last executing test programs:

5.395486182s ago: executing program 1 (id=499):
pipe(&(0x7f0000000240)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000000)=ANY=[@ANYBLOB="08000000109eb2fa3400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028005000e"], 0x44}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff81", @ANYRES32=0x0, @ANYBLOB="67a9fd"], 0x3}}, 0x0)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc)
splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0)

4.107384099s ago: executing program 0 (id=503):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10)
unshare(0x28000600)
syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0)

3.649142083s ago: executing program 0 (id=504):
r0 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x1000000, 0x0, 0x2})
io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a)
io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000400)={0x93, 0x0, &(0x7f0000000240)=[{0x0}], &(0x7f0000000280), 0x1}, 0x20)

2.496054657s ago: executing program 1 (id=505):
r0 = socket(0x28, 0x1, 0x0)
connect$packet(r0, &(0x7f0000000100)={0x28, 0x7, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14)
ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0)

2.113636208s ago: executing program 1 (id=506):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0)
pwrite64(r2, &(0x7f0000000080)='3', 0x1, 0x0)

2.028989221s ago: executing program 0 (id=507):
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
r1 = dup(r0)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000044850000000e0000003f0000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kfree\x00', r2}, 0x18)
ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0})

1.628886352s ago: executing program 0 (id=508):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10)
r1 = inotify_init1(0x0)
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r2 = inotify_init()
inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa000032a)
close_range(r1, 0xffffffffffffffff, 0x0)

1.537521765s ago: executing program 1 (id=509):
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000900)='fsi_master_acf_copro_command\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c02000019000100000000000000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00800000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084010500e0000002000000000023450000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000000003c00000000000000fe80000000000000000000000000000000000000000000000000000000000000000000007f000001000000000000000000000000000000006c00000000000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000aa000000003300000000000000fe8000000000000000000000000000bb0000000000000600000000000000000000000000fe880000000000000000000000000001000000002b"], 0x23c}}, 0x0)

927.009723ms ago: executing program 1 (id=510):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0, 0x0, 0x40}, 0x18)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r2 = epoll_create(0xd)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000400)={0x10000000})
close(r1)

864.910035ms ago: executing program 0 (id=511):
prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680))
fchmodat(0xffffffffffffffff, 0x0, 0x3)

107.582807ms ago: executing program 0 (id=512):
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18)
r0 = socket$can_j1939(0x1d, 0x2, 0x7)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', <r1=>0x0})
bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18)
connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18)
sendmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="b875a1431a05b9319c", 0x9}], 0x1}}], 0x1, 0x0)
recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0)
sendmmsg$inet(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000180)="f1", 0x1}], 0x1}}], 0x1, 0x0)

0s ago: executing program 1 (id=513):
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10)
r2 = socket$kcm(0x21, 0x2, 0x2)
sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0)

kernel console output (not intermixed with test programs):

