last executing test programs: 4.179508841s ago: executing program 1 (id=3472): r0 = eventfd(0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$packet(r0, 0x0, 0x0) write$eventfd(r3, 0x0, 0x0) 4.120334433s ago: executing program 1 (id=3473): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) accept$inet(r0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 3.520724907s ago: executing program 1 (id=3477): ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5451, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGICOUNT(r0, 0x5450, 0x0) mlockall(0x3) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r1 = socket$inet6(0xa, 0x5, 0x10001) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) fcntl$setown(r2, 0x6, 0x0) 591.077916ms ago: executing program 0 (id=3483): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xa1842, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = fcntl$dupfd(r2, 0x0, r0) r4 = accept4$inet6(r3, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r4, 0x5451, 0x0) 519.21718ms ago: executing program 0 (id=3484): pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) dup3(r2, r0, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r3, 0x0, 0x0) 399.349284ms ago: executing program 0 (id=3485): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r3, r2) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000080)={@broadcast, @dev}, &(0x7f0000002580)=0x8) 396.284374ms ago: executing program 1 (id=3486): r0 = epoll_create1(0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$packet(r0, 0x0, 0x0) write$tcp_congestion(r3, 0x0, 0x0) 279.291596ms ago: executing program 0 (id=3487): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x83]}, 0x8) r1 = dup(r0) pipe(&(0x7f0000000340)) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) signalfd(r2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x5450, 0x0) r3 = mq_open(&(0x7f0000000080)='*\x00', 0x40, 0xf0, &(0x7f00000000c0)={0xfffffffffffffff8, 0x359, 0xde, 0xfffffffffffffbff}) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0x5452, &(0x7f0000000040)={0xffffffffffffffff, 0x8000000007, 0x0, 0x5}) 275.820427ms ago: executing program 1 (id=3488): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept(r2, 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x5451, 0x0) 166.410028ms ago: executing program 0 (id=3489): r0 = syz_open_procfs(0x0, &(0x7f0000000400)='io\x00') close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$packet(r0, 0x0, 0x0) write$FUSE_LSEEK(r3, 0x0, 0x0) 79.532944ms ago: executing program 1 (id=3490): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006300)={0x20, 0x0, 0x0, {0x0, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getdents64(r2, &(0x7f0000006340)=""/1024, 0x400) syz_fuse_handle_req(r0, &(0x7f0000006740), 0x2000, &(0x7f0000008740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008780)={0x30, 0x0, 0x0, [{0x0, 0x0, 0x4, 0x0, '#,,-'}]}, 0x0, 0x0, 0x0}) 0s ago: executing program 0 (id=3491): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): [ 37.691957][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 37.692032][ T31] audit: type=1400 audit(37.630:68): avc: denied { read write } for pid=3103 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.692687][ T31] audit: type=1400 audit(37.640:69): avc: denied { open } for pid=3103 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:27561' (ED25519) to the list of known hosts. [ 47.720327][ T31] audit: type=1400 audit(47.660:70): avc: denied { name_bind } for pid=3109 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 49.242142][ T31] audit: type=1400 audit(49.170:71): avc: denied { execute } for pid=3111 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 49.272916][ T31] audit: type=1400 audit(49.220:72): avc: denied { execute_no_trans } for pid=3111 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 52.466592][ T31] audit: type=1400 audit(52.410:73): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 52.468811][ T31] audit: type=1400 audit(52.410:74): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.477858][ T3111] cgroup: Unknown subsys name 'net' [ 52.482726][ T31] audit: type=1400 audit(52.430:75): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.683126][ T3111] cgroup: Unknown subsys name 'cpuset' [ 52.685531][ T3111] cgroup: Unknown subsys name 'hugetlb' [ 52.686031][ T3111] cgroup: Unknown subsys name 'rlimit' [ 52.930032][ T31] audit: type=1400 audit(52.870:76): avc: denied { setattr } for pid=3111 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.933970][ T31] audit: type=1400 audit(52.880:77): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 52.936338][ T31] audit: type=1400 audit(52.880:78): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 53.173184][ T3113] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 53.174663][ T31] audit: type=1400 audit(53.120:79): avc: denied { relabelto } for pid=3113 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 53.177905][ T31] audit: type=1400 audit(53.120:80): avc: denied { write } for pid=3113 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 53.209962][ T31] audit: type=1400 audit(53.150:81): avc: denied { read } for pid=3111 