last executing test programs: 3.863670528s ago: executing program 0 (id=326): syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x28, 0xec, 0x1d, 0x8, 0x1b3d, 0x16d, 0x9493, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x9c, 0x0, 0x0, 0xa, 0xef, 0xb1}}]}}]}}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000280)={0x3ff}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) 3.303447181s ago: executing program 1 (id=328): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000680)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000200000008000b00000000000a000900aaaaaaaaaaaa000008000300", @ANYRES32=r4], 0x30}}, 0x0) 2.581117414s ago: executing program 0 (id=329): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r1, r2, 0x5, 0x0, 0x0, @void, @value}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 2.251781085s ago: executing program 0 (id=330): r0 = semget$private(0x0, 0x4000000009, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x4, 0x83a9, 0x800}], 0x1, 0x0) 2.029758916s ago: executing program 0 (id=331): r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1c) 2.029408756s ago: executing program 1 (id=332): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x29, 0x0, &(0x7f0000695ffc)) syz_io_uring_submit(r1, 0x0, 0x0) 1.871080544s ago: executing program 0 (id=333): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000006c0)={0x0, 0x4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="42c064fa71bab4b200000000e7e9ffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fc"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) 1.742481319s ago: executing program 1 (id=334): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x1b, 0x2e, 0x0, 0x1, {0xc}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x44}}, 0x0) 929.730438ms ago: executing program 0 (id=335): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x100120}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x2000000000000}, 0x700) 929.485488ms ago: executing program 1 (id=336): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) mount_setattr(0xffffffffffffffff, &(0x7f0000000180)='.\x00', 0x0, &(0x7f0000001dc0)={0x0, 0x0, 0x100000}, 0x20) 535.634301ms ago: executing program 1 (id=337): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) setrlimit(0x40000000000008, &(0x7f0000000000)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) 0s ago: executing program 1 (id=338): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000080)={0x1d, r3}, 0x18) r4 = dup(r2) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0xc0}, 0x33fe0}}, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x16f47e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r5, 0x0) kernel console output (not intermixed with test programs): [ 51.187251][ T31] audit: type=1400 audit(51.120:68): avc: denied { read write } for pid=3103 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.207827][ T31] audit: type=1400 audit(51.140:69): avc: denied { open } for pid=3103 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:57915' (ED25519) to the list of known hosts. [ 62.964253][ T31] audit: type=1400 audit(62.890:70): avc: denied { name_bind } for pid=3104 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.972742][ T31] audit: type=1400 audit(64.910:71): avc: denied { execute } for pid=3106 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.977342][ T31] audit: type=1400 audit(64.920:72): avc: denied { execute_no_trans } for pid=3106 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.215320][ T31] audit: type=1400 audit(68.150:73): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.219572][ T31] audit: type=1400 audit(68.160:74): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.234079][ T3106] cgroup: Unknown subsys name 'net' [ 68.243261][ T31] audit: type=1400 audit(68.180:75): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.456283][ T3106] cgroup: Unknown subsys name 'hugetlb' [ 68.459321][ T3106] cgroup: Unknown subsys name 'rlimit' [ 68.711530][ T31] audit: type=1400 audit(68.650:76): avc: denied { setattr } for pid=3106 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.713167][ T31] audit: type=1400 audit(68.650:77): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.714178][ T31] audit: type=1400 audit(68.650:78): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.854402][ T3108] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.855531][ T31] audit: type=1400 audit(68.790:79): avc: denied { relabelto } for pid=3108 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.863380][ T31] audit: type=1400 audit(68.800:80): avc: denied { write } for pid=3108 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.890188][ T31] audit: type=1400 audit(68.830:81): avc: denied { read } for pid=3106 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.890835][ T31] audit: type=1400 audit(68.830:82): avc: denied { open } for pid=3106 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.118736][ T3106] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.203045][ T31] audit: type=1400 audit(77.140:83): avc: denied { execmem } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.267057][ T31] audit: type=1400 audit(77.200:84): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 77.267771][ T31] audit: type=1400 audit(77.200:85): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 77.268928][ T31] audit: type=1400 audit(77.210:86): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.269370][ T31] audit: type=1400 audit(77.210:87): avc: denied { read } for pid=3111 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.269968][ T31] audit: type=1400 audit(77.210:88): avc: denied { open } for pid=3111 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.277375][ T31] audit: type=1400 audit(77.210:89): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.291218][ T31] audit: type=1400 audit(77.230:90): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.376460][ T31] audit: type=1400 audit(77.310:91): avc: denied { sys_module } for pid=3111 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.228380][ T31] audit: type=1400 audit(78.160:92): avc: denied { ioctl } for pid=3112 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.452640][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.475732][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.481999][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.510537][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.385272][ T3111] hsr_slave_0: entered promiscuous mode [ 80.389618][ T3111] hsr_slave_1: entered promiscuous mode [ 80.488778][ T3112] hsr_slave_0: entered promiscuous mode [ 80.492888][ T3112] hsr_slave_1: entered promiscuous mode [ 80.494766][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.495296][ T3112] Cannot create hsr debugfs directory [ 80.855280][ T3111] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.866265][ T3111] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.883332][ T3111] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.898376][ T3111] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.962133][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.977646][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.985525][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.002686][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.603746][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.658087][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.401614][ T3112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.629843][ T3111] veth0_vlan: entered promiscuous mode [ 84.643819][ T3111] veth1_vlan: entered promiscuous mode [ 84.688639][ T3111] veth0_macvtap: entered promiscuous mode [ 84.696993][ T3111] veth1_macvtap: entered promiscuous mode [ 84.739968][ T3111] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.740855][ T3111] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.741249][ T3111] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.741584][ T3111] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.870111][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 84.870193][ T31] audit: type=1400 audit(84.810:96): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.872970][ T31] audit: type=1400 audit(84.810:97): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.UAgIKy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.878921][ T3112] veth0_vlan: entered promiscuous mode [ 84.881116][ T31] audit: type=1400 audit(84.810:98): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.889268][ T31] audit: type=1400 audit(84.830:99): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.892321][ T31] audit: type=1400 audit(84.830:100): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.893289][ T3112] veth1_vlan: entered promiscuous mode [ 84.895571][ T31] audit: type=1400 audit(84.830:101): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.955150][ T3112] veth0_macvtap: entered promiscuous mode [ 84.962576][ T3112] veth1_macvtap: entered promiscuous mode [ 85.008827][ T31] audit: type=1400 audit(84.950:102): avc: denied { read write } for pid=3111 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.019000][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.019392][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.019574][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.019810][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.023646][ T31] audit: type=1400 audit(84.950:103): avc: denied { open } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.025458][ T31] audit: type=1400 audit(84.950:104): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.147932][ T31] audit: type=1400 audit(85.090:105): avc: denied { map_create } for pid=3791 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.748999][ T3839] fuse: Bad value for 'user_id' [ 89.749492][ T3839] fuse: Bad value for 'user_id' [ 90.349995][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 90.350100][ T31] audit: type=1326 audit(90.290:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 90.359601][ T31] audit: type=1326 audit(90.300:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=263 compat=0 ip=0x132da0 code=0x7ffc0000 [ 90.364380][ T31] audit: type=1326 audit(90.300:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 90.396342][ T31] audit: type=1326 audit(90.330:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 90.718824][ T3853] fuse: Bad value for 'fd' [ 90.899187][ T31] audit: type=1400 audit(90.840:159): avc: denied { write } for pid=3854 comm="syz.1.23" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.158131][ T31] audit: type=1326 audit(91.100:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 91.161606][ T31] audit: type=1326 audit(91.100:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 91.170344][ T31] audit: type=1326 audit(91.100:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132da0 code=0x7ffc0000 [ 91.171364][ T31] audit: type=1326 audit(91.110:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 91.172049][ T31] audit: type=1326 audit(91.110:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 91.240401][ T3860] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 91.603971][ T3868] fuse: Bad value for 'fd' [ 92.667850][ T3881] netlink: 4 bytes leftover after parsing attributes in process `syz.0.32'. [ 92.720659][ T3881] netlink: 'syz.0.32': attribute type 32 has an invalid length. [ 92.721227][ T3881] netlink: 8 bytes leftover after parsing attributes in process `syz.0.32'. [ 92.724246][ T3881] (unnamed net_device) (uninitialized): Setting coupled_control to off (0) [ 92.782758][ T3884] fuse: Bad value for 'fd' [ 95.917425][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 95.917529][ T31] audit: type=1400 audit(95.850:178): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 96.587934][ T3932] fuse: Bad value for 'fd' [ 101.940950][ T3948] fuse: Bad value for 'fd' [ 102.870410][ T31] audit: type=1400 audit(102.810:179): avc: denied { execute } for pid=3949 comm="syz.1.44" path="/21/cpu.stat" dev="tmpfs" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 102.878699][ T31] audit: type=1400 audit(102.820:180): avc: denied { create } for pid=3949 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.905846][ T31] audit: type=1400 audit(102.840:181): avc: denied { setopt } for pid=3949 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 103.387766][ T31] audit: type=1400 audit(103.320:182): avc: denied { watch } for pid=3951 comm="syz.1.45" path="/22/control" dev="tmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 103.964037][ T3954] syz.1.46 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 