last executing test programs:

23.58150602s ago: executing program 1 (id=88):
r0 = socket$netlink(0x10, 0x3, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000440)=0xc)
setgroups(0x1, &(0x7f0000000140)=[r1])

23.330321526s ago: executing program 1 (id=89):
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in=@broadcast}, {@in6=@mcast1, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0)

20.450544037s ago: executing program 1 (id=90):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='netlink_extack\x00', r0}, 0x10)
syz_open_procfs(0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000480)=ANY=[@ANYBLOB="f0000000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000a000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a"], 0xf0}, 0x1, 0xe}, 0x0)

20.136322176s ago: executing program 1 (id=91):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r3 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x10}, &(0x7f00000000c0)=0xc)

7.058556212s ago: executing program 0 (id=98):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)

6.709878822s ago: executing program 0 (id=99):
r0 = socket$inet_sctp(0x2, 0x1, 0x84)
sendmmsg$inet_sctp(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x7c, &(0x7f0000000100)=[{&(0x7f0000000040)="9e", 0x1}], 0x1}], 0x1, 0xfc)

6.539807286s ago: executing program 0 (id=100):
r0 = io_uring_setup(0x27e3, &(0x7f0000000000)={0x0, 0xdf85, 0x400, 0x8000, 0x1a4})
r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0)
io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x1b, 0x20000009, r1)

6.109735739s ago: executing program 0 (id=101):
r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0)
ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0x0, "56603500000000010000f5ffffffffffffff00", <r1=>0xffffffffffffffff})
r2 = epoll_create1(0x80000)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100))

5.863147196s ago: executing program 0 (id=102):
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0)
sendmsg$NFC_CMD_START_POLL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x0)

5.506496395s ago: executing program 0 (id=103):
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
syz_open_dev$tty1(0xc, 0x4, 0x3)
r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xd6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xa0}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)

959.177432ms ago: executing program 1 (id=104):
r0 = socket(0x2a, 0x2, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0)
getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newtfilter={0x70, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x9}, {}, {0x1c, 0xfff1}}, [@filter_kind_options=@f_flower={{0xb}, {0x40, 0x2, [@TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @multicast1}, @TCA_FLOWER_KEY_MPLS_BOS={0x5, 0x44, 0x4}, @TCA_FLOWER_KEY_ARP_SHA={0xa, 0x3f, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, @TCA_FLOWER_KEY_MPLS_TC={0x5, 0x45, 0x3}, @TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @multicast2}, @TCA_FLOWER_KEY_ENC_IP_TOS_MASK={0x5}, @TCA_FLOWER_KEY_FLAGS_MASK={0x8, 0x30, 0x9}]}}]}, 0x70}}, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0)

0s ago: executing program 1 (id=105):
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r0 = socket$can_j1939(0x1d, 0x2, 0x7)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', <r1=>0x0})
bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18)
connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18)
sendmsg$can_j1939(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000002680)="cdf5083070ea05552d", 0x9}}, 0x0)
recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0)

kernel console output (not intermixed with test programs):