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 53.213894][ T31] audit: type=1400 audit(53.160:82): avc: denied { open } for pid=3111 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 57.248721][ T3111] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 59.154929][ T31] audit: type=1400 audit(59.100:83): avc: denied { execmem } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 59.229853][ T31] audit: type=1400 audit(59.170:84): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 59.231026][ T31] audit: type=1400 audit(59.170:85): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 59.236402][ T31] audit: type=1400 audit(59.180:86): avc: denied { read } for pid=3116 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 59.237618][ T31] audit: type=1400 audit(59.180:87): avc: denied { open } for pid=3116 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 59.241315][ T31] audit: type=1400 audit(59.180:88): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 59.269043][ T31] audit: type=1400 audit(59.210:89): avc: denied { module_request } for pid=3116 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 59.330821][ T31] audit: type=1400 audit(59.270:90): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 59.830285][ T31] audit: type=1400 audit(59.770:91): avc: denied { ioctl } for pid=3116 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 60.773941][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.788969][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.996596][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.000576][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.606863][ T3117] hsr_slave_0: entered promiscuous mode [ 61.609393][ T3117] hsr_slave_1: entered promiscuous mode [ 61.822126][ T31] audit: type=1400 audit(61.760:92): avc: denied { create } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 61.827864][ T3117] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.834883][ T3117] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.840163][ T3117] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.846716][ T3117] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.931501][ T3116] hsr_slave_0: entered promiscuous mode [ 61.933728][ T3116] hsr_slave_1: entered promiscuous mode [ 61.934545][ T3116] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 61.934790][ T3116] Cannot create hsr debugfs directory [ 62.194367][ T3116] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 62.198833][ T3116] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 62.204857][ T3116] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 62.212902][ T3116] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 62.519205][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.924337][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.763237][ T3117] veth0_vlan: entered promiscuous mode [ 64.778510][ T3117] veth1_vlan: entered promiscuous mode [ 64.820099][ T3117] veth0_macvtap: entered promiscuous mode [ 64.828746][ T3117] veth1_macvtap: entered promiscuous mode [ 64.870773][ T3117] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.871397][ T3117] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.875035][ T3117] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.875574][ T3117] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.992286][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 64.992346][ T31] audit: type=1400 audit(64.930:95): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 65.011825][ T31] audit: type=1400 audit(64.950:96): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/syzkaller.CDie0u/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 65.012858][ T31] audit: type=1400 audit(64.950:97): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 65.025392][ T31] audit: type=1400 audit(64.970:98): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.028880][ T31] audit: type=1400 audit(64.970:99): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 65.037351][ T31] audit: type=1400 audit(64.980:100): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 65.129064][ T31] audit: type=1400 audit(65.070:101): avc: denied { read write } for pid=3117 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 65.132114][ T31] audit: type=1400 audit(65.070:102): avc: denied { open } for pid=3117 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 65.132609][ T31] audit: type=1400 audit(65.070:103): avc: denied { ioctl } for pid=3117 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 65.195932][ T31] audit: type=1400 audit(65.140:104): avc: denied { create } for pid=3787 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 65.977254][ T3116] veth0_vlan: entered promiscuous mode [ 66.001771][ T3116] veth1_vlan: entered promiscuous mode [ 66.065786][ T3116] veth0_macvtap: entered promiscuous mode [ 66.078664][ T3116] veth1_macvtap: entered promiscuous mode [ 66.131446][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.132611][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.132795][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.132965][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.970281][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 