last executing test programs:

8.889538787s ago: executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, <r2=>r0}, './file0\x00'})
ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000003c0))

7.571902612s ago: executing program 0:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838)
ioctl$BTRFS_IOC_SYNC(r0, 0x8902, 0x20000000)

7.198827614s ago: executing program 1:
syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x0)
ioctl$SNDCTL_SEQ_PANIC(0xffffffffffffffff, 0x5111)

6.151204535s ago: executing program 0:
landlock_restrict_self(0xffffffffffffffff, 0x0)
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x80049370, 0x0)

5.791576627s ago: executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0)
r1 = io_uring_setup(0x104c, &(0x7f0000001440))
sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0)
close(r1)
sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x154, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}]}, 0x154}}, 0x0)

5.074039699s ago: executing program 0:
setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}}, &(0x7f0000000040))
io_uring_register$IORING_UNREGISTER_IOWQ_AFF(0xffffffffffffffff, 0x12, 0x0, 0x0)
r0 = socket$l2tp(0x2, 0x2, 0x73)
getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @private}, &(0x7f00000000c0)=0xc)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x511400, 0x0)
r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020)
write$FUSE_STATFS(r1, &(0x7f00000021c0)={0x60, 0x7fffffffffffffd0, 0x0, {{0x80000001, 0x48000000, 0xfffffffffffffcd9, 0x7, 0x7, 0x0, 0x4, 0x94f}}}, 0x60)
fcntl$setstatus(r1, 0x4, 0x40000)
syz_open_pts(0xffffffffffffffff, 0x2000)
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002340)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @dev}, 0x335})

4.537680245s ago: executing program 1:
setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}}, &(0x7f0000000040))
io_uring_register$IORING_UNREGISTER_IOWQ_AFF(0xffffffffffffffff, 0x12, 0x0, 0x0)
r0 = socket$l2tp(0x2, 0x2, 0x73)
getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @private}, &(0x7f00000000c0)=0xc)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x511400, 0x0)
r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020)
write$FUSE_STATFS(r1, &(0x7f00000021c0)={0x60, 0x7fffffffffffffd0, 0x0, {{0x80000001, 0x48000000, 0xfffffffffffffcd9, 0x7, 0x7, 0x0, 0x4, 0x94f}}}, 0x60)
fcntl$setstatus(r1, 0x4, 0x40000)
syz_open_pts(0xffffffffffffffff, 0x2000)
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002340)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @dev}, 0x335})
pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
r3 = fsopen(&(0x7f00000000c0)='cramfs\x00', 0x0)
r4 = fsmount(r3, 0x0, 0x0)
dup3(r2, r4, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x241, 0x379)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000a80), 0x42, 0x0)
r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0)
r6 = socket$nl_route(0x10, 0x3, 0x0)
recvmsg(r6, &(0x7f0000000100)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, <r7=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0)
close(r7)
ioctl$TIOCGPKT(r5, 0x5451, 0x0)

3.700227338s ago: executing program 0:
r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil)
semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001880)=[0x0])

2.609688983s ago: executing program 0:
r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
socket$kcm(0x29, 0x5, 0x0)
sendmsg$netlink(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}], 0x20}, 0x0)

1.740032369s ago: executing program 0:
madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe)
r0 = userfaultfd(0x1)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0))
r1 = io_uring_setup(0x3eb2, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a)
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1})
ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000})
madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8)

999.762023ms ago: executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180))
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0)
r1 = io_uring_setup(0x104c, &(0x7f0000001440))
sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0)
close(r1)
sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x154, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}]}, 0x154}}, 0x0)

0s ago: executing program 1:
r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5450, 0x0)

kernel console output (not intermixed with test programs):

