[ 151.864760][ T33] audit: type=1400 audit(1584110881.888:38): avc: denied { watch } for pid=12042 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[[[ 152.516572][ T33] audit: type=1800 audit(1584110882.568:39): pid=11952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 32m ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 152.564614][ T33] audit: type=1800 audit(1584110882.598:40): pid=11952 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 153.373978][ T33] audit: type=1400 audit(1584110883.428:41): avc: denied { map } for pid=12121 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2020/03/13 14:48:17 fuzzer started syzkaller login: [ 167.217075][ T33] audit: type=1400 audit(1584110897.268:42): avc: denied { map } for pid=12134 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/13 14:48:22 dialing manager at 10.128.0.26:41683 2020/03/13 14:48:23 syscalls: 2967 2020/03/13 14:48:23 code coverage: enabled 2020/03/13 14:48:23 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/13 14:48:23 extra coverage: enabled 2020/03/13 14:48:23 setuid sandbox: enabled 2020/03/13 14:48:23 namespace sandbox: enabled 2020/03/13 14:48:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/13 14:48:23 fault injection: enabled 2020/03/13 14:48:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/13 14:48:23 net packet injection: enabled 2020/03/13 14:48:23 net device setup: enabled 2020/03/13 14:48:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/13 14:48:23 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 173.100856][ T33] audit: type=1400 audit(1584110903.148:43): avc: denied { integrity } for pid=12149 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 14:52:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x38}}, 0x0) [ 421.275134][ T33] audit: type=1400 audit(1584111151.328:44): avc: denied { map } for pid=12152 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=103 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 421.892367][T12153] IPVS: ftp: loaded support on port[0] = 21 [ 422.155047][T12153] chnl_net:caif_netlink_parms(): no params data found [ 422.338012][T12153] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.345431][T12153] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.355342][T12153] device bridge_slave_0 entered promiscuous mode [ 422.373903][T12153] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.381183][T12153] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.390979][T12153] device bridge_slave_1 entered promiscuous mode [ 422.449521][T12153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.475443][T12153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.535121][T12153] team0: Port device team_slave_0 added [ 422.552904][T12153] team0: Port device team_slave_1 added [ 422.605822][T12153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.613003][T12153] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.639167][T12153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.659747][T12153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.667111][T12153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.693354][T12153] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.901867][T12153] device hsr_slave_0 entered promiscuous mode [ 423.043249][T12153] device hsr_slave_1 entered promiscuous mode [ 423.507566][ T33] audit: type=1400 audit(1584111153.558:45): avc: denied { create } for pid=12153 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 423.519287][T12153] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 423.532760][ T33] audit: type=1400 audit(1584111153.558:46): avc: denied { write } for pid=12153 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 423.564180][ T33] audit: type=1400 audit(1584111153.558:47): avc: denied { read } for pid=12153 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 423.625555][T12153] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 423.705945][T12153] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 423.925633][T12153] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 