last executing test programs: 3m18.400538456s ago: executing program 1 (id=279): r0 = socket$inet6(0xa, 0x80002, 0x88) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x1000) 3m18.228129315s ago: executing program 1 (id=281): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x6, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)='%+9llu \x00'}, 0x20) 3m17.869738893s ago: executing program 1 (id=283): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) 3m17.026687747s ago: executing program 1 (id=286): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 3m16.541943862s ago: executing program 1 (id=287): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000400000045"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 3m16.139450663s ago: executing program 1 (id=289): bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000380)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) 2m30.27906574s ago: executing program 32 (id=289): bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000380)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x34}, 0x10) 2m5.859712566s ago: executing program 0 (id=371): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000920000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000202000000000000000000000b0300"/55], 0x0, 0x3e}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 2m4.909494066s ago: executing program 0 (id=372): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 2m4.138083335s ago: executing program 0 (id=373): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x51}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 2m3.920273797s ago: executing program 0 (id=374): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x52}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 2m3.731669276s ago: executing program 0 (id=375): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) close(r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2m3.27008999s ago: executing program 0 (id=376): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 1m18.301792271s ago: executing program 33 (id=376): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7d}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) 9.050456041s ago: executing program 2 (id=556): socket$nl_generic(0x10, 0x3, 0x10) r0 = landlock_create_ruleset(&(0x7f0000000000)={0x10, 0x0, 0x3}, 0x18, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) landlock_restrict_self(r0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x101) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)="7020390ef6dfcef50c1b609f3d26319123f385aeed806375a6f2e720559123e47072d2b7dfe669b7d65164516e153a19b1e8c11de438a7601aa2727024ae2ce66dce047cab6d31e25ce6c166a0ec3489ede18bc1076094b9bed85be70434ef04baf7d89578dfc3e181ba4eba7427a342c9b68e325fa266eec570c885d7791cc3c54477b17920408ffbaee8ea4dce499e07bd8efe3a42e4ff50138aee8d5d0c314c15529e4d65886b557d359c2c14edca232d59e92214ede8a72e0bca2d35f178747bd07697cc8202aa5b08263f75c1aff7a22247b9e271c35a4c59075e584f7219fad2") dup3(r1, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(0x0, 0x2, 0x141102) r2 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io$cdc_ncm(r2, 0x0, 0x0) syz_usb_control_io(r2, 0x0, &(0x7f0000000780)={0x44, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$EVIOCGMASK(r3, 0x5b01, 0x0) 8.657647221s ago: executing program 2 (id=557): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={0x0, 0x3, r0, 0x5, 0x80000}) 5.899071494s ago: executing program 2 (id=563): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0x14, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c000", 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 5.570135061s ago: executing program 2 (id=564): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000001900)={0x2, {0xc, 0xa00, 0x4, 0x203, 0x100}}) 5.39227131s ago: executing program 2 (id=565): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r0, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9fe0307681f5c8c989a14f088a8657988a8", 0x0, 0x9e, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x4c) 5.170595642s ago: executing program 2 (id=566): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 1.601521797s ago: executing program 3 (id=573): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000dfff75390000000000000000850000007d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1f7}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r1, 0x10, 0x0, 0x20) 1.370234889s ago: executing program 3 (id=574): r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x141080) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0x2, 0x8, [0x393, 0x69cf]}) 1.225010327s ago: executing program 3 (id=575): pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b *:*'], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x8, 0x0) 580.31931ms ago: executing program 3 (id=576): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000008c0)=@newtfilter={0x29c, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r4, {0xc, 0x4}, {}, {0x5, 0xfff3}}, [@filter_kind_options=@f_flow={{0x9}, {0x26c, 0x2, [@TCA_FLOW_EMATCHES={0x268, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14c, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x1000, 0x8, 0x2}, {0xffffffffffffffff, 0x3, 0x2}}}, @TCF_EM_IPT={0x3c, 0x3, 0x0, 0x0, {{0x2}, [@TCA_EM_IPT_NFPROTO={0x5}, @TCA_EM_IPT_NFPROTO={0x5}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}, @TCA_EM_IPT_MATCH_REVISION={0x5}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x7}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x59, 0x3, 0xd}, {0x9, 0x1, 0x2, 0x1}}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x78dc, 0x8, 0x7}, {0xffffffffffffffff, 0x1, 0x2}}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0xf1, 0x2, 0xe}, {0xbd3, 0xffffffffffffff7f, 0x1, "5c55ebf407"}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x7fff, 0x2, 0x9}, {0x4, 0x1, 0x1, '?'}}}, @TCF_EM_CONTAINER={0x88, 0x2, 0x0, 0x0, {{0x9, 0x0, 0xf6e5}, "f544ede9e8294332226b6830115a8d3776de06b822729c306bb2d5eef391af2b2de5dc84f766ee2bc45b5f21f5d88370dbfb8365633d91031a7c88d2182c6a1e5a017e9e745e87d8b9fee3121c31ef160333ba3f3ef787f9ea5a35218b06b40299768905b4c0cb496359c804cbb2eb05e67266f7965f8c076cbd400f"}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x3, 0x3, 0x5}, {0x9, 0x9e, 0x0, 0x2400000}}}]}, @TCA_EMATCH_TREE_HDR={0x32}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xc}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8000}}, @TCA_EMATCH_TREE_LIST={0xf8, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x7, 0x7, 0x9}, {{0x1, 0x0, 0x0, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CONTAINER={0xc4, 0x2e93, 0x0, 0x0, {{0x400}, "9e517a96e257e9ff5da56bab7f3000e0f6d9c7624d23a66c5d9ce4716414227792bfcad14897a45e02ac56514209a7eedd005bc5f72f2c1c5c2b5f87980265f6e13653dbf009ed8e7b9e3139052636a2badaad74cc22c9529a3d0000009c59a2f5b43e5152787f2da8ab898933ac3a32f320375fea4b5e19081548a862eff43e242b29da5dd439ebea94e71e2a81fce4cc46251fca3a8e1a5593a2baf56acd8770c3ef1c46865a97e3054a1da0fd48944e67417489292c"}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0xea}, {0x4, 0x7, 0x825, 0x6}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}]}]}}]}, 0x29c}}, 0x20008050) 378.1927ms ago: executing program 3 (id=577): syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a0100005c6b4408070a64006e40010203030902240001a82300000904000002ca744d00090503034d00ff99090805", @ANYRES32], &(0x7f0000000480)={0x0, 0x0, 0xef, 0x0, 0x1, [{0x0, 0x0}]}) 0s ago: executing program 3 (id=578): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000013000/0x4000)=nil, 0x3000, 0x3}) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) kernel console output (not intermixed with test programs): [ 47.029737][ T31] audit: type=1400 audit(46.950:56): avc: denied { read write } for pid=3093 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.038493][ T31] audit: type=1400 audit(46.950:57): avc: denied { open } for pid=3093 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:23323' (ED25519) to the list of known hosts. [ 57.293440][ T31] audit: type=1400 audit(57.210:58): avc: denied { name_bind } for pid=3096 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 58.756573][ T31] audit: type=1400 audit(58.680:59): avc: denied { execute } for pid=3097 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.761632][ T31] audit: type=1400 audit(58.680:60): avc: denied { execute_no_trans } for pid=3097 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.869525][ T31] audit: type=1400 audit(60.790:61): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 60.873288][ T31] audit: type=1400 audit(60.790:62): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.889235][ T3097] cgroup: Unknown subsys name 'net' [ 60.897454][ T31] audit: type=1400 audit(60.820:63): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.041575][ T3097] cgroup: Unknown subsys name 'cpuset' [ 61.048363][ T3097] cgroup: Unknown subsys name 'hugetlb' [ 61.049625][ T3097] cgroup: Unknown subsys name 'rlimit' [ 61.301543][ T31] audit: type=1400 audit(61.220:64): avc: denied { setattr } for pid=3097 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 61.302122][ T31] audit: type=1400 audit(61.220:65): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 61.313427][ T31] audit: type=1400 audit(61.220:66): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 61.487886][ T3099] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 61.492335][ T31] audit: type=1400 audit(61.410:67): avc: denied { relabelto } for pid=3099 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.239508][ T3097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.090489][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 71.094057][ T31] audit: type=1400 audit(71.010:71): avc: denied { execmem } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 71.142724][ T31] audit: type=1400 audit(71.060:72): avc: denied { read } for pid=3102 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.154010][ T31] audit: type=1400 audit(71.060:73): avc: denied { open } for pid=3102 