Warning: Permanently added '[localhost]:17628' (ED25519) to the list of known hosts.
[  219.664692][   T30] audit: type=1400 audit(219.150:58): avc:  denied  { name_bind } for  pid=3190 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[  220.181579][   T30] audit: type=1400 audit(219.670:59): avc:  denied  { execute } for  pid=3192 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  220.188168][   T30] audit: type=1400 audit(219.670:60): avc:  denied  { execute_no_trans } for  pid=3192 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
1970/01/01 00:03:46 fuzzer started
[  229.867123][   T30] audit: type=1400 audit(229.350:61): avc:  denied  { node_bind } for  pid=3192 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[  229.905438][   T30] audit: type=1400 audit(229.390:62): avc:  denied  { name_bind } for  pid=3192 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
1970/01/01 00:03:49 dialing manager at localhost:30002
[  233.865628][   T30] audit: type=1400 audit(233.300:63): avc:  denied  { setattr } for  pid=3202 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  233.979061][   T30] audit: type=1400 audit(233.460:64): avc:  denied  { mounton } for  pid=3201 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[  233.980171][   T30] audit: type=1400 audit(233.460:65): avc:  denied  { mount } for  pid=3201 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[  234.200512][   T30] audit: type=1400 audit(233.690:66): avc:  denied  { mounton } for  pid=3200 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  234.230000][   T30] audit: type=1400 audit(233.710:67): avc:  denied  { mount } for  pid=3200 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  234.288920][ T3200] cgroup: Unknown subsys name 'net'
[  234.312687][   T30] audit: type=1400 audit(233.800:68): avc:  denied  { unmount } for  pid=3200 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  234.776245][ T3209] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[  234.787875][   T30] audit: type=1400 audit(234.270:69): avc:  denied  { relabelto } for  pid=3209 comm="mkswap" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[  234.809640][   T30] audit: type=1400 audit(234.290:70): avc:  denied  { write } for  pid=3209 comm="mkswap" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[  234.871056][ T3200] cgroup: Unknown subsys name 'rlimit'
[  234.955796][   T30] audit: type=1400 audit(234.440:71): avc:  denied  { read } for  pid=3204 comm="syz-executor" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[  234.959979][   T30] audit: type=1400 audit(234.440:72): avc:  denied  { open } for  pid=3204 comm="syz-executor" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[  234.997384][ T3204] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
1970/01/01 00:03:54 starting 2 executor processes
[  235.869363][   T30] audit: type=1400 audit(235.350:73): avc:  denied  { execmem } for  pid=3212 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[  236.009413][   T30] audit: type=1400 audit(235.480:74): avc:  denied  { mounton } for  pid=3215 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[  236.053432][   T30] audit: type=1400 audit(235.540:75): avc:  denied  { mount } for  pid=3215 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  236.074518][   T30] audit: type=1400 audit(235.560:76): avc:  denied  { read } for  pid=3216 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  236.081839][   T30] audit: type=1400 audit(235.570:77): avc:  denied  { open } for  pid=3216 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  236.103346][   T30] audit: type=1400 audit(235.590:78): avc:  denied  { mounton } for  pid=3215 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[  236.219913][   T30] audit: type=1400 audit(235.700:79): avc:  denied  { module_request } for  pid=3216 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[  236.550428][   T30] audit: type=1400 audit(236.020:80): avc:  denied  { sys_module } for  pid=3215 comm="syz-executor.0" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[  243.885590][ T3216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  243.910464][ T3216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  244.293130][ T3215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  244.355808][ T3215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  247.353759][ T3216] hsr_slave_0: entered promiscuous mode
[  247.425506][ T3216] hsr_slave_1: entered promiscuous mode
[  248.092376][ T3215] hsr_slave_0: entered promiscuous mode
[  248.132453][ T3215] hsr_slave_1: entered promiscuous mode
[  248.170501][ T3215] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  248.173121][ T3215] Cannot create hsr debugfs directory
[  249.900776][   T30] audit: type=1400 audit(249.380:81): avc:  denied  { create } for  pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  249.905585][   T30] audit: type=1400 audit(249.390:82): avc:  denied  { write } for  pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  249.911627][   T30] audit: type=1400 audit(249.400:83): avc:  denied  { read } for  pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  249.931392][ T3216] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  250.016181][ T3216] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  250.074130][ T3216] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  250.133393][ T3216] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  250.666045][ T3215] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  250.721487][ T3215] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  250.747190][ T3215] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  250.782126][ T3215] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  252.705417][ T3215] 8021q: adding VLAN 0 to HW filter on device bond0
[  253.803769][ T3216] 8021q: adding VLAN 0 to HW filter on device bond0
[  264.341072][ T3215] veth0_vlan: entered promiscuous mode
[  264.494707][ T3215] veth1_vlan: entered promiscuous mode
[  264.991776][ T3215] veth0_macvtap: entered promiscuous mode
[  265.048276][ T3215] veth1_macvtap: entered promiscuous mode
[  265.460879][ T3215] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  265.463320][ T3215] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  265.464172][ T3215] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  265.464906][ T3215] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  266.213527][ T3216] veth0_vlan: entered promiscuous mode
