last executing test programs: 10m47.269420566s ago: executing program 1 (id=362): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) 10m47.034839387s ago: executing program 1 (id=363): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0x7}, 0x18) syz_clone(0xc510c080, 0x0, 0x0, 0x0, 0x0, 0x0) 10m45.165424823s ago: executing program 1 (id=364): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 10m45.038371694s ago: executing program 1 (id=365): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) ustat(0xd, 0x0) 10m44.838705003s ago: executing program 1 (id=366): bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000001809"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) rt_sigsuspend(0x0, 0x0) 10m44.668292837s ago: executing program 1 (id=367): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') 9m59.492867384s ago: executing program 32 (id=367): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') 18.397514238s ago: executing program 0 (id=880): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x21, 0x0, 0x0) 18.119758743s ago: executing program 0 (id=881): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x8, 0x8031, 0xffffffffffffffff, 0xbe1f2000) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) 17.778922354s ago: executing program 0 (id=883): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x280a01, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x7) ioctl$SIOCSIFHWADDR(r0, 0x8926, 0x0) 17.198361635s ago: executing program 0 (id=884): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) 16.958404686s ago: executing program 0 (id=885): r0 = io_uring_setup(0x60f7, &(0x7f0000000a40)={0x0, 0xf687, 0x2, 0xfffffffe, 0x3bd}) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffe0) close_range(r0, 0xffffffffffffffff, 0x0) 16.699128439s ago: executing program 0 (id=886): socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000005000000"], 0x50) socket$vsock_stream(0x28, 0x1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./cgroup\x00', &(0x7f0000000080)='cramfs\x00', 0x208000, 0x0) 770.152842ms ago: executing program 2 (id=888): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x5, 0x2}) 629.720984ms ago: executing program 2 (id=889): r0 = socket(0x840000000002, 0x3, 0xfa) connect$inet(r0, &(0x7f0000000540)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240), 0x4000095, 0x0) 498.289106ms ago: executing program 2 (id=890): r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000007bc0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x10, &(0x7f0000007c40)={[{0x9, 0x4e00, "cc8ee0ae973fc3f82a"}]}) 399.007375ms ago: executing program 2 (id=891): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xffe0}, {0x0, 0xfff1}, {0xfff3, 0xfff3}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x4}, @TCA_FLOWER_KEY_ENC_OPTS={0x4}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x22044028}, 0x0) 249.139888ms ago: executing program 2 (id=892): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ed50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0x10}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000001bc0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r4, {0xffff}, {}, {0xa}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0x82}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044841}, 0x20000000) 0s ago: executing program 2 (id=893): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x401, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x4}, @IFLA_BOND_USE_CARRIER={0x5}]}}}]}, 0x44}}, 0x0) kernel console output (not intermixed with test programs): type=1400 audit(64.590:65): avc: denied { mounton } for pid=3079 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 64.684525][ T31] audit: type=1400 audit(64.590:66): avc: denied { mount } for pid=3079 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 64.890173][ T3081] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 64.894717][ T31] audit: type=1400 audit(64.810:67): avc: denied { relabelto } for pid=3081 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.573983][ T3079] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.143123][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 74.143638][ T31] audit: type=1400 audit(74.050:71): avc: denied { execmem } for pid=3082 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.210923][ T31] audit: type=1400 audit(74.120:72): avc: denied { read } for pid=3085 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.211413][ T31] audit: type=1400 audit(74.120:73): avc: denied { open } for pid=3085 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.220206][ T31] audit: type=1400 audit(74.130:74): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.245871][ T31] audit: type=1400 audit(74.160:75): avc: denied { module_request } for pid=3084 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.246286][ T31] audit: type=1400 audit(74.160:76): avc: denied { module_request } for pid=3085 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.321079][ T31] audit: type=1400 audit(74.230:77): avc: denied { sys_module } for pid=3084 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 74.966581][ T31] audit: type=1400 audit(74.880:78): avc: denied { ioctl } for pid=3084 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.683964][ T3084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.735161][ T3084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.197106][ T3085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.206194][ T3085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.676512][ T3084] hsr_slave_0: entered promiscuous mode [ 76.679338][ T3084] hsr_slave_1: entered promiscuous mode [ 77.023865][ T31] audit: type=1400 audit(76.930:79): avc: denied { create } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.025619][ T31] audit: type=1400 audit(76.940:80): avc: denied { write } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.038239][ T3084] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.049462][ T3084] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.057680][ T3084] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.064468][ T3084] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 77.145825][ T3085] hsr_slave_0: entered promiscuous mode [ 77.149218][ T3085] hsr_slave_1: entered promiscuous mode [ 77.153487][ T3085] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.153873][ T3085] Cannot create hsr debugfs directory [ 77.486848][ T3085] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.497733][ T3085] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.508216][ T3085] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.518754][ T3085] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.867187][ T3084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.238763][ T3085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.657609][ T3084] veth0_vlan: entered promiscuous mode [ 80.679757][ T3084] veth1_vlan: entered promiscuous mode [ 80.745822][ T3084] veth0_macvtap: entered promiscuous mode [ 80.765255][ T3084] veth1_macvtap: entered promiscuous mode [ 80.825828][ T3084] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.827312][ T3084] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.828725][ T3084] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.830311][ T3084] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.935762][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 80.936134][ T31] audit: type=1400 audit(80.830:82): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.936467][ T31] audit: type=1400 audit(80.840:83): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzkaller.cWURGk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.936561][ T31] audit: type=1400 audit(80.840:84): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.942124][ T31] audit: type=1400 audit(80.850:85): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzkaller.cWURGk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 80.947279][ T31] audit: type=1400 audit(80.860:86): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzkaller.cWURGk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 80.960948][ T31] audit: type=1400 audit(80.870:87): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.967977][ T31] audit: type=1400 audit(80.880:88): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.970197][ T31] audit: type=1400 audit(80.880:89): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="gadgetfs" ino=2350 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 80.977180][ T31] audit: type=1400 audit(80.890:90): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.979551][ T31] audit: type=1400 audit(80.890:91): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.024604][ T3084] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 81.097716][ T3085] veth0_vlan: entered promiscuous mode [ 81.130737][ T3085] veth1_vlan: entered promiscuous mode [ 81.208832][ T3085] veth0_macvtap: entered promiscuous mode [ 81.231636][ T3085] veth1_macvtap: entered promiscuous mode [ 81.308582][ T3085] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.309047][ T3085] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.309226][ T3085] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.309306][ T3085] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.405015][ T47] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 82.628437][ T47] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 82.628987][ T47] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 82.629346][ T47] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 82.674907][ T47] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 82.676337][ T47] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 82.677286][ T47] usb 1-1: Product: syz [ 82.678009][ T47] usb 1-1: Manufacturer: syz [ 82.678717][ T47] usb 1-1: SerialNumber: syz [ 82.723939][ T47] hub 1-1:1.0: bad descriptor, ignoring hub [ 82.725165][ T47] hub 1-1:1.0: probe with driver hub failed with error -5 [ 83.053251][ T47] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 2 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 83.563224][ T47] usb 1-1: USB disconnect, device number 2 [ 83.574493][ T47] usblp0: removed [ 83.705031][ T3813] bond0: (slave bond_slave_0): Releasing backup interface [ 83.737064][ T3813] bond0: (slave bond_slave_1): Releasing backup interface [ 86.183790][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 86.184387][ T31] audit: type=1400 audit(86.080:101): avc: denied { relabelfrom } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 86.187987][ T31] audit: type=1400 audit(86.100:102): avc: denied { relabelto } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 86.303896][ T31] audit: type=1400 audit(86.190:103): avc: denied { map_create } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.307160][ T31] audit: type=1400 audit(86.210:104): avc: denied { bpf } for pid=3821 comm="syz.1.12" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 86.308808][ T31] audit: type=1400 audit(86.220:105): avc: denied { map_read map_write } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.339334][ T31] audit: type=1400 audit(86.240:106): avc: denied { prog_load } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.404621][ T31] audit: type=1400 audit(86.290:107): avc: denied { perfmon } for pid=3821 comm="syz.1.12" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 86.484731][ T31] audit: type=1400 audit(86.390:108): avc: denied { prog_run } for pid=3821 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 90.424634][ T3845] syz.0.19 uses obsolete (PF_INET,SOCK_PACKET) [ 