last executing test programs: 23.58150602s ago: executing program 1 (id=88): r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000440)=0xc) setgroups(0x1, &(0x7f0000000140)=[r1]) 23.330321526s ago: executing program 1 (id=89): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in=@broadcast}, {@in6=@mcast1, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) 20.450544037s ago: executing program 1 (id=90): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='netlink_extack\x00', r0}, 0x10) syz_open_procfs(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000480)=ANY=[@ANYBLOB="f0000000100013070000000000000000ffffffff000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000a000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a"], 0xf0}, 0x1, 0xe}, 0x0) 20.136322176s ago: executing program 1 (id=91): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x10}, &(0x7f00000000c0)=0xc) 7.058556212s ago: executing program 0 (id=98): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6.709878822s ago: executing program 0 (id=99): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x7c, &(0x7f0000000100)=[{&(0x7f0000000040)="9e", 0x1}], 0x1}], 0x1, 0xfc) 6.539807286s ago: executing program 0 (id=100): r0 = io_uring_setup(0x27e3, &(0x7f0000000000)={0x0, 0xdf85, 0x400, 0x8000, 0x1a4}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x1b, 0x20000009, r1) 6.109735739s ago: executing program 0 (id=101): r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0x0, "56603500000000010000f5ffffffffffffff00", <r1=>0xffffffffffffffff}) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) 5.863147196s ago: executing program 0 (id=102): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_START_POLL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x0) 5.506496395s ago: executing program 0 (id=103): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xd6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xa0}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 959.177432ms ago: executing program 1 (id=104): r0 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newtfilter={0x70, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x9}, {}, {0x1c, 0xfff1}}, [@filter_kind_options=@f_flower={{0xb}, {0x40, 0x2, [@TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @multicast1}, @TCA_FLOWER_KEY_MPLS_BOS={0x5, 0x44, 0x4}, @TCA_FLOWER_KEY_ARP_SHA={0xa, 0x3f, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, @TCA_FLOWER_KEY_MPLS_TC={0x5, 0x45, 0x3}, @TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @multicast2}, @TCA_FLOWER_KEY_ENC_IP_TOS_MASK={0x5}, @TCA_FLOWER_KEY_FLAGS_MASK={0x8, 0x30, 0x9}]}}]}, 0x70}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 0s ago: executing program 1 (id=105): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', <r1=>0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000002680)="cdf5083070ea05552d", 0x9}}, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 55.797040][ T31] audit: type=1400 audit(55.720:68): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.798517][ T31] audit: type=1400 audit(55.720:69): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:31230' (ED25519) to the list of known hosts. [ 66.806214][ T31] audit: type=1400 audit(66.690:70): avc: denied { name_bind } for pid=3085 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.058853][ T31] audit: type=1400 audit(68.980:71): avc: denied { execute } for pid=3087 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.076036][ T31] audit: type=1400 audit(68.990:72): avc: denied { execute_no_trans } for pid=3087 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.507355][ T31] audit: type=1400 audit(72.430:73): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.511466][ T31] audit: type=1400 audit(72.430:74): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.533525][ T3087] cgroup: Unknown subsys name 'net' [ 72.542772][ T31] audit: type=1400 audit(72.460:75): avc: denied { unmount } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.702247][ T3087] cgroup: Unknown subsys name 'cpuset' [ 72.709454][ T3087] cgroup: Unknown subsys name 'hugetlb' [ 72.710649][ T3087] cgroup: Unknown subsys name 'rlimit' [ 72.936360][ T31] audit: type=1400 audit(72.850:76): avc: denied { setattr } for pid=3087 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.940053][ T31] audit: type=1400 audit(72.860:77): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.942626][ T31] audit: type=1400 audit(72.860:78): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.196960][ T3089] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.199311][ T31] audit: type=1400 audit(73.120:79): avc: denied { relabelto } for pid=3089 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.201872][ T31] audit: type=1400 audit(73.120:80): avc: denied { write } for pid=3089 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.238492][ T31] audit: type=1400 audit(73.160:81): avc: denied { read } for pid=3087 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.243261][ T31] audit: type=1400 audit(73.160:82): avc: denied { open } for pid=3087 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.097674][ T3087] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 82.405776][ T31] audit: type=1400 audit(82.320:83): avc: denied { execmem } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 82.482585][ T31] audit: type=1400 audit(82.400:84): avc: denied { read } for pid=3092 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.483680][ T31] audit: type=1400 audit(82.400:85): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.484865][ T31] audit: type=1400 audit(82.400:86): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.492951][ T31] audit: type=1400 audit(82.410:87): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 82.518692][ T31] audit: type=1400 audit(82.440:89): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.520161][ T31] audit: type=1400 audit(82.440:88): avc: denied { module_request } for pid=3092 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.625938][ T31] audit: type=1400 audit(82.540:90): avc: denied { sys_module } for pid=3093 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 83.358977][ T31] audit: type=1400 audit(83.280:91): avc: denied { ioctl } for pid=3092 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.622688][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.642275][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.779082][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.791234][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.782752][ T3093] hsr_slave_0: entered promiscuous mode [ 85.793139][ T3093] hsr_slave_1: entered promiscuous mode [ 86.090199][ T3092] hsr_slave_0: entered promiscuous mode [ 86.092320][ T3092] hsr_slave_1: entered promiscuous mode [ 86.093694][ T3092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.094265][ T3092] Cannot create hsr debugfs directory [ 86.352774][ T31] audit: type=1400 audit(86.270:92): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.364186][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.390258][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.417399][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.424240][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 86.642891][ T3092] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.654703][ T3092] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.664435][ T3092] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.678190][ T3092] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.171241][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.428696][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.753814][ T3093] veth0_vlan: entered promiscuous mode [ 89.780099][ T3093] veth1_vlan: entered promiscuous mode [ 89.863373][ T3093] veth0_macvtap: entered promiscuous mode [ 89.881931][ T3093] veth1_macvtap: entered promiscuous mode [ 89.923281][ T3093] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.923807][ T3093] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.924005][ T3093] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.924257][ T3093] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.082347][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 90.082446][ T31] audit: type=1400 audit(90.000:95): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 90.094850][ T31] audit: type=1400 audit(90.010:96): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 90.107294][ T31] audit: type=1400 audit(90.020:97): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.113957][ T31] audit: type=1400 audit(90.030:98): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 90.120517][ T31] audit: type=1400 audit(90.040:99): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.soDbaF/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 90.137062][ T31] audit: type=1400 audit(90.060:100): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 90.143391][ T31] audit: type=1400 audit(90.060:101): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 90.154351][ T31] audit: type=1400 audit(90.070:102): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 90.159124][ T31] audit: type=1400 audit(90.080:103): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 90.160934][ T31] audit: type=1400 audit(90.080:104): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 90.204592][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.248957][ T3092] veth0_vlan: entered promiscuous mode [ 90.287819][ T3092] veth1_vlan: entered promiscuous mode [ 90.389102][ T3092] veth0_macvtap: entered promiscuous mode [ 90.403867][ T3092] veth1_macvtap: entered promiscuous mode [ 90.494477][ T3092] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.501914][ T3092] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.502511][ T3092] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.502934][ T3092] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.647601][ T3780] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 104.753827][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 104.753940][ T31] audit: type=1400 audit(104.670:123): avc: denied { create } for pid=3785 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 104.762028][ T31] audit: type=1400 audit(104.680:124): avc: denied { ioctl } for pid=3785 comm="syz.1.5" path="socket:[2319]" dev="sockfs" ino=2319 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 105.010388][ T31] audit: type=1400 audit(104.930:125): avc: denied { sqpoll } for pid=3789 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 105.122226][ T31] audit: type=1400 audit(105.040:126): avc: denied { execute } for pid=3797 comm="syz.0.8" name="file1" dev="tmpfs" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 105.124191][ T3798] process 'syz.0.8' launched './file1' with NULL argv: empty string added [ 105.129929][ T31] audit: type=1400 audit(105.050:127): avc: denied { execute_no_trans } for pid=3797 comm="syz.0.8" path="/4/file1" dev="tmpfs" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 105.245212][ T31] audit: type=1400 audit(105.160:128): avc: denied { create } for pid=3802 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.246157][ T31] audit: type=1400 audit(105.160:129): avc: denied { write } for pid=3802 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.368240][ T31] audit: type=1400 audit(105.290:130): avc: denied { create } for pid=3806 comm="syz.0.10" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.374787][ T31] audit: type=1400 audit(105.290:131): avc: denied { create } for pid=3806 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 105.376423][ T31] audit: type=1400 audit(105.290:132): avc: denied { write } for pid=3806 comm="syz.0.10" path="socket:[940]" dev="sockfs" ino=940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 109.426657][ T3845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3845 comm=syz.1.20 [ 109.847165][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 109.847302][ T31] audit: type=1400 audit(109.770:149): avc: denied { ioctl } for pid=3846 comm="syz.1.21" path="socket:[2367]" dev="sockfs" ino=2367 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 109.854234][ T31] audit: type=1400 audit(109.770:150): avc: denied { nlmsg_write } for pid=3846 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 112.409817][ T31] audit: type=1400 audit(112.330:151): avc: denied { mount } for pid=3882 comm="syz.1.27" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 112.508408][ T31] audit: type=1400 audit(112.430:152): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 113.071729][ T31] audit: type=1400 audit(112.970:153): avc: denied { connect } for pid=3886 comm="syz.1.29" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 113.807639][ T3892] netlink: 'syz.1.31': attribute type 10 has an invalid length. [ 116.717243][ T3909] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'. [ 117.897174][ T3901] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 118.156961][ T3901] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 118.157534][ T3901] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 118.165284][ T3901] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 118.165735][ T3901] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 118.165920][ T3901] usb 2-1: Manufacturer: syz [ 118.178187][ T3901] usb 2-1: config 0 descriptor?? [ 118.396578][ T3901] rc_core: IR keymap rc-hauppauge not found [ 118.397085][ T3901] Registered IR keymap rc-empty [ 118.420293][ T3901] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 118.433290][ T3901] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input3 [ 118.550247][ T3901] usb 2-1: USB disconnect, device number 2 [ 118.794611][ T31] audit: type=1400 audit(118.710:154): avc: denied { map } for pid=3936 comm="syz.1.40" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 118.800214][ T31] audit: type=1400 audit(118.720:155): avc: denied { read write } for pid=3936 comm="syz.1.40" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 119.369656][ T31] audit: type=1400 audit(119.290:156): avc: denied { mount } for pid=3940 comm="syz.1.42" name="/" dev="ramfs" ino=2462 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 122.508966][ T31] audit: type=1400 audit(122.430:157): avc: denied { read } for pid=3945 comm="syz.1.44" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 122.512852][ T31] audit: type=1400 audit(122.430:158): avc: denied { open } for pid=3945 comm="syz.1.44" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 122.526119][ T31] audit: type=1400 audit(122.440:159): avc: denied { ioctl } for pid=3945 comm="syz.1.44" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 126.527226][ T31] audit: type=1400 audit(126.450:160): avc: denied { write } for pid=3947 comm="syz.1.45" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.458621][ T31] audit: type=1400 audit(128.380:161): avc: denied { ioctl } for pid=3952 comm="syz.1.46" path="socket:[2476]" dev="sockfs" ino=2476 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 128.573450][ T31] audit: type=1400 audit(128.490:162): avc: denied { create } for pid=3954 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.583014][ T31] audit: type=1400 audit(128.500:163): avc: denied { ioctl } for pid=3954 comm="syz.1.47" path="socket:[2483]" dev="sockfs" ino=2483 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.881072][ T31] audit: type=1400 audit(128.800:164): avc: denied { create } for pid=3958 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 129.025962][ T31] audit: type=1400 audit(128.940:165): avc: denied { create } for pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.049649][ T31] audit: type=1400 audit(128.970:166): avc: denied { map_read map_write } for pid=3961 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 129.087432][ T3959] Zero length message leads to an empty skb [ 133.226792][ T3992] input: syz1 as /devices/virtual/input/input4 [ 133.639453][ T31] audit: type=1400 audit(133.550:167): avc: denied { mount } for pid=3999 comm="syz.1.58" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 133.782783][ T31] audit: type=1400 