[  266.292003][   T30] audit: type=1400 audit(265.750:84): avc:  denied  { mounton } for  pid=3215 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  266.398175][   T30] audit: type=1400 audit(265.880:85): avc:  denied  { mount } for  pid=3215 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[  266.411188][ T3216] veth1_vlan: entered promiscuous mode
[  266.754170][ T3216] veth0_macvtap: entered promiscuous mode
[  266.827738][ T3216] veth1_macvtap: entered promiscuous mode
[  267.012201][   T30] audit: type=1400 audit(266.490:86): avc:  denied  { read write } for  pid=3215 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  267.025737][   T30] audit: type=1400 audit(266.510:87): avc:  denied  { open } for  pid=3215 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  267.053563][   T30] audit: type=1400 audit(266.530:88): avc:  denied  { ioctl } for  pid=3215 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  267.778239][ T3216] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  267.795352][ T3216] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  267.796235][ T3216] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  267.796988][ T3216] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  267.912685][   T30] audit: type=1400 audit(267.390:89): avc:  denied  { read } for  pid=3352 comm="syz-executor.0" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[  267.937109][   T30] audit: type=1400 audit(267.410:90): avc:  denied  { open } for  pid=3352 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[  267.983300][   T30] audit: type=1400 audit(267.470:91): avc:  denied  { ioctl } for  pid=3352 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[  269.045402][   T30] audit: type=1400 audit(268.530:92): avc:  denied  { create } for  pid=3355 comm="syz-executor.0" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  271.513297][   T30] audit: type=1400 audit(271.000:93): avc:  denied  { create } for  pid=3362 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  271.531540][   T30] audit: type=1400 audit(271.020:94): avc:  denied  { write } for  pid=3362 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  272.550908][   T30] audit: type=1400 audit(272.030:95): avc:  denied  { create } for  pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  272.607713][   T30] audit: type=1400 audit(272.090:96): avc:  denied  { ioctl } for  pid=3367 comm="syz-executor.1" path="socket:[4109]" dev="sockfs" ino=4109 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  272.625849][   T30] audit: type=1400 audit(272.110:97): avc:  denied  { bind } for  pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  272.664357][   T30] audit: type=1400 audit(272.150:98): avc:  denied  { write } for  pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  277.866874][   T30] audit: type=1400 audit(277.350:99): avc:  denied  { create } for  pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  280.551683][   T30] audit: type=1400 audit(280.000:100): avc:  denied  { read write } for  pid=3393 comm="syz-executor.1" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1
[  280.572572][   T30] audit: type=1400 audit(280.060:101): avc:  denied  { open } for  pid=3393 comm="syz-executor.1" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1
[  280.712382][   T30] audit: type=1400 audit(280.190:102): avc:  denied  { read write } for  pid=3393 comm="syz-executor.1" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  280.761350][   T30] audit: type=1400 audit(280.220:103): avc:  denied  { open } for  pid=3393 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  280.822025][   T30] audit: type=1400 audit(280.300:104): avc:  denied  { ioctl } for  pid=3393 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  280.857351][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.892609][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.894744][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.895653][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.896430][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.897201][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.897940][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.930895][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.932020][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.932832][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.933626][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.934411][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.935464][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.936375][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.937159][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.937880][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.952331][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.953419][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.954234][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.955061][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.955817][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.956569][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.957307][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.958020][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.984267][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.985365][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.986145][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.986943][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  280.987668][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  281.005432][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  281.006501][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  281.007305][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  281.012827][ T3394] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
[  281.115256][ T3394] misc raw-gadget: fail, usb_gadget_register_driver returned -16
[  281.205631][ T3305] hid-generic 0000:0000:0000.0001: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz0