104.859383][ T3956] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 104.924243][ T31] audit: type=1400 audit(104.860:183): avc: denied { mounton } for pid=3955 comm="syz.1.47" path="/proc/55/task" dev="proc" ino=2730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 105.007325][ T3956] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 105.245215][ T31] audit: type=1400 audit(105.180:184): avc: denied { setopt } for pid=3955 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.797639][ T3959] fuse: Bad value for 'fd' [ 106.099207][ T31] audit: type=1400 audit(106.040:185): avc: denied { create } for pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.127094][ T31] audit: type=1400 audit(106.040:186): avc: denied { setopt } for pid=3960 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.128160][ T31] audit: type=1400 audit(106.060:187): avc: denied { write } for pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.448622][ T31] audit: type=1326 audit(106.390:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 106.735358][ T3969] fuse: Invalid rootmode [ 108.253901][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 108.253985][ T31] audit: type=1326 audit(108.190:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 108.256463][ T31] audit: type=1326 audit(108.190:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 108.896043][ T3986] fuse: Invalid rootmode [ 109.680921][ T3998] netlink: 8 bytes leftover after parsing attributes in process `syz.1.64'. [ 109.723942][ T3998] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.842248][ T3998] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.992271][ T3998] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.101496][ T3998] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.322639][ T3998] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.371235][ T3998] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.420977][ T3998] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.464504][ T3998] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.870471][ T4021] fuse: Invalid rootmode [ 111.082101][ T31] audit: type=1400 audit(111.020:199): avc: denied { bind } for pid=4022 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 111.091313][ T31] audit: type=1400 audit(111.030:200): avc: denied { setopt } for pid=4022 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.117273][ T31] audit: type=1400 audit(112.050:201): avc: denied { ioctl } for pid=4022 comm="syz.1.66" path="socket:[2817]" dev="sockfs" ino=2817 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 114.845628][ T4040] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 115.052174][ T4043] fuse: Bad value for 'rootmode' [ 116.531917][ T31] audit: type=1400 audit(116.470:202): avc: denied { create } for pid=4054 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 116.534949][ T31] audit: type=1400 audit(116.470:203): avc: denied { write } for pid=4054 comm="+}[@" path="socket:[3145]" dev="sockfs" ino=3145 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 116.535914][ T31] audit: type=1400 audit(116.470:204): avc: denied { nlmsg_read } for pid=4054 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 116.731619][ T4058] fuse: Unknown parameter 'use00000000000000000000' [ 119.012334][ T4080] block device autoloading is deprecated and will be removed. [ 119.013539][ T4080] syz.1.83: attempt to access beyond end of device [ 119.013539][ T4080] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 119.362597][ T4087] fuse: Unknown parameter 'group_id00000000000000000000' [ 119.637009][ T31] audit: type=1400 audit(119.560:205): avc: denied { ioctl } for pid=4088 comm="syz.1.86" path="socket:[3185]" dev="sockfs" ino=3185 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.269558][ T4098] syz.1.89 uses obsolete (PF_INET,SOCK_PACKET) [ 121.652020][ T31] audit: type=1400 audit(121.590:206): avc: denied { create } for pid=4100 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 121.662214][ T31] audit: type=1400 audit(121.600:207): avc: denied { getopt } for pid=4100 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 121.670059][ T31] audit: type=1400 audit(121.600:208): avc: denied { connect } for pid=4100 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 121.680761][ T31] audit: type=1400 audit(121.610:209): avc: denied { name_connect } for pid=4100 comm="syz.1.90" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 122.439505][ T4108] fuse: Bad value for 'user_id' [ 122.439898][ T4108] fuse: Bad value for 'user_id' [ 122.862543][ T31] audit: type=1326 audit(122.800:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4112 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.863652][ T31] audit: type=1326 audit(122.800:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4112 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.864469][ T31] audit: type=1326 audit(122.800:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4112 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.882228][ T31] audit: type=1326 audit(122.800:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4112 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.882974][ T31] audit: type=1326 audit(122.800:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4112 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 123.057791][ T31] audit: type=1400 audit(122.980:215): avc: denied { mounton } for pid=4116 comm="syz.1.95" path="/63/file0" dev="tmpfs" ino=347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 124.888048][ T4129] fuse: Bad value for 'user_id' [ 124.888441][ T4129] fuse: Bad value for 'user_id' [ 129.816308][ T31] audit: type=1400 audit(129.750:216): avc: denied { create } for pid=4159 comm="syz.0.110" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 130.989332][ T31] audit: type=1400 audit(130.930:217): avc: denied { setopt } for pid=4175 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 131.254861][ T31] audit: type=1400 audit(131.190:218): avc: denied { create } for pid=4178 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 131.649373][ T4181] Zero length message leads to an empty skb [ 132.399521][ T31] audit: type=1326 audit(132.340:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.402015][ T31] audit: type=1326 audit(132.340:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.408352][ T31] audit: type=1326 audit(132.350:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.426147][ T31] audit: type=1326 audit(132.360:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.429956][ T31] audit: type=1326 audit(132.360:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.430802][ T31] audit: type=1326 audit(132.360:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 132.431428][ T31] audit: type=1326 audit(132.360:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.121" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 134.409637][ T4226] netlink: 16 bytes leftover after parsing attributes in process `syz.1.129'. [ 134.966118][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 134.967797][ T31] audit: type=1400 audit(134.900:230): avc: denied { create } for pid=4234 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 135.014100][ T31] audit: type=1400 audit(134.950:231): avc: denied { map } for pid=4234 comm="+}[@" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3387 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.015109][ T31] audit: type=1400 audit(134.950:232): avc: denied { read write } for pid=4234 comm="+}[@" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3387 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.110720][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.111131][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.111358][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.111563][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.111745][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.111961][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.112183][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.113767][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.115765][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.122477][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.122902][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.123289][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.123736][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.123997][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.124264][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.124660][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.125031][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.125409][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.125800][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.126187][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.126518][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.127567][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.127889][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.128406][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.128770][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.129012][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.129297][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.129529][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.129773][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.130061][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.130357][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.130650][ T4200] hid-generic 0048:0000:0000.0001: unknown main item tag 0x0 [ 135.134573][ T4200] hid-generic 0048:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 135.490490][ T4200] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 135.506999][ C1] hrtimer: interrupt took 2512592 ns [ 135.717580][ T4200] usb 2-1: device descriptor read/64, error -71 [ 136.027760][ T4200] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 136.201906][ T4200] usb 2-1: device descriptor read/64, error -71 [ 136.324104][ T4200] usb usb2-port1: attempt power cycle [ 136.747103][ T4200] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 136.797509][ T4200] usb 2-1: device descriptor read/8, error -71 [ 137.108684][ T4200] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 137.177708][ T4200] usb 2-1: device descriptor read/8, error -71 [ 137.298576][ T4200] usb usb2-port1: unable to enumerate USB device [ 139.344475][ T31] audit: type=1326 audit(139.280:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.346223][ T31] audit: type=1326 audit(139.280:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.368038][ T31] audit: type=1326 audit(139.310:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.380938][ T31] audit: type=1326 audit(139.310:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.401554][ T31] audit: type=1326 audit(139.340:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.447314][ T31] audit: type=1326 audit(139.350:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 139.467767][ T31] audit: type=1326 audit(139.370:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 140.735455][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 140.735524][ T31] audit: type=1400 audit(140.670:247): avc: denied { name_bind } for pid=4273 comm="syz.0.140" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 140.736121][ T31] audit: type=1400 audit(140.670:248): avc: denied { node_bind } for pid=4273 comm="syz.0.140" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 145.736387][ T31] audit: type=1400 audit(145.660:249): avc: denied { setopt } for pid=4285 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.738099][ T31] audit: type=1400 audit(145.670:250): avc: denied { bind } for pid=4285 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.738638][ T31] audit: type=1400 audit(145.670:251): avc: denied { name_bind } for pid=4285 comm="syz.1.142" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 145.739683][ T31] audit: type=1400 audit(145.670:252): avc: denied { node_bind } for pid=4285 comm="syz.1.142" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 156.321407][ T4314] netlink: 'syz.1.149': attribute type 9 has an invalid length. [ 156.542505][ T4316] fuse: Bad value for 'rootmode' [ 162.474363][ T4330] netlink: 16 bytes leftover after parsing attributes in process `syz.1.155'. [ 167.922260][ T31] audit: type=1400 audit(167.860:253): avc: denied { create } for pid=4341 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 167.962449][ T31] audit: type=1400 audit(167.900:254): avc: denied { write } for pid=4341 