago: executing program 0 (id=454): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000004cc0)=ANY=[@ANYBLOB="140000000101010300"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}, 0x10001}], 0x1, 0x40010000, 0x0) 2.883362611s ago: executing program 0 (id=455): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x6acd) ppoll(&(0x7f0000000000)=[{r0, 0x1444}], 0x1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 210.208892ms ago: executing program 0 (id=456): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x4010e501, 0x0) 0s ago: executing program 0 (id=457): r0 = eventfd2(0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup3(r1, r0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000240)={0x1d, r4, 0x0, {0x0, 0x0, 0x4}}, 0x18) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f000009de80)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x4c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000f00)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r7}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) kernel console output (not intermixed with test programs): [ 47.887820][ T31] audit: type=1400 audit(47.810:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.906072][ T31] audit: type=1400 audit(47.840:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:28821' (ED25519) to the list of known hosts. [ 59.968538][ T31] audit: type=1400 audit(59.910:70): avc: denied { name_bind } for pid=3105 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.916828][ T31] audit: type=1400 audit(61.860:71): avc: denied { execute } for pid=3107 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.918864][ T31] audit: type=1400 audit(61.860:72): avc: denied { execute_no_trans } for pid=3107 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.086238][ T31] audit: type=1400 audit(65.030:73): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.088567][ T31] audit: type=1400 audit(65.030:74): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.100644][ T3107] cgroup: Unknown subsys name 'net' [ 65.107031][ T31] audit: type=1400 audit(65.050:75): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.342896][ T3107] cgroup: Unknown subsys name 'hugetlb' [ 65.343732][ T3107] cgroup: Unknown subsys name 'rlimit' [ 65.583017][ T31] audit: type=1400 audit(65.520:76): avc: denied { setattr } for pid=3107 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.584659][ T31] audit: type=1400 audit(65.520:77): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 65.586655][ T31] audit: type=1400 audit(65.530:78): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 65.716214][ T3109] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 65.717222][ T31] audit: type=1400 audit(65.660:79): avc: denied { relabelto } for pid=3109 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.719409][ T31] audit: type=1400 audit(65.660:80): avc: denied { write } for pid=3109 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 65.742131][ T31] audit: type=1400 audit(65.680:81): avc: denied { read } for pid=3107 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.745580][ T31] audit: type=1400 audit(65.680:82): avc: denied { open } for pid=3107 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.958951][ T3107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.827762][ T31] audit: type=1400 audit(73.770:83): avc: denied { execmem } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 73.895959][ T31] audit: type=1400 audit(73.830:84): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 73.896950][ T31] audit: type=1400 audit(73.830:85): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 73.897627][ T31] audit: type=1400 audit(73.840:86): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.898511][ T31] audit: type=1400 audit(73.840:87): avc: denied { open } for pid=3112 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.913288][ T31] audit: type=1400 audit(73.840:88): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 73.935933][ T31] audit: type=1400 audit(73.870:89): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.022486][ T31] audit: type=1400 audit(73.960:90): avc: denied { sys_module } for pid=3112 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 74.731593][ T31] audit: type=1400 audit(74.670:91): avc: denied { ioctl } for pid=3112 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.718897][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.729083][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.838997][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.843296][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.705824][ T3113] hsr_slave_0: entered promiscuous mode [ 76.707635][ T3113] hsr_slave_1: entered promiscuous mode [ 76.779527][ T3112] hsr_slave_0: entered promiscuous mode [ 76.782256][ T3112] hsr_slave_1: entered promiscuous mode [ 76.783897][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.784329][ T3112] Cannot create hsr debugfs directory [ 76.942078][ T31] audit: type=1400 audit(76.880:92): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.961594][ T3113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.974443][ T3113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.987247][ T3113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.998378][ T3113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.143669][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.150206][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.159911][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.167734][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 77.831687][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.940934][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.650823][ T3112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 80.469317][ T3113] veth0_vlan: entered promiscuous mode [ 80.483259][ T3113] veth1_vlan: entered promiscuous mode [ 80.523588][ T3113] veth0_macvtap: entered promiscuous mode [ 80.541109][ T3113] veth1_macvtap: entered promiscuous mode [ 80.599279][ T3112] veth0_vlan: entered promiscuous mode [ 80.618605][ T3113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.619375][ T3113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.619738][ T3113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.620110][ T3113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.632862][ T3112] veth1_vlan: entered promiscuous mode [ 80.723249][ T3112] veth0_macvtap: entered promiscuous mode [ 80.761643][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 80.761751][ T31] audit: type=1400 audit(80.700:95): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.763907][ T31] audit: type=1400 audit(80.700:96): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.sorxE5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.776790][ T3112] veth1_macvtap: entered promiscuous mode [ 80.783515][ T31] audit: type=1400 audit(80.720:97): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.819294][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.819748][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.820094][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.820423][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.821107][ T31] audit: type=1400 