audit(133.700:168): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 143.137724][ T31] audit: type=1400 audit(143.060:169): avc: denied { setopt } for pid=4008 comm="syz.0.61" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.244042][ T4011] netlink: 16 bytes leftover after parsing attributes in process `syz.0.62'. [ 146.644847][ T31] audit: type=1400 audit(146.560:170): avc: denied { create } for pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.647794][ T31] audit: type=1400 audit(146.570:171): avc: denied { bind } for pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.650718][ T31] audit: type=1400 audit(146.570:172): avc: denied { setopt } for pid=4021 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.652351][ T4022] netlink: 4 bytes leftover after parsing attributes in process `syz.1.67'. [ 147.035705][ T8] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 147.190285][ T8] usb 2-1: Using ep0 maxpacket: 32 [ 147.223409][ T8] usb 2-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 147.229824][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 147.237750][ T8] usb 2-1: config 0 descriptor?? [ 148.396883][ T31] audit: type=1400 audit(148.320:173): avc: denied { create } for pid=4019 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 154.948103][ T31] audit: type=1400 audit(154.870:174): avc: denied { accept } for pid=4041 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 157.048464][ T31] audit: type=1400 audit(156.970:175): avc: denied { create } for pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 157.060130][ T31] audit: type=1400 audit(156.980:176): avc: denied { setopt } for pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 157.523289][ T2884] usb 2-1: USB disconnect, device number 3 [ 157.591508][ T31] audit: type=1400 audit(157.500:177): avc: denied { bind } for pid=4051 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 159.641613][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 159.642790][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 159.748142][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 159.748878][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 160.044685][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 160.046867][ T4078] netlink: 12 bytes leftover after parsing attributes in process `syz.0.77'. [ 163.161193][ T4105] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.83' sets config #0 [ 163.197324][ T31] audit: type=1400 audit(163.120:178): avc: denied { write } for pid=4096 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 163.453282][ T31] audit: type=1400 audit(163.370:179): avc: denied { setopt } for pid=4107 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 163.497203][ T31] audit: type=1400 audit(163.420:180): avc: denied { connect } for pid=4107 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 171.771935][ T31] audit: type=1400 audit(171.690:181): avc: denied { getopt } for pid=4129 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 177.793951][ T31] audit: type=1326 audit(177.710:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 177.798125][ T31] audit: type=1326 audit(177.710:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=170 compat=0 ip=0x133450 code=0x7ffc0000 [ 177.798859][ T31] audit: type=1326 audit(177.720:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 177.799962][ T31] audit: type=1326 audit(177.720:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.530860][ T31] audit: type=1400 audit(178.450:186): avc: denied { wake_alarm } for pid=4138 comm="syz.0.94" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 180.644605][ T31] audit: type=1400 audit(180.560:187): avc: denied { name_connect } for pid=4152 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 187.476207][ T31] audit: type=1400 audit(187.390:188): avc: denied { ioctl } for pid=4167 comm="syz.1.105" path="socket:[3347]" dev="sockfs" ino=3347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 187.521624][ T31] audit: type=1400 audit(187.440:189): avc: denied { connect } for pid=4167 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 187.537420][ T31] audit: type=1400 audit(187.460:190): avc: denied { write } for pid=4167 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 187.570537][ C0] ------------[ cut here ]------------ [ 187.575883][ C0] WARNING: CPU: 0 PID: 26 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 187.577224][ C0] refcount_t: underflow; use-after-free. [ 187.577489][ C0] Modules linked in: [ 187.578695][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 187.579951][ C0] CPU: 0 UID: 0 PID: 26 Comm: kworker/u9:0 Not tainted 6.12.0-syzkaller #0 [ 187.580983][ C0] Hardware name: ARM-Versatile Express [ 187.582539][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 187.583349][ C0] Call trace: frame pointer underflow [ 187.585351][ C0] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 187.586317][ C0] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 187.589238][ C0] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 187.589966][ C0] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 187.590405][ C0] r5:00000000 r4:82874d18 [ 187.590656][ C0] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 187.591128][ C0] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 187.591513][ C0] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 187.591875][ C0] r7:8084bbd8 [ 187.592063][ C0] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 187.592434][ C0] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 187.592911][ C0] r8:00000009 r7:8209017c r6:df801c74 r5:82e44800 r4:00000000 [ 187.593237][ C0] [<80242940>] (warn_slowpath_fmt) from [<8084bbd8>] (refcount_warn_saturate+0x13c/0x174) [ 187.593810][ C0] r10:dddd0e88 r9:00000040 r8:840c2010 r7:00000000 r6:81841f64 r5:00000002 [ 187.594269][ C0] r4:84512480 [ 187.594494][ C0] [<8084ba9c>] (refcount_warn_saturate) from [<814aa974>] (sk_skb_reason_drop+0x1d8/0x248) [ 187.595266][ C0] [<814aa79c>] (sk_skb_reason_drop) from [<81841f64>] (j1939_session_destroy+0x78/0x200) [ 187.595952][ C0] r9:00000040 r8:840c2010 r7:8408681c r6:84f1f250 r5:84f1f200 r4:84512480 [ 187.596353][ C0] [<81841eec>] (j1939_session_destroy) from [<818430c4>] (j1939_xtp_rx_eoma+0x120/0x234) [ 187.597331][ C0] r6:84512cc0 r5:84f1f200 r4:84f1f214 [ 187.597702][ C0] [<81842fa4>] (j1939_xtp_rx_eoma) from [<818454ec>] (j1939_tp_recv+0x4a8/0x530) [ 187.598224][ C0] r7:84086000 r6:84086008 r5:84086000 r4:84512cc0 [ 187.598703][ C0] [<81845044>] (j1939_tp_recv) from [<8183eed0>] (j1939_can_recv+0x1e4/0x2dc) [ 187.599278][ C0] r7:84086000 r6:84086008 r5:84086810 r4:84512cc0 [ 187.599637][ C0] [<8183ecec>] (j1939_can_recv) from [<81834b94>] (can_rcv_filter+0x9c/0x218) [ 187.600146][ C0] r9:00000040 r8:842f86c0 r7:98ec0000 r6:84512900 r5:00000001 r4:847a6360 [ 187.600658][ C0] [<81834af8>] (can_rcv_filter) from [<81835610>] (can_receive+0xb4/0xf0) [ 187.601282][ C0] r9:00000040 r8:00000000 r7:842f8000 r6:8450a980 r5:840b0000 r4:84512900 [ 187.601777][ C0] [<8183555c>] (can_receive) from [<818356d0>] (can_rcv+0x84/0xac) [ 187.602361][ C0] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8183564c r4:84512900 [ 187.602931][ C0] [<8183564c>] (can_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80) [ 187.603527][ C0] r5:8183564c r4:842f8000 [ 187.603817][ C0] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c) [ 187.604368][ C0] r5:dddd0f70 r4:84512900 [ 187.604815][ C0] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c) [ 187.605626][ C0] r5:dddd0f70 r4:84512900 [ 187.607073][ C0] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240) [ 187.608596][ C0] r10:dddd0e80 r9:dddd10c0 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd0f70 [ 187.609319][ C0] r4:00000001 [ 187.611782][ C0] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440) [ 187.615857][ C0] r9:dddd10c0 r8:df801ed0 r7:0000012c r6:ffffd410 r5:dddd0f70 r4:00000000 [ 187.616423][ C0] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464) [ 187.616988][ C0] r10:00000008 r9:82e44800 r8:00000102 r7:04208060 r6:00000003 r5:00000004 [ 187.617457][ C0] r4:8260408c [ 187.617807][ C0] [<8024b910>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 187.618410][ C0] r10:84e3ad00 r9:84d51600 r8:84e3adfc r7:00000030 r6:81b8fcf8 r5:00000002 [ 187.618903][ C0] r4:60000013 [ 187.619105][ C0] [<802012bc>] (__do_softirq) from [<80208824>] (____do_softirq+0x10/0x14) [ 187.619921][ C0] [<80208814>] (____do_softirq) from [<8198744c>] (call_with_stack+0x1c/0x20) [ 187.620727][ C0] [<81987430>] (call_with_stack) from [<80208860>] (do_softirq_own_stack+0x38/0x3c) [ 187.621316][ C0] [<80208828>] (do_softirq_own_stack) from [<8024c064>] (do_softirq+0x5c/0x64) [ 187.621859][ C0] [<8024c008>] (do_softirq) from [<8024c138>] (__local_bh_enable_ip+0xcc/0xd0) [ 187.622379][ C0] r5:00000002 r4:82e44800 [ 187.622686][ C0] [<8024c06c>] (__local_bh_enable_ip) from [<819e355c>] (_raw_spin_unlock_bh+0x34/0x38) [ 187.623390][ C0] r5:84d516b0 r4:84512d80 [ 187.623663][ C0] [<819e3528>] (_raw_spin_unlock_bh) from [<80da91bc>] (nsim_dev_trap_report_work+0x2e4/0x410) [ 187.624302][ C0] [<80da8ed8>] (nsim_dev_trap_report_work) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 187.624687][ C0] r10:82c1bc05 r9:82e44800 r8:02400000 r7:82c0f600 r6:82c1bc00 r5:84d51600 [ 187.625578][ C0] r4:82cb6580 [ 187.625863][ C0] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 187.626282][ C0] r10:82e44800 r9:82cb65ac r8:61c88647 r7:82c0f620 r6:82604d40 r5:82c0f600 [ 187.626766][ C0] r4:82cb6580 [ 187.627017][ C0] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 187.627522][ C0] r10:00000000 r9:df819e08 r8:82cd0140 r7:82cb6580 r6:80267888 r5:82e44800 [ 187.627910][ C0] r4:82cd0040 [ 187.628120][ C0] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 187.628735][ C0] Exception stack(0xdf885fb0 to 0xdf885ff8) [ 187.629240][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 187.629675][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 187.630093][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 187.630510][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82cd0040 [ 187.634560][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:53:10 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=820413b8 R02=00000000 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=82e44800 R09=00000028 R10=826faf88 R11=df8019f4 R12=df8019f8 R13=df8019e8 R14=8031ce20 R15=819d7f58 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84698800 R01=00000001 R02=00016dfb R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=83ee8c00 R09=00000028 R10=826faf88 R11=df805d04 R12=df805d08 R13=df805cf8 R14=8031ce20 R15=819d7f58 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=76f9a21a s17=00000000 d08=0000000076f9a21a s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000