[  281.496402][   T30] audit: type=1400 audit(280.980:105): avc:  denied  { ioctl } for  pid=3395 comm="syz-executor.0" path="socket:[4152]" dev="sockfs" ino=4152 ioctlcmd=0xf50e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  283.839271][   T30] audit: type=1400 audit(283.320:106): avc:  denied  { read write } for  pid=3400 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[  283.844965][   T30] audit: type=1400 audit(283.320:107): avc:  denied  { open } for  pid=3400 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[  287.949935][   T30] audit: type=1400 audit(287.400:108): avc:  denied  { read } for  pid=3414 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  288.862071][   T30] audit: type=1400 audit(288.340:109): avc:  denied  { create } for  pid=3417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  288.911812][   T30] audit: type=1400 audit(288.390:110): avc:  denied  { setopt } for  pid=3417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  299.924392][   T30] audit: type=1400 audit(299.410:111): avc:  denied  { execute } for  pid=3455 comm="syz-executor.1" path=2F6D656D66643AC0873A2A18C16BA7875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  300.414015][   T30] audit: type=1400 audit(299.900:112): avc:  denied  { mounton } for  pid=3457 comm="syz-executor.0" path="/syzkaller-testdir2727727509/syzkaller.oRmPgT/28/file0" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  300.415358][ T3458] fuse: Unknown parameter 'use00000000000000000000'
[  301.418939][    C0] hrtimer: interrupt took 1060448 ns
[  314.391172][   T30] audit: type=1400 audit(313.870:113): avc:  denied  { read } for  pid=3494 comm="syz-executor.1" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  314.414344][   T30] audit: type=1400 audit(313.890:114): avc:  denied  { open } for  pid=3494 comm="syz-executor.1" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  315.431730][ T3500] fuse: Unknown parameter 'user_i00000000000000000000'
[  317.595062][   T30] audit: type=1400 audit(317.080:115): avc:  denied  { name_bind } for  pid=3505 comm="syz-executor.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1
[  317.637576][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  321.289587][   T30] audit: type=1400 audit(320.760:116): avc:  denied  { create } for  pid=3515 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  321.676975][ T3518] fuse: Bad value for 'group_id'
[  325.023709][ T3530] fuse: Bad value for 'group_id'
[  344.369592][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  347.977673][   T30] audit: type=1400 audit(347.460:117): avc:  denied  { mount } for  pid=3598 comm="syz-executor.1" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  349.366601][   T30] audit: type=1400 audit(348.850:118): avc:  denied  { unmount } for  pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  350.171695][ T3604] fuse: Bad value for 'fd'
[  361.199739][ T3619] fuse: Bad value for 'fd'
[  367.656481][ T3631] fuse: Unknown parameter '0x0000000000000003'
[  369.772880][   T30] audit: type=1400 audit(369.240:119): avc:  denied  { create } for  pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  369.789819][   T30] audit: type=1400 audit(369.270:120): avc:  denied  { write } for  pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  369.791407][   T30] audit: type=1400 audit(369.270:121): avc:  denied  { nlmsg_read } for  pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  370.736079][   T30] audit: type=1400 audit(370.220:122): avc:  denied  { name_bind } for  pid=3636 comm="syz-executor.1" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1
[  374.519468][   T30] audit: type=1400 audit(374.000:123): avc:  denied  { bpf } for  pid=3644 comm="syz-executor.1" capability=39  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  374.549662][   T30] audit: type=1400 audit(374.020:124): avc:  denied  { create } for  pid=3644 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[  383.100909][ T1074] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[  383.515197][ T1074] usb 1-1: Using ep0 maxpacket: 16
[  383.680880][ T1074] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 11
[  383.683129][ T1074] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0xB has invalid wMaxPacketSize 0
[  383.683869][ T1074] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0xB has invalid maxpacket 0
[  383.684564][ T1074] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x8A has invalid wMaxPacketSize 0
[  383.684991][ T1074] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0x8A has invalid maxpacket 0
[  383.685387][ T1074] usb 1-1: config 1 interface 0 has no altsetting 0
[  383.686085][ T1074] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77
[  383.686506][ T1074] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  383.867722][ T1074] ums-sddr09 1-1:1.0: USB Mass Storage device detected
[  384.533401][   T30] audit: type=1400 audit(383.970:125): avc:  denied  { map_create } for  pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  384.930559][   T30] audit: type=1400 audit(384.340:126): avc:  denied  { map_read map_write } for  pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  385.152343][   T30] audit: type=1400 audit(384.460:127): avc:  denied  { prog_load } for  pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  385.155115][   T30] audit: type=1400 audit(384.460:128): avc:  denied  { perfmon } for  pid=3661 comm="syz-executor.0" capability=38  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  385.333521][ T1074] scsi host0: usb-storage 1-1:1.0
[  385.589764][ T1074] usb 1-1: USB disconnect, device number 2
[  389.841381][   T30] audit: type=1400 audit(389.320:129): avc:  denied  { getopt } for  pid=3674 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  391.926494][ T3684] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure
[  392.460997][   T30] audit: type=1400 audit(391.900:130): avc:  denied  { create } for  pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  392.690529][   T30] audit: type=1400 audit(392.150:131): avc:  denied  { connect } for  pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  393.187280][   T30] audit: type=1400 audit(392.670:132): avc:  denied  { write } for  pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  394.693796][ T3691] loop1: detected capacity change from 0 to 2048
