last executing test programs: 5.23281538s ago: executing program 0 (id=1348): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) r4 = accept$inet6(r3, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x5421, &(0x7f0000000180)={'bridge_slave_1\x00'}) 5.149434585s ago: executing program 0 (id=1349): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = eventfd(0x0) r3 = dup2(r1, r0) r4 = socket$unix(0x1, 0x1, 0x0) close_range(r3, r4, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003d40)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) sendto$inet_nvme_of_msg(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 5.067822601s ago: executing program 0 (id=1350): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) pipe(&(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r3, r2, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000080)) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x5514, 0x0) 4.979140728s ago: executing program 0 (id=1351): bind$unix(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGETMODE(r3, 0x5451, 0x0) 2.868102952s ago: executing program 1 (id=1361): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b443803cf578f", "6d02cd81", "066580001e00"}, 0x38) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x5, 0xfffe, 0x9, 0x6f}}, 0x50) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xd}}, 0x0) 2.789411357s ago: executing program 1 (id=1362): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) r4 = accept$inet6(r3, 0x0, 0x0) getpeername$packet(r4, 0x0, &(0x7f0000000040)) 2.718290541s ago: executing program 1 (id=1363): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000b40)=[{{&(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r4, 0x5450, 0x0) 2.659380352s ago: executing program 1 (id=1364): r0 = timerfd_create(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/firmware/fdt', 0x0, 0x0) r1 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r1, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x5451, 0x0) 2.426862766s ago: executing program 0 (id=1365): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r1, r0, 0x0) r4 = accept$inet6(r3, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r4, 0x541b, 0x20000000) 2.304742849s ago: executing program 0 (id=1366): r0 = epoll_create1(0x0) timer_create(0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$unix(0x1, 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$VT_RELDISP(r0, 0x5450) 90.215313ms ago: executing program 1 (id=1367): r0 = memfd_create(&(0x7f0000000080)='\xd7!\xac\x99\x86\x10\xb9\xb6\x85p\xdf<\x8c)G\xb7\x18\x19\x03\x132eb\xf7\xfb\x17\xf5^\xfc\x88\xad\xb7*\x81\xd1\xa3\xc7\xeb3\xcf\xba\xe9\xea\xb6\xf31\x13\xfe\x19\xa1rp\aL>\xaf\x1fNV\xffT%\xc0p\xe44F\xefH\x05\xf9!\x1eI\x06\xb0(n\xd4\xf3\xa8\xa1\x13&\xdc>\xf5\xfa\xebcn\x15\xdc\x15;9\xe1g\fo0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): [ 49.947669][ T31] audit: type=1400 audit(49.890:68): avc: denied { read write } for pid=3105 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.977945][ T31] audit: type=1400 audit(49.920:69): avc: denied { open } for pid=3105 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:4286' (ED25519) to the list of known hosts. [ 61.195449][ T31] audit: type=1400 audit(61.100:70): avc: denied { name_bind } for pid=3106 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.461883][ T31] audit: type=1400 audit(63.390:71): avc: denied { execute } for pid=3108 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.475114][ T31] audit: type=1400 audit(63.420:72): avc: denied { execute_no_trans } for pid=3108 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.474481][ T31] audit: type=1400 audit(66.420:73): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.476883][ T31] audit: type=1400 audit(66.420:74): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.492472][ T3108] cgroup: Unknown subsys name 'net' [ 66.500817][ T31] audit: type=1400 audit(66.440:75): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.738662][ T3108] cgroup: Unknown subsys name 'hugetlb' [ 66.739660][ T3108] cgroup: Unknown subsys name 'rlimit' [ 66.996315][ T31] audit: type=1400 audit(66.940:76): avc: denied { setattr } for pid=3108 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.997779][ T31] audit: type=1400 audit(66.940:77): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.998691][ T31] audit: type=1400 audit(66.940:78): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.273277][ T3110] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.274697][ T31] audit: type=1400 audit(67.220:79): avc: denied { relabelto } for pid=3110 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.282479][ T31] audit: type=1400 audit(67.220:80): avc: denied { write } for pid=3110 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.319663][ T31] audit: type=1400 audit(67.260:81): avc: denied { read } for pid=3108 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.325160][ T31] audit: type=1400 audit(67.270:82): avc: denied { open } for pid=3108 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.074911][ T3108] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.937108][ T31] audit: type=1400 audit(75.880:83): avc: denied { execmem } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.991624][ T31] audit: type=1400 audit(75.930:84): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.992154][ T31] audit: type=1400 audit(75.930:85): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 75.992688][ T31] audit: type=1400 audit(75.930:86): avc: denied { read } for pid=3113 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.993336][ T31] audit: type=1400 audit(75.930:87): avc: denied { open } for pid=3113 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.996960][ T31] audit: type=1400 audit(75.940:88): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.016489][ T31] audit: type=1400 audit(75.960:89): avc: denied { module_request } for pid=3114 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.074490][ T31] audit: type=1400 audit(76.020:90): avc: denied { sys_module } for pid=3114 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.660080][ T31] audit: type=1400 audit(76.600:91): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.714708][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.728161][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.955479][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.962579][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.837019][ T3114] hsr_slave_0: entered promiscuous mode [ 78.839285][ T3114] hsr_slave_1: entered promiscuous mode [ 78.972510][ T3113] hsr_slave_0: entered promiscuous mode [ 78.975135][ T3113] hsr_slave_1: entered promiscuous mode [ 78.977109][ T3113] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.977575][ T3113] Cannot create hsr debugfs directory [ 79.294112][ T31] audit: type=1400 audit(79.240:92): avc: denied { create } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.304226][ T3114] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.320504][ T3114] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.335283][ T3114] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.348547][ T3114] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.388640][ T3113] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.406353][ T3113] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.415715][ T3113] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.423466][ T3113] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.146190][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.222949][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.690203][ T3113] veth0_vlan: entered promiscuous mode [ 82.706730][ T3113] veth1_vlan: entered promiscuous mode [ 82.742243][ T3113] veth0_macvtap: entered promiscuous mode [ 82.747713][ T3113] veth1_macvtap: entered promiscuous mode [ 82.788281][ T3113] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.789105][ T3113] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.789439][ T3113] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.789822][ T3113] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.884535][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 82.884579][ T31] audit: type=1400 audit(82.830:95): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.887306][ T31] audit: type=1400 audit(82.830:96): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.QyMsoB/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.890362][ T31] audit: type=1400 audit(82.830:97): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.903871][ T31] audit: type=1400 audit(82.850:98): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.915946][ T31] audit: type=1400 audit(82.850:99): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.918977][ T31] audit: type=1400 audit(82.860:100): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.066210][ T31] audit: type=1400 audit(83.000:101): avc: denied { read write } for pid=3113 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.067698][ T31] audit: type=1400 audit(83.000:102): avc: denied { open } for pid=3113 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.068422][ T31] audit: type=1400 audit(83.000:103): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.449769][ T3114] veth0_vlan: entered promiscuous mode [ 83.479496][ T3114] veth1_vlan: entered promiscuous mode [ 83.556046][ T3114] veth0_macvtap: entered promiscuous mode [ 83.567780][ T3114] veth1_macvtap: entered promiscuous mode [ 83.659914][ T3114] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.660454][ T3114] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.660969][ T3114] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.663113][ T3114] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.167239][ T31] audit: type=1400 audit(84.110:104): avc: denied { nlmsg_write } for pid=3818 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 94.883966][ T4073] loop7: detected capacity change from 0 to 16384 [ 96.343978][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 96.344089][ T31] audit: type=1400 audit(96.290:111): avc: denied { create } for pid=4096 comm="syz.0.146" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.939920][ T31] audit: type=1400 audit(97.880:112): avc: denied { module_load } for pid=4132 comm="syz.0.164" path="/104/bus" dev="tmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 99.282999][ T31] audit: type=1400 audit(99.230:113): avc: denied { create } for pid=4156 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.289801][ T31] audit: type=1400 audit(99.230:114): avc: denied { connect } for pid=4156 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 101.145002][ T31] audit: type=1400 audit(101.090:115): avc: denied { prog_load } for pid=4204 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.146866][ T31] audit: type=1400 audit(101.090:116): avc: denied { bpf } for pid=4204 comm="syz.1.199" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 101.394050][ T31] audit: type=1400 audit(101.330:117): avc: denied { create } for pid=4216 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.397049][ T31] audit: type=1400 audit(101.340:118): avc: denied { getopt } for pid=4216 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 104.407443][ T31] audit: type=1400 audit(104.350:119): avc: denied { perfmon } for pid=4327 comm="syz.1.257" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.439530][ T31] audit: type=1400 audit(104.380:120): avc: denied { prog_run } for pid=4327 comm="syz.1.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 114.987878][ T31] audit: type=1400 audit(114.930:121): avc: denied { write } for pid=4407 comm="syz.0.294" name="packet" dev="proc" ino=4026532823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 116.555701][ T4442] serio: Serial port pts0 [ 122.342348][ T31] audit: type=1400 audit(122.280:122): avc: denied { create } for pid=4502 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 122.353363][ T31] audit: type=1400 audit(122.290:123): avc: denied { write } for pid=4502 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 129.948966][ T31] audit: type=1400 audit(129.890:124): avc: denied { name_bind } for pid=4601 comm="syz.1.384" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 129.949982][ T31] audit: type=1400 audit(129.890:125): avc: denied { node_bind } for pid=4601 comm="syz.1.384" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 129.973341][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 133.982744][ T31] audit: type=1400 audit(133.930:126): avc: denied { watch watch_reads } for pid=4644 comm="syz.1.403" path="/proc/409" dev="proc" ino=5060 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 133.992931][ T31] audit: type=1400 audit(133.940:127): avc: denied { create } for pid=4644 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 133.997968][ T31] audit: type=1400 audit(133.940:128): avc: denied { write } for pid=4644 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 135.523642][ T31] audit: type=1400 audit(135.470:129): avc: denied { create } for pid=4660 comm="syz.0.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.530196][ T31] audit: type=1400 audit(135.470:130): avc: denied { ioctl } for pid=4660 comm="syz.0.410" path="socket:[5886]" dev="sockfs" ino=5886 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 137.175695][ T31] audit: type=1400 audit(137.120:131): avc: denied { map_create } for pid=4701 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 137.176571][ T31] audit: type=1400 audit(137.120:132): avc: denied { map_read map_write } for pid=4701 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 138.273782][ T31] audit: type=1400 audit(138.220:133): avc: denied { connect } for pid=4713 comm="syz.1.