audit(80.760:98): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.832354][ T31] audit: type=1400 audit(80.770:99): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.846266][ T31] audit: type=1400 audit(80.780:100): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.029155][ T31] audit: type=1400 audit(80.970:101): avc: denied { read write } for pid=3112 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 81.030133][ T31] audit: type=1400 audit(80.970:102): avc: denied { open } for pid=3112 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 81.031352][ T31] audit: type=1400 audit(80.970:103): avc: denied { ioctl } for pid=3112 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 81.152190][ T31] audit: type=1400 audit(81.090:104): avc: denied { create } for pid=3793 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 81.181659][ T3795] syz.1.2: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 81.189234][ T3795] CPU: 0 UID: 0 PID: 3795 Comm: syz.1.2 Not tainted 6.11.0-syzkaller #0 [ 81.190094][ T3795] Hardware name: ARM-Versatile Express [ 81.190606][ T3795] Call trace: [ 81.191121][ T3795] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 81.192155][ T3795] r7:ff800000 r6:820273dc r5:60000013 r4:8200e404 [ 81.192413][ T3795] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 81.192678][ T3795] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 81.193200][ T3795] r5:83e8a400 r4:00000000 [ 81.193364][ T3795] [<81984a80>] (dump_stack) from [<804b33ac>] (warn_alloc+0xd8/0x178) [ 81.193648][ T3795] [<804b32d4>] (warn_alloc) from [<804aa570>] (__vmalloc_node_range_noprof+0xcc/0x56c) [ 81.194047][ T3795] r3:20000000 r2:820273dc [ 81.194226][ T3795] r6:00000dc0 r5:00000001 r4:20000000 [ 81.194572][ T3795] [<804aa4a4>] (__vmalloc_node_range_noprof) from [<804617a0>] (__kvmalloc_node_noprof+0xc0/0x110) [ 81.194939][ T3795] r10:dfe51d00 r9:8474d800 r8:8160d5f4 r7:ffffffff r6:00000dc0 r5:20000000 [ 81.195463][ T3795] r4:00000000 [ 81.195752][ T3795] [<804616e0>] (__kvmalloc_node_noprof) from [<8160d5f4>] (xt_alloc_entry_offsets+0x24/0x30) [ 81.196322][ T3795] r8:b5403587 r7:00000000 r6:20000360 r5:8474d840 r4:08000000 [ 81.196593][ T3795] [<8160d5d0>] (xt_alloc_entry_offsets) from [<816c6ddc>] (translate_table+0x70/0x78c) [ 81.197130][ T3795] [<816c6d6c>] (translate_table) from [<816c7f88>] (do_replace+0xe8/0x5a0) [ 81.197588][ T3795] r10:00000126 r9:8474d840 r8:b5403587 r7:00000238 r6:20000360 r5:8474d800 [ 81.197909][ T3795] r4:83ea8000 [ 81.198286][ T3795] [<816c7ea0>] (do_replace) from [<816c8574>] (do_ipt_set_ctl+0x134/0x2a0) [ 81.198558][ T3795] r10:00000126 r9:81456398 r8:00000298 r7:851e4448 r6:dfe51da8 r5:83f60f80 [ 81.198772][ T3795] r4:00000040 [ 81.198978][ T3795] [<816c8440>] (do_ipt_set_ctl) from [<8159aa18>] (nf_setsockopt+0x60/0x7c) [ 81.199248][ T3795] r10:00000126 r9:81456398 r8:00000298 r7:851e4448 r6:83f60f80 r5:816c8440 [ 81.199437][ T3795] r4:827e11a0 [ 81.199549][ T3795] [<8159a9bc>] (nf_setsockopt) from [<816333ec>] (ip_setsockopt+0x88/0x98) [ 81.199784][ T3795] r6:83f60f80 r5:00000298 r4:00000040 [ 81.199949][ T3795] [<81633368>] (ip_setsockopt) from [<81643758>] (tcp_setsockopt+0x3c/0x58) [ 81.200124][ T3795] r6:00000000 r5:851e4000 r4:81633364 [ 81.200427][ T3795] [<81643720>] (tcp_setsockopt) from [<814563d0>] (sock_common_setsockopt+0x38/0x40) [ 81.200794][ T3795] r4:8164371c [ 81.200956][ T3795] [<8145639c>] (sock_common_setsockopt) from [<818703a8>] (smc_setsockopt+0xac/0x3cc) [ 81.201300][ T3795] r4:00000040 [ 81.201459][ T3795] [<81870300>] (smc_setsockopt) from [<8145195c>] (do_sock_setsockopt+0xb0/0x17c) [ 81.201769][ T3795] r9:83e8a400 r8:8020029c r7:00000000 r6:833bcc80 r5:00000000 r4:818702fc [ 81.201943][ T3795] [<814518ac>] (do_sock_setsockopt) from [<81454ef0>] (sys_setsockopt+0x78/0xbc) [ 81.202263][ T3795] r6:833bcc80 r5:00000040 r4:00000000 [ 81.202379][ T3795] [<81454e78>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 81.202667][ T3795] Exception stack(0xdfe51fa8 to 0xdfe51ff0) [ 81.202888][ T3795] 1fa0: 00000298 00000000 00000009 00000000 00000040 20000300 [ 81.203086][ T3795] 1fc0: 00000298 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b6d0bc [ 81.203257][ T3795] 1fe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 81.203428][ T3795] r7:00000126 r6:002862f8 r5:00000000 r4:00000298 [ 81.210337][ T3795] Mem-Info: [ 81.210834][ T3795] active_anon:1066 inactive_anon:0 isolated_anon:0 [ 81.210834][ T3795] active_file:145 inactive_file:34254 isolated_file:0 [ 81.210834][ T3795] unevictable:768 dirty:21 writeback:0 [ 81.210834][ T3795] slab_reclaimable:929 slab_unreclaimable:5046 [ 81.210834][ T3795] mapped:1704 shmem:806 pagetables:197 [ 81.210834][ T3795] sec_pagetables:0 bounce:0 [ 81.210834][ T3795] kernel_misc_reclaimable:0 [ 81.210834][ T3795] free:444279 free_pcp:1005 free_cma:4032 [ 81.212120][ T3795] Node 0 active_anon:4264kB inactive_anon:0kB active_file:580kB inactive_file:137016kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:6816kB dirty:84kB writeback:0kB shmem:3224kB writeback_tmp:0kB kernel_stack:1456kB pagetables:788kB sec_pagetables:0kB all_unreclaimable? no [ 81.212877][ T3795] Normal free:1393708kB boost:0kB min:4776kB low:6204kB high:7632kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:548kB unevictable:0kB writepending:60kB present:1556480kB managed:1430064kB mlocked:0kB bounce:0kB free_pcp:4020kB local_pcp:3148kB free_cma:0kB [ 81.213389][ T3795] lowmem_reserve[]: 0 4224 0 [ 81.213750][ T3795] Normal: 5*4kB (UME) 3*8kB (UM) 4*16kB (UME) 3*32kB (UME) 2*64kB (ME) 2*128kB (UE) 4*256kB (M) 7*512kB (UME) 6*1024kB (UME) 3*2048kB (ME) 336*4096kB (M) = 1393740kB [ 81.220975][ T3795] 35212 total pagecache pages [ 81.221246][ T3795] 0 pages in swap cache [ 81.221408][ T3795] Free swap = 124996kB [ 81.221547][ T3795] Total swap = 124996kB [ 81.221752][ T3795] 524288 pages RAM [ 81.221864][ T3795] 135168 pages HighMem/MovableOnly [ 81.222144][ T3795] 31604 pages reserved [ 81.222296][ T3795] 4096 pages cma reserved [ 85.444649][ T3815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3815 comm=syz.0.6 [ 85.854852][ T3831] FAULT_INJECTION: forcing a failure. [ 85.854852][ T3831] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 85.858104][ T3831] CPU: 1 UID: 0 PID: 3831 Comm: syz.1.12 Not tainted 6.11.0-syzkaller #0 [ 85.859168][ T3831] Hardware name: ARM-Versatile Express [ 85.859744][ T3831] Call trace: [ 85.860865][ T3831] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 85.862626][ T3831] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 85.863068][ T3831] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 85.863499][ T3831] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 85.863907][ T3831] r5:00000000 r4:8274ae84 [ 85.864417][ T3831] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 85.864952][ T3831] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 85.865764][ T3831] r6:00000000 r5:dfe59f68 r4:00000002 [ 85.866124][ T3831] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 85.866509][ T3831] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 85.866961][ T3831] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 85.867875][ T3831] r10:00000001 r9:805b50cc r8:00000002 r7:dfe59f68 r6:0000000f r5:76b6cf30 [ 85.868365][ T3831] r4:841f8000 