77.970356][ T31] audit: type=1400 audit(77.910:108): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 78.146937][ T31] audit: type=1400 audit(78.090:109): avc: denied { create } for pid=3861 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 78.157153][ T31] audit: type=1400 audit(78.100:110): avc: denied { mounton } for pid=3863 comm="syz.1.26" path="/12/file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 79.610331][ T31] audit: type=1400 audit(79.550:111): avc: denied { setattr } for pid=3879 comm="syz.0.32" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 82.354785][ T31] audit: type=1400 audit(82.300:112): avc: denied { create } for pid=3908 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 82.360249][ T31] audit: type=1400 audit(82.300:113): avc: denied { connect } for pid=3908 comm="syz.1.43" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 82.362411][ T31] audit: type=1400 audit(82.300:114): avc: denied { write } for pid=3908 comm="syz.1.43" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.076372][ T3912] Zero length message leads to an empty skb [ 89.002190][ T31] audit: type=1400 audit(88.940:115): avc: denied { prog_load } for pid=3965 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.003133][ T31] audit: type=1400 audit(88.940:116): avc: denied { bpf } for pid=3965 comm="syz.1.65" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.004095][ T31] audit: type=1400 audit(88.940:117): avc: denied { perfmon } for pid=3965 comm="syz.1.65" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.023644][ T31] audit: type=1400 audit(88.970:118): avc: denied { prog_run } for pid=3965 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.027654][ T31] audit: type=1400 audit(88.970:119): avc: denied { map_create } for pid=3965 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.028453][ T31] audit: type=1400 audit(88.970:120): avc: denied { map_read map_write } for pid=3965 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.220493][ T31] audit: type=1400 audit(98.160:121): avc: denied { ioctl } for pid=4067 comm="syz.1.112" path="socket:[3708]" dev="sockfs" ino=3708 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.247079][ T31] audit: type=1400 audit(99.190:122): avc: denied { write } for pid=4095 comm="syz.1.125" name="packet" dev="proc" ino=4026532727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 104.435055][ T31] audit: type=1400 audit(104.370:123): avc: denied { lock } for pid=4168 comm="syz.0.157" path="socket:[2743]" dev="sockfs" ino=2743 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 109.812339][ T31] audit: type=1400 audit(109.750:124): avc: denied { create } for pid=4211 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.866946][ T31] audit: type=1400 audit(109.810:125): avc: denied { bind } for pid=4211 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.869572][ T31] audit: type=1400 audit(109.810:126): avc: denied { listen } for pid=4211 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.892468][ T31] audit: type=1400 audit(109.830:127): avc: denied { connect } for pid=4211 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.938052][ T31] audit: type=1400 audit(109.870:128): avc: denied { write } for pid=4211 comm="syz.1.177" path="socket:[3971]" dev="sockfs" ino=3971 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.956522][ T31] audit: type=1400 audit(109.900:129): avc: denied { accept } for pid=4211 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 112.087404][ T31] audit: type=1400 audit(112.030:130): avc: denied { create } for pid=4261 comm="syz.1.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 112.098982][ T31] audit: type=1400 audit(112.040:131): avc: denied { ioctl } for pid=4261 comm="syz.1.201" path="socket:[4064]" dev="sockfs" ino=4064 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 114.126222][ T31] audit: type=1400 audit(114.070:132): avc: denied { name_bind } for pid=4278 comm="syz.0.207" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 114.127734][ T31] audit: type=1400 audit(114.070:133): avc: denied { node_bind } for pid=4278 comm="syz.0.207" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 142.967708][ T31] audit: type=1400 audit(142.910:134): avc: denied { create } for pid=4555 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 142.971389][ T31] audit: type=1400 audit(142.910:135): avc: denied { sys_admin } for pid=4555 comm="syz.1.337" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 149.322927][ T4681] serio: Serial port pts0 [ 150.628981][ T31] audit: type=1400 audit(150.570:136): avc: denied { mounton } for pid=4687 comm="syz.0.386" path="/proc/350/task" dev="proc" ino=5902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 150.709634][ T31] audit: type=1800 audit(150.650:137): pid=4688 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.0.386" name="/" dev="vda" ino=456 res=0 errno=0 [ 160.873751][ T31] audit: type=1400 audit(160.820:138): avc: denied { name_bind } for pid=4796 comm="syz.0.437" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 160.877280][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 165.279086][ T31] audit: type=1400 audit(165.220:139): avc: denied { create } for pid=4848 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 165.282365][ T31] audit: type=1400 audit(165.220:140): avc: denied { getopt } for pid=4848 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 166.832474][ T31] audit: type=1400 audit(166.770:141): avc: denied { create } for pid=4875 comm="syz.0.