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 169.989403][ T4348] fuse: Unknown parameter 'fd00000000000000000000003' [ 176.759835][ T4432] fuse: Unknown parameter 'fd00000000000000000000003' [ 177.109809][ T31] audit: type=1326 audit(177.040:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4433 comm="syz.1.168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 177.113111][ T31] audit: type=1326 audit(177.050:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4433 comm="syz.1.168" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132da0 code=0x7ffc0000 [ 177.114024][ T31] audit: type=1326 audit(177.050:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4433 comm="syz.1.168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 177.118326][ T31] audit: type=1326 audit(177.050:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4433 comm="syz.1.168" exe="/syz-executor" sig=0 arch=40000028 syscall=141 compat=0 ip=0x132da0 code=0x7ffc0000 [ 177.137125][ T31] audit: type=1326 audit(177.070:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4433 comm="syz.1.168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 179.449487][ T4354] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.474545][ T4354] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.615202][ T3712] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.763368][ T3712] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.828092][ T31] audit: type=1400 audit(181.770:260): avc: denied { write } for pid=4560 comm="syz.1.173" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 181.838154][ T3712] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.943232][ T3712] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.305102][ T31] audit: type=1400 audit(182.240:261): avc: denied { getopt } for pid=4600 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.526607][ T3712] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 182.557744][ T3712] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 182.562048][ T3712] bond0 (unregistering): Released all slaves [ 182.574690][ T3712] bond1 (unregistering): Released all slaves [ 182.707790][ T3712] hsr_slave_0: left promiscuous mode [ 182.720516][ T3712] hsr_slave_1: left promiscuous mode [ 182.726306][ T3712] veth1_macvtap: left promiscuous mode [ 182.727338][ T3712] veth0_macvtap: left promiscuous mode [ 182.727759][ T3712] veth1_vlan: left promiscuous mode [ 182.728152][ T3712] veth0_vlan: left promiscuous mode [ 183.698128][ T4354] hsr_slave_0: entered promiscuous mode [ 183.710818][ T4354] hsr_slave_1: entered promiscuous mode [ 183.717912][ T4354] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 183.718405][ T4354] Cannot create hsr debugfs directory [ 184.690240][ T4354] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 184.699003][ T4354] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 184.703247][ T4354] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 184.719041][ T4354] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 186.429633][ T4354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.394955][ T31] audit: type=1400 audit(187.330:262): avc: denied { create } for pid=4768 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 187.410957][ T31] audit: type=1400 audit(187.350:263): avc: denied { sys_admin } for pid=4768 comm="syz.1.180" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 194.269737][ T4816] syz.1.191[4816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.270831][ T4816] syz.1.191[4816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.120503][ T31] audit: type=1400 audit(197.060:264): avc: denied { sqpoll } for pid=4837 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 197.271392][ T4841] fuse: Unknown parameter 'user_id00000000000000000000' [ 197.439492][ T4354] veth0_vlan: entered promiscuous mode [ 197.459544][ T4354] veth1_vlan: entered promiscuous mode [ 197.532565][ T4354] veth0_macvtap: entered promiscuous mode [ 197.544159][ T4354] veth1_macvtap: entered promiscuous mode [ 197.675480][ T4354] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.677718][ T4354] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.678043][ T4354] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.678331][ T4354] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.820018][ T31] audit: type=1326 audit(197.760:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 197.821159][ T31] audit: type=1326 audit(197.760:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 197.821782][ T31] audit: type=1326 audit(197.760:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.202" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x132da0 code=0x7ffc0000 [ 197.839100][ T31] audit: type=1326 audit(2000000000.000:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 198.117939][ T31] audit: type=1400 audit(2000000000.280:269): avc: denied { shutdown } for pid=4846 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 198.131769][ T31] audit: type=1400 audit(2000000000.300:270): avc: denied { name_connect } for pid=4846 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 198.372652][ T4851] fuse: Unknown parameter 'user_id00000000000000000000' [ 199.267941][ T4864] fuse: Unknown parameter 'user_id00000000000000000000' [ 199.732152][ T31] audit: type=1326 audit(2000000001.900:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4867 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 199.757217][ T31] audit: type=1326 audit(2000000001.900:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4867 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 199.758237][ T31] audit: type=1326 audit(2000000001.900:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4867 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132da0 code=0x7ffc0000 [ 200.470595][ T4874] fuse: Bad value for 'fd' [ 200.892146][ T4878] IPv6: NLM_F_CREATE should be specified when creating new route [ 202.758570][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 202.758670][ T31] audit: type=1326 audit(2000000004.930:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 202.760020][ T31] audit: type=1326 audit(2000000004.930:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 202.784382][ T31] audit: type=1326 audit(2000000004.950:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x132da0 code=0x7ffc0000 [ 202.785304][ T31] audit: type=1326 audit(2000000004.950:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 202.786379][ T31] audit: type=1326 audit(2000000004.950:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 202.889293][ T31] audit: type=1400 audit(2000000005.060:285): avc: denied { write } for pid=4859 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 204.625102][ T31] audit: type=1400 audit(2000000006.790:286): avc: denied { create } for pid=4899 comm="syz.0.226" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 204.665991][ T31] audit: type=1400 audit(2000000006.830:287): avc: denied { write } for pid=4899 comm="syz.0.226" name="file0" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 204.668465][ T31] audit: type=1400 audit(2000000006.830:288): avc: denied { open } for pid=4899 comm="syz.0.226" path="/20/file0" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 204.737476][ T31] audit: type=1400 audit(2000000006.900:289): avc: denied { ioctl } for pid=4899 comm="syz.0.226" path="/20/file0" dev="tmpfs" ino=119 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 205.073357][ T4902] netlink: 32 bytes leftover after parsing attributes in process `syz.0.227'. [ 224.198342][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 224.198439][ T31] audit: type=1400 audit(2000000026.370:291): avc: denied { create } for pid=4942 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 225.690682][ T31] audit: type=1326 audit(2000000027.860:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.692827][ T31] audit: type=1326 audit(2000000027.860:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.695998][ T31] audit: type=1326 audit(2000000027.860:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=174 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.700114][ T31] audit: type=1326 audit(2000000027.860:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.701179][ T31] audit: type=1326 audit(2000000027.860:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.701940][ T31] audit: type=1326 audit(2000000027.870:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=385 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.702915][ T31] audit: type=1326 audit(2000000027.870:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.703848][ T31] audit: type=1326 audit(2000000027.870:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 225.709198][ T31] audit: type=1326 audit(2000000027.880:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=352 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.848096][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 229.848186][ T31] audit: type=1326 audit(2000000032.020:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.863191][ T31] audit: type=1326 audit(2000000032.030:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.864366][ T31] audit: type=1326 audit(2000000032.030:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.866328][ T4971] syz.0.252[4971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.866520][ T4971] syz.0.252[4971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.872582][ T31] audit: type=1326 audit(2000000032.040:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.874480][ T31] audit: type=1326 audit(2000000032.040:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.875397][ T31] audit: type=1326 audit(2000000032.040:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.900199][ T31] audit: type=1326 audit(2000000032.040:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.900778][ T31] audit: type=1326 audit(2000000032.040:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.901212][ T31] audit: type=1326 audit(2000000032.040:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132da0 code=0x7ffc0000 [ 229.901819][ T31] audit: type=1326 audit(2000000032.040:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 230.043707][ T4975] syz.1.253[4975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.045746][ T4975] syz.1.253[4975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.139969][ T4985] netlink: 4 bytes leftover after parsing attributes in process `syz.0.258'. [ 236.634978][ T5047] tmpfs: Unsupported parameter 'mpol' [ 237.507847][ T5055] netlink: 268 bytes leftover after parsing attributes in process `syz.0.276'. [ 237.510290][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 237.510349][ T31] audit: type=1400 audit(2000000039.680:328): avc: denied { nlmsg_write } for pid=5054 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.245168][ T5082] fuse: Unknown parameter 'fd00000000000000000000003' [ 252.027480][ T4062] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 252.218190][ T4062] usb 2-1: device descriptor read/64, error -71 [ 252.544789][ T4062] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 252.732601][ T4062] usb 2-1: device descriptor read/64, error -71 [ 252.879029][ T4062] usb usb2-port1: attempt power cycle [ 253.322633][ T4062] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 253.389309][ T4062] usb 2-1: device descriptor read/8, error -71 [ 253.667336][ T4062] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 253.701745][ T4062] usb 2-1: device descriptor read/8, error -71 [ 253.817499][ T4062] usb usb2-port1: unable to enumerate USB device [ 254.162584][ T5099] netlink: 268 bytes leftover after parsing attributes in process `syz.0.291'. [ 262.341231][ T31] audit: type=1400 audit(2000000064.510:329): avc: denied { bind } for pid=5119 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 262.408648][ T31] audit: type=1400 audit(2000000064.580:330): avc: denied { read } for pid=5119 comm="syz.1.298" path="socket:[5141]" dev="sockfs" ino=5141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 262.957427][ T31] audit: type=1400 audit(2000000065.110:331): avc: denied { write } for pid=5119 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 264.882323][ T31] audit: type=1400 audit(2000000067.050:332): avc: denied { bind } for pid=5129 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 264.889437][ T31] audit: type=1400 audit(2000000067.060:333): avc: denied { write } for pid=5129 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 268.020673][ T31] audit: type=1400 audit(2000000070.190:334): avc: denied { override_creds } for pid=5143 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 