[   65.946616][   T31] audit: type=1400 audit(65.740:68): avc:  denied  { read write } for  pid=3083 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   65.947422][   T31] audit: type=1400 audit(65.740:69): avc:  denied  { open } for  pid=3083 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
Warning: Permanently added '[localhost]:21656' (ED25519) to the list of known hosts.
[   81.545320][   T31] audit: type=1400 audit(81.330:70): avc:  denied  { name_bind } for  pid=3087 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   82.499018][   T31] audit: type=1400 audit(82.280:71): avc:  denied  { execute } for  pid=3089 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   82.512865][   T31] audit: type=1400 audit(82.290:72): avc:  denied  { execute_no_trans } for  pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   86.877122][   T31] audit: type=1400 audit(86.670:73): avc:  denied  { mounton } for  pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   86.923930][   T31] audit: type=1400 audit(86.700:74): avc:  denied  { mount } for  pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   87.011331][ T3089] cgroup: Unknown subsys name 'net'
[   87.019179][   T31] audit: type=1400 audit(86.800:75): avc:  denied  { unmount } for  pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   87.653175][ T3089] cgroup: Unknown subsys name 'cpuset'
[   87.698725][ T3089] cgroup: Unknown subsys name 'hugetlb'
[   87.700588][ T3089] cgroup: Unknown subsys name 'rlimit'
[   89.426742][   T31] audit: type=1400 audit(89.220:76): avc:  denied  { setattr } for  pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   89.441245][   T31] audit: type=1400 audit(89.230:77): avc:  denied  { mounton } for  pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   89.442025][   T31] audit: type=1400 audit(89.230:78): avc:  denied  { mount } for  pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   89.847802][ T3091] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   89.878182][   T31] audit: type=1400 audit(89.650:79): avc:  denied  { relabelto } for  pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   89.892929][   T31] audit: type=1400 audit(89.650:80): avc:  denied  { write } for  pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
Setting up swapspace version 1, size = 127995904 bytes
[   89.928332][   T31] audit: type=1400 audit(89.720:81): avc:  denied  { read } for  pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   89.941002][   T31] audit: type=1400 audit(89.730:82): avc:  denied  { open } for  pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   97.938668][ T3089] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[  100.500910][   T31] audit: type=1400 audit(100.290:83): avc:  denied  { execmem } for  pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[  100.593400][   T31] audit: type=1400 audit(100.390:84): avc:  denied  { read } for  pid=3094 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  100.596590][   T31] audit: type=1400 audit(100.390:85): avc:  denied  { open } for  pid=3094 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  100.599013][   T31] audit: type=1400 audit(100.390:86): avc:  denied  { mounton } for  pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[  100.626059][   T31] audit: type=1400 audit(100.420:87): avc:  denied  { module_request } for  pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[  100.736853][   T31] audit: type=1400 audit(100.530:88): avc:  denied  { sys_module } for  pid=3094 comm="syz-executor" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[  101.656740][   T31] audit: type=1400 audit(101.450:89): avc:  denied  { ioctl } for  pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  103.247256][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  103.262617][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  103.573005][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  103.585526][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  104.649191][ T3094] hsr_slave_0: entered promiscuous mode
[  104.659264][ T3094] hsr_slave_1: entered promiscuous mode
[  104.796578][ T3095] hsr_slave_0: entered promiscuous mode
[  104.801293][ T3095] hsr_slave_1: entered promiscuous mode
[  104.803017][ T3095] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  104.803474][ T3095] Cannot create hsr debugfs directory
[  105.271352][   T31] audit: type=1400 audit(105.060:90): avc:  denied  { create } for  pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  105.275868][   T31] audit: type=1400 audit(105.070:91): avc:  denied  { write } for  pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  105.277011][   T31] audit: type=1400 audit(105.070:92): avc:  denied  { read } for  pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  105.294543][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  105.316659][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  105.344532][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  105.378827][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  105.395103][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  105.406267][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  105.457519][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  105.483266][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  106.414391][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0
[  106.475468][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0
[  109.755809][ T3095] veth0_vlan: entered promiscuous mode
[  109.779470][ T3095] veth1_vlan: entered promiscuous mode
[  109.851741][ T3095] veth0_macvtap: entered promiscuous mode
[  109.886647][ T3095] veth1_macvtap: entered promiscuous mode
[  109.958446][ T3095] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  109.959210][ T3095] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  109.959587][ T3095] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  109.959937][ T3095] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  110.165823][ T3094] veth0_vlan: entered promiscuous mode
[  110.219424][ T3094] veth1_vlan: entered promiscuous mode
[  110.232185][   T31] audit: type=1400 audit(110.020:93): avc:  denied  { mount } for  pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[  110.242773][   T31] audit: type=1400 audit(110.030:94): avc:  denied  { mounton } for  pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[  110.267625][   T31] audit: type=1400 audit(110.060:95): avc:  denied  { mount } for  pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[  110.276481][   T31] audit: type=1400 audit(110.070:96): avc:  denied  { mounton } for  pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[  110.285038][   T31] audit: type=1400 audit(110.070:97): avc:  denied  { mounton } for  pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[  110.301035][   T31] audit: type=1400 audit(110.090:98): avc:  denied  { unmount } for  pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  110.321436][   T31] audit: type=1400 audit(110.110:99): avc:  denied  { mounton } for  pid=3095 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  110.322668][   T31] audit: type=1400 audit(110.110:100): avc:  denied  { mount } for  pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[  110.327017][   T31] audit: type=1400 audit(110.120:101): avc:  denied  { mounton } for  pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[  110.328011][   T31] audit: type=1400 audit(110.120:102): avc:  denied  { mount } for  pid=3095 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  110.396227][ T3094] veth0_macvtap: entered promiscuous mode
[  110.411864][ T3094] veth1_macvtap: entered promiscuous mode
[  110.438083][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[  110.498995][ T3094] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  110.503423][ T3094] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  110.503736][ T3094] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  110.504072][ T3094] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  110.652381][ T3773] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  112.584859][ T3788] netlink: 596 bytes leftover after parsing attributes in process `syz.1.6'.
[  115.243530][   T31] kauditd_printk_skb: 58 callbacks suppressed
[  115.243644][   T31] audit: type=1400 audit(115.040:161): avc:  denied  { create } for  pid=3800 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  115.542719][   T31] audit: type=1326 audit(115.340:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3794 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  115.543993][   T31] audit: type=1326 audit(115.340:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3794 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.951223][   T31] audit: type=1326 audit(116.730:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.952526][   T31] audit: type=1326 audit(116.740:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.953230][   T31] audit: type=1326 audit(116.740:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000
[  116.953828][   T31] audit: type=1326 audit(116.740:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.954414][   T31] audit: type=1326 audit(116.740:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  116.961417][   T31] audit: type=1326 audit(116.740:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.964096][   T31] audit: type=1326 audit(116.760:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  119.102625][ T3851] SELinux: syz.1.17 (3851) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  131.198101][   T31] kauditd_printk_skb: 88 callbacks suppressed
[  131.198221][   T31] audit: type=1400 audit(130.990:259): avc:  denied  { create } for  pid=3897 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[  131.210705][   T31] audit: type=1400 audit(130.990:260): avc:  denied  { write } for  pid=3897 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[  133.572090][   T31] audit: type=1400 audit(133.340:261): avc:  denied  { name_bind } for  pid=3907 comm="syz.1.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[  133.609627][   T31] audit: type=1400 audit(133.400:262): avc:  denied  { node_bind } for  pid=3907 comm="syz.1.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[  133.796878][    C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[  134.425395][   T31] audit: type=1400 audit(134.210:263): avc:  denied  { setopt } for  pid=3909 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  134.426290][   T31] audit: type=1400 audit(134.210:264): avc:  denied  { bind } for  pid=3909 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  134.426910][   T31] audit: type=1400 audit(134.210:265): avc:  denied  { name_bind } for  pid=3909 comm="syz.1.32" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[  134.427641][   T31] audit: type=1400 audit(134.210:266): avc:  denied  { node_bind } for  pid=3909 comm="syz.1.32" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1
