last executing test programs: 8.889538787s ago: executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000003c0)) 7.571902612s ago: executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) ioctl$BTRFS_IOC_SYNC(r0, 0x8902, 0x20000000) 7.198827614s ago: executing program 1: syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x0) ioctl$SNDCTL_SEQ_PANIC(0xffffffffffffffff, 0x5111) 6.151204535s ago: executing program 0: landlock_restrict_self(0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x80049370, 0x0) 5.791576627s ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x104c, &(0x7f0000001440)) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) close(r1) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x154, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}]}, 0x154}}, 0x0) 5.074039699s ago: executing program 0: setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}}, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(0xffffffffffffffff, 0x12, 0x0, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @private}, &(0x7f00000000c0)=0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x511400, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) write$FUSE_STATFS(r1, &(0x7f00000021c0)={0x60, 0x7fffffffffffffd0, 0x0, {{0x80000001, 0x48000000, 0xfffffffffffffcd9, 0x7, 0x7, 0x0, 0x4, 0x94f}}}, 0x60) fcntl$setstatus(r1, 0x4, 0x40000) syz_open_pts(0xffffffffffffffff, 0x2000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002340)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @dev}, 0x335}) 4.537680245s ago: executing program 1: setitimer(0x0, &(0x7f0000000000)={{0x0, 0x2710}}, &(0x7f0000000040)) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(0xffffffffffffffff, 0x12, 0x0, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @private}, &(0x7f00000000c0)=0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x511400, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) write$FUSE_STATFS(r1, &(0x7f00000021c0)={0x60, 0x7fffffffffffffd0, 0x0, {{0x80000001, 0x48000000, 0xfffffffffffffcd9, 0x7, 0x7, 0x0, 0x4, 0x94f}}}, 0x60) fcntl$setstatus(r1, 0x4, 0x40000) syz_open_pts(0xffffffffffffffff, 0x2000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002340)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, {0x2, 0x0, @dev}, 0x335}) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = fsopen(&(0x7f00000000c0)='cramfs\x00', 0x0) r4 = fsmount(r3, 0x0, 0x0) dup3(r2, r4, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x241, 0x379) openat$fuse(0xffffffffffffff9c, &(0x7f0000000a80), 0x42, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r6, &(0x7f0000000100)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r7) ioctl$TIOCGPKT(r5, 0x5451, 0x0) 3.700227338s ago: executing program 0: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000001880)=[0x0]) 2.609688983s ago: executing program 0: r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$netlink(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}], 0x20}, 0x0) 1.740032369s ago: executing program 0: madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eb2, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) 999.762023ms ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x104c, &(0x7f0000001440)) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) close(r1) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x154, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}]}, 0x154}}, 0x0) 0s ago: executing program 1: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:17628' (ED25519) to the list of known hosts. [ 219.664692][ T30] audit: type=1400 audit(219.150:58): avc: denied { name_bind } for pid=3190 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 220.181579][ T30] audit: type=1400 audit(219.670:59): avc: denied { execute } for pid=3192 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 220.188168][ T30] audit: type=1400 audit(219.670:60): avc: denied { execute_no_trans } for pid=3192 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:03:46 fuzzer started [ 229.867123][ T30] audit: type=1400 audit(229.350:61): avc: denied { node_bind } for pid=3192 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 229.905438][ T30] audit: type=1400 audit(229.390:62): avc: denied { name_bind } for pid=3192 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:03:49 dialing manager at localhost:30002 [ 233.865628][ T30] audit: type=1400 audit(233.300:63): avc: denied { setattr } for pid=3202 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.979061][ T30] audit: type=1400 audit(233.460:64): avc: denied { mounton } for pid=3201 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 233.980171][ T30] audit: type=1400 audit(233.460:65): avc: denied { mount } for pid=3201 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 234.200512][ T30] audit: type=1400 audit(233.690:66): avc: denied { mounton } for pid=3200 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 234.230000][ T30] audit: type=1400 audit(233.710:67): avc: denied { mount } for pid=3200 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 234.288920][ T3200] cgroup: Unknown subsys name 'net' [ 234.312687][ T30] audit: type=1400 audit(233.800:68): avc: denied { unmount } for pid=3200 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 234.776245][ T3209] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 