[   55.797040][   T31] audit: type=1400 audit(55.720:68): avc:  denied  { read write } for  pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   55.798517][   T31] audit: type=1400 audit(55.720:69): avc:  denied  { open } for  pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
Warning: Permanently added '[localhost]:31230' (ED25519) to the list of known hosts.
[   66.806214][   T31] audit: type=1400 audit(66.690:70): avc:  denied  { name_bind } for  pid=3085 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   69.058853][   T31] audit: type=1400 audit(68.980:71): avc:  denied  { execute } for  pid=3087 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   69.076036][   T31] audit: type=1400 audit(68.990:72): avc:  denied  { execute_no_trans } for  pid=3087 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   72.507355][   T31] audit: type=1400 audit(72.430:73): avc:  denied  { mounton } for  pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   72.511466][   T31] audit: type=1400 audit(72.430:74): avc:  denied  { mount } for  pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   72.533525][ T3087] cgroup: Unknown subsys name 'net'
[   72.542772][   T31] audit: type=1400 audit(72.460:75): avc:  denied  { unmount } for  pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   72.702247][ T3087] cgroup: Unknown subsys name 'cpuset'
[   72.709454][ T3087] cgroup: Unknown subsys name 'hugetlb'
[   72.710649][ T3087] cgroup: Unknown subsys name 'rlimit'
[   72.936360][   T31] audit: type=1400 audit(72.850:76): avc:  denied  { setattr } for  pid=3087 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   72.940053][   T31] audit: type=1400 audit(72.860:77): avc:  denied  { mounton } for  pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   72.942626][   T31] audit: type=1400 audit(72.860:78): avc:  denied  { mount } for  pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   73.196960][ T3089] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   73.199311][   T31] audit: type=1400 audit(73.120:79): avc:  denied  { relabelto } for  pid=3089 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   73.201872][   T31] audit: type=1400 audit(73.120:80): avc:  denied  { write } for  pid=3089 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   73.238492][   T31] audit: type=1400 audit(73.160:81): avc:  denied  { read } for  pid=3087 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
Setting up swapspace version 1, size = 127995904 bytes
[   73.243261][   T31] audit: type=1400 audit(73.160:82): avc:  denied  { open } for  pid=3087 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   80.097674][ T3087] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   82.405776][   T31] audit: type=1400 audit(82.320:83): avc:  denied  { execmem } for  pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   82.482585][   T31] audit: type=1400 audit(82.400:84): avc:  denied  { read } for  pid=3092 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   82.483680][   T31] audit: type=1400 audit(82.400:85): avc:  denied  { read } for  pid=3093 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   82.484865][   T31] audit: type=1400 audit(82.400:86): avc:  denied  { open } for  pid=3093 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   82.492951][   T31] audit: type=1400 audit(82.410:87): avc:  denied  { mounton } for  pid=3092 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[   82.518692][   T31] audit: type=1400 audit(82.440:89): avc:  denied  { module_request } for  pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[   82.520161][   T31] audit: type=1400 audit(82.440:88): avc:  denied  { module_request } for  pid=3092 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[   82.625938][   T31] audit: type=1400 audit(82.540:90): avc:  denied  { sys_module } for  pid=3093 comm="syz-executor" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[   83.358977][   T31] audit: type=1400 audit(83.280:91): avc:  denied  { ioctl } for  pid=3092 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   84.622688][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   84.642275][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   84.779082][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   84.791234][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   85.782752][ T3093] hsr_slave_0: entered promiscuous mode
[   85.793139][ T3093] hsr_slave_1: entered promiscuous mode
[   86.090199][ T3092] hsr_slave_0: entered promiscuous mode
[   86.092320][ T3092] hsr_slave_1: entered promiscuous mode
[   86.093694][ T3092] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   86.094265][ T3092] Cannot create hsr debugfs directory
[   86.352774][   T31] audit: type=1400 audit(86.270:92): avc:  denied  { create } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   86.364186][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   86.390258][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   86.417399][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   86.424240][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   86.642891][ T3092] netdevsim netdevsim1 netdevsim0: renamed from eth0