[  134.428294][   T31] audit: type=1400 audit(134.210:267): avc:  denied  { write } for  pid=3909 comm="syz.1.32" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  134.428963][   T31] audit: type=1400 audit(134.210:268): avc:  denied  { connect } for  pid=3909 comm="syz.1.32" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  135.643695][ T3914] netlink: 4 bytes leftover after parsing attributes in process `syz.1.34'.
[  136.209812][   T31] kauditd_printk_skb: 13 callbacks suppressed
[  136.209932][   T31] audit: type=1326 audit(136.000:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.215455][   T31] audit: type=1326 audit(136.010:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.237202][   T31] audit: type=1326 audit(136.020:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=187 compat=0 ip=0x133450 code=0x7ffc0000
[  136.282848][   T31] audit: type=1326 audit(136.070:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.283638][   T31] audit: type=1326 audit(136.070:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  139.477730][ T3920] syz.1.37 uses obsolete (PF_INET,SOCK_PACKET)
[  139.484171][   T31] audit: type=1400 audit(139.270:287): avc:  denied  { create } for  pid=3919 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  139.486560][   T31] audit: type=1400 audit(139.280:288): avc:  denied  { ioctl } for  pid=3919 comm="syz.1.37" path="socket:[2502]" dev="sockfs" ino=2502 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  140.401783][   T31] audit: type=1400 audit(140.190:289): avc:  denied  { create } for  pid=3930 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  140.413215][ T3931] pim6reg1: entered promiscuous mode
[  140.413852][ T3931] pim6reg1: entered allmulticast mode
[  141.454930][ T3945] netlink: 'syz.1.44': attribute type 10 has an invalid length.
[  142.675423][   T31] audit: type=1400 audit(142.470:290): avc:  denied  { create } for  pid=3975 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  143.537988][   T31] audit: type=1400 audit(143.330:291): avc:  denied  { block_suspend } for  pid=3984 comm="+}[@" capability=36  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  143.986908][   T31] audit: type=1326 audit(143.780:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  143.993698][   T31] audit: type=1326 audit(143.790:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  144.042860][   T31] audit: type=1326 audit(143.790:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x133450 code=0x7ffc0000
[  144.043697][   T31] audit: type=1326 audit(143.830:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  144.044329][   T31] audit: type=1326 audit(143.840:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  144.470502][   T31] audit: type=1400 audit(144.260:297): avc:  denied  { shutdown } for  pid=4012 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  144.478110][   T31] audit: type=1400 audit(144.270:298): avc:  denied  { getopt } for  pid=4012 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  145.937581][   T31] audit: type=1326 audit(145.730:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  146.913259][ T4052] Illegal XDP return value 681111936 on prog  (id 41) dev syz_tun, expect packet loss!
[  148.304172][   T31] kauditd_printk_skb: 24 callbacks suppressed
[  148.304321][   T31] audit: type=1400 audit(148.100:324): avc:  denied  { write } for  pid=4073 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  149.755775][ T4090] SELinux: syz.0.78 (4090) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  150.141977][   T31] audit: type=1400 audit(149.940:325): avc:  denied  { append } for  pid=4091 comm="syz.0.79" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  150.142253][ T4092] random: crng reseeded on system resumption
[  150.455428][   T31] audit: type=1326 audit(150.240:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  150.456478][   T31] audit: type=1326 audit(150.250:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  150.457932][   T31] audit: type=1326 audit(150.250:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  150.458819][   T31] audit: type=1326 audit(150.250:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  150.459534][   T31] audit: type=1326 audit(150.250:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  150.481124][   T31] audit: type=1326 audit(150.260:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000
[  150.482064][   T31] audit: type=1326 audit(150.260:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  150.482818][   T31] audit: type=1326 audit(150.260:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  156.298610][   T31] kauditd_printk_skb: 23 callbacks suppressed
[  156.298731][   T31] audit: type=1400 audit(156.090:357): avc:  denied  { write } for  pid=4121 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1
[  156.540687][   T31] audit: type=1400 audit(156.330:358): avc:  denied  { create } for  pid=4124 comm="syz.0.90" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  156.543319][   T31] audit: type=1400 audit(156.330:359): avc:  denied  { create } for  pid=4124 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[  157.633914][ T4135] netlink: 4 bytes leftover after parsing attributes in process `syz.0.93'.
[  161.982290][   T31] audit: type=1400 audit(161.780:360): avc:  denied  { map } for  pid=4160 comm="syz.0.100" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  161.983514][   T31] audit: type=1400 audit(161.780:361): avc:  denied  { read write } for  pid=4160 comm="syz.0.100" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  162.793817][   T31] audit: type=1400 audit(162.590:362): avc:  denied  { create } for  pid=4163 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  162.834555][   T31] audit: type=1400 audit(162.630:363): avc:  denied  { execute } for  pid=4163 comm="syz.0.101" path="/51/cpuset.memory_pressure_enabled" dev="tmpfs" ino=276 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  163.590665][   T31] audit: type=1400 audit(163.380:364): avc:  denied  { setopt } for  pid=4169 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  164.136718][   T31] audit: type=1400 audit(163.920:365): avc:  denied  { write } for  pid=4171 comm="syz.0.104" name="raw6" dev="proc" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[  164.409462][   T31] audit: type=1400 audit(164.200:366): avc:  denied  { mount } for  pid=4174 comm="syz.0.105" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  164.459418][   T31] audit: type=1400 audit(164.250:367): avc:  denied  { unmount } for  pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  167.708929][   T31] audit: type=1400 audit(167.500:368): avc:  denied  { create } for  pid=4205 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  167.894978][   T31] audit: type=1400 audit(167.690:369): avc:  denied  { checkpoint_restore } for  pid=4205 comm="syz.0.108" capability=40  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  168.226483][   T31] audit: type=1326 audit(168.020:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  168.242676][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  168.242964][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  168.243657][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  168.245384][   T31] audit: type=1326 audit(168.040:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  168.246364][   T31] audit: type=1326 audit(168.040:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  168.246906][   T31] audit: type=1326 audit(168.040:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  168.267388][   T31] audit: type=1326 audit(168.060:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  168.268609][   T31] audit: type=1326 audit(168.060:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  168.269352][   T31] audit: type=1326 audit(168.060:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=77 compat=0 ip=0x133450 code=0x7ffc0000
[  168.290767][   T31] audit: type=1326 audit(168.060:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  169.605813][ T4224] SELinux:  policydb table sizes (0,0) do not match mine (6,6)
[  169.607133][ T4224] SELinux: failed to load policy
[  173.682177][   T31] kauditd_printk_skb: 2 callbacks suppressed
[  173.682283][   T31] audit: type=1326 audit(173.440:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  173.683362][   T31] audit: type=1326 audit(173.440:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  173.684114][   T31] audit: type=1326 audit(173.440:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  173.684775][   T31] audit: type=1326 audit(173.460:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x133450 code=0x7ffc0000
[  173.685356][   T31] audit: type=1326 audit(173.460:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  173.685958][   T31] audit: type=1326 audit(173.460:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=399 compat=0 ip=0x133450 code=0x7ffc0000
[  173.728109][   T31] audit: type=1326 audit(173.520:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  173.743275][   T31] audit: type=1326 audit(173.540:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  176.784538][   T31] audit: type=1326 audit(176.580:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4276 comm="syz.1.125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  176.787927][   T31] audit: type=1326 audit(176.580:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4276 comm="syz.1.125" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x133450 code=0x7ffc0000
[  177.830661][ T4290] IPv6: NLM_F_CREATE should be specified when creating new route
[  178.732645][ T4318] Zero length message leads to an empty skb
[  179.939615][ T4352] netlink: 8 bytes leftover after parsing attributes in process `syz.0.138'.
[  180.414646][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  180.431301][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  180.432439][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  180.453396][   T31] kauditd_printk_skb: 2 callbacks suppressed