424.328285][T12153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.373688][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.383461][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.413314][T12153] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.441289][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.452455][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.462328][ T3924] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.469687][ T3924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.485142][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.507182][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.517432][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.527339][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.534540][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.592195][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 424.603619][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 424.615542][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 424.626869][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 424.642345][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 424.662805][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 424.673094][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 424.704960][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.714662][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 424.745076][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 424.754676][ T3924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 424.768018][T12153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 424.845863][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 424.853722][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 424.899604][T12153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 424.986423][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 424.996911][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.074819][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 425.085254][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.115470][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.125609][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.136807][T12153] device veth0_vlan entered promiscuous mode [ 425.184074][T12153] device veth1_vlan entered promiscuous mode [ 425.275163][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 425.285601][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 425.320208][T12153] device veth0_macvtap entered promiscuous mode [ 425.334820][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 425.345675][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.373673][T12153] device veth1_macvtap entered promiscuous mode [ 425.385741][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 425.395632][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 425.470072][T12153] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.479257][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 425.489657][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.521037][T12153] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.529157][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 425.539612][ T28] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 426.106987][ T33] audit: type=1400 audit(1584111156.158:48): avc: denied { associate } for pid=12153 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 14:52:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000000)=ANY=[]}) 14:52:36 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(r1, &(0x7f00000003c0)) r2 = memfd_create(&(0x7f0000000340)='\x81\x02\x01N!\xdd\x1f\x80\v\xbc\x17\x8ao\x84\xce\xebT\xe8\xfa!P/B\x05(\xf7\x80\x00\x00\x00ze\xf8\xb0\x1al\x0f\xa1\x83\x1a\xadv\x17\r,a\x0f\xe3\x12\x1d\xca\x05\x9e\x03|9\xe7\x19*\xba-i\xbf\xa8[\x8e\xdfh\xa6\x96\xdb\xcb\xb5\xb3\xd5\xeb\x99\xb4kO-\x8fxQbg\r1\x9fb\xfeC\xa5\x18\xcb\x8a\xff\xcd\xed 2\xfd$\x9b\xc3X,H\b\x00\x00\x00X\x8dC\x1c\\\x9d\xf2\xb5\xeb3\x11\xfd\xd2uF&\xb6\xa2\xd1\x1d\x9d(\xd7e\x1e\xba\x18\xe4\x0f\x00\x00vQ\x8d\xa4sV\xb6q\xc8L\a_z\x1b\x89\x88\xbe\xadZs\x9fg\xf3\xe0{?1\xa0\xf7\x15\x11\xa2\xdb\xb5,\x87\xd9\xfd\\]\x00'/197, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r3, 0x8940, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') 