268.261620][ T31] audit: type=1400 audit(2000000070.430:335): avc: denied { unmount } for pid=5145 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 268.841286][ T31] audit: type=1326 audit(2000000070.980:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.842321][ T31] audit: type=1326 audit(2000000071.010:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.850067][ T31] audit: type=1326 audit(2000000071.020:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.857150][ T31] audit: type=1326 audit(2000000071.020:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.860089][ T31] audit: type=1326 audit(2000000071.030:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.861126][ T31] audit: type=1326 audit(2000000071.030:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.867383][ T31] audit: type=1326 audit(2000000071.030:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 268.879965][ T31] audit: type=1326 audit(2000000071.040:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5149 comm="syz.0.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 269.173774][ T5153] mmap: syz.0.310 (5153) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 272.141286][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x4 [ 272.142725][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.147156][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.147628][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x2 [ 272.148205][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.148519][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.148826][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.149181][ T4105] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 272.149579][ T4105] hid-generic 0000:0000:0000.0002: item fetching failed at offset 8/43 [ 272.150437][ T4105] hid-generic 0000:0000:0000.0002: probe with driver hid-generic failed with error -22 [ 275.064774][ T5187] netlink: 'syz.1.321': attribute type 6 has an invalid length. [ 275.391161][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 275.391249][ T31] audit: type=1400 audit(2000000077.540:360): avc: denied { watch } for pid=5188 comm="+}[@" path="/proc/173" dev="proc" ino=6239 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 275.414138][ T31] audit: type=1326 audit(2000000077.580:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.415219][ T31] audit: type=1326 audit(2000000077.580:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.441007][ T31] audit: type=1326 audit(2000000077.610:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.478753][ T31] audit: type=1326 audit(2000000077.640:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.479868][ T31] audit: type=1326 audit(2000000077.640:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.480546][ T31] audit: type=1326 audit(2000000077.650:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.483227][ T31] audit: type=1326 audit(2000000077.650:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.486260][ T31] audit: type=1326 audit(2000000077.650:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 275.510888][ T31] audit: type=1326 audit(2000000077.670:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5189 comm="syz.1.323" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=0 ip=0x132da0 code=0x7ffc0000 [ 276.367479][ T4265] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 276.568270][ T4265] usb 1-1: Using ep0 maxpacket: 8 [ 276.577182][ T4265] usb 1-1: config 0 has an invalid interface number: 156 but max is 0 [ 276.577741][ T4265] usb 1-1: config 0 has no interface number 0 [ 276.601384][ T4265] usb 1-1: New USB device found, idVendor=1b3d, idProduct=016d, bcdDevice=94.93 [ 276.601753][ T4265] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 276.601948][ T4265] usb 1-1: Product: syz [ 276.602161][ T4265] usb 1-1: Manufacturer: syz [ 276.602290][ T4265] usb 1-1: SerialNumber: syz [ 276.612387][ T4265] usb 1-1: config 0 descriptor?? [ 276.623957][ T4265] ftdi_sio 1-1:0.156: FTDI USB Serial Device converter detected [ 276.625904][ T4265] ftdi_sio ttyUSB0: unknown device type: 0x9493 [ 276.870726][ T5198] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 277.032912][ T4155] usb 1-1: USB disconnect, device number 2 [ 277.041065][ T4155] ftdi_sio 1-1:0.156: device disconnected [ 280.060792][ C0] ------------[ cut here ]------------ [ 280.061496][ C0] WARNING: CPU: 0 PID: 4207 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 280.062798][ C0] refcount_t: underflow; use-after-free. [ 280.063097][ C0] Modules linked in: [ 280.064030][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 280.065244][ C0] CPU: 0 UID: 0 PID: 4207 Comm: kworker/0:35 Not tainted 6.11.0-syzkaller #0 [ 280.066325][ C0] Hardware name: ARM-Versatile Express [ 280.067547][ C0] Workqueue: events nsim_dev_trap_report_work [ 280.069143][ C0] Call trace: frame pointer underflow [ 280.075444][ C0] [<8197d658>] (dump_backtrace) from [<8197d754>] (show_stack+0x18/0x1c) [ 280.077545][ C0] r7:00000000 r6:826228c4 r5:00000000 r4:82034f2c [ 280.077998][ C0] [<8197d73c>] (show_stack) from [<8199b3f8>] (dump_stack_lvl+0x54/0x7c) [ 280.078602][ C0] [<8199b3a4>] (dump_stack_lvl) from [<8199b438>] (dump_stack+0x18/0x1c) [ 280.079341][ C0] r5:00000000 r4:8286ed18 [ 280.079901][ C0] [<8199b420>] (dump_stack) from [<8197e1fc>] (panic+0x120/0x368) [ 280.080451][ C0] [<8197e0dc>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 280.080893][ C0] r3:8260c5c4 r2:00000001 r1:8201d760 r0:8202552c [ 280.081207][ C0] r7:808309e0 [ 280.081474][ C0] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 280.081979][ C0] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 280.082499][ C0] r8:00000009 r7:82083a1c r6:df801c94 r5:84a00c00 r4:00000000 [ 280.082940][ C0] [<80242430>] (warn_slowpath_fmt) from [<808309e0>] (refcount_warn_saturate+0x13c/0x174) [ 280.083724][ C0] r10:20000013 r9:848e785c r8:8461aa80 r7:00000000 r6:8180dd24 r5:00000002 [ 280.084140][ C0] r4:8461aa80 [ 280.084326][ C0] [<808308a4>] (refcount_warn_saturate) from [<8147e1bc>] (sk_skb_reason_drop+0x1d8/0x248) [ 280.085013][ C0] [<8147dfe4>] (sk_skb_reason_drop) from [<8180dd24>] (j1939_xtp_rx_cts+0x220/0x3d0) [ 280.085609][ C0] r9:848e785c r8:8461aa80 r7:84616b58 r6:00000df2 r5:848e7800 r4:848e7814 [ 280.086051][ C0] [<8180db04>] (j1939_xtp_rx_cts) from [<8180ec98>] (j1939_tp_recv+0x3f4/0x530) [ 280.086659][ C0] r10:dddd0ec8 r9:00000040 r8:84616b50 r7:85457000 r6:85457008 r5:85457000 [ 280.087146][ C0] r4:82eb8780 [ 280.087408][ C0] [<8180e8a4>] (j1939_tp_recv) from [<81808730>] (j1939_can_recv+0x1e4/0x2dc) [ 280.087871][ C0] r7:85457000 r6:85457008 r5:85457810 r4:82eb8780 [ 280.088208][ C0] [<8180854c>] (j1939_can_recv) from [<817fe4fc>] (can_rcv_filter+0x9c/0x218) [ 280.088687][ C0] r9:00000040 r8:847a06a0 r7:98c80000 r6:82eb89c0 r5:00000001 r4:846b96c0 [ 280.089072][ C0] [<817fe460>] (can_rcv_filter) from [<817feea0>] (can_receive+0xb4/0xf0) [ 280.089549][ C0] r9:00000040 r8:00000000 r7:847a0000 r6:846533c0 r5:84a38000 r4:82eb89c0 [ 280.089962][ C0] [<817fedec>] (can_receive) from [<817fef60>] (can_rcv+0x84/0xac) [ 280.090440][ C0] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:817feedc r4:82eb89c0 [ 280.091133][ C0] [<817feedc>] (can_rcv) from [<8149f034>] (__netif_receive_skb_one_core+0x5c/0x80) [ 280.091665][ C0] r5:817feedc r4:847a0000 [ 280.092195][ C0] [<8149efd8>] (__netif_receive_skb_one_core) from [<8149f0a0>] (__netif_receive_skb+0x18/0x5c) [ 280.092715][ C0] r5:dddd0fb0 r4:82eb89c0 [ 280.092986][ C0] [<8149f088>] (__netif_receive_skb) from [<8149f390>] (process_backlog+0x88/0x15c) [ 280.096617][ C0] r5:dddd0fb0 r4:82eb89c0 [ 280.096943][ C0] [<8149f308>] (process_backlog) from [<814a0294>] (__napi_poll+0x34/0x240) [ 280.097585][ C0] r10:dddd0ec0 r9:dddd1100 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd0fb0 [ 280.097923][ C0] r4:00000001 [ 280.098343][ C0] [<814a0260>] (__napi_poll) from [<814a0acc>] (net_rx_action+0x338/0x420) [ 280.098742][ C0] r9:dddd1100 r8:df801ed0 r7:0000012c r6:fffff832 r5:dddd0fb0 r4:00000000 [ 280.099234][ C0] [<814a0794>] (net_rx_action) from [<8024b5d8>] (handle_softirqs+0x15c/0x468) [ 280.099684][ C0] r10:00000008 r9:84a00c00 r8:00000102 r7:04208060 r6:00000003 r5:00000004 [ 280.100028][ C0] r4:8260408c [ 280.100226][ C0] [<8024b47c>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 280.100883][ C0] r10:85196900 r9:851969fc r8:00000030 r7:8479f380 r6:81b8f4b8 r5:00000002 [ 280.101255][ C0] r4:60000013 [ 280.101539][ C0] [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14) [ 280.102058][ C0] [<802087f0>] (____do_softirq) from [<8194d0f8>] (call_with_stack+0x1c/0x20) [ 280.102557][ C0] [<8194d0dc>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c) [ 280.103101][ C0] [<80208804>] (do_softirq_own_stack) from [<8024baf0>] (do_softirq+0x5c/0x64) [ 280.103861][ C0] [<8024ba94>] (do_softirq) from [<8024bbc4>] (__local_bh_enable_ip+0xcc/0xd0) [ 280.104416][ C0] r5:00000002 r4:84a00c00 [ 280.104682][ C0] [<8024baf8>] (__local_bh_enable_ip) from [<819a8418>] (_raw_spin_unlock_bh+0x34/0x38) [ 280.105194][ C0] r5:8479f1b0 r4:82eb80c0 [ 280.107063][ C0] [<819a83e4>] (_raw_spin_unlock_bh) from [<80d857fc>] (nsim_dev_trap_report_work+0x29c/0x33c) [ 280.112446][ C0] [<80d85560>] (nsim_dev_trap_report_work) from [<80265ef4>] (process_one_work+0x1b4/0x4f4) [ 280.115859][ C0] r10:82c16005 r9:84a00c00 r8:00800000 r7:dddcff40 r6:82c16000 r5:8479f380 [ 280.116630][ C0] r4:84bf4080 [ 280.116865][ C0] [<80265d40>] (process_one_work) from [<80266ad8>] (worker_thread+0x1ec/0x3bc) [ 280.117380][ C0] r10:84a00c00 r9:84bf40ac r8:61c88647 r7:dddcff60 r6:82604d40 r5:dddcff40 [ 280.117858][ C0] r4:84bf4080 [ 280.118056][ C0] [<802668ec>] (worker_thread) from [<8026faf4>] (kthread+0x104/0x134) [ 280.118483][ C0] r10:00000000 r9:dfed9e78 r8:84b810c0 r7:84bf4080 r6:802668ec r5:84a00c00 [ 280.118833][ C0] r4:8514e240 [ 280.119013][ C0] [<8026f9f0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 280.119606][ C0] Exception stack(0xdfb8dfb0 to 0xdfb8dff8) [ 280.120039][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 280.120645][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 280.121122][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 280.121626][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026f9f0 r4:8514e240 [ 280.123778][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:11:19 Registers: info registers vcpu 0 CPU#0 R00=84084840 R01=00000030 R02=eb0c9000 R03=eb0c9018 R04=82871495 R05=84084840 R06=809d272c R07=828714b9 R08=82871458 R09=00000062 R10=60000093 R11=df8019ec R12=00000002 R13=df8019e0 R14=8275483c R15=809d273c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004d27e9 s17=00000000 d08=00000000004d27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=03200800 s33=09f0c080 d16=09f0c08003200800 s34=ffffef08 s35=ffffffff d17=ffffffffffffef08 s36=2e01ffff s37=6c69662f d18=6c69662f2e01ffff s38=f8003065 s39=02061029 d19=02061029f8003065 s40=09f0c080 s41=a1800800 d20=a180080009f0c080 s42=00080030 s43=060104ae d21=060104ae00080030 s44=00100806 s45=08000100 d22=0800010000100806 s46=08001080 s47=00000102 d23=0000010208001080 s48=f76f8f3a s49=3c330660 d24=3c330660f76f8f3a s50=42e5294a s51=72f89e74 d25=72f89e7442e5294a s52=f41037d9 s53=57015f27 d26=57015f27f41037d9 s54=63daa511 s55=e7cbbe83 d27=e7cbbe8363daa511 s56=b2af236f s57=284e378c d28=284e378cb2af236f s58=649d8900 s59=c345b25b d29=c345b25b649d8900 s60=d885ab1c s61=c40252b3 d30=c40252b3d885ab1c s62=ff8a6bc4 s63=a7456113 d31=a7456113ff8a6bc4 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=0000001c R01=ddde7800 R02=5b92b000 R03=81221bb8 R04=82c9d400 R05=82c9cb40 R06=81b0fccc R07=0000001c R08=df805f78 R09=8419d400 R10=dee70354 R11=df805f74 R12=df805f78 R13=df805f68 R14=802c807c R15=81221bc4 PSR=a0000193 N-C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004d27e9 s17=00000000 d08=00000000004d27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=f366f2e3 s33=c036f948 d16=c036f948f366f2e3 s34=b2ec456a s35=0f873921 d17=0f873921b2ec456a s36=d1ddf853 s37=527a1567 d18=527a1567d1ddf853 s38=986e08fc s39=27f56e68 d19=27f56e68986e08fc s40=cac48b7b s41=98e02a4f d20=98e02a4fcac48b7b s42=6d51f235 s43=86f693d3 d21=86f693d36d51f235 s44=9d596af3 s45=1a6936e2 d22=1a6936e29d596af3 s46=38f839d4 s47=66e2577a d23=66e2577a38f839d4 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00740000 s53=00600000 d26=0060000000740000 s54=004c0000 s55=00380000 d27=00380000004c0000 s56=00200000 s57=00080000 d28=0008000000200000 s58=0000000a s59=00080004 d29=000800040000000a s60=03e60000 s61=00000000 d30=0000000003e60000 s62=0010000a s63=0008000f d31=0008000f0010000a FPSCR: 00000000