[  180.453518][   T31] audit: type=1400 audit(180.250:392): avc:  denied  { bind } for  pid=4355 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  180.472924][   T31] audit: type=1400 audit(180.260:393): avc:  denied  { write } for  pid=4355 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  181.357934][   T31] audit: type=1400 audit(181.150:394): avc:  denied  { ioctl } for  pid=4385 comm="syz.1.144" path="socket:[3000]" dev="sockfs" ino=3000 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  181.364447][   T31] audit: type=1400 audit(181.160:395): avc:  denied  { bind } for  pid=4385 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  182.233548][   T31] audit: type=1326 audit(182.030:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  182.263837][   T31] audit: type=1326 audit(182.040:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  182.265130][   T31] audit: type=1326 audit(182.040:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=348 compat=0 ip=0x133450 code=0x7ffc0000
[  182.266318][   T31] audit: type=1326 audit(182.040:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  182.267417][   T31] audit: type=1326 audit(182.040:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  182.268094][   T31] audit: type=1326 audit(182.040:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x133450 code=0x7ffc0000
[  185.471671][   T31] kauditd_printk_skb: 41 callbacks suppressed
[  185.471781][   T31] audit: type=1326 audit(185.270:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  185.473479][   T31] audit: type=1326 audit(185.270:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  185.474364][   T31] audit: type=1326 audit(185.270:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  185.475150][   T31] audit: type=1326 audit(185.270:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  185.485233][   T31] audit: type=1326 audit(185.270:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  185.486608][   T31] audit: type=1326 audit(185.270:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  185.501669][   T31] audit: type=1326 audit(185.270:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=340 compat=0 ip=0x133450 code=0x7ffc0000
[  185.511353][   T31] audit: type=1326 audit(185.280:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  185.531276][   T31] audit: type=1326 audit(185.280:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  185.554694][   T31] audit: type=1326 audit(185.280:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=340 compat=0 ip=0x133450 code=0x7ffc0000
[  190.736877][   T31] kauditd_printk_skb: 167 callbacks suppressed
[  190.736993][   T31] audit: type=1326 audit(190.530:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  190.752786][   T31] audit: type=1326 audit(190.550:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x133450 code=0x7ffc0000
[  190.754127][   T31] audit: type=1326 audit(190.550:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  190.767111][   T31] audit: type=1326 audit(190.550:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x133450 code=0x7ffc0000
[  190.768539][   T31] audit: type=1400 audit(190.550:624): avc:  denied  { mount } for  pid=4452 comm="syz.1.165" name="/" dev="ramfs" ino=3498 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1
[  190.769451][   T31] audit: type=1326 audit(190.550:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  190.792984][   T31] audit: type=1326 audit(190.560:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=432 compat=0 ip=0x133450 code=0x7ffc0000
[  190.813048][   T31] audit: type=1326 audit(190.560:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  190.813986][   T31] audit: type=1326 audit(190.560:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x133450 code=0x7ffc0000
[  190.814901][   T31] audit: type=1326 audit(190.580:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  191.122511][ T4457] netlink: 12 bytes leftover after parsing attributes in process `syz.1.166'.
[  193.511950][ T4494] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  193.619275][ T4494] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  193.795367][ T4494] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  193.852797][ T4494] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  193.972070][ T4494] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[  193.998362][ T4494] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[  194.028228][ T4494] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[  194.041566][ T4494] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[  195.969273][   T31] kauditd_printk_skb: 43 callbacks suppressed
[  195.969550][   T31] audit: type=1326 audit(195.760:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  195.978066][   T31] audit: type=1326 audit(195.760:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  196.004147][   T31] audit: type=1326 audit(195.780:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x133450 code=0x7ffc0000
[  196.009603][   T31] audit: type=1326 audit(195.800:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  196.016906][   T31] audit: type=1326 audit(195.800:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  196.365169][   T31] audit: type=1326 audit(196.160:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4542 comm="syz.0.187" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0
[  196.458058][   T31] audit: type=1326 audit(196.250:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  196.459253][   T31] audit: type=1326 audit(196.250:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  196.463674][   T31] audit: type=1326 audit(196.250:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x133450 code=0x7ffc0000
[  196.464502][   T31] audit: type=1326 audit(196.250:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.066491][   T31] kauditd_printk_skb: 11 callbacks suppressed
[  207.066592][   T31] audit: type=1400 audit(206.860:694): avc:  denied  { write } for  pid=4678 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  207.342904][ T4684] process 'syz.1.215' launched '/dev/fd/3' with NULL argv: empty string added
[  207.346258][   T31] audit: type=1400 audit(207.140:695): avc:  denied  { execute_no_trans } for  pid=4682 comm="syz.1.215" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  208.233689][ T4694] vlan0: entered allmulticast mode
[  208.234322][ T4694] bridge_slave_0: entered allmulticast mode
[  208.296254][ T4694] bridge_slave_0: left allmulticast mode
[  210.550755][   T31] audit: type=1400 audit(210.340:696): avc:  denied  { create } for  pid=4728 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[  211.726304][   T31] audit: type=1400 audit(211.520:697): avc:  denied  { ioctl } for  pid=4760 comm="syz.0.234" path="socket:[4360]" dev="sockfs" ino=4360 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  211.840566][   T31] audit: type=1326 audit(211.630:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  211.841729][   T31] audit: type=1326 audit(211.640:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  211.850543][   T31] audit: type=1326 audit(211.640:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  211.851662][   T31] audit: type=1326 audit(211.640:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  211.854026][   T31] audit: type=1326 audit(211.640:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  211.859508][   T31] audit: type=1326 audit(211.640:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  212.047938][ T4773] capability: warning: `syz.1.237' uses deprecated v2 capabilities in a way that may be insecure
[  217.175110][   T31] kauditd_printk_skb: 9 callbacks suppressed
[  217.175201][   T31] audit: type=1326 audit(216.970:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.176600][   T31] audit: type=1326 audit(216.970:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.211529][   T31] audit: type=1326 audit(217.010:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  217.212797][   T31] audit: type=1326 audit(217.010:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.213398][   T31] audit: type=1326 audit(217.010:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.216468][   T31] audit: type=1326 audit(217.010:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  217.232762][   T31] audit: type=1326 audit(217.010:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.233597][   T31] audit: type=1326 audit(217.030:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  217.235178][   T31] audit: type=1326 audit(217.030:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x133450 code=0x7ffc0000
[  217.236332][   T31] audit: type=1326 audit(217.030:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  223.496946][   T31] kauditd_printk_skb: 536 callbacks suppressed
[  223.497065][   T31] audit: type=1400 audit(223.290:1259): avc:  denied  { write } for  pid=4836 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  223.497213][ T4837] netlink: 16 bytes leftover after parsing attributes in process `syz.0.256'.
[  223.570496][   T31] audit: type=1400 audit(223.360:1260): avc:  denied  { setopt } for  pid=4836 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  228.483790][   T31] audit: type=1326 audit(228.280:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  228.485169][   T31] audit: type=1326 audit(228.280:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  228.486087][   T31] audit: type=1326 audit(228.280:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x133450 code=0x7ffc0000
[  228.487194][   T31] audit: type=1326 audit(228.280:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  228.492211][   T31] audit: type=1326 audit(228.280:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  229.456090][   T31] audit: type=1400 audit(229.250:1266): avc:  denied  { name_bind } for  pid=4863 comm="syz.0.266" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1
[  230.362484][   T31] audit: type=1326 audit(230.150:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  230.363715][   T31] audit: type=1326 audit(230.150:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  230.368932][   T31] audit: type=1326 audit(230.150:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x133450 code=0x7ffc0000
[  230.381655][   T31] audit: type=1326 audit(230.150:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  230.385031][   T31] audit: type=1326 audit(230.150:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x133450 code=0x7ffc0000
[  230.400719][   T31] audit: type=1326 audit(230.150:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  230.406765][   T31] audit: type=1326 audit(230.160:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  241.970747][ T4873] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000
[  241.971588][ T4873] syz.0.269: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0
[  241.973519][ T4873] CPU: 0 UID: 0 PID: 4873 Comm: syz.0.269 Not tainted 6.12.0-syzkaller #0
[  241.974012][ T4873] Hardware name: ARM-Versatile Express
[  241.974444][ T4873] Call trace: 
[  241.974825][ T4873] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c)