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 174.373392][ T5079] serio: Serial port pts0 [ 180.039576][ T31] audit: type=1400 audit(179.980:142): avc: denied { execute } for pid=5095 comm="syz.0.576" path=2F6D656D66643A0B656D31C1F8A68D4EC0A377E2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 186.324210][ T3067] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 186.492354][ T3067] usb 1-1: Using ep0 maxpacket: 8 [ 186.500118][ T3067] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 186.500436][ T3067] usb 1-1: config 179 has no interface number 0 [ 186.500631][ T3067] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 186.500894][ T3067] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 186.501295][ T3067] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 186.503083][ T3067] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 186.503553][ T3067] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 186.504197][ T3067] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 186.504439][ T3067] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 186.516171][ T5181] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 186.837919][ T3067] input: Generic X-Box pad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:179.65/input/input3 [ 187.204616][ T92] usb 1-1: USB disconnect, device number 2 [ 187.205076][ C0] xpad 1-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 187.212595][ T92] xpad 1-1:179.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 192.005791][ T5244] input: syz0 as /devices/virtual/input/input4 [ 201.417503][ T31] audit: type=1400 audit(201.360:143): avc: denied { create } for pid=5308 comm="syz.0.660" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 203.497970][ T31] audit: type=1400 audit(203.440:144): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 204.529895][ T31] audit: type=1400 audit(204.470:145): avc: denied { create } for pid=5364 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 206.229604][ T31] audit: type=1400 audit(206.170:146): avc: denied { read } for pid=5387 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 222.587720][ T31] audit: type=1400 audit(222.530:147): avc: denied { create } for pid=5598 comm="syz.0.798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 232.523591][ T5722] serio: Serial port pts0 [ 240.346912][ T31] audit: type=1400 audit(240.290:148): avc: denied { ioctl } for pid=5798 comm="syz.0.886" path="socket:[9097]" dev="sockfs" ino=9097 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 240.366472][ T31] audit: type=1400 audit(240.310:149): avc: denied { listen } for pid=5798 comm="syz.0.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 242.879736][ T31] audit: type=1400 audit(242.810:150): avc: denied { read } for pid=5867 comm="syz.0.916" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 242.892067][ T31] audit: type=1400 audit(242.820:151): avc: denied { open } for pid=5867 comm="syz.0.916" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 263.857209][ T6206] : renamed from ipvlan1 [ 268.914460][ T6289] serio: Serial port pts0 [ 279.482063][ T6466] serio: Serial port pts0 [ 281.404398][ T31] audit: type=1400 audit(281.350:152): avc: denied { create } for pid=6480 comm="syz.1.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 281.407690][ T31] audit: type=1400 audit(281.350:153): avc: denied { bind } for pid=6480 comm="syz.1.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 281.410068][ T31] audit: type=1400 audit(281.350:154): avc: denied { setopt } for pid=6480 comm="syz.1.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 285.457688][ T6522] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 285.466648][ T31] audit: type=1400 audit(285.410:155): avc: denied { getopt } for pid=6521 comm="syz.1.1215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.022661][ C1] hrtimer: interrupt took 19796912 ns [ 293.080556][ T6668] serio: Serial port pts0 [ 315.618333][ T6937] loop7: detected capacity change from 0 to 16384 [ 315.739542][ T31] audit: type=1400 audit(315.680:156): avc: denied { create } for pid=6940 comm="syz.1.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 316.212539][ T3067] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 316.367072][ T3067] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 316.367687][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 316.368131][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 316.368577][ T3067] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 316.369056][ T3067] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 316.369418][ T3067] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 316.383404][ T3067] usb 2-1: config 0 descriptor?? [ 316.812409][ T3067] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 316.815930][ T3067] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 320.777456][ T24] usb 2-1: USB disconnect, device number 2 [ 322.187833][ T7077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7077 comm=syz.1.1457 [ 324.801944][ T10] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 324.956783][ T10] usb 1-1: config 0 has no interfaces? [ 324.957114][ T10] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 324.957416][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 324.960051][ T10] usb 1-1: config 0 descriptor?? [ 325.174959][ T10] usb 1-1: USB disconnect, device number 3 [ 327.159123][ T7194] serio: Serial port pts0 [ 329.784347][ T31] audit: type=1400 audit(329.730:157): avc: denied { accept } for pid=7213 comm="syz.1.