last executing test programs: 4m13.976058481s ago: executing program 0 (id=368): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xb8, 0x6, 0x7ffc1ffb}]}) symlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) 4m13.381052521s ago: executing program 0 (id=369): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000f) fcntl$notify(r0, 0x402, 0xc0000030) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x21) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4, 0x0, 0x5}, 0x18) getdents64(r0, &(0x7f0000001000)=""/164, 0xa4) 4m12.79709365s ago: executing program 0 (id=370): socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4m12.105820546s ago: executing program 0 (id=371): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) rename(0x0, 0x0) 4m11.603656809s ago: executing program 0 (id=372): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x5, 0x4f, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(0x0, 0xc402, 0x0) mknodat(r0, &(0x7f00000003c0)='./bus\x00', 0x80, 0xffffff81) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) 4m2.104325505s ago: executing program 0 (id=379): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[], 0x48) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=@newsa={0x138, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in=@multicast2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0xa, 0x0, 0x20, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0xfe, 0x1000000000000192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffe, 0x3fc}, 0x80, 0x3505, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x844) 3m16.896169748s ago: executing program 32 (id=379): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[], 0x48) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=@newsa={0x138, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in=@multicast2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0xa, 0x0, 0x20, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0xfe, 0x1000000000000192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffe, 0x3fc}, 0x80, 0x3505, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x844) 1m7.111880124s ago: executing program 1 (id=623): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x100000000}, 0x18) syz_emit_ethernet(0x6e, &(0x7f0000000640)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh={0x0, 0x0, 0x4, 0x0, 0x20}]}}}}}}}, 0x0) 1m6.722805179s ago: executing program 1 (id=624): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffd}, 0x18) setsockopt$inet6_tcp_TLS_RX(r0, 0x11a, 0x2, &(0x7f0000000100)=@gcm_256={{0x304}, "696335283bf79057", "5615c6250f36550293b1f5bd2e006a7a1b6ea19e0000000000000800", "0100", "ffffffffe000"}, 0x38) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000180)=@gcm_256={{0x304}, "c47f49541ce800", "9b84f987950ff3df25fa8f46983d34157e047d27ae4a66a6d15608a32cbaa5bc", "7f00", "1c371fe32000"}, 0x38) 1m6.285248479s ago: executing program 1 (id=625): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000000100)={'macvtap0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x39}}) 1m5.96537646s ago: executing program 1 (id=626): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd6) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r3}, 0x18) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r6, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 1m5.133688156s ago: executing program 1 (id=627): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x4a000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xfec9}, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0xc, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x842a}}) io_uring_enter(r2, 0xdb4, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 1m4.204412218s ago: executing program 1 (id=629): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000b40)=""/67}, {&(0x7f0000000400)=""/8}, {&(0x7f0000000680)=""/188}, {&(0x7f0000000bc0)=""/241}, {&(0x7f0000000940)=""/221}], 0x0, &(0x7f0000000a40)=""/192}, 0x8}], 0x3fffffffffffedd, 0x10002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) setsockopt$MRT6_PIM(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x101301) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 19.119307422s ago: executing program 33 (id=629): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000b40)=""/67}, {&(0x7f0000000400)=""/8}, {&(0x7f0000000680)=""/188}, {&(0x7f0000000bc0)=""/241}, {&(0x7f0000000940)=""/221}], 0x0, &(0x7f0000000a40)=""/192}, 0x8}], 0x3fffffffffffedd, 0x10002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) setsockopt$MRT6_PIM(0xffffffffffffffff, 0x29, 0xcf, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x101301) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 3.985766023s ago: executing program 2 (id=688): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r0, 0xfffffffc) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r1) 1.894046823s ago: executing program 2 (id=689): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), r1) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="bbfb2bbd7000fddbdf25670000000800c400020000000800c3"], 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x0) 997.233643ms ago: executing program 2 (id=690): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0) r1 = inotify_init1(0x80800) inotify_add_watch(r1, &(0x7f0000000400)='.\x00', 0xa4000021) close(r1) 647.444796ms ago: executing program 2 (id=691): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014002000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) open_tree(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x88101) 255.238883ms ago: executing program 2 (id=692): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000006000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a01010000000f000000000a0000060900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000dc0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_DELSETELEM={0x3c, 0xe, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x64}, 0x1, 0x0, 0x0, 0x8080}, 0x400c040) 0s ago: executing program 2 (id=693): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff3, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) kernel console output (not intermixed with test programs): [ 61.465048][ T29] audit: type=1400 audit(61.320:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 61.535536][ T29] audit: type=1400 audit(61.390:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:29888' (ED25519) to the list of known hosts. [ 80.602250][ T29] audit: type=1400 audit(80.470:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 82.335451][ T29] audit: type=1400 audit(82.210:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 82.419232][ T29] audit: type=1400 audit(82.290:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 87.972606][ T29] audit: type=1400 audit(87.840:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 87.979099][ T29] audit: type=1400 audit(87.850:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 88.000233][ T3093] cgroup: Unknown subsys name 'net' [ 88.015063][ T29] audit: type=1400 audit(87.880:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 88.187830][ T3093] cgroup: Unknown subsys name 'cpuset' [ 88.194179][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 88.196229][ T3093] cgroup: Unknown subsys name 'rlimit' [ 88.443258][ T29] audit: type=1400 audit(88.310:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.446562][ T29] audit: type=1400 audit(88.310:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 88.451270][ T29] audit: type=1400 audit(88.320:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 88.712058][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 88.719434][ T29] audit: type=1400 audit(88.590:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 88.723208][ T29] audit: type=1400 audit(88.590:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 88.782065][ T29] audit: type=1400 audit(88.650:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 88.786436][ T29] audit: type=1400 audit(88.650:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 98.036775][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 100.741937][ T29] audit: type=1400 audit(100.610:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 100.820565][ T29] audit: type=1400 audit(100.690:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.821664][ T29] audit: type=1400 audit(100.690:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.828815][ T29] audit: type=1400 audit(100.700:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 100.855969][ T29] audit: type=1400 audit(100.730:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 100.935404][ T29] audit: type=1400 audit(100.810:76): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 101.787344][ T29] audit: type=1400 audit(101.650:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 103.043897][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.051221][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.059812][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.063155][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.178840][ T3098] hsr_slave_0: entered promiscuous mode [ 104.183715][ T3098] hsr_slave_1: entered promiscuous mode [ 104.270237][ T3099] hsr_slave_0: entered promiscuous mode [ 104.272328][ T3099] hsr_slave_1: entered promiscuous mode [ 104.276947][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 104.278268][ T3099] Cannot create hsr debugfs directory [ 104.867457][ T29] audit: type=1400 audit(104.740:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.869732][ T29] audit: type=1400 audit(104.740:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.877806][ T29] audit: type=1400 audit(104.750:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.900042][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 104.932027][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 104.942718][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 104.969280][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 105.036088][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.056788][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 105.076447][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 105.086896][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 105.998012][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.043749][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.051659][ T3099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 109.604146][ T3098] veth0_vlan: entered promiscuous mode [ 109.641750][ T3098] veth1_vlan: entered promiscuous mode [ 109.763629][ T3098] veth0_macvtap: entered promiscuous mode [ 109.801643][ T3098] veth1_macvtap: entered promiscuous mode [ 109.917537][ T1975] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.918969][ T1975] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.919483][ T1975] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.919599][ T1975] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.049875][ T3099] veth0_vlan: entered promiscuous mode [ 110.118635][ T3099] veth1_vlan: entered promiscuous mode [ 110.161633][ T29] audit: type=1400 audit(110.030:81): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 110.170237][ T29] audit: type=1400 audit(110.040:82): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.WKXQPS/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 110.182312][ T29] audit: type=1400 audit(110.050:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.191579][ T29] audit: type=1400 audit(110.060:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.WKXQPS/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 110.198025][ T29] audit: type=1400 audit(110.070:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.WKXQPS/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 110.237887][ T29] audit: type=1400 audit(110.110:86): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 110.255757][ T3099] veth0_macvtap: entered promiscuous mode [ 110.260256][ T29] audit: type=1400 audit(110.120:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 110.271811][ T29] audit: type=1400 audit(110.140:88): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=3186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 110.289599][ T29] audit: type=1400 audit(110.160:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 110.297529][ T29] audit: type=1400 audit(110.170:90): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 110.317689][ T3099] veth1_macvtap: entered promiscuous mode [ 110.400987][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 110.420541][ T1258] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.423383][ T1258] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.425844][ T1258] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.426024][ T1258] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.666189][ T3721] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6'. [ 112.743922][ T3722] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7'. [ 115.946307][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 115.948363][ T3735] process 'syz.1.13' launched '/dev/fd/3' with NULL argv: empty string added [ 115.948844][ T29] audit: type=1400 audit(115.810:109): avc: denied { execute } for pid=3734 comm="syz.1.13" dev="tmpfs" ino=1025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 115.955823][ T29] audit: type=1400 audit(115.820:110): avc: denied { execute_no_trans } for pid=3734 comm="syz.1.13" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 117.485442][ T29] audit: type=1400 audit(117.350:111): avc: denied { name_bind } for pid=3744 comm="syz.1.18" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 117.541520][ T29] audit: type=1400 audit(117.410:112): avc: denied { allowed } for pid=3744 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 117.576624][ T29] audit: type=1326 audit(117.440:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.582263][ T29] audit: type=1326 audit(117.450:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.603502][ T29] audit: type=1326 audit(117.460:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.667480][ T29] audit: type=1326 audit(117.530:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 118.172016][ T29] audit: type=1400 audit(118.040:117): avc: denied { create } for pid=3751 comm="syz.1.19" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 118.175705][ T29] audit: type=1400 audit(118.050:118): avc: denied { map } for pid=3751 comm="syz.1.19" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3287 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 119.279305][ T3763] capability: warning: `syz.0.23' uses deprecated v2 capabilities in a way that may be insecure [ 121.157223][ T3779] SELinux: syz.1.30 (3779) set checkreqprot to 1. This is no longer supported. [ 121.165550][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 121.166003][ T29] audit: type=1400 audit(121.020:122): avc: denied { setcheckreqprot } for pid=3778 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 121.277886][ T29] audit: type=1326 audit(121.150:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.317732][ T29] audit: type=1326 audit(121.190:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.323745][ T29] audit: type=1326 audit(121.190:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.342793][ T29] audit: type=1326 audit(121.210:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.343366][ T29] audit: type=1326 audit(121.210:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=443 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.343592][ T29] audit: type=1326 audit(121.210:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.356779][ T29] audit: type=1326 audit(121.220:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.357119][ T29] audit: type=1326 audit(121.230:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.395694][ T29] audit: type=1326 audit(121.260:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 121.611948][ T3787] tmpfs: Unsupported parameter 'mpol' [ 124.284535][ C0] hrtimer: interrupt took 7690864 ns [ 126.096272][ T3817] netlink: 28 bytes leftover after parsing attributes in process `syz.0.42'. [ 126.097371][ T3817] netlink: 32 bytes leftover after parsing attributes in process `syz.0.42'. [ 126.821627][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 126.827637][ T29] audit: type=1400 audit(126.690:146): avc: denied { create } for pid=3819 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 126.871843][ T29] audit: type=1400 audit(126.720:147): avc: denied { setopt } for pid=3819 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 126.892443][ T29] audit: type=1400 audit(126.740:148): avc: denied { write } for pid=3819 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.800677][ T29] audit: type=1326 audit(127.670:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3829 comm="syz.0.45" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 130.151731][ T29] audit: type=1400 audit(130.020:150): avc: denied { create } for pid=3836 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 130.555824][ T29] audit: type=1400 audit(130.420:151): avc: denied { write } for pid=3836 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 130.861792][ T29] audit: type=1400 audit(130.730:152): avc: denied { name_bind } for pid=3839 comm="syz.0.47" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 132.386280][ T29] audit: type=1400 audit(132.250:153): avc: denied { bind } for pid=3846 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.847497][ T29] audit: type=1400 audit(132.720:154): avc: denied { create } for pid=3851 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 132.866151][ T29] audit: type=1400 audit(132.730:155): avc: denied { setopt } for pid=3851 comm="syz.1.52" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.167544][ T29] audit: type=1400 audit(133.040:156): avc: denied { ioctl } for pid=3853 comm="syz.1.53" path="socket:[3391]" dev="sockfs" ino=3391 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 133.782337][ T29] audit: type=1326 audit(133.650:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.783070][ T29] audit: type=1326 audit(133.650:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.796595][ T29] audit: type=1326 audit(133.670:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.822018][ T29] audit: type=1326 audit(133.670:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.822822][ T29] audit: type=1326 audit(133.680:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.822915][ T29] audit: type=1326 audit(133.680:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3853 comm="syz.1.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.937121][ T3854] netlink: 'syz.1.53': attribute type 4 has an invalid length. [ 134.040810][ T3854] netlink: 'syz.1.53': attribute type 4 has an invalid length. [ 137.875727][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878374][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878529][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878632][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878736][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878842][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.878982][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.879090][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.879191][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.879300][ T3886] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 137.898712][ T3886] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v100.02 Device [syz0] on syz1 [ 141.603067][ T3912] bond0: (slave bond_slave_0): Releasing backup interface [ 141.638550][ T3912] bond0: (slave bond_slave_1): Releasing backup interface [ 141.676692][ T3912] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 143.075656][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 143.077057][ T29] audit: type=1326 audit(142.940:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.079429][ T29] audit: type=1326 audit(142.940:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.083795][ T29] audit: type=1326 audit(142.950:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.097276][ T29] audit: type=1326 audit(142.970:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.100735][ T29] audit: type=1326 audit(142.970:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 143.103001][ T29] audit: type=1326 audit(142.970:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.212440][ T29] audit: type=1326 audit(143.060:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 144.635536][ T29] audit: type=1326 audit(144.500:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.619320][ T29] audit: type=1400 audit(145.490:238): avc: denied { bind } for pid=3929 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.670614][ T29] audit: type=1400 audit(145.520:239): avc: denied { node_bind } for pid=3929 comm="syz.0.74" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 148.201985][ T3945] netlink: 16 bytes leftover after parsing attributes in process `syz.0.77'. [ 148.263538][ T3945] netlink: 16 bytes leftover after parsing attributes in process `syz.0.77'. [ 148.333568][ T3945] Zero length message leads to an empty skb [ 149.089820][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 149.115402][ T29] audit: type=1400 audit(148.960:241): avc: denied { ioctl } for pid=3948 comm="syz.0.78" path="socket:[3508]" dev="sockfs" ino=3508 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 149.611016][ T29] audit: type=1400 audit(149.480:242): avc: denied { bind } for pid=3948 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 156.095673][ T29] audit: type=1400 audit(155.960:243): avc: denied { create } for pid=3954 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 156.137769][ T3957] netlink: 'syz.0.79': attribute type 16 has an invalid length. [ 156.138371][ T3957] netlink: 8 bytes leftover after parsing attributes in process `syz.0.79'. [ 175.368785][ T29] audit: type=1326 audit(175.240:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 175.381207][ T29] audit: type=1326 audit(175.250:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x132320 code=0x7ffc0000 [ 175.381696][ T29] audit: type=1326 audit(175.250:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 175.721084][ T3981] netlink: 12 bytes leftover after parsing attributes in process `syz.0.89'. [ 175.722696][ T3981] netlink: 16 bytes leftover after parsing attributes in process `syz.0.89'. [ 177.760030][ T29] audit: type=1400 audit(177.630:247): avc: denied { module_load } for pid=3992 comm="syz.0.95" path="/sys/kernel/notes" dev="sysfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 177.925039][ T29] audit: type=1326 audit(177.770:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 177.927663][ T29] audit: type=1326 audit(177.780:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 177.929953][ T29] audit: type=1326 