r3:dfe59e9f [ 85.868704][ T3831] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 85.869504][ T3831] r8:76b6cf30 r7:dfe59f68 r6:841f8000 r5:0000000f r4:8513c000 [ 85.870135][ T3831] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 85.870705][ T3831] r10:00000003 r9:841f8000 r8:8020029c r7:00000000 r6:00000000 r5:8513c000 [ 85.871524][ T3831] r4:8513c003 [ 85.871747][ T3831] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 85.872682][ T3831] r7:00000003 r6:00000005 r5:76b6cf30 r4:0000000f [ 85.873207][ T3831] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 85.874044][ T3831] Exception stack(0xdfe59fa8 to 0xdfe59ff0) [ 85.874447][ T3831] 9fa0: 0000000f 76b6cf30 00000005 76b6cf30 0000000f 00000000 [ 85.874851][ T3831] 9fc0: 0000000f 76b6cf30 00000005 00000003 00000000 00006364 003d0f00 76b6d0bc [ 85.875322][ T3831] 9fe0: 00000158 76b6ced0 000d82e0 00130c74 [ 85.914338][ T3833] alloc_vmap_area: 10 callbacks suppressed [ 85.914441][ T3833] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 85.959158][ T31] audit: type=1400 audit(85.900:113): avc: denied { read } for pid=3834 comm="syz.0.16" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 85.960030][ T31] audit: type=1400 audit(85.900:114): avc: denied { open } for pid=3834 comm="syz.0.16" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 85.963451][ T3835] binder: 3834:3835 ioctl 80049367 20000080 returned -22 [ 85.965557][ T31] audit: type=1400 audit(85.900:115): avc: denied { ioctl } for pid=3834 comm="syz.0.16" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x9367 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 86.097839][ T3840] syz.0.17 uses obsolete (PF_INET,SOCK_PACKET) [ 86.098700][ T31] audit: type=1400 audit(86.040:116): avc: denied { create } for pid=3838 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.112156][ T31] audit: type=1400 audit(86.050:117): avc: denied { create } for pid=3838 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 86.129923][ T31] audit: type=1400 audit(86.070:118): avc: denied { ioctl } for pid=3838 comm="syz.0.17" path="socket:[2265]" dev="sockfs" ino=2265 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.198611][ T31] audit: type=1400 audit(86.140:119): avc: denied { ioctl } for pid=3842 comm="syz.1.19" path="socket:[2273]" dev="sockfs" ino=2273 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.202215][ T31] audit: type=1400 audit(86.140:120): avc: denied { map } for pid=3842 comm="syz.1.19" path="socket:[2273]" dev="sockfs" ino=2273 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.203313][ T31] audit: type=1400 audit(86.140:121): avc: denied { read } for pid=3842 comm="syz.1.19" path="socket:[2273]" dev="sockfs" ino=2273 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.258061][ T3845] FAULT_INJECTION: forcing a failure. [ 86.258061][ T3845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.258693][ T3845] CPU: 0 UID: 3327 PID: 3845 Comm: syz.0.20 Not tainted 6.11.0-syzkaller #0 [ 86.259007][ T3845] Hardware name: ARM-Versatile Express [ 86.259234][ T3845] Call trace: [ 86.259428][ T3845] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 86.259793][ T3845] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 86.260017][ T3845] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 86.260327][ T3845] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 86.260662][ T3845] r5:00000000 r4:8274ae84 [ 86.260859][ T3845] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 86.261196][ T3845] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 86.261509][ T3845] r6:00000000 r5:dfa31f68 r4:00000002 [ 86.261837][ T3845] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 86.262226][ T3845] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 86.262670][ T3845] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 86.263123][ T3845] r10:00000001 r9:805b50cc r8:00000002 r7:dfa31f68 r6:0000000f r5:76b96f30 [ 86.263845][ T3845] r4:841fd400 r3:dfa31e9f [ 86.264180][ T3845] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 86.264558][ T3845] r8:76b96f30 r7:dfa31f68 r6:841fd400 r5:0000000f r4:8441b0c0 [ 86.264902][ T3845] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 86.265600][ T3845] r10:00000003 r9:841fd400 r8:8020029c r7:00000000 r6:00000000 r5:8441b0c0 [ 86.266380][ T3845] r4:8441b0c3 [ 86.267872][ T3845] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 86.270430][ T3845] r7:00000003 r6:00000004 r5:76b96f30 r4:0000000f [ 86.272508][ T3845] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 86.274359][ T3845] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 86.274955][ T3845] 1fa0: 0000000f 76b96f30 00000004 76b96f30 0000000f 00000000 [ 86.275617][ T3845] 1fc0: 0000000f 76b96f30 00000004 00000003 00000000 00006364 003d0f00 76b970bc [ 86.276146][ T3845] 1fe0: 00000158 76b96ed0 000d82e0 00130c74 [ 86.474326][ T3853] FAULT_INJECTION: forcing a failure. [ 86.474326][ T3853] name failslab, interval 1, probability 0, space 0, times 1 [ 86.476296][ T3853] CPU: 0 UID: 0 PID: 3853 Comm: syz.1.23 Not tainted 6.11.0-syzkaller #0 [ 86.476762][ T3853] Hardware name: ARM-Versatile Express [ 86.477023][ T3853] Call trace: [ 86.477252][ T3853] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 86.477993][ T3853] r7:00000c40 r6:8441b3e8 r5:60000013 r4:8200e404 [ 86.478262][ T3853] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 86.478791][ T3853] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 86.479264][ T3853] r5:00000000 r4:8271619c [ 86.479533][ T3853] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 86.479959][ T3853] [<808bf744>] (should_fail_ex) from [<804db268>] (should_failslab+0x6c/0x94) [ 86.480409][ T3853] r6:8441b3e8 r5:00001000 r4:82c016c0 [ 86.480649][ T3853] [<804db1fc>] (should_failslab) from [<804c1018>] (__kmalloc_noprof+0x9c/0x458) [ 86.481218][ T3853] [<804c0f7c>] (__kmalloc_noprof) from [<8072c094>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 86.482031][ T3853] r10:841f8c00 r9:82c9a800 r8:00000000 r7:83127ee0 r6:8441b3e8 r5:00001000 [ 86.482570][ T3853] r4:00000000 [ 86.482855][ T3853] [<8072c058>] (tomoyo_realpath_from_path) from [<807281d8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 86.483927][ T3853] r10:841f8c00 r9:00000000 r8:8441b3c0 r7:00005523 r6:00000004 r5:81ad10a8 [ 86.484663][ T3853] r4:8441b3e8 r3:824b71c0 [ 86.485434][ T3853] [<8072810c>] (tomoyo_path_number_perm) from [<8072caa4>] (tomoyo_file_ioctl+0x1c/0x20) [ 86.486464][ T3853] r9:00000003 r8:8441b3c0 r7:8441b3c0 r6:00005523 r5:00000000 r4:822091e8 [ 86.487221][ T3853] [<8072ca88>] (tomoyo_file_ioctl) from [<806efa58>] (security_file_ioctl+0x40/0x5c) [ 86.488208][ T3853] [<806efa18>] (security_file_ioctl) from [<8052134c>] (sys_ioctl+0x50/0xd94) [ 86.488823][ T3853] r7:00000000 r6:8441b3c1 r5:00000000 r4:00005523 [ 86.489207][ T3853] [<805212fc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 86.489596][ T3853] Exception stack(0xdfabdfa8 to 0xdfabdff0) [ 86.489897][ T3853] dfa0: 00000000 00000000 00000003 00005523 00000000 00000000 [ 86.490293][ T3853] dfc0: 00000000 00000000 00130d50 00000036 00000000 00006364 003d0f00 76b6d0bc [ 86.490723][ T3853] dfe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 86.491082][ T3853] r10:00000036 r9:841f8c00 r8:8020029c r7:00000036 r6:00130d50 