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 329.789994][ T31] audit: type=1400 audit(329.730:158): avc: denied { block_suspend } for pid=7213 comm="syz.1.1516" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 333.919007][ T31] audit: type=1400 audit(333.860:159): avc: denied { create } for pid=7280 comm="syz.1.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 333.921143][ T31] audit: type=1400 audit(333.860:160): avc: denied { connect } for pid=7280 comm="syz.1.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 338.462666][ T31] audit: type=1400 audit(338.390:161): avc: denied { create } for pid=7442 comm="syz.0.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 338.464174][ T31] audit: type=1400 audit(338.400:162): avc: denied { write } for pid=7442 comm="syz.0.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 340.566260][ T31] audit: type=1400 audit(340.510:163): avc: denied { read } for pid=7477 comm="syz.0.1639" path="socket:[16607]" dev="sockfs" ino=16607 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.948758][ T7446] coredump: 1461(syz.1.1605): written to core: VMAs: 19, size 42143744; core: 42022782 bytes, pos 42147840 [ 344.805858][ T31] audit: type=1400 audit(344.750:164): avc: denied { module_load } for pid=7623 comm="syz.0.1711" path="/1004/bus" dev="tmpfs" ino=5936 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 347.404238][ T31] audit: type=1400 audit(347.350:165): avc: denied { mount } for pid=7684 comm="syz.0.1738" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 352.010775][ T31] audit: type=1400 audit(351.950:166): avc: denied { mounton } for pid=7816 comm="syz.1.1801" path="/proc/1607/cgroup" dev="proc" ino=18492 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 358.935659][ T31] audit: type=1400 audit(358.880:167): avc: denied { setopt } for pid=7914 comm="syz.0.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.948940][ T31] audit: type=1400 audit(358.890:168): avc: denied { write } for pid=7914 comm="syz.0.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 364.610293][ T7965] serio: Serial port pts0 [ 371.484459][ T8057] serio: Serial port pts0 [ 379.273257][ T31] audit: type=1400 audit(379.220:169): avc: denied { setopt } for pid=8116 comm="syz.0.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 379.277070][ T31] audit: type=1400 audit(379.220:170): avc: denied { connect } for pid=8116 comm="syz.0.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 380.573772][ T31] audit: type=1400 audit(380.520:171): avc: denied { unlink } for pid=8118 comm="syz.1.1939" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 383.445990][ T8173] serio: Serial port pts0 [ 394.174549][ T8342] coredump: 2508(syz.0.2031): written to core: VMAs: 17, size 42012672; core: 13011327 bytes, pos 42016768 [ 394.943035][ T8381] kernel profiling enabled (shift: 0) [ 413.767381][ T31] audit: type=1400 audit(413.710:172): avc: denied { nlmsg_write } for pid=8666 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 414.462719][ T31] audit: type=1400 audit(414.400:173): avc: denied { ioctl } for pid=8672 comm="syz.1.2187" path="socket:[22081]" dev="sockfs" ino=22081 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 415.472894][ T31] audit: type=1400 audit(415.420:174): avc: denied { write } for pid=8672 comm="syz.1.2187" path="socket:[22081]" dev="sockfs" ino=22081 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 416.891307][ T31] audit: type=1400 audit(416.830:175): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 417.586346][ T31] audit: type=1400 audit(417.530:176): avc: denied { watch watch_reads } for pid=8758 comm="syz.0.2228" path="/proc/2750" dev="proc" ino=21342 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 417.588736][ T31] audit: type=1400 audit(417.530:177): avc: denied { create } for pid=8758 comm="syz.0.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 417.594294][ T31] audit: type=1400 audit(417.540:178): avc: denied { write } for pid=8758 comm="syz.0.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 417.824211][ T31] audit: type=1400 audit(417.770:179): avc: denied { create } for pid=8767 comm="syz.1.