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 138.274787][ T31] audit: type=1400 audit(138.220:134): avc: denied { name_connect } for pid=4713 comm="syz.1.435" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 140.122867][ C1] hrtimer: interrupt took 6520160 ns [ 156.129163][ T31] audit: type=1400 audit(156.060:135): avc: denied { execute } for pid=4915 comm="syz.1.529" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1031 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 157.278053][ T31] audit: type=1400 audit(157.220:136): avc: denied { create } for pid=4931 comm="syz.1.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 186.677593][ T31] audit: type=1400 audit(186.620:137): avc: denied { audit_write } for pid=5298 comm="syz.1.708" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 186.679395][ T31] audit: type=1107 audit(186.620:138): pid=5298 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='C'[Iۄ?L#/>& <Ȏ:'[RRܧT6FǂŠoM kӪvoZWH$+9qˉKa0vGibAD0ҭNv˔pQ\ ÝT YB~U*HVoE] _CSڙgL&U)?j!BSioa$J kěBwVGNeL5EReˆzdI|YzXT A NØ>>L>u\.G#G8f4oLx(0ρAs3kx[7@:ӢW;dxWwSNlf-LېR"@A8{Sܴħ[#MtZC.d̉}Ie~ qLl^S7Wbq죪їwD 6ɻI+Y G_D.ì-p˳i=);䊷Wh3eRޞl }' [ 199.703749][ T31] audit: type=1400 audit(199.650:139): avc: denied { read } for pid=5528 comm="syz.0.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 200.212675][ T31] audit: type=1400 audit(200.150:140): avc: denied { create } for pid=5539 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 218.355566][ T5810] Zero length message leads to an empty skb [ 221.147146][ T31] audit: type=1400 audit(221.060:141): avc: denied { map } for pid=5827 comm="syz.0.952" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10527 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 221.174102][ T31] audit: type=1400 audit(221.110:142): avc: denied { read write } for pid=5827 comm="syz.0.952" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10527 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 222.290332][ T31] audit: type=1400 audit(222.230:143): avc: denied { accept } for pid=5829 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 227.444810][ T31] audit: type=1400 audit(227.390:144): avc: denied { create } for pid=5821 comm="syz.1.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 229.168261][ T5891] SELinux: Context system_u:object_r:devtty_t:s0 is not valid (left unmapped). [ 229.169738][ T31] audit: type=1400 audit(229.110:145): avc: denied { relabelto } for pid=5889 comm="syz.0.980" name="cgroup.controllers" dev="tmpfs" ino=2873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 229.182240][ T31] audit: type=1400 audit(229.110:146): avc: denied { associate } for pid=5889 comm="syz.0.980" name="cgroup.controllers" dev="tmpfs" ino=2873 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devtty_t:s0" [ 229.208284][ T31] audit: type=1400 audit(229.150:147): avc: denied { unlink } for pid=3113 comm="syz-executor" name="cgroup.controllers" dev="tmpfs" ino=2873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 237.141953][ T31] audit: type=1400 audit(237.080:148): avc: denied { create } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 237.186696][ T31] audit: type=1400 audit(237.100:149): avc: denied { setopt } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 237.188523][ T31] audit: type=1400 audit(237.110:150): avc: denied { connect } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 237.759570][ T31] audit: type=1400 audit(237.680:151): avc: denied { bind } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 238.236521][ T31] audit: type=1400 audit(238.180:152): avc: denied { write } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 238.748772][ T31] audit: type=1400 audit(238.690:153): avc: denied { ioctl } for pid=5949 comm="syz.1.1006" path="socket:[11566]" dev="sockfs" ino=11566 ioctlcmd=0x6608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 239.248619][ T31] audit: type=1400 audit(239.190:154): avc: denied { accept } for pid=5949 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 253.164517][ T31] audit: type=1400 audit(253.110:155): avc: denied { mounton } for pid=6029 comm="syz.1.1037" path="/532/bus" dev="tmpfs" ino=3164 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 253.714714][ T31] audit: type=1400 audit(253.660:156): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 254.296124][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 256.002659][ T31] audit: type=1400 audit(255.950:157): avc: denied { ioctl } for pid=6058 comm="syz.0.1048" path="socket:[11762]" dev="sockfs" ino=11762 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 257.660990][ T31] audit: type=1400 audit(257.600:158): avc: denied { setopt } for pid=6074 comm="syz.1.1055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 257.668034][ T31] audit: type=1400 audit(257.610:159): avc: denied { name_bind } for pid=6074 comm="syz.1.1055" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 259.422782][ T31] audit: type=1400 audit(259.360:160): avc: denied { create } for pid=6084 comm="syz.1.