[   86.654703][ T3092] netdevsim netdevsim1 netdevsim1: renamed from eth1
[   86.664435][ T3092] netdevsim netdevsim1 netdevsim2: renamed from eth2
[   86.678190][ T3092] netdevsim netdevsim1 netdevsim3: renamed from eth3
[   87.171241][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0
[   87.428696][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0
[   89.753814][ T3093] veth0_vlan: entered promiscuous mode
[   89.780099][ T3093] veth1_vlan: entered promiscuous mode
[   89.863373][ T3093] veth0_macvtap: entered promiscuous mode
[   89.881931][ T3093] veth1_macvtap: entered promiscuous mode
[   89.923281][ T3093] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   89.923807][ T3093] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   89.924005][ T3093] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   89.924257][ T3093] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   90.082347][   T31] kauditd_printk_skb: 2 callbacks suppressed
[   90.082446][   T31] audit: type=1400 audit(90.000:95): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[   90.094850][   T31] audit: type=1400 audit(90.010:96): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   90.107294][   T31] audit: type=1400 audit(90.020:97): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   90.113957][   T31] audit: type=1400 audit(90.030:98): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[   90.120517][   T31] audit: type=1400 audit(90.040:99): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[   90.137062][   T31] audit: type=1400 audit(90.060:100): avc:  denied  { unmount } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   90.143391][   T31] audit: type=1400 audit(90.060:101): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   90.154351][   T31] audit: type=1400 audit(90.070:102): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[   90.159124][   T31] audit: type=1400 audit(90.080:103): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[   90.160934][   T31] audit: type=1400 audit(90.080:104): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[   90.204592][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   90.248957][ T3092] veth0_vlan: entered promiscuous mode
[   90.287819][ T3092] veth1_vlan: entered promiscuous mode
[   90.389102][ T3092] veth0_macvtap: entered promiscuous mode
[   90.403867][ T3092] veth1_macvtap: entered promiscuous mode
[   90.494477][ T3092] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   90.501914][ T3092] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   90.502511][ T3092] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   90.502934][ T3092] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   92.647601][ T3780] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  104.753827][   T31] kauditd_printk_skb: 18 callbacks suppressed
[  104.753940][   T31] audit: type=1400 audit(104.670:123): avc:  denied  { create } for  pid=3785 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  104.762028][   T31] audit: type=1400 audit(104.680:124): avc:  denied  { ioctl } for  pid=3785 comm="syz.1.5" path="socket:[2319]" dev="sockfs" ino=2319 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  105.010388][   T31] audit: type=1400 audit(104.930:125): avc:  denied  { sqpoll } for  pid=3789 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1
[  105.122226][   T31] audit: type=1400 audit(105.040:126): avc:  denied  { execute } for  pid=3797 comm="syz.0.8" name="file1" dev="tmpfs" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  105.124191][ T3798] process 'syz.0.8' launched './file1' with NULL argv: empty string added
[  105.129929][   T31] audit: type=1400 audit(105.050:127): avc:  denied  { execute_no_trans } for  pid=3797 comm="syz.0.8" path="/4/file1" dev="tmpfs" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  105.245212][   T31] audit: type=1400 audit(105.160:128): avc:  denied  { create } for  pid=3802 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  105.246157][   T31] audit: type=1400 audit(105.160:129): avc:  denied  { write } for  pid=3802 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  105.368240][   T31] audit: type=1400 audit(105.290:130): avc:  denied  { create } for  pid=3806 comm="syz.0.10" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  105.374787][   T31] audit: type=1400 audit(105.290:131): avc:  denied  { create } for  pid=3806 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  105.376423][   T31] audit: type=1400 audit(105.290:132): avc:  denied  { write } for  pid=3806 comm="syz.0.10" path="socket:[940]" dev="sockfs" ino=940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  109.426657][ T3845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3845 comm=syz.1.20
[  109.847165][   T31] kauditd_printk_skb: 16 callbacks suppressed