90.426368][ T31] audit: type=1400 audit(90.340:109): avc: denied { create } for pid=3844 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.436295][ T31] audit: type=1400 audit(90.350:110): avc: denied { ioctl } for pid=3844 comm="syz.0.19" path="socket:[918]" dev="sockfs" ino=918 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 91.029352][ T3855] vlan2: entered allmulticast mode [ 91.030641][ T3855] bridge_slave_0: entered allmulticast mode [ 91.370604][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 91.371349][ T3864] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 91.374147][ T31] audit: type=1400 audit(91.280:116): avc: denied { load_policy } for pid=3863 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 91.386089][ T3864] SELinux: failed to load policy [ 91.729765][ T31] audit: type=1400 audit(91.640:117): avc: denied { create } for pid=3869 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 94.192834][ T31] audit: type=1326 audit(94.090:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 94.202055][ T31] audit: type=1326 audit(94.090:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 94.214976][ T31] audit: type=1326 audit(94.090:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.28" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x131f20 code=0x7ffc0000 [ 94.243563][ T31] audit: type=1326 audit(94.150:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 94.246239][ T31] audit: type=1326 audit(94.160:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 97.989845][ T3907] netlink: 20 bytes leftover after parsing attributes in process `syz.1.36'. [ 98.147930][ T3907] netlink: 4 bytes leftover after parsing attributes in process `syz.1.36'. [ 98.970042][ T3928] Zero length message leads to an empty skb [ 99.851735][ T31] audit: type=1400 audit(99.760:123): avc: denied { create } for pid=3933 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.879008][ T31] audit: type=1400 audit(99.790:124): avc: denied { connect } for pid=3933 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.895292][ T31] audit: type=1400 audit(99.810:125): avc: denied { create } for pid=3933 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 100.992588][ C0] hrtimer: interrupt took 8247952 ns [ 114.890980][ T31] audit: type=1400 audit(114.800:126): avc: denied { create } for pid=3958 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 114.912973][ T31] audit: type=1400 audit(114.820:127): avc: denied { setopt } for pid=3958 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 114.914830][ T31] audit: type=1400 audit(114.820:128): avc: denied { create } for pid=3958 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 115.038121][ T31] audit: type=1400 audit(114.950:129): avc: denied { connect } for pid=3958 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.874592][ T31] audit: type=1400 audit(115.790:130): avc: denied { compute_member } for pid=3983 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 116.068974][ T31] audit: type=1400 audit(115.980:131): avc: denied { create } for pid=3985 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 116.085298][ T31] audit: type=1400 audit(116.000:132): avc: denied { write } for pid=3985 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 116.085886][ T31] audit: type=1400 audit(116.000:133): avc: denied { nlmsg_write } for pid=3985 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 117.561617][ T31] audit: type=1400 audit(117.470:134): avc: denied { write } for pid=3993 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 118.236846][ T31] audit: type=1326 audit(118.150:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3999 comm="syz.1.48" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 121.074762][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 121.078141][ T31] audit: type=1400 audit(120.990:171): avc: denied { create } for pid=4040 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 121.097688][ T31] audit: type=1400 audit(121.010:172): avc: denied { setopt } for pid=4040 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 121.118274][ T31] audit: type=1400 audit(121.030:173): avc: denied { create } for pid=4040 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 121.133676][ T31] audit: type=1400 audit(121.030:174): avc: denied { setopt } for pid=4040 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 121.408835][ T31] audit: type=1400 audit(121.320:175): avc: denied { append } for pid=4040 comm="syz.1.57" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 121.688654][ T31] audit: type=1326 audit(121.600:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 121.690720][ T31] audit: type=1326 audit(121.600:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x131f20 code=0x7ffc0000 [ 121.696910][ T31] audit: type=1326 audit(121.600:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 121.701065][ T31] audit: type=1326 audit(121.610:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x131f20 code=0x7ffc0000 [ 121.709361][ T31] audit: type=1400 audit(121.610:180): avc: denied { mount } for pid=4050 comm="syz.1.58" name="/" dev="ramfs" ino=3107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 121.764630][ T4051] syz.1.58 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 125.734095][ T4061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4061 comm=syz.1.62 [ 126.199525][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 126.200616][ T31] audit: type=1400 audit(126.110:210): avc: denied { setattr } for pid=4063 comm="syz.1.64" name="file0" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 126.333477][ T31] audit: type=1400 audit(126.240:211): avc: denied { unlink } for pid=3085 comm="syz-executor" name="file0" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 126.348761][ T4067] fuse: Unknown parameter 'grou00000000000000000000' [ 126.554096][ T31] audit: type=1400 audit(126.470:212): avc: denied { create } for pid=4068 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 126.758964][ T31] audit: type=1326 audit(126.670:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 126.760690][ T31] audit: type=1326 audit(126.670:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 126.774394][ T31] audit: type=1326 audit(126.690:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fd18 code=0x7ffc0000 [ 126.779488][ T31] audit: type=1400 audit(126.690:216): avc: denied { write } for pid=4070 comm="syz.0.67" name="ptype" dev="proc" ino=4026532664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 126.828713][ T31] audit: type=1326 audit(126.740:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fd18 code=0x7ffc0000 [ 126.829119][ T31] audit: type=1326 audit(126.740:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 126.837276][ T31] audit: type=1326 audit(126.750:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.0.67" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 133.889756][ T4090] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 134.002997][ T4090] SELinux: failed to load policy [ 136.085807][ T4096] netlink: 'syz.1.77': attribute type 1 has an invalid length. [ 142.972998][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 142.974315][ T31] audit: type=1400 audit(142.870:250): avc: denied { ioctl } for pid=4173 comm="syz.0.85" path="socket:[3217]" dev="sockfs" ino=3217 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 142.974802][ T4175] syzkaller1: entered promiscuous mode [ 142.975152][ T4175] syzkaller1: entered allmulticast mode [ 144.220345][ T4182] SELinux: syz.0.86 (4182) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 147.603011][ T31] audit: type=1400 audit(147.510:251): avc: denied { nlmsg_read } for pid=4195 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 147.604735][ T4196] netlink: 12 bytes leftover after parsing attributes in process `syz.0.91'. [ 148.753079][ T31] audit: type=1400 audit(148.660:252): avc: denied { bind } for pid=4200 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.759240][ T31] audit: type=1400 audit(148.670:253): avc: denied { setopt } for pid=4200 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.891422][ T4201] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.176902][ T4201] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.472112][ T4201] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.710757][ T4201] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.947528][ T4201] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.981450][ T4201] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.188125][ T4201] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.308539][ T4201] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.865113][ T4227] fuse: Unknown parameter 'group_id00000000000000000000' [ 153.326335][ T31] audit: type=1326 audit(153.240:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.335085][ T31] audit: type=1326 audit(153.250:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.338940][ T31] audit: type=1326 audit(153.250:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.341420][ T31] audit: type=1326 audit(153.250:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.349787][ T31] audit: type=1326 audit(153.250:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=278 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.350352][ T31] audit: type=1326 audit(153.250:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 153.350624][ T31] audit: type=1326 audit(153.250:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4228 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 155.887527][ T31] audit: type=1400 audit(155.800:261): avc: denied { create } for pid=4238 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 156.721965][ T4242] fuse: Bad value for 'user_id' [ 156.734707][ T4242] fuse: Bad value for 'user_id' [ 158.518176][ T4254] SELinux: failed to load policy [ 158.895268][ T31] audit: type=1326 audit(158.810:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4258 comm="syz.0.107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 158.898106][ T31] audit: type=1326 audit(158.810:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4258 comm="syz.0.107" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x131f20 code=0x7ffc0000 [ 158.904462][ T31] audit: type=1326 audit(158.810:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4258 comm="syz.0.107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 158.910553][ T31] audit: type=1326 audit(158.810:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4258 comm="syz.0.107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 159.283426][ T4264] tc_dump_action: action bad kind [ 159.943236][ T31] audit: type=1326 audit(159.840:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 159.944440][ T31] audit: type=1326 audit(159.860:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 159.946589][ T31] audit: type=1326 audit(159.860:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f20 code=0x7ffc0000 [ 159.948758][ T31] audit: type=1326 audit(159.860:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 159.949603][ T31] audit: type=1326 audit(159.860:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 160.894783][ T31] kauditd_printk_skb: 195 callbacks suppressed [ 160.895928][ T31] audit: type=1326 audit(160.810:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x131f20 code=0x7ffc0000 [ 160.899157][ T31] audit: type=1326 audit(160.810:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 160.903070][ T31] audit: type=1326 audit(160.810:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 160.906372][ T31] audit: type=1326 audit(160.820:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x131f20 code=0x7ffc0000 [ 160.915516][ T31] audit: type=1326 audit(160.830:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 160.918297][ T31] audit: type=1326 audit(160.830:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 160.920114][ T31] audit: type=1326 audit(160.830:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x131f20 code=0x7ffc0000 [ 160.925145][ T31] audit: type=1326 audit(160.840:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 160.933965][ T31] audit: type=1326 audit(160.840:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 160.936072][ T31] audit: type=1326 audit(160.840:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm="syz.0.108" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x131f20 code=0x7ffc0000 [ 161.280504][ T4298] fuse: Bad value for 'user_id' [ 161.287497][ T4298] fuse: Bad value for 'user_id' [ 167.564239][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 167.564594][ T31] audit: type=1326 audit(167.480:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.568621][ T31] audit: type=1326 audit(167.480:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.573480][ T31] audit: type=1326 audit(167.480:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.576923][ T31] audit: type=1326 audit(167.490:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.593439][ T31] audit: type=1326 audit(167.500:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=353 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.597528][ T31] audit: type=1326 audit(167.510:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.601515][ T31] audit: type=1326 audit(167.510:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4356 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 167.607010][ T31] audit: type=1400 audit(167.520:637): avc: denied { write } for pid=4352 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 168.105505][ T31] audit: type=1400 audit(168.000:638): avc: denied { map } for pid=4362 comm="syz.0.135" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 168.105798][ T31] audit: type=1400 audit(168.000:639): avc: denied { read write } for pid=4362 comm="syz.0.135" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 168.444040][ T4365] netlink: 8 bytes leftover after parsing attributes in process `syz.1.136'. [ 169.433201][ T4355] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 169.603560][ T4355] usb 2-1: device descriptor read/64, error -71 [ 169.906990][ T4355] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 170.104790][ T4355] usb 2-1: device descriptor read/64, error -71 [ 170.219822][ T4355] usb usb2-port1: attempt power cycle [ 170.599818][ T4355] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 170.623795][ T4355] usb 2-1: device descriptor read/8, error -71 [ 170.863149][ T4355] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 170.886224][ T4355] usb 2-1: device descriptor read/8, error -71 [ 170.995635][ T4355] usb usb2-port1: unable to enumerate USB device [ 176.051739][ T31] audit: type=1400 audit(175.960:640): avc: denied { setcurrent } for pid=4378 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 179.170308][ T31] audit: type=1326 audit(179.080:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 179.188309][ T31] audit: type=1326 audit(179.100:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 179.188784][ T31] audit: type=1326 audit(179.100:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x131f20 code=0x7ffc0000 [ 179.188879][ T31] audit: type=1326 audit(179.100:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 179.188960][ T31] audit: type=1326 audit(179.100:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 180.004402][ T31] audit: type=1326 audit(179.920:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 180.004765][ T31] audit: type=1326 audit(179.920:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 180.007605][ T31] audit: type=1326 audit(179.920:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 180.014731][ T31] audit: type=1326 audit(179.930:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 180.268545][ T4421] mmap: syz.0.154 (4421) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 180.753435][ T4429] netlink: 12 bytes leftover after parsing attributes in process `syz.0.156'. [ 182.186881][ T4440] SELinux: failed to load policy [ 182.706106][ T4445] netlink: 28 bytes leftover after parsing attributes in process `syz.1.162'. [ 184.356750][ T4456] SELinux: failed to load policy [ 184.686886][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 184.687602][ T31] audit: type=1400 audit(184.600:710): avc: denied { ioctl } for pid=4460 comm="syz.0.168" path="socket:[3643]" dev="sockfs" ino=3643 ioctlcmd=0x6609 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 185.075770][ T31] audit: type=1326 audit(184.990:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4466 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.076984][ T31] audit: type=1326 audit(184.990:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4466 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.081605][ T31] audit: type=1326 audit(184.990:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4466 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.095953][ T31] audit: type=1326 audit(185.010:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4466 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.096371][ T31] audit: type=1326 audit(185.010:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4466 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.487839][ T31] audit: type=1326 audit(185.400:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4473 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.489452][ T31] audit: type=1326 audit(185.400:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4473 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.491768][ T31] audit: type=1326 audit(185.400:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4473 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=443 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.493710][ T31] audit: type=1326 audit(185.410:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4473 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 185.940430][ T4482] netlink: 8 bytes leftover after parsing attributes in process `syz.0.174'. [ 185.962138][ T4480] SELinux: failed to load policy [ 188.049811][ T4516] netlink: 60 bytes leftover after parsing attributes in process `syz.0.185'. [ 189.556563][ T4530] fuse: Invalid rootmode [ 190.630554][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 190.630831][ T31] audit: type=1400 audit(190.540:727): avc: denied { setopt } for pid=4538 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 190.884319][ T4565] fuse: Bad value for 'rootmode' [ 191.121738][ T4574] netem: change failed [ 194.551648][ T4580] fuse: Bad value for 'rootmode' [ 196.294633][ T31] audit: type=1400 audit(196.200:728): avc: denied { read } for pid=4590 comm="syz.0.203" path="socket:[3857]" dev="sockfs" ino=3857 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 197.206780][ T4595] fuse: Bad value for 'rootmode' [ 197.324956][ T31] audit: type=1326 audit(197.240:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4596 comm="syz.0.205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 197.328647][ T31] audit: type=1326 audit(197.240:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4596 comm="syz.0.205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 197.333751][ T31] audit: type=1326 audit(197.250:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4596 comm="syz.0.205" exe="/syz-executor" sig=0 arch=40000028 syscall=51 compat=0 ip=0x131f20 code=0x7ffc0000 [ 197.336539][ T31] audit: type=1326 audit(197.250:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4596 comm="syz.0.205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 197.339527][ T31] audit: type=1326 audit(197.250:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4596 comm="syz.0.205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 197.589934][ T31] audit: type=1400 audit(197.500:734): avc: denied { ioctl } for pid=4601 comm="syz.0.207" path="socket:[3882]" dev="sockfs" ino=3882 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 197.899040][ T4607] fuse: Unknown parameter 'use00000000000000000000' [ 198.226948][ T4614] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 201.942926][ T4633] netlink: 20 bytes leftover after parsing attributes in process `syz.0.219'. [ 206.617226][ T31] audit: type=1400 audit(206.510:735): avc: denied { bind } for pid=4665 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 206.621531][ T31] audit: type=1326 audit(206.530:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.621963][ T31] audit: type=1326 audit(206.530:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.631181][ T31] audit: type=1326 audit(206.540:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.633666][ T31] audit: type=1326 audit(206.540:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.635337][ T31] audit: type=1326 audit(206.540:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.692974][ T31] audit: type=1326 audit(206.560:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.693826][ T31] audit: type=1326 audit(206.600:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.698421][ T31] audit: type=1326 audit(206.600:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 206.701624][ T31] audit: type=1326 audit(206.600:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4665 comm="syz.0.229" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x131f20 code=0x7ffc0000 [ 209.695877][ T4681] netlink: 28 bytes leftover after parsing attributes in process `syz.0.234'. [ 211.883307][ T31] kauditd_printk_skb: 548 callbacks suppressed [ 211.885064][ T4708] fuse: Unknown parameter 'user_id00000000000000000000' [ 211.887148][ T31] audit: type=1400 audit(211.790:1293): avc: denied { mounton } for pid=4706 comm="syz.0.245" path="/128/file0" dev="tmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 211.903965][ T31] audit: type=1400 audit(211.820:1294): avc: denied { load_policy } for pid=4707 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 211.907563][ T4709] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 211.907887][ T4709] SELinux: failed to load policy [ 212.755333][ T31] audit: type=1400 audit(212.650:1295): avc: denied { create } for pid=4714 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 212.778700][ T31] audit: type=1400 audit(212.690:1296): avc: denied { write } for pid=4714 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 212.781255][ T31] audit: type=1400 audit(212.690:1297): avc: denied { module_request } for pid=4714 comm="syz.0.249" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 213.085957][ T31] audit: type=1400 audit(213.000:1298): avc: denied { read } for pid=4714 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 213.101712][ T31] audit: type=1400 audit(213.010:1299): avc: denied { write } for pid=4716 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 213.381441][ T4723] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 213.383747][ T4723] SELinux: failed to load policy [ 213.745828][ T4727] netlink: 136 bytes leftover after parsing attributes in process `syz.0.252'. [ 213.748071][ T4727] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 214.137011][ T31] audit: type=1400 audit(214.050:1300): avc: denied { sys_module } for pid=4730 comm="syz.0.253" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 214.138767][ T4732] Invalid ELF header type: 2 != 1 [ 214.140107][ T31] audit: type=1400 audit(214.050:1301): avc: denied { module_load } for pid=4730 comm="syz.0.