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.154513][ T31] audit: type=1400 audit(71.070:74): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 71.166507][ T31] audit: type=1400 audit(71.090:75): avc: denied { module_request } for pid=3102 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.245422][ T31] audit: type=1400 audit(71.170:76): avc: denied { sys_module } for pid=3102 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 71.795217][ T31] audit: type=1400 audit(71.710:77): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.972560][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.977485][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.982212][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.986669][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.756368][ T3102] hsr_slave_0: entered promiscuous mode [ 73.760256][ T3102] hsr_slave_1: entered promiscuous mode [ 73.829667][ T3103] hsr_slave_0: entered promiscuous mode [ 73.831392][ T3103] hsr_slave_1: entered promiscuous mode [ 73.832543][ T3103] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.832804][ T3103] Cannot create hsr debugfs directory [ 74.157497][ T31] audit: type=1400 audit(74.080:78): avc: denied { create } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.159176][ T31] audit: type=1400 audit(74.080:79): avc: denied { write } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.162435][ T31] audit: type=1400 audit(74.080:80): avc: denied { read } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.172708][ T3102] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.199482][ T3102] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.216379][ T3102] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.230918][ T3102] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.291068][ T3103] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.313394][ T3103] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.327926][ T3103] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.347202][ T3103] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.993432][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.049891][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.225343][ T3103] veth0_vlan: entered promiscuous mode [ 77.243208][ T3103] veth1_vlan: entered promiscuous mode [ 77.313040][ T3103] veth0_macvtap: entered promiscuous mode [ 77.323285][ T3103] veth1_macvtap: entered promiscuous mode [ 77.391325][ T3103] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.392023][ T3103] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.392124][ T3103] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.392192][ T3103] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.441361][ T3102] veth0_vlan: entered promiscuous mode [ 77.506885][ T3102] veth1_vlan: entered promiscuous mode [ 77.565731][ T31] audit: type=1400 audit(77.480:81): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 77.572138][ T31] audit: type=1400 audit(77.490:82): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.Yi2VcA/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 77.582192][ T31] audit: type=1400 audit(77.500:83): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 77.607516][ T31] audit: type=1400 audit(77.530:84): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.Yi2VcA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 77.614358][ T31] audit: type=1400 audit(77.530:85): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.Yi2VcA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 77.636799][ T3102] veth0_macvtap: entered promiscuous mode [ 77.649548][ T3102] veth1_macvtap: entered promiscuous mode [ 77.651966][ T31] audit: type=1400 audit(77.570:86): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 77.660454][ T31] audit: type=1400 audit(77.580:87): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 77.666688][ T31] audit: type=1400 audit(77.580:88): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="gadgetfs" ino=2383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 77.678597][ T31] audit: type=1400 audit(77.600:89): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 77.680259][ T31] audit: type=1400 audit(77.600:90): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 77.752713][ T3102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.753087][ T3102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.753337][ T3102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.753415][ T3102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.801142][ T3103] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 79.275431][ T3802] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 79.338763][ T3802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=3802 comm=syz.0.3 [ 81.785063][ T3825] FAULT_INJECTION: forcing a failure. [ 81.785063][ T3825] name failslab, interval 1, probability 0, space 0, times 1 [ 81.786487][ T3825] CPU: 0 UID: 0 PID: 3825 Comm: syz.1.9 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 81.786859][ T3825] Hardware name: ARM-Versatile Express [ 81.787174][ T3825] Call trace: [ 81.787955][ T3825] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 81.789217][ T3825] r7:84921800 r6:00000000 r5:60000013 r4:8225b4f4 [ 81.789306][ T3825] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 81.789362][ T3825] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 81.789410][ T3825] r5:84921800 r4:82919a80 [ 81.789511][ T3825] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 81.789774][ T3825] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 81.790141][ T3825] r8:00000000 r7:84921800 r6:00000cc0 r5:ffffffff r4:830adb40 [ 81.790659][ T3825] [<8051c1b8>] (should_failslab) from [<805005d8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 81.790962][ T3825] [<80500588>] (kmem_cache_alloc_node_noprof) from [<81538044>] (__alloc_skb+0x138/0x160) [ 81.791236][ T3825] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830adb40 r5:ffffffff [ 81.791306][ T3825] r4:828060c0 [ 81.791367][ T3825] [<81537f0c>] (__alloc_skb) from [<81657de0>] (netlink_alloc_large_skb+0x88/0xa0) [ 81.791538][ T3825] r8:00000000 r7:85c83000 r6:0000001c r5:8513d680 r4:00000140 [ 81.791564][ T3825] [<81657d58>] (netlink_alloc_large_skb) from [<81658520>] (netlink_sendmsg+0x134/0x444) [ 81.791662][ T3825] r5:8513d680 r4:e0345f20 [ 81.791928][ T3825] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 81.792165][ T3825] r10:00000000 r9:e0345dc4 r8:e0345dc4 r7:00000000 r6:8513d680 r5:e0345f20 [ 81.792242][ T3825] r4:00000000 [ 81.792266][ T3825] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 81.792414][ T3825] r7:00000000 r6:8513d680 r5:00000040 r4:e0345f20 [ 81.792531][ T3825] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 81.792650][ T3825] r10:e0345e24 r9:20000300 r8:00000040 r7:00000000 r6:8513d680 r5:e0345f20 [ 81.792747][ T3825] r4:00000000 [ 81.792771][ T3825] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 81.792900][ T3825] r10:00000128 r9:84921800 r8:8486f540 r7:00000040 r6:20000300 r5:8486f541 [ 81.793110][ T3825] r4:00000003 [ 81.793227][ T3825] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 81.793415][ T3825] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 81.793436][ T3825] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 81.793670][ T3825] Exception stack(0xe0345fa8 to 0xe0345ff0) [ 81.793867][ T3825] 5fa0: 00000000 00000000 00000003 20000300 00000040 00000000 [ 81.793936][ T3825] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b080bc [ 81.793969][ T3825] 5fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 82.834956][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 82.835391][ T31] audit: type=1400 audit(82.750:116): avc: denied { create } for pid=3837 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 82.841679][ T31] audit: type=1400 audit(82.760:117): avc: denied { map } for pid=3837 comm="syz.0.14" path="socket:[2494]" dev="sockfs" ino=2494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 82.842085][ T31] audit: type=1400 audit(82.760:118): avc: denied { read accept } for pid=3837 comm="syz.0.14" path="socket:[2494]" dev="sockfs" ino=2494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 83.244186][ T31] audit: type=1400 audit(83.160:119): avc: denied { setattr } for pid=3841 comm="syz.0.15" path="socket:[1894]" dev="sockfs" ino=1894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.248376][ T31] audit: type=1400 audit(83.170:120): avc: denied { setopt } for pid=3841 comm="syz.0.15" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 84.075347][ T31] audit: type=1400 audit(84.000:121): avc: denied { create } for pid=3843 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 84.082490][ T3844] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3844 comm=syz.1.16 [ 84.084624][ T31] audit: type=1400 audit(84.000:122): avc: denied { write } for pid=3843 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 84.118207][ T31] audit: type=1400 audit(84.020:123): avc: denied { nlmsg_write } for pid=3843 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 84.121018][ T31] audit: type=1400 audit(84.040:124): avc: denied { read } for pid=3843 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 84.126620][ T31] audit: type=1400 audit(84.050:125): avc: denied { ioctl } for pid=3843 comm="syz.1.16" path="socket:[2508]" dev="sockfs" ino=2508 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 86.345412][ T3850] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3850 comm=syz.1.16 [ 87.574115][ T3872] fuse: Unknown parameter 'grou00000000000000000000' [ 88.330503][ T3876] FAULT_INJECTION: forcing a failure. [ 88.330503][ T3876] name failslab, interval 1, probability 0, space 0, times 0 [ 88.330877][ T3876] CPU: 0 UID: 0 PID: 3876 Comm: syz.1.24 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 88.330941][ T3876] Hardware name: ARM-Versatile Express [ 88.330955][ T3876] Call trace: [ 88.330976][ T3876] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 88.331030][ T3876] r7:84920000 r6:00000000 r5:60000013 