[  395.323420][ T3691] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  395.362872][   T30] audit: type=1400 audit(394.810:133): avc:  denied  { mount } for  pid=3690 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  395.490399][   T30] audit: type=1400 audit(394.940:134): avc:  denied  { write } for  pid=3690 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[  395.520431][   T30] audit: type=1400 audit(394.990:135): avc:  denied  { add_name } for  pid=3690 comm="syz-executor.1" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[  395.522774][   T30] audit: type=1400 audit(395.010:136): avc:  denied  { create } for  pid=3690 comm="syz-executor.1" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[  395.545616][   T30] audit: type=1400 audit(395.030:137): avc:  denied  { read } for  pid=3000 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  395.602495][   T30] audit: type=1400 audit(395.090:138): avc:  denied  { read append open } for  pid=3690 comm="syz-executor.1" path="/syzkaller-testdir3244703694/syzkaller.KHwrLX/71/file0/cgroup.controllers" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[  395.657052][   T30] audit: type=1400 audit(395.140:139): avc:  denied  { write } for  pid=3690 comm="syz-executor.1" name="cgroup.controllers" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[  396.294648][   T30] audit: type=1400 audit(395.780:140): avc:  denied  { ioctl } for  pid=3690 comm="syz-executor.1" path="/syzkaller-testdir3244703694/syzkaller.KHwrLX/71/file0/cgroup.controllers" dev="loop1" ino=18 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1
[  396.662405][ T3698] fuse: Unknown parameter '0x0000000000000003'
[  397.848392][ T3691] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1217: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters
[  397.891123][ T3691] EXT4-fs (loop1): Remounting filesystem read-only
[  398.261178][   T30] audit: type=1400 audit(397.740:141): avc:  denied  { setopt } for  pid=3701 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  398.282178][   T30] audit: type=1400 audit(397.760:142): avc:  denied  { write } for  pid=3701 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  399.026863][ T3216] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  401.862482][   T30] kauditd_printk_skb: 1 callbacks suppressed
[  401.862585][   T30] audit: type=1400 audit(401.350:144): avc:  denied  { create } for  pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  401.893431][   T30] audit: type=1400 audit(401.380:145): avc:  denied  { ioctl } for  pid=3709 comm="syz-executor.0" path="socket:[4629]" dev="sockfs" ino=4629 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  401.905573][   T30] audit: type=1400 audit(401.390:146): avc:  denied  { bind } for  pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  401.925527][   T30] audit: type=1400 audit(401.400:147): avc:  denied  { write } for  pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  406.124101][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  418.133827][   T30] audit: type=1400 audit(417.610:148): avc:  denied  { read } for  pid=3735 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  418.135936][   T30] audit: type=1400 audit(417.610:149): avc:  denied  { open } for  pid=3735 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  418.157683][   T30] audit: type=1400 audit(417.630:150): avc:  denied  { ioctl } for  pid=3735 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  429.593512][   T30] audit: type=1400 audit(429.080:151): avc:  denied  { create } for  pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  429.606102][   T30] audit: type=1400 audit(429.080:152): avc:  denied  { bind } for  pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  430.253243][   T30] audit: type=1400 audit(429.700:153): avc:  denied  { accept } for  pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  442.636492][ T3827] fuse: Bad value for 'fd'
[  446.367613][ T3839] fuse: Bad value for 'fd'
[  449.773856][ T3851] fuse: Bad value for 'fd'
[  454.230931][ T3866] fuse: Bad value for 'fd'
[  459.259960][   T30] audit: type=1400 audit(458.720:154): avc:  denied  { create } for  pid=3878 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  459.403337][   T30] audit: type=1400 audit(458.880:155): avc:  denied  { write } for  pid=3878 comm="syz-executor.1" path="socket:[5820]" dev="sockfs" ino=5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  465.956531][ T3896] fuse: Invalid rootmode
[  467.035124][ T3899] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
[  467.063125][ T3899] misc raw-gadget: fail, usb_gadget_register_driver returned -16
[  482.727266][   T30] audit: type=1400 audit(482.210:156): avc:  denied  { create } for  pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  482.788179][   T30] audit: type=1400 audit(482.270:157): avc:  denied  { write } for  pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  482.801282][   T30] audit: type=1400 audit(482.280:158): avc:  denied  { nlmsg_write } for  pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  487.052171][ T3956] Zero length message leads to an empty skb
[  488.632178][ T3961] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  488.677329][   T30] audit: type=1400 audit(488.160:159): avc:  denied  { bind } for  pid=3959 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  488.704871][   T30] audit: type=1400 audit(488.180:160): avc:  denied  { name_bind } for  pid=3959 comm="syz-executor.0" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1
[  488.712083][   T30] audit: type=1400 audit(488.190:161): avc:  denied  { node_bind } for  pid=3959 comm="syz-executor.0" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1
[  488.787851][   T30] audit: type=1400 audit(488.270:162): avc:  denied  { setopt } for  pid=3959 comm="syz-executor.0" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  495.646937][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  517.804614][   T30] audit: type=1400 audit(517.290:163): avc:  denied  { create } for  pid=4048 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  517.852524][   T30] audit: type=1400 audit(517.340:164): avc:  denied  { ioctl } for  pid=4048 comm="syz-executor.0" path="socket:[6239]" dev="sockfs" ino=6239 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  517.985513][ T4050] fuse: Unknown parameter 'user_id00000000000000000000'
[  522.311765][ T4065] fuse: Unknown parameter 'user_id00000000000000000000'
[  523.435129][   T30] audit: type=1400 audit(522.920:165): avc:  denied  { write } for  pid=4069 comm="syz-executor.0" path="socket:[6136]" dev="sockfs" ino=6136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  527.260021][   T30] audit: type=1400 audit(526.740:166): avc:  denied  { create } for  pid=4080 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  527.290013][   T30] audit: type=1400 audit(526.770:167): avc:  denied  { ioctl } for  pid=4080 comm="syz-executor.0" path="socket:[6284]" dev="sockfs" ino=6284 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  536.681802][ T4113] fuse: Bad value for 'fd'
[  541.477622][ T4127] fuse: Bad value for 'fd'