audit(177.780:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 177.933029][ T29] audit: type=1326 audit(177.780:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 177.952676][ T29] audit: type=1326 audit(177.820:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 177.970081][ T29] audit: type=1326 audit(177.840:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 180.576210][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 180.577666][ T29] audit: type=1400 audit(180.450:259): avc: denied { ioctl } for pid=4014 comm="syz.0.104" path="socket:[2585]" dev="sockfs" ino=2585 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 180.580354][ T4015] syzkaller1: entered promiscuous mode [ 180.581063][ T4015] syzkaller1: entered allmulticast mode [ 184.636347][ T29] audit: type=1400 audit(184.490:260): avc: denied { create } for pid=4000 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 184.912724][ T29] audit: type=1326 audit(184.780:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 184.929752][ T29] audit: type=1326 audit(184.800:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.078831][ T29] audit: type=1326 audit(184.950:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.079380][ T29] audit: type=1326 audit(184.950:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.084358][ T29] audit: type=1326 audit(184.950:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.090727][ T29] audit: type=1326 audit(184.960:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.090884][ T29] audit: type=1326 audit(184.960:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 185.127344][ T29] audit: type=1326 audit(184.980:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4032 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132320 code=0x7ffc0000 [ 189.941555][ T4056] syz.0.120 uses obsolete (PF_INET,SOCK_PACKET) [ 190.731143][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 190.747167][ T29] audit: type=1400 audit(190.600:274): avc: denied { watch watch_reads } for pid=4063 comm="syz.0.122" path="/proc/166" dev="proc" ino=3682 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 191.006517][ T29] audit: type=1400 audit(190.880:275): avc: denied { setcurrent } for pid=4065 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 191.352901][ T29] audit: type=1400 audit(191.220:276): avc: denied { block_suspend } for pid=4067 comm="syz.0.124" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 192.693409][ T4076] netlink: 12 bytes leftover after parsing attributes in process `syz.0.126'. [ 194.314806][ T29] audit: type=1401 audit(194.180:277): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 194.337802][ T29] audit: type=1326 audit(194.200:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 194.338310][ T29] audit: type=1326 audit(194.200:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 194.342182][ T29] audit: type=1326 audit(194.210:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 194.343570][ T29] audit: type=1326 audit(194.210:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 194.343660][ T29] audit: type=1326 audit(194.210:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 194.350264][ T29] audit: type=1326 audit(194.220:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4081 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.287669][ T4089] pim6reg: entered allmulticast mode [ 196.293498][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 196.300133][ T29] audit: type=1400 audit(196.160:298): avc: denied { write } for pid=4088 comm="syz.0.130" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 196.346176][ T4089] pim6reg: left allmulticast mode [ 197.362849][ T4098] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 198.240549][ T29] audit: type=1400 audit(198.110:299): avc: denied { write } for pid=4101 comm=FD name="fib_triestat" dev="proc" ino=4026532750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 199.670148][ T4108] netlink: 4 bytes leftover after parsing attributes in process `syz.0.137'. [ 199.694086][ T4108] netlink: 4 bytes leftover after parsing attributes in process `syz.0.137'. [ 201.268882][ T4122] netlink: 12 bytes leftover after parsing attributes in process `syz.0.140'. [ 202.609589][ T29] audit: type=1400 audit(202.480:300): avc: denied { mounton } for pid=4126 comm="syz.0.142" path="/proc/207/task" dev="proc" ino=3771 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 202.677643][ T29] audit: type=1400 audit(202.550:301): avc: denied { associate } for pid=4128 comm="syz.0.142" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 203.085534][ T29] audit: type=1326 audit(202.950:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4129 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.106683][ T29] audit: type=1326 audit(202.970:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4129 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.127208][ T29] audit: type=1326 audit(203.000:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4129 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=49 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.133006][ T29] audit: type=1326 audit(203.000:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4129 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 205.410749][ T29] audit: type=1326 audit(205.240:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4148 comm="syz.1.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 205.452845][ T29] audit: type=1326 audit(205.320:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4148 comm="syz.1.150" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132320 code=0x7ffc0000 [ 205.457745][ T29] audit: type=1326 audit(205.320:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4148 comm="syz.1.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 205.468010][ T29] audit: type=1326 audit(205.340:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4148 comm="syz.1.150" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 206.186446][ T4158] netlink: 8 bytes leftover after parsing attributes in process `syz.0.154'. [ 206.189978][ T4158] netlink: 8 bytes leftover after parsing attributes in process `syz.0.154'. [ 209.380107][ T4177] netlink: 8 bytes leftover after parsing attributes in process `syz.1.160'. [ 209.381485][ T4177] netlink: 312 bytes leftover after parsing attributes in process `syz.1.160'. [ 217.809835][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 217.815333][ T29] audit: type=1400 audit(217.680:325): avc: denied { create } for pid=4228 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 217.841193][ T29] audit: type=1400 audit(217.710:326): avc: denied { setopt } for pid=4228 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 225.645435][ T29] audit: type=1400 audit(225.510:327): avc: denied { write } for pid=4242 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 252.428505][ T4291] netlink: 4 bytes leftover after parsing attributes in process `syz.1.180'. [ 264.449613][ T4312] netlink: 28 bytes leftover after parsing attributes in process `syz.0.185'. [ 264.450187][ T4312] netlink: 28 bytes leftover after parsing attributes in process `syz.0.185'. [ 264.476615][ T4312] netlink: 28 bytes leftover after parsing attributes in process `syz.0.185'. [ 264.477351][ T4312] netlink: 28 bytes leftover after parsing attributes in process `syz.0.185'. [ 266.211987][ T4316] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 277.156578][ T29] audit: type=1326 audit(277.030:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.160770][ T29] audit: type=1326 audit(277.030:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.185734][ T29] audit: type=1326 audit(277.050:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.188180][ T29] audit: type=1326 audit(277.060:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.255804][ T29] audit: type=1326 audit(277.120:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.275913][ T29] audit: type=1326 audit(277.130:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.278108][ T29] audit: type=1326 audit(277.150:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x132320 code=0x7ffc0000 [ 277.293659][ T29] audit: type=1326 audit(277.160:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 278.115629][ T29] audit: type=1400 audit(277.970:336): avc: denied { create } for pid=4348 comm="syz.0.194" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 278.165166][ T29] audit: type=1400 audit(277.990:337): avc: denied { write } for pid=4348 comm="syz.0.194" name="file0" dev="tmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 279.339409][ T4373] SELinux: ebitmap: truncated map [ 279.432420][ T4373] SELinux: failed to load policy [ 280.556262][ T4379] netlink: 'syz.1.205': attribute type 10 has an invalid length. [ 281.686594][ T4385] IPv4: Oversized IP packet from 127.202.26.0 [ 282.954048][ T4395] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.210' sets config #0 [ 283.190328][ T4397] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 289.894620][ T4416] netlink: 24 bytes leftover after parsing attributes in process `syz.1.217'. [ 290.163750][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 290.175008][ T29] audit: type=1400 audit(290.030:341): avc: denied { connect } for pid=4418 comm="syz.1.218" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 290.185820][ T29] audit: type=1400 audit(290.050:342): avc: denied { ioctl } for pid=4418 comm="syz.1.218" path="socket:[4266]" dev="sockfs" ino=4266 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 290.825667][ T4425] Driver unsupported XDP return value 0 on prog (id 143) dev N/A, expect packet loss! [ 291.553100][ T29] audit: type=1326 audit(291.420:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4430 comm="syz.1.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 291.568378][ T29] audit: type=1326 audit(291.440:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4430 comm="syz.1.222" exe="/syz-executor" sig=0 arch=40000028 syscall=11 compat=0 ip=0x132320 code=0x7ffc0000 [ 291.578237][ T29] audit: type=1326 audit(291.450:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4430 comm="syz.1.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 291.591481][ T29] audit: type=1326 audit(291.460:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4430 comm="syz.1.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.356903][ T29] audit: type=1400 audit(295.230:347): avc: denied { setopt } for pid=4439 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 297.698758][ T4443] netdevsim netdevsim1: Direct firmware load for ./file1 failed with error -2 [ 297.700596][ T29] audit: type=1400 audit(297.570:348): avc: denied { firmware_load } for pid=4442 comm="syz.1.225" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 297.715936][ T4443] netdevsim netdevsim1: Falling back to sysfs fallback for: ./file1 [ 301.882363][ T29] audit: type=1400 audit(301.750:349): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file0" dev="tmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 303.127020][ T29] audit: type=1326 audit(303.000:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.130655][ T29] audit: type=1326 audit(303.000:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.142203][ T29] audit: type=1326 audit(303.000:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.158587][ T29] audit: type=1326 audit(303.030:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.178185][ T29] audit: type=1326 audit(303.030:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.184865][ T29] audit: type=1326 audit(303.030:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.188210][ T29] audit: type=1326 audit(303.040:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.193423][ T29] audit: type=1326 audit(303.050:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.206182][ T29] audit: type=1326 audit(303.070:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.233" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 305.659649][ T4493] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 308.468742][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 308.486238][ T29] audit: type=1326 audit(308.340:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4521 comm="syz.1.