r4:8225b4f4 [ 88.331038][ T3876] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 88.331063][ T3876] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 88.331087][ T3876] r5:84920000 r4:82919a80 [ 88.331094][ T3876] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 88.331128][ T3876] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 88.331160][ T3876] r8:00000000 r7:84920000 r6:00000cc0 r5:ffffffff r4:830adb40 [ 88.331168][ T3876] [<8051c1b8>] (should_failslab) from [<805005d8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 88.331189][ T3876] [<80500588>] (kmem_cache_alloc_node_noprof) from [<81538044>] (__alloc_skb+0x138/0x160) [ 88.331220][ T3876] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830adb40 r5:ffffffff [ 88.331229][ T3876] r4:828060c0 [ 88.331255][ T3876] [<81537f0c>] (__alloc_skb) from [<81657de0>] (netlink_alloc_large_skb+0x88/0xa0) [ 88.331289][ T3876] r8:00000000 r7:85c83000 r6:00000014 r5:8513c500 r4:00000140 [ 88.331297][ T3876] [<81657d58>] (netlink_alloc_large_skb) from [<81658520>] (netlink_sendmsg+0x134/0x444) [ 88.331323][ T3876] r5:8513c500 r4:dfae9f20 [ 88.331330][ T3876] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 88.331361][ T3876] r10:00000000 r9:dfae9dc4 r8:dfae9dc4 r7:00000000 r6:8513c500 r5:dfae9f20 [ 88.331369][ T3876] r4:00000000 [ 88.331376][ T3876] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 88.331401][ T3876] r7:00000000 r6:8513c500 r5:00000004 r4:dfae9f20 [ 88.331408][ T3876] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 88.331436][ T3876] r10:dfae9e24 r9:20000440 r8:00000004 r7:00000000 r6:8513c500 r5:dfae9f20 [ 88.331444][ T3876] r4:00000000 [ 88.331451][ T3876] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 88.331478][ T3876] r10:00000128 r9:84920000 r8:8486f600 r7:00000004 r6:20000440 r5:8486f601 [ 88.331487][ T3876] r4:00000003 [ 88.331493][ T3876] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 88.331520][ T3876] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 88.331528][ T3876] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 88.331548][ T3876] Exception stack(0xdfae9fa8 to 0xdfae9ff0) [ 88.331566][ T3876] 9fa0: 00000000 00000000 00000003 20000440 00000004 00000000 [ 88.331581][ T3876] 9fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b080bc [ 88.331593][ T3876] 9fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 89.820813][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 89.821961][ T31] audit: type=1400 audit(89.740:135): avc: denied { ioctl } for pid=3886 comm="syz.0.27" path="socket:[1961]" dev="sockfs" ino=1961 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 90.032665][ T31] audit: type=1400 audit(89.950:136): avc: denied { getopt } for pid=3886 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 90.120001][ T31] audit: type=1400 audit(90.040:137): avc: denied { create } for pid=3892 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 90.123338][ T31] audit: type=1400 audit(90.040:138): avc: denied { shutdown } for pid=3892 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 91.191800][ T31] audit: type=1400 audit(91.110:139): avc: denied { ioctl } for pid=3896 comm="syz.1.29" path="socket:[2549]" dev="sockfs" ino=2549 ioctlcmd=0x941c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.231240][ T31] audit: type=1400 audit(91.150:140): avc: denied { map } for pid=3896 comm="syz.1.29" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1980 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.231641][ T31] audit: type=1400 audit(91.150:141): avc: denied { read write } for pid=3896 comm="syz.1.29" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1980 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 91.416133][ T3906] FAULT_INJECTION: forcing a failure. [ 91.416133][ T3906] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 91.418997][ T3906] CPU: 0 UID: 0 PID: 3906 Comm: syz.1.31 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 91.419273][ T3906] Hardware name: ARM-Versatile Express [ 91.419550][ T3906] Call trace: [ 91.419810][ T3906] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 91.420734][ T3906] r7:00000001 r6:00000000 r5:60000013 r4:8225b4f4 [ 91.420826][ T3906] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 91.420884][ T3906] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 91.420939][ T3906] r5:8563d400 r4:82950610 [ 91.420957][ T3906] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 91.421022][ T3906] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 91.421084][ T3906] r8:0000ee01 r7:00000001 r6:8245e848 r5:20000100 r4:20000100 [ 91.421102][ T3906] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 91.421154][ T3906] [<80964e18>] (should_fail_usercopy) from [<8096af00>] (strncpy_from_user+0x20/0x1a0) [ 91.421205][ T3906] [<8096aee0>] (strncpy_from_user) from [<8055d2c4>] (getname_flags.part.0+0x44/0x18c) [ 91.421301][ T3906] r10:000000b6 r9:00000000 r8:0000ee01 r7:00000001 r6:8245e848 r5:20000100 [ 91.421333][ T3906] r4:833c6000 [ 91.421353][ T3906] [<8055d280>] (getname_flags.part.0) from [<8056223c>] (getname_flags+0x3c/0x50) [ 91.421417][ T3906] r9:00000000 r8:0000ee01 r7:20000100 r6:ffffff9c r5:00000001 r4:20000100 [ 91.421439][ T3906] [<80562200>] (getname_flags) from [<805627f4>] (user_path_at+0x2c/0x64) [ 91.421487][ T3906] r5:00000001 r4:dfaa9f54 [ 91.421506][ T3906] [<805627c8>] (user_path_at) from [<8054a374>] (do_fchownat+0x68/0xf0) [ 91.421559][ T3906] r6:ffffff9c r5:00000001 r4:0000ee01 [ 91.421577][ T3906] [<8054a30c>] (do_fchownat) from [<8034f8d0>] (sys_chown16+0x50/0x58) [ 91.421673][ T3906] r9:8563d400 r8:8020029c r7:000000b6 r6:0012ff70 r5:00000000 r4:0000ee01 [ 91.421693][ T3906] [<8034f880>] (sys_chown16) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 91.421811][ T3906] Exception stack(0xdfaa9fa8 to 0xdfaa9ff0) [ 91.421989][ T3906] 9fa0: 00000000 00000000 20000100 0000ee01 00000000 00000000 [ 91.422046][ T3906] 9fc0: 00000000 00000000 0012ff70 000000b6 002e0000 00000000 00006364 76b080bc [ 91.422073][ T3906] 9fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 91.422133][ T3906] r4:00000000 [ 94.166515][ T31] audit: type=1400 audit(94.090:142): avc: denied { create } for pid=3920 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 94.172745][ T31] audit: type=1400 audit(94.090:143): avc: denied { shutdown } for pid=3920 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 94.412445][ T31] audit: type=1400 audit(94.330:144): avc: denied { write } for pid=3925 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.518792][ T3928] FAULT_INJECTION: forcing a failure. [ 94.518792][ T3928] name failslab, interval 1, probability 0, space 0, times 0 [ 94.520515][ T3928] CPU: 0 UID: 0 PID: 3928 Comm: syz.1.36 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 94.520617][ T3928] Hardware name: ARM-Versatile Express [ 94.520643][ T3928] Call trace: [ 94.520682][ T3928] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 94.520779][ T3928] r7:00000c40 r6:00000000 r5:60000013 r4:8225b4f4 [ 94.520797][ T3928] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 94.520846][ T3928] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 94.520896][ T3928] r5:85638c00 r4:82919a80 [ 94.520911][ T3928] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 94.520967][ T3928] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 94.521043][ T3928] r8:85638c00 r7:00000c40 r6:8486f1a8 r5:00001000 r4:830016c0 [ 94.521062][ T3928] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 94.521106][ T3928] [<80500f2c>] (__kmalloc_noprof) from [<807baf34>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 94.521165][ T3928] r10:85638c00 r9:8309f800 r8:00000000 r7:83668770 r6:8486f1a8 r5:00001000 [ 94.521183][ T3928] r4:00000000 [ 94.521199][ T3928] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 94.521262][ T3928] r10:85638c00 r9:00000000 r8:00000004 r7:00008927 r6:00000004 r5:81cd6278 [ 94.521283][ T3928] r4:8486f1a8 r3:826c0200 [ 94.521299][ T3928] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 94.521359][ T3928] r9:8486f180 r8:00000004 r7:20000140 r6:20000140 r5:00008927 r4:8486f180 [ 94.521375][ T3928] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 94.521423][ T3928] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 94.521476][ T3928] r7:20000140 r6:8486f181 r5:00000000 r4:00008927 [ 94.521494][ T3928] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 94.521534][ T3928] Exception stack(0xdfa6dfa8 to 0xdfa6dff0) [ 94.521567][ T3928] dfa0: 00000000 00000000 00000004 00008927 20000140 00000000 [ 94.521599][ T3928] dfc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b080bc [ 94.521624][ T3928] dfe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 94.521654][ T3928] r10:00000036 r9:85638c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 94.521672][ T3928] r4:00000000 [ 94.540858][ T3928] ERROR: Out of memory at tomoyo_realpath_from_path. [ 94.879503][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 94.879921][ T31] audit: type=1400 audit(94.800:146): avc: denied { write } for pid=3933 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.168408][ T31] audit: type=1400 audit(96.090:147): avc: denied { create } for pid=3944 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.170487][ T31] audit: type=1400 audit(96.090:148): avc: denied { bind } for pid=3944 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.177929][ T31] audit: type=1400 audit(96.100:149): avc: denied { accept } for pid=3944 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.180820][ T31] audit: type=1400 audit(96.100:150): avc: denied { write } for pid=3944 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.230369][ T31] audit: type=1400 audit(96.150:151): avc: denied { getattr } for pid=3945 comm="syz.1.43" name="[io_uring]" dev="anon_inodefs" ino=2628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 96.292107][ T31] audit: type=1400 audit(96.210:152): avc: denied { create } for pid=3948 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 96.875392][ T2865] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 97.015029][ T2865] usb 2-1: device descriptor read/64, error -71 [ 97.254869][ T2865] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 97.362470][ T31] audit: type=1400 audit(97.280:153): avc: denied { create } for pid=3966 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.379949][ T31] audit: type=1400 audit(97.300:154): avc: denied { execute } for pid=3966 comm="syz.0.50" path="/sys/power/resume" dev="sysfs" ino=777 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=file permissive=1 [ 97.406597][ T2865] usb 2-1: device descriptor read/64, error -71 [ 97.515790][ T2865] usb usb2-port1: attempt power cycle [ 97.857043][ T2865] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 97.878220][ T2865] usb 2-1: device descriptor read/8, error -71 [ 97.939679][ T31] audit: type=1400 audit(97.860:155): avc: denied { getopt } for pid=3975 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.136690][ T2865] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 98.162606][ T2865] usb 2-1: device descriptor read/8, error -71 [ 98.276062][ T2865] usb usb2-port1: unable to enumerate USB device [ 99.110078][ T3988] fuse: Unknown parameter 'd' [ 99.462706][ T3992] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3992 comm=syz.0.60 [ 99.471909][ T3992] Zero length message leads to an empty skb [ 99.815038][ T2865] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 99.944546][ T2865] usb 1-1: device descriptor read/64, error -71 [ 100.186222][ T2865] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 100.317191][ T2865] usb 1-1: device descriptor read/64, error -71 [ 100.435454][ T2865] usb usb1-port1: attempt power cycle [ 100.775256][ T2865] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 100.798587][ T2865] usb 1-1: device descriptor read/8, error -71 [ 101.044504][ T2865] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 101.068809][ T2865] usb 1-1: device descriptor read/8, error -71 [ 101.174730][ T2865] usb usb1-port1: unable to enumerate USB device [ 109.732860][ T4009] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4009 comm=syz.0.63 [ 112.477553][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 112.478048][ T31] audit: type=1400 audit(112.400:157): avc: denied { create } for pid=4015 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.488822][ T31] audit: type=1400 audit(112.410:158): avc: denied { ioctl } for pid=4015 comm="syz.0.65" path="socket:[2726]" dev="sockfs" ino=2726 ioctlcmd=0x5720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.500752][ T31] audit: type=1400 audit(112.420:159): avc: denied { write } for pid=4015 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.595258][ T31] audit: type=1400 audit(112.510:160): avc: denied { remount } for pid=4017 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 112.609302][ T31] audit: type=1400 audit(112.530:161): avc: denied { accept } for pid=4017 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 115.316835][ T4037] FAULT_INJECTION: forcing a failure. [ 115.316835][ T4037] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.318854][ T4037] CPU: 0 UID: 0 PID: 4037 Comm: syz.1.73 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 115.318967][ T4037] Hardware name: ARM-Versatile Express [ 115.319010][ T4037] Call trace: [ 115.319057][ T4037] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 115.319166][ T4037] r7:200010c0 r6:00000000 r5:60000013 r4:8225b4f4 [ 115.319188][ T4037] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 115.319273][ T4037] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 115.319345][ T4037] r5:8563ec00 r4:82950610 [ 115.319366][ T4037] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 115.319427][ T4037] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 115.319491][ T4037] r8:00000000 r7:200010c0 r6:8326d680 r5:00000000 r4:dffd5f20 [ 115.319510][ T4037] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 115.319563][ T4037] [<80964e18>] (should_fail_usercopy) from [<808b4368>] (_copy_from_iter+0x6c/0x7c8) [ 115.319617][ T4037] [<808b42fc>] (_copy_from_iter) from [<81658578>] (netlink_sendmsg+0x18c/0x444) [ 115.319682][ T4037] r10:00000000 r9:00000000 r8:dffd5f30 r7:85c83000 r6:00000014 r5:8486ee40 [ 115.319703][ T4037] r4:dffd5f20 [ 115.319719][ T4037] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 115.319789][ T4037] r10:00000000 r9:dffd5dc4 r8:dffd5dc4 r7:00000000 r6:85149900 r5:dffd5f20 [ 115.319813][ T4037] r4:00000000 [ 115.319831][ T4037] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 115.319891][ T4037] r7:00000000 r6:85149900 r5:00000840 r4:dffd5f20 [ 115.319913][ T4037] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 115.319978][ T4037] r10:dffd5e24 r9:20001180 r8:00000840 r7:00000000 r6:85149900 r5:dffd5f20 [ 115.320018][ T4037] r4:00000000 [ 115.320036][ T4037] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 115.320103][ T4037] r10:00000128 r9:8563ec00 r8:8486f840 r7:00000840 r6:20001180 r5:8486f841 [ 115.320125][ T4037] r4:00000003 [ 115.320142][ T4037] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 115.320202][ T4037] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 115.320222][ T4037] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 115.320276][ T4037] Exception stack(0xdffd5fa8 to 0xdffd5ff0) [ 115.320315][ T4037] 5fa0: 00000000 00000000 00000003 20001180 00000840 00000000 [ 115.320350][ T4037] 5fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b080bc [ 115.320377][ T4037] 5fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 115.412324][ T31] audit: type=1400 audit(115.330:162): avc: denied { create } for pid=4038 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.431654][ T31] audit: type=1400 audit(115.350:163): avc: denied { connect } for pid=4038 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.437115][ T4042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4042 comm=syz.1.75 [ 115.446400][ T4042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1000 sclass=netlink_route_socket pid=4042 comm=syz.1.75 [ 115.449937][ T31] audit: type=1400 audit(115.370:164): avc: denied { write } for pid=4041 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 115.456859][ T31] audit: type=1400 audit(115.380:165): avc: denied { read } for pid=4041 comm="syz.1.75" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 118.060465][ T31] audit: type=1400 audit(117.980:166): avc: denied { create } for pid=4056 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 118.068818][ T31] audit: type=1400 audit(117.990:167): avc: denied { ioctl } for pid=4056 comm="syz.0.80" path="socket:[2825]" dev="sockfs" ino=2825 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 118.075572][ T31] audit: type=1400 audit(117.990:168): avc: denied { write } for pid=4056 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 118.181479][ T4062] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 118.182778][ T31] audit: type=1400 audit(118.100:169): avc: denied { mounton } for pid=4061 comm="syz.1.82" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 118.595343][ T31] audit: type=1400 audit(118.520:170): avc: denied { ioctl } for pid=4056 comm="syz.0.80" path="socket:[2826]" dev="sockfs" ino=2826 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 118.715311][ T4057] fuse: root generation should be zero [ 119.316194][ T31] audit: type=1400 audit(119.240:171): avc: denied { read } for pid=4063 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 120.540943][ T31] audit: type=1400 audit(120.460:172): avc: denied { listen } for pid=4076 comm="syz.1.87" path=2F33352FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 121.222738][ T4089] FAULT_INJECTION: forcing a failure. [ 121.222738][ T4089] name failslab, interval 1, probability 0, space 0, times 0 [ 121.224934][ T4089] CPU: 1 UID: 0 PID: 4089 Comm: syz.1.92 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 121.225034][ T4089] Hardware name: ARM-Versatile Express [ 121.225058][ T4089] Call trace: [ 121.225095][ T4089] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 121.225189][ T4089] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4f4 [ 121.225210][ T4089] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 121.225265][ T4089] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 121.225317][ T4089] r5:8563ec00 r4:82919a80 [ 121.225331][ T4089] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 121.225515][ T4089] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 121.225636][ T4089] r8:8563ec00 r7:00000d40 r6:8486fce8 r5:00000018 r4:83001240 [ 121.226324][ T4089] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 121.226381][ T4089] [<80500f2c>] (__kmalloc_noprof) from [<807bae3c>] (tomoyo_encode2+0x64/0xf0) [ 121.226413][ T4089] r10:00000fff r9:8309f800 r8:00000000 r7:8366d000 r6:8486fce8 r5:8597bffd [ 121.226710][ T4089] r4:8597bff0 [ 121.226762][ T4089] [<807badd8>] (tomoyo_encode2) from [<807baeec>] (tomoyo_encode+0x24/0x30) [ 121.226795][ T4089] r9:8309f800 r8:00000000 r7:8366d000 r6:8486fce8 r5:00001000 r4:8597bff1 [ 121.226803][ T4089] [<807baec8>] (tomoyo_encode) from [<807baf78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 121.226825][ T4089] r5:00001000 r4:8597b000 [ 121.226831][ T4089] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 121.226887][ T4089] r10:8563ec00 r9:00000000 r8:00000003 r7:00008982 r6:00000004 r5:81cd6278 [ 121.226899][ T4089] r4:8486fce8 r3:826c0200 [ 121.226907][ T4089] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 121.226937][ T4089] r9:8486fcc0 r8:00000003 r7:20001fc0 r6:20001fc0 r5:00008982 r4:8486fcc0 [ 121.227022][ T4089] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 121.227048][ T4089] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 121.227076][ T4089] r7:20001fc0 r6:8486fcc1 r5:00000000 r4:00008982 [ 121.227084][ T4089] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 121.227105][ T4089] Exception stack(0xe05fdfa8 to 0xe05fdff0) [ 121.227124][ T4089] dfa0: 00000000 00000000 00000003 00008982 20001fc0 00000000 [ 121.227140][ T4089] dfc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b080bc [ 121.227152][ T4089] dfe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 121.227167][ T4089] r10:00000036 r9:8563ec00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 121.227180][ T4089] r4:00000000 [ 121.227318][ T4089] ERROR: Out of memory at tomoyo_realpath_from_path. [ 121.669477][ T31] audit: type=1400 audit(121.590:173): avc: denied { create } for pid=4096 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 121.684391][ T31] audit: type=1400 audit(121.600:174): avc: denied { connect } for pid=4096 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 121.707143][ T31] audit: type=1400 audit(121.630:175): avc: denied { getattr } for pid=4098 comm="syz.0.96" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 121.749330][ T4099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=371 sclass=netlink_route_socket pid=4099 comm=syz.0.96 [ 121.900849][ T4102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4102 comm=syz.0.97 [ 124.475669][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 124.476112][ T31] audit: type=1400 audit(124.390:179): avc: denied { setopt } for pid=4110 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 124.497323][ T31] audit: type=1400 audit(124.420:180): avc: denied { setopt } for pid=4110 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 124.644196][ T31] audit: type=1400 audit(124.560:181): avc: denied { execute } for pid=4112 comm="syz.1.102" name="file1" dev="tmpfs" ino=266 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 126.048412][ T31] audit: type=1400 audit(125.970:182): avc: denied { write } for pid=4120 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 127.211354][ T31] audit: type=1400 audit(127.130:183): avc: denied { create } for pid=4126 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 128.659554][ T4138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4138 comm=syz.0.108 [ 129.179812][ T4144] fuse: Unknown parameter 'user_id00000000000000000000' [ 129.282339][ T31] audit: type=1400 audit(129.200:184): avc: denied { write } for pid=4145 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 129.287890][ T31] audit: type=1400 audit(129.210:185): avc: denied { setopt } for pid=4145 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 132.296546][ T4165] fuse: Unknown parameter 'user_id00000000000000000000' [ 132.440224][ T4168] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2048 sclass=netlink_audit_socket pid=4168 comm=syz.0.115 [ 133.771636][ T4172] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4172 comm=syz.1.119 [ 134.987630][ T4181] fuse: Bad value for 'fd' [ 135.068827][ T31] audit: type=1400 audit(134.990:186): avc: denied { create } for pid=4182 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.078704][ T31] audit: type=1400 audit(135.000:187): avc: denied { setopt } for pid=4182 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.093126][ T31] audit: type=1400 audit(135.010:188): avc: denied { write } for pid=4182 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.196903][ T31] audit: type=1400 audit(135.120:189): avc: denied { map } for pid=4184 comm="syz.1.125" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 135.690479][ T4191] fuse: Unknown parameter '0x0000000000000004' [ 135.785868][ T31] audit: type=1400 audit(135.710:190): avc: denied { write } for pid=4192 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 135.811723][ T31] audit: type=1400 audit(135.730:191): avc: denied { ioctl } for pid=4192 comm="syz.0.129" path="socket:[3488]" dev="sockfs" ino=3488 ioctlcmd=0x6411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 138.506428][ T4205] fuse: Unknown parameter '0x0000000000000004' [ 138.826470][ T4215] fuse: Unknown parameter '0x0000000000000004' [ 139.314813][ T31] audit: type=1400 audit(139.240:192): avc: denied { setopt } for pid=4212 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 141.780930][ T31] audit: type=1400 audit(141.700:193): avc: denied { setattr } for pid=4235 comm="syz.0.141" name="NETLINK" dev="sockfs" ino=3549 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 141.837188][ T4238] FAULT_INJECTION: forcing a failure. [ 141.837188][ T4238] name failslab, interval 1, probability 0, space 0, times 0 [ 141.839030][ T4238] CPU: 0 UID: 0 PID: 4238 Comm: syz.1.142 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 141.839116][ T4238] Hardware name: ARM-Versatile Express [ 141.839145][ T4238] Call trace: [ 141.839190][ T4238] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 141.839298][ T4238] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4f4 [ 141.839319][ T4238] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 141.839353][ T4238] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 141.839381][ T4238] r5:83ad8c00 r4:82919a80 [ 141.839388][ T4238] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 141.839430][ T4238] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 141.839492][ T4238] r8:83ad8c00 r7:00000d40 r6:85b9f928 r5:00000018 r4:83001240 [ 141.839503][ T4238] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 141.839526][ T4238] [<80500f2c>] (__kmalloc_noprof) from [<807bae3c>] (tomoyo_encode2+0x64/0xf0) [ 141.839557][ T4238] r10:00000fff r9:8309f800 r8:00000000 r7:85113000 r6:85b9f928 r5:8597fffd [ 141.839567][ T4238] r4:8597fff0 [ 141.839574][ T4238] [<807badd8>] (tomoyo_encode2) from [<807baeec>] (tomoyo_encode+0x24/0x30) [ 141.839601][ T4238] r9:8309f800 r8:00000000 r7:85113000 r6:85b9f928 r5:00001000 r4:8597fff1 [ 141.839608][ T4238] [<807baec8>] (tomoyo_encode) from [<807baf78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 141.839631][ T4238] r5:00001000 r4:8597f000 [ 141.839639][ T4238] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 141.839671][ T4238] r10:83ad8c00 r9:00000000 r8:00000004 r7:00008927 r6:00000004 r5:81cd6278 [ 141.839681][ T4238] r4:85b9f928 r3:826c0200 [ 141.839688][ T4238] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 141.839720][ T4238] r9:85b9f900 r8:00000004 r7:20000140 r6:20000140 r5:00008927 r4:85b9f900 [ 141.839728][ T4238] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 141.839750][ T4238] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 141.839778][ T4238] r7:20000140 r6:85b9f901 r5:00000000 r4:00008927 [ 141.839786][ T4238] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 141.839807][ T4238] Exception stack(0xeae95fa8 to 0xeae95ff0) [ 141.839826][ T4238] 5fa0: 00000000 00000000 00000004 00008927 20000140 00000000 [ 141.839843][ T4238] 5fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b080bc [ 141.839855][ T4238] 5fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 141.839871][ T4238] r10:00000036 r9:83ad8c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 141.839880][ T4238] r4:00000000 [ 141.861371][ T4238] ERROR: Out of memory at tomoyo_realpath_from_path. [ 143.991934][ T31] audit: type=1400 audit(143.910:194): avc: denied { connect } for pid=4264 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 144.238447][ T4275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4275 comm=syz.1.156 [ 144.254310][ T31] audit: type=1400 audit(144.170:195): avc: denied { mount } for pid=4274 comm="syz.1.156" name="/" dev="ramfs" ino=4187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 144.604994][ T1799] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 144.771713][ T1799] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 144.775118][ T1799] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 144.779382][ T1799] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 144.780548][ T1799] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 144.788577][ T1799] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 144.789962][ T1799] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 144.790766][ T1799] usb 2-1: Manufacturer: syz [ 144.794679][ T1799] usb 2-1: config 0 descriptor?? [ 145.150248][ T31] audit: type=1400 audit(145.070:196): avc: denied { ioctl } for pid=4277 comm="syz.0.158" path="socket:[3631]" dev="sockfs" ino=3631 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.246211][ T1799] appleir 0003:05AC:8243.0001: unknown main item tag 0x0 [ 145.251670][ T1799] appleir 0003:05AC:8243.0001: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 145.301257][ T31] audit: type=1400 audit(145.220:197): avc: denied { remount } for pid=4277 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 149.119471][ T2865] usb 2-1: USB disconnect, device number 6 [ 149.482880][ T31] audit: type=1400 audit(149.400:198): avc: denied { ioctl } for pid=4353 comm="syz.1.177" path="socket:[3734]" dev="sockfs" ino=3734 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 149.555371][ T31] audit: type=1400 audit(149.480:199): avc: denied { getopt } for pid=4353 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 151.634385][ T23] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 151.785080][ T23] usb 2-1: Using ep0 maxpacket: 16 [ 151.791305][ T23] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 151.792822][ T23] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 151.804672][ T23] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 151.804964][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 151.805285][ T23] usb 2-1: Product: syz [ 151.805505][ T23] usb 2-1: Manufacturer: syz [ 151.805698][ T23] usb 2-1: SerialNumber: syz [ 152.229642][ T23] usb 2-1: cannot find UAC_HEADER [ 152.276695][ T23] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 152.292820][ T23] usb 2-1: USB disconnect, device number 7 [ 152.647799][ T31] audit: type=1400 audit(152.570:200): avc: denied { name_bind } for pid=4416 comm="syz.1.189" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 152.651361][ T31] audit: type=1400 audit(152.570:201): avc: denied { node_bind } for pid=4416 comm="syz.1.189" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 152.758647][ T4420] fuse: Unknown parameter '&dS-mQ [ 152.758647][ T4420] *?}.'y%Y_@t?Tjf z^~ [ 152.758647][ T4420] X#?