[  109.847302][   T31] audit: type=1400 audit(109.770:149): avc:  denied  { ioctl } for  pid=3846 comm="syz.1.21" path="socket:[2367]" dev="sockfs" ino=2367 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  109.854234][   T31] audit: type=1400 audit(109.770:150): avc:  denied  { nlmsg_write } for  pid=3846 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  112.409817][   T31] audit: type=1400 audit(112.330:151): avc:  denied  { mount } for  pid=3882 comm="syz.1.27" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  112.508408][   T31] audit: type=1400 audit(112.430:152): avc:  denied  { unmount } for  pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  113.071729][   T31] audit: type=1400 audit(112.970:153): avc:  denied  { connect } for  pid=3886 comm="syz.1.29" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  113.807639][ T3892] netlink: 'syz.1.31': attribute type 10 has an invalid length.
[  116.717243][ T3909] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'.
[  117.897174][ T3901] usb 2-1: new high-speed USB device number 2 using dummy_hcd
[  118.156961][ T3901] usb 2-1: config index 0 descriptor too short (expected 23569, got 27)
[  118.157534][ T3901] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[  118.165284][ T3901] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0
[  118.165735][ T3901] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0
[  118.165920][ T3901] usb 2-1: Manufacturer: syz
[  118.178187][ T3901] usb 2-1: config 0 descriptor??
[  118.396578][ T3901] rc_core: IR keymap rc-hauppauge not found
[  118.397085][ T3901] Registered IR keymap rc-empty
[  118.420293][ T3901] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0
[  118.433290][ T3901] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input3
[  118.550247][ T3901] usb 2-1: USB disconnect, device number 2
[  118.794611][   T31] audit: type=1400 audit(118.710:154): avc:  denied  { map } for  pid=3936 comm="syz.1.40" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  118.800214][   T31] audit: type=1400 audit(118.720:155): avc:  denied  { read write } for  pid=3936 comm="syz.1.40" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  119.369656][   T31] audit: type=1400 audit(119.290:156): avc:  denied  { mount } for  pid=3940 comm="syz.1.42" name="/" dev="ramfs" ino=2462 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1
[  122.508966][   T31] audit: type=1400 audit(122.430:157): avc:  denied  { read } for  pid=3945 comm="syz.1.44" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  122.512852][   T31] audit: type=1400 audit(122.430:158): avc:  denied  { open } for  pid=3945 comm="syz.1.44" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  122.526119][   T31] audit: type=1400 audit(122.440:159): avc:  denied  { ioctl } for  pid=3945 comm="syz.1.44" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  126.527226][   T31] audit: type=1400 audit(126.450:160): avc:  denied  { write } for  pid=3947 comm="syz.1.45" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  128.458621][   T31] audit: type=1400 audit(128.380:161): avc:  denied  { ioctl } for  pid=3952 comm="syz.1.46" path="socket:[2476]" dev="sockfs" ino=2476 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  128.573450][   T31] audit: type=1400 audit(128.490:162): avc:  denied  { create } for  pid=3954 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  128.583014][   T31] audit: type=1400 audit(128.500:163): avc:  denied  { ioctl } for  pid=3954 comm="syz.1.47" path="socket:[2483]" dev="sockfs" ino=2483 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  128.881072][   T31] audit: type=1400 audit(128.800:164): avc:  denied  { create } for  pid=3958 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[  129.025962][   T31] audit: type=1400 audit(128.940:165): avc:  denied  { create } for  pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  129.049649][   T31] audit: type=1400 audit(128.970:166): avc:  denied  { map_read map_write } for  pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  129.087432][ T3959] Zero length message leads to an empty skb
[  133.226792][ T3992] input: syz1 as /devices/virtual/input/input4
[  133.639453][   T31] audit: type=1400 audit(133.550:167): avc:  denied  { mount } for  pid=3999 comm="syz.1.58" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1
[  133.782783][   T31] audit: type=1400 audit(133.700:168): avc:  denied  { unmount } for  pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1
[  143.137724][   T31] audit: type=1400 audit(143.060:169): avc:  denied  { setopt } for  pid=4008 comm="syz.0.61" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  143.244042][ T4011] netlink: 16 bytes leftover after parsing attributes in process `syz.0.62'.
[  146.644847][   T31] audit: type=1400 audit(146.560:170): avc:  denied  { create } for  pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  146.647794][   T31] audit: type=1400 audit(146.570:171): avc:  denied  { bind } for  pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  146.650718][   T31] audit: type=1400 audit(146.570:172): avc:  denied  { setopt } for  pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  146.652351][ T4022] netlink: 4 bytes leftover after parsing attributes in process `syz.1.67'.
