last executing test programs: 4m50.88991425s ago: executing program 1 (id=2): syz_usb_connect(0x1, 0x2d, &(0x7f00000006c0)=ANY=[@ANYBLOB="1201000009a65d0860040800dee20102030109021b0500000000000904"], &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 4m47.13726472s ago: executing program 1 (id=7): r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000001, 0x12, r1, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req3={0x8, 0x3, 0x6, 0x552, 0x0, 0x1000, 0x5}, 0x1c) 4m45.848535886s ago: executing program 1 (id=8): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x4}}]}, 0x30}}, 0x44080) sendmsg$nl_route_sched(r0, 0x0, 0xc010) 4m45.065491299s ago: executing program 1 (id=9): mkdir(&(0x7f0000000140)='./control\x00', 0x8) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) rmdir(&(0x7f0000000280)='./control\x00') 4m23.054559197s ago: executing program 1 (id=11): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000000000040b11837000000000000010902240001000000000904000001030000000921020000012207000905810300"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0xa, {[@global=@item_4={0x3, 0x1, 0x8, "7fea38bc"}, @main=@item_4={0x3, 0x0, 0xb, "02970764"}]}}, 0x0}, 0x0) 4m22.672624282s ago: executing program 1 (id=12): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r6, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0xc, 0x2, [@TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x38}}, 0x44080) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0xc010) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 3m36.616689274s ago: executing program 32 (id=12): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r6, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0xc, 0x2, [@TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x38}}, 0x44080) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0xc010) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 14.314623636s ago: executing program 0 (id=207): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xfffffffc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2, 0x4}, 0x10) sendmmsg(r2, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r4 = dup3(r3, r2, 0x0) recvmmsg(r4, &(0x7f0000008840)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1}, 0xffffffff}], 0x1, 0x40000001, 0x0) 12.809218377s ago: executing program 0 (id=209): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="100000000700df"], 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x10) 12.178135739s ago: executing program 0 (id=211): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7fffbfff, @empty, 0x9}, {0xa, 0x0, 0x7f, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, r1, 0x400}}, 0x48) 11.446696097s ago: executing program 0 (id=212): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 10.719845785s ago: executing program 2 (id=214): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000004000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="b8", 0x1ff48}], 0x2}, 0x0) 10.637914761s ago: executing program 0 (id=215): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000760091"], 0xfe33) 8.86474787s ago: executing program 0 (id=216): socket$packet(0x11, 0x3, 0x300) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1c, r4, 0x401, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}}, 0x0) 8.86444858s ago: executing program 33 (id=216): socket$packet(0x11, 0x3, 0x300) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1c, r4, 0x401, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}]}, 0x1c}}, 0x0) 8.630516785s ago: executing program 2 (id=217): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, 0x0, 0x0) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8003}, &(0x7f0000000240), &(0x7f0000000200)) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 7.667961139s ago: executing program 2 (id=218): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x9, 0x1002, &(0x7f0000002500)=""/4098, 0x41000}, 0x94) 6.562951403s ago: executing program 2 (id=219): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 5.186061585s ago: executing program 2 (id=221): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) 82.859635ms ago: executing program 2 (id=222): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r0, 0x25, &(0x7f00000000c0)={0x2, 0x0, 0x543117df}) 0s ago: executing program 34 (id=222): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r0, 0x25, &(0x7f00000000c0)={0x2, 0x0, 0x543117df}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:14915' (ED25519) to the list of known hosts. [ 237.804101][ T30] audit: type=1400 audit(237.230:46): avc: denied { name_bind } for pid=3319 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 238.503607][ T30] audit: type=1400 audit(237.930:47): avc: denied { execute } for pid=3320 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 238.515779][ T30] audit: type=1400 audit(237.940:48): avc: denied { execute_no_trans } for pid=3320 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 247.401839][ T30] audit: type=1400 audit(246.830:49): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 247.456374][ T30] audit: type=1400 audit(246.880:50): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.519825][ T3320] cgroup: Unknown subsys name 'net' [ 247.595699][ T30] audit: type=1400 audit(247.030:51): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 248.080652][ T3320] cgroup: Unknown subsys name 'cpuset' [ 248.158006][ T3320] cgroup: Unknown subsys name 'rlimit' [ 248.527505][ T30] audit: type=1400 audit(247.960:52): avc: denied { setattr } for pid=3320 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.539492][ T30] audit: type=1400 audit(247.970:53): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 248.558117][ T30] audit: type=1400 audit(247.990:54): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 249.477514][ T3322] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 249.485809][ T30] audit: type=1400 audit(248.910:55): avc: denied { relabelto } for pid=3322 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.495328][ T30] audit: type=1400 audit(248.920:56): avc: denied { write } for pid=3322 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 249.621990][ T30] audit: type=1400 audit(249.050:57): avc: denied { read } for pid=3320 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.629100][ T30] audit: type=1400 audit(249.060:58): avc: denied { open } for pid=3320 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.671798][ T3320] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 285.160126][ T30] audit: type=1400 audit(284.590:59): avc: denied { execmem } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 285.342057][ T30] audit: type=1400 audit(284.770:60): avc: denied { read } for pid=3325 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.350078][ T30] audit: type=1400 audit(284.780:61): avc: denied { open } for pid=3325 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.414788][ T30] audit: type=1400 audit(284.840:62): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 285.600755][ T30] audit: type=1400 audit(285.030:63): avc: denied { module_request } for pid=3325 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 286.027752][ T30] audit: type=1400 audit(285.460:64): avc: denied { sys_module } for pid=3326 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 294.040289][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.087961][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.205253][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.244278][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.241820][ T3325] hsr_slave_0: entered promiscuous mode [ 298.268641][ T3325] hsr_slave_1: entered promiscuous mode [ 299.976028][ T3326] hsr_slave_0: entered promiscuous mode [ 299.991372][ T3326] hsr_slave_1: entered promiscuous mode [ 300.004511][ T3326] debugfs: 'hsr0' already exists in 'hsr' [ 300.006432][ T3326] Cannot create hsr debugfs directory [ 300.953713][ T30] audit: type=1400 audit(300.380:65): avc: denied { create } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.987873][ T30] audit: type=1400 audit(300.420:66): avc: denied { write } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.996242][ T30] audit: type=1400 audit(300.420:67): avc: denied { read } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 301.169102][ T3325] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 301.330614][ T3325] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 301.467186][ T3325] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 301.601537][ T3325] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 303.004442][ T3326] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 303.095550][ T3326] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 303.169368][ T3326] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 303.272140][ T3326] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 305.653902][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.136701][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.560912][ T3325] veth0_vlan: entered promiscuous mode [ 319.747036][ T3325] veth1_vlan: entered promiscuous mode [ 320.208060][ T3325] veth0_macvtap: entered promiscuous mode [ 320.293451][ T3325] veth1_macvtap: entered promiscuous mode [ 320.850136][ T41] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.851693][ T41] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.930866][ T1103] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 320.955007][ T1103] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.646722][ T30] audit: type=1400 audit(321.080:68): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.a9oOD3/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 321.669737][ T30] audit: type=1400 audit(321.090:69): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 321.704724][ T30] audit: type=1400 audit(321.130:70): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.a9oOD3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 321.738719][ T30] audit: type=1400 audit(321.170:71): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 321.811688][ T30] audit: type=1400 audit(321.240:72): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.a9oOD3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 321.837437][ T30] audit: type=1400 audit(321.270:73): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.a9oOD3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3936 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 321.889247][ T30] audit: type=1400 audit(321.320:74): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 321.929190][ T30] audit: type=1400 audit(321.350:75): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 321.949373][ T30] audit: type=1400 audit(321.370:76): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="gadgetfs" ino=3937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 321.995547][ T30] audit: type=1400 audit(321.430:77): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 322.480990][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 322.936357][ T3326] veth0_vlan: entered promiscuous mode [ 323.108114][ T3326] veth1_vlan: entered promiscuous mode [ 324.081896][ T3326] veth0_macvtap: entered promiscuous mode [ 324.359822][ T3326] veth1_macvtap: entered promiscuous mode [ 325.186645][ T26] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.191321][ T26] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.195154][ T26] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.196962][ T26] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.429640][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 328.437423][ T30] audit: type=1400 audit(327.860:86): avc: denied { create } for pid=3479 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 328.586097][ T30] audit: type=1400 audit(327.990:87): avc: denied { write } for pid=3479 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 329.399624][ T30] audit: type=1400 audit(328.830:88): avc: denied { create } for pid=3481 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 329.430840][ T30] audit: type=1400 audit(328.860:89): avc: denied { write } for pid=3481 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 329.949150][ T30] audit: type=1400 audit(329.380:90): avc: denied { read write } for pid=3478 comm="syz.1.2" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.960585][ T30] audit: type=1400 audit(329.380:91): avc: denied { open } for pid=3478 comm="syz.1.2" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.984031][ T30] audit: type=1400 audit(329.410:92): avc: denied { ioctl } for pid=3478 comm="syz.1.2" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.061174][ T3484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 330.107211][ T3484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 330.994355][ T30] audit: type=1400 audit(330.420:93): avc: denied { prog_load } for pid=3487 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 330.996328][ T30] audit: type=1400 audit(330.420:94): avc: denied { bpf } for pid=3487 comm="syz.0.6" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 330.998151][ T30] audit: type=1400 audit(330.420:95): avc: denied { perfmon } for pid=3487 comm="syz.0.6" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 339.193513][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 339.196263][ T30] audit: type=1400 audit(338.620:99): avc: denied { map_create } for pid=3487 