~a3hlz˦uU5l>(_Q>` 5߹]k"iQ6S' [ 152.777038][ T4421] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 152.782962][ T31] audit: type=1400 audit(152.700:202): avc: denied { name_bind } for pid=4418 comm="syz.0.190" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 153.171352][ T31] audit: type=1400 audit(153.090:203): avc: denied { ioctl } for pid=4419 comm="syz.1.191" path="socket:[3839]" dev="sockfs" ino=3839 ioctlcmd=0x9416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 153.192788][ T31] audit: type=1400 audit(153.110:204): avc: denied { sqpoll } for pid=4419 comm="syz.1.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 153.346142][ T31] audit: type=1400 audit(153.270:205): avc: denied { setattr } for pid=4419 comm="syz.1.191" name="CAN_J1939" dev="sockfs" ino=3838 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 153.360559][ T31] audit: type=1400 audit(153.280:206): avc: denied { write } for pid=4419 comm="syz.1.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 153.393336][ T31] audit: type=1400 audit(153.310:207): avc: denied { accept } for pid=4419 comm="syz.1.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 155.291703][ T4465] fuse: Unknown parameter 'fd +0x0000000000000003' [ 155.355832][ T31] audit: type=1400 audit(155.280:208): avc: denied { create } for pid=4464 comm="syz.0.206" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 155.383232][ T31] audit: type=1400 audit(155.300:209): avc: denied { unlink } for pid=3102 comm="syz-executor" name="file0" dev="tmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 158.765937][ T4496] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4496 comm=syz.1.216 [ 159.907244][ T31] audit: type=1400 audit(159.830:210): avc: denied { write } for pid=4506 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 160.511812][ T31] audit: type=1400 audit(160.430:211): avc: denied { lock } for pid=4517 comm="syz.0.225" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 161.714615][ T4525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1548 sclass=netlink_route_socket pid=4525 comm=syz.1.228 [ 161.717003][ T4525] ======================================================= [ 161.717003][ T4525] WARNING: The mand mount option has been deprecated and [ 161.717003][ T4525] and is ignored by this kernel. Remove the mand [ 161.717003][ T4525] option from the mount to silence this warning. [ 161.717003][ T4525] ======================================================= [ 161.742666][ T31] audit: type=1400 audit(161.660:212): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 162.077798][ T31] audit: type=1400 audit(162.000:213): avc: denied { write } for pid=4533 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 163.019725][ T31] audit: type=1400 audit(162.940:214): avc: denied { watch watch_reads } for pid=4550 comm="syz.1.233" path="/108/file0" dev="tmpfs" ino=589 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 163.137917][ T4553] FAULT_INJECTION: forcing a failure. [ 163.137917][ T4553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 163.138416][ T4553] CPU: 1 UID: 0 PID: 4553 Comm: syz.1.234 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 163.138473][ T4553] Hardware name: ARM-Versatile Express [ 163.138497][ T4553] Call trace: [ 163.138535][ T4553] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 163.138668][ T4553] r7:ecc29e20 r6:00000000 r5:60000013 r4:8225b4f4 [ 163.138690][ T4553] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 163.138770][ T4553] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 163.138900][ T4553] r5:84921800 r4:82950610 [ 163.138957][ T4553] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 163.139026][ T4553] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 163.139156][ T4553] r8:00000804 r7:ecc29e20 r6:20002800 r5:00000000 r4:ecc29f20 [ 163.139193][ T4553] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 163.139245][ T4553] [<80964e18>] (should_fail_usercopy) from [<8152d230>] (copy_msghdr_from_user+0x50/0x130) [ 163.139591][ T4553] [<8152d1e0>] (copy_msghdr_from_user) from [<8152d388>] (___sys_sendmsg+0x78/0xd0) [ 163.139994][ T4553] r8:00000804 r7:00000000 r6:85148c80 r5:ecc29f20 r4:ecc29e64 [ 163.140137][ T4553] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 163.140263][ T4553] r10:00000128 r9:84921800 r8:84854900 r7:00000804 r6:20002800 r5:84854901 [ 163.140358][ T4553] r4:00000004 [ 163.140495][ T4553] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 163.140598][ T4553] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 163.140676][ T4553] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 163.140995][ T4553] Exception stack(0xecc29fa8 to 0xecc29ff0) [ 163.141040][ T4553] 9fa0: 00000000 00000000 00000004 20002800 00000804 00000000 [ 163.141147][ T4553] 9fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b080bc [ 163.141285][ T4553] 9fe0: 76b07ec0 76b07eb0 000193a4 00131fc0 [ 163.624546][ T77] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 163.779676][ T77] usb 2-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 1023 [ 163.780344][ T77] usb 2-1: config 1 interface 0 has no altsetting 0 [ 163.788436][ T77] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 163.788735][ T77] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 163.788905][ T77] usb 2-1: Product: syz [ 163.788970][ T77] usb 2-1: Manufacturer: syz [ 163.789038][ T77] usb 2-1: SerialNumber: syz [ 163.799485][ T4559] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 164.483278][ T4559] syz.1.237 uses obsolete (PF_INET,SOCK_PACKET) [ 164.490231][ T4559] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 164.492970][ T4559] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 164.524296][ T77] usblp 2-1:1.0: usblp0: USB Bidirectional printer dev 8 if 0 alt 2 proto 2 vid 0x0525 pid 0xA4A8 [ 164.530917][ T77] usb 2-1: USB disconnect, device number 8 [ 164.539309][ T77] usblp0: removed [ 164.748988][ T4584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4584 comm=syz.1.240 [ 167.889103][ T4602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4602 comm=syz.0.245 [ 167.904532][ T1799] usb 2-1: new full-speed USB device number 9 using dummy_hcd [ 168.066953][ T1799] usb 2-1: config 0 has no interfaces? [ 168.068222][ T1799] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 168.068527][ T1799] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 168.133193][ T1799] usb 2-1: config 0 descriptor?? [ 168.467445][ T1799] usb 2-1: USB disconnect, device number 9 [ 170.659803][ T4622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4622 comm=syz.1.250 [ 171.148729][ T4628] FAULT_INJECTION: forcing a failure. [ 171.148729][ T4628] name failslab, interval 1, probability 0, space 0, times 0 [ 171.149251][ T4628] CPU: 0 UID: 0 PID: 4628 Comm: syz.0.253 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 171.149324][ T4628] Hardware name: ARM-Versatile Express [ 171.149345][ T4628] Call trace: [ 171.149386][ T4628] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 171.149487][ T4628] r7:84926c00 r6:00000000 r5:60000013 r4:8225b4f4 [ 171.149505][ T4628] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 171.149549][ T4628] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 171.149596][ T4628] r5:84926c00 r4:82919a80 [ 171.149610][ T4628] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 171.149692][ T4628] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 171.149867][ T4628] r8:00000000 r7:84926c00 r6:00000cc0 r5:ffffffff r4:830adb40 [ 171.150198][ T4628] [<8051c1b8>] (should_failslab) from [<805005d8>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 171.150396][ T4628] [<80500588>] (kmem_cache_alloc_node_noprof) from [<81538044>] (__alloc_skb+0x138/0x160) [ 171.150905][ T4628] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:830adb40 r5:ffffffff [ 171.151345][ T4628] r4:828060c0 [ 171.151574][ T4628] [<81537f0c>] (__alloc_skb) from [<81657de0>] (netlink_alloc_large_skb+0x88/0xa0) [ 171.151644][ T4628] r8:00000000 r7:85ca2400 r6:00000014 r5:85148c80 r4:00000140 [ 171.151661][ T4628] [<81657d58>] (netlink_alloc_large_skb) from [<81658520>] (netlink_sendmsg+0x134/0x444) [ 171.151715][ T4628] r5:85148c80 r4:ecf29f20 [ 171.151955][ T4628] [<816583ec>] (netlink_sendmsg) from [<8152ade0>] (__sock_sendmsg+0x44/0x78) [ 171.152063][ T4628] r10:00000000 r9:ecf29dc4 r8:ecf29dc4 r7:00000000 r6:85148c80 r5:ecf29f20 [ 171.152106][ T4628] r4:00000000 [ 171.152152][ T4628] [<8152ad9c>] (__sock_sendmsg) from [<8152b5a0>] (____sys_sendmsg+0x298/0x2cc) [ 171.152233][ T4628] r7:00000000 r6:85148c80 r5:20000000 r4:ecf29f20 [ 171.152292][ T4628] [<8152b308>] (____sys_sendmsg) from [<8152d3ac>] (___sys_sendmsg+0x9c/0xd0) [ 171.152496][ T4628] r10:ecf29e24 r9:20000180 r8:20000000 r7:00000000 r6:85148c80 r5:ecf29f20 [ 171.152520][ T4628] r4:00000000 [ 171.152536][ T4628] [<8152d310>] (___sys_sendmsg) from [<8152d844>] (__sys_sendmsg+0x8c/0xe0) [ 171.152644][ T4628] r10:00000128 r9:84926c00 r8:85d85180 r7:20000000 r6:20000180 r5:85d85181 [ 171.152700][ T4628] r4:00000003 [ 171.152836][ T4628] [<8152d7b8>] (__sys_sendmsg) from [<8152d8ac>] (sys_sendmsg+0x14/0x18) [ 171.152941][ T4628] r8:8020029c r7:00000128 r6:0012ff70 r5:00000000 r4:00000000 [ 171.153087][ T4628] [<8152d898>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 171.153185][ T4628] Exception stack(0xecf29fa8 to 0xecf29ff0) [ 171.153303][ T4628] 9fa0: 00000000 00000000 00000003 20000180 20000000 00000000 [ 171.153339][ T4628] 9fc0: 00000000 00000000 0012ff70 00000128 002e0000 00000000 00006364 76b060bc [ 171.153388][ T4628] 9fe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 175.883436][ T4647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4647 comm=syz.1.260 [ 176.499435][ T31] audit: type=1400 audit(176.420:215): avc: denied { ioctl } for pid=4648 comm="syz.1.261" path="socket:[5209]" dev="sockfs" ino=5209 ioctlcmd=0xaf04 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 176.955782][ T4655] FAULT_INJECTION: forcing a failure. [ 176.955782][ T4655] name failslab, interval 