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 417.834891][ T31] audit: type=1400 audit(417.780:180): avc: denied { write } for pid=8767 comm="syz.1.2232" path="socket:[21367]" dev="sockfs" ino=21367 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 417.835778][ T31] audit: type=1400 audit(417.780:181): avc: denied { ioctl } for pid=8767 comm="syz.1.2232" path="socket:[21367]" dev="sockfs" ino=21367 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 423.518941][ T31] audit: type=1400 audit(423.460:182): avc: denied { connect } for pid=8886 comm="syz.1.2288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 423.519540][ T31] audit: type=1400 audit(423.460:183): avc: denied { name_connect } for pid=8886 comm="syz.1.2288" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 439.282535][ T9105] coredump: 2142(syz.1.2379): coredump has not been created, error -13 [ 447.897582][ T31] audit: type=1400 audit(447.840:184): avc: denied { setopt } for pid=9274 comm="syz.1.2473" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 449.334600][ T31] audit: type=1400 audit(449.280:185): avc: denied { audit_write } for pid=9298 comm="syz.0.2482" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 449.335541][ T31] audit: type=1107 audit(449.280:186): pid=9298 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='C'[Iۄ?L#/>& <Ȏ:'[RRܧT6FǂŠoM kӪvoZWH$+9qˉKa0vGibAD0ҭNv˔pQ\ ÝT YB~U*HVoE] _CSڙgL&U)?j!BSioa$J kěBwVGNeL5EReˆzdI|YzXT A NØ>>L>u\.G#G8f4oLx(0ρAs3kx[7@:ӢW;dxWwSNlf-LېR"@A8{Sܴħ[#MtZC.d̉}Ie~ qLl^S7Wbq죪їwD 6ɻI+Y G_D.ì-p˳i=);䊷Wh3eRޞl }' [ 452.005306][ T31] audit: type=1400 audit(451.950:187): avc: denied { create } for pid=9386 comm="syz.0.2523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 452.008301][ T9388] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=113 sclass=netlink_xfrm_socket pid=9388 comm=syz.0.2523 [ 452.009284][ T31] audit: type=1400 audit(451.950:188): avc: denied { write } for pid=9386 comm="syz.0.2523" path="socket:[24796]" dev="sockfs" ino=24796 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 453.322578][ T31] audit: type=1400 audit(453.270:189): avc: denied { create } for pid=9431 comm="syz.1.2545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 459.561224][ T31] audit: type=1400 audit(459.500:190): avc: denied { watch watch_reads } for pid=9489 comm="syz.0.2570" path="/1495/control" dev="tmpfs" ino=8845 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 474.852235][ T31] audit: type=1400 audit(474.790:191): avc: denied { ioctl } for pid=9768 comm="syz.0.2705" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25477 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 474.854690][ T31] audit: type=1400 audit(474.800:192): avc: denied { setattr } for pid=9768 comm="syz.0.2705" name="nbd0" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 480.576189][ T31] audit: type=1400 audit(480.520:193): avc: denied { create } for pid=9899 comm="syz.0.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 485.764704][ T31] audit: type=1400 audit(485.710:194): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 498.713620][ T31] audit: type=1400 audit(498.650:195): avc: denied { append } for pid=10069 comm="syz.0.2833" name="001" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 513.383725][ T31] audit: type=1400 audit(513.330:196): avc: denied { bind } for pid=10173 comm="syz.1.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 514.896548][ T31] audit: type=1400 audit(514.840:197): avc: denied { accept } for pid=10173 comm="syz.1.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 516.489623][T10180] SELinux: Context system_u:object_r:system_map_t:s0 is not valid (left unmapped). [ 516.490960][ T31] audit: type=1400 audit(516.430:198): avc: denied { relabelto } for pid=10179 comm="syz.1.2877" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 516.493754][ T31] audit: type=1400 audit(516.440:199): avc: denied { associate } for pid=10179 comm="syz.1.2877" name="mixer" dev="devtmpfs" ino=735 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_map_t:s0" [ 522.175600][T10204] coredump: 3427(syz.0.2886): written to core: VMAs: 19, size 42143744; core: 13028351 bytes, pos 42147840 [ 524.866697][ T31] audit: type=1400 audit(524.810:200): avc: denied { read } for pid=10238 comm="syz.1.2903" path="socket:[28392]" dev="sockfs" ino=28392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 545.887972][T10448] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 546.676795][ T31] audit: type=1400 audit(546.620:201): avc: denied { ioctl } for pid=10455 comm="syz.1.3000" path="pid:[4026532652]" dev="nsfs" ino=4026532652 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 562.397610][ T31] audit: type=1400 audit(562.340:202): avc: denied { setopt } for pid=10610 comm="syz.1.3066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 562.407513][ T31] audit: type=1400 audit(562.350:203): avc: denied { ioctl } for pid=10610 comm="syz.1.3066" path="socket:[29199]" dev="sockfs" ino=29199 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 564.648410][ T31] audit: type=1400 audit(564.590:204): avc: denied { name_bind } for pid=10640 comm="syz.0.3078" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 565.012116][ T31] audit: type=1400 audit(564.950:205): avc: denied { create } for pid=10648 comm="syz.1.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 565.014774][ T31] audit: type=1400 audit(564.950:206): avc: denied { setopt } for pid=10648 comm="syz.1.