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.224498][ T30] audit: type=1400 audit(338.640:100): avc: denied { map_read map_write } for pid=3487 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.307778][ T30] audit: type=1400 audit(338.740:101): avc: denied { create } for pid=3487 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.341971][ T30] audit: type=1400 audit(338.770:102): avc: denied { setopt } for pid=3487 comm="syz.0.6" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 354.038154][ T30] audit: type=1400 audit(353.470:103): avc: denied { create } for pid=3499 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.088524][ T30] audit: type=1400 audit(353.520:104): avc: denied { write } for pid=3499 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.104251][ T30] audit: type=1400 audit(353.520:105): avc: denied { nlmsg_write } for pid=3499 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 354.863418][ T3502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 354.870066][ T3502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 363.084281][ T3513] Zero length message leads to an empty skb [ 363.183657][ T30] audit: type=1400 audit(362.610:106): avc: denied { name_bind } for pid=3503 comm="syz.1.12" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 363.236747][ T30] audit: type=1400 audit(362.610:107): avc: denied { node_bind } for pid=3503 comm="syz.1.12" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 366.543332][ C0] hrtimer: interrupt took 909856 ns [ 375.910068][ T30] audit: type=1400 audit(375.340:108): avc: denied { prog_run } for pid=3515 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 375.929737][ T3516] Illegal XDP return value 4294967294 on prog (id 1) dev N/A, expect packet loss! [ 378.642258][ T3522] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 378.705395][ T30] audit: type=1400 audit(378.130:109): avc: denied { ioctl } for pid=3521 comm="syz.0.16" path="socket:[4036]" dev="sockfs" ino=4036 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 380.210095][ T30] audit: type=1400 audit(379.630:110): avc: denied { ioctl } for pid=3524 comm="syz.0.17" path="socket:[4043]" dev="sockfs" ino=4043 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 380.676937][ T30] audit: type=1400 audit(380.110:111): avc: denied { create } for pid=3526 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 381.394288][ T30] audit: type=1400 audit(380.810:112): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 382.369142][ T30] audit: type=1326 audit(381.800:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 382.374445][ T30] audit: type=1326 audit(381.800:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 382.386154][ T30] audit: type=1326 audit(381.820:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 382.390367][ T30] audit: type=1326 audit(381.820:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 382.406728][ T30] audit: type=1326 audit(381.840:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=1 ip=0x132320 code=0x7ffc0000 [ 382.416294][ T30] audit: type=1326 audit(381.850:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 382.419774][ T30] audit: type=1326 audit(381.850:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 382.438642][ T30] audit: type=1326 audit(381.870:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3532 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 383.945370][ T30] audit: type=1400 audit(383.380:121): avc: denied { create } for pid=3538 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_xfrm_socket permissive=1 [ 389.635994][ T30] audit: type=1326 audit(389.070:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 389.640490][ T30] audit: type=1326 audit(389.070:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 389.651941][ T30] audit: type=1326 audit(389.080:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 389.663552][ T30] audit: type=1326 audit(389.090:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=1 ip=0x132320 code=0x7ffc0000 [ 389.668650][ T30] audit: type=1326 audit(389.090:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 389.676619][ T30] audit: type=1326 audit(389.090:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 389.690512][ T30] audit: type=1326 audit(389.120:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 389.693918][ T30] audit: type=1326 audit(389.120:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 389.695863][ T30] audit: type=1326 audit(389.120:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 389.698305][ T30] audit: type=1326 audit(389.120:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.0.32" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 390.148182][ T3561] netlink: 4 bytes leftover after parsing attributes in process `syz.0.33'. [ 390.159215][ T3561] netlink: 12 bytes leftover after parsing attributes in process `syz.0.33'. [ 391.088389][ T3564] fuse: Unknown parameter 'grou00000000000000000000' [ 399.173881][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 399.176392][ T30] audit: type=1326 audit(398.590:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 399.186620][ T30] audit: type=1326 audit(398.600:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 399.201305][ T30] audit: type=1326 audit(398.630:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 399.214108][ T30] audit: type=1326 audit(398.630:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 399.215673][ T30] audit: type=1326 audit(398.640:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 399.216173][ T30] audit: type=1326 audit(398.640:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 399.216628][ T30] audit: type=1326 audit(398.640:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 399.217086][ T30] audit: type=1326 audit(398.640:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 399.233197][ T30] audit: type=1326 audit(398.650:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 399.237164][ T30] audit: type=1326 audit(398.670:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3589 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 401.406115][ T3600] netlink: 'syz.0.46': attribute type 12 has an invalid length. [ 405.811989][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 405.823532][ T30] audit: type=1400 audit(405.240:198): avc: denied { allowed } for pid=3616 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 408.036633][ T30] audit: type=1400 audit(407.470:199): avc: denied { create } for pid=3621 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 408.067902][ T30] audit: type=1400 audit(407.500:200): avc: denied { bind } for pid=3621 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 408.170525][ T30] audit: type=1400 audit(407.590:201): avc: denied { write } for pid=3621 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 413.185339][ T30] audit: type=1400 audit(412.610:202): avc: denied { bind } for pid=3634 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 413.194255][ T30] audit: type=1400 audit(412.610:203): avc: denied { node_bind } for pid=3634 comm="syz.0.57" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 413.227142][ T30] audit: type=1400 audit(412.660:204): avc: denied { connect } for pid=3634 comm="syz.0.57" laddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 413.329420][ T30] audit: type=1400 audit(412.760:205): avc: denied { write } for pid=3634 comm="syz.0.57" laddr=172.20.20.187 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 416.715419][ T30] audit: type=1326 audit(416.140:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 416.729820][ T30] audit: type=1326 audit(416.160:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 416.764653][ T30] audit: type=1326 audit(416.200:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 416.767944][ T30] audit: type=1326 audit(416.200:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 416.772037][ T30] audit: type=1326 audit(416.200:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 416.785046][ T30] audit: type=1326 audit(416.220:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3648 comm="syz.0.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 418.934847][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 418.937263][ T30] audit: type=1326 audit(418.310:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 418.953808][ T30] audit: type=1326 audit(418.380:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 418.975416][ T30] audit: type=1326 audit(418.390:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 418.979798][ T30] audit: type=1326 audit(418.410:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 418.994205][ T30] audit: type=1326 audit(418.410:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 418.998205][ T30] audit: type=1326 audit(418.410:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 419.002166][ T30] audit: type=1326 audit(418.410:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 419.022116][ T30] audit: type=1326 audit(418.450:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 419.037845][ T30] audit: type=1326 audit(418.470:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 419.045356][ T30] audit: type=1326 audit(418.470:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3656 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 419.440412][ T3599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 419.587798][ T3599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 424.309175][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 424.309822][ T30] audit: type=1400 audit(423.740:247): avc: denied { execute } for pid=3672 comm="syz.0.69" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 424.317055][ T3673] process 'syz.0.69' launched '/dev/fd/4' with NULL argv: empty string added [ 424.320256][ T30] audit: type=1400 audit(423.750:248): avc: denied { execute_no_trans } for pid=3672 comm="syz.0.69" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 425.794545][ T30] audit: type=1400 audit(425.220:249): avc: denied { create } for pid=3679 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 425.834782][ T30] audit: type=1400 audit(425.270:250): avc: denied { bind } for pid=3679 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 425.861398][ T30] audit: type=1400 audit(425.290:251): avc: denied { listen } for pid=3679 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 425.894395][ T30] audit: type=1400 audit(425.320:252): avc: denied { connect } for pid=3679 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 426.015872][ T30] audit: type=1400 audit(425.450:253): avc: denied { write } for pid=3679 comm="syz.0.71" path="socket:[5315]" dev="sockfs" ino=5315 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 426.857827][ T3599] hsr_slave_0: entered promiscuous mode [ 426.888703][ T3599] hsr_slave_1: entered promiscuous mode [ 426.907409][ T3599] debugfs: 'hsr0' already exists in 'hsr' [ 426.908301][ T3599] Cannot create hsr debugfs directory [ 432.284490][ T3599] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 432.438400][ T3599] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 432.567436][ T3599] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 432.676563][ T3599] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 437.229876][ T3700] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 438.970381][ T30] audit: type=1400 audit(438.380:254): avc: denied { associate } for pid=3702 comm="syz.0.75" name="149" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 440.937598][ T3599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 446.985040][ T30] audit: type=1400 audit(446.350:255): avc: denied { create } for pid=3719 comm="syz.0.80" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 447.019310][ T30] audit: type=1400 audit(446.450:256): avc: denied { map } for pid=3719 comm="syz.0.80" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4414 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 447.087279][ T30] audit: type=1400 audit(446.510:257): avc: denied { read write } for pid=3719 comm="syz.0.80" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4414 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 449.705175][ T30] audit: type=1326 audit(449.120:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 449.740463][ T30] audit: type=1326 audit(449.150:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 449.741607][ T30] audit: type=1326 audit(449.150:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 449.741983][ T30] audit: type=1326 audit(449.150:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=97 compat=1 ip=0x132320 code=0x7ffc0000 [ 449.750845][ T30] audit: type=1326 audit(449.180:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 449.751886][ T30] audit: type=1326 audit(449.180:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 449.797445][ T30] audit: type=1326 audit(449.200:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3724 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 454.356730][ T3738] netlink: 20 bytes leftover after parsing attributes in process `syz.0.85'. [ 455.960006][ T3741] syzkaller0: entered promiscuous mode [ 455.977017][ T3741] syzkaller0: entered allmulticast mode [ 456.368786][ T30] audit: type=1400 audit(455.790:265): avc: denied { write } for pid=3740 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.690534][ T3749] fuse: Invalid rootmode [ 462.450435][ T30] audit: type=1400 audit(461.880:266): avc: denied { bind } for pid=3758 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.101382][ T3763] fuse: Invalid rootmode [ 465.231657][ T30] audit: type=1400 audit(464.630:267): avc: denied { create } for pid=3765 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 465.374727][ T30] audit: type=1400 audit(464.800:268): avc: denied { ioctl } for pid=3765 comm="syz.0.93" path="socket:[4485]" dev="sockfs" ino=4485 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 465.557005][ T3766] netlink: 4 bytes leftover after parsing attributes in process `syz.0.93'. [ 467.986965][ T3599] veth0_vlan: entered promiscuous mode [ 468.007364][ T3770] mmap: syz.0.94 (3770) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 468.216920][ T3599] veth1_vlan: entered promiscuous mode [ 469.458581][ T3599] veth0_macvtap: entered promiscuous mode [ 469.764398][ T3599] veth1_macvtap: entered promiscuous mode [ 470.827988][ T171] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.929048][ T171] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.946200][ T171] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.948151][ T171] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.038376][ T30] audit: type=1400 audit(472.470:269): avc: denied { read write } for pid=3599 comm="syz-executor" name="loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 473.047574][ T30] audit: type=1400 audit(472.470:270): avc: denied { open } for pid=3599 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 473.050916][ T30] audit: type=1400 audit(472.470:271): avc: denied { ioctl } for pid=3599 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 474.310614][ T3783] netlink: 8 bytes leftover after parsing attributes in process `syz.0.99'. [ 478.844843][ T3790] netlink: 4 bytes leftover after parsing attributes in process `syz.0.101'. [ 478.985166][ T3790] netlink: 12 bytes leftover after parsing attributes in process `syz.0.101'. [ 483.977058][ T30] audit: type=1400 audit(483.380:272): avc: denied { execute } for pid=3800 comm="syz.0.105" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=5759 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 485.427158][ T30] audit: type=1400 audit(484.860:273): avc: denied { write } for pid=3802 comm="syz.2.106" name="vlan1" dev="proc" ino=4026533061 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 490.035303][ T30] audit: type=1326 audit(489.460:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 490.037845][ T30] audit: type=1326 audit(489.470:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 490.063582][ T30] audit: type=1326 audit(489.480:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 490.078578][ T30] audit: type=1326 audit(489.510:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 490.094941][ T30] audit: type=1326 audit(489.530:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 490.103133][ T30] audit: type=1326 audit(489.530:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 490.105928][ T30] audit: type=1326 audit(489.540:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 490.126513][ T30] audit: type=1326 audit(489.550:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 490.166884][ T30] audit: type=1326 audit(489.600:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 490.181533][ T30] audit: type=1326 audit(489.610:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 498.311221][ T30] kauditd_printk_skb: 91 callbacks suppressed [ 498.329360][ T30] audit: type=1400 audit(497.730:375): avc: denied { setcheckreqprot } for pid=3816 comm="syz.2.112" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 500.516012][ T171] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 500.606378][ T30] audit: type=1400 audit(500.040:376): avc: granted { setsecparam } for pid=3829 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 500.986175][ T171] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.566546][ T171] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 502.150529][ T171] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 503.340908][ T30] audit: type=1400 audit(502.770:377): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 503.851684][ T30] audit: type=1400 audit(503.280:378): avc: denied { read } for pid=3165 comm="dhcpcd" name="n18" dev="tmpfs" ino=1025 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 503.876725][ T30] audit: type=1400 audit(503.310:379): avc: denied { open } for pid=3165 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1025 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 503.895539][ T30] audit: type=1400 audit(503.320:380): avc: denied { getattr } for pid=3165 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1025 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 504.925194][ T30] audit: type=1400 audit(504.360:381): avc: denied { name_bind } for pid=3833 comm="syz.2.120" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 507.552018][ T30] audit: type=1400 audit(506.980:382): avc: denied { ioctl } for pid=3831 comm="syz.0.119" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4618 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 508.261952][ T171] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 508.479621][ T171] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 508.599012][ T171] bond0 (unregistering): Released all slaves [ 509.402170][ T171] hsr_slave_0: left promiscuous mode [ 509.454356][ T171] hsr_slave_1: left promiscuous mode [ 509.891927][ T171] veth1_macvtap: left promiscuous mode [ 509.906724][ T171] veth0_macvtap: left promiscuous mode [ 509.910554][ T171] veth1_vlan: left promiscuous mode [ 509.941614][ T171] veth0_vlan: left promiscuous mode [ 512.684812][ T30] audit: type=1400 audit(512.100:383): avc: denied { create } for pid=3846 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 512.685400][ T30] audit: type=1400 audit(512.110:384): avc: denied { write } for pid=3846 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1029 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 512.719519][ T30] audit: type=1400 audit(512.150:385): avc: denied { append } for pid=3846 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1029 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 514.471542][ T30] audit: type=1400 audit(513.900:386): avc: denied { create } for pid=3853 comm="syz.2.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 514.544677][ T30] audit: type=1400 audit(513.960:387): avc: denied { ioctl } for pid=3853 comm="syz.2.124" path="socket:[4644]" dev="sockfs" ino=4644 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 514.562133][ T30] audit: type=1400 audit(513.990:388): avc: denied { bind } for pid=3853 comm="syz.2.