1, probability 0, space 0, times 0 [ 176.956752][ T4655] CPU: 1 UID: 0 PID: 4655 Comm: syz.0.263 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 176.956849][ T4655] Hardware name: ARM-Versatile Express [ 176.956864][ T4655] Call trace: [ 176.956885][ T4655] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 176.956963][ T4655] r7:00000d40 r6:00000000 r5:60000013 r4:8225b4f4 [ 176.956973][ T4655] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 176.957000][ T4655] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 176.957028][ T4655] r5:84921800 r4:82919a80 [ 176.957036][ T4655] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 176.957068][ T4655] [<80964bd8>] (should_fail_ex) from [<8051c224>] (should_failslab+0x6c/0x94) [ 176.957104][ T4655] r8:84921800 r7:00000d40 r6:85b9f328 r5:0000001f r4:83001240 [ 176.957112][ T4655] [<8051c1b8>] (should_failslab) from [<80500fc8>] (__kmalloc_noprof+0x9c/0x458) [ 176.957136][ T4655] [<80500f2c>] (__kmalloc_noprof) from [<807bae3c>] (tomoyo_encode2+0x64/0xf0) [ 176.957172][ T4655] r10:00000fff r9:8309e400 r8:00000000 r7:8342a7f8 r6:85b9f328 r5:8597bffc [ 176.957182][ T4655] r4:8597bfe8 [ 176.957191][ T4655] [<807badd8>] (tomoyo_encode2) from [<807baeec>] (tomoyo_encode+0x24/0x30) [ 176.957223][ T4655] r9:8309e400 r8:00000000 r7:8342a7f8 r6:85b9f328 r5:00001000 r4:8597bfe9 [ 176.957231][ T4655] [<807baec8>] (tomoyo_encode) from [<807baf78>] (tomoyo_realpath_from_path+0x80/0x17c) [ 176.957259][ T4655] r5:00001000 r4:8597b000 [ 176.957266][ T4655] [<807baef8>] (tomoyo_realpath_from_path) from [<807b7078>] (tomoyo_path_number_perm+0xcc/0x22c) [ 176.957304][ T4655] r10:84921800 r9:00000000 r8:00000003 r7:00006410 r6:00000004 r5:81cd6278 [ 176.957315][ T4655] r4:85b9f328 r3:826c0200 [ 176.957323][ T4655] [<807b6fac>] (tomoyo_path_number_perm) from [<807bb958>] (tomoyo_file_ioctl+0x1c/0x20) [ 176.957359][ T4655] r9:85b9f300 r8:00000003 r7:00000000 r6:00000000 r5:00006410 r4:85b9f300 [ 176.957368][ T4655] [<807bb93c>] (tomoyo_file_ioctl) from [<807688dc>] (security_file_ioctl+0x64/0x1e4) [ 176.957395][ T4655] [<80768878>] (security_file_ioctl) from [<80567908>] (sys_ioctl+0x4c/0xdc8) [ 176.957427][ T4655] r7:00000000 r6:85b9f301 r5:00000000 r4:00006410 [ 176.957435][ T4655] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 176.957459][ T4655] Exception stack(0xdfa8dfa8 to 0xdfa8dff0) [ 176.957478][ T4655] dfa0: 00000000 00000000 00000003 00006410 00000000 00000000 [ 176.957499][ T4655] dfc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b060bc [ 176.957516][ T4655] dfe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 176.957536][ T4655] r10:00000036 r9:84921800 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 176.957548][ T4655] r4:00000000 [ 176.970170][ T4655] ERROR: Out of memory at tomoyo_realpath_from_path. [ 179.745196][ T4671] FAULT_INJECTION: forcing a failure. [ 179.745196][ T4671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.745650][ T4671] CPU: 0 UID: 0 PID: 4671 Comm: syz.0.267 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 179.745719][ T4671] Hardware name: ARM-Versatile Express [ 179.745746][ T4671] Call trace: [ 179.745790][ T4671] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 179.745887][ T4671] r7:85630000 r6:00000000 r5:60000013 r4:8225b4f4 [ 179.745906][ T4671] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 179.745954][ T4671] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 179.746172][ T4671] r5:84926c00 r4:82950610 [ 179.746346][ T4671] [<8021fe1c>] (dump_stack) from [<80964d9c>] (should_fail_ex+0x1c4/0x228) [ 179.746504][ T4671] [<80964bd8>] (should_fail_ex) from [<80964e14>] (should_fail+0x14/0x18) [ 179.746665][ T4671] r8:00000003 r7:85630000 r6:20001fc0 r5:20001fc0 r4:82c1c5d0 [ 179.746849][ T4671] [<80964e00>] (should_fail) from [<80964e34>] (should_fail_usercopy+0x1c/0x20) [ 179.746935][ T4671] [<80964e18>] (should_fail_usercopy) from [<818fdea4>] (vlan_ioctl_handler+0x3c/0x4a0) [ 179.747075][ T4671] [<818fde68>] (vlan_ioctl_handler) from [<8152b94c>] (sock_ioctl+0x1f8/0x600) [ 179.747146][ T4671] r9:85d853c0 r8:00000003 r7:85149900 r6:85630000 r5:20001fc0 r4:82c1c5d0 [ 179.747166][ T4671] [<8152b754>] (sock_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 179.747253][ T4671] r9:85d853c0 r8:00000003 r7:20001fc0 r6:85d853c1 r5:00000000 r4:00008982 [ 179.747309][ T4671] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 179.747424][ T4671] Exception stack(0xdfac9fa8 to 0xdfac9ff0) [ 179.747467][ T4671] 9fa0: 00000000 00000000 00000003 00008982 20001fc0 00000000 [ 179.747578][ T4671] 9fc0: 00000000 00000000 0012ff70 00000036 002e0000 00000000 00006364 76b060bc [ 179.747709][ T4671] 9fe0: 76b05ec0 76b05eb0 000193a4 00131fc0 [ 179.747814][ T4671] r10:00000036 r9:84926c00 r8:8020029c r7:00000036 r6:0012ff70 r5:00000000 [ 179.747873][ T4671] r4:00000000 [ 179.897581][ T31] audit: type=1400 audit(179.820:216): avc: denied { bind } for pid=4672 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 179.898097][ T31] audit: type=1400 audit(179.820:217): avc: denied { name_bind } for pid=4672 comm="syz.0.268" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 179.902292][ T31] audit: type=1400 audit(179.820:218): avc: denied { node_bind } for pid=4672 comm="syz.0.268" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 180.442465][ T31] audit: type=1400 audit(180.360:219): avc: denied { ioctl } for pid=4672 comm="syz.0.268" path="socket:[5241]" dev="sockfs" ino=5241 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 181.981049][ T31] audit: type=1400 audit(181.900:220): avc: denied { ioctl } for pid=4686 comm="syz.1.272" path="socket:[4697]" dev="sockfs" ino=4697 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 182.496013][ T31] audit: type=1400 audit(182.420:221): avc: denied { name_bind } for pid=4693 comm="syz.1.275" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 183.784198][ T31] audit: type=1400 audit(183.700:222): avc: denied { map } for pid=4702 comm="syz.1.279" path="socket:[5292]" dev="sockfs" ino=5292 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.784900][ T31] audit: type=1400 audit(183.700:223): avc: denied { read } for pid=4702 comm="syz.1.279" path="socket:[5292]" dev="sockfs" ino=5292 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 185.739606][ T4721] pim6reg1: entered promiscuous mode [ 185.740824][ T4721] pim6reg1: entered allmulticast mode [ 185.926075][ T4728] pim6reg1: entered promiscuous mode [ 185.927365][ T4728] pim6reg1: entered allmulticast mode [ 199.359550][ T4829] pim6reg1: entered promiscuous mode [ 199.376665][ T4829] pim6reg1: entered allmulticast mode [ 201.046462][ T4840] pim6reg1: entered promiscuous mode [ 201.050881][ T4840] pim6reg1: entered allmulticast mode [ 208.211352][ T4897] pim6reg1: entered promiscuous mode [ 208.212658][ T4897] pim6reg1: entered allmulticast mode [ 211.186845][ T4916] pim6reg1: entered promiscuous mode [ 211.190092][ T4916] pim6reg1: entered allmulticast mode [ 213.544120][ T31] audit: type=1400 audit(213.450:224): avc: denied { relabelfrom } for pid=4932 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 213.545548][ T31] audit: type=1400 audit(213.460:225): avc: denied { relabelto } for pid=4932 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 214.830193][ T4947] pim6reg1: entered promiscuous mode [ 214.831765][ T4947] pim6reg1: entered allmulticast mode [ 224.560239][ T5017] pim6reg1: entered promiscuous mode [ 224.561601][ T5017] pim6reg1: entered allmulticast mode [ 228.309309][ T5035] pim6reg1: entered promiscuous mode [ 228.310056][ T5035] pim6reg1: entered allmulticast mode [ 242.181952][ T3168] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 242.408164][ T3168] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 242.496313][ T3168] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 242.573052][ T3168] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.844994][ T3168] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 245.031752][ T3168] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 245.048854][ T3168] bond0 (unregistering): Released all slaves [ 245.274915][ T3168] hsr_slave_0: left promiscuous mode [ 245.277825][ T3168] hsr_slave_1: left promiscuous mode [ 245.298117][ T3168] veth1_macvtap: left promiscuous mode [ 245.298814][ T3168] veth0_macvtap: left promiscuous mode [ 245.299339][ T3168] veth1_vlan: left promiscuous mode [ 245.299819][ T3168] veth0_vlan: left promiscuous mode [ 246.705971][ T5048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.711325][ T5048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.955744][ T5048] hsr_slave_0: entered promiscuous mode [ 248.957758][ T5048] hsr_slave_1: entered promiscuous mode [ 248.958969][ T5048] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 248.959251][ T5048] Cannot create hsr debugfs directory [ 249.851656][ T5048] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 249.865312][ T5048] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 249.881134][ T5048] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 249.906464][ T5048] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 252.028169][ T5048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.616113][ T5519] pim6reg1: entered promiscuous mode [ 257.616428][ T5519] pim6reg1: entered allmulticast mode [ 258.596677][ T5536] wg2: entered promiscuous mode [ 258.597826][ T5536] wg2: entered allmulticast mode [ 259.898256][ T5048] veth0_vlan: entered promiscuous mode [ 260.066456][ T5048] veth1_vlan: entered promiscuous mode [ 260.169697][ T5048] veth0_macvtap: entered promiscuous mode [ 260.208121][ T5048] veth1_macvtap: entered promiscuous mode [ 260.345950][ T5048] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.346392][ T5048] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.346734][ T5048] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.346990][ T5048] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.350914][ T31] audit: type=1400 audit(267.270:226): avc: denied { create } for pid=5605 comm="syz.2.