r5:00000000 [ 86.491688][ T3853] r4:00000000 [ 86.494156][ T3853] ERROR: Out of memory at tomoyo_realpath_from_path. [ 86.770176][ T3867] FAULT_INJECTION: forcing a failure. [ 86.770176][ T3867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.770978][ T3867] CPU: 0 UID: 0 PID: 3867 Comm: syz.1.30 Not tainted 6.11.0-syzkaller #0 [ 86.771627][ T3867] Hardware name: ARM-Versatile Express [ 86.772140][ T3867] Call trace: [ 86.772410][ T3867] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 86.772821][ T3867] r7:00000000 r6:00000000 r5:60000013 r4:8200e404 [ 86.773084][ T3867] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 86.774460][ T3867] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 86.776649][ T3867] r5:00000000 r4:8274ae84 [ 86.777141][ T3867] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 86.777667][ T3867] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 86.778103][ T3867] r6:00000000 r5:dfa55f68 r4:00000002 [ 86.778328][ T3867] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 86.778703][ T3867] [<808bf938>] (should_fail_usercopy) from [<8054026c>] (simple_read_from_buffer+0x8c/0x134) [ 86.779115][ T3867] [<805401e0>] (simple_read_from_buffer) from [<805b5184>] (proc_fail_nth_read+0xb8/0x100) [ 86.779511][ T3867] r10:00000001 r9:805b50cc r8:00000002 r7:dfa55f68 r6:0000000f r5:76b6cf30 [ 86.779847][ T3867] r4:83e8ec00 r3:dfa55e9f [ 86.780055][ T3867] [<805b50cc>] (proc_fail_nth_read) from [<8050796c>] (vfs_read+0x98/0x324) [ 86.780708][ T3867] r8:76b6cf30 r7:dfa55f68 r6:83e8ec00 r5:0000000f r4:8441b000 [ 86.781082][ T3867] [<805078d4>] (vfs_read) from [<8050861c>] (ksys_read+0x78/0xf8) [ 86.782046][ T3867] r10:00000003 r9:83e8ec00 r8:8020029c r7:00000000 r6:00000000 r5:8441b000 [ 86.782417][ T3867] r4:8441b003 [ 86.782686][ T3867] [<805085a4>] (ksys_read) from [<805086ac>] (sys_read+0x10/0x14) [ 86.783327][ T3867] r7:00000003 r6:00000003 r5:76b6cf30 r4:0000000f [ 86.783604][ T3867] [<8050869c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 86.783979][ T3867] Exception stack(0xdfa55fa8 to 0xdfa55ff0) [ 86.784258][ T3867] 5fa0: 0000000f 76b6cf30 00000003 76b6cf30 0000000f 00000000 [ 86.784615][ T3867] 5fc0: 0000000f 76b6cf30 00000003 00000003 00000000 00006364 003d0f00 76b6d0bc [ 86.784984][ T3867] 5fe0: 00000158 76b6ced0 000d82e0 00130c74 [ 87.156937][ T3875] FAULT_INJECTION: forcing a failure. [ 87.156937][ T3875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.157553][ T3875] CPU: 1 UID: 0 PID: 3875 Comm: syz.1.35 Not tainted 6.11.0-syzkaller #0 [ 87.157847][ T3875] Hardware name: ARM-Versatile Express [ 87.158099][ T3875] Call trace: [ 87.158277][ T3875] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 87.158612][ T3875] r7:20000240 r6:dfb1de30 r5:60000013 r4:8200e404 [ 87.158825][ T3875] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 87.159123][ T3875] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 87.159398][ T3875] r5:00000000 r4:8274ae84 [ 87.159561][ T3875] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 87.159853][ T3875] [<808bf744>] (should_fail_ex) from [<808bf934>] (should_fail+0x14/0x18) [ 87.160216][ T3875] r6:dfb1de30 r5:00000000 r4:dfb1df38 [ 87.160420][ T3875] [<808bf920>] (should_fail) from [<808bf954>] (should_fail_usercopy+0x1c/0x20) [ 87.161111][ T3875] [<808bf938>] (should_fail_usercopy) from [<81455330>] (copy_msghdr_from_user+0x50/0x130) [ 87.161544][ T3875] [<814552e0>] (copy_msghdr_from_user) from [<81455488>] (___sys_sendmsg+0x78/0xd0) [ 87.162115][ T3875] r8:00000000 r7:00000000 r6:8339cf00 r5:dfb1df38 r4:dfb1de74 [ 87.162411][ T3875] [<81455410>] (___sys_sendmsg) from [<814559c4>] (sys_sendmsg+0x78/0xbc) [ 87.162792][ T3875] r10:00000128 r9:83e89800 r8:8020029c r7:00000000 r6:20000240 r5:8339cf00 [ 87.163133][ T3875] r4:00000000 [ 87.163321][ T3875] [<8145594c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 87.163700][ T3875] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 87.163985][ T3875] dfa0: 00000000 00000000 00000004 20000240 00000000 00000000 [ 87.164381][ T3875] dfc0: 00000000 00000000 00130d50 00000128 00000000 00006364 003d0f00 76b6d0bc [ 87.164751][ T3875] dfe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 87.165020][ T3875] r7:00000128 r6:00130d50 r5:00000000 r4:00000000 [ 88.154167][ T3900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3900 comm=syz.1.44 [ 89.196210][ T3918] FAULT_INJECTION: forcing a failure. [ 89.196210][ T3918] name failslab, interval 1, probability 0, space 0, times 0 [ 89.196909][ T3918] CPU: 0 UID: 0 PID: 3918 Comm: syz.1.50 Not tainted 6.11.0-syzkaller #0 [ 89.197243][ T3918] Hardware name: ARM-Versatile Express [ 89.197477][ T3918] Call trace: [ 89.197703][ T3918] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 89.198160][ T3918] r7:841f8000 r6:00000cc0 r5:60000013 r4:8200e404 [ 89.198437][ T3918] [<81966d9c>] (show_stack) from [<81984a74>] (dump_stack_lvl+0x70/0x7c) [ 89.199082][ T3918] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 89.200133][ T3918] r5:00000000 r4:8271619c [ 89.200648][ T3918] [<81984a80>] (dump_stack) from [<808bf8d0>] (should_fail_ex+0x18c/0x1dc) [ 89.201250][ T3918] [<808bf744>] (should_fail_ex) from [<804db268>] (should_failslab+0x6c/0x94) [ 89.201712][ T3918] r6:00000cc0 r5:20000080 r4:82c9fb40 [ 89.201979][ T3918] [<804db1fc>] (should_failslab) from [<804c0c94>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 89.202403][ T3918] [<804c0c48>] (kmem_cache_alloc_noprof) from [<80516d08>] (getname_flags.part.0+0x28/0x18c) [ 89.202864][ T3918] r10:00000015 r9:841f8000 r8:00000000 r7:00000001 r6:8220782c r5:20000080 [ 89.203234][ T3918] r4:20000080 [ 89.203410][ T3918] [<80516ce0>] (getname_flags.part.0) from [<8051bd94>] (getname_flags+0x3c/0x50) [ 89.203863][ T3918] r9:841f8000 r8:00000000 r7:00000000 r6:ffffff9c r5:00000001 r4:20000080 [ 89.204218][ T3918] [<8051bd58>] (getname_flags) from [<8051c2fc>] (user_path_at+0x2c/0x64) [ 89.204686][ T3918] r5:00000001 r4:dfb1df6c [ 89.204901][ T3918] [<8051c2d0>] (user_path_at) from [<80538440>] (sys_mount+0x148/0x260) [ 89.205295][ T3918] r6:85138300 r5:00000000 r4:00000000 [ 89.206076][ T3918] [<805382f8>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 89.207369][ T3918] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 89.207718][ T3918] dfa0: 00000000 00000000 00000000 20000080 200000c0 00000000 [ 89.208208][ T3918] dfc0: 00000000 00000000 00130d50 00000015 00000000 00006364 003d0f00 76b6d0bc [ 89.208644][ T3918] dfe0: 76b6cec0 76b6ceb0 000189d0 00132da0 [ 89.208948][ T3918] r10:00000015 r9:841f8000 r8:8020029c r7:00000015 r6:00130d50 r5:00000000 [ 89.209426][ T3918] r4:00000000 [ 89.858017][ T3935] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 95.991297][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 95.991406][ T31] audit: type=1400 audit(95.930:150): avc: denied { map_create } for pid=3944 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.994421][ T31] audit: type=1400 audit(95.930:151): avc: denied { map_read map_write } for pid=3944 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.023745][ T31] audit: type=1400 audit(95.960:152): avc: denied { prog_run } for pid=3944 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.070505][ T31] audit: type=1400 audit(96.010:153): avc: denied { connect } for pid=3946 comm="syz.0.60" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.072742][ T31] audit: type=1400 audit(96.010:154): avc: denied { write } for pid=3946 comm="syz.0.60" laddr=::1 lport=7 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.785500][ T31] audit: type=1400 audit(98.720:155): avc: denied { create } for pid=3954 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.953514][ T31] audit: type=1400 audit(100.890:156): avc: denied { write } for pid=3960 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 103.780492][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 104.028058][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 104.064037][ T9] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 64, changing to 7 [ 104.069000][ T9] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 104.086971][ T9] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 104.119647][ T9] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 104.120275][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 104.122844][ T9] usb 2-1: Product: syz [ 104.139584][ T9] usb 2-1: Manufacturer: syz [ 104.140220][ T9] usb 2-1: SerialNumber: syz [ 104.160817][ C0] hrtimer: interrupt took 1973040 ns [ 104.412116][ T9] usb 2-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 104.549677][ T31] audit: type=1400 audit(104.490:157): avc: denied { relabelfrom } for pid=3993 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.550170][ T31] audit: type=1400 audit(104.490:158): avc: denied { relabelto } for pid=3993 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 104.564105][ T9] usb 2-1: USB disconnect, device number 2 [ 107.472963][ T31] audit: type=1400 audit(107.410:159): avc: denied { block_suspend } for pid=3975 comm="syz.0.74" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 121.347746][ T31] audit: type=1400 audit(121.290:160): avc: denied { create } for pid=4026 comm="syz.1.80" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 121.351301][ T31] audit: type=1400 audit(121.290:161): avc: denied { ioctl } for pid=4026 comm="syz.1.80" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2509 ioctlcmd=0xaa04 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 125.085793][ T31] audit: type=1400 audit(125.020:162): avc: denied { unlink } for pid=4024 comm="syz.0.79" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 133.549063][ T31] audit: type=1400 audit(133.490:163): avc: denied { setopt } for pid=4038 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 133.552492][ T31] audit: type=1400 audit(133.490:164): avc: denied { write } for pid=4038 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 133.932065][ T31] audit: type=1400 audit(133.870:165): avc: denied { create } for pid=4047 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 133.938127][ T31] audit: type=1400 audit(133.870:166): avc: denied { write } for pid=4047 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 135.520554][ T4065] netlink: 5128 bytes leftover after parsing attributes in process `syz.1.85'. [ 136.360360][ T3778] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 136.578963][ T3778] usb 2-1: config 0 has no interfaces? [ 136.579520][ T3778] usb 2-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 136.580010][ T3778] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 136.607715][ T3778] usb 2-1: config 0 descriptor?? [ 137.992773][ T8] usb 2-1: USB disconnect, device number 3 [ 138.260896][ T31] audit: type=1400 audit(138.200:167): avc: denied { create } for pid=4086 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 138.262375][ T31] audit: type=1400 audit(138.200:168): avc: denied { write } for pid=4086 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 138.277502][ T31] audit: type=1400 audit(138.200:169): avc: denied { nlmsg_write } for pid=4086 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 140.029501][ T31] audit: type=1400 audit(139.970:170): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 141.445113][ T31] audit: type=1400 audit(141.370:171): avc: denied { read } for pid=4109 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 144.713501][ T31] audit: type=1400 audit(144.650:172): avc: denied { name_bind } for pid=4129 comm="syz.0.96" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 148.126826][ T31] audit: type=1400 audit(148.070:173): avc: denied { bind } for pid=4142 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 148.127705][ T31] audit: type=1400 audit(148.070:174): avc: denied { name_bind } for pid=4142 comm="syz.0.100" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 148.128394][ T31] audit: type=1400 audit(148.070:175): avc: denied { node_bind } for pid=4142 comm="syz.0.100" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 150.315044][ T31] audit: type=1400 audit(150.250:176): avc: denied { bind } for pid=4142 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 150.316412][ T31] audit: type=1400 audit(150.250:177): avc: denied { node_bind } for pid=4142 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 150.852675][ T4164] netlink: 12 bytes leftover after parsing attributes in process `syz.0.100'. [ 150.877554][ T4164] input: syz0 as /devices/virtual/input/input4 [ 150.900109][ T31] audit: type=1400 audit(150.820:178): avc: denied { connect } for pid=4142 comm="syz.0.100" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 150.900989][ T31] audit: type=1400 audit(150.840:179): avc: denied { name_connect } for pid=4142 comm="syz.0.100" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 153.060661][ T31] audit: type=1400 audit(153.000:180): avc: denied { create } for pid=4196 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 153.080858][ T31] audit: type=1400 audit(153.020:181): avc: denied { bind } for pid=4196 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 153.097071][ T31] audit: type=1400 audit(153.040:182): avc: denied { write } for pid=4196 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 153.545927][ T31] audit: type=1400 audit(153.480:183): avc: denied { setopt } for pid=4198 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 154.492998][ T31] audit: type=1400 audit(154.430:184): avc: denied { ioctl } for pid=4216 comm="syz.1.111" path="socket:[2705]" dev="sockfs" ino=2705 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.777998][ T31] audit: type=1400 audit(154.700:185): avc: denied { map } for pid=4224 comm="syz.1.112" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 154.779095][ T31] audit: type=1400 audit(154.700:186): avc: denied { read write } for pid=4224 comm="syz.1.112" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 155.896846][ T4236] capability: warning: `syz.1.116' uses deprecated v2 capabilities in a way that may be insecure [ 156.112572][ T31] audit: type=1400 audit(156.050:187): avc: denied { set_context_mgr } for pid=4244 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 156.295902][ T31] audit: type=1400 audit(156.230:188): avc: denied { write } for pid=4248 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 156.586893][ T31] audit: type=1400 audit(156.520:189): avc: denied { create } for pid=4255 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 156.591875][ T31] audit: type=1400 