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 308.546047][ T29] audit: type=1326 audit(308.420:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4521 comm="syz.1.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 308.548002][ T29] audit: type=1326 audit(308.420:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4521 comm="syz.1.248" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132320 code=0x7ffc0000 [ 308.549787][ T29] audit: type=1326 audit(308.420:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4521 comm="syz.1.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 308.552484][ T29] audit: type=1326 audit(308.420:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4521 comm="syz.1.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 308.911703][ T29] audit: type=1326 audit(308.780:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 309.010504][ T29] audit: type=1326 audit(308.880:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 309.013273][ T29] audit: type=1326 audit(308.880:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 309.085791][ T29] audit: type=1326 audit(308.950:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.251" exe="/syz-executor" sig=0 arch=40000028 syscall=106 compat=0 ip=0x132320 code=0x7ffc0000 [ 309.268356][ T29] audit: type=1326 audit(309.030:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 310.920217][ T4548] netlink: 96 bytes leftover after parsing attributes in process `syz.1.256'. [ 332.743702][ T4556] alloc_vmap_area: 7 callbacks suppressed [ 332.765553][ T4556] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 332.767561][ T4556] syz.1.260: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 332.782796][ T4556] CPU: 0 UID: 0 PID: 4556 Comm: syz.1.260 Not tainted syzkaller #0 PREEMPT [ 332.783157][ T4556] Hardware name: ARM-Versatile Express [ 332.783461][ T4556] Call trace: [ 332.783776][ T4556] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 332.785042][ T4556] r7:ffffffff r6:822b1784 r5:600e0013 r4:8229586c [ 332.785140][ T4556] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 332.785211][ T4556] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 332.785314][ T4556] r5:83210c00 r4:00000000 [ 332.785335][ T4556] [<8021ee40>] (dump_stack) from [<80509f24>] (warn_alloc+0xd8/0x180) [ 332.785395][ T4556] [<80509e4c>] (warn_alloc) from [<804f8428>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 332.785457][ T4556] r3:1ffffff8 r2:822b1784 [ 332.785485][ T4556] r6:00000dc0 r5:822b17bc r4:ff800000 [ 332.785504][ T4556] [<804f8368>] (__vmalloc_node_range_noprof) from [<8051b6a8>] (__kvmalloc_node_noprof+0x294/0x700) [ 332.785613][ T4556] r10:ea511d00 r9:85d6b800 r8:83210c00 r7:00000000 r6:000002d0 r5:00000400 [ 332.785730][ T4556] r4:1ffffff8 [ 332.785756][ T4556] [<8051b414>] (__kvmalloc_node_noprof) from [<8176cf8c>] (xt_alloc_entry_offsets+0x28/0x34) [ 332.785868][ T4556] r10:ea511d00 r9:85d6b800 r8:00000000 r7:00000000 r6:000002d0 r5:85d6b840 [ 332.785892][ T4556] r4:07fffffe [ 332.785911][ T4556] [<8176cf64>] (xt_alloc_entry_offsets) from [<818fb9b4>] (translate_table+0x70/0x78c) [ 332.785977][ T4556] [<818fb944>] (translate_table) from [<818fcb90>] (do_replace+0xe8/0x5d0) [ 332.786141][ T4556] r10:b5403587 r9:85d6b840 r8:00000000 r7:20000060 r6:000002d0 r5:85d6b800 [ 332.786165][ T4556] r4:84f98000 [ 332.786185][ T4556] [<818fcaa8>] (do_replace) from [<818fd1ac>] (do_ip6t_set_ctl+0x134/0x2a0) [ 332.786255][ T4556] r10:00000126 r9:8159a58c r8:00000330 r7:860a8524 r6:ea511da8 r5:8526eb40 [ 332.786278][ T4556] r4:00000040 [ 332.786297][ T4556] [<818fd078>] (do_ip6t_set_ctl) from [<816f54f0>] (nf_setsockopt+0x60/0x7c) [ 332.786375][ T4556] r10:00000126 r9:8159a58c r8:00000330 r7:860a8524 r6:8526eb40 r5:818fd078 [ 332.786399][ T4556] r4:829f4eb8 [ 332.786418][ T4556] [<816f5494>] (nf_setsockopt) from [<818b305c>] (ipv6_setsockopt+0x9c/0xbc) [ 332.786485][ T4556] r6:00000330 r5:8526eb40 r4:00000040 [ 332.786504][ T4556] [<818b2fc4>] (ipv6_setsockopt) from [<817a41e0>] (tcp_setsockopt+0x3c/0x58) [ 332.786589][ T4556] r6:00000029 r5:860a8000 r4:818b2fc0 [ 332.786611][ T4556] [<817a41a8>] (tcp_setsockopt) from [<8159a5c4>] (sock_common_setsockopt+0x38/0x40) [ 332.786727][ T4556] r4:817a41a4 [ 332.786763][ T4556] [<8159a590>] (sock_common_setsockopt) from [<819a6fcc>] (smc_setsockopt+0xac/0x3cc) [ 332.786851][ T4556] r4:00000040 [ 332.786872][ T4556] [<819a6f24>] (smc_setsockopt) from [<81595dfc>] (do_sock_setsockopt+0x70/0xc8) [ 332.786994][ T4556] r9:83210c00 r8:00000330 r7:85859400 r6:00000040 r5:00000029 r4:819a6f20 [ 332.787017][ T4556] [<81595d8c>] (do_sock_setsockopt) from [<8159925c>] (__sys_setsockopt+0x7c/0xc4) [ 332.787093][ T4556] r8:00000000 r7:84df3780 r6:84df3781 r5:00000040 r4:00000029 [ 332.787115][ T4556] [<815991e0>] (__sys_setsockopt) from [<815992c0>] (sys_setsockopt+0x1c/0x24) [ 332.787366][ T4556] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000330 [ 332.787385][ T4556] [<815992a4>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 332.787551][ T4556] Exception stack(0xea511fa8 to 0xea511ff0) [ 332.787779][ T4556] 1fa0: 00000330 00000000 00000003 00000029 00000040 20000000 [ 332.787846][ T4556] 1fc0: 00000330 00000000 00316318 00000126 00300000 00000000 00006364 76fdf0bc [ 332.787878][ T4556] 1fe0: 76fdeec0 76fdeeb0 0001929c 00132320 [ 332.796968][ T4556] Mem-Info: [ 332.797742][ T4556] active_anon:2406 inactive_anon:0 isolated_anon:0 [ 332.797742][ T4556] active_file:6144 inactive_file:35357 isolated_file:0 [ 332.797742][ T4556] unevictable:768 dirty:14 writeback:0 [ 332.797742][ T4556] slab_reclaimable:1068 slab_unreclaimable:5715 [ 332.797742][ T4556] mapped:3525 shmem:1884 pagetables:346 [ 332.797742][ T4556] sec_pagetables:0 bounce:0 [ 332.797742][ T4556] kernel_misc_reclaimable:0 [ 332.797742][ T4556] free:432680 free_pcp:1370 free_cma:4032 [ 332.807579][ T4556] Node 0 active_anon:9708kB inactive_anon:0kB active_file:24576kB inactive_file:141428kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:14100kB dirty:56kB writeback:0kB shmem:7536kB kernel_stack:2536kB pagetables:1384kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 332.808498][ T4556] Normal free:1377960kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1144kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:5480kB local_pcp:2876kB free_cma:0kB [ 332.808687][ T4556] lowmem_reserve[]: 0 4224 4224 [ 332.809109][ T4556] Normal: 100*4kB (UE) 7*8kB (UME) 2*16kB (UM) 28*32kB (UME) 11*64kB (UM) 3*128kB (UM) 5*256kB (UM) 8*512kB (UM) 6*1024kB (ME) 4*2048kB (UME) 331*4096kB (M) = 1377960kB [ 332.813314][ T4556] 43385 total pagecache pages [ 332.813412][ T4556] 0 pages in swap cache [ 332.813452][ T4556] Free swap = 124996kB [ 332.813489][ T4556] Total swap = 124996kB [ 332.813611][ T4556] 524288 pages RAM [ 332.813643][ T4556] 135168 pages HighMem/MovableOnly [ 332.813678][ T4556] 32395 pages reserved [ 332.813709][ T4556] 4096 pages cma reserved [ 333.463275][ T29] audit: type=1326 audit(333.330:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.475390][ T29] audit: type=1326 audit(333.340:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.480882][ T29] audit: type=1326 audit(333.350:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.485089][ T29] audit: type=1326 audit(333.350:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.496152][ T29] audit: type=1326 audit(333.350:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.575667][ T29] audit: type=1326 audit(333.370:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.683095][ T29] audit: type=1326 audit(333.550:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.700161][ T29] audit: type=1326 audit(333.560:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.709564][ T29] audit: type=1326 audit(333.580:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4609 comm="syz.1.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.783221][ T4614] IPv6: Can't replace route, no match found [ 336.111219][ T4619] netlink: 'syz.1.273': attribute type 8 has an invalid length. [ 336.112079][ T4619] netlink: 4 bytes leftover after parsing attributes in process `syz.1.273'. [ 336.151432][ T4619] bond0: entered promiscuous mode [ 336.152130][ T4619] bond_slave_0: entered promiscuous mode [ 336.176610][ T4619] bond_slave_1: entered promiscuous mode [ 336.180771][ T4619] gretap0: entered promiscuous mode [ 336.197176][ T4619] ip6gretap0: entered promiscuous mode [ 336.199374][ T4619] hsr1: entered promiscuous mode [ 338.359488][ T4631] wireguard0: entered promiscuous mode [ 338.395692][ T4631] wireguard0: entered allmulticast mode [ 340.077489][ T4644] syz.1.281 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 350.542116][ T4652] netlink: 12 bytes leftover after parsing attributes in process `syz.1.284'. [ 353.579295][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 353.580082][ T29] audit: type=1326 audit(353.450:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4667 comm="syz.1.292" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.589350][ T29] audit: type=1326 audit(353.460:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4667 comm="syz.1.292" exe="/syz-executor" sig=0 arch=40000028 syscall=138 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.592090][ T29] audit: type=1326 audit(353.460:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4667 comm="syz.1.292" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.599286][ T29] audit: type=1326 audit(353.470:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4667 comm="syz.1.292" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.918202][ T29] audit: type=1400 audit(355.790:434): avc: denied { mount } for pid=4669 comm="syz.1.293" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 355.934681][ T29] audit: type=1400 audit(355.800:435): avc: denied { search } for pid=4669 comm="syz.1.293" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 355.942195][ T29] audit: type=1400 audit(355.810:436): avc: denied { search } for pid=4669 comm="syz.1.293" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 355.952377][ T29] audit: type=1400 audit(355.820:437): avc: denied { read open } for pid=4669 comm="syz.1.293" path="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 356.466217][ T29] audit: type=1326 audit(356.340:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4674 comm="syz.1.