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 276.397242][ T6163] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 277.606247][ T31] audit: type=1400 audit(277.550:161): avc: denied { setopt } for pid=6168 comm="syz.0.1097" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.030432][ T31] audit: type=1400 audit(285.970:162): avc: denied { setopt } for pid=6255 comm="syz.0.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 286.054711][ T31] audit: type=1400 audit(286.000:163): avc: denied { ioctl } for pid=6255 comm="syz.0.1136" path="socket:[12194]" dev="sockfs" ino=12194 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 290.834525][ T31] audit: type=1400 audit(290.780:164): avc: denied { name_bind } for pid=6315 comm="syz.0.1161" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 291.345683][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 296.474952][ T6392] serio: Serial port pts0 [ 298.585865][ T31] audit: type=1400 audit(298.530:165): avc: denied { create } for pid=6403 comm="syz.0.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 298.588681][ T31] audit: type=1400 audit(298.530:166): avc: denied { write } for pid=6403 comm="syz.0.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 298.591014][ T31] audit: type=1400 audit(298.530:167): avc: denied { ioctl } for pid=6403 comm="syz.0.1196" path="socket:[12734]" dev="sockfs" ino=12734 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 299.878636][ T6434] netlink: 44306 bytes leftover after parsing attributes in process `syz.0.1210'. [ 312.637411][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 313.006872][ T6532] SELinux: Context system_u:object_r:system_map_t:s0 is not valid (left unmapped). [ 313.008014][ T31] audit: type=1400 audit(312.950:168): avc: denied { relabelto } for pid=6531 comm="syz.0.1255" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 313.010810][ T31] audit: type=1400 audit(312.950:169): avc: denied { associate } for pid=6531 comm="syz.0.1255" name="mixer" dev="devtmpfs" ino=735 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_map_t:s0" [ 327.212492][ T3788] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 327.392124][ T3788] usb 2-1: Using ep0 maxpacket: 32 [ 327.411073][ T3788] usb 2-1: New USB device found, idVendor=0424, idProduct=9907, bcdDevice= 3.2c [ 327.412126][ T3788] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 327.412463][ T3788] usb 2-1: Product: syz [ 327.412693][ T3788] usb 2-1: Manufacturer: syz [ 327.412935][ T3788] usb 2-1: SerialNumber: syz [ 327.427950][ T3788] usb 2-1: config 0 descriptor?? [ 327.467692][ T3788] smsc95xx v2.0.0 [ 327.468249][ T3788] smsc95xx 2-1:0.0 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 327.469667][ T3788] smsc95xx 2-1:0.0: probe with driver smsc95xx failed with error -22 [ 327.673105][ T3788] usb 2-1: USB disconnect, device number 2 [ 338.270313][ T6719] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 348.713155][ T31] audit: type=1400 audit(348.660:170): avc: denied { create } for pid=6749 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 351.044415][ T31] audit: type=1400 audit(350.990:171): avc: denied { ioctl } for pid=6760 comm="syz.0.1338" path="pid:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 357.190154][ T31] audit: type=1400 audit(357.130:172): avc: denied { append } for pid=6790 comm="syz.0.1350" name="001" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 362.264828][ T31] audit: type=1400 audit(362.210:173): avc: denied { ioctl } for pid=6829 comm="syz.1.1368" path="socket:[14269]" dev="sockfs" ino=14269 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.276237][ T31] audit: type=1400 audit(362.220:174): avc: denied { connect } for pid=6829 comm="syz.1.1368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.284995][ T6830] ------------[ cut here ]------------ [ 362.285544][ T6830] WARNING: CPU: 1 PID: 6830 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 362.286696][ T6830] refcount_t: underflow; use-after-free. [ 362.286858][ T6830] Modules linked in: [ 362.287280][ T6830] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 362.287857][ T6830] CPU: 1 UID: 0 PID: 6830 Comm: syz.1.1368 Not tainted 6.11.0-syzkaller #0 [ 362.288309][ T6830] Hardware name: ARM-Versatile Express [ 362.288829][ T6830] Call trace: [ 362.289752][ T6830] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 362.290716][ T6830] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 362.291169][ T6830] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 362.291645][ T6830] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 362.292142][ T6830] r5:00000000 r4:8286ed18 [ 362.292386][ T6830] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 362.292864][ T6830] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 362.293307][ T6830] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 362.293610][ T6830] r7:8081a110 [ 362.293798][ T6830] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 362.294229][ T6830] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 362.294641][ T6830] r8:00000009 r7:8205cdc4 r6:e00a5c84 r5:84f91800 r4:00000000 [ 362.294983][ T6830] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 362.295501][ T6830] r10:00000000 r9:8511b684 r8:00000000 r7:00000000 r6:817f4e34 r5:00000002 [ 362.295959][ T6830] r4:85a71480 [ 362.296147][ T6830] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 362.296909][ T6830] [<81467654>] (sk_skb_reason_drop) from [<817f4e34>] (j1939_session_destroy+0x78/0x200) [ 362.297662][ T6830] r9:8511b684 r8:00000000 r7:e00a5f38 r6:847ee950 r5:847ee900 r4:85a71480 [ 362.298034][ T6830] [<817f4dbc>] (j1939_session_destroy) from [<817f6150>] (j1939_session_put+0x54/0x58) [ 362.298529][ T6830] r6:847ee900 r5:8325a280 r4:00000004 [ 362.298834][ T6830] [<817f60fc>] (j1939_session_put) from [<817f4184>] (j1939_sk_sendmsg+0x41c/0x548) [ 362.299420][ T6830] [<817f3d68>] (j1939_sk_sendmsg) from [<8145253c>] (__sock_sendmsg+0x44/0x78) [ 362.299826][ T6830] r10:00000000 r9:e00a5dd4 r8:e00a5dd4 r7:00000000 r6:8325a280 r5:e00a5f38 [ 362.300320][ T6830] r4:00000000 [ 362.300605][ T6830] [<814524f8>] (__sock_sendmsg) from [<81453540>] (____sys_sendmsg+0x2ac/0x2cc) [ 362.301243][ T6830] r7:00000000 r6:00000000 r5:8325a280 r4:e00a5f38 [ 362.301614][ T6830] [<81453294>] (____sys_sendmsg) from [<814554ac>] (___sys_sendmsg+0x9c/0xd0) [ 362.302130][ T6830] r10:e00a5e34 r9:20000180 r8:00000000 r7:00000000 r6:8325a280 r5:e00a5f38 [ 362.302708][ T6830] r4:00000000 [ 362.302895][ T6830] [<81455410>] (___sys_sendmsg) from [<814559c4>] (sys_sendmsg+0x78/0xbc) [ 362.303428][ T6830] r10:00000128 r9:84f91800 r8:8020029c r7:00000000 r6:20000180 r5:8325a280 [ 362.303962][ T6830] r4:00000000 [ 362.304254][ T6830] [<8145594c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 362.304737][ T6830] Exception stack(0xe00a5fa8 to 0xe00a5ff0) [ 362.305211][ T6830] 5fa0: 00000000 00000000 00000004 20000180 00000000 00000000 [ 362.305995][ T6830] 5fc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76b060bc [ 362.306501][ T6830] 5fe0: 76b05ec0 76b05eb0 000189d0 00132da0 [ 362.306830][ T6830] r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 362.308804][ T6830] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:24:25 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=7e90e1fc R02=7e90e27c R03=00000008 R04=00010000 R05=7e90e27c R06=00000001 R07=000000af R08=00000000 R09=7e90e1fc R10=7e90e27c R11=00000001 R12=00570edc R13=ec491ff8 R14=76b2ede8 R15=76b2ede8 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005327e9 s17=00000000 d08=00000000005327e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=ffffffff s33=01ffffff d16=01ffffffffffffff s34=6f72702f s35=79732f63 d17=79732f636f72702f s36=656e2f73 s37=70692f74 d18=70692f74656e2f73 s38=742f3476 s39=635f7063 d19=635f7063742f3476 s40=65676e6f s41=6f697473 d20=6f69747365676e6f s42=6f635f6e s43=6f72746e d21=6f72746e6f635f6e s44=2cb0006c s45=08000800 d22=080008002cb0006c s46=000201c7 s47=00020800 d23=00020800000201c7 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=c2912e82 s53=db783809 d26=db783809c2912e82 s54=17e67325 s55=4694d3f1 d27=4694d3f117e67325 s56=aa17ac29 s57=b5e748d0 d28=b5e748d0aa17ac29 s58=5d455936 s59=03a7a0a1 d29=03a7a0a15d455936 s60=f0ca1540 s61=6762afd6 d30=6762afd6f0ca1540 s62=09aa9f7c s63=c2925291 d31=c292529109aa9f7c FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=840d4840 R01=00000029 R02=eba13000 R03=00000000 R04=828714b4 R05=840d4840 R06=809bbe5c R07=828714b5 R08=82871458 R09=0000005e R10=60000093 R11=e00a59b8 R12=00000002 R13=e00a59ac R14=8275483c R15=809bbeb4 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000