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 214.148555][ T4732] netlink: 4 bytes leftover after parsing attributes in process `syz.0.253'. [ 214.945079][ T31] audit: type=1400 audit(214.860:1302): avc: denied { create } for pid=4746 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 214.946282][ T4747] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 215.353520][ T4719] DRBG: could not allocate digest TFM handle: hmac(sha512) [ 216.505805][ T4777] capability: warning: `syz.1.267' uses deprecated v2 capabilities in a way that may be insecure [ 216.863729][ T4783] fuse: Bad value for 'fd' [ 217.093837][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 217.094129][ T31] audit: type=1400 audit(217.010:1328): avc: denied { create } for pid=4786 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 217.139574][ T31] audit: type=1400 audit(217.050:1329): avc: denied { create } for pid=4786 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 217.145564][ T31] audit: type=1400 audit(217.060:1330): avc: denied { write } for pid=4786 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 217.186629][ T31] audit: type=1400 audit(217.090:1331): avc: denied { write } for pid=4786 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 217.187062][ T31] audit: type=1400 audit(217.100:1332): avc: denied { module_request } for pid=4786 comm="syz.0.271" kmod="crypto-digest_null" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 217.265367][ T4790] tc_dump_action: action bad kind [ 217.534395][ T31] audit: type=1326 audit(217.450:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 217.537513][ T31] audit: type=1326 audit(217.450:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f20 code=0x7ffc0000 [ 217.542831][ T31] audit: type=1326 audit(217.450:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 217.545549][ T31] audit: type=1326 audit(217.460:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x131f20 code=0x7ffc0000 [ 217.545875][ T31] audit: type=1326 audit(217.460:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 220.859763][ T4834] fuse: Bad value for 'fd' [ 221.353869][ T4838] netlink: 8 bytes leftover after parsing attributes in process `syz.1.276'. [ 222.183533][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 222.183892][ T31] audit: type=1400 audit(222.100:1354): avc: denied { read } for pid=4847 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.496846][ T31] audit: type=1400 audit(222.410:1355): avc: denied { write } for pid=4851 comm="syz.1.280" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.498757][ T31] audit: type=1400 audit(222.410:1356): avc: denied { open } for pid=4851 comm="syz.1.280" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.507027][ T4853] fuse: Unknown parameter '0x0000000000000004' [ 222.507047][ T31] audit: type=1400 audit(222.420:1357): avc: denied { mounton } for pid=4851 comm="syz.1.280" path="/134/file0" dev="tmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 222.890827][ T31] audit: type=1400 audit(222.800:1358): avc: denied { prog_load } for pid=4855 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 222.894193][ T31] audit: type=1400 audit(222.800:1359): avc: denied { bpf } for pid=4855 comm="syz.1.281" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 222.897717][ T31] audit: type=1400 audit(222.810:1360): avc: denied { perfmon } for pid=4855 comm="syz.1.281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 222.899774][ T31] audit: type=1400 audit(222.810:1361): avc: denied { prog_run } for pid=4855 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 222.986035][ T31] audit: type=1400 audit(222.900:1362): avc: denied { ioctl } for pid=4855 comm="syz.1.281" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.258931][ T4685] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 223.509149][ T4685] usb 2-1: Using ep0 maxpacket: 16 [ 223.555667][ T4685] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 223.558199][ T4685] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 223.612991][ T4685] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 223.613319][ T4685] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 223.613483][ T4685] usb 2-1: Product: syz [ 223.613537][ T4685] usb 2-1: Manufacturer: syz [ 223.613581][ T4685] usb 2-1: SerialNumber: syz [ 224.206497][ T31] audit: type=1400 audit(224.120:1363): avc: denied { create } for pid=4855 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.215640][ T4685] usb 2-1: cannot find UAC_HEADER [ 224.276291][ T4685] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 224.313511][ T4685] usb 2-1: USB disconnect, device number 6 [ 225.644972][ T4892] fuse: Unknown parameter '0x0000000000000004' [ 227.158254][ T4912] fuse: Unknown parameter '0x0000000000000004' [ 227.815662][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 227.816086][ T31] audit: type=1400 audit(227.730:1377): avc: denied { load_policy } for pid=4937 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 227.860895][ T4941] SELinux: failed to load policy [ 228.613423][ T31] audit: type=1400 audit(228.520:1378): avc: denied { ioctl } for pid=4952 comm="syz.0.294" path="socket:[4443]" dev="sockfs" ino=4443 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 228.858973][ T4957] fuse: Unknown parameter '0x0000000000000004' [ 228.951993][ T31] audit: type=1326 audit(228.840:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 228.954200][ T31] audit: type=1326 audit(228.860:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 228.999749][ T31] audit: type=1326 audit(228.890:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 229.055625][ T31] audit: type=1326 audit(228.970:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 229.059502][ T31] audit: type=1326 audit(228.970:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 229.063825][ T31] audit: type=1326 audit(228.970:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 229.068409][ T31] audit: type=1326 audit(228.980:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 229.070340][ T31] audit: type=1326 audit(228.980:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 231.572873][ T4973] fuse: Unknown parameter '0x0000000000000004' [ 231.958030][ T4977] netlink: 36 bytes leftover after parsing attributes in process `syz.1.304'. [ 232.525481][ T4984] fuse: Unknown parameter '0x0000000000000004' [ 233.215528][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 233.216580][ T31] audit: type=1400 audit(233.130:1405): avc: denied { create } for pid=4992 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.278285][ T31] audit: type=1400 audit(233.190:1406): avc: denied { ioctl } for pid=4994 comm="syz.0.311" path="socket:[4511]" dev="sockfs" ino=4511 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.607027][ T31] audit: type=1400 audit(233.520:1407): avc: denied { sys_module } for pid=4994 comm="syz.0.311" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 233.747973][ T31] audit: type=1400 audit(233.660:1408): avc: denied { allowed } for pid=4998 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 233.795064][ T31] audit: type=1400 audit(233.710:1409): avc: denied { create } for pid=4998 comm="syz.1.312" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 233.797043][ T31] audit: type=1400 audit(233.710:1410): avc: denied { map } for pid=4998 comm="syz.1.312" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5288 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 233.798965][ T31] audit: type=1400 audit(233.710:1411): avc: denied { read write } for pid=4998 comm="syz.1.312" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5288 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 233.968648][ T31] audit: type=1400 audit(233.880:1412): avc: denied { sqpoll } for pid=4994 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 235.338843][ T5016] fuse: Unknown parameter 'fd0x0000000000000004' [ 236.225582][ T31] audit: type=1400 audit(236.140:1413): avc: denied { write } for pid=5027 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 236.234924][ T31] audit: type=1400 audit(236.150:1414): avc: denied { read } for pid=5027 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 237.276562][ T5040] fuse: Unknown parameter 'fd0x0000000000000004' [ 237.607646][ T5042] netlink: 14 bytes leftover after parsing attributes in process `syz.1.319'. [ 239.648031][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 239.649048][ T31] audit: type=1400 audit(239.550:1417): avc: denied { write } for pid=5049 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 240.399378][ T5057] fuse: Unknown parameter 'fd0x0000000000000004' [ 241.004857][ T31] audit: type=1400 audit(240.900:1418): avc: denied { execmem } for pid=5060 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 241.327143][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 241.329549][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.330669][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.339808][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.340310][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 241.340673][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.341012][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.341341][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.341670][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.341987][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x4 [ 241.348851][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.350120][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.351269][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 241.352936][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.354036][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.355128][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.356339][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.357583][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.360001][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.360967][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.362048][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.371126][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.371596][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.371936][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.374460][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.374900][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.375251][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.375614][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.375939][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.376394][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.376836][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.377164][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.377485][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.377811][ T5053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 241.378193][ T5053] hid-generic 0000:0000:0000.0001: item fetching failed at offset 41/43 [ 241.379181][ T5053] hid-generic 0000:0000:0000.0001: probe with driver hid-generic failed with error -22 [ 241.974166][ T5069] netlink: 'syz.0.327': attribute type 39 has an invalid length. [ 247.406282][ T31] audit: type=1400 audit(247.320:1419): avc: denied { setopt } for pid=5091 comm="syz.0.