[  147.035705][    T8] usb 2-1: new high-speed USB device number 3 using dummy_hcd
[  147.190285][    T8] usb 2-1: Using ep0 maxpacket: 32
[  147.223409][    T8] usb 2-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be
[  147.229824][    T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  147.237750][    T8] usb 2-1: config 0 descriptor??
[  148.396883][   T31] audit: type=1400 audit(148.320:173): avc:  denied  { create } for  pid=4019 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  154.948103][   T31] audit: type=1400 audit(154.870:174): avc:  denied  { accept } for  pid=4041 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  157.048464][   T31] audit: type=1400 audit(156.970:175): avc:  denied  { create } for  pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  157.060130][   T31] audit: type=1400 audit(156.980:176): avc:  denied  { setopt } for  pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  157.523289][ T2884] usb 2-1: USB disconnect, device number 3
[  157.591508][   T31] audit: type=1400 audit(157.500:177): avc:  denied  { bind } for  pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  159.641613][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  159.642790][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  159.748142][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  159.748878][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  160.044685][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  160.046867][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'.
[  163.161193][ T4105] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.83' sets config #0
[  163.197324][   T31] audit: type=1400 audit(163.120:178): avc:  denied  { write } for  pid=4096 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1
[  163.453282][   T31] audit: type=1400 audit(163.370:179): avc:  denied  { setopt } for  pid=4107 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  163.497203][   T31] audit: type=1400 audit(163.420:180): avc:  denied  { connect } for  pid=4107 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  171.771935][   T31] audit: type=1400 audit(171.690:181): avc:  denied  { getopt } for  pid=4129 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  177.793951][   T31] audit: type=1326 audit(177.710:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  177.798125][   T31] audit: type=1326 audit(177.710:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=170 compat=0 ip=0x133450 code=0x7ffc0000
[  177.798859][   T31] audit: type=1326 audit(177.720:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  177.799962][   T31] audit: type=1326 audit(177.720:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  178.530860][   T31] audit: type=1400 audit(178.450:186): avc:  denied  { wake_alarm } for  pid=4138 comm="syz.0.94" capability=35  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  180.644605][   T31] audit: type=1400 audit(180.560:187): avc:  denied  { name_connect } for  pid=4152 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1
[  187.476207][   T31] audit: type=1400 audit(187.390:188): avc:  denied  { ioctl } for  pid=4167 comm="syz.1.105" path="socket:[3347]" dev="sockfs" ino=3347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  187.521624][   T31] audit: type=1400 audit(187.440:189): avc:  denied  { connect } for  pid=4167 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  187.537420][   T31] audit: type=1400 audit(187.460:190): avc:  denied  { write } for  pid=4167 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  187.570537][    C0] ------------[ cut here ]------------
[  187.575883][    C0] WARNING: CPU: 0 PID: 26 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174
[  187.577224][    C0] refcount_t: underflow; use-after-free.
[  187.577489][    C0] Modules linked in:
[  187.578695][    C0] Kernel panic - not syncing: kernel: panic_on_warn set ...
[  187.579951][    C0] CPU: 0 UID: 0 PID: 26 Comm: kworker/u9:0 Not tainted 6.12.0-syzkaller #0
[  187.580983][    C0] Hardware name: ARM-Versatile Express
[  187.582539][    C0] Workqueue: events_unbound nsim_dev_trap_report_work
[  187.583349][    C0] Call trace: frame pointer underflow
[  187.585351][    C0] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c)
[  187.586317][    C0]  r7:00000000 r6:82623304 r5:00000000 r4:820413b8
[  187.589238][    C0] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c)
[  187.589966][    C0] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c)
[  187.590405][    C0]  r5:00000000 r4:82874d18
[  187.590656][    C0] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374)
[  187.591128][    C0] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c)
[  187.591513][    C0]  r3:8260c604 r2:00000001 r1:82029878 r0:82031344
[  187.591875][    C0]  r7:8084bbd8
[  187.592063][    C0] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188)