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 566.520010][ T31] audit: type=1400 audit(566.460:207): avc: denied { bind } for pid=10648 comm="syz.1.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 566.550067][ T31] audit: type=1400 audit(566.490:208): avc: denied { write } for pid=10648 comm="syz.1.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 580.696261][T10745] serio: Serial port pts0 [ 580.985390][T10754] SELinux: Context system_u:object_r:devtty_t:s0 is not valid (left unmapped). [ 580.986676][ T31] audit: type=1400 audit(580.930:209): avc: denied { relabelto } for pid=10753 comm="syz.0.3125" name="cgroup.controllers" dev="tmpfs" ino=10261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 580.988116][ T31] audit: type=1400 audit(580.930:210): avc: denied { associate } for pid=10753 comm="syz.0.3125" name="cgroup.controllers" dev="tmpfs" ino=10261 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devtty_t:s0" [ 581.018535][ T31] audit: type=1400 audit(580.960:211): avc: denied { unlink } for pid=3117 comm="syz-executor" name="cgroup.controllers" dev="tmpfs" ino=10261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 589.801222][ T31] audit: type=1400 audit(589.740:212): avc: denied { mount } for pid=10782 comm="syz.0.3135" name="/" dev="ramfs" ino=29474 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 589.817387][ T31] audit: type=1400 audit(589.760:213): avc: denied { bind } for pid=10782 comm="syz.0.3135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 594.540449][ T31] audit: type=1400 audit(594.480:214): avc: denied { map } for pid=10804 comm="syz.0.3144" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=29529 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 594.544241][ T31] audit: type=1400 audit(594.490:215): avc: denied { read write } for pid=10804 comm="syz.0.3144" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=29529 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 596.206560][ T31] audit: type=1400 audit(596.150:216): avc: denied { watch watch_reads } for pid=10816 comm="syz.1.3149" path="/1386/control" dev="tmpfs" ino=8159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 596.287737][T10827] netlink: 44306 bytes leftover after parsing attributes in process `syz.1.3151'. [ 661.123647][T11046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 661.126509][T11046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 661.849754][T11046] hsr_slave_0: entered promiscuous mode [ 661.854041][T11046] hsr_slave_1: entered promiscuous mode [ 661.856077][T11046] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 661.856477][T11046] Cannot create hsr debugfs directory [ 662.066399][T11046] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.120661][T11046] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.179856][T11046] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.234693][T11046] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.342198][T11046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 662.346567][T11046] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 662.350651][T11046] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 662.355202][T11046] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 662.838158][T11046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 664.957509][T11046] veth0_vlan: entered promiscuous mode [ 664.978381][T11046] veth1_vlan: entered promiscuous mode [ 665.029709][T11046] veth0_macvtap: entered promiscuous mode [ 665.038430][T11046] veth1_macvtap: entered promiscuous mode [ 665.086889][T11046] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.087591][T11046] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.087937][T11046] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.088813][T11046] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 694.219591][ T31] audit: type=1400 audit(694.160:217): avc: denied { write } for pid=11633 comm="syz.1.3329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 694.226720][ T31] audit: type=1400 audit(694.170:218): avc: denied { ioctl } for pid=11633 comm="syz.1.3329" path="socket:[31695]" dev="sockfs" ino=31695 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 697.277835][ T31] audit: type=1400 audit(697.220:219): avc: denied { accept } for pid=11647 comm="syz.0.3332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 700.530907][T11667] coredump: 3276(syz.1.3340): written to core: VMAs: 19, size 40046592; core: 10918911 bytes, pos 40050688 [ 705.762379][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 711.877840][ T31] audit: type=1400 audit(711.820:220): avc: denied { ioctl } for pid=11751 comm="syz.0.3371" path="socket:[32892]" dev="sockfs" ino=32892 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 712.160472][T11768] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3379'. [ 712.284605][ T31] audit: type=1400 audit(712.230:221): avc: denied { create } for pid=11771 comm="syz.0.