234.787875][ T30] audit: type=1400 audit(234.270:69): avc: denied { relabelto } for pid=3209 comm="mkswap" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 234.809640][ T30] audit: type=1400 audit(234.290:70): avc: denied { write } for pid=3209 comm="mkswap" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 234.871056][ T3200] cgroup: Unknown subsys name 'rlimit' [ 234.955796][ T30] audit: type=1400 audit(234.440:71): avc: denied { read } for pid=3204 comm="syz-executor" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 234.959979][ T30] audit: type=1400 audit(234.440:72): avc: denied { open } for pid=3204 comm="syz-executor" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 234.997384][ T3204] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:54 starting 2 executor processes [ 235.869363][ T30] audit: type=1400 audit(235.350:73): avc: denied { execmem } for pid=3212 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 236.009413][ T30] audit: type=1400 audit(235.480:74): avc: denied { mounton } for pid=3215 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 236.053432][ T30] audit: type=1400 audit(235.540:75): avc: denied { mount } for pid=3215 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 236.074518][ T30] audit: type=1400 audit(235.560:76): avc: denied { read } for pid=3216 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 236.081839][ T30] audit: type=1400 audit(235.570:77): avc: denied { open } for pid=3216 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 236.103346][ T30] audit: type=1400 audit(235.590:78): avc: denied { mounton } for pid=3215 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 236.219913][ T30] audit: type=1400 audit(235.700:79): avc: denied { module_request } for pid=3216 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 236.550428][ T30] audit: type=1400 audit(236.020:80): avc: denied { sys_module } for pid=3215 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 243.885590][ T3216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.910464][ T3216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.293130][ T3215] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.355808][ T3215] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.353759][ T3216] hsr_slave_0: entered promiscuous mode [ 247.425506][ T3216] hsr_slave_1: entered promiscuous mode [ 248.092376][ T3215] hsr_slave_0: entered promiscuous mode [ 248.132453][ T3215] hsr_slave_1: entered promiscuous mode [ 248.170501][ T3215] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 248.173121][ T3215] Cannot create hsr debugfs directory [ 249.900776][ T30] audit: type=1400 audit(249.380:81): avc: denied { create } for pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 249.905585][ T30] audit: type=1400 audit(249.390:82): avc: denied { write } for pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 249.911627][ T30] audit: type=1400 audit(249.400:83): avc: denied { read } for pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 249.931392][ T3216] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 250.016181][ T3216] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 250.074130][ T3216] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 250.133393][ T3216] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 250.666045][ T3215] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 250.721487][ T3215] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 250.747190][ T3215] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 250.782126][ T3215] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 252.705417][ T3215] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.803769][ T3216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.341072][ T3215] veth0_vlan: entered promiscuous mode [ 264.494707][ T3215] veth1_vlan: entered promiscuous mode [ 264.991776][ T3215] veth0_macvtap: entered promiscuous mode [ 265.048276][ T3215] veth1_macvtap: entered promiscuous mode [ 265.460879][ T3215] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.463320][ T3215] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.464172][ T3215] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.464906][ T3215] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.213527][ T3216] veth0_vlan: entered promiscuous mode [ 266.292003][ T30] audit: type=1400 audit(265.750:84): avc: denied { mounton } for pid=3215 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 266.398175][ T30] audit: type=1400 audit(265.880:85): avc: denied { mount } for pid=3215 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 266.411188][ T3216] veth1_vlan: entered promiscuous mode [ 266.754170][ T3216] veth0_macvtap: entered promiscuous mode [ 266.827738][ T3216] veth1_macvtap: entered promiscuous mode [ 267.012201][ T30] audit: type=1400 audit(266.490:86): avc: denied { read write } for pid=3215 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 267.025737][ T30] audit: type=1400 audit(266.510:87): avc: denied { open } for pid=3215 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 267.053563][ T30] audit: type=1400 audit(266.530:88): avc: denied { ioctl } for pid=3215 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 267.778239][ T3216] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.795352][ T3216] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.796235][ T3216] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.796988][ T3216] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.912685][ T30] audit: type=1400 audit(267.390:89): avc: denied { read } for pid=3352 comm="syz-executor.0" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 267.937109][ T30] audit: type=1400 audit(267.410:90): avc: denied { open } for pid=3352 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 267.983300][ T30] audit: type=1400 audit(267.470:91): avc: denied { ioctl } for pid=3352 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 269.045402][ T30] audit: type=1400 audit(268.530:92): avc: denied { create } for pid=3355 comm="syz-executor.0" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 271.513297][ T30] audit: type=1400 audit(271.000:93): avc: denied { create } for pid=3362 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 271.531540][ T30] audit: type=1400 audit(271.020:94): avc: denied { write } for pid=3362 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 272.550908][ T30] audit: type=1400 audit(272.030:95): avc: denied { create } for pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 272.607713][ T30] audit: type=1400 audit(272.090:96): avc: denied { ioctl } for pid=3367 comm="syz-executor.1" path="socket:[4109]" dev="sockfs" ino=4109 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 272.625849][ T30] audit: type=1400 audit(272.110:97): avc: denied { bind } for pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 272.664357][ T30] audit: type=1400 audit(272.150:98): avc: denied { write } for pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 277.866874][ T30] audit: type=1400 audit(277.350:99): avc: denied { create } for pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 280.551683][ T30] audit: type=1400 audit(280.000:100): avc: denied { read write } for pid=3393 comm="syz-executor.1" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 280.572572][ T30] audit: type=1400 audit(280.060:101): avc: denied { open } for pid=3393 comm="syz-executor.1" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 280.712382][ T30] audit: type=1400 audit(280.190:102): avc: denied { read write } for pid=3393 comm="syz-executor.1" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 280.761350][ T30] audit: type=1400 audit(280.220:103): avc: denied { open } for pid=3393 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 280.822025][ T30] audit: type=1400 audit(280.300:104): avc: denied { ioctl } for pid=3393 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 280.857351][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.892609][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.894744][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.895653][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.896430][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.897201][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.897940][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.930895][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.932020][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.932832][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.933626][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.934411][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.935464][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.936375][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.937159][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.937880][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.952331][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.953419][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.954234][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.955061][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.955817][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.956569][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.957307][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.958020][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.984267][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.985365][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.986145][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.986943][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 280.987668][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 281.005432][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 281.006501][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 281.007305][ T3305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 281.012827][ T3394] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 281.115256][ T3394] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 281.205631][ T3305] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 281.496402][ T30] audit: type=1400 audit(280.980:105): avc: denied { ioctl } for pid=3395 comm="syz-executor.0" path="socket:[4152]" dev="sockfs" ino=4152 ioctlcmd=0xf50e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 283.839271][ T30] audit: type=1400 audit(283.320:106): avc: denied { read write } for pid=3400 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 283.844965][ T30] audit: type=1400 audit(283.320:107): avc: denied { open } for pid=3400 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 287.949935][ T30] audit: type=1400 audit(287.400:108): avc: denied { read } for pid=3414 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 288.862071][ T30] audit: type=1400 audit(288.340:109): avc: denied { create } for pid=3417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 288.911812][ T30] audit: type=1400 audit(288.390:110): avc: denied { setopt } for pid=3417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 299.924392][ T30] audit: type=1400 audit(299.410:111): avc: denied { execute } for pid=3455 comm="syz-executor.1" path=2F6D656D66643AC0873A2A18C16BA7875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 300.414015][ T30] audit: type=1400 audit(299.900:112): avc: denied { mounton } for pid=3457 comm="syz-executor.0" path="/syzkaller-testdir2727727509/syzkaller.oRmPgT/28/file0" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 300.415358][ T3458] fuse: Unknown parameter 'use00000000000000000000' [ 301.418939][ C0] hrtimer: interrupt took 1060448 ns [ 314.391172][ T30] audit: type=1400 audit(313.870:113): avc: denied { read } for pid=3494 comm="syz-executor.1" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 314.414344][ T30] audit: type=1400 audit(313.890:114): avc: denied { open } for pid=3494 comm="syz-executor.1" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 315.431730][ T3500] fuse: Unknown parameter 'user_i00000000000000000000' [ 317.595062][ T30] audit: type=1400 audit(317.080:115): avc: denied { name_bind } for pid=3505 comm="syz-executor.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 317.637576][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 321.289587][ T30] audit: type=1400 audit(320.760:116): avc: denied { create } for pid=3515 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 321.676975][ T3518] fuse: Bad value for 'group_id' [ 325.023709][ T3530] fuse: Bad value for 'group_id' [ 344.369592][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 347.977673][ T30] audit: type=1400 audit(347.460:117): avc: denied { mount } for pid=3598 comm="syz-executor.1" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 349.366601][ T30] audit: type=1400 audit(348.850:118): avc: denied { unmount } for pid=3216 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 350.171695][ T3604] fuse: Bad value for 'fd' [ 361.199739][ T3619] fuse: Bad value for 'fd' [ 367.656481][ T3631] fuse: Unknown parameter '0x0000000000000003' [ 369.772880][ T30] audit: type=1400 audit(369.240:119): avc: denied { create } for pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 369.789819][ T30] audit: type=1400 audit(369.270:120): avc: denied { write } for pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 369.791407][ T30] audit: type=1400 audit(369.270:121): avc: denied { nlmsg_read } for pid=3634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 370.736079][ T30] audit: type=1400 audit(370.220:122): avc: denied { name_bind } for pid=3636 comm="syz-executor.1" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 374.519468][ T30] audit: type=1400 audit(374.000:123): avc: denied { bpf } for pid=3644 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 374.549662][ T30] audit: type=1400 audit(374.020:124): avc: denied { create } for pid=3644 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 383.100909][ T1074] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 383.515197][ T1074] usb 1-1: Using ep0 maxpacket: 16 [ 383.680880][ T1074] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 11 [ 383.683129][ T1074] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0xB has invalid wMaxPacketSize 0 [ 383.683869][ T1074] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0xB has invalid maxpacket 0 [ 383.684564][ T1074] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x8A has invalid wMaxPacketSize 0 [ 383.684991][ T1074] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0x8A has invalid maxpacket 0 [ 383.685387][ T1074] usb 1-1: config 1 interface 0 has no altsetting 0 [ 383.686085][ T1074] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77 [ 383.686506][ T1074] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 383.867722][ T1074] ums-sddr09 1-1:1.0: USB Mass Storage device detected [ 384.533401][ T30] audit: type=1400 audit(383.970:125): avc: denied { map_create } for pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 384.930559][ T30] audit: type=1400 audit(384.340:126): avc: denied { map_read map_write } for pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.152343][ T30] audit: type=1400 audit(384.460:127): avc: denied { prog_load } for pid=3661 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.155115][ T30] audit: type=1400 audit(384.460:128): avc: denied { perfmon } for pid=3661 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 385.333521][ T1074] scsi host0: usb-storage 1-1:1.0 [ 385.589764][ T1074] usb 1-1: USB disconnect, device number 2 [ 389.841381][ T30] audit: type=1400 audit(389.320:129): avc: denied { getopt } for pid=3674 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 391.926494][ T3684] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure [ 392.460997][ T30] audit: type=1400 audit(391.900:130): avc: denied { create } for pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 392.690529][ T30] audit: type=1400 audit(392.150:131): avc: denied { connect } for pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 393.187280][ T30] audit: type=1400 audit(392.670:132): avc: denied { write } for pid=3681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 394.693796][ T3691] loop1: detected capacity change from 0 to 2048 [ 395.323420][ T3691] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 395.362872][ T30] audit: type=1400 audit(394.810:133): avc: denied { mount } for pid=3690 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 395.490399][ T30] audit: type=1400 audit(394.940:134): avc: denied { write } for pid=3690 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 395.520431][ T30] audit: type=1400 audit(394.990:135): avc: denied { add_name } for pid=3690 comm="syz-executor.1" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 395.522774][ T30] audit: type=1400 audit(395.010:136): avc: denied { create } for pid=3690 comm="syz-executor.1" name="cgroup.controllers" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 395.545616][ T30] audit: type=1400 audit(395.030:137): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 395.602495][ T30] audit: type=1400 audit(395.090:138): avc: denied { read append open } for pid=3690 comm="syz-executor.1" path="/syzkaller-testdir3244703694/syzkaller.KHwrLX/71/file0/cgroup.controllers" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 395.657052][ T30] audit: type=1400 audit(395.140:139): avc: denied { write } for pid=3690 comm="syz-executor.1" name="cgroup.controllers" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 396.294648][ T30] audit: type=1400 audit(395.780:140): avc: denied { ioctl } for pid=3690 comm="syz-executor.1" path="/syzkaller-testdir3244703694/syzkaller.KHwrLX/71/file0/cgroup.controllers" dev="loop1" ino=18 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 396.662405][ T3698] fuse: Unknown parameter '0x0000000000000003' [ 397.848392][ T3691] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1217: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 397.891123][ T3691] EXT4-fs (loop1): Remounting filesystem read-only [ 398.261178][ T30] audit: type=1400 audit(397.740:141): avc: denied { setopt } for pid=3701 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 398.282178][ T30] audit: type=1400 audit(397.760:142): avc: denied { write } for pid=3701 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 399.026863][ T3216] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 401.862482][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 401.862585][ T30] audit: type=1400 audit(401.350:144): avc: denied { create } for pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 401.893431][ T30] audit: type=1400 audit(401.380:145): avc: denied { ioctl } for pid=3709 comm="syz-executor.0" path="socket:[4629]" dev="sockfs" ino=4629 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 401.905573][ T30] audit: type=1400 audit(401.390:146): avc: denied { bind } for pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 401.925527][ T30] audit: type=1400 audit(401.400:147): avc: denied { write } for pid=3709 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 406.124101][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 418.133827][ T30] audit: type=1400 audit(417.610:148): avc: denied { read } for pid=3735 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 418.135936][ T30] audit: type=1400 audit(417.610:149): avc: denied { open } for pid=3735 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 418.157683][ T30] audit: type=1400 audit(417.630:150): avc: denied { ioctl } for pid=3735 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 429.593512][ T30] audit: type=1400 audit(429.080:151): avc: denied { create } for pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 429.606102][ T30] audit: type=1400 audit(429.080:152): avc: denied { bind } for pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 430.253243][ T30] audit: type=1400 audit(429.700:153): avc: denied { accept } for pid=3774 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 442.636492][ T3827] fuse: Bad value for 'fd' [ 446.367613][ T3839] fuse: Bad value for 'fd' [ 449.773856][ T3851] fuse: Bad value for 'fd' [ 454.230931][ T3866] fuse: Bad value for 'fd' [ 459.259960][ T30] audit: type=1400 audit(458.720:154): avc: denied { create } for pid=3878 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 459.403337][ T30] audit: type=1400 audit(458.880:155): avc: denied { write } for pid=3878 comm="syz-executor.1" path="socket:[5820]" dev="sockfs" ino=5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 465.956531][ T3896] fuse: Invalid rootmode [ 467.035124][ T3899] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 467.063125][ T3899] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 482.727266][ T30] audit: type=1400 audit(482.210:156): avc: denied { create } for pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 482.788179][ T30] audit: type=1400 audit(482.270:157): avc: denied { write } for pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 482.801282][ T30] audit: type=1400 audit(482.280:158): avc: denied { nlmsg_write } for pid=3944 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 487.052171][ T3956] Zero length message leads to an empty skb [ 488.632178][ T3961] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 488.677329][ T30] audit: type=1400 audit(488.160:159): avc: denied { bind } for pid=3959 