[  548.059982][ T4139] fuse: Bad value for 'fd'
[  552.401643][ T4150] fuse: Unknown parameter '0x0000000000000003'
[  556.735552][ T4160] fuse: Unknown parameter '0x0000000000000003'
[  564.236982][ T4172] fuse: Unknown parameter '0x0000000000000003'
[  567.223967][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  567.645297][ T4182] fuse: Bad value for 'fd'
[  568.116190][ T4184] fuse: Unknown parameter '0x0000000000000003'
[  568.716442][ T4188] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  573.786200][ T4198] fuse: Bad value for 'fd'
[  574.466489][   T30] audit: type=1400 audit(573.850:168): avc:  denied  { read } for  pid=4192 comm="syz-executor.0" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  574.496984][   T30] audit: type=1400 audit(573.850:169): avc:  denied  { open } for  pid=4192 comm="syz-executor.0" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  574.513983][   T30] audit: type=1400 audit(573.880:170): avc:  denied  { ioctl } for  pid=4192 comm="syz-executor.0" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  578.515502][ T4201] fuse: Unknown parameter '0x0000000000000003'
[  586.393752][ T4211] fuse: Bad value for 'fd'
[  587.926760][ T4213] fuse: Unknown parameter '0x0000000000000003'
[  599.563234][ T4235] veth0_vlan: entered allmulticast mode
[  600.826648][ T4238] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'.
[  610.147272][   T30] audit: type=1400 audit(609.630:171): avc:  denied  { read } for  pid=4270 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  610.159917][   T30] audit: type=1400 audit(609.630:172): avc:  denied  { open } for  pid=4270 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  611.525937][   T30] audit: type=1400 audit(611.010:173): avc:  denied  { ioctl } for  pid=4276 comm="syz-executor.0" path="socket:[6557]" dev="sockfs" ino=6557 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  622.503578][   T30] audit: type=1400 audit(621.970:174): avc:  denied  { setattr } for  pid=4306 comm="syz-executor.1" name="dsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1
[  624.070164][   T30] audit: type=1400 audit(623.550:175): avc:  denied  { read } for  pid=4309 comm="syz-executor.1" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[  624.085605][   T30] audit: type=1400 audit(623.560:176): avc:  denied  { open } for  pid=4309 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[  629.160522][ T4326] fuse: Bad value for 'fd'
[  632.772949][ T4339] fuse: Bad value for 'fd'
[  638.805600][   T30] audit: type=1400 audit(638.290:177): avc:  denied  { write } for  pid=4359 comm="syz-executor.0" path="socket:[7654]" dev="sockfs" ino=7654 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  653.833012][   T30] audit: type=1400 audit(653.320:178): avc:  denied  { ioctl } for  pid=4409 comm="syz-executor.0" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7737 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  654.824609][ T4413] ==================================================================
[  654.826333][ T4413] BUG: KASAN: slab-out-of-bounds in contpte_clear_young_dirty_ptes+0x104/0x214
[  654.826907][ T4413] Read of size 8 at addr ffff0000143540b0 by task syz-executor.0/4413
[  654.827631][ T4413] 
[  654.828468][ T4413] CPU: 1 PID: 4413 Comm: syz-executor.0 Tainted: G        W          6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
[  654.829576][ T4413] Hardware name: linux,dummy-virt (DT)
[  654.830331][ T4413] Call trace:
[  654.830521][ T4413]  dump_backtrace+0x9c/0x11c
[  654.830745][ T4413]  show_stack+0x18/0x24
[  654.831188][ T4413]  dump_stack_lvl+0xa4/0xf4
[  654.831652][ T4413]  print_report+0xf4/0x5a4
[  654.832588][ T4413]  kasan_report+0xc8/0x108
[  654.833046][ T4413]  __asan_report_load8_noabort+0x20/0x2c
[  654.833467][ T4413]  contpte_clear_young_dirty_ptes+0x104/0x214
[  654.833950][ T4413]  madvise_free_pte_range+0xce8/0x10e0
[  654.834405][ T4413]  walk_pgd_range+0x8e8/0x14a4
[  654.834686][ T4413]  __walk_page_range+0x420/0x5e4
[  654.834938][ T4413]  walk_page_range+0x370/0x6f8
[  654.835353][ T4413]  madvise_free_single_vma+0x300/0x5a8
[  654.835806][ T4413]  madvise_vma_behavior+0x30c/0x1028
[  654.836240][ T4413]  madvise_walk_vmas+0x114/0x210
[  654.836571][ T4413]  do_madvise+0x20c/0x6c4
[  654.836759][ T4413]  __arm64_sys_madvise+0x88/0xdc
[  654.837107][ T4413]  invoke_syscall+0x6c/0x25c
[  654.837524][ T4413]  el0_svc_common.constprop.0+0xac/0x230
[  654.837989][ T4413]  do_el0_svc+0x40/0x58
[  654.838478][ T4413]  el0_svc+0x50/0x180
[  654.838934][ T4413]  el0t_64_sync_handler+0x100/0x12c
[  654.839408][ T4413]  el0t_64_sync+0x190/0x194
[  654.840111][ T4413] 
[  654.840477][ T4413] Allocated by task 3016:
[  654.840943][ T4413]  kasan_save_stack+0x3c/0x64
[  654.841272][ T4413]  kasan_save_track+0x20/0x3c
[  654.841694][ T4413]  kasan_save_alloc_info+0x40/0x54
[  654.842147][ T4413]  __kasan_slab_alloc+0x8c/0x90
[  654.842585][ T4413]  kmem_cache_alloc_noprof+0x128/0x2e0
[  654.842977][ T4413]  security_inode_alloc+0x34/0x1ac
[  654.843304][ T4413]  inode_init_always+0x958/0xd2c
[  654.843749][ T4413]  alloc_inode+0x6c/0x1b0
[  654.844169][ T4413]  iget_locked+0x13c/0x4ac
[  654.844580][ T4413]  kernfs_get_inode+0x3c/0x370
[  654.845015][ T4413]  kernfs_iop_lookup+0x16c/0x258
[  654.845421][ T4413]  __lookup_slow+0x1a4/0x30c
[  654.845802][ T4413]  walk_component+0x1f0/0x484
[  654.846221][ T4413]  path_lookupat+0x104/0x57c
[  654.846604][ T4413]  filename_lookup+0x154/0x3ec
[  654.847029][ T4413]  user_path_at_empty+0x4c/0x74
[  654.847427][ T4413]  do_readlinkat+0xb4/0x274
[  654.847832][ T4413]  __arm64_sys_readlinkat+0x88/0xcc
[  654.848266][ T4413]  invoke_syscall+0x6c/0x25c
[  654.848775][ T4413]  el0_svc_common.constprop.0+0xac/0x230
[  654.849222][ T4413]  do_el0_svc+0x40/0x58
[  654.849861][ T4413]  el0_svc+0x50/0x180
[  654.850250][ T4413]  el0t_64_sync_handler+0x100/0x12c
[  654.850674][ T4413]  el0t_64_sync+0x190/0x194
[  654.851237][ T4413] 
[  654.851652][ T4413] The buggy address belongs to the object at ffff000014354000
[  654.851652][ T4413]  which belongs to the cache lsm_inode_cache of size 176
[  654.852528][ T4413] The buggy address is located 0 bytes to the right of
[  654.852528][ T4413]  allocated 176-byte region [ffff000014354000, ffff0000143540b0)
[  654.853289][ T4413] 
[  654.853681][ T4413] The buggy address belongs to the physical page:
[  654.854501][ T4413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x54354
[  654.855508][ T4413] flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff)