14:52:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x1cd4000a, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f7870600000000000009000100018000000000000084000000000b8381933a000000000000034000002900010073797a30000000000c00024000000000000000050e0003800c00014000000000000000032e000240ffffff0a32b915ffa6ffef7886f18f89cd8c0602f501ba25e34c81fffffd0c0002400000000000002c30000480080001400000000008000148000000010800014000001f00000003007465616d5f736c6176885f30000000001400100011000000006f0000000000c4adc99466d586df5a96ba1ba766a031b7adb3515ee4dc599c780cc49aadbd503cda08a8fd9c7ae882fe1a0d72351aa6b4d18322f9e4b35a70336b8fa17615896e0abe4266450c849aba8e663c6164d16c5ccbdaa94760431e306321a33fc925651e1dd05287f1e6350d16124377ef6456c278af7015cc1f0d456be65bcd26d5aa17cfb8d4834ad442d69caa0b6bd77de1cc39361d58d309ed6d64a7e2a799b66a209b79afa906e8e6184891f6823a5a59d29a5b5b9ccd223c52addeea66a94253312634860c41a95606ae7bb56d8303049fd1c88ba6999063878016e63e897c8f23abe879e7ee435f76197439976c804bc8e1c6c3ba96c9042c54ed10509ff5a76b2ce8da97248c8ff825ac8391feb380e9960b096f5571903afa74ce453ecb8888e38a754d2aba6ac1dfb13cf3501c0fe23abb747c83af5864f85aa958ff2f45e1dadf4961e2c90fc6606373d5efb7cb7f91ff3fd8c84a1d8cb1251cf53e5e7c3dbf2e8d9821c37433b58a4d7739e457da6100d921dd6b527694220f33fe859248000000000000000000000076b935b55cb7edd99577c34089f693969c147a0a1a57af5144705cff1a9cf03f8b30c7e3a879e7f23046c96468c0d0f459468b048bdfe6a0c165ff5367a6732b7bd5210b2798b6947b5f728544f85c0a30748024e5980a76aaa3ab1546a6993e8110143c255ee558a51444824e954b4c32324d0c8d055a8a7d67d390"], 0xcc}}, 0x0) creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x2, 0x3, 0x2a0, 0x0, 0x0, 0x150, 0x0, 0x150, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7], 0x0, 0xe8, 0x150, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'gretap0\x00', {0x20, 0xc8f9, 0x0, 0x0, 0x0, 0x6, 0x5}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x300) [ 426.827706][ T33] audit: type=1400 audit(1584111156.878:49): avc: denied { map } for pid=12186 comm="syz-executor.0" path=2F6D656D66643A8102014E21DD1F800BBC178A6F84CEEB54E8FA21502F420528F780202864656C6574656429 dev="tmpfs" ino=30758 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 426.999045][ T33] audit: type=1400 audit(1584111157.048:50): avc: denied { create } for pid=12192 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 427.024359][ T33] audit: type=1400 audit(1584111157.048:51): avc: denied { write } for pid=12192 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:52:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0x9, 0x42}, 0x3c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)="3780f074e46136f95437f30ba8616f959d4dae6dda02e1694e8570b0c2c4236142dcea148af3906d3190ea7de100cff9f990b2cd4d9ea9e0fe62af8b4decd622cf0fb3340c229befae04be50a790039c96680503396b2ade7047ab9548d23f0dbba3165d938a79527df79c016c3ee2ef6106f5f830ef5bece64405fb67813f46ec0b6a730bc4d831346e9924cf50325f3f91e6f3f6450140964dacb02f4b4f2cd7512ced38db48359b26b79dbcbba5232126da9c2400af9b61a91f0247cb7e17a5894458a4ee73907cd26606237cd37916be10c407a244b2", 0xd8) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000002c0), 0x81, r0}, 0x38) [ 427.313694][ T33] audit: type=1400 audit(1584111157.368:52): avc: denied { map_create } for pid=12199 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 427.361621][ T33] audit: type=1400 audit(1584111157.388:53): avc: denied { map_read map_write } for pid=12199 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 14:52:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x38, 0x6d, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'dummy0\x00'}]}]}, 0x38}}, 0x0) [ 427.542574][ T33] audit: type=1400 audit(1584111157.588:54): avc: denied { open } for pid=12204 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 427.566771][ T33] audit: type=1400 audit(1584111157.588:55): avc: denied { kernel } for pid=12204 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 427.590722][ T33] audit: type=1400 audit(1584111157.588:56): avc: denied { confidentiality } for pid=12204 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 427.623196][ C1] ===================================================== [ 427.630353][ C1] BUG: KMSAN: use-after-free in l3mdev_master_ifindex_rcu+0x104/0x200 [ 427.638524][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.6.0-rc2-syzkaller #0 [ 427.646423][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.656508][ C1] Call Trace: [ 427.659814][ C1] [ 427.662696][ C1] dump_stack+0x1c9/0x220 [ 427.667187][ C1] kmsan_report+0xf7/0x1e0 [ 427.671645][ C1] __msan_warning+0x58/0xa0 [ 427.676175][ C1] l3mdev_master_ifindex_rcu+0x104/0x200 [ 427.681935][ C1] ipv6_dev_get_saddr+0x516/0xe10 [ 427.686992][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 427.692264][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 427.698094][ C1] ip6_dst_lookup_tail+0x1dee/0x2010 [ 427.703530][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 427.708781][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 427.714098][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 427.719271][ C1] ip6_dst_lookup_flow+0x102/0x250 [ 427.724533][ C1] geneve_get_v6_dst+0x7c2/0xa00 [ 427.729520][ C1] ? ip6_dst_lookup_tail+0x2010/0x2010 [ 427.735014][ C1] geneve_xmit+0x5d3/0x2c20 [ 427.739551][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 427.745814][ C1] ? skb_network_protocol+0x4d9/0x6a0 [ 427.751279][ C1] ? geneve_stop+0x400/0x400 [ 427.755890][ C1] dev_hard_start_xmit+0x531/0xab0 [ 427.761055][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 427.766295][ C1] __dev_queue_xmit+0x37de/0x4220 [ 427.771333][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 427.777024][ C1] dev_queue_xmit+0x4b/0x60 [ 427.781604][ C1] ip6_finish_output2+0x2056/0x2640 [ 427.786877][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 427.792111][ C1] __ip6_finish_output+0x824/0x8e0 [ 427.797271][ C1] ip6_finish_output+0x166/0x410 [ 427.802244][ C1] ip6_output+0x60a/0x770 [ 427.806619][ C1] ? ip6_output+0x770/0x770 [ 427.811143][ C1] ? ac6_seq_show+0x200/0x200 [ 427.815903][ C1] mld_sendpack+0xeba/0x13d0 [ 427.820562][ C1] ? mld_send_report+0x480/0x480 [ 427.825649][ C1] mld_send_initial_cr+0x448/0x4c0 [ 427.830812][ C1] mld_dad_timer_expire+0x4d/0x610 [ 427.835960][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 427.841280][ C1] call_timer_fn+0x218/0x510 [ 427.845899][ C1] ? mld_ifc_timer_expire+0x1750/0x1750 [ 427.851488][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 427.857328][ C1] __run_timers+0xcff/0x1210 [ 427.861939][ C1] ? mld_ifc_timer_expire+0x1750/0x1750 [ 427.867548][ C1] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 427.873783][ C1] ? irqtime_account_irq+0xcb/0x2d0 [ 427.879007][ C1] run_timer_softirq+0x2d/0x50 [ 427.883791][ C1] ? timers_dead_cpu+0x9b0/0x9b0 [ 427.888832][ C1] __do_softirq+0x311/0x83d [ 427.893450][ C1] irq_exit+0x230/0x280 [ 427.897649][ C1] exiting_irq+0xe/0x10 [ 427.901831][ C1] smp_apic_timer_interrupt+0x48/0x70 [ 427.907218][ C1] apic_timer_interrupt+0x2e/0x40 [ 427.912238][ C1] [ 427.915194][ C1] RIP: 0010:default_idle+0x53/0x90 [ 427.920311][ C1] Code: c3 f4 c9 f2 44 8b 35 44 c6 bf 01 48 c7 c7 98 87 f7 a3 e8 60 e5 96 f3 83 38 00 75 31 45 85 f6 7e 07 0f 00 2d 67 9f 49 00 fb f4 <65> 8b 35 ce 61 c9 5d c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf ff [ 427.939928][ C1] RSP: 0018:ffffa819c0cbbdf8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 427.948357][ C1] RAX: ffff962c0e16b798 RBX: ffff962b2d6f89d0 RCX: ffffe557c7a19580 [ 427.956372][ C1] RDX: ffff962bfe35e798 RSI: 0000000000000000 RDI: ffffffffa3f78798 [ 427.964354][ C1] RBP: ffffa819c0cbbe08 R08: ffffe557c000000f R09: ffff962b2fffb000 [ 427.972339][ C1] R10: 0000000000000004 R11: ffffffffa237c120 R12: ffff962b2d6f8000 [ 427.980321][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: ffff962b2d6f89d0 [ 427.988446][ C1] ? __cpuidle_text_start+0x8/0x8 [ 427.993513][ C1] ? default_idle+0x40/0x90 [ 427.998028][ C1] ? __cpuidle_text_start+0x8/0x8 [ 428.003113][ C1] arch_cpu_idle+0x25/0x30 [ 428.007544][ C1] do_idle+0x26c/0x7b0 [ 428.011740][ C1] cpu_startup_entry+0x45/0x50 [ 428.016520][ C1] ? setup_APIC_timer+0x210/0x210 [ 428.021561][ C1] start_secondary+0x389/0x480 [ 428.026513][ C1] secondary_startup_64+0xa4/0xb0 [ 428.031575][ C1] [ 428.033912][ C1] Uninit was created at: [ 428.038167][ C1] kmsan_internal_poison_shadow+0x66/0xd0 [ 428.043889][ C1] kmsan_slab_free+0x6e/0xb0 [ 428.048487][ C1] kfree+0x565/0x30a0 [ 428.052535][ C1] netdev_name_node_alt_destroy+0x587/0x690 [ 428.058502][ C1] rtnl_linkprop+0x939/0xc00 [ 428.063117][ C1] rtnl_dellinkprop+0x9d/0xb0 [ 428.067799][ C1] rtnetlink_rcv_msg+0x1153/0x1570 [ 428.072971][ C1] netlink_rcv_skb+0x451/0x650 [ 428.077741][ C1] rtnetlink_rcv+0x50/0x60 [ 428.082176][ C1] netlink_unicast+0xf9e/0x1100 [ 428.087059][ C1] netlink_sendmsg+0x1246/0x14d0 [ 428.092051][ C1] ____sys_sendmsg+0x12b6/0x1350 [ 428.096994][ C1] __sys_sendmsg+0x451/0x5f0 [ 428.101651][ C1] __ia32_compat_sys_sendmsg+0xed/0x130 [ 428.107210][ C1] do_fast_syscall_32+0x3c7/0x6e0 [ 428.112255][ C1] entry_SYSENTER_compat+0x68/0x77 [ 428.117360][ C1] ===================================================== [ 428.124287][ C1] Disabling lock debugging due to kernel taint [ 428.130451][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 428.130456][ C0] ===================================================== [ 428.130493][ C0] BUG: KMSAN: use-after-free in find_match+0x317/0x1480 [ 428.137073][ C1] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 428.160203][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.170380][ C1] Call Trace: [ 428.173673][ C1] [ 428.176543][ C1] dump_stack+0x1c9/0x220 [ 428.180896][ C1] panic+0x3d5/0xc3e [ 428.184861][ C1] kmsan_report+0x1df/0x1e0 [ 428.189398][ C1] __msan_warning+0x58/0xa0 [ 428.193932][ C1] l3mdev_master_ifindex_rcu+0x104/0x200 [ 428.199582][ C1] ipv6_dev_get_saddr+0x516/0xe10 [ 428.204616][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 428.209893][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 428.215714][ C1] ip6_dst_lookup_tail+0x1dee/0x2010 [ 428.221022][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 428.226269][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 428.231568][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 428.236701][ C1] ip6_dst_lookup_flow+0x102/0x250 [ 428.241847][ C1] geneve_get_v6_dst+0x7c2/0xa00 [ 428.246816][ C1] ? ip6_dst_lookup_tail+0x2010/0x2010 [ 428.252300][ C1] geneve_xmit+0x5d3/0x2c20 [ 428.256844][ C1] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 428.263009][ C1] ? skb_network_protocol+0x4d9/0x6a0 [ 428.268450][ C1] ? geneve_stop+0x400/0x400 [ 428.273051][ C1] dev_hard_start_xmit+0x531/0xab0 [ 428.278207][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 428.283432][ C1] __dev_queue_xmit+0x37de/0x4220 [ 428.288464][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 428.294074][ C1] dev_queue_xmit+0x4b/0x60 [ 428.298592][ C1] ip6_finish_output2+0x2056/0x2640 [ 428.303904][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 428.309133][ C1] __ip6_finish_output+0x824/0x8e0 [ 428.314286][ C1] ip6_finish_output+0x166/0x410 [ 428.319253][ C1] ip6_output+0x60a/0x770 [ 428.323617][ C1] ? ip6_output+0x770/0x770 [ 428.328132][ C1] ? ac6_seq_show+0x200/0x200 [ 428.332825][ C1] mld_sendpack+0xeba/0x13d0 [ 428.337474][ C1] ? mld_send_report+0x480/0x480 [ 428.342447][ C1] mld_send_initial_cr+0x448/0x4c0 [ 428.347593][ C1] mld_dad_timer_expire+0x4d/0x610 [ 428.352726][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 428.357952][ C1] call_timer_fn+0x218/0x510 [ 428.362576][ C1] ? mld_ifc_timer_expire+0x1750/0x1750 [ 428.368137][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 428.373966][ C1] __run_timers+0xcff/0x1210 [ 428.378575][ C1] ? mld_ifc_timer_expire+0x1750/0x1750 [ 428.384162][ C1] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 428.390324][ C1] ? irqtime_account_irq+0xcb/0x2d0 [ 428.395545][ C1] run_timer_softirq+0x2d/0x50 [ 428.400322][ C1] ? timers_dead_cpu+0x9b0/0x9b0 [ 428.405272][ C1] __do_softirq+0x311/0x83d [ 428.409827][ C1] irq_exit+0x230/0x280 [ 428.413994][ C1] exiting_irq+0xe/0x10 [ 428.418158][ C1] smp_apic_timer_interrupt+0x48/0x70 [ 428.423546][ C1] apic_timer_interrupt+0x2e/0x40 [ 428.428574][ C1] [ 428.431522][ C1] RIP: 0010:default_idle+0x53/0x90 [ 428.436656][ C1] Code: c3 f4 c9 f2 44 8b 35 44 c6 bf 01 48 c7 c7 98 87 f7 a3 e8 60 e5 96 f3 83 38 00 75 31 45 85 f6 7e 07 0f 00 2d 67 9f 49 00 fb f4 <65> 8b 35 ce 61 c9 5d c7 03 00 