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 515.234871][ T30] audit: type=1400 audit(514.660:389): avc: denied { read } for pid=3853 comm="syz.2.124" path="socket:[4644]" dev="sockfs" ino=4644 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 515.648446][ T30] audit: type=1400 audit(515.080:390): avc: denied { unlink } for pid=3855 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1029 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 515.880638][ T30] audit: type=1400 audit(515.310:391): avc: denied { setopt } for pid=3853 comm="syz.2.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 515.909300][ T30] audit: type=1400 audit(515.340:392): avc: denied { write } for pid=3853 comm="syz.2.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 527.054761][ T30] audit: type=1326 audit(526.470:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 527.117282][ T30] audit: type=1326 audit(526.540:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 527.186628][ T30] audit: type=1326 audit(526.610:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 527.187504][ T30] audit: type=1326 audit(526.610:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 527.201103][ T30] audit: type=1326 audit(526.630:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 527.248071][ T30] audit: type=1326 audit(526.670:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 527.264660][ T30] audit: type=1326 audit(526.690:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 527.287944][ T30] audit: type=1326 audit(526.720:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 527.294353][ T30] audit: type=1326 audit(526.720:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 527.332021][ T30] audit: type=1326 audit(526.750:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3878 comm="syz.2.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 536.727572][ T3906] smc: net device ip6gretap0 applied user defined pnetid SYZ2 [ 536.835511][ T3906] smc: net device ip6gretap0 erased user defined pnetid SYZ2 [ 541.826829][ T3918] fuse: Bad value for 'fd' [ 542.570091][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 542.575626][ T30] audit: type=1400 audit(542.000:416): avc: denied { create } for pid=3920 comm="syz.0.145" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 542.684946][ T30] audit: type=1400 audit(542.110:417): avc: denied { write } for pid=3920 comm="syz.0.145" name="file0" dev="tmpfs" ino=602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 542.735099][ T30] audit: type=1400 audit(542.130:418): avc: denied { open } for pid=3920 comm="syz.0.145" path="/114/file0" dev="tmpfs" ino=602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 542.760398][ T30] audit: type=1400 audit(542.190:419): avc: denied { ioctl } for pid=3920 comm="syz.0.145" path="/114/file0" dev="tmpfs" ino=602 ioctlcmd=0x4c07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 542.951809][ T30] audit: type=1400 audit(542.380:420): avc: denied { unlink } for pid=3325 comm="syz-executor" name="file0" dev="tmpfs" ino=602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 543.794431][ T3923] bond1: Removing last arp target with arp_interval on [ 544.944931][ T30] audit: type=1326 audit(544.370:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.148" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 544.949708][ T30] audit: type=1326 audit(544.380:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 544.994088][ T30] audit: type=1326 audit(544.420:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 544.996291][ T30] audit: type=1326 audit(544.410:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 545.000144][ T30] audit: type=1326 audit(544.430:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.148" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 545.775470][ T3937] fuse: Unknown parameter '0x0000000000000003' [ 548.267770][ T3945] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 548.327139][ T30] kauditd_printk_skb: 187 callbacks suppressed [ 548.331397][ T30] audit: type=1400 audit(547.750:613): avc: denied { relabelto } for pid=3944 comm="syz.2.153" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 548.383019][ T30] audit: type=1400 audit(547.810:614): avc: denied { associate } for pid=3944 comm="syz.2.153" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 549.519400][ T3951] fuse: Unknown parameter '0x0000000000000003' [ 551.854526][ T30] audit: type=1400 audit(551.280:615): avc: denied { read } for pid=3957 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 553.758344][ T3966] fuse: Unknown parameter '0x0000000000000003' [ 557.308504][ T30] audit: type=1326 audit(556.740:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 557.309437][ T30] audit: type=1326 audit(556.740:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 557.333515][ T30] audit: type=1326 audit(556.760:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 557.396842][ T30] audit: type=1326 audit(556.830:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 557.411891][ T30] audit: type=1326 audit(556.840:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 557.462297][ T30] audit: type=1326 audit(556.890:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 557.495010][ T30] audit: type=1326 audit(556.910:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 557.527822][ T30] audit: type=1326 audit(556.960:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 557.535345][ T30] audit: type=1326 audit(556.960:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 557.555450][ T30] audit: type=1326 audit(556.980:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3974 comm="syz.2.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 560.227088][ T3982] fuse: Unknown parameter '0x0000000000000003' [ 568.571280][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 568.577172][ T30] audit: type=1400 audit(568.000:647): avc: denied { lock } for pid=3997 comm="syz.2.172" path="socket:[4833]" dev="sockfs" ino=4833 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 570.390653][ T4009] netlink: 8 bytes leftover after parsing attributes in process `syz.0.175'. [ 574.440275][ T4023] syz.2.178 uses obsolete (PF_INET,SOCK_PACKET) [ 574.460699][ T30] audit: type=1400 audit(573.890:648): avc: denied { ioctl } for pid=4017 comm="syz.2.178" path="socket:[6225]" dev="sockfs" ino=6225 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 580.200342][ T4041] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 580.220818][ T4041] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 581.061694][ T4045] ======================================================= [ 581.061694][ T4045] WARNING: The mand mount option has been deprecated and [ 581.061694][ T4045] and is ignored by this kernel. Remove the mand [ 581.061694][ T4045] option from the mount to silence this warning. [ 581.061694][ T4045] ======================================================= [ 581.978554][ T4048] fuse: Unknown parameter 'fd0x0000000000000003' [ 587.061122][ T30] audit: type=1400 audit(586.490:649): avc: denied { create } for pid=4059 comm="syz.2.