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 251.034922][ T31] audit: type=1400 audit(250.950:1420): avc: denied { create } for pid=5122 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 251.041045][ T31] audit: type=1400 audit(250.950:1421): avc: denied { connect } for pid=5122 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 251.536136][ T31] audit: type=1400 audit(251.450:1422): avc: denied { mount } for pid=5128 comm="syz.0.338" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 253.910133][ T31] audit: type=1400 audit(253.820:1423): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 257.073327][ T31] audit: type=1326 audit(256.980:1424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.075550][ T31] audit: type=1326 audit(256.980:1425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.078119][ T31] audit: type=1326 audit(256.990:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.080164][ T31] audit: type=1326 audit(256.990:1427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.081846][ T31] audit: type=1326 audit(256.990:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.084697][ T31] audit: type=1326 audit(256.990:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.086595][ T31] audit: type=1326 audit(256.990:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.088653][ T31] audit: type=1326 audit(256.990:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x131f20 code=0x7ffc0000 [ 257.092929][ T31] audit: type=1326 audit(257.000:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5157 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 260.793664][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 260.794032][ T31] audit: type=1326 audit(260.700:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.0.350" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 266.884022][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 266.885738][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 267.142186][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 267.163619][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 267.334054][ T31] audit: type=1326 audit(267.240:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.366621][ T31] audit: type=1326 audit(267.280:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.474675][ T31] audit: type=1326 audit(267.360:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.477038][ T31] audit: type=1326 audit(267.390:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=382 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.477447][ T31] audit: type=1326 audit(267.390:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.486325][ T31] audit: type=1326 audit(267.400:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=237 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.486770][ T31] audit: type=1326 audit(267.400:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.494059][ T31] audit: type=1326 audit(267.410:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.0.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 267.798750][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 267.801041][ T5176] netlink: 20 bytes leftover after parsing attributes in process `syz.0.352'. [ 272.513300][ T31] audit: type=1400 audit(272.420:1443): avc: denied { create } for pid=5192 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 272.513834][ T31] audit: type=1400 audit(272.430:1444): avc: denied { setopt } for pid=5192 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 272.660099][ T31] audit: type=1400 audit(272.570:1445): avc: denied { create } for pid=5194 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 272.670378][ T31] audit: type=1400 audit(272.580:1446): avc: denied { setopt } for pid=5194 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 272.685440][ T31] audit: type=1400 audit(272.600:1447): avc: denied { connect } for pid=5194 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 273.388051][ T31] audit: type=1400 audit(273.300:1448): avc: denied { write } for pid=5200 comm="syz.1.361" name="ipv6_route" dev="proc" ino=4026532797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 275.853207][ T31] audit: type=1326 audit(275.750:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 275.853903][ T31] audit: type=1326 audit(275.750:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 275.865750][ T31] audit: type=1326 audit(275.780:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x131f20 code=0x7ffc0000 [ 275.866790][ T31] audit: type=1326 audit(275.780:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.259274][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 299.259702][ T31] audit: type=1400 audit(299.170:1454): avc: denied { name_bind } for pid=5244 comm="syz.0.368" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 299.264691][ T31] audit: type=1400 audit(299.180:1455): avc: denied { node_bind } for pid=5244 comm="syz.0.368" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 299.736037][ T31] audit: type=1400 audit(299.650:1456): avc: denied { bind } for pid=5246 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 299.767336][ T31] audit: type=1326 audit(299.680:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.768662][ T31] audit: type=1326 audit(299.680:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.777421][ T31] audit: type=1326 audit(299.690:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.779600][ T31] audit: type=1326 audit(299.690:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.802872][ T31] audit: type=1326 audit(299.700:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.803422][ T31] audit: type=1326 audit(299.700:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 299.854086][ T31] audit: type=1326 audit(299.710:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.0.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 300.808207][ T5248] netlink: 'syz.0.369': attribute type 7 has an invalid length. [ 303.004379][ T5250] netlink: 'syz.0.370': attribute type 10 has an invalid length. [ 303.005209][ T5250] netlink: 40 bytes leftover after parsing attributes in process `syz.0.370'. [ 303.005760][ T5250] vxcan0: entered promiscuous mode [ 303.008004][ T5250] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 305.649522][ T31] kauditd_printk_skb: 228 callbacks suppressed [ 305.649965][ T31] audit: type=1326 audit(305.560:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 305.675732][ T31] audit: type=1326 audit(305.590:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.373" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x131f20 code=0x7ffc0000 [ 305.684373][ T31] audit: type=1326 audit(305.590:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 306.335614][ T31] audit: type=1400 audit(306.250:1695): avc: denied { create } for pid=5259 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 306.443117][ T31] audit: type=1400 audit(306.350:1696): avc: denied { write } for pid=5259 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 306.444920][ T31] audit: type=1400 audit(306.360:1697): avc: denied { nlmsg_write } for pid=5259 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 306.463152][ T5260] netlink: 268 bytes leftover after parsing attributes in process `syz.0.375'. [ 307.176127][ T31] audit: type=1400 audit(307.090:1698): avc: denied { create } for pid=5263 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 316.449071][ T5289] netlink: 8 bytes leftover after parsing attributes in process `syz.0.384'. [ 316.450607][ T5289] netlink: 12 bytes leftover after parsing attributes in process `syz.0.384'. [ 316.678385][ T31] audit: type=1400 audit(316.590:1699): avc: denied { append } for pid=5290 comm="syz.0.385" name="001" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 317.566970][ T31] audit: type=1326 audit(317.480:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.578396][ T31] audit: type=1326 audit(317.490:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.581087][ T31] audit: type=1326 audit(317.490:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.603171][ T31] audit: type=1326 audit(317.490:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.603637][ T31] audit: type=1326 audit(317.510:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.603956][ T31] audit: type=1326 audit(317.510:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.604073][ T31] audit: type=1326 audit(317.510:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.604203][ T31] audit: type=1326 audit(317.520:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 317.625537][ T31] audit: type=1326 audit(317.540:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5296 comm="syz.0.388" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 326.193904][ T5307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 326.225390][ T5307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.395380][ T5307] hsr_slave_0: entered promiscuous mode [ 329.398788][ T5307] hsr_slave_1: entered promiscuous mode [ 329.408011][ T5307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 329.429774][ T5307] Cannot create hsr debugfs directory [ 330.275087][ T5307] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 330.322135][ T5307] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 330.335655][ T5307] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 330.365034][ T5307] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 332.008788][ T5307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.824940][ T5307] veth0_vlan: entered promiscuous mode [ 340.883204][ T5307] veth1_vlan: entered promiscuous mode [ 340.987407][ T5307] veth0_macvtap: entered promiscuous mode [ 341.008365][ T5307] veth1_macvtap: entered promiscuous mode [ 341.118021][ T5307] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.123877][ T5307] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.125032][ T5307] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.133168][ T5307] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.290698][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 341.291061][ T31] audit: type=1400 audit(341.200:1720): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.uRBlFQ/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 341.305246][ T31] audit: type=1400 audit(341.220:1721): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 341.307840][ T31] audit: type=1400 audit(341.220:1722): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.uRBlFQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 341.313132][ T31] audit: type=1400 audit(341.220:1723): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 341.327053][ T31] audit: type=1400 audit(341.240:1724): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.uRBlFQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 341.329237][ T31] audit: type=1400 audit(341.240:1725): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.uRBlFQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6110 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 341.353575][ T31] audit: type=1400 audit(341.260:1726): avc: denied { unmount } for pid=5307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 341.365357][ T31] audit: type=1400 audit(341.280:1727): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 341.376430][ T31] audit: type=1400 audit(341.290:1728): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="gadgetfs" ino=2350 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 341.384941][ T31] audit: type=1400 audit(341.300:1729): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 346.417050][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 346.417623][ T31] audit: type=1326 audit(346.330:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.418022][ T31] audit: type=1326 audit(346.330:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.445231][ T31] audit: type=1326 audit(346.330:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.445812][ T31] audit: type=1326 audit(346.350:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.455514][ T31] audit: type=1326 audit(346.370:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.478304][ T31] audit: type=1326 audit(346.390:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.525302][ T31] audit: type=1326 audit(346.440:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.535353][ T31] audit: type=1326 audit(346.450:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.536021][ T31] audit: type=1326 audit(346.450:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 346.536455][ T31] audit: type=1326 audit(346.450:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5699 comm="syz.2.