[  654.856627][ T4413] page_type: 0xffffefff(slab)
[  654.857744][ T4413] raw: 01ffc00000000000 ffff00000a13ec80 dead000000000122 0000000000000000
[  654.858370][ T4413] raw: 0000000000000000 0000000000110011 00000001ffffefff 0000000000000000
[  654.859219][ T4413] page dumped because: kasan: bad access detected
[  654.859907][ T4413] 
[  654.860257][ T4413] Memory state around the buggy address:
[  654.861140][ T4413]  ffff000014353f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  654.861754][ T4413]  ffff000014354000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  654.862312][ T4413] >ffff000014354080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc 00 00
[  654.862868][ T4413]                                      ^
[  654.863417][ T4413]  ffff000014354100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  654.863878][ T4413]  ffff000014354180: 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00
[  654.864472][ T4413] ==================================================================
[  654.867635][ T4413] Disabling lock debugging due to kernel taint
[  654.893195][    C1] Unable to handle kernel paging request at virtual address 007f800080ab8af0
[  654.894087][    C1] Mem abort info:
[  654.894422][    C1]   ESR = 0x0000000086000004
[  654.894867][    C1]   EC = 0x21: IABT (current EL), IL = 32 bits
[  654.895306][    C1]   SET = 0, FnV = 0
[  654.895650][    C1]   EA = 0, S1PTW = 0
[  654.896027][    C1]   FSC = 0x04: level 0 translation fault
[  654.896483][    C1] [007f800080ab8af0] address between user and kernel address ranges
[  654.897455][    C1] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
[  654.898224][    C1] Modules linked in:
[  654.898948][    C1] CPU: 1 PID: 3190 Comm: sshd Tainted: G    B   W          6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
[  654.899796][    C1] Hardware name: linux,dummy-virt (DT)
[  654.899949][ T3216] Unable to handle kernel paging request at virtual address 007f800080ab8af0
[  654.900227][ T3216] Mem abort info:
[  654.900569][    C1] pstate: 100000c5 (nzcV daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  654.900881][ T3216]   ESR = 0x0000000086000004
[  654.901737][ T3216]   EC = 0x21: IABT (current EL), IL = 32 bits
[  654.901203][    C1] pc : 0x7f800080ab8af0
[  654.902052][ T3216]   SET = 0, FnV = 0
[  654.902302][    C1] lr : __wake_up_common+0x134/0x1e4
[  654.902546][ T3216]   EA = 0, S1PTW = 0
[  654.902787][    C1] sp : ffff800089777210
[  654.903002][ T3216]   FSC = 0x04: level 0 translation fault
[  654.903223][    C1] x29: ffff800089777210
[  654.903465][ T3216] [007f800080ab8af0] address between user and kernel address ranges
[  654.904506][    C1]  x28: dfff800000000000 x27: 0000000000000080
[  654.905230][    C1] x26: 0000000000000003 x25: ffff0000172f6680 x24: 0000000000000000
[  654.905876][    C1] x23: 0000000000000000 x22: 0000000000000001 x21: 0000000000000000
[  654.906510][    C1] x20: ffff0000143843d0 x19: ff7f0000172f6268 x18: 0000000000000000
[  654.907192][    C1] x17: ffff7fffe3eaa000 x16: ffff800089770000 x15: ffff800083f66390
[  654.907831][    C1] x14: ffff00000fc8e0e8 x13: 0000000000000004 x12: ffff7000112eee41
[  654.908614][    C1] x11: 1ffff000112eee40 x10: ffff7000112eee40 x9 : dfff800000000000
[  654.909242][    C1] x8 : 1ffff00010d05f6c x7 : 0000000000000000 x6 : ffff80008682fb64
[  654.909881][    C1] x5 : 0000000000000007 x4 : ff7f800080ab8af0 x3 : 0000000000000000
[  654.910538][    C1] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff0000143843d0
[  654.911228][    C1] Call trace:
[  654.911539][    C1]  0x7f800080ab8af0
[  654.911907][    C1]  __wake_up+0x44/0x70
[  654.912284][    C1]  sock_def_wakeup+0xb4/0x1e0
[  654.912658][    C1]  tcp_fin+0x278/0x714
[  654.913033][    C1]  tcp_data_queue+0x1730/0x4a5c
[  654.913410][    C1]  tcp_rcv_established+0x7f8/0x1fec
[  654.913811][    C1]  tcp_v4_do_rcv+0x558/0x928
[  654.914203][    C1]  tcp_v4_rcv+0x2144/0x3068
[  654.914580][    C1]  ip_protocol_deliver_rcu+0xb8/0x3ec
[  654.915031][    C1]  ip_local_deliver_finish+0x254/0x454
[  654.915439][    C1]  ip_local_deliver+0x16c/0x3a4
[  654.915823][    C1]  ip_rcv_finish+0x140/0x224
[  654.916200][    C1]  ip_rcv+0xc0/0x2c8
[  654.916548][    C1]  __netif_receive_skb_one_core+0xf4/0x168
[  654.916945][    C1]  __netif_receive_skb+0x24/0x14c
[  654.917344][    C1]  process_backlog+0xf4/0x568
[  654.917719][    C1]  __napi_poll.constprop.0+0x9c/0x5f0
[  654.918126][    C1]  net_rx_action+0x77c/0xb90
[  654.918526][    C1]  handle_softirqs+0x2f0/0xd80
[  654.918932][    C1]  __do_softirq+0x14/0x20
[  654.919316][    C1]  ____do_softirq+0x10/0x1c
[  654.919713][    C1]  call_on_irq_stack+0x24/0x4c
[  654.920077][    C1]  do_softirq_own_stack+0x1c/0x2c
[  654.920453][    C1]  do_softirq+0x12c/0x150
[  654.920810][    C1]  __local_bh_enable_ip+0x40c/0x49c
[  654.921189][    C1]  __dev_queue_xmit+0x6bc/0x33f4
[  654.921557][    C1]  ip_finish_output2+0xabc/0x214c
[  654.921947][    C1]  __ip_finish_output+0x2bc/0x4e0
[  654.922344][    C1]  ip_finish_output+0x34/0x278
[  654.922715][    C1]  ip_output+0x144/0x400
[  654.923118][    C1]  __ip_queue_xmit+0x804/0x195c
[  654.923516][    C1]  ip_queue_xmit+0x44/0x64
[  654.923907][    C1]  __tcp_transmit_skb+0x13bc/0x36ec
[  654.924373][    C1]  tcp_write_xmit+0x11ec/0x7f8c
[  654.924773][    C1]  __tcp_push_pending_frames+0x88/0x2d4
[  654.925185][    C1]  tcp_send_fin+0x13c/0x9cc
[  654.925560][    C1]  tcp_shutdown+0xf4/0x150
[  654.925930][    C1]  inet_shutdown+0x140/0x348
[  654.926261][    C1]  __sys_shutdown+0xe0/0x180
[  654.926442][    C1]  __arm64_sys_shutdown+0x50/0x74
[  654.926625][    C1]  invoke_syscall+0x6c/0x25c
[  654.926808][    C1]  el0_svc_common.constprop.0+0xac/0x230
[  654.927177][    C1]  do_el0_svc+0x40/0x58
[  654.927535][    C1]  el0_svc+0x50/0x180
[  654.927898][    C1]  el0t_64_sync_handler+0x100/0x12c
[  654.928302][    C1]  el0t_64_sync+0x190/0x194
[  654.929276][    C1] Code: ???????? ???????? ???????? ???????? (????????) 
[  654.930692][    C1] ---[ end trace 0000000000000000 ]---
[  654.931528][    C1] Kernel panic - not syncing: Oops: Fatal exception in interrupt
[  654.932653][    C1] SMP: stopping secondary CPUs
[  656.658708][    C1] SMP: failed to stop secondary CPUs 0-1
[  656.660285][    C1] Kernel Offset: disabled
[  656.660539][    C1] CPU features: 0x04,40001001,a0100000,0200421b
[  656.661213][    C1] Memory Limit: none
[  656.661778][    C1] Rebooting in 86400 seconds..