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 356.473481][ T29] audit: type=1326 audit(356.340:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4674 comm="syz.1.294" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.290442][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 362.291847][ T29] audit: type=1326 audit(362.160:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.306303][ T29] audit: type=1326 audit(362.180:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.310873][ T29] audit: type=1326 audit(362.180:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.318840][ T29] audit: type=1326 audit(362.190:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.326231][ T29] audit: type=1326 audit(362.200:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.339920][ T29] audit: type=1326 audit(362.210:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x132320 code=0x7ffc0000 [ 362.340432][ T29] audit: type=1326 audit(362.210:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4704 comm="syz.1.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.640258][ T29] audit: type=1400 audit(363.510:449): avc: denied { mount } for pid=4709 comm="syz.1.300" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 368.161454][ T4728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4728 comm=syz.0.305 [ 372.628239][ T29] audit: type=1400 audit(372.490:450): avc: denied { create } for pid=4754 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 372.653745][ T29] audit: type=1400 audit(372.520:451): avc: denied { connect } for pid=4754 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 373.166367][ T29] audit: type=1400 audit(373.040:452): avc: denied { read } for pid=4754 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 373.680238][ T29] audit: type=1400 audit(373.540:453): avc: denied { write } for pid=4754 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 375.881745][ T29] audit: type=1400 audit(375.750:454): avc: denied { create } for pid=4758 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 378.179469][ T29] audit: type=1326 audit(378.050:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4768 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.184931][ T29] audit: type=1326 audit(378.050:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4768 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.188342][ T29] audit: type=1326 audit(378.050:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4768 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.207966][ T29] audit: type=1326 audit(378.060:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4768 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.616984][ T29] audit: type=1326 audit(378.480:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.625563][ T29] audit: type=1326 audit(378.490:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.627689][ T29] audit: type=1326 audit(378.470:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.630394][ T29] audit: type=1326 audit(378.500:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.636712][ T29] audit: type=1326 audit(378.500:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 378.645824][ T29] audit: type=1326 audit(378.520:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4773 comm="syz.1.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 380.234105][ T4782] capability: warning: `syz.1.327' uses 32-bit capabilities (legacy support in use) [ 386.586442][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 386.590888][ T29] audit: type=1326 audit(386.460:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4795 comm="syz.1.330" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 386.603684][ T29] audit: type=1326 audit(386.470:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4795 comm="syz.1.330" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 386.613872][ T29] audit: type=1326 audit(386.480:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4795 comm="syz.1.330" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x132320 code=0x7ffc0000 [ 386.620551][ T29] audit: type=1326 audit(386.480:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4795 comm="syz.1.330" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 386.641019][ T29] audit: type=1326 audit(386.510:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4795 comm="syz.1.330" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 388.259755][ T4810] netlink: 'syz.1.336': attribute type 4 has an invalid length. [ 388.273659][ T4810] netlink: 'syz.1.336': attribute type 4 has an invalid length. [ 391.792365][ T29] audit: type=1400 audit(391.660:482): avc: denied { kexec_image_load } for pid=4826 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 391.938655][ T29] audit: type=1400 audit(391.810:483): avc: denied { getattr } for pid=4828 comm="syz.0.345" name="[io_uring]" dev="anon_inodefs" ino=4745 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 392.612030][ T29] audit: type=1400 audit(392.480:484): avc: denied { ioctl } for pid=4832 comm="syz.0.347" path="socket:[4761]" dev="sockfs" ino=4761 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 392.627186][ T29] audit: type=1400 audit(392.500:485): avc: denied { connect } for pid=4832 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 392.660396][ T29] audit: type=1400 audit(392.520:486): avc: denied { write } for pid=4832 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 394.162330][ T4825] SELinux: Context system_u:object_r:dmidecode_exec_t:s0 is not valid (left unmapped). [ 394.166214][ T29] audit: type=1400 audit(394.040:487): avc: denied { relabelto } for pid=4823 comm="gtp" name="bus" dev="tmpfs" ino=879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:dmidecode_exec_t:s0" [ 394.181547][ T29] audit: type=1400 audit(394.040:488): avc: denied { associate } for pid=4823 comm="gtp" name="bus" dev="tmpfs" ino=879 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:dmidecode_exec_t:s0" [ 394.250037][ T29] audit: type=1400 audit(394.100:489): avc: denied { unlink } for pid=3099 comm="syz-executor" name="bus" dev="tmpfs" ino=879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:dmidecode_exec_t:s0" [ 395.202376][ T4839] netlink: 12 bytes leftover after parsing attributes in process `syz.1.350'. [ 396.542371][ T4845] syzkaller0: entered promiscuous mode [ 396.557043][ T4845] syzkaller0: entered allmulticast mode [ 396.620548][ T1258] syzkaller0: tun_net_xmit 48 [ 396.682651][ T29] audit: type=1400 audit(396.550:490): avc: denied { relabelfrom } for pid=4844 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 396.701773][ T29] audit: type=1400 audit(396.560:491): avc: denied { relabelto } for pid=4844 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 396.805892][ T4845] syzkaller0: tun_net_xmit 1280 [ 396.863156][ T4845] syzkaller0: create flow: hash 4273783519 index 1 [ 397.048933][ T4844] syzkaller0: delete flow: hash 4273783519 index 1 [ 400.149939][ T29] audit: type=1400 audit(400.020:492): avc: denied { compute_member } for pid=4867 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 403.833780][ T4885] netlink: 12 bytes leftover after parsing attributes in process `syz.1.363'. [ 404.494250][ T3788] hid_parser_main: 8 callbacks suppressed [ 404.523833][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x4 [ 404.539300][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x2 [ 404.547042][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.551321][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.553464][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.565805][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.568190][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.573607][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.580895][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.586479][ T3788] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 404.616981][ T3788] hid-generic 0000:3000000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 405.005393][ T29] audit: type=1326 audit(404.870:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.011441][ T29] audit: type=1326 audit(404.880:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.033485][ T29] audit: type=1326 audit(404.900:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.043902][ T29] audit: type=1326 audit(404.910:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.050568][ T29] audit: type=1326 audit(404.920:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.061726][ T29] audit: type=1326 audit(404.930:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.065865][ T29] audit: type=1326 audit(404.940:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4895 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.342303][ T29] audit: type=1400 audit(405.210:500): avc: denied { setopt } for pid=4897 comm="syz.1.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 407.593190][ T29] audit: type=1326 audit(407.460:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.593667][ T29] audit: type=1326 audit(407.460:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.598964][ T29] audit: type=1326 audit(407.470:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=83 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.603814][ T29] audit: type=1326 audit(407.470:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.620499][ T29] audit: type=1326 audit(407.490:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.622646][ T29] audit: type=1326 audit(407.490:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=85 compat=0 ip=0x132320 code=0x7ffc0000 [ 407.641420][ T29] audit: type=1326 audit(407.510:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 409.184972][ T29] audit: type=1326 audit(409.040:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4907 comm="syz.0.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 409.189465][ T29] audit: type=1326 audit(409.060:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4907 comm="syz.0.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 412.695146][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 412.697485][ T29] audit: type=1400 audit(412.540:532): avc: denied { wake_alarm } for pid=4913 comm="syz.1.374" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 414.200634][ T29] audit: type=1326 audit(414.070:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.213567][ T29] audit: type=1326 audit(414.080:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=333 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.227620][ T29] audit: type=1326 audit(414.100:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.248578][ T29] audit: type=1326 audit(414.120:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=324 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.260929][ T29] audit: type=1326 audit(414.130:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.268668][ T29] audit: type=1326 audit(414.140:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 448.675102][ T29] audit: type=1326 audit(448.540:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 448.706125][ T29] audit: type=1326 audit(448.570:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=339 compat=0 ip=0x132320 code=0x7ffc0000 [ 448.743988][ T29] audit: type=1326 audit(448.610:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 448.755569][ T29] audit: type=1326 audit(448.610:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 449.552285][ T4956] netlink: 220 bytes leftover after parsing attributes in process `syz.1.388'. [ 449.609759][ T4956] netlink: 'syz.1.388': attribute type 10 has an invalid length. [ 449.610071][ T4956] netlink: 40 bytes leftover after parsing attributes in process `syz.1.388'. [ 449.616101][ T29] audit: type=1400 audit(449.490:543): avc: denied { create } for