[  187.592434][    C0] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4)
[  187.592911][    C0]  r8:00000009 r7:8209017c r6:df801c74 r5:82e44800 r4:00000000
[  187.593237][    C0] [<80242940>] (warn_slowpath_fmt) from [<8084bbd8>] (refcount_warn_saturate+0x13c/0x174)
[  187.593810][    C0]  r10:dddd0e88 r9:00000040 r8:840c2010 r7:00000000 r6:81841f64 r5:00000002
[  187.594269][    C0]  r4:84512480
[  187.594494][    C0] [<8084ba9c>] (refcount_warn_saturate) from [<814aa974>] (sk_skb_reason_drop+0x1d8/0x248)
[  187.595266][    C0] [<814aa79c>] (sk_skb_reason_drop) from [<81841f64>] (j1939_session_destroy+0x78/0x200)
[  187.595952][    C0]  r9:00000040 r8:840c2010 r7:8408681c r6:84f1f250 r5:84f1f200 r4:84512480
[  187.596353][    C0] [<81841eec>] (j1939_session_destroy) from [<818430c4>] (j1939_xtp_rx_eoma+0x120/0x234)
[  187.597331][    C0]  r6:84512cc0 r5:84f1f200 r4:84f1f214
[  187.597702][    C0] [<81842fa4>] (j1939_xtp_rx_eoma) from [<818454ec>] (j1939_tp_recv+0x4a8/0x530)
[  187.598224][    C0]  r7:84086000 r6:84086008 r5:84086000 r4:84512cc0
[  187.598703][    C0] [<81845044>] (j1939_tp_recv) from [<8183eed0>] (j1939_can_recv+0x1e4/0x2dc)
[  187.599278][    C0]  r7:84086000 r6:84086008 r5:84086810 r4:84512cc0
[  187.599637][    C0] [<8183ecec>] (j1939_can_recv) from [<81834b94>] (can_rcv_filter+0x9c/0x218)
[  187.600146][    C0]  r9:00000040 r8:842f86c0 r7:98ec0000 r6:84512900 r5:00000001 r4:847a6360
[  187.600658][    C0] [<81834af8>] (can_rcv_filter) from [<81835610>] (can_receive+0xb4/0xf0)
[  187.601282][    C0]  r9:00000040 r8:00000000 r7:842f8000 r6:8450a980 r5:840b0000 r4:84512900
[  187.601777][    C0] [<8183555c>] (can_receive) from [<818356d0>] (can_rcv+0x84/0xac)
[  187.602361][    C0]  r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8183564c r4:84512900
[  187.602931][    C0] [<8183564c>] (can_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80)
[  187.603527][    C0]  r5:8183564c r4:842f8000
[  187.603817][    C0] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c)
[  187.604368][    C0]  r5:dddd0f70 r4:84512900
[  187.604815][    C0] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c)
[  187.605626][    C0]  r5:dddd0f70 r4:84512900
[  187.607073][    C0] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240)
[  187.608596][    C0]  r10:dddd0e80 r9:dddd10c0 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd0f70
[  187.609319][    C0]  r4:00000001
[  187.611782][    C0] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440)
[  187.615857][    C0]  r9:dddd10c0 r8:df801ed0 r7:0000012c r6:ffffd410 r5:dddd0f70 r4:00000000
[  187.616423][    C0] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464)
[  187.616988][    C0]  r10:00000008 r9:82e44800 r8:00000102 r7:04208060 r6:00000003 r5:00000004
[  187.617457][    C0]  r4:8260408c
[  187.617807][    C0] [<8024b910>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18)
[  187.618410][    C0]  r10:84e3ad00 r9:84d51600 r8:84e3adfc r7:00000030 r6:81b8fcf8 r5:00000002
[  187.618903][    C0]  r4:60000013
[  187.619105][    C0] [<802012bc>] (__do_softirq) from [<80208824>] (____do_softirq+0x10/0x14)
[  187.619921][    C0] [<80208814>] (____do_softirq) from [<8198744c>] (call_with_stack+0x1c/0x20)
[  187.620727][    C0] [<81987430>] (call_with_stack) from [<80208860>] (do_softirq_own_stack+0x38/0x3c)
[  187.621316][    C0] [<80208828>] (do_softirq_own_stack) from [<8024c064>] (do_softirq+0x5c/0x64)
[  187.621859][    C0] [<8024c008>] (do_softirq) from [<8024c138>] (__local_bh_enable_ip+0xcc/0xd0)
[  187.622379][    C0]  r5:00000002 r4:82e44800
[  187.622686][    C0] [<8024c06c>] (__local_bh_enable_ip) from [<819e355c>] (_raw_spin_unlock_bh+0x34/0x38)
[  187.623390][    C0]  r5:84d516b0 r4:84512d80
[  187.623663][    C0] [<819e3528>] (_raw_spin_unlock_bh) from [<80da91bc>] (nsim_dev_trap_report_work+0x2e4/0x410)
[  187.624302][    C0] [<80da8ed8>] (nsim_dev_trap_report_work) from [<80266e90>] (process_one_work+0x1b4/0x4f4)
[  187.624687][    C0]  r10:82c1bc05 r9:82e44800 r8:02400000 r7:82c0f600 r6:82c1bc00 r5:84d51600
[  187.625578][    C0]  r4:82cb6580
[  187.625863][    C0] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc)
[  187.626282][    C0]  r10:82e44800 r9:82cb65ac r8:61c88647 r7:82c0f620 r6:82604d40 r5:82c0f600
[  187.626766][    C0]  r4:82cb6580
[  187.627017][    C0] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134)
[  187.627522][    C0]  r10:00000000 r9:df819e08 r8:82cd0140 r7:82cb6580 r6:80267888 r5:82e44800
[  187.627910][    C0]  r4:82cd0040
[  187.628120][    C0] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  187.628735][    C0] Exception stack(0xdf885fb0 to 0xdf885ff8)
[  187.629240][    C0] 5fa0:                                     00000000 00000000 00000000 00000000
[  187.629675][    C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  187.630093][    C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  187.630510][    C0]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82cd0040
[  187.634560][    C0] Rebooting in 86400 seconds..