VM DIAGNOSIS:
06:28:26  Registers:
info registers vcpu 0

CPU#0
 PC=ffff800084f01904 X00=ffff800084f01900 X01=0000000000000003
X02=0000000000000000 X03=1fffe000025ab001 X04=1fffe000025ab02b
X05=0000000000000400 X06=0000000000000003 X07=dfff800000000000
X08=dfff800000000000 X09=b5bbf5631d372e58 X10=ffff80008682fb68
X11=0000000000000000 X12=1ffff0001101716e X13=0000000000000004
X14=0000000000000000 X15=1fffe000025ab14f X16=0000000000000006
X17=22b3227b684326e5 X18=ffff000012d58a80 X19=ffff800086a57f70
X20=ffff800086a57f40 X21=0000000000000000 X22=0000000000000004
X23=0000000000000028 X24=ffff800086a57f70 X25=1fffe00002338633
X26=ffff0000119c3198 X27=00000000000009a1 X28=1fffe00002338620
X29=ffff800080006f70 X30=ffff800084f000a8  SP=ffff800080006f70
PSTATE=100000c5 ---V EL1h     FPCR=00000000 FPSR=00000000
Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000
Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000
Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002
Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000ffffda1d5ef0:0000ffffda1d5ef0 Q17=ffffff80ffffffd0:0000ffffda1d5ec0
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000
info registers vcpu 1

CPU#1
 PC=ffff800084f26d64 X00=00000000000000c0 X01=0000000000000001
X02=0000000000000001 X03=ffff8000802e8020 X04=ffff700010df2afd
X05=ffff800086f957e0 X06=ffff700010df2afc X07=0000000000000001
X08=ffff800086f957e0 X09=dfff800000000000 X10=ffff700010df2afc
X11=1ffff00010df2afc X12=ffff700010df2afd X13=205d333134345420
X14=0000000000000000 X15=0000000000000000 X16=0000000000000000
X17=0000000000000000 X18=ffff000013848a80 X19=00000000000000c0
X20=ffff800086f957e0 X21=0000000000000000 X22=ffff80008cf86de0
X23=1fffe000016ad85a X24=ffff00000b56c2d0 X25=1ffff00010e04d1a
X26=ffff800087026918 X27=000000000000003c X28=ffff00000b56c080
X29=ffff80008cf86b40 X30=ffff800084f26d54  SP=ffff80008cf86b40
PSTATE=600000c5 -ZC- EL1h     FPCR=00000000 FPSR=00000000
Q00=0000000000000000:0000000000000000 Q01=0000ffffda1d5cd0:0000ffff99e26a64
Q02=0000ffffda1d5ec0:0000ffffda1d5ef0 Q03=0000ffffda1d5cc0:ffffff80ffffffd8
Q04=000000000009f45e:0000ffff99f80000 Q05=0000ffffda1d5ef0:431bde82d7b634db
Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000ffffda1d5ef0:0000ffffda1d5ef0 Q17=ffffff80ffffffd0:0000ffffda1d5ec0
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000