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 488.704871][ T30] audit: type=1400 audit(488.180:160): avc: denied { name_bind } for pid=3959 comm="syz-executor.0" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 488.712083][ T30] audit: type=1400 audit(488.190:161): avc: denied { node_bind } for pid=3959 comm="syz-executor.0" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 488.787851][ T30] audit: type=1400 audit(488.270:162): avc: denied { setopt } for pid=3959 comm="syz-executor.0" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 495.646937][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 517.804614][ T30] audit: type=1400 audit(517.290:163): avc: denied { create } for pid=4048 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 517.852524][ T30] audit: type=1400 audit(517.340:164): avc: denied { ioctl } for pid=4048 comm="syz-executor.0" path="socket:[6239]" dev="sockfs" ino=6239 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 517.985513][ T4050] fuse: Unknown parameter 'user_id00000000000000000000' [ 522.311765][ T4065] fuse: Unknown parameter 'user_id00000000000000000000' [ 523.435129][ T30] audit: type=1400 audit(522.920:165): avc: denied { write } for pid=4069 comm="syz-executor.0" path="socket:[6136]" dev="sockfs" ino=6136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 527.260021][ T30] audit: type=1400 audit(526.740:166): avc: denied { create } for pid=4080 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 527.290013][ T30] audit: type=1400 audit(526.770:167): avc: denied { ioctl } for pid=4080 comm="syz-executor.0" path="socket:[6284]" dev="sockfs" ino=6284 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 536.681802][ T4113] fuse: Bad value for 'fd' [ 541.477622][ T4127] fuse: Bad value for 'fd' [ 548.059982][ T4139] fuse: Bad value for 'fd' [ 552.401643][ T4150] fuse: Unknown parameter '0x0000000000000003' [ 556.735552][ T4160] fuse: Unknown parameter '0x0000000000000003' [ 564.236982][ T4172] fuse: Unknown parameter '0x0000000000000003' [ 567.223967][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 567.645297][ T4182] fuse: Bad value for 'fd' [ 568.116190][ T4184] fuse: Unknown parameter '0x0000000000000003' [ 568.716442][ T4188] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 573.786200][ T4198] fuse: Bad value for 'fd' [ 574.466489][ T30] audit: type=1400 audit(573.850:168): avc: denied { read } for pid=4192 comm="syz-executor.0" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 574.496984][ T30] audit: type=1400 audit(573.850:169): avc: denied { open } for pid=4192 comm="syz-executor.0" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 574.513983][ T30] audit: type=1400 audit(573.880:170): avc: denied { ioctl } for pid=4192 comm="syz-executor.0" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 578.515502][ T4201] fuse: Unknown parameter '0x0000000000000003' [ 586.393752][ T4211] fuse: Bad value for 'fd' [ 587.926760][ T4213] fuse: Unknown parameter '0x0000000000000003' [ 599.563234][ T4235] veth0_vlan: entered allmulticast mode [ 600.826648][ T4238] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 610.147272][ T30] audit: type=1400 audit(609.630:171): avc: denied { read } for pid=4270 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.159917][ T30] audit: type=1400 audit(609.630:172): avc: denied { open } for pid=4270 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 611.525937][ T30] audit: type=1400 audit(611.010:173): avc: denied { ioctl } for pid=4276 comm="syz-executor.0" path="socket:[6557]" dev="sockfs" ino=6557 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 622.503578][ T30] audit: type=1400 audit(621.970:174): avc: denied { setattr } for pid=4306 comm="syz-executor.1" name="dsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 624.070164][ T30] audit: type=1400 audit(623.550:175): avc: denied { read } for pid=4309 comm="syz-executor.1" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 624.085605][ T30] audit: type=1400 audit(623.560:176): avc: denied { open } for pid=4309 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 629.160522][ T4326] fuse: Bad value for 'fd' [ 632.772949][ T4339] fuse: Bad value for 'fd' [ 638.805600][ T30] audit: type=1400 audit(638.290:177): avc: denied { write } for pid=4359 comm="syz-executor.0" path="socket:[7654]" dev="sockfs" ino=7654 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 653.833012][ T30] audit: type=1400 audit(653.320:178): avc: denied { ioctl } for pid=4409 comm="syz-executor.0" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7737 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 654.824609][ T4413] ================================================================== [ 654.826333][ T4413] BUG: KASAN: slab-out-of-bounds in contpte_clear_young_dirty_ptes+0x104/0x214 [ 654.826907][ T4413] Read of size 8 at addr ffff0000143540b0 by task syz-executor.0/4413 [ 654.827631][ T4413] [ 654.828468][ T4413] CPU: 1 PID: 4413 Comm: syz-executor.0 Tainted: G W 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 [ 654.829576][ T4413] Hardware name: linux,dummy-virt (DT) [ 654.830331][ T4413] Call trace: [ 654.830521][ T4413] dump_backtrace+0x9c/0x11c [ 654.830745][ T4413] show_stack+0x18/0x24 [ 654.831188][ T4413] dump_stack_lvl+0xa4/0xf4 [ 654.831652][ T4413] print_report+0xf4/0x5a4 [ 654.832588][ T4413] kasan_report+0xc8/0x108 [ 654.833046][ T4413] __asan_report_load8_noabort+0x20/0x2c [ 654.833467][ T4413] contpte_clear_young_dirty_ptes+0x104/0x214 [ 654.833950][ T4413] madvise_free_pte_range+0xce8/0x10e0 [ 654.834405][ T4413] walk_pgd_range+0x8e8/0x14a4 [ 654.834686][ T4413] __walk_page_range+0x420/0x5e4 [ 654.834938][ T4413] walk_page_range+0x370/0x6f8 [ 654.835353][ T4413] madvise_free_single_vma+0x300/0x5a8 [ 654.835806][ T4413] madvise_vma_behavior+0x30c/0x1028 [ 654.836240][ T4413] madvise_walk_vmas+0x114/0x210 [ 654.836571][ T4413] do_madvise+0x20c/0x6c4 [ 654.836759][ T4413] __arm64_sys_madvise+0x88/0xdc [ 654.837107][ T4413] invoke_syscall+0x6c/0x25c [ 654.837524][ T4413] el0_svc_common.constprop.0+0xac/0x230 [ 654.837989][ T4413] do_el0_svc+0x40/0x58 [ 654.838478][ T4413] el0_svc+0x50/0x180 [ 654.838934][ T4413] el0t_64_sync_handler+0x100/0x12c [ 654.839408][ T4413] el0t_64_sync+0x190/0x194 [ 654.840111][ T4413] [ 654.840477][ T4413] Allocated by task 3016: [ 654.840943][ T4413] kasan_save_stack+0x3c/0x64 [ 654.841272][ T4413] kasan_save_track+0x20/0x3c [ 654.841694][ T4413] kasan_save_alloc_info+0x40/0x54 [ 654.842147][ T4413] __kasan_slab_alloc+0x8c/0x90 [ 654.842585][ T4413] kmem_cache_alloc_noprof+0x128/0x2e0 [ 654.842977][ T4413] security_inode_alloc+0x34/0x1ac [ 654.843304][ T4413] inode_init_always+0x958/0xd2c [ 654.843749][ T4413] alloc_inode+0x6c/0x1b0 [ 654.844169][ T4413] iget_locked+0x13c/0x4ac [ 654.844580][ T4413] kernfs_get_inode+0x3c/0x370 [ 654.845015][ T4413] kernfs_iop_lookup+0x16c/0x258 [ 654.845421][ T4413] __lookup_slow+0x1a4/0x30c [ 654.845802][ T4413] walk_component+0x1f0/0x484 [ 654.846221][ T4413] path_lookupat+0x104/0x57c [ 654.846604][ T4413] filename_lookup+0x154/0x3ec [ 654.847029][ T4413] user_path_at_empty+0x4c/0x74 [ 654.847427][ T4413] do_readlinkat+0xb4/0x274 [ 654.847832][ T4413] __arm64_sys_readlinkat+0x88/0xcc [ 654.848266][ T4413] invoke_syscall+0x6c/0x25c [ 654.848775][ T4413] el0_svc_common.constprop.0+0xac/0x230 [ 654.849222][ T4413] do_el0_svc+0x40/0x58 [ 654.849861][ T4413] el0_svc+0x50/0x180 [ 654.850250][ T4413] el0t_64_sync_handler+0x100/0x12c [ 654.850674][ T4413] el0t_64_sync+0x190/0x194 [ 654.851237][ T4413] [ 654.851652][ T4413] The buggy address belongs to the object at ffff000014354000 [ 654.851652][ T4413] which belongs to the cache lsm_inode_cache of size 176 [ 654.852528][ T4413] The buggy address is located 0 bytes to the right of [ 654.852528][ T4413] allocated 176-byte region [ffff000014354000, ffff0000143540b0) [ 654.853289][ T4413] [ 654.853681][ T4413] The buggy address belongs to the physical page: [ 654.854501][ T4413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x54354 [ 654.855508][ T4413] flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff) [ 654.856627][ T4413] page_type: 0xffffefff(slab) [ 654.857744][ T4413] raw: 01ffc00000000000 ffff00000a13ec80 dead000000000122 0000000000000000 [ 654.858370][ T4413] raw: 0000000000000000 0000000000110011 00000001ffffefff 0000000000000000 [ 654.859219][ T4413] page dumped because: kasan: bad access detected [ 654.859907][ T4413] [ 654.860257][ T4413] Memory state around the buggy address: [ 654.861140][ T4413] ffff000014353f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 654.861754][ T4413] ffff000014354000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 654.862312][ T4413] >ffff000014354080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 [ 654.862868][ T4413] ^ [ 654.863417][ T4413] ffff000014354100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 654.863878][ T4413] ffff000014354180: 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 [ 654.864472][ T4413] ================================================================== [ 654.867635][ T4413] Disabling lock debugging due to kernel taint [ 654.893195][ C1] Unable to handle kernel paging request at virtual address 007f800080ab8af0 [ 654.894087][ C1] Mem abort info: [ 654.894422][ C1] ESR = 0x0000000086000004 [ 654.894867][ C1] EC = 0x21: IABT (current EL), IL = 32 bits [ 654.895306][ C1] SET = 0, FnV = 0 [ 654.895650][ C1] EA = 0, S1PTW = 0 [ 654.896027][ C1] FSC = 0x04: level 0 translation fault [ 654.896483][ C1] [007f800080ab8af0] address between user and kernel address ranges [ 654.897455][ C1] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP [ 654.898224][ C1] Modules linked in: [ 654.898948][ C1] CPU: 1 PID: 3190 Comm: sshd Tainted: G B W 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 [ 654.899796][ C1] Hardware name: linux,dummy-virt (DT) [ 654.899949][ T3216] Unable to handle kernel paging request at virtual address 007f800080ab8af0 [ 654.900227][ T3216] Mem abort info: [ 654.900569][ C1] pstate: 100000c5 (nzcV daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 654.900881][ T3216] ESR = 0x0000000086000004 [ 654.901737][ T3216] EC = 0x21: IABT (current EL), IL = 32 bits [ 654.901203][ C1] pc : 0x7f800080ab8af0 [ 654.902052][ T3216] SET = 0, FnV = 0 [ 654.902302][ C1] lr : __wake_up_common+0x134/0x1e4 [ 654.902546][ T3216] EA = 0, S1PTW = 0 [ 654.902787][ C1] sp : ffff800089777210 [ 654.903002][ T3216] FSC = 0x04: level 0 translation fault [ 654.903223][ C1] x29: ffff800089777210 [ 654.903465][ T3216] [007f800080ab8af0] address between user and kernel address ranges [ 654.904506][ C1] x28: dfff800000000000 x27: 0000000000000080 [ 654.905230][ C1] x26: 0000000000000003 x25: ffff0000172f6680 x24: 0000000000000000 [ 654.905876][ C1] x23: 0000000000000000 x22: 0000000000000001 x21: 0000000000000000 [ 654.906510][ C1] x20: ffff0000143843d0 x19: ff7f0000172f6268 x18: 0000000000000000 [ 654.907192][ C1] x17: ffff7fffe3eaa000 x16: ffff800089770000 x15: ffff800083f66390 [ 654.907831][ C1] x14: ffff00000fc8e0e8 x13: 0000000000000004 x12: ffff7000112eee41 [ 654.908614][ C1] x11: 1ffff000112eee40 x10: ffff7000112eee40 x9 : dfff800000000000 [ 654.909242][ C1] x8 : 1ffff00010d05f6c x7 : 0000000000000000 x6 : ffff80008682fb64 [ 654.909881][ C1] x5 : 0000000000000007 x4 : ff7f800080ab8af0 x3 : 0000000000000000 [ 654.910538][ C1] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff0000143843d0 [ 654.911228][ C1] Call trace: [ 654.911539][ C1] 0x7f800080ab8af0 [ 654.911907][ C1] __wake_up+0x44/0x70 [ 654.912284][ C1] sock_def_wakeup+0xb4/0x1e0 [ 654.912658][ C1] tcp_fin+0x278/0x714 [ 654.913033][ C1] tcp_data_queue+0x1730/0x4a5c [ 654.913410][ C1] tcp_rcv_established+0x7f8/0x1fec [ 654.913811][ C1] tcp_v4_do_rcv+0x558/0x928 [ 654.914203][ C1] tcp_v4_rcv+0x2144/0x3068 [ 654.914580][ C1] ip_protocol_deliver_rcu+0xb8/0x3ec [ 654.915031][ C1] ip_local_deliver_finish+0x254/0x454 [ 654.915439][ C1] ip_local_deliver+0x16c/0x3a4 [ 654.915823][ C1] ip_rcv_finish+0x140/0x224 [ 654.916200][ C1] ip_rcv+0xc0/0x2c8 [ 654.916548][ C1] __netif_receive_skb_one_core+0xf4/0x168 [ 654.916945][ C1] __netif_receive_skb+0x24/0x14c [ 654.917344][ C1] process_backlog+0xf4/0x568 [ 654.917719][ C1] __napi_poll.constprop.0+0x9c/0x5f0 [ 654.918126][ C1] net_rx_action+0x77c/0xb90 [ 654.918526][ C1] handle_softirqs+0x2f0/0xd80 [ 654.918932][ C1] __do_softirq+0x14/0x20 [ 654.919316][ C1] ____do_softirq+0x10/0x1c [ 654.919713][ C1] call_on_irq_stack+0x24/0x4c [ 654.920077][ C1] do_softirq_own_stack+0x1c/0x2c [ 654.920453][ C1] do_softirq+0x12c/0x150 [ 654.920810][ C1] __local_bh_enable_ip+0x40c/0x49c [ 654.921189][ C1] __dev_queue_xmit+0x6bc/0x33f4 [ 654.921557][ C1] ip_finish_output2+0xabc/0x214c [ 654.921947][ C1] __ip_finish_output+0x2bc/0x4e0 [ 654.922344][ C1] ip_finish_output+0x34/0x278 [ 654.922715][ C1] ip_output+0x144/0x400 [ 654.923118][ C1] __ip_queue_xmit+0x804/0x195c [ 654.923516][ C1] ip_queue_xmit+0x44/0x64 [ 654.923907][ C1] __tcp_transmit_skb+0x13bc/0x36ec [ 654.924373][ C1] tcp_write_xmit+0x11ec/0x7f8c [ 654.924773][ C1] __tcp_push_pending_frames+0x88/0x2d4 [ 654.925185][ C1] tcp_send_fin+0x13c/0x9cc [ 654.925560][ C1] tcp_shutdown+0xf4/0x150 [ 654.925930][ C1] inet_shutdown+0x140/0x348 [ 654.926261][ C1] __sys_shutdown+0xe0/0x180 [ 654.926442][ C1] __arm64_sys_shutdown+0x50/0x74 [ 654.926625][ C1] invoke_syscall+0x6c/0x25c [ 654.926808][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 654.927177][ C1] do_el0_svc+0x40/0x58 [ 654.927535][ C1] el0_svc+0x50/0x180 [ 654.927898][ C1] el0t_64_sync_handler+0x100/0x12c [ 654.928302][ C1] el0t_64_sync+0x190/0x194 [ 654.929276][ C1] Code: ???????? ???????? ???????? ???????? (????????) [ 654.930692][ C1] ---[ end trace 0000000000000000 ]--- [ 654.931528][ C1] Kernel panic - not syncing: Oops: Fatal exception in interrupt [ 654.932653][ C1] SMP: stopping secondary CPUs [ 656.658708][ C1] SMP: failed to stop secondary CPUs 0-1 [ 656.660285][ C1] Kernel Offset: disabled [ 656.660539][ C1] CPU features: 0x04,40001001,a0100000,0200421b [ 656.661213][ C1] Memory Limit: none [ 656.661778][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:28:26 Registers: info registers vcpu 0 CPU#0 PC=ffff800084f01904 X00=ffff800084f01900 X01=0000000000000003 X02=0000000000000000 X03=1fffe000025ab001 X04=1fffe000025ab02b X05=0000000000000400 X06=0000000000000003 X07=dfff800000000000 X08=dfff800000000000 X09=b5bbf5631d372e58 X10=ffff80008682fb68 X11=0000000000000000 X12=1ffff0001101716e X13=0000000000000004 X14=0000000000000000 X15=1fffe000025ab14f X16=0000000000000006 X17=22b3227b684326e5 X18=ffff000012d58a80 X19=ffff800086a57f70 X20=ffff800086a57f40 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086a57f70 X25=1fffe00002338633 X26=ffff0000119c3198 X27=00000000000009a1 X28=1fffe00002338620 X29=ffff800080006f70 X30=ffff800084f000a8 SP=ffff800080006f70 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffda1d5ef0:0000ffffda1d5ef0 Q17=ffffff80ffffffd0:0000ffffda1d5ec0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800084f26d64 X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff8000802e8020 X04=ffff700010df2afd X05=ffff800086f957e0 X06=ffff700010df2afc X07=0000000000000001 X08=ffff800086f957e0 X09=dfff800000000000 X10=ffff700010df2afc X11=1ffff00010df2afc X12=ffff700010df2afd X13=205d333134345420 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff000013848a80 X19=00000000000000c0 X20=ffff800086f957e0 X21=0000000000000000 X22=ffff80008cf86de0 X23=1fffe000016ad85a X24=ffff00000b56c2d0 X25=1ffff00010e04d1a X26=ffff800087026918 X27=000000000000003c X28=ffff00000b56c080 X29=ffff80008cf86b40 X30=ffff800084f26d54 SP=ffff80008cf86b40 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffda1d5cd0:0000ffff99e26a64 Q02=0000ffffda1d5ec0:0000ffffda1d5ef0 Q03=0000ffffda1d5cc0:ffffff80ffffffd8 Q04=000000000009f45e:0000ffff99f80000 Q05=0000ffffda1d5ef0:431bde82d7b634db Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffda1d5ef0:0000ffffda1d5ef0 Q17=ffffff80ffffffd0:0000ffffda1d5ec0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000