[  241.975332][ T4873]  r7:ff800000 r6:8205a4a4 r5:60000013 r4:820413b8
[  241.975639][ T4873] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c)
[  241.975945][ T4873] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c)
[  241.976349][ T4873]  r5:84976000 r4:00000000
[  241.976515][ T4873] [<819d6104>] (dump_stack) from [<804c63fc>] (warn_alloc+0xd8/0x178)
[  241.976781][ T4873] [<804c6324>] (warn_alloc) from [<804b8620>] (__vmalloc_node_range_noprof+0xcc/0x55c)
[  241.977143][ T4873]  r3:20000000 r2:8205a4a4
[  241.977320][ T4873]  r6:00000dc0 r5:00000001 r4:20000000
[  241.977537][ T4873] [<804b8554>] (__vmalloc_node_range_noprof) from [<8047390c>] (__kvmalloc_node_noprof+0xc0/0x110)
[  241.977936][ T4873]  r10:dfae1cf0 r9:852d7400 r8:81654614 r7:ffffffff r6:00000dc0 r5:20000000
[  241.978233][ T4873]  r4:00000000
[  241.978382][ T4873] [<8047384c>] (__kvmalloc_node_noprof) from [<81654614>] (xt_alloc_entry_offsets+0x24/0x30)
[  241.978783][ T4873]  r8:b5403587 r7:00000000 r6:20000360 r5:852d7440 r4:08000000
[  241.979048][ T4873] [<816545f0>] (xt_alloc_entry_offsets) from [<81710724>] (translate_table+0x70/0x78c)
[  241.979411][ T4873] [<817106b4>] (translate_table) from [<817118d0>] (do_replace+0xe8/0x5b8)
[  241.979772][ T4873]  r10:00000126 r9:852d7440 r8:b5403587 r7:00000238 r6:20000360 r5:852d7400
[  241.980376][ T4873]  r4:848e8000
[  241.980583][ T4873] [<817117e8>] (do_replace) from [<81711ed4>] (do_ipt_set_ctl+0x134/0x2a0)
[  241.981018][ T4873]  r10:00000126 r9:814991a8 r8:00000298 r7:852a8448 r6:dfae1d98 r5:84076c80
[  241.981253][ T4873]  r4:00000040
[  241.981373][ T4873] [<81711da0>] (do_ipt_set_ctl) from [<815e0de4>] (nf_setsockopt+0x60/0x7c)
[  241.981887][ T4873]  r10:00000126 r9:814991a8 r8:00000298 r7:852a8448 r6:84076c80 r5:81711da0
[  241.982201][ T4873]  r4:827e6534
[  241.982385][ T4873] [<815e0d88>] (nf_setsockopt) from [<8167ab1c>] (ip_setsockopt+0x88/0x98)
[  241.982744][ T4873]  r6:84076c80 r5:00000298 r4:00000040
[  241.983042][ T4873] [<8167aa98>] (ip_setsockopt) from [<8168aef8>] (tcp_setsockopt+0x3c/0x58)
[  241.983376][ T4873]  r6:00000000 r5:852a8000 r4:8167aa94
[  241.983570][ T4873] [<8168aec0>] (tcp_setsockopt) from [<814991e0>] (sock_common_setsockopt+0x38/0x40)
[  241.983858][ T4873]  r4:8168aebc
[  241.983985][ T4873] [<814991ac>] (sock_common_setsockopt) from [<818bda00>] (smc_setsockopt+0xac/0x3cc)
[  241.984380][ T4873]  r4:00000040
[  241.984546][ T4873] [<818bd958>] (smc_setsockopt) from [<81494afc>] (do_sock_setsockopt+0xb0/0x17c)
[  241.984901][ T4873]  r9:84976000 r8:00000000 r7:8418b180 r6:84c52a00 r5:00000000 r4:818bd954
[  241.985175][ T4873] [<81494a4c>] (do_sock_setsockopt) from [<81497e98>] (__sys_setsockopt+0x7c/0xb4)
[  241.985535][ T4873]  r6:8418b181 r5:00000040 r4:00000000
[  241.985732][ T4873] [<81497e1c>] (__sys_setsockopt) from [<81497eec>] (sys_setsockopt+0x1c/0x24)
[  241.986090][ T4873]  r8:8020029c r7:00000126 r6:002862f8 r5:00000000 r4:00000298
[  241.986359][ T4873] [<81497ed0>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c)
[  241.986831][ T4873] Exception stack(0xdfae1fa8 to 0xdfae1ff0)
[  241.987226][ T4873] 1fa0:                   00000298 00000000 00000005 00000000 00000040 20000300
[  241.987599][ T4873] 1fc0: 00000298 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b650bc
[  241.987883][ T4873] 1fe0: 76b64ec0 76b64eb0 00018af0 00133450
[  241.990475][ T4873] Mem-Info:
[  241.991186][ T4873] active_anon:3957 inactive_anon:0 isolated_anon:0
[  241.991186][ T4873]  active_file:256 inactive_file:34311 isolated_file:0
[  241.991186][ T4873]  unevictable:768 dirty:7 writeback:0
[  241.991186][ T4873]  slab_reclaimable:944 slab_unreclaimable:5678
[  241.991186][ T4873]  mapped:4588 shmem:3688 pagetables:200
[  241.991186][ T4873]  sec_pagetables:0 bounce:0
[  241.991186][ T4873]  kernel_misc_reclaimable:0
[  241.991186][ T4873]  free:442020 free_pcp:869 free_cma:4032
[  241.992641][ T4873] Node 0 active_anon:15828kB inactive_anon:0kB active_file:1024kB inactive_file:137244kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:18352kB dirty:28kB writeback:0kB shmem:14752kB writeback_tmp:0kB kernel_stack:2736kB pagetables:800kB sec_pagetables:0kB all_unreclaimable? no
[  241.993906][ T4873] Normal free:1392120kB boost:0kB min:4776kB low:6200kB high:7624kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:776kB unevictable:0kB writepending:28kB present:1556480kB managed:1430008kB mlocked:0kB bounce:0kB free_pcp:3476kB local_pcp:2084kB free_cma:0kB
[  241.994799][ T4873] lowmem_reserve[]: 0 4224 0
[  241.995214][ T4873] Normal: 172*4kB (U) 65*8kB (U) 2*16kB (UE) 21*32kB (UME) 12*64kB (UM) 3*128kB (UME) 6*256kB (UME) 8*512kB (UM) 5*1024kB (ME) 5*2048kB (UME) 334*4096kB (UM) = 1392120kB
[  241.996558][ T4873] 38255 total pagecache pages
[  241.996768][ T4873] 0 pages in swap cache
[  241.996951][ T4873] Free swap  = 124996kB
[  241.997137][ T4873] Total swap = 124996kB
[  241.997377][ T4873] 524288 pages RAM
[  241.997549][ T4873] 135168 pages HighMem/MovableOnly
[  241.997742][ T4873] 31618 pages reserved
[  241.997925][ T4873] 4096 pages cma reserved
[  242.002209][   T31] audit: type=1400 audit(241.790:1274): avc:  denied  { getopt } for  pid=4872 comm="syz.0.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  242.733467][   T31] audit: type=1400 audit(242.530:1275): avc:  denied  { create } for  pid=4876 comm="syz.0.271" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1
[  242.820596][   T31] audit: type=1400 audit(242.600:1276): avc:  denied  { unlink } for  pid=3094 comm="syz-executor" name="file0" dev="tmpfs" ino=825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1
[  252.076599][   T31] audit: type=1326 audit(251.860:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.103229][   T31] audit: type=1326 audit(251.870:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.114832][   T31] audit: type=1326 audit(251.910:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  252.116078][   T31] audit: type=1326 audit(251.910:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.116831][   T31] audit: type=1326 audit(251.910:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.141056][   T31] audit: type=1326 audit(251.930:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  252.146219][   T31] audit: type=1326 audit(251.930:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.152099][   T31] audit: type=1326 audit(251.930:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  252.156454][   T31] audit: type=1326 audit(251.950:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  252.158108][   T31] audit: type=1326 audit(251.950:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  258.632567][ T4903] smc: net device lo applied user defined pnetid SYZ0
[  258.639299][ T4903] smc: net device lo erased user defined pnetid SYZ0
[  262.231540][   T31] kauditd_printk_skb: 7 callbacks suppressed
[  262.231680][   T31] audit: type=1400 audit(262.020:1294): avc:  denied  { connect } for  pid=4912 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  263.624922][   T31] audit: type=1326 audit(263.350:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  263.626033][   T31] audit: type=1326 audit(263.420:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  263.634792][   T31] audit: type=1326 audit(263.430:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  263.672824][   T31] audit: type=1326 audit(263.450:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  263.690669][   T31] audit: type=1326 audit(263.480:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  263.753336][   T31] audit: type=1326 audit(263.530:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  263.790471][   T31] audit: type=1326 audit(263.580:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  263.796228][   T31] audit: type=1326 audit(263.580:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  263.805262][   T31] audit: type=1326 audit(263.590:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  274.671269][   T31] kauditd_printk_skb: 9 callbacks suppressed
[  274.671385][   T31] audit: type=1400 audit(274.470:1313): avc:  denied  { setopt } for  pid=4935 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  276.156336][ T4940] Process accounting resumed
[  278.088946][   T31] audit: type=1400 audit(277.880:1314): avc:  denied  { bind } for  pid=4943 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  280.661785][ T4955] vlan3: entered promiscuous mode
[  280.662285][ T4955] vlan3: entered allmulticast mode
[  281.912842][   T31] audit: type=1400 audit(281.710:1315): avc:  denied  { create } for  pid=4952 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  283.915045][   T31] audit: type=1400 audit(283.710:1316): avc:  denied  { create } for  pid=4965 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  283.917902][   T31] audit: type=1400 audit(283.710:1317): avc:  denied  { write } for  pid=4965 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  284.390380][   T31] audit: type=1326 audit(284.180:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  284.430763][   T31] audit: type=1326 audit(284.210:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x133450 code=0x7ffc0000
[  284.442819][   T31] audit: type=1326 audit(284.240:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  284.444114][   T31] audit: type=1326 audit(284.240:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  287.466205][   T31] audit: type=1400 audit(287.230:1322): avc:  denied  { connect } for  pid=4989 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  289.391615][   T31] audit: type=1400 audit(289.190:1323): avc:  denied  { getopt } for  pid=5007 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  290.116885][ T5013] netlink: 4 bytes leftover after parsing attributes in process `syz.0.321'.
[  290.943145][   T31] audit: type=1400 audit(290.720:1324): avc:  denied  { validate_trans } for  pid=5017 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1
[  291.411141][   T31] audit: type=1400 audit(291.200:1325): avc:  denied  { relabelfrom } for  pid=5019 comm="syz.0.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[  291.412487][   T31] audit: type=1400 audit(291.200:1326): avc:  denied  { relabelto } for  pid=5019 comm="syz.0.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[  293.271096][ T5038] vlan3: entered promiscuous mode
[  293.271662][ T5038] syz_tun: entered promiscuous mode
[  293.272429][ T5038] vlan3: entered allmulticast mode
[  293.272646][ T5038] syz_tun: entered allmulticast mode
[  293.291892][ T5038] syz_tun: left allmulticast mode
[  293.292403][ T5038] syz_tun: left promiscuous mode