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 588.918623][ T30] audit: type=1400 audit(588.350:650): avc: denied { create } for pid=4069 comm="syz.2.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 588.985948][ T30] audit: type=1400 audit(588.390:651): avc: denied { write } for pid=4069 comm="syz.2.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 589.079278][ T4072] netlink: 72 bytes leftover after parsing attributes in process `syz.0.193'. [ 591.457012][ T30] audit: type=1400 audit(590.890:652): avc: denied { getopt } for pid=4078 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 595.769085][ T4071] infiniband !yz!: set down [ 595.798491][ T4071] infiniband !yz!: added team_slave_0 [ 595.853739][ T4071] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 595.907969][ T4071] infiniband !yz!: Couldn't open port 1 [ 596.456919][ T4071] RDS/IB: !yz!: added [ 596.490600][ T4071] smc: adding ib device !yz! with port count 1 [ 596.525366][ T4071] smc: ib device !yz! port 1 has no pnetid [ 601.455917][ T30] audit: type=1400 audit(600.890:653): avc: denied { watch_reads } for pid=4105 comm="syz.0.203" path="/145" dev="tmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 603.217628][ T4113] netlink: 96 bytes leftover after parsing attributes in process `syz.0.206'. [ 603.648158][ T30] audit: type=1400 audit(603.080:654): avc: denied { create } for pid=4114 comm="syz.0.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 605.899007][ T30] audit: type=1326 audit(605.330:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 605.910985][ T30] audit: type=1326 audit(605.340:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 605.921477][ T30] audit: type=1326 audit(605.350:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 605.931649][ T30] audit: type=1326 audit(605.360:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 605.936370][ T30] audit: type=1326 audit(605.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 605.940084][ T30] audit: type=1326 audit(605.360:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 605.947142][ T30] audit: type=1326 audit(605.380:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 605.953881][ T30] audit: type=1326 audit(605.380:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.2.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 606.606393][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 606.608546][ T30] audit: type=1400 audit(606.030:675): avc: denied { read } for pid=4129 comm="syz.2.213" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 606.618047][ T30] audit: type=1400 audit(606.040:676): avc: denied { open } for pid=4129 comm="syz.2.213" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 607.322318][ T30] audit: type=1400 audit(606.750:677): avc: denied { create } for pid=4132 comm="syz.2.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 608.096253][ T171] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.590638][ T171] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.121623][ T171] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.578973][ T30] audit: type=1400 audit(609.010:678): avc: denied { connect } for pid=4137 comm="syz.2.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 609.710062][ T171] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.337945][ T171] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 615.448282][ T171] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 615.517324][ T171] bond0 (unregistering): Released all slaves [ 621.088619][ T171] hsr_slave_0: left promiscuous mode [ 621.119387][ T171] hsr_slave_1: left promiscuous mode [ 621.418014][ T171] veth1_macvtap: left promiscuous mode [ 621.420644][ T171] veth0_macvtap: left promiscuous mode [ 621.425660][ T171] veth1_vlan: left promiscuous mode [ 621.428272][ T171] veth0_vlan: left promiscuous mode [ 630.420562][ T171] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 630.970800][ T171] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 631.559100][ T171] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 632.131938][ T171] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.304976][ T171] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 638.447718][ T171] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 638.521614][ T171] bond0 (unregistering): Released all slaves [ 638.685995][ T171] bond1 (unregistering): Released all slaves [ 642.406411][ T171] hsr_slave_0: left promiscuous mode [ 642.429103][ T171] hsr_slave_1: left promiscuous mode [ 642.602258][ T171] veth1_macvtap: left promiscuous mode [ 642.605981][ T171] veth0_macvtap: left promiscuous mode [ 642.617680][ T171] veth1_vlan: left promiscuous mode [ 642.624836][ T171] veth0_vlan: left promiscuous mode [ 646.204903][ T1095] smc: removing ib device !yz! [ 654.756822][ T4138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 654.990335][ T4138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 666.375164][ T4160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 666.420377][ T4160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 667.448298][ T4138] hsr_slave_0: entered promiscuous mode [ 667.468045][ T4138] hsr_slave_1: entered promiscuous mode [ 671.368900][ T4138] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 671.481677][ T4138] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 671.581148][ T4138] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 671.646798][ T4138] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 673.870686][ T4160] hsr_slave_0: entered promiscuous mode [ 673.901351][ T4160] hsr_slave_1: entered promiscuous mode [ 673.911013][ T4160] debugfs: 'hsr0' already exists in 'hsr' [ 673.925556][ T4160] Cannot create hsr debugfs directory [ 678.568946][ T4160] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 678.727777][ T4138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.762087][ T4160] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 678.894371][ T4160] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 678.961769][ T4160] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 685.001269][ T4160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 702.737288][ T4138] veth0_vlan: entered promiscuous mode [ 702.845823][ T4138] veth1_vlan: entered promiscuous mode [ 703.664719][ T4138] veth0_macvtap: entered promiscuous mode [ 703.848507][ T4138] veth1_macvtap: entered promiscuous mode [ 704.766531][ T1095] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.771142][ T1095] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.790587][ T1095] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 704.791493][ T1095] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 705.934311][ T30] audit: type=1400 audit(705.350:679): avc: denied { mounton } for pid=4138 comm="syz-executor" path="/syzkaller.ySgzxU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 706.461293][ T30] audit: type=1400 audit(705.890:680): avc: denied { add_name } for pid=4138 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 706.515741][ T30] audit: type=1400 audit(705.910:681): avc: denied { create } for pid=4138 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 706.520838][ T4138] Unable to handle kernel paging request at virtual address dfff800000000007 [ 706.521772][ T4138] KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] [ 706.521911][ T4138] Mem abort info: [ 706.522049][ T4138] ESR = 0x0000000096000005 [ 706.522284][ T4138] EC = 0x25: DABT (current EL), IL = 32 bits [ 706.539231][ T30] audit: type=1400 audit(705.950:682): avc: denied { associate } for pid=4138 comm="syz-executor" name="syz3" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 706.539963][ T4138] SET = 0, FnV = 0 [ 706.540164][ T4138] EA = 0, S1PTW = 0 [ 706.540291][ T4138] FSC = 0x05: level 1 translation fault [ 706.540469][ T4138] Data abort info: [ 706.540659][ T4138] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 706.540786][ T4138] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 706.540898][ T4138] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 706.541064][ T4138] [dfff800000000007] address between user and kernel address ranges [ 706.543464][ T4138] Internal error: Oops: 0000000096000005 [#1] SMP [ 706.548579][ T4138] Modules linked in: [ 706.550316][ T4138] CPU: 1 UID: 0 PID: 4138 Comm: syz-executor Not tainted syzkaller #0 PREEMPT [ 706.551091][ T4138] Hardware name: linux,dummy-virt (DT) [ 706.551921][ T4138] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 706.552597][ T4138] pc : simple_xattrs_free+0x48/0x184 [ 706.554273][ T4138] lr : __kernfs_new_node+0x524/0x78c [ 706.554612][ T4138] sp : ffff80008fe47920 [ 706.554955][ T4138] x29: ffff80008fe47920 x28: ffff00002927ff98 x27: ffff800086f10d18 [ 706.555726][ T4138] x26: ffff00000e16d068 x25: ffff800086f10000 x24: 0000000000000038 [ 706.556321][ T4138] x23: ffff800086f10000 x22: ffff0000276a1940 x21: 0000000000000000 [ 706.556896][ T4138] x20: 1fffe0000524fff1 x19: ffff00002927ff00 x18: ffff80008d7e78ac [ 706.557547][ T4138] x17: ffff000018091c88 x16: ffff00006a050504 x15: ffff800080b292a0 [ 706.558108][ T4138] x14: ffff800080b29048 x13: ffff800080045c90 x12: ffff700011fc8ec5 [ 706.558681][ T4138] x11: 1ffff00011fc8ec4 x10: ffff700011fc8ec4 x9 : dfff800000000000 [ 706.559357][ T4138] x8 : ffff80008fe47628 x7 : ffff80008fe47750 x6 : ffff80008fe476a0 [ 706.559917][ T4138] x5 : ffff80008fe47688 x4 : 0000000000000003 x3 : 1fffe00003012391 [ 706.560571][ T4138] x2 : 0000000000000000 x1 : 0000000000000007 x0 : dfff800000000000 [ 706.561364][ T4138] Call trace: [ 706.562036][ T4138] simple_xattrs_free+0x48/0x184 (P) [ 706.562816][ T4138] __kernfs_new_node+0x524/0x78c [ 706.563224][ T4138] kernfs_new_node+0xe8/0x148 [ 706.563569][ T4138] kernfs_create_dir_ns+0x34/0x118 [ 706.563924][ T4138] cgroup_mkdir+0x2bc/0xf94 [ 706.564268][ T4138] kernfs_iop_mkdir+0xd0/0x168 [ 706.564615][ T4138] vfs_mkdir+0x4fc/0x7c0 [ 706.564938][ T4138] do_mkdirat+0x30c/0x3f8 [ 706.565263][ T4138] __arm64_sys_mkdir+0xb8/0x108 [ 706.565631][ T4138] invoke_syscall+0x6c/0x258 [ 706.565957][ T4138] el0_svc_common.constprop.0+0xac/0x230 [ 706.566318][ T4138] do_el0_svc_compat+0x40/0x68 [ 706.566645][ T4138] el0_svc_compat+0x50/0x278 [ 706.567004][ T4138] el0t_32_sync_handler+0x88/0xac [ 706.567352][ T4138] el0t_32_sync+0x19c/0x1a0 [ 706.568240][ T4138] Code: f90002bf d343ff01 d2d00000 f2fbffe0 (38e06820) [ 706.570013][ T4138] ---[ end trace 0000000000000000 ]--- [ 706.571436][ T4138] Kernel panic - not syncing: Oops: Fatal exception [ 706.572643][ T4138] SMP: stopping secondary CPUs [ 706.574398][ T4138] Kernel Offset: disabled [ 706.574760][ T4138] CPU features: 0x208000,1001a001,00008000,0400421b [ 706.575224][ T4138] Memory Limit: none [ 706.576553][ T4138] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:27:49 Registers: info registers vcpu 0 CPU#0 PC=ffff800080031828 X00=ffff80008d7d7088 X01=000000000000001d X02=ffff8000800107c0 X03=00000000900468ea X04=0000000000000000 X05=0000000000000000 X06=ffff700011afae11 X07=ffff80008d7d7150 X08=ffff80008d7d70d8 X09=dfff800000000000 X10=ffff700011afae1a X11=1ffff00011afae1a X12=ffff700011afae1b X13=0000000000000002 X14=1ffff00011afaf0c X15=1fffe00002f9a1b2 X16=ffff80008d7d0000 X17=ffff7fffe2d41000 X18=0000000000000000 X19=000000000000001c X20=00000000000000e8 X21=0000000000002820 X22=0000000000000001 X23=ffff80008040b444 X24=0000000000000001 X25=ffff80008d472500 X26=ffff00006a03f3d0 X27=1fffe0000d407e79 X28=ffff00006a03f3c8 X29=ffff80008d7d71f0 X30=ffff8000817a382c SP=ffff80008d7d7140 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=756e696c65736269:6c00322e6f732e76 Q01=0000000000000000:00ff000000000000 Q02=0000000000000000:000000000f000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:000000000c000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081cd5b20 X00=ffff8000859858c0 X01=0000000000000003 X02=0000000000000001 X03=0000000000000003 X04=1ffff00011c18ef0 X05=0000000000000000 X06=ffff700011c18ed1 X07=ffff80008e0c7830 X08=ffff80008e0c76d8 X09=dfff800000000000 X10=ffff700011c18eda X11=1ffff00011c18eda X12=0000000000000003 X13=0000000000000000 X14=0000000000000001 X15=0000000000001574 X16=ffff80008d7e0000 X17=ffff7fffe2d65000 X18=ffff80008d7e78ac X19=0000000000000010 X20=ffff80008e0c7920 X21=00000000430df8e4 X22=dfff800000000000 X23=ffff00006a061a88 X24=ffff000018bc0022 X25=dfff800000000000 X26=ffff80008d472000 X27=ffff800087351598 X28=ffff80008d472500 X29=ffff80008e0c77e0 X30=ffff8000855c7834 SP=ffff80008e0c7840 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000ffffb7983960:0000aaaaec5c33c0 Q01=0000aaaaec5c38c0:0000ffffb7983370 Q02=0000aaaaec5c4370:0000aaaaec5c3dc0 Q03=0000ffffb7982d10:0000ffffb79510c0 Q04=0000000000000000:ffffff0f0f0f0000 Q05=0000000000000000:000f000000000000 Q06=0000fffffe9c46fe:0000fffffe9c46f0 Q07=0000fffffe9c4719:0000fffffe9c470b Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffe9b4460:0000fffffe9b4460 Q17=ffffff80ffffffd8:0000fffffe9b4430 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000