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 360.140646][ T5704] netlink: 28 bytes leftover after parsing attributes in process `syz.0.405'. [ 367.864738][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 367.865094][ T31] audit: type=1400 audit(367.780:1762): avc: denied { write } for pid=5718 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 367.865477][ T31] audit: type=1400 audit(367.780:1763): avc: denied { open } for pid=5718 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 367.948868][ T31] audit: type=1400 audit(367.860:1764): avc: denied { search } for pid=5718 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 367.993343][ T31] audit: type=1400 audit(367.900:1765): avc: denied { search } for pid=5718 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 367.993911][ T31] audit: type=1400 audit(367.900:1766): avc: denied { search } for pid=5718 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 367.994016][ T31] audit: type=1400 audit(367.900:1767): avc: denied { search } for pid=5718 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 368.058778][ T31] audit: type=1400 audit(367.970:1768): avc: denied { read open } for pid=5723 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 368.059497][ T31] audit: type=1400 audit(367.970:1769): avc: denied { getattr } for pid=5723 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 368.269177][ T31] audit: type=1400 audit(368.180:1770): avc: denied { add_name } for pid=5718 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 368.303614][ T31] audit: type=1400 audit(368.210:1771): avc: denied { create } for pid=5718 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 369.495759][ T5730] netlink: 24 bytes leftover after parsing attributes in process `syz.0.415'. [ 372.879617][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 372.879997][ T31] audit: type=1400 audit(372.790:1813): avc: denied { write } for pid=5752 comm="syz.2.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 373.839337][ T31] audit: type=1326 audit(373.750:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 373.843777][ T31] audit: type=1326 audit(373.760:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x131f20 code=0x7ffc0000 [ 373.867188][ T31] audit: type=1326 audit(373.780:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15f9d4 code=0x7ffc0000 [ 373.875874][ T31] audit: type=1326 audit(373.790:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 373.889523][ T31] audit: type=1326 audit(373.800:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x131f20 code=0x7ffc0000 [ 373.905777][ T31] audit: type=1326 audit(373.820:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef158 code=0x7ffc0000 [ 373.925108][ T31] audit: type=1326 audit(373.840:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 373.926712][ T31] audit: type=1326 audit(373.840:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5780 comm="syz.0.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 375.918848][ T5799] fuse: Bad value for 'fd' [ 376.155765][ T5798] vlan2: entered promiscuous mode [ 376.173636][ T5798] vlan2: entered allmulticast mode [ 376.173988][ T5798] veth1_vlan: entered allmulticast mode [ 376.461417][ T5798] netlink: 4 bytes leftover after parsing attributes in process `syz.0.436'. [ 376.581453][ T5798] hsr_slave_1 (unregistering): left promiscuous mode [ 377.633508][ T31] audit: type=1326 audit(377.540:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5817 comm="syz.0.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.899050][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 377.899442][ T31] audit: type=1326 audit(377.810:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.899836][ T31] audit: type=1326 audit(377.810:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.942877][ T31] audit: type=1326 audit(377.850:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.943500][ T31] audit: type=1326 audit(377.850:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.964625][ T31] audit: type=1326 audit(377.870:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.967275][ T31] audit: type=1326 audit(377.880:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.970100][ T31] audit: type=1326 audit(377.880:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.972754][ T31] audit: type=1326 audit(377.880:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 377.978693][ T31] audit: type=1326 audit(377.890:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5818 comm="syz.2.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 379.165418][ T5828] fuse: Unknown parameter '0x0000000000000003' [ 379.974676][ T31] audit: type=1400 audit(379.890:1842): avc: denied { create } for pid=5830 comm="syz.2.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 380.028499][ T5831] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 380.653823][ T5838] fuse: Unknown parameter '0x0000000000000003' [ 383.239179][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 383.239693][ T31] audit: type=1400 audit(383.150:1850): avc: denied { create } for pid=5857 comm="syz.2.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 383.255183][ T31] audit: type=1400 audit(383.170:1851): avc: denied { bind } for pid=5857 comm="syz.2.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 383.355588][ T5861] fuse: Unknown parameter '0x0000000000000003' [ 383.776225][ T31] audit: type=1400 audit(383.690:1852): avc: denied { setopt } for pid=5857 comm="syz.2.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 383.779806][ T31] audit: type=1400 audit(383.690:1853): avc: denied { accept } for pid=5857 comm="syz.2.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 385.056990][ T31] audit: type=1400 audit(384.970:1854): avc: denied { read } for pid=5873 comm="syz.2.460" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 385.668463][ T31] audit: type=1400 audit(385.580:1855): avc: denied { ioctl } for pid=5879 comm="syz.0.461" path="socket:[4940]" dev="sockfs" ino=4940 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 386.881404][ T5893] fuse: Unknown parameter '0x0000000000000003' [ 387.167332][ T31] audit: type=1400 audit(387.080:1856): avc: denied { connect } for pid=5879 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 387.173639][ T31] audit: type=1400 audit(387.090:1857): avc: denied { setopt } for pid=5879 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 387.936828][ T31] audit: type=1400 audit(387.850:1858): avc: denied { bind } for pid=5901 comm="syz.0.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 388.023076][ T31] audit: type=1400 audit(387.920:1859): avc: denied { listen } for pid=5901 comm="syz.0.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 388.390472][ T5904] fuse: Unknown parameter '0x0000000000000003' [ 389.574967][ T5917] fuse: Unknown parameter '0x0000000000000003' [ 389.914256][ T5919] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 391.395655][ T31] audit: type=1400 audit(391.310:1860): avc: denied { bind } for pid=5924 comm="syz.0.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 392.107026][ T5933] fuse: Unknown parameter 'fd0x0000000000000003' [ 392.641643][ T5935] (unnamed net_device) (uninitialized): option arp_interval: mode dependency failed, not supported in mode 802.3ad(4) [ 394.286678][ T31] audit: type=1400 audit(394.200:1861): avc: denied { name_bind } for pid=5948 comm="syz.0.485" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 396.336377][ T31] audit: type=1400 audit(396.250:1862): avc: denied { write } for pid=5964 comm="syz.0.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 396.777327][ T5970] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.490'. [ 396.786830][ T31] audit: type=1400 audit(396.700:1863): avc: denied { write } for pid=5968 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 396.804517][ T5967] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.490'. [ 396.810963][ T5969] trusted_key: syz.0.491 sent an empty control message without MSG_MORE. [ 396.813656][ T5967] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.490'. [ 396.893207][ T31] audit: type=1400 audit(396.800:1864): avc: denied { read } for pid=5968 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 398.280645][ T31] audit: type=1400 audit(398.190:1865): avc: denied { write } for pid=5980 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 398.362205][ T31] audit: type=1400 audit(398.270:1866): avc: denied { ioctl } for pid=5982 comm="syz.0.496" path="socket:[6605]" dev="sockfs" ino=6605 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 399.304357][ T5987] netlink: 8 bytes leftover after parsing attributes in process `syz.0.498'. [ 399.304988][ T5987] bridge_slave_1: default FDB implementation only supports local addresses [ 401.136871][ T31] audit: type=1400 audit(401.040:1867): avc: denied { setopt } for pid=5995 comm="syz.2.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 401.138830][ T5997] netlink: 4 bytes leftover after parsing attributes in process `syz.2.503'. [ 402.475661][ T31] audit: type=1400 audit(402.390:1868): avc: denied { getopt } for pid=6007 comm="syz.2.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 402.509758][ T6008] netlink: 44 bytes leftover after parsing attributes in process `syz.0.506'. [ 412.791951][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.956404][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.145852][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.240838][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 414.455998][ T12] bond0 (unregistering): Released all slaves [ 414.466345][ T12] bond1 (unregistering): Released all slaves [ 414.525849][ T12] hsr_slave_0: left promiscuous mode [ 414.527477][ T12] hsr_slave_1: left promiscuous mode [ 414.530689][ T12] veth1_macvtap: left promiscuous mode [ 414.531226][ T12] veth0_macvtap: left promiscuous mode [ 460.521310][ T6163] fuse: Invalid rootmode [ 460.673788][ T31] audit: type=1400 audit(460.580:1869): avc: denied { connect } for pid=6166 comm="syz.2.