VM DIAGNOSIS:
07:53:10  Registers:
info registers vcpu 0

CPU#0
R00=00000000 R01=820413b8 R02=00000000 R03=819d7f48
R04=00000006 R05=826faf88 R06=00000000 R07=826faf80
R08=82e44800 R09=00000028 R10=826faf88 R11=df8019f4
R12=df8019f8 R13=df8019e8 R14=8031ce20 R15=819d7f58
PSR=80000093 N--- A S svc32
s00=00000000 s01=00000000 d00=0000000000000000
s02=00000000 s03=00000000 d01=0000000000000000
s04=00000000 s05=00000000 d02=0000000000000000
s06=00000000 s07=00000000 d03=0000000000000000
s08=00000000 s09=00000000 d04=0000000000000000
s10=00000000 s11=00000000 d05=0000000000000000
s12=00000000 s13=00000000 d06=0000000000000000
s14=00000000 s15=00000000 d07=0000000000000000
s16=00000000 s17=00000000 d08=0000000000000000
s18=00000000 s19=00000000 d09=0000000000000000
s20=00000000 s21=00000000 d10=0000000000000000
s22=00000000 s23=00000000 d11=0000000000000000
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=00000000 s33=00000000 d16=0000000000000000
s34=00000000 s35=00000000 d17=0000000000000000
s36=00000000 s37=00000000 d18=0000000000000000
s38=00000000 s39=00000000 d19=0000000000000000
s40=00000000 s41=00000000 d20=0000000000000000
s42=00000000 s43=00000000 d21=0000000000000000
s44=00000000 s45=00000000 d22=0000000000000000
s46=00000000 s47=00000000 d23=0000000000000000
s48=00000000 s49=00000000 d24=0000000000000000
s50=00000000 s51=00000000 d25=0000000000000000
s52=00000000 s53=00000000 d26=0000000000000000
s54=00000000 s55=00000000 d27=0000000000000000
s56=00000000 s57=00000000 d28=0000000000000000
s58=00000000 s59=00000000 d29=0000000000000000
s60=00000000 s61=00000000 d30=0000000000000000
s62=00000000 s63=00000000 d31=0000000000000000
FPSCR: 00000000
info registers vcpu 1

CPU#1
R00=84698800 R01=00000001 R02=00016dfb R03=819d7f48
R04=00000006 R05=826faf88 R06=00000000 R07=826faf80
R08=83ee8c00 R09=00000028 R10=826faf88 R11=df805d04
R12=df805d08 R13=df805cf8 R14=8031ce20 R15=819d7f58
PSR=20000193 --C- A S svc32
s00=00000000 s01=00000000 d00=0000000000000000
s02=00000000 s03=00000000 d01=0000000000000000
s04=00000000 s05=00000000 d02=0000000000000000
s06=00000000 s07=00000000 d03=0000000000000000
s08=00000000 s09=00000000 d04=0000000000000000
s10=00000000 s11=00000000 d05=0000000000000000
s12=00000000 s13=00000000 d06=0000000000000000
s14=00000000 s15=00000000 d07=0000000000000000
s16=76f9a21a s17=00000000 d08=0000000076f9a21a
s18=00000000 s19=00000000 d09=0000000000000000
s20=00000000 s21=00000000 d10=0000000000000000
s22=00000000 s23=00000000 d11=0000000000000000
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=00000000 s33=00000000 d16=0000000000000000
s34=00000000 s35=00000000 d17=0000000000000000
s36=00000000 s37=00000000 d18=0000000000000000
s38=00000000 s39=00000000 d19=0000000000000000
s40=00000000 s41=00000000 d20=0000000000000000
s42=00000000 s43=00000000 d21=0000000000000000
s44=00000000 s45=00000000 d22=0000000000000000
s46=00000000 s47=00000000 d23=0000000000000000
s48=00000000 s49=00000000 d24=0000000000000000
s50=00000000 s51=00000000 d25=0000000000000000
s52=00000000 s53=00000000 d26=0000000000000000
s54=00000000 s55=00000000 d27=0000000000000000
s56=00000000 s57=00000000 d28=0000000000000000
s58=00000000 s59=00000000 d29=0000000000000000
s60=00000000 s61=00000000 d30=0000000000000000
s62=00000000 s63=00000000 d31=0000000000000000
FPSCR: 00000000