audit(156.530:190): avc: denied { map } for pid=4255 comm="syz.1.123" path="socket:[3640]" dev="sockfs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 156.593081][ T31] audit: type=1400 audit(156.530:191): avc: denied { read } for pid=4255 comm="syz.1.123" path="socket:[3640]" dev="sockfs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 156.719912][ T31] audit: type=1400 audit(156.660:192): avc: denied { shutdown } for pid=4257 comm="syz.1.124" laddr=::ffff:127.0.0.1 lport=59102 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 158.716468][ T4274] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 158.732245][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 158.732355][ T31] audit: type=1400 audit(158.670:195): avc: denied { getopt } for pid=4273 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.107493][ T31] audit: type=1400 audit(159.050:196): avc: denied { bind } for pid=4270 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 159.676063][ T31] audit: type=1400 audit(159.610:197): avc: denied { create } for pid=4278 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 159.768308][ T31] audit: type=1400 audit(159.710:198): avc: denied { name_bind } for pid=4278 comm="syz.0.134" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 159.879117][ T31] audit: type=1400 audit(159.810:199): avc: denied { write } for pid=4278 comm="syz.0.134" path="socket:[2811]" dev="sockfs" ino=2811 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 159.879925][ T31] audit: type=1400 audit(159.810:200): avc: denied { nlmsg_write } for pid=4278 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 160.992144][ T4315] process 'syz.0.141' launched './file0' with NULL argv: empty string added [ 160.994665][ T31] audit: type=1400 audit(160.930:201): avc: denied { execute_no_trans } for pid=4314 comm="syz.0.141" path="/60/file0" dev="tmpfs" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 161.600256][ T48] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 161.823765][ T48] usb 1-1: Using ep0 maxpacket: 8 [ 161.849889][ T48] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 161.850549][ T48] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 161.851422][ T48] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 161.857288][ T48] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 161.860636][ T48] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 161.861753][ T48] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 161.862477][ T48] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 162.124284][ T48] usb 1-1: usb_control_msg returned -32 [ 162.125393][ T48] usbtmc 1-1:16.0: can't read capabilities [ 167.510483][ T31] audit: type=1400 audit(167.450:202): avc: denied { bind } for pid=4336 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 173.577720][ T31] audit: type=1400 audit(173.520:203): avc: denied { create } for pid=4368 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 175.923545][ T3778] usb 1-1: USB disconnect, device number 2 [ 177.021358][ T31] audit: type=1400 audit(176.960:204): avc: denied { bind } for pid=4400 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 178.332508][ T4406] syzkaller0: entered promiscuous mode [ 178.333116][ T4406] syzkaller0: entered allmulticast mode [ 180.270222][ T4441] syz.0.168 (4441): drop_caches: 2 [ 180.272058][ T4441] syz.0.168 (4441): drop_caches: 2 [ 180.622402][ T4454] ======================================================= [ 180.622402][ T4454] WARNING: The mand mount option has been deprecated and [ 180.622402][ T4454] and is ignored by this kernel. Remove the mand [ 180.622402][ T4454] option from the mount to silence this warning. [ 180.622402][ T4454] ======================================================= [ 180.635955][ T31] audit: type=1400 audit(180.560:205): avc: denied { remount } for pid=4453 comm="syz.0.170" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 183.726986][ T4457] netlink: 72 bytes leftover after parsing attributes in process `syz.1.171'. [ 183.883010][ T4465] Zero length message leads to an empty skb [ 186.150513][ T4475] pim6reg1: entered promiscuous mode [ 186.157304][ T4475] pim6reg1: entered allmulticast mode [ 186.210748][ T4475] loop9: detected capacity change from 0 to 7 [ 186.377795][ T31] audit: type=1400 audit(186.320:206): avc: denied { read } for pid=4477 comm="syz.1.178" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 186.381548][ T31] audit: type=1400 audit(186.320:207): avc: denied { open } for pid=4477 comm="syz.1.178" path="/101/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 187.106904][ T3778] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 187.316271][ T3778] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 187.316800][ T3778] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 187.323218][ T3778] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 187.324714][ T3778] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 187.325068][ T3778] usb 2-1: Manufacturer: syz [ 187.334139][ T3778] usb 2-1: config 0 descriptor?? [ 187.469791][ T31] audit: type=1400 audit(187.400:208): avc: denied { ioctl } for pid=4492 comm="syz.0.179" path="socket:[3876]" dev="sockfs" ino=3876 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 187.499228][ T31] audit: type=1400 audit(187.400:209): avc: denied { bind } for pid=4492 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 187.726396][ T3778] rc_core: IR keymap rc-hauppauge not found [ 187.727029][ T3778] Registered IR keymap rc-empty [ 187.735801][ T3778] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 187.737190][ T3778] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input6 [ 187.777281][ T3778] usb 2-1: USB disconnect, device number 4 [ 188.104208][ T31] audit: type=1400 audit(188.030:210): avc: denied { write } for pid=4519 comm="syz.1.181" name="kcm" dev="proc" ino=4026532828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 188.257312][ T31] audit: type=1400 audit(188.180:211): avc: denied { write } for pid=4519 comm="syz.1.181" path="socket:[3888]" dev="sockfs" ino=3888 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 188.266152][ T31] audit: type=1400 audit(188.200:212): avc: denied { ioctl } for pid=4519 comm="syz.1.181" path="socket:[3888]" dev="sockfs" ino=3888 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 188.827390][ T4522] netlink: 'syz.1.182': attribute type 12 has an invalid length. [ 188.858829][ T31] audit: type=1400 audit(188.800:213): avc: denied { create } for pid=4521 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 189.459449][ T4522] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 190.315839][ T31] audit: type=1400 audit(190.250:214): avc: denied { write } for pid=4532 comm="syz.1.187" path="socket:[4107]" dev="sockfs" ino=4107 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 190.391004][ T31] audit: type=1400 audit(190.330:215): avc: denied { mounton } for pid=4532 comm="syz.1.187" path="/proc/239/task" dev="proc" ino=4109 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 190.501857][ T4533] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 193.841052][ T4556] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 198.927111][ T8] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 199.174549][ T8] usb 