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 720.494895][ T31] audit: type=1400 audit(720.440:222): avc: denied { write } for pid=11821 comm="syz.1.3400" path="socket:[33868]" dev="sockfs" ino=33868 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 745.340863][ T31] audit: type=1400 audit(745.280:223): avc: denied { connect } for pid=12052 comm="syz.0.3491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 745.352780][T12055] ------------[ cut here ]------------ [ 745.353493][T12055] WARNING: CPU: 1 PID: 12055 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 745.355270][T12055] refcount_t: underflow; use-after-free. [ 745.355727][T12055] Modules linked in: [ 745.356520][T12055] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 745.358216][T12055] CPU: 1 UID: 0 PID: 12055 Comm: syz.0.3491 Not tainted 6.11.0-syzkaller #0 [ 745.359466][T12055] Hardware name: ARM-Versatile Express [ 745.360420][T12055] Call trace: [ 745.360947][T12055] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 745.361801][T12055] r7:00000000 r6:826228c4 r5:00000000 r4:820390a8 [ 745.362229][T12055] [<8198c5c4>] (show_stack) from [<819aa8c4>] (dump_stack_lvl+0x54/0x7c) [ 745.362961][T12055] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 745.363412][T12055] r5:00000000 r4:82870d18 [ 745.363631][T12055] [<819aa8ec>] (dump_stack) from [<8198d108>] (panic+0x120/0x374) [ 745.364143][T12055] [<8198cfe8>] (panic) from [<802421dc>] (get_taint+0x0/0x1c) [ 745.364666][T12055] r3:8260c5c4 r2:00000001 r1:820210f0 r0:82028eb4 [ 745.365152][T12055] r7:80839f38 [ 745.365422][T12055] [<80242168>] (check_panic_on_warn) from [<80242340>] (__warn+0x80/0x188) [ 745.366406][T12055] [<802422c0>] (__warn) from [<80242630>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 745.366801][T12055] r8:00000009 r7:82087dc4 r6:e0099c84 r5:840d4800 r4:00000000 [ 745.367089][T12055] [<8024244c>] (warn_slowpath_fmt) from [<80839f38>] (refcount_warn_saturate+0x13c/0x174) [ 745.367571][T12055] r10:00000000 r9:850c3e84 r8:00000000 r7:00000000 r6:8181a4d4 r5:00000002 [ 745.368261][T12055] r4:85ae4e40 [ 745.368471][T12055] [<80839dfc>] (refcount_warn_saturate) from [<8148cd70>] (sk_skb_reason_drop+0x1d8/0x248) [ 745.368961][T12055] [<8148cb98>] (sk_skb_reason_drop) from [<8181a4d4>] (j1939_session_destroy+0x78/0x200) [ 745.369394][T12055] r9:850c3e84 r8:00000000 r7:e0099f38 r6:85096c50 r5:85096c00 r4:85ae4e40 [ 745.369706][T12055] [<8181a45c>] (j1939_session_destroy) from [<8181b7f0>] (j1939_session_put+0x54/0x58) [ 745.370104][T12055] r6:85096c00 r5:8484ec80 r4:00000004 [ 745.370379][T12055] [<8181b79c>] (j1939_session_put) from [<81819824>] (j1939_sk_sendmsg+0x41c/0x548) [ 745.370761][T12055] [<81819408>] (j1939_sk_sendmsg) from [<81477a1c>] (__sock_sendmsg+0x44/0x78) [ 745.371171][T12055] r10:00000000 r9:e0099dd4 r8:e0099dd4 r7:00000000 r6:8484ec80 r5:e0099f38 [ 745.371795][T12055] r4:00000000 [ 745.372362][T12055] [<814779d8>] (__sock_sendmsg) from [<81478a20>] (____sys_sendmsg+0x2ac/0x2cc) [ 745.372812][T12055] r7:00000000 r6:00000000 r5:8484ec80 r4:e0099f38 [ 745.373098][T12055] [<81478774>] (____sys_sendmsg) from [<8147a98c>] (___sys_sendmsg+0x9c/0xd0) [ 745.373512][T12055] r10:e0099e34 r9:20000180 r8:00000000 r7:00000000 r6:8484ec80 r5:e0099f38 [ 745.373848][T12055] r4:00000000 [ 745.374036][T12055] [<8147a8f0>] (___sys_sendmsg) from [<8147aea4>] (sys_sendmsg+0x78/0xbc) [ 745.374530][T12055] r10:00000128 r9:840d4800 r8:8020029c r7:00000000 r6:20000180 r5:8484ec80 [ 745.374866][T12055] r4:00000000 [ 745.375054][T12055] [<8147ae2c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 745.375530][T12055] Exception stack(0xe0099fa8 to 0xe0099ff0) [ 745.375969][T12055] 9fa0: 00000000 00000000 00000004 20000180 00000000 00000000 [ 745.376405][T12055] 9fc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76bea0bc [ 745.376772][T12055] 9fe0: 76be9ec0 76be9eb0 000189e8 00132db0 [ 745.377096][T12055] r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 745.379503][T12055] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:16:30 Registers: info registers vcpu 0 CPU#0 R00=00000004 R01=769bf008 R02=00040000 R03=00000000 R04=00040000 R05=76f5cc80 R06=7eff4198 R07=00000003 R08=00000000 R09=00b8a2b0 R10=7eff427c R11=00000001 R12=005d0b48 R13=df985ff8 R14=76b4b2fc R15=ffff0008 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005927e9 s17=00000000 d08=00000000005927e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=c3908a08 s33=80021881 d16=80021881c3908a08 s34=1780030b s35=030f8002 d17=030f80021780030b s36=04000f80 s37=0f840320 d18=0f84032004000f80 s38=03000400 s39=08000f88 d19=08000f8803000400 s40=0f900300 s41=80800800 d20=808008000f900300 s42=03048080 s43=08001788 d21=0800178803048080 s44=17900318 s45=03168002 d22=0316800217900318 s46=80021680 s47=10800310 d23=1080031080021680 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=81b0ba5c s53=3a486572 d26=3a48657281b0ba5c s54=abcf276f s55=e89017c1 d27=e89017c1abcf276f s56=21ea43da s57=19eec4ec d28=19eec4ec21ea43da s58=9cf8482f s59=89c8a95e d29=89c8a95e9cf8482f s60=3e794497 s61=ca458847 d30=ca4588473e794497 s62=475efced s63=26166a51 d31=26166a51475efced FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83ec7c40 R01=00000065 R02=ebe93000 R03=ebe93018 R04=8287343a R05=83ec7c40 R06=809de8cc R07=82873457 R08=8287341c R09=0000003c R10=00000001 R11=e00999c4 R12=00000002 R13=e00999b8 R14=8275735c R15=809de8dc PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000