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 271.762162][ T5627] pim6reg1: entered promiscuous mode [ 271.764964][ T5627] pim6reg1: entered allmulticast mode [ 280.977811][ T5663] wg2: entered promiscuous mode [ 280.978323][ T5663] wg2: entered allmulticast mode [ 281.555150][ T5665] pim6reg1: entered promiscuous mode [ 281.564807][ T5665] pim6reg1: entered allmulticast mode [ 282.744418][ T5671] pim6reg1: entered promiscuous mode [ 282.749635][ T5671] pim6reg1: entered allmulticast mode [ 291.343885][ C0] hrtimer: interrupt took 9224208 ns [ 309.219086][ T5781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.224033][ T5781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.714205][ T5781] hsr_slave_0: entered promiscuous mode [ 311.716197][ T5781] hsr_slave_1: entered promiscuous mode [ 311.720311][ T5781] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 311.720952][ T5781] Cannot create hsr debugfs directory [ 313.051952][ T5781] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 313.077892][ T5781] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 313.101477][ T5781] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 313.125986][ T5781] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 315.249699][ T5781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.961511][ T5781] veth0_vlan: entered promiscuous mode [ 322.071804][ T5781] veth1_vlan: entered promiscuous mode [ 322.371137][ T5781] veth0_macvtap: entered promiscuous mode [ 322.383128][ T5781] veth1_macvtap: entered promiscuous mode [ 322.848600][ T6227] pim6reg1: entered promiscuous mode [ 322.848847][ T6227] pim6reg1: entered allmulticast mode [ 322.906401][ T5781] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.906701][ T5781] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.906932][ T5781] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.907066][ T5781] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.388799][ T6235] syzkaller0: create flow: hash 1841873154 index 1 [ 323.443808][ T6235] syzkaller0: delete flow: hash 1841873154 index 1 [ 326.653108][ T6292] Driver unsupported XDP return value 0 on prog (id 201) dev N/A, expect packet loss! [ 349.787648][ T6371] syzkaller0: tun_chr_ioctl cmd 1074025678 [ 349.797427][ T6371] syzkaller0: group set to 0 [ 354.367403][ T6428] *** NOT YET: opcode c3 *** [ 358.727202][ T6457] wg2: left promiscuous mode [ 358.728294][ T6457] wg2: left allmulticast mode [ 358.849444][ T6457] wg2: entered promiscuous mode [ 358.850415][ T6457] wg2: entered allmulticast mode [ 358.965255][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.122289][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.300925][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.386921][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.050655][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 360.094994][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 360.098854][ T12] bond0 (unregistering): Released all slaves [ 360.203010][ T12] hsr_slave_0: left promiscuous mode [ 360.208852][ T12] hsr_slave_1: left promiscuous mode [ 360.234757][ T12] veth1_macvtap: left promiscuous mode [ 360.235219][ T12] veth0_macvtap: left promiscuous mode [ 360.235714][ T12] veth1_vlan: left promiscuous mode [ 360.236031][ T12] veth0_vlan: left promiscuous mode [ 363.091104][ T6512] nvme_fabrics: missing parameter 'transport=%s' [ 363.091581][ T6512] nvme_fabrics: missing parameter 'nqn=%s' [ 363.307689][ T6516] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 363.326885][ T6516] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 363.421185][ T6512] nvme_fabrics: missing parameter 'transport=%s' [ 363.421614][ T6512] nvme_fabrics: missing parameter 'nqn=%s' [ 367.007540][ T6542] syzkaller0: entered promiscuous mode [ 367.009276][ T6542] syzkaller0: entered allmulticast mode [ 368.464284][ T31] audit: type=1400 audit(368.380:227): avc: denied { setopt } for pid=6570 comm="syz.2.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 369.205631][ T6583] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 369.224769][ T6583] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 372.440042][ T31] audit: type=1400 audit(372.360:228): avc: denied { getopt } for pid=6603 comm="syz.2.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 373.280304][ T6619] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 373.292052][ T6619] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 374.627068][ T6636] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 374.627584][ T6636] IPv6: NLM_F_CREATE should be set when creating new route [ 377.885514][ T31] audit: type=1400 audit(377.760:229): avc: denied { map } for pid=6639 comm="syz.3.562" path="socket:[8132]" dev="sockfs" ino=8132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 377.885996][ T31] audit: type=1400 audit(377.770:230): avc: denied { read } for pid=6639 comm="syz.3.562" path="socket:[8132]" dev="sockfs" ino=8132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 379.419996][ T6660] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 379.422830][ T6660] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 380.157913][ T6668] 8021q: VLANs not supported on gre0 [ 381.556094][ T6680] netlink: 228 bytes leftover after parsing attributes in process `syz.3.576'. [ 381.905697][ T6686] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 381.916046][ T6686] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 382.196442][ T31] audit: type=1400 audit(382.120:231): avc: denied { setopt } for pid=6689 comm="syz.3.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 382.930051][ T6691] ------------[ cut here ]------------ [ 382.930783][ T6691] WARNING: CPU: 0 PID: 6691 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 382.935678][ T6691] Modules linked in: [ 382.936801][ T6691] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 382.938007][ T6691] CPU: 0 UID: 0 PID: 6691 Comm: syz.3.578 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 382.938740][ T6691] Hardware name: ARM-Versatile Express [ 382.939002][ T6691] Call trace: [ 382.939217][ T6691] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 382.939601][ T6691] r7:00000000 r6:8282083c r5:00000000 r4:8225b4f4 [ 382.939845][ T6691] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 382.940284][ T6691] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 382.940689][ T6691] r5:00000000 r4:82a6dd18 [ 382.940932][ T6691] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 382.941399][ T6691] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 382.941724][ T6691] r3:8280c684 r2:00000001 r1:8224203c r0:822499d4 [ 382.942000][ T6691] r7:804bc144 [ 382.942201][ T6691] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 382.942584][ T6691] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 382.942993][ T6691] r8:00000009 r7:822752cc r6:dfd75d1c r5:83ae0c00 r4:00000000 [ 382.943360][ T6691] [<802587e8>] (warn_slowpath_fmt) from [<804bc144>] (kunmap_local_indexed+0x20c/0x224) [ 382.944133][ T6691] r10:00000000 r9:deccc9d4 r8:decd7e74 r7:00a00000 r6:00000003 r5:83ae0c00 [ 382.944561][ T6691] r4:ffefd000 [ 382.944725][ T6691] [<804bbf38>] (kunmap_local_indexed) from [<805373a8>] (move_pages+0xb24/0x19c8) [ 382.945205][ T6691] r7:00a00000 r6:fffffff0 r5:85ac171c r4:85cfdb00 [ 382.945471][ T6691] [<80536884>] (move_pages) from [<805be4dc>] (userfaultfd_ioctl+0xff8/0x21c4) [ 382.945845][ T6691] r10:85cfdb00 r9:dfd75e98 r8:21000000 r7:00000001 r6:00000000 r5:20000100 [ 382.946369][ T6691] r4:85fe5000 [ 382.946536][ T6691] [<805bd4e4>] (userfaultfd_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 382.947115][ T6691] r10:83ae0c00 r9:85c519c0 r8:00000003 r7:20000100 r6:85c519c1 r5:00000000 [ 382.947620][ T6691] r4:c028aa05 [ 382.947862][ T6691] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 382.948327][ T6691] Exception stack(0xdfd75fa8 to 0xdfd75ff0) [ 382.948624][ T6691] 5fa0: 00000000 00000000 00000003 c028aa05 20000100 00000000 [ 382.948984][ T6691] 5fc0: 00000000 00000000 002f6398 00000036 002e0000 00000000 00006364 76b220bc [ 382.949350][ T6691] 5fe0: 76b21ec0 76b21eb0 000193a4 00131fc0 [ 382.949615][ T6691] r10:00000036 r9:83ae0c00 r8:8020029c r7:00000036 r6:002f6398 r5:00000000 [ 382.950029][ T6691] r4:00000000 [ 382.952578][ T6691] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:57:19 Registers: info registers vcpu 0 CPU#0 R00=84b5c040 R01=00000020 R02=eb85b000 R03=eb85b018 R04=82ab1134 R05=84b5c040 R06=80a6a888 R07=82ab113c R08=82828458 R09=00000000 R10=0000062f R11=dfd75a8c R12=00000002 R13=dfd75a80 R14=8295a27c R15=80a6a898 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00a95570 R01=00a95570 R02=ffffffff R03=ffffffff R04=00a95570 R05=ffffffff R06=00a8a1d8 R07=00000009 R08=00000009 R09=00000001 R10=00000000 R11=00000003 R12=00000000 R13=7ee110e0 R14=004ea7ac R15=004dc5b0 PSR=60010010 -ZC- A S usr32 s00=fffff708 s01=ffffffff d00=fffffffffffff708 s02=4701ffff s03=03004c50 d01=03004c504701ffff s04=01ffffff s05=6572666b d02=6572666b01ffffff s06=90030065 s07=02080615 d03=0208061590030065 s08=03010000 s09=08001598 d04=0800159803010000 s10=15a00300 s11=d80e1000 d05=d80e100015a00300 s12=00060101 s13=80022208 d06=8002220800060101 s14=30080015 s15=0a013e90 d07=0a013e9030080015 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=001bd003 s33=d8030008 d16=d8030008001bd003 s34=0008001b s35=001be003 d17=001be0030008001b s36=e8030008 s37=0008001b d18=0008001be8030008 s38=041bf003 s39=ffffffff d19=ffffffff041bf003 s40=1c800303 s41=ffffff04 d20=ffffff041c800303 s42=900303ff s43=0008001c d21=0008001c900303ff s44=001c9803 s45=a0030008 d22=a0030008001c9803 s46=0008001c s47=0602028c d23=0602028c0008001c s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=fcf92d86 s53=2961195b d26=2961195bfcf92d86 s54=0efc66c9 s55=3b1a602a d27=3b1a602a0efc66c9 s56=22eaa833 s57=c1144576 d28=c114457622eaa833 s58=54cf5031 s59=27a9dcf9 d29=27a9dcf954cf5031 s60=cc5717e3 s61=2c8cf60a d30=2c8cf60acc5717e3 s62=a5aa5c34 s63=d1955afb d31=d1955afba5aa5c34 FPSCR: 00000000