2-1: Using ep0 maxpacket: 8 [ 199.244472][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 199.250400][ T8] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 199.251073][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 199.298355][ T8] usb 2-1: config 0 descriptor?? [ 199.601055][ T8] iowarrior 2-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 199.872948][ T3792] usb 2-1: USB disconnect, device number 5 [ 199.896404][ T3792] iowarrior 2-1:0.0: I/O-Warror #0 now disconnected [ 200.529250][ T4611] pim6reg: entered allmulticast mode [ 202.033720][ T31] audit: type=1400 audit(201.970:216): avc: denied { map } for pid=4620 comm="syz.1.213" path="/dev/nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.197492][ T31] audit: type=1400 audit(204.140:217): avc: denied { bind } for pid=4633 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 206.876733][ T4559] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 207.063505][ T4559] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 207.089029][ T4559] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 207.089915][ T4559] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 207.090255][ T4559] usb 1-1: Product: syz [ 207.090443][ T4559] usb 1-1: Manufacturer: syz [ 207.090630][ T4559] usb 1-1: SerialNumber: syz [ 207.752888][ T4559] cdc_ncm 1-1:1.0: failed GET_NTB_PARAMETERS [ 207.753577][ T4559] cdc_ncm 1-1:1.0: bind() failure [ 207.786760][ T4559] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 207.787216][ T4559] cdc_ncm 1-1:1.1: bind() failure [ 214.655750][ T9] usb 1-1: USB disconnect, device number 3 [ 217.339229][ T4677] netlink: 4 bytes leftover after parsing attributes in process `syz.0.227'. [ 217.374248][ T4677] netlink: 12 bytes leftover after parsing attributes in process `syz.0.227'. [ 223.233562][ T31] audit: type=1400 audit(223.170:218): avc: denied { write } for pid=4714 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 223.579568][ T4723] mmap: syz.1.248 (4723) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 241.331476][ T31] audit: type=1400 audit(241.270:219): avc: denied { read } for pid=4739 comm="syz.0.254" laddr=::ffff:172.20.20.170 lport=20000 faddr=::ffff:172.20.20.170 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 242.097177][ T4763] netlink: 8 bytes leftover after parsing attributes in process `syz.0.265'. [ 242.097546][ T4763] netlink: 20 bytes leftover after parsing attributes in process `syz.0.265'. [ 242.512837][ T4758] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 243.879625][ T31] audit: type=1400 audit(243.810:220): avc: denied { create } for pid=4787 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 243.893614][ T31] audit: type=1400 audit(243.830:221): avc: denied { connect } for pid=4787 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.216416][ T4786] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 250.312266][ T4802] could not allocate digest TFM handle sha256-arm64 [ 251.703603][ T31] audit: type=1400 audit(251.640:222): avc: denied { connect } for pid=4812 comm="syz.1.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 252.058663][ T4810] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 252.327482][ T4821] netlink: 24 bytes leftover after parsing attributes in process `syz.0.285'. [ 257.190371][ T31] audit: type=1400 audit(257.130:223): avc: denied { nlmsg_read } for pid=4847 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 268.552791][ T31] audit: type=1400 audit(268.480:224): avc: denied { setopt } for pid=4867 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 287.533731][ T31] audit: type=1400 audit(287.470:225): avc: denied { create } for pid=4886 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 287.540472][ T31] audit: type=1400 audit(287.480:226): avc: denied { bind } for pid=4886 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 289.108344][ T4897] netlink: 'syz.0.309': attribute type 29 has an invalid length. [ 289.111970][ T4897] netlink: 'syz.0.309': attribute type 29 has an invalid length. [ 289.114202][ T4897] netlink: 'syz.0.309': attribute type 29 has an invalid length. [ 290.279615][ T4904] netlink: 15 bytes leftover after parsing attributes in process `syz.1.312'. [ 290.339069][ T31] audit: type=1400 audit(290.280:227): avc: denied { listen } for pid=4905 comm="syz.1.313" laddr=::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 290.578539][ T4910] all: renamed from wg1 (while UP) [ 290.655016][ T31] audit: type=1400 audit(290.590:228): avc: denied { name_connect } for pid=4911 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 291.355707][ T4915] *** NOT YET: opcode db *** [ 295.675668][ T31] audit: type=1400 audit(295.610:229): avc: denied { create } for pid=4922 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 304.364071][ T4952] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 304.377192][ T4952] netlink: 32 bytes leftover after parsing attributes in process `syz.0.328'. [ 311.686009][ T31] audit: type=1400 audit(311.620:230): avc: denied { execute } for pid=4962 comm="syz.0.331" path="/dev/nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 311.975822][ T31] audit: type=1326 audit(311.910:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4966 comm="syz.0.333" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x0 [ 315.055506][ T3778] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 315.311039][ T3778] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 315.311391][ T3778] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0xB has an invalid bInterval 255, changing to 11 [ 315.311677][ T3778] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid maxpacket 59391, setting to 1024 [ 315.311933][ T3778] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 315.312134][ T3778] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 315.354495][ T4970] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 315.410171][ T3778] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 315.729387][ T3778] usb 1-1: USB disconnect, device number 4 [ 323.983186][ T5027] netlink: 4 bytes leftover after parsing attributes in process `syz.1.342'. [ 331.682733][ T31] audit: type=1800 audit(331.620:232): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.1.349" name="/" dev="fuse" ino=1 res=0 errno=0 [ 337.384743][ T5059] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00106019, b_size=4096, device vda blocksize: 4096 [ 337.386384][ T5059] grow_buffers: requested out-of-range block 144115188075855872 for device vda [ 337.387155][ T5059] EXT4-fs warning (device vda): ext4_resize_fs:2018: can't read last block, resize aborted [ 337.520814][ T5061] netlink: 288 bytes leftover after parsing attributes in process `syz.0.355'. [ 337.973138][ T5071] netlink: 28 bytes leftover after parsing attributes in process `syz.0.360'. [ 337.973659][ T5071] netlink: 28 bytes leftover after parsing attributes in process `syz.0.360'. [ 356.089631][ T31] audit: type=1400 audit(356.030:233): avc: denied { listen } for pid=5178 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 357.378430][ T31] audit: type=1400 audit(357.320:234): avc: denied { map } for pid=5185 comm="syz.1.402" path="socket:[5045]" dev="sockfs" ino=5045 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 