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 460.681716][ T6167] netlink: 4 bytes leftover after parsing attributes in process `syz.2.530'. [ 461.426152][ T31] audit: type=1400 audit(461.340:1870): avc: denied { name_bind } for pid=6175 comm="syz.2.532" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 462.955666][ T31] audit: type=1400 audit(462.870:1871): avc: denied { unmount } for pid=6178 comm="syz.2.533" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 463.506011][ T31] audit: type=1400 audit(463.420:1872): avc: denied { execute } for pid=6188 comm="syz.2.538" dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 463.514649][ T6189] process 'syz.2.538' launched '/dev/fd/5' with NULL argv: empty string added [ 463.524497][ T31] audit: type=1400 audit(463.430:1873): avc: denied { execute_no_trans } for pid=6188 comm="syz.2.538" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 465.775048][ T31] audit: type=1400 audit(465.690:1874): avc: denied { read } for pid=6207 comm="syz.0.544" path="socket:[7423]" dev="sockfs" ino=7423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 467.554192][ T6218] netlink: 172 bytes leftover after parsing attributes in process `syz.2.547'. [ 474.632876][ T31] audit: type=1400 audit(474.540:1875): avc: denied { read } for pid=6219 comm="syz.2.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 488.719384][ T6264] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 488.721619][ T6264] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 492.246609][ T31] audit: type=1400 audit(492.160:1876): avc: denied { execute } for pid=6280 comm="syz.2.571" path="/dev/loop6" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 493.473064][ T4685] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 493.635937][ T4685] usb 1-1: too many configurations: 9, using maximum allowed: 8 [ 493.642004][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.642883][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.643064][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.676632][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.677009][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.677221][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.713021][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.713382][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.713663][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.746218][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.746619][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.746844][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.756746][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.757080][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.757276][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.762010][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.762721][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.762803][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.790384][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.790763][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.790975][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.799294][ T4685] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 493.799594][ T4685] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 493.799800][ T4685] usb 1-1: config 0 interface 0 has no altsetting 0 [ 493.813725][ T4685] usb 1-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 493.814055][ T4685] usb 1-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 493.814265][ T4685] usb 1-1: Product: syz [ 493.814409][ T4685] usb 1-1: Manufacturer: syz [ 493.814512][ T4685] usb 1-1: SerialNumber: syz [ 493.834128][ T4685] usb 1-1: config 0 descriptor?? [ 493.874219][ T4685] yurex 1-1:0.0: USB YUREX device now attached to Yurex #0 [ 494.097182][ T4685] usb 1-1: USB disconnect, device number 3 [ 494.101012][ T4685] yurex 1-1:0.0: USB YUREX #0 now disconnected [ 495.110151][ T6311] netlink: 8 bytes leftover after parsing attributes in process `syz.2.576'. [ 495.143037][ T6311] netlink: 24 bytes leftover after parsing attributes in process `syz.2.576'. [ 495.143555][ T6311] netlink: 24 bytes leftover after parsing attributes in process `syz.2.576'. [ 504.164284][ T31] audit: type=1400 audit(504.070:1877): avc: denied { read } for pid=6346 comm="syz.2.584" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 504.164880][ T31] audit: type=1400 audit(504.070:1878): avc: denied { open } for pid=6346 comm="syz.2.584" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 504.219290][ T6347] binder: 6346:6347 ioctl c0306201 0 returned -14 [ 504.223524][ T31] audit: type=1400 audit(504.130:1879): avc: denied { ioctl } for pid=6346 comm="syz.2.584" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 525.779517][ T31] audit: type=1326 audit(525.690:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.781391][ T31] audit: type=1326 audit(525.690:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.787102][ T31] audit: type=1326 audit(525.700:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.788535][ T31] audit: type=1326 audit(525.700:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.793722][ T31] audit: type=1326 audit(525.710:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.798765][ T31] audit: type=1326 audit(525.710:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.799149][ T31] audit: type=1326 audit(525.710:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.799286][ T31] audit: type=1326 audit(525.710:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.806090][ T31] audit: type=1326 audit(525.720:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131f20 code=0x7ffc0000 [ 525.815962][ T31] audit: type=1326 audit(525.730:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 527.578961][ T6376] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 532.968352][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 532.968726][ T31] audit: type=1400 audit(532.880:1901): avc: denied { create } for pid=6383 comm="syz.2.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 532.977099][ T31] audit: type=1400 audit(532.890:1902): avc: denied { ioctl } for pid=6383 comm="syz.2.595" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7097 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 540.977364][ T31] audit: type=1400 audit(540.890:1903): avc: denied { create } for pid=6394 comm="syz.2.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 541.276867][ T31] audit: type=1400 audit(541.190:1904): avc: denied { map } for pid=6399 comm="syz.0.601" path="/dev/audio1" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 541.277300][ T31] audit: type=1400 audit(541.190:1905): avc: denied { execute } for pid=6399 comm="syz.0.601" path="/dev/audio1" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.923131][ T4191] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 543.093174][ T4191] usb 1-1: Using ep0 maxpacket: 32 [ 543.116488][ T4191] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 543.117825][ T4191] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 543.119116][ T4191] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 543.120431][ T4191] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 543.147170][ T4191] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 543.148419][ T4191] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 543.149458][ T4191] usb 1-1: Product: syz [ 543.150192][ T4191] usb 1-1: Manufacturer: syz [ 543.150953][ T4191] usb 1-1: SerialNumber: syz [ 543.428946][ T4191] usb 1-1: USB disconnect, device number 4 [ 548.457763][ T6455] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 567.557754][ T31] audit: type=1400 audit(567.470:1906): avc: denied { append } for pid=6503 comm="syz.2.623" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.903697][ T6541] netlink: 8 bytes leftover after parsing attributes in process `syz.2.630'. [ 572.233992][ T31] audit: type=1400 audit(572.120:1907): avc: denied { remount } for pid=6542 comm="syz.2.631" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 573.358503][ T6559] input: syz0 as /devices/virtual/input/input3 [ 576.916227][ T6583] netlink: 16 bytes leftover after parsing attributes in process `syz.2.645'. [ 576.926232][ T6583] netlink: 16 bytes leftover after parsing attributes in process `syz.2.645'. [ 582.973665][ T6585] netlink: 'syz.0.646': attribute type 39 has an invalid length. [ 583.191545][ T31] audit: type=1400 audit(583.100:1908): avc: denied { getopt } for pid=6586 comm="syz.0.647" laddr=fe80::a8aa:aaff:feaa:aa16 lport=255 faddr=ff02::1 fport=19997 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 584.250365][ T31] audit: type=1400 audit(584.160:1909): avc: denied { ioctl } for pid=6594 comm="syz.2.651" path="socket:[7772]" dev="sockfs" ino=7772 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 585.199245][ T6605] netlink: 666 bytes leftover after parsing attributes in process `syz.2.654'. [ 585.686921][ T6611] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 585.690126][ T6611] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 593.201992][ T31] audit: type=1400 audit(593.110:1910): avc: denied { create } for pid=6630 comm="syz.2.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 609.287722][ T6667] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 609.288570][ T6667] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 609.588998][ T31] audit: type=1400 audit(609.500:1911): avc: denied { create } for pid=6670 comm="syz.2.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 609.596985][ T31] audit: type=1400 audit(609.510:1912): avc: denied { write } for pid=6670 comm="syz.2.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 609.684146][ T6673] netlink: 56 bytes leftover after parsing attributes in process `syz.2.673'. [ 610.144518][ T31] audit: type=1400 audit(610.060:1913): avc: denied { getopt } for pid=6679 comm="syz.2.675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 619.746820][ T6690] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 619.754628][ T6690] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 621.393386][ T6701] syzkaller0: entered promiscuous mode [ 621.394369][ T6701] syzkaller0: entered allmulticast mode [ 630.401625][ T4629] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 630.677682][ T4629] usb 1-1: New USB device found, idVendor=20b7, idProduct=1540, bcdDevice=b7.5a [ 630.678865][ T4629] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 630.680233][ T4629] usb 1-1: Product: syz [ 630.681062][ T4629] usb 1-1: Manufacturer: syz [ 630.681812][ T4629] usb 1-1: SerialNumber: syz [ 630.696036][ T4629] usb 1-1: config 0 descriptor?? [ 638.497211][ T31] audit: type=1400 audit(638.410:1914): avc: denied { unmount } for pid=5307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 638.609352][ T6757] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 638.615221][ T6757] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 639.362075][ T31] audit: type=1400 audit(639.270:1915): avc: denied { accept } for pid=6771 comm="syz.2.