pid=4955 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 449.633157][ T29] audit: type=1400 audit(449.500:544): avc: denied { write } for pid=4955 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 450.546994][ T4959] SELinux: failed to load policy [ 452.197231][ T4969] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 455.637709][ T3820] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 455.870411][ T3820] usb 2-1: device descriptor read/64, error -71 [ 456.209540][ T3820] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 456.385383][ T3820] usb 2-1: device descriptor read/64, error -71 [ 456.505570][ T3820] usb usb2-port1: attempt power cycle [ 456.907892][ T3820] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 456.948525][ T3820] usb 2-1: device descriptor read/8, error -71 [ 457.242451][ T3820] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 457.277718][ T3820] usb 2-1: device descriptor read/8, error -71 [ 457.407413][ T3820] usb usb2-port1: unable to enumerate USB device [ 465.989704][ T29] audit: type=1326 audit(465.860:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5009 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 465.993752][ T29] audit: type=1326 audit(465.860:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5009 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=384 compat=0 ip=0x132320 code=0x7ffc0000 [ 466.016270][ T29] audit: type=1326 audit(465.890:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5009 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 466.430052][ T29] audit: type=1400 audit(466.300:548): avc: denied { append } for pid=5013 comm="syz.1.405" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 466.497656][ T5015] can0: slcan on ttyS3. [ 466.636260][ T5015] can0 (unregistered): slcan off ttyS3. [ 467.697050][ T29] audit: type=1400 audit(467.570:549): avc: denied { write } for pid=5059 comm="syz.1.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 468.465793][ T29] audit: type=1326 audit(468.330:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 468.466338][ T29] audit: type=1326 audit(468.340:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 468.485178][ T29] audit: type=1326 audit(468.350:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 468.488501][ T29] audit: type=1326 audit(468.360:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 468.492852][ T29] audit: type=1326 audit(468.360:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 470.716985][ T4998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 470.739313][ T4998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 471.795666][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 471.797635][ T29] audit: type=1326 audit(471.660:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.819653][ T29] audit: type=1326 audit(471.690:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.416" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 473.765830][ T4998] hsr_slave_0: entered promiscuous mode [ 473.769043][ T4998] hsr_slave_1: entered promiscuous mode [ 473.770817][ T4998] debugfs: 'hsr0' already exists in 'hsr' [ 473.771586][ T4998] Cannot create hsr debugfs directory [ 474.667866][ T4998] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 474.682266][ T4998] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 474.714192][ T4998] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 474.734370][ T4998] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 477.304080][ T4998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.793042][ T4998] veth0_vlan: entered promiscuous mode [ 485.890155][ T4998] veth1_vlan: entered promiscuous mode [ 486.121597][ T4998] veth0_macvtap: entered promiscuous mode [ 486.162215][ T4998] veth1_macvtap: entered promiscuous mode [ 486.438093][ T1229] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.439684][ T1229] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.440835][ T1229] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.442044][ T1229] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.517882][ T5361] netlink: 8 bytes leftover after parsing attributes in process `syz.2.421'. [ 489.690399][ T5361] netlink: 8 bytes leftover after parsing attributes in process `syz.2.421'. [ 516.215154][ T29] audit: type=1400 audit(516.080:577): avc: denied { create } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.248080][ T29] audit: type=1400 audit(516.120:578): avc: denied { bind } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.366836][ T29] audit: type=1400 audit(516.150:579): avc: denied { listen } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.388347][ T29] audit: type=1400 audit(516.260:580): avc: denied { connect } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.477234][ T29] audit: type=1400 audit(516.340:581): avc: denied { accept } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.570379][ T29] audit: type=1400 audit(516.440:582): avc: denied { write } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 516.683012][ T29] audit: type=1400 audit(516.550:583): avc: denied { read } for pid=5411 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 525.733810][ T29] audit: type=1326 audit(525.600:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.740981][ T29] audit: type=1326 audit(525.610:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.743782][ T29] audit: type=1326 audit(525.610:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.830025][ T29] audit: type=1326 audit(525.700:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.835826][ T29] audit: type=1326 audit(525.700:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.838491][ T29] audit: type=1326 audit(525.700:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.869540][ T29] audit: type=1326 audit(525.740:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.872554][ T29] audit: type=1326 audit(525.740:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132320 code=0x7ffc0000 [ 525.955807][ T29] audit: type=1326 audit(525.780:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 525.969334][ T29] audit: type=1326 audit(525.830:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.2.450" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 529.512373][ T5484] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 532.872280][ T5504] SELinux: failed to load policy [ 534.937451][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 534.939879][ T29] audit: type=1400 audit(534.810:612): avc: denied { audit_write } for pid=5518 comm="syz.1.472" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 534.951819][ T29] audit: type=1107 audit(534.820:613): pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 539.812811][ T29] audit: type=1400 audit(539.680:614): avc: denied { nlmsg_read } for pid=5547 comm="syz.2.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 539.915300][ T29] audit: type=1400 audit(539.780:615): avc: denied { nlmsg_write } for pid=5547 comm="syz.2.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 546.550334][ T5585] netlink: 8 bytes leftover after parsing attributes in process `syz.1.488'. [ 546.629649][ T5585] netlink: 8 bytes leftover after parsing attributes in process `syz.1.488'. [ 547.353199][ T29] audit: type=1326 audit(547.220:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.353815][ T29] audit: type=1326 audit(547.220:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.375090][ T29] audit: type=1326 audit(547.230:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.375637][ T29] audit: type=1326 audit(547.230:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.375719][ T29] audit: type=1326 audit(547.230:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.380326][ T29] audit: type=1326 audit(547.250:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.409271][ T29] audit: type=1326 audit(547.270:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5589 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 547.745769][ T5595] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5595 comm=syz.1.493 [ 547.747115][ T29] audit: type=1107 audit(547.620:623): pid=5594 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 550.039035][ T29] audit: type=1400 audit(549.910:624): avc: denied { bind } for pid=5611 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 550.483080][ T29] audit: type=1400 audit(550.350:625): avc: denied { connect } for pid=5620 comm="syz.2.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 552.607938][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 552.609476][ T29] audit: type=1326 audit(552.480:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 552.643128][ T29] audit: type=1326 audit(552.510:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 552.688973][ T29] audit: type=1326 audit(552.560:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 552.693164][ T29] audit: type=1326 audit(552.560:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 552.707080][ T29] audit: type=1326 audit(552.560:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 552.726252][ T29] audit: type=1326 audit(552.590:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5634 comm="syz.1.506" exe="/syz-executor" sig=0 arch=40000028 syscall=29 compat=0 ip=0x132320 code=0x7ffc0000 [ 553.359199][ T5638] SELinux: Context › is not valid (left unmapped). [ 554.846747][ T29] audit: type=1400 audit(554.660:642): avc: denied { view } for pid=5649 comm="syz.2.511" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 556.231033][ T29] audit: type=1400 audit(556.100:643): avc: denied { setopt } for pid=5665 comm="syz.1.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 557.447960][ T5684] netlink: 24 bytes leftover after parsing attributes in process `syz.1.521'. [ 557.953919][ T5701] netlink: 'syz.2.524': attribute type 1 has an invalid length. [ 557.965111][ T5701] netlink: 224 bytes leftover after parsing attributes in process `syz.2.524'. [ 559.088399][ T5711] netlink: 'syz.2.528': attribute type 10 has an invalid length. [ 559.110790][ T5711] netlink: 'syz.2.528': attribute type 10 has an invalid length. [ 567.765770][ T29] audit: type=1400 audit(567.640:644): avc: denied { read } for pid=5747 comm="syz.1.544" path="socket:[6766]" dev="sockfs" ino=6766 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 568.336499][ T29] audit: type=1400 audit(568.210:645): avc: denied { name_bind } for pid=5747 comm="syz.1.544" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 571.635922][ T5755] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 571.647904][ T29] audit: type=1400 audit(571.520:646): avc: denied { relabelto } for pid=5754 comm="syz.1.547" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 571.650490][ T29] audit: type=1400 audit(571.520:647): avc: denied { associate } for pid=5754 comm="syz.1.547" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 574.686289][ T5782] netlink: 28 bytes leftover after parsing attributes in process `syz.1.560'. [ 574.848748][ T29] audit: type=1326 audit(574.720:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.862063][ T29] audit: type=1326 audit(574.730:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.889046][ T29] audit: type=1326 audit(574.760:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.907853][ T29] audit: type=1326 audit(574.780:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.922898][ T29] audit: type=1326 audit(574.790:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.950700][ T29] audit: type=1326 audit(574.820:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=285 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.964081][ T29] audit: type=1326 audit(574.830:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.983948][ T29] audit: type=1326 audit(574.850:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.2.561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.690797][ T29] audit: type=1400 audit(575.560:656): avc: denied { allowed } for pid=5793 comm="syz.1.