[  293.609892][   T31] audit: type=1400 audit(293.400:1327): avc:  denied  { create } for  pid=5037 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  293.614615][   T31] audit: type=1400 audit(293.410:1328): avc:  denied  { setopt } for  pid=5037 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  296.546573][   T31] audit: type=1326 audit(296.340:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.547597][   T31] audit: type=1326 audit(296.340:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.554923][   T31] audit: type=1326 audit(296.340:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x133450 code=0x7ffc0000
[  296.557758][   T31] audit: type=1326 audit(296.350:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.562140][   T31] audit: type=1326 audit(296.360:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  297.666560][   T31] audit: type=1326 audit(297.460:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  297.667656][   T31] audit: type=1326 audit(297.460:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  297.668244][   T31] audit: type=1326 audit(297.460:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x133450 code=0x7ffc0000
[  298.611399][ T5101] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22
[  298.612080][ T5101] netdevsim netdevsim0: Direct firmware load for . failed with error -22
[  298.612916][ T5101] netdevsim netdevsim0: Falling back to sysfs fallback for: .
[  301.436956][ T5105] netlink: 28 bytes leftover after parsing attributes in process `syz.0.354'.
[  302.383676][ T5112] netlink: 'syz.0.355': attribute type 4 has an invalid length.
[  302.451341][ T5112] netlink: 28 bytes leftover after parsing attributes in process `syz.0.355'.
[  304.285079][   T31] kauditd_printk_skb: 15 callbacks suppressed
[  304.285146][   T31] audit: type=1400 audit(304.080:1352): avc:  denied  { bind } for  pid=5096 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  305.766498][   T31] audit: type=1326 audit(305.560:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  305.768575][   T31] audit: type=1326 audit(305.560:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  305.784051][   T31] audit: type=1326 audit(305.580:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  305.789692][   T31] audit: type=1326 audit(305.580:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  305.805937][   T31] audit: type=1326 audit(305.600:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  305.827487][   T31] audit: type=1326 audit(305.620:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  305.828498][   T31] audit: type=1326 audit(305.620:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  305.829247][   T31] audit: type=1326 audit(305.620:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  305.832549][   T31] audit: type=1326 audit(305.620:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x133450 code=0x7ffc0000
[  321.203038][ T5134] ������: renamed from syzkaller0
[  322.404793][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  322.405020][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  322.415013][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  323.324926][ T5161] pim6reg1: entered promiscuous mode
[  323.326016][ T5161] pim6reg1: entered allmulticast mode
[  323.675969][ T5167] tmpfs: Unsupported parameter 'mpol'
[  327.351990][   T31] kauditd_printk_skb: 2 callbacks suppressed
[  327.352104][   T31] audit: type=1400 audit(327.140:1364): avc:  denied  { mount } for  pid=5182 comm="syz.0.379" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  328.912510][ T5187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.381'.
[  328.937382][ T5187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.381'.
[  331.663554][   T31] audit: type=1400 audit(331.460:1365): avc:  denied  { create } for  pid=5196 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  331.682607][   T31] audit: type=1400 audit(331.480:1366): avc:  denied  { connect } for  pid=5196 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  337.510416][   T31] audit: type=1326 audit(337.280:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.573566][   T31] audit: type=1326 audit(337.370:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.577892][   T31] audit: type=1326 audit(337.370:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  337.605251][   T31] audit: type=1326 audit(337.370:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.607560][   T31] audit: type=1326 audit(337.370:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.608855][   T31] audit: type=1326 audit(337.370:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  337.616044][   T31] audit: type=1326 audit(337.370:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.617811][   T31] audit: type=1326 audit(337.370:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  337.639367][   T31] audit: type=1326 audit(337.380:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  337.646430][   T31] audit: type=1326 audit(337.400:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  341.461959][ T5228] block device autoloading is deprecated and will be removed.
[  341.470008][ T5228] syz.0.397: attempt to access beyond end of device
[  341.470008][ T5228] md0: rw=2048, sector=0, nr_sectors = 8 limit=0
[  343.534989][ T4814] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[  343.856843][ T4814] usb 1-1: Using ep0 maxpacket: 16
[  343.882630][ T4814] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config
[  343.882993][ T4814] usb 1-1: config 0 has no interfaces?
[  343.887528][ T4814] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00
[  343.910487][ T4814] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  343.927065][ T4814] usb 1-1: config 0 descriptor??
[  344.284130][ T4756] usb 1-1: USB disconnect, device number 2
[  347.286394][ T5252] IPv6: Can't replace route, no match found
[  348.191853][ T5255] syz.0.403 calls setitimer() with new_value NULL pointer. Misfeature support will be removed
[  351.073426][ T5263] IPv6: Can't replace route, no match found
[  351.444768][   T31] kauditd_printk_skb: 10 callbacks suppressed
[  351.444879][   T31] audit: type=1326 audit(351.240:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.451059][   T31] audit: type=1326 audit(351.240:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.502105][   T31] audit: type=1326 audit(351.270:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x133450 code=0x7ffc0000
[  351.503351][   T31] audit: type=1326 audit(351.300:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.512011][   T31] audit: type=1326 audit(351.310:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x133450 code=0x7ffc0000
[  351.512958][   T31] audit: type=1326 audit(351.310:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.513502][   T31] audit: type=1326 audit(351.310:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.517832][   T31] audit: type=1326 audit(351.310:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000
[  351.518954][   T31] audit: type=1326 audit(351.310:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  351.534509][   T31] audit: type=1400 audit(351.330:1396): avc:  denied  { remove_name } for  pid=2908 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[  364.039788][ T5292] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22
[  364.043158][ T5292] netdevsim netdevsim0: Direct firmware load for . failed with error -22
[  364.070753][ T5292] netdevsim netdevsim0: Falling back to sysfs fallback for: .
[  367.184006][ T5298] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.393329][ T5298] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.512211][ T5298] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.725839][ T5298] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  368.280469][ T5298] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[  368.306936][ T5298] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[  368.355016][ T5298] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[  368.415283][ T5298] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[  368.672045][   T31] kauditd_printk_skb: 76 callbacks suppressed
[  368.672183][   T31] audit: type=1326 audit(368.460:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.674923][   T31] audit: type=1326 audit(368.470:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.686614][   T31] audit: type=1326 audit(368.480:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  368.687895][   T31] audit: type=1326 audit(368.480:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.688712][   T31] audit: type=1326 audit(368.480:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.698897][   T31] audit: type=1326 audit(368.490:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  368.700231][   T31] audit: type=1326 audit(368.490:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.700868][   T31] audit: type=1326 audit(368.490:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  368.719171][   T31] audit: type=1326 audit(368.510:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  368.722409][   T31] audit: type=1326 audit(368.510:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  369.279142][ T5328] netlink: 32 bytes leftover after parsing attributes in process `syz.1.426'.
[  369.292019][ T5328] netlink: 16 bytes leftover after parsing attributes in process `syz.1.426'.
[  373.859669][   T31] kauditd_printk_skb: 48 callbacks suppressed
[  373.868225][   T31] audit: type=1326 audit(373.650:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.869111][   T31] audit: type=1326 audit(373.650:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.891352][   T31] audit: type=1326 audit(373.690:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x133450 code=0x7ffc0000
[  373.892986][   T31] audit: type=1326 audit(373.690:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.893851][   T31] audit: type=1326 audit(373.690:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.904193][   T31] audit: type=1326 audit(373.700:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x133450 code=0x7ffc0000
[  373.906141][   T31] audit: type=1326 audit(373.700:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.909148][   T31] audit: type=1326 audit(373.700:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  374.587983][   T31] audit: type=1326 audit(374.350:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5401 comm="syz.1.437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  374.589059][   T31] audit: type=1326 audit(374.370:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5401 comm="syz.1.437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.867308][   T31] kauditd_printk_skb: 12 callbacks suppressed