00 00 00 c7 43 08 00 00 00 00 bf ff [ 428.456282][ C1] RSP: 0018:ffffa819c0cbbdf8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 428.464708][ C1] RAX: ffff962c0e16b798 RBX: ffff962b2d6f89d0 RCX: ffffe557c7a19580 [ 428.472687][ C1] RDX: ffff962bfe35e798 RSI: 0000000000000000 RDI: ffffffffa3f78798 [ 428.480666][ C1] RBP: ffffa819c0cbbe08 R08: ffffe557c000000f R09: ffff962b2fffb000 [ 428.488649][ C1] R10: 0000000000000004 R11: ffffffffa237c120 R12: ffff962b2d6f8000 [ 428.496625][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: ffff962b2d6f89d0 [ 428.504628][ C1] ? __cpuidle_text_start+0x8/0x8 [ 428.509690][ C1] ? default_idle+0x40/0x90 [ 428.514208][ C1] ? __cpuidle_text_start+0x8/0x8 [ 428.519263][ C1] arch_cpu_idle+0x25/0x30 [ 428.523692][ C1] do_idle+0x26c/0x7b0 [ 428.527790][ C1] cpu_startup_entry+0x45/0x50 [ 428.532561][ C1] ? setup_APIC_timer+0x210/0x210 [ 428.537598][ C1] start_secondary+0x389/0x480 [ 428.542388][ C1] secondary_startup_64+0xa4/0xb0 [ 428.547469][ C0] CPU: 0 PID: 12150 Comm: syz-fuzzer Tainted: G B 5.6.0-rc2-syzkaller #0 [ 428.557232][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.567299][ C0] Call Trace: [ 428.570587][ C0] [ 428.573447][ C0] dump_stack+0x1c9/0x220 [ 428.577894][ C0] kmsan_report+0xf7/0x1e0 [ 428.582345][ C0] __msan_warning+0x58/0xa0 [ 428.586867][ C0] find_match+0x317/0x1480 [ 428.591318][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.596548][ C0] __find_rr_leaf+0x3f9/0x1160 [ 428.601390][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.606533][ C0] fib6_table_lookup+0x586/0x1420 [ 428.611646][ C0] ip6_pol_route+0x203/0x2960 [ 428.616340][ C0] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 428.622496][ C0] ? ip6t_do_table+0x29d7/0x2ac0 [ 428.627505][ C0] ip6_pol_route_input+0x123/0x140 [ 428.632644][ C0] fib6_rule_lookup+0x38f/0xa10 [ 428.637506][ C0] ? ip6_route_input_lookup+0x1f0/0x1f0 [ 428.643075][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.648299][ C0] ip6_route_input+0xb9d/0xcf0 [ 428.653107][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.658421][ C0] ip6_rcv_finish_core+0x1f9/0x470 [ 428.663576][ C0] ipv6_rcv+0x628/0x710 [ 428.667782][ C0] ? local_bh_enable+0x40/0x40 [ 428.672561][ C0] process_backlog+0xa41/0x1410 [ 428.677439][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.682585][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.687813][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 428.693134][ C0] net_rx_action+0x786/0x1aa0 [ 428.697853][ C0] ? net_tx_action+0xc30/0xc30 [ 428.702635][ C0] __do_softirq+0x311/0x83d [ 428.707298][ C0] irq_exit+0x230/0x280 [ 428.711476][ C0] exiting_irq+0xe/0x10 [ 428.715669][ C0] smp_apic_timer_interrupt+0x48/0x70 [ 428.721069][ C0] apic_timer_interrupt+0x2e/0x40 [ 428.726088][ C0] [ 428.729076][ C0] RIP: 0010:kmsan_alloc_page+0x2ed/0x310 [ 428.734727][ C0] Code: 83 c3 50 48 39 c1 7c e5 be ff ff ff ff 65 0f c1 35 98 46 34 6a ff ce 75 25 e8 3f d8 30 ff 48 8b 45 c8 48 89 45 c0 ff 75 c0 9d <44> 89 f8 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 [ 428.754345][ C0] RSP: 0018:ffffa819c1602690 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 428.762770][ C0] RAX: 0000000000000246 RBX: ffffe557c1f54728 RCX: 0000000000000001 [ 428.770760][ C0] RDX: ffffe557c1f416d0 RSI: 0000000000000000 RDI: ffff962a64049000 [ 428.778747][ C0] RBP: ffffa819c16026d8 R08: ccccccccccccd000 R09: ffffa819c1602504 [ 428.786748][ C0] R10: 0000000000000017 R11: ffffffffa260083d R12: ffffe557c1f416d0 [ 428.794723][ C0] R13: 0000000000000000 R14: ffffe557c1f41720 R15: 0000000000000000 [ 428.802733][ C0] ? __do_softirq+0x83d/0x83d [ 428.807522][ C0] __alloc_pages_nodemask+0x5712/0x5e80 [ 428.813115][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.818235][ C0] ? kmsan_internal_set_origin+0x75/0xb0 [ 428.823880][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 428.829183][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.834446][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.839719][ C0] alloc_pages_current+0x67d/0x990 [ 428.844941][ C0] __page_cache_alloc+0x95/0x310 [ 428.849899][ C0] __do_page_cache_readahead+0x44b/0x980 [ 428.855585][ C0] ondemand_readahead+0xd7d/0x1370 [ 428.860756][ C0] page_cache_async_readahead+0x4f5/0x510 [ 428.866513][ C0] generic_file_read_iter+0xa35/0x3db0 [ 428.872053][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.877265][ C0] ext4_file_read_iter+0x876/0xa90 [ 428.882407][ C0] ? ext4_llseek+0x470/0x470 [ 428.887039][ C0] __vfs_read+0xa64/0xc80 [ 428.891493][ C0] integrity_kernel_read+0x1e3/0x280 [ 428.896831][ C0] ima_calc_file_hash+0x1828/0x33d0 [ 428.902070][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.907286][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 428.912933][ C0] ? up_read+0x40/0x2b0 [ 428.917118][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.922347][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 428.927667][ C0] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 428.933762][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.938907][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.944052][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 428.949630][ C0] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 428.955739][ C0] ima_collect_measurement+0x45b/0xa20 [ 428.961287][ C0] process_measurement+0x1a7d/0x2ce0 [ 428.966653][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 428.972487][ C0] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 428.978672][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 428.983798][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 428.989629][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 428.994856][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 429.000760][ C0] ? selinux_task_getsid+0x1e0/0x1e0 [ 429.006065][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 429.012150][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 429.017296][ C0] ima_file_check+0x131/0x170 [ 429.022112][ C0] path_openat+0x4ef4/0x6bd0 [ 429.026834][ C0] ? should_fail+0x72/0x9e0 [ 429.031377][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 429.036603][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 429.041735][ C0] ? kmsan_internal_set_origin+0x75/0xb0 [ 429.047414][ C0] do_filp_open+0x2b8/0x710 [ 429.052000][ C0] do_sys_openat2+0x92e/0xd40 [ 429.056727][ C0] __se_sys_openat+0x24a/0x2b0 [ 429.061513][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 429.066735][ C0] __x64_sys_openat+0x56/0x70 [ 429.071425][ C0] do_syscall_64+0xb8/0x160 [ 429.075960][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 429.082205][ C0] RIP: 0033:0x4afbba [ 429.086104][ C0] Code: e8 eb 7d f8 ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 429.105727][ C0] RSP: 002b:000000c000223840 EFLAGS: 00000202 ORIG_RAX: 0000000000000101 [ 429.114159][ C0] RAX: ffffffffffffffda RBX: 000000c00002c000 RCX: 00000000004afbba [ 429.122161][ C0] RDX: 0000000000080002 RSI: 000000c00af786a0 RDI: ffffffffffffff9c [ 429.130143][ C0] RBP: 000000c0002238b8 R08: 0000000000000000 R09: 0000000000000000 [ 429.138137][ C0] R10: 00000000000001a4 R11: 0000000000000202 R12: ffffffffffffffff [ 429.146117][ C0] R13: 0000000000000036 R14: 0000000000000035 R15: 0000000000000100 [ 429.154118][ C0] [ 429.156442][ C0] Uninit was created at: [ 429.160690][ C0] kmsan_internal_poison_shadow+0x66/0xd0 [ 429.166416][ C0] kmsan_slab_free+0x6e/0xb0 [ 429.171005][ C0] kfree+0x565/0x30a0 [ 429.174992][ C0] netdev_name_node_alt_destroy+0x587/0x690 [ 429.180883][ C0] rtnl_linkprop+0x939/0xc00 [ 429.185493][ C0] rtnl_dellinkprop+0x9d/0xb0 [ 429.190174][ C0] rtnetlink_rcv_msg+0x1153/0x1570 [ 429.195286][ C0] netlink_rcv_skb+0x451/0x650 [ 429.200063][ C0] rtnetlink_rcv+0x50/0x60 [ 429.204522][ C0] netlink_unicast+0xf9e/0x1100 [ 429.209399][ C0] netlink_sendmsg+0x1246/0x14d0 [ 429.214333][ C0] ____sys_sendmsg+0x12b6/0x1350 [ 429.219268][ C0] __sys_sendmsg+0x451/0x5f0 [ 429.223880][ C0] __ia32_compat_sys_sendmsg+0xed/0x130 [ 429.229458][ C0] do_fast_syscall_32+0x3c7/0x6e0 [ 429.234522][ C0] entry_SYSENTER_compat+0x68/0x77 [ 429.239624][ C0] ===================================================== [ 429.900751][ C1] Shutting down cpus with NMI [ 429.920148][ C1] Kernel Offset: 0x13c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 429.931824][ C1] Rebooting in 86400 seconds..