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 639.496657][ T6774] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 639.498157][ T6774] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 640.723154][ T6782] input: syz0 as /devices/virtual/input/input4 [ 640.828782][ T6788] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 640.831244][ T6788] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 640.930250][ T4629] usb 1-1: USB disconnect, device number 5 [ 653.263119][ T31] audit: type=1400 audit(653.170:1916): avc: denied { map } for pid=6823 comm="syz.0.714" path="socket:[8013]" dev="sockfs" ino=8013 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 653.273240][ T31] audit: type=1400 audit(653.180:1917): avc: denied { read } for pid=6823 comm="syz.0.714" path="socket:[8013]" dev="sockfs" ino=8013 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 661.764287][ T6852] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 661.766038][ T6852] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 675.127521][ T31] audit: type=1400 audit(675.040:1918): avc: denied { read write } for pid=6878 comm="syz.2.728" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 675.129860][ T31] audit: type=1400 audit(675.040:1919): avc: denied { open } for pid=6878 comm="syz.2.728" path="/210/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 675.778857][ T6884] ALSA: seq fatal error: cannot create timer (-19) [ 675.964936][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.2.730'. [ 682.914398][ T6915] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.926837][ T6915] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.793472][ T31] audit: type=1326 audit(684.700:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6918 comm="syz.2.741" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 701.704444][ T6939] binder: 6938:6939 ioctl 40046205 0 returned -22 [ 705.115259][ T31] audit: type=1400 audit(705.030:1921): avc: denied { write } for pid=6959 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 714.894118][ T7006] gretap0: entered promiscuous mode [ 714.898629][ T7006] gretap0: left promiscuous mode [ 716.806595][ T7025] netlink: 20 bytes leftover after parsing attributes in process `syz.2.775'. [ 720.254327][ T7030] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 720.255622][ T7030] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 734.628458][ T7038] "syz.2.779" (7038) uses obsolete ecb(arc4) skcipher [ 734.975204][ T7043] geneve2: entered promiscuous mode [ 740.993274][ T31] audit: type=1400 audit(740.880:1922): avc: denied { bind } for pid=7059 comm="syz.0.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 741.599338][ T7062] IPv6: NLM_F_CREATE should be specified when creating new route [ 756.163271][ T4987] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 756.427934][ T4987] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 756.428342][ T4987] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 756.428558][ T4987] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 756.429147][ T4987] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 756.545952][ T4987] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 756.546526][ T4987] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 756.546955][ T4987] usb 1-1: Product: syz [ 756.547080][ T4987] usb 1-1: Manufacturer: syz [ 756.567599][ T4987] cdc_wdm 1-1:1.0: skipping garbage [ 756.567840][ T4987] cdc_wdm 1-1:1.0: skipping garbage [ 756.568137][ T4987] cdc_wdm 1-1:1.0: probe with driver cdc_wdm failed with error -22 [ 776.026014][ T4987] usb 1-1: USB disconnect, device number 6 [ 777.342969][ T4987] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 777.534665][ T4987] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 777.544886][ T4987] usb 1-1: New USB device found, idVendor=1781, idProduct=0938, bcdDevice=9b.49 [ 777.545208][ T4987] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 777.545461][ T4987] usb 1-1: Product: syz [ 777.545532][ T4987] usb 1-1: Manufacturer: syz [ 777.545604][ T4987] usb 1-1: SerialNumber: syz [ 777.548980][ T4987] usb 1-1: config 0 descriptor?? [ 777.785409][ T4987] usb 1-1: USB disconnect, device number 7 [ 779.210594][ T31] audit: type=1400 audit(779.120:1923): avc: denied { bind } for pid=7152 comm="syz.0.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 793.529927][ T31] audit: type=1400 audit(793.440:1924): avc: denied { create } for pid=7186 comm="syz.2.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 793.539153][ T31] audit: type=1400 audit(793.450:1925): avc: denied { ioctl } for pid=7186 comm="syz.2.818" path="socket:[9465]" dev="sockfs" ino=9465 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 808.073101][ T31] audit: type=1400 audit(807.980:1926): avc: denied { set_context_mgr } for pid=7211 comm="syz.2.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 808.147661][ T31] audit: type=1400 audit(808.060:1927): avc: denied { write } for pid=7211 comm="syz.2.825" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.168652][ T31] audit: type=1400 audit(808.060:1928): avc: denied { map } for pid=7211 comm="syz.2.825" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.264481][ T31] audit: type=1400 audit(808.180:1929): avc: denied { call } for pid=7211 comm="syz.2.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 809.156687][ T31] audit: type=1400 audit(809.070:1930): avc: denied { map } for pid=7218 comm="syz.2.827" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.159169][ T31] audit: type=1400 audit(809.070:1931): avc: denied { execute } for pid=7218 comm="syz.2.827" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 817.303097][ T7228] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 817.306005][ T7228] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 817.407012][ T7232] netlink: 4 bytes leftover after parsing attributes in process `syz.2.831'. [ 817.409090][ T7232] netlink: 4 bytes leftover after parsing attributes in process `syz.2.831'. [ 817.410418][ T7232] netlink: 3 bytes leftover after parsing attributes in process `syz.2.831'. [ 837.973155][ T7289] netlink: 12 bytes leftover after parsing attributes in process `syz.0.842'. [ 840.500214][ T31] audit: type=1400 audit(840.410:1932): avc: denied { mount } for pid=7290 comm="syz.2.843" name="/" dev="ramfs" ino=9622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 849.412943][ T4191] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 849.569794][ T4191] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 849.570160][ T4191] usb 1-1: New USB device found, idVendor=056a, idProduct=0307, bcdDevice= 0.00 [ 849.570650][ T4191] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 849.576508][ T4191] usb 1-1: config 0 descriptor?? [ 864.865260][ T7333] syzkaller0: entered promiscuous mode [ 864.865672][ T7333] syzkaller0: entered allmulticast mode [ 864.880820][ T31] audit: type=1400 audit(864.790:1933): avc: denied { relabelfrom } for pid=7332 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 864.884834][ T31] audit: type=1400 audit(864.790:1934): avc: denied { relabelto } for pid=7332 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 869.693706][ T4972] usb 1-1: USB disconnect, device number 8 [ 877.721617][ T7378] netlink: 4 bytes leftover after parsing attributes in process `syz.2.866'. [ 879.647762][ T7389] netlink: 'syz.0.863': attribute type 1 has an invalid length. [ 887.538991][ T31] audit: type=1326 audit(887.450:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.548630][ T31] audit: type=1326 audit(887.450:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.556767][ T31] audit: type=1326 audit(887.470:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.567973][ T31] audit: type=1326 audit(887.480:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.574801][ T31] audit: type=1326 audit(887.490:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.592902][ T31] audit: type=1326 audit(887.500:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 887.593498][ T31] audit: type=1326 audit(887.500:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 887.593790][ T31] audit: type=1326 audit(887.500:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 887.593890][ T31] audit: type=1326 audit(887.500:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 887.593965][ T31] audit: type=1326 audit(887.500:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.2.870" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 902.094451][ T7451] netlink: 'syz.0.878': attribute type 10 has an invalid length. [ 920.294534][ T7485] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 920.298108][ T7485] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 920.887039][ T5537] ------------[ cut here ]------------ [ 920.887883][ T5537] WARNING: CPU: 1 PID: 5537 at ./include/net/netdev_lock.h:72 __linkwatch_sync_dev+0xac/0xb0 [ 920.889369][ T5537] RTNL: assertion failed at ./include/net/netdev_lock.h (72) [ 920.890009][ T5537] Modules linked in: [ 920.890995][ T5537] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 920.892967][ T5537] CPU: 1 UID: 0 PID: 5537 Comm: kworker/u8:1 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT [ 920.897367][ T5537] Hardware name: ARM-Versatile Express [ 920.898572][ T5537] Workqueue: bond0 bond_mii_monitor [ 920.899209][ T5537] Call trace: [ 920.899746][ T5537] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 920.900352][ T5537] r7:00000000 r6:8282083c r5:00000000 r4:82259b04 [ 920.900682][ T5537] [<80201ae4>] (show_stack) from [<8021fdd8>] (dump_stack_lvl+0x54/0x7c) [ 920.900981][ T5537] [<8021fd84>] (dump_stack_lvl) from [<8021fe18>] (dump_stack+0x18/0x1c) [ 920.901490][ T5537] r5:00000000 r4:82a6dd18 [ 920.901716][ T5537] [<8021fe00>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 920.902049][ T5537] [<802024f4>] (panic) from [<802585b8>] (get_taint+0x0/0x1c) [ 920.902531][ T5537] r3:8280c684 r2:00000001 r1:82240630 r0:82247fe0 [ 920.902841][ T5537] r7:8158085c [ 920.903313][ T5537] [<80258544>] (check_panic_on_warn) from [<8025871c>] (__warn+0x80/0x188) [ 920.908879][ T5537] [<8025869c>] (__warn) from [<80258a0c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 920.909714][ T5537] r8:00000009 r7:824209e4 r6:e0095dc4 r5:84943c00 r4:00000000 [ 920.910118][ T5537] [<80258828>] (warn_slowpath_fmt) from [<8158085c>] (__linkwatch_sync_dev+0xac/0xb0) [ 920.912675][ T5537] r10:00000000 r9:00000000 r8:ffffffff r7:850176c0 r6:81d78dd4 r5:00000000 [ 920.918593][ T5537] r4:85aad800 [ 920.920594][ T5537] [<815807b0>] (__linkwatch_sync_dev) from [<8166052c>] (ethtool_op_get_link+0x14/0x24) [ 920.921279][ T5537] r4:85aad800 [ 920.921469][ T5537] [<81660518>] (ethtool_op_get_link) from [<80cd9c9c>] (bond_check_dev_link+0x138/0x1e8) [ 920.921916][ T5537] r5:00000000 r4:85aad800 [ 920.922093][ T5537] [<80cd9b64>] (bond_check_dev_link) from [<80cdfb40>] (bond_mii_monitor+0xbc/0x8f0) [ 920.922592][ T5537] r7:850176c0 r6:00000000 r5:85017970 r4:8541ac00 [ 920.922945][ T5537] [<80cdfa84>] (bond_mii_monitor) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4) [ 920.923362][ T5537] r10:84bf0670 r9:84bfb005 r8:84943c00 r7:8300e600 r6:84bfb000 r5:85017970 [ 920.923746][ T5537] r4:8599f000 [ 920.924043][ T5537] [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8) [ 920.924435][ T5537] r10:61c88647 r9:84943c00 r8:8599f02c r7:82804d40 r6:8300e600 r5:8300e620 [ 920.924746][ T5537] r4:8599f000 [ 920.924898][ T5537] [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280) [ 920.925244][ T5537] r10:00000000 r9:8599f000 r8:8027ed34 r7:ec3b9e60 r6:8523dd80 r5:84943c00 [ 920.926643][ T5537] r4:00000001 [ 920.926816][ T5537] [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 920.927350][ T5537] Exception stack(0xe0095fb0 to 0xe0095ff8) [ 920.927833][ T5537] 5fa0: 00000000 00000000 00000000 00000000 [ 920.928239][ T5537] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 920.928579][ T5537] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 920.928913][ T5537] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [ 920.929262][ T5537] r4:8599d100 [ 920.932193][ T5537] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:41:32 Registers: info registers vcpu 0 CPU#0 R00=829bba00 R01=82406bec R02=64d99110 R03=81a257e0 R04=82ab22c0 R05=3445f000 R06=0002ce2e R07=000000d6 R08=dddc6130 R09=dddc6180 R10=64d99110 R11=df801e74 R12=df801e78 R13=df801e68 R14=812da18c R15=81a257f0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84113c40 R01=0000002e R02=eb075000 R03=eb075018 R04=82ab113b R05=84113c40 R06=80a7190c R07=82ab115a R08=82828458 R09=00000000 R10=00000673 R11=e0095aac R12=00000002 R13=e0095aa0 R14=8295a0fc R15=80a7191c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000