[  404.867424][   T31] audit: type=1326 audit(404.660:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.874756][   T31] audit: type=1326 audit(404.670:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.877763][   T31] audit: type=1326 audit(404.670:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  404.880575][   T31] audit: type=1326 audit(404.670:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.882628][   T31] audit: type=1326 audit(404.680:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.885337][   T31] audit: type=1326 audit(404.680:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  404.889443][   T31] audit: type=1326 audit(404.680:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.892364][   T31] audit: type=1326 audit(404.690:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  404.911134][   T31] audit: type=1326 audit(404.700:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  404.913923][   T31] audit: type=1326 audit(404.710:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  408.674670][ T5457] syzkaller0: entered promiscuous mode
[  408.675123][ T5457] syzkaller0: entered allmulticast mode
[  409.310911][ T5464] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  409.396065][ T5464] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  409.584419][ T5464] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  409.693370][ T5464] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  409.859857][ T5464] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[  409.945356][ T5464] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[  410.044529][ T5464] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[  410.101240][ T5464] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[  410.730658][   T31] kauditd_printk_skb: 4 callbacks suppressed
[  410.730785][   T31] audit: type=1326 audit(410.520:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  410.731964][   T31] audit: type=1326 audit(410.520:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  410.732903][   T31] audit: type=1326 audit(410.530:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  410.741163][   T31] audit: type=1326 audit(410.530:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  410.742030][   T31] audit: type=1326 audit(410.530:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  410.742724][   T31] audit: type=1326 audit(410.530:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  410.744149][   T31] audit: type=1326 audit(410.530:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  410.767523][   T31] audit: type=1326 audit(410.560:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  410.768382][   T31] audit: type=1326 audit(410.560:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=135 compat=0 ip=0x133450 code=0x7ffc0000
[  410.768956][   T31] audit: type=1326 audit(410.560:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  412.213119][ T5496] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  413.533425][ T5507] netlink: 48 bytes leftover after parsing attributes in process `syz.1.472'.
[  416.254277][ T5529] SELinux:  policydb table sizes (0,0) do not match mine (6,6)
[  416.255394][ T5529] SELinux: failed to load policy
[  417.985337][ T5539] dvmrp1: entered allmulticast mode
[  419.563379][   T31] kauditd_printk_skb: 42 callbacks suppressed
[  419.563493][   T31] audit: type=1326 audit(419.360:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  419.650577][   T31] audit: type=1326 audit(419.370:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  419.652532][   T31] audit: type=1326 audit(419.440:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x133450 code=0x7ffc0000
[  419.653427][   T31] audit: type=1326 audit(419.440:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  419.659022][   T31] audit: type=1326 audit(419.440:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  421.852851][ T5589] netlink: 4 bytes leftover after parsing attributes in process `syz.1.496'.
[  426.862219][   T31] audit: type=1400 audit(426.660:1624): avc:  denied  { ioctl } for  pid=5609 comm="syz.1.505" path="socket:[6128]" dev="sockfs" ino=6128 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  427.226431][   T31] audit: type=1400 audit(427.020:1625): avc:  denied  { bpf } for  pid=5613 comm="syz.0.507" capability=39  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  427.227366][   T31] audit: type=1400 audit(427.020:1626): avc:  denied  { prog_run } for  pid=5613 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  427.263865][   T31] audit: type=1400 audit(427.060:1627): avc:  denied  { read } for  pid=2908 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  427.265158][   T31] audit: type=1400 audit(427.060:1628): avc:  denied  { search } for  pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[  427.267047][   T31] audit: type=1400 audit(427.060:1629): avc:  denied  { append } for  pid=2908 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  427.268080][   T31] audit: type=1400 audit(427.060:1630): avc:  denied  { open } for  pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  427.269748][   T31] audit: type=1400 audit(427.060:1631): avc:  denied  { getattr } for  pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  427.321413][   T31] audit: type=1400 audit(427.100:1632): avc:  denied  { recv } for  pid=3089 comm="syz-executor" saddr=127.0.0.1 src=35150 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1
[  427.349804][   T31] audit: type=1400 audit(427.140:1633): avc:  denied  { read write } for  pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  429.356959][    C0] ------------[ cut here ]------------
[  429.358008][    C0] WARNING: CPU: 0 PID: 15 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174
[  429.358734][    C0] refcount_t: underflow; use-after-free.
[  429.358985][    C0] Modules linked in:
[  429.361876][    C0] Kernel panic - not syncing: kernel: panic_on_warn set ...
[  429.363825][    C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller #0
[  429.364206][    C0] Hardware name: ARM-Versatile Express
[  429.364512][    C0] Call trace: 
[  429.364974][    C0] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c)
[  429.366634][    C0]  r7:00000000 r6:82623304 r5:00000000 r4:820413b8
[  429.368636][    C0] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c)
[  429.371669][    C0] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c)
[  429.375603][    C0]  r5:00000000 r4:82874d18
[  429.376508][    C0] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374)
[  429.377077][    C0] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c)
[  429.377498][    C0]  r3:8260c604 r2:00000001 r1:82029878 r0:82031344
[  429.377774][    C0]  r7:8084bbd8
[  429.377963][    C0] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188)
[  429.378350][    C0] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4)
[  429.378749][    C0]  r8:00000009 r7:8209017c r6:df855bdc r5:82e3b000 r4:00000000
[  429.379078][    C0] [<80242940>] (warn_slowpath_fmt) from [<8084bbd8>] (refcount_warn_saturate+0x13c/0x174)
[  429.379591][    C0]  r10:dddd0e88 r9:00000040 r8:8469b8d0 r7:00000000 r6:81841f64 r5:00000002
[  429.379953][    C0]  r4:85212f00
[  429.380151][    C0] [<8084ba9c>] (refcount_warn_saturate) from [<814aa974>] (sk_skb_reason_drop+0x1d8/0x248)
[  429.380668][    C0] [<814aa79c>] (sk_skb_reason_drop) from [<81841f64>] (j1939_session_destroy+0x78/0x200)
[  429.381114][    C0]  r9:00000040 r8:8469b8d0 r7:859c981c r6:847dd550 r5:847dd500 r4:85212f00
[  429.381467][    C0] [<81841eec>] (j1939_session_destroy) from [<818430c4>] (j1939_xtp_rx_eoma+0x120/0x234)
[  429.381912][    C0]  r6:852123c0 r5:847dd500 r4:847dd514
[  429.382172][    C0] [<81842fa4>] (j1939_xtp_rx_eoma) from [<818454ec>] (j1939_tp_recv+0x4a8/0x530)
[  429.382608][    C0]  r7:859c9000 r6:859c9008 r5:859c9000 r4:852123c0
[  429.384149][    C0] [<81845044>] (j1939_tp_recv) from [<8183eed0>] (j1939_can_recv+0x1e4/0x2dc)
[  429.387808][    C0]  r7:859c9000 r6:859c9008 r5:859c9810 r4:852123c0
[  429.388394][    C0] [<8183ecec>] (j1939_can_recv) from [<81834b94>] (can_rcv_filter+0x9c/0x218)
[  429.389206][    C0]  r9:00000040 r8:84b686c0 r7:98ec0000 r6:85212c00 r5:00000001 r4:8474b360
[  429.389649][    C0] [<81834af8>] (can_rcv_filter) from [<81835610>] (can_receive+0xb4/0xf0)
[  429.390707][    C0]  r9:00000040 r8:00000000 r7:84b68000 r6:8498ca80 r5:848e8000 r4:85212c00
[  429.391118][    C0] [<8183555c>] (can_receive) from [<818356d0>] (can_rcv+0x84/0xac)
[  429.391525][    C0]  r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8183564c r4:85212c00
[  429.391852][    C0] [<8183564c>] (can_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80)
[  429.392784][    C0]  r5:8183564c r4:84b68000
[  429.393980][    C0] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c)
[  429.394975][    C0]  r5:dddd0f70 r4:85212c00
[  429.396605][    C0] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c)
[  429.397388][    C0]  r5:dddd0f70 r4:85212c00
[  429.398389][    C0] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240)
[  429.401409][    C0]  r10:dddd0e80 r9:dddd10c0 r8:df855e38 r7:df855e33 r6:00000040 r5:dddd0f70
[  429.403173][    C0]  r4:00000001
[  429.403478][    C0] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440)
[  429.404037][    C0]  r9:dddd10c0 r8:df855e38 r7:0000012c r6:00003276 r5:dddd0f70 r4:00000000
[  429.404433][    C0] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464)
[  429.405015][    C0]  r10:00000008 r9:82e3b000 r8:00000100 r7:04208040 r6:00000003 r5:00000004
[  429.405383][    C0]  r4:8260408c
[  429.405580][    C0] [<8024b910>] (handle_softirqs) from [<8024bdb8>] (run_ksoftirqd+0x44/0x4c)
[  429.406074][    C0]  r10:00000000 r9:00000002 r8:82624b08 r7:00000001 r6:82e3b000 r5:82cb7140
[  429.406421][    C0]  r4:00000000
[  429.406627][    C0] [<8024bd74>] (run_ksoftirqd) from [<80275edc>] (smpboot_thread_fn+0x16c/0x284)
[  429.407000][    C0] [<80275d70>] (smpboot_thread_fn) from [<80270ae0>] (kthread+0x104/0x134)
[  429.407375][    C0]  r10:00000000 r9:df819de8 r8:82cb7280 r7:82cb7140 r6:80275d70 r5:82e3b000
[  429.407702][    C0]  r4:82cb7180 r3:00000000
[  429.407918][    C0] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  429.408299][    C0] Exception stack(0xdf855fb0 to 0xdf855ff8)
[  429.408599][    C0] 5fa0:                                     00000000 00000000 00000000 00000000
[  429.408933][    C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  429.409291][    C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  429.409643][    C0]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82cb7180
[  429.411892][    C0] Rebooting in 86400 seconds..