357.384650][ T31] audit: type=1400 audit(357.320:235): avc: denied { read } for pid=5185 comm="syz.1.402" path="socket:[5045]" dev="sockfs" ino=5045 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 366.120268][ T5217] fuse: Bad value for 'fd' [ 366.370455][ T31] audit: type=1400 audit(366.310:236): avc: denied { recv } for pid=3107 comm="syz-executor" saddr=127.0.0.1 src=47932 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 366.417525][ T31] audit: type=1400 audit(366.360:237): avc: denied { recv } for pid=5222 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47932 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 366.644891][ T5227] fuse: Bad value for 'fd' [ 367.562428][ T5243] fuse: Bad value for 'fd' [ 373.497826][ T5302] fuse: root generation should be zero [ 377.278762][ T31] audit: type=1400 audit(377.220:238): avc: denied { read } for pid=5315 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 380.310816][ T5324] netlink: 4 bytes leftover after parsing attributes in process `syz.0.457'. [ 380.321151][ T5324] ------------[ cut here ]------------ [ 380.321728][ T5324] WARNING: CPU: 1 PID: 5324 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 380.322210][ T5324] refcount_t: underflow; use-after-free. [ 380.322484][ T5324] Modules linked in: [ 380.323218][ T5324] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 380.323920][ T5324] CPU: 1 UID: 0 PID: 5324 Comm: syz.0.457 Not tainted 6.11.0-syzkaller #0 [ 380.325934][ T5324] Hardware name: ARM-Versatile Express [ 380.326299][ T5324] Call trace: [ 380.326927][ T5324] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 380.327345][ T5324] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 380.327626][ T5324] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 380.328177][ T5324] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 380.328546][ T5324] r5:00000000 r4:8286ed18 [ 380.328762][ T5324] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 380.329133][ T5324] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 380.329458][ T5324] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 380.329725][ T5324] r7:8081a110 [ 380.329896][ T5324] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 380.330307][ T5324] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 380.330699][ T5324] r8:00000009 r7:8205cdc4 r6:e057d854 r5:841fa400 r4:00000000 [ 380.331028][ T5324] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 380.331654][ T5324] r10:840c0500 r9:0000006c r8:84ec381c r7:00000000 r6:817f4e34 r5:00000002 [ 380.332032][ T5324] r4:8442b240 [ 380.332225][ T5324] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 380.332650][ T5324] [<81467654>] (sk_skb_reason_drop) from [<817f4e34>] (j1939_session_destroy+0x78/0x200) [ 380.333085][ T5324] r9:0000006c r8:84ec381c r7:00000000 r6:840c0550 r5:840c0500 r4:8442b240 [ 380.333415][ T5324] [<817f4dbc>] (j1939_session_destroy) from [<817f8818>] (j1939_cancel_active_session+0x1f0/0x1fc) [ 380.333883][ T5324] r6:84ec3814 r5:840c0504 r4:84ec3810 [ 380.334144][ T5324] [<817f8628>] (j1939_cancel_active_session) from [<817f1b74>] (j1939_netdev_notify+0x108/0x150) [ 380.334592][ T5324] r10:841fa400 r9:00000000 r8:ffffffcd r7:00000001 r6:84ec3000 r5:00000002 [ 380.334942][ T5324] r4:84ec3810 [ 380.335201][ T5324] [<817f1a6c>] (j1939_netdev_notify) from [<802712e0>] (notifier_call_chain+0x74/0x1ac) [ 380.335829][ T5324] r7:00000001 r6:827e7024 r5:827e7044 r4:817f1a6c [ 380.336125][ T5324] [<8027126c>] (notifier_call_chain) from [<802714fc>] (raw_notifier_call_chain+0x20/0x28) [ 380.336570][ T5324] r10:821c86d4 r9:00000000 r8:84f98000 r7:00000001 r6:84f78000 r5:00000002 [ 380.336947][ T5324] r4:e057d9dc [ 380.337147][ T5324] [<802714dc>] (raw_notifier_call_chain) from [<81482564>] (call_netdevice_notifiers_info+0x54/0xa0) [ 380.337609][ T5324] [<81482510>] (call_netdevice_notifiers_info) from [<81482a00>] (dev_close_many+0xfc/0x150) [ 380.338076][ T5324] r6:e057da48 r5:e057d92c r4:84f9811c [ 380.338317][ T5324] [<81482904>] (dev_close_many) from [<8148dd64>] (unregister_netdevice_many_notify+0x194/0x9c0) [ 380.338772][ T5324] r9:00000001 r8:e057da48 r7:84f9811c r6:e057dab0 r5:e057da48 r4:e057d99c [ 380.339129][ T5324] [<8148dbd0>] (unregister_netdevice_many_notify) from [<8149d940>] (rtnl_dellink+0x134/0x354) [ 380.339587][ T5324] r10:00000001 r9:00000000 r8:0000021e r7:84f78000 r6:ffffffff r5:8442b9c0 [ 380.339963][ T5324] r4:84492900 [ 380.340155][ T5324] [<8149d80c>] (rtnl_dellink) from [<8149c088>] (rtnetlink_rcv_msg+0x138/0x334) [ 380.340570][ T5324] r9:00000000 r8:82917218 r7:8442b9c0 r6:82917218 r5:00000001 r4:84492900 [ 380.340944][ T5324] [<8149bf50>] (rtnetlink_rcv_msg) from [<81575e70>] (netlink_rcv_skb+0xc0/0x120) [ 380.341358][ T5324] r10:00000000 r9:00000000 r8:84f78000 r7:00000024 r6:84492900 r5:8149bf50 [ 380.341696][ T5324] r4:8442b9c0 [ 380.341887][ T5324] [<81575db0>] (netlink_rcv_skb) from [<8149aa28>] (rtnetlink_rcv+0x18/0x1c) [ 380.342306][ T5324] r7:8442b9c0 r6:844f6800 r5:00000024 r4:84443c00 [ 380.342592][ T5324] [<8149aa10>] (rtnetlink_rcv) from [<81575658>] (netlink_unicast+0x19c/0x29c) [ 380.343148][ T5324] [<815754bc>] (netlink_unicast) from [<81575934>] (netlink_sendmsg+0x1dc/0x43c) [ 380.343555][ T5324] r9:00000000 r8:00000000 r7:84721400 r6:00000024 r5:8442b9c0 r4:e057df38 [ 380.343909][ T5324] [<81575758>] (netlink_sendmsg) from [<8145253c>] (__sock_sendmsg+0x44/0x78) [ 380.344324][ T5324] r10:00000000 r9:e057ddd4 r8:e057ddd4 r7:00000000 r6:8339cc80 r5:e057df38 [ 380.344672][ T5324] r4:00000000 [ 380.344880][ T5324] [<814524f8>] (__sock_sendmsg) from [<81453540>] (____sys_sendmsg+0x2ac/0x2cc) [ 380.345454][ T5324] r7:00000000 r6:00000000 r5:8339cc80 r4:e057df38 [ 380.345838][ T5324] [<81453294>] (____sys_sendmsg) from [<814554ac>] (___sys_sendmsg+0x9c/0xd0) [ 380.346281][ T5324] r10:e057de34 r9:20000140 r8:00000000 r7:00000000 r6:8339cc80 r5:e057df38 [ 380.346640][ T5324] r4:00000000 [ 380.346843][ T5324] [<81455410>] (___sys_sendmsg) from [<814559c4>] (sys_sendmsg+0x78/0xbc) [ 380.347209][ T5324] r10:00000128 r9:841fa400 r8:8020029c r7:00000000 r6:20000140 r5:8339cc80 [ 380.347546][ T5324] r4:00000000 [ 380.347742][ T5324] [<8145594c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 380.348190][ T5324] Exception stack(0xe057dfa8 to 0xe057dff0) [ 380.348493][ T5324] dfa0: 00000000 00000000 00000006 20000140 00000000 00000000 [ 380.348897][ T5324] dfc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76b970bc [ 380.349275][ T5324] dfe0: 76b96ec0 76b96eb0 000189d0 00132da0 [ 380.349551][ T5324] r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 380.351468][ T5324] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:04:18 Registers: info registers vcpu 0 CPU#0 R00=827b8f38 R01=dddc71c8 R02=dddc71f0 R03=819867e8 R04=0001289c R05=0001289c R06=dddc714c R07=828b2640 R08=dddc71f0 R09=84d76000 R10=dddc7218 R11=df801c74 R12=df801c78 R13=df801c68 R14=8120b224 R15=819867f8 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=60000093 R01=5b92b000 R02=00000001 R03=824ae500 R04=0000000c R05=60000093 R06=82622918 R07=00000000 R08=00000000 R09=841fa400 R10=81ff9234 R11=e057d6b4 R12=e057d6b8 R13=e057d6a8 R14=802bc244 R15=802bf16c PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000