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 576.044975][ T29] audit: type=1400 audit(575.910:657): avc: denied { map } for pid=5797 comm="syz.1.568" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.279485][ T5801] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5801 comm=syz.2.569 [ 576.280082][ T5801] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5801 comm=syz.2.569 [ 576.867485][ T5809] netlink: 44 bytes leftover after parsing attributes in process `syz.2.569'. [ 577.199577][ T5812] netlink: 24 bytes leftover after parsing attributes in process `syz.2.572'. [ 577.280486][ T5814] netlink: 24 bytes leftover after parsing attributes in process `syz.1.573'. [ 577.300344][ T5814] netlink: 67 bytes leftover after parsing attributes in process `syz.1.573'. [ 582.261828][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 582.264798][ T29] audit: type=1326 audit(582.130:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.281957][ T29] audit: type=1326 audit(582.150:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.306194][ T29] audit: type=1326 audit(582.150:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.313890][ T29] audit: type=1326 audit(582.160:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.316049][ T29] audit: type=1326 audit(582.160:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.317956][ T29] audit: type=1326 audit(582.160:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.321017][ T29] audit: type=1326 audit(582.160:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.354871][ T29] audit: type=1326 audit(582.220:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.359012][ T29] audit: type=1326 audit(582.230:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.361413][ T29] audit: type=1326 audit(582.230:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 585.079179][ T5902] netlink: 8 bytes leftover after parsing attributes in process `syz.1.597'. [ 587.276525][ T5920] netlink: 20 bytes leftover after parsing attributes in process `syz.2.604'. [ 587.686840][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 587.687775][ T29] audit: type=1326 audit(587.550:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.706472][ T29] audit: type=1326 audit(587.580:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.709747][ T29] audit: type=1326 audit(587.580:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.718509][ T29] audit: type=1326 audit(587.590:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.738992][ T29] audit: type=1326 audit(587.610:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.749898][ T29] audit: type=1326 audit(587.620:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.786988][ T29] audit: type=1326 audit(587.630:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.787147][ T29] audit: type=1326 audit(587.630:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.787285][ T29] audit: type=1326 audit(587.630:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.787349][ T29] audit: type=1326 audit(587.630:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.2.605" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 588.788784][ T5929] netlink: 'syz.1.607': attribute type 13 has an invalid length. [ 590.443593][ T5929] hsr1: left promiscuous mode [ 593.048703][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 593.051558][ T29] audit: type=1326 audit(592.920:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.057833][ T29] audit: type=1326 audit(592.930:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.091518][ T29] audit: type=1326 audit(592.960:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.216946][ T29] audit: type=1326 audit(593.060:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.278752][ T29] audit: type=1326 audit(593.140:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.282520][ T29] audit: type=1326 audit(593.150:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=19 compat=0 ip=0x132320 code=0x7ffc0000 [ 593.349681][ T29] audit: type=1326 audit(593.180:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.499418][ T29] audit: type=1326 audit(594.370:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.501125][ T29] audit: type=1326 audit(594.370:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.585977][ T29] audit: type=1326 audit(594.420:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 595.092340][ T5974] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.261655][ T5974] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.500874][ T5974] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.750769][ T5974] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 596.116546][ T1258] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 596.249386][ T150] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 596.375111][ T1975] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 596.469233][ T1258] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 596.726111][ T6006] pim6reg1: entered promiscuous mode [ 596.727178][ T6006] pim6reg1: entered allmulticast mode [ 598.959280][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 598.966290][ T29] audit: type=1400 audit(598.830:795): avc: denied { mount } for pid=6023 comm="syz.2.632" name="/" dev="ramfs" ino=7144 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 601.107857][ T6031] netlink: 'syz.2.634': attribute type 5 has an invalid length. [ 601.660059][ T29] audit: type=1326 audit(601.500:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.662867][ T29] audit: type=1326 audit(601.530:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.674813][ T29] audit: type=1326 audit(601.540:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.678019][ T29] audit: type=1326 audit(601.540:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.683300][ T29] audit: type=1326 audit(601.540:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.694799][ T29] audit: type=1326 audit(601.550:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.697171][ T29] audit: type=1326 audit(601.550:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.697452][ T29] audit: type=1326 audit(601.570:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=246 compat=0 ip=0x132320 code=0x7ffc0000 [ 601.701288][ T29] audit: type=1326 audit(601.570:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="syz.2.635" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 605.519847][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 605.521911][ T29] audit: type=1326 audit(605.390:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6053 comm="syz.2.642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 605.546361][ T29] audit: type=1326 audit(605.420:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6053 comm="syz.2.642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 605.983835][ T6056] netlink: 19 bytes leftover after parsing attributes in process `syz.2.643'. [ 607.981956][ T4545] hid_parser_main: 6 callbacks suppressed [ 607.996327][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 607.997407][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.000574][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.010753][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.025588][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.027292][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.028465][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.029551][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.030676][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.031917][ T4545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 608.043223][ T4545] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 612.600543][ T1975] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 612.707909][ T1975] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 612.852051][ T1975] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 612.990402][ T1975] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 613.373775][ T29] audit: type=1326 audit(613.240:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.383468][ T29] audit: type=1326 audit(613.250:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.438092][ T29] audit: type=1326 audit(613.310:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.443885][ T29] audit: type=1326 audit(613.310:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.449229][ T29] audit: type=1326 audit(613.310:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.478679][ T29] audit: type=1326 audit(613.350:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.482329][ T29] audit: type=1326 audit(613.350:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.487009][ T29] audit: type=1326 audit(613.360:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=318 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.511513][ T29] audit: type=1326 audit(613.380:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6099 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 613.890028][ T1975] bond0 (unregistering): Released all slaves [ 614.121851][ T1975] hsr_slave_0: left promiscuous mode [ 614.130196][ T1975] hsr_slave_1: left promiscuous mode [ 614.147350][ T1975] veth1_macvtap: left promiscuous mode [ 614.148703][ T1975] veth0_macvtap: left promiscuous mode [ 614.152259][ T1975] veth1_vlan: left promiscuous mode [ 614.153826][ T1975] veth0_vlan: left promiscuous mode [ 615.571442][ T6120] netlink: 148 bytes leftover after parsing attributes in process `syz.2.657'. [ 616.008533][ T29] audit: type=1400 audit(615.880:818): avc: denied { write } for pid=6121 comm="syz.2.658" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 619.000958][ T6142] netlink: 240 bytes leftover after parsing attributes in process `syz.2.661'. [ 620.675617][ T6152] SELinux: ebitmap start bit (791556723) is not a multiple of the map unit size (64) [ 620.680595][ T6152] SELinux: failed to load policy [ 621.210391][ T6156] netlink: 8 bytes leftover after parsing attributes in process `syz.2.665'. [ 621.226416][ T6156] netlink: 8 bytes leftover after parsing attributes in process `syz.2.665'. [ 621.229554][ T6156] netlink: 8 bytes leftover after parsing attributes in process `syz.2.665'. [ 621.236727][ T6156] netlink: 8 bytes leftover after parsing attributes in process `syz.2.665'. [ 621.772887][ T6163] netlink: 96 bytes leftover after parsing attributes in process `syz.2.666'. [ 624.716644][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 624.718137][ T29] audit: type=1401 audit(624.590:820): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 625.567789][ T29] audit: type=1400 audit(625.440:821): avc: denied { watch watch_reads } for pid=6187 comm="syz.2.673" path="/154/file0" dev="tmpfs" ino=802 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 628.580142][ T29] audit: type=1326 audit(628.450:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.637911][ T29] audit: type=1326 audit(628.510:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.649325][ T29] audit: type=1326 audit(628.520:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.667041][ T29] audit: type=1326 audit(628.540:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.674899][ T29] audit: type=1326 audit(628.540:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.677266][ T29] audit: type=1326 audit(628.540:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.682323][ T29] audit: type=1326 audit(628.540:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.696606][ T29] audit: type=1326 audit(628.570:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6210 comm="syz.2.678" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132320 code=0x7ffc0000 [ 649.637225][ T6245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 649.707384][ T6245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 653.573095][ T6245] hsr_slave_0: entered promiscuous mode [ 653.607072][ T6245] hsr_slave_1: entered promiscuous mode [ 654.723258][ T6245] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 654.747348][ T6245] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 654.767338][ T6245] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 654.811380][ T6245] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 657.652750][ T6245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 666.657531][ T6245] veth0_vlan: entered promiscuous mode [ 666.712589][ T6245] veth1_vlan: entered promiscuous mode [ 666.871027][ T6245] veth0_macvtap: entered promiscuous mode [ 666.903298][ T6245] veth1_macvtap: entered promiscuous mode [ 667.121133][ T32] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.123101][ T32] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.125673][ T32] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.126837][ T32] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.456825][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 667.462673][ T29] audit: type=1400 audit(667.330:831): avc: denied { unmount } for pid=6245 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 667.475586][ T29] audit: type=1400 audit(667.340:832): avc: denied { add_name } for pid=6245 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 667.475740][ T29] audit: type=1400 audit(667.340:833): avc: denied { create } for pid=6245 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 667.475792][ T29] audit: type=1400 audit(667.340:834): avc: denied { associate } for pid=6245 comm="syz-executor" name="syz3" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 667.510871][ T6245] 8<--- cut here --- [ 667.512369][ T6245] Unable to handle kernel NULL pointer dereference at virtual address 00000038 when read [ 667.535475][ T6245] [00000038] *pgd=8535c003, *pmd=df2c0003 [ 667.539006][ T29] audit: type=1400 audit(667.410:835): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 667.541166][ T29] audit: type=1400 audit(667.410:836): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 667.545962][ T29] audit: type=1400 audit(667.410:837): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 667.551914][ T6245] [ 667.555863][ T29] audit: type=1400 audit(667.410:838): avc: denied { add_name } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 667.569475][ T29] audit: type=1400 audit(667.410:839): avc: denied { create } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 667.570015][ T29] audit: type=1400 audit(667.410:840): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 667.586511][ T6245] Internal error: Oops: 205 [#1] SMP ARM [ 667.588612][ T6245] Modules linked in: [ 667.590248][ T6245] CPU: 1 UID: 0 PID: 6245 Comm: syz-executor Not tainted syzkaller #0 PREEMPT SYZFAIL: failed to recv rpc [ 667.592365][ T6245] Hardware name: ARM-Versatile Express [ 667.592934][ T6245] PC is at simple_xattrs_free+0x1c/0x8c [ 667.593305][ T6245] LR is at __kernfs_new_node+0x1c0/0x228 [ 667.593531][ T6245] pc : [<805a57bc>] lr : [<80636120>] psr: 600c0013 [ 667.593704][ T6245] sp : df9fdd70 ip : df9fdd90 fp : df9fdd8c [ 667.593938][ T6245] r10: 8309f49c r9 : 8537a400 r8 : 82498a44 [ 667.594312][ T6245] r7 : 00000038 r6 : 00000000 r5 : 8309f480 r4 : 8518a5d8 [ 667.594644][ T6245] r3 : 8537a400 r2 : 00000000 r1 : 00000000 r0 : 00000038 [ 667.595226][ T6245] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 667.595593][ T6245] Control: 30c5387d Table: 84cf0400 DAC: 00000000 [ 667.595906][ T6245] Register r0 information: non-paged memory [ 667.596626][ T6245] Register r1 information: NULL pointer [ 667.596880][ T6245] Register r2 information: NULL pointer [ 667.597125][ T6245] Register r3 information: slab task_struct start 8537a400 pointer offset 0 size 3072 [ 667.598179][ T6245] Register r4 information: slab kernfs_node_cache start 8518a5d8 pointer offset 0 size 88 [ 667.598741][ T6245] Register r5 information: slab kmalloc-192 start 8309f480 pointer offset 0 size 192 [ 667.599079][ T6245] Register r6 information: NULL pointer [ 667.599387][ T6245] Register r7 information: non-paged memory [ 667.599723][ T6245] Register r8 information: non-slab/vmalloc memory [ 667.600148][ T6245] Register r9 information: slab task_struct start 8537a400 pointer offset 0 size 3072 [ 667.600572][ T6245] Register r10 information: slab kmalloc-192 start 8309f480 pointer offset 28 size 192 [ 667.601039][ T6245] Register r11 information: 2-page vmalloc region starting at 0xdf9fc000 allocated at kernel_clone+0xac/0x3ec [ 667.601669][ T6245] Register r12 information: 2-page vmalloc region starting at 0xdf9fc000 allocated at kernel_clone+0xac/0x3ec [ 667.602191][ T6245] Process syz-executor (pid: 6245, stack limit = 0xdf9fc000) [ 667.603608][ T6245] Stack: (0xdf9fdd70 to 0xdf9fe000) [ 667.603885][ T6245] dd60: 8518a5d8 8309f480 86399040 830a31b8 [ 667.604376][ T6245] dd80: df9fde2c df9fdd90 80636120 805a57ac 00000820 df9fdda0 8309f488 00000001 [ 667.605012][ T6245] dda0: 0000008d 000041c0 00000000 ffffffff 60000013 85757900 824986c8 deffc560 [ 667.605592][ T6245] ddc0: 85757900 a40316c4 000056c4 00000008 df9fde6c df9fdde0 804b74d8 804b5f10 [ 667.606225][ T6245] dde0: 807ae0d4 83001240 84d74408 00000dc0 00000000 0000001c df9fde14 eb442071 [ 667.606654][ T6245] de00: 8053a3a0 830a31b8 000041c0 00000000 00000001 00000000 8581602c 8309f480 [ 667.607004][ T6245] de20: df9fde6c df9fde30 80637bf4 80635f6c 00000000 00000000 00000001 eb442071 [ 667.607319][ T6245] de40: 00000000 828fa180 830a31b8 830a31b8 8581602c 000001c0 00000000 84d74408 [ 667.607689][ T6245] de60: df9fde8c df9fde70 8063813c 80637b80 00000000 00000001 828fa180 84d74400 [ 667.608054][ T6245] de80: df9fdedc df9fde90 803613fc 8063811c 00000000 84d74400 00000000 eb442071 [ 667.608425][ T6245] dea0: 00000002 837e56c0 828fa140 00000000 8291fa94 830a31b8 828fa090 85816000 [ 667.608812][ T6245] dec0: 000001c0 8537a400 00000000 000001c0 df9fdefc df9fdee0 80637b14 803612e4 [ 667.609210][ T6245] dee0: 837e56c0 80637aa8 85816000 8291fa94 df9fdf44 df9fdf00 8057b8a0 80637ab4 [ 667.609551][ T6245] df00: ffffff9c 86063250 85816000 eb442071 00000000 00000000 df9fdf44 85816000 [ 667.609881][ T6245] df20: 00000000 838ed000 000001ff ffffff9c 8537a400 00000002 df9fdf8c df9fdf48 [ 667.610195][ T6245] df40: 80582264 8057b690 df9fdf50 8099f810 00000000 86063250 83798cc0 eb442071 [ 667.610527][ T6245] df60: 8020029c 000001ff 00000001 7ef89a98 00000027 8020029c 8537a400 00000027 [ 667.610859][ T6245] df80: df9fdfa4 df9fdf90 80582320 805820ec 00300000 00000001 00000000 df9fdfa8 [ 667.611430][ T6245] dfa0: 80200060 80582304 00300000 00000001 7ef89a98 000001ff 00000000 00000000 [ 667.611823][ T6245] dfc0: 00300000 00000001 7ef89a98 00000027 7ef89c80 002e8000 7ef89c84 00000008 [ 667.612184][ T6245] dfe0: 00000003 7ef89a4c 000287a8 0012feac 60000010 7ef89a98 00000000 00000000 [ 667.612633][ T6245] Call trace: [ 667.612865][ T6245] [<805a57a0>] (simple_xattrs_free) from [<80636120>] (__kernfs_new_node+0x1c0/0x228) [ 667.613299][ T6245] r7:830a31b8 r6:86399040 r5:8309f480 r4:8518a5d8 [ 667.613676][ T6245] [<80635f60>] (__kernfs_new_node) from [<80637bf4>] (kernfs_new_node+0x80/0xa4) [ 667.614069][ T6245] r10:8309f480 r9:8581602c r8:00000000 r7:00000001 r6:00000000 r5:000041c0 [ 667.614585][ T6245] r4:830a31b8 [ 667.614814][ T6245] [<80637b74>] (kernfs_new_node) from [<8063813c>] (kernfs_create_dir_ns+0x2c/0x80) [ 667.615271][ T6245] r10:84d74408 r9:00000000 r8:000001c0 r7:8581602c r6:830a31b8 r5:830a31b8 [ 667.615754][ T6245] r4:828fa180 [ 667.615946][ T6245] [<80638110>] (kernfs_create_dir_ns) from [<803613fc>] (cgroup_mkdir+0x124/0x52c) [ 667.616367][ T6245] r5:84d74400 r4:828fa180 [ 667.616566][ T6245] [<803612d8>] (cgroup_mkdir) from [<80637b14>] (kernfs_iop_mkdir+0x6c/0x90) [ 667.617109][ T6245] r10:000001c0 r9:00000000 r8:8537a400 r7:000001c0 r6:85816000 r5:828fa090 [ 667.617486][ T6245] r4:830a31b8 [ 667.617658][ T6245] [<80637aa8>] (kernfs_iop_mkdir) from [<8057b8a0>] (vfs_mkdir+0x21c/0x2fc) [ 667.618053][ T6245] r7:8291fa94 r6:85816000 r5:80637aa8 r4:837e56c0 [ 667.618306][ T6245] [<8057b684>] (vfs_mkdir) from [<80582264>] (do_mkdirat+0x184/0x1e0) [ 667.618672][ T6245] r10:00000002 r9:8537a400 r8:ffffff9c r7:000001ff r6:838ed000 r5:00000000 [ 667.619035][ T6245] r4:85816000 [ 667.619204][ T6245] [<805820e0>] (do_mkdirat) from [<80582320>] (sys_mkdir+0x28/0x2c) [ 667.619628][ T6245] r10:00000027 r9:8537a400 r8:8020029c r7:00000027 r6:7ef89a98 r5:00000001 [ 667.619934][ T6245] r4:000001ff fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 667.620089][ T6245] [<805822f8>] (sys_mkdir) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 667.621047][ T6245] Exception stack(0xdf9fdfa8 to 0xdf9fdff0) [ 667.621422][ T6245] dfa0: 00300000 00000001 7ef89a98 000001ff 00000000 00000000 [ 667.621841][ T6245] dfc0: 00300000 00000001 7ef89a98 00000027 7ef89c80 002e8000 7ef89c84 00000008 [ 667.622660][ T6245] dfe0: 00000003 7ef89a4c 000287a8 0012feac [ 667.623061][ T6245] r5:00000001 r4:00300000 [ 667.623593][ T6245] Code: e2516000 e1a07000 13a03000 15863000 (e5903000) [ 667.626803][ T6245] ---[ end trace 0000000000000000 ]--- [ 667.816192][ T6245] Kernel panic - not syncing: Fatal exception [ 667.820301][ T6245] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:36:13 Registers: info registers vcpu 0 CPU#0 R00=0000009e R01=76f37140 R02=000003ff R03=76f37140 R04=76f37140 R05=76f374fd R06=00000000 R07=00000067 R08=00000000 R09=76f36904 R10=76f37554 R11=76f163bc R12=76f36cdc R13=eb835ff8 R14=76ddc3ec R15=76ddc3ec PSR=600c0193 -ZC- A S svc32 s00=6570206d s01=73696d72 d00=73696d726570206d s02=6f723d74 s03=6f3a746f d01=6f3a746f6f723d74 s04=63656a62 s05=3a725f74 d02=3a725f7463656a62 s06=616c6e75 s07=656c6562 d03=656c6562616c6e75 s08=20745f64 s09=6e6f6374 d04=6e6f637420745f64 s10=74786574 s11=7379733d d05=7379733d74786574 s12=5f6d6574 s13=626f3a75 d06=626f3a755f6d6574 s14=7463656a s15=633a725f d07=633a725f7463656a s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=0000fb15 R03=84da3240 R04=dfb0dccc R05=84da3300 R06=852defd4 R07=00000002 R08=dfb0dcd0 R09=00000000 R10=00000042 R11=dfb0dc64 R12=dfb0dc68 R13=dfb0dc90 R14=81880184 R15=815b6014 PSR=60000013 -ZC- A S svc32 s00=7973656c s01=6d657473 d00=6d6574737973656c s02=6e6f6373 s03=74786574 d01=747865746e6f6373 s04=6f6f723d s05=626f3a74 d02=626f3a746f6f723d s06=7463656a s07=753a725f d03=753a725f7463656a s08=62616c6e s09=64656c65 d04=64656c6562616c6e s10=7420745f s11=746e6f63 d05=746e6f637420745f s12=3d747865 s13=74737973 d06=747379733d747865 s14=755f6d65 s15=6a626f3a d07=6a626f3a755f6d65 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000