VM DIAGNOSIS:
01:49:11  Registers:
info registers vcpu 0

CPU#0
R00=00000000 R01=00000000 R02=00000000 R03=82e3b000
R04=8262a654 R05=00000000 R06=00000555 R07=3fffe553
R08=df8558fc R09=3fffe554 R10=00000000 R11=df855944
R12=00000001 R13=df8558e8 R14=0001d488 R15=802c4c80
PSR=40000193 -Z-- A S svc32
s00=00000000 s01=00000000 d00=0000000000000000
s02=00000000 s03=00000000 d01=0000000000000000
s04=00000000 s05=00000000 d02=0000000000000000
s06=00000000 s07=00000000 d03=0000000000000000
s08=00000000 s09=00000000 d04=0000000000000000
s10=00000000 s11=00000000 d05=0000000000000000
s12=00000000 s13=00000000 d06=0000000000000000
s14=00000000 s15=00000000 d07=0000000000000000
s16=00000000 s17=00000000 d08=0000000000000000
s18=00000000 s19=00000000 d09=0000000000000000
s20=00000000 s21=00000000 d10=0000000000000000
s22=00000000 s23=00000000 d11=0000000000000000
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=00000000 s33=00000000 d16=0000000000000000
s34=00000000 s35=00000000 d17=0000000000000000
s36=00000000 s37=00000000 d18=0000000000000000
s38=00000000 s39=00000000 d19=0000000000000000
s40=00000000 s41=00000000 d20=0000000000000000
s42=00000000 s43=00000000 d21=0000000000000000
s44=00000000 s45=00000000 d22=0000000000000000
s46=00000000 s47=00000000 d23=0000000000000000
s48=00000000 s49=00000000 d24=0000000000000000
s50=00000000 s51=00000000 d25=0000000000000000
s52=00000000 s53=00000000 d26=0000000000000000
s54=00000000 s55=00000000 d27=0000000000000000
s56=00000000 s57=00000000 d28=0000000000000000
s58=00000000 s59=00000000 d29=0000000000000000
s60=00000000 s61=00000000 d30=0000000000000000
s62=00000000 s63=00000000 d31=0000000000000000
FPSCR: 00000000
info registers vcpu 1

CPU#1
R00=8422cac0 R01=dfc69b8c R02=000001fc R03=00000318
R04=00000004 R05=85ebca6b R06=e6546b64 R07=183d117a
R08=1b873593 R09=842557e4 R10=840243b0 R11=dfc69b4c
R12=00000707 R13=dfc69b2c R14=00000077 R15=8073b080
PSR=a0000013 N-C- A S svc32
s00=05ec76f0 s01=00000001 d00=0000000105ec76f0
s02=dea713f1 s03=00000000 d01=00000000dea713f1
s04=5e89015a s05=bba94669 d02=bba946695e89015a
s06=00000000 s07=00000000 d03=0000000000000000
s08=f4677960 s09=5f9d0db8 d04=5f9d0db8f4677960
s10=00000000 s11=00000000 d05=0000000000000000
s12=ffffffff s13=00000000 d06=00000000ffffffff
s14=00000000 s15=00000000 d07=0000000000000000
s16=00000000 s17=00000000 d08=0000000000000000
s18=00000000 s19=00000000 d09=0000000000000000
s20=ba28896a s21=da959135 d10=da959135ba28896a
s22=7229627e s23=00000000 d11=000000007229627e
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=00000000 s33=00000000 d16=0000000000000000
s34=00000000 s35=00000000 d17=0000000000000000
s36=00000000 s37=00000000 d18=0000000000000000
s38=00000000 s39=00000000 d19=0000000000000000
s40=00000000 s41=00000000 d20=0000000000000000
s42=00000000 s43=00000000 d21=0000000000000000
s44=00000000 s45=00000000 d22=0000000000000000
s46=00000000 s47=00000000 d23=0000000000000000
s48=00000000 s49=00000000 d24=0000000000000000
s50=00000000 s51=00000000 d25=0000000000000000
s52=00000000 s53=00000000 d26=0000000000000000
s54=00000000 s55=00000000 d27=0000000000000000
s56=00000000 s57=00000000 d28=0000000000000000
s58=00000000 s59=00000000 d29=0000000000000000
s60=00000000 s61=00000000 d30=0000000000000000
s62=00000000 s63=00000000 d31=0000000000000000
FPSCR: 00000000