last executing test programs: 5m36.564833735s ago: executing program 0 (id=562): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) lchown(0x0, 0x0, 0x0) 5m36.313372037s ago: executing program 0 (id=563): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000004000000080000000be0be8c92"], 0x50) 5m36.222375712s ago: executing program 0 (id=564): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x20) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 5m36.024720812s ago: executing program 0 (id=565): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) msgget$private(0x0, 0x106) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c17", 0x83, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0xb, &(0x7f0000000800)=ANY=[@ANYRES64], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r2 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000140)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="640000000206010200000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a32000000000500040000000000140007800800124000000000050015002200000005000500020000000500010006"], 0x64}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x387131d88c629875, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0100008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_tracing={0x1a, 0x18, &(0x7f0000000300)=ANY=[@ANYBLOB="180000008f0000000000000001000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e08e00008500000006000000185200000300000000000000000000002d8a0100010000001800000003000000000000000c000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300004208000000000000860000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xcc, &(0x7f0000000580)=""/204, 0x41000, 0x2, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000240)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xe, 0x10000, 0x5}, 0x10, 0xc82a, r0, 0x5, &(0x7f0000000680)=[r5], &(0x7f00000006c0)=[{0x2, 0x5, 0x9, 0xa}, {0x3, 0x4, 0xe, 0x8}, {0x5, 0x3, 0x4}, {0x4, 0x2, 0x0, 0x1}, {0x1, 0x4, 0xc, 0xb}], 0x10, 0x281d}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000280)={0x0, 0x3, 0x7, 0x0, 0x10040, 0x8f}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000004000000000000000000000085000000bc000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) 5m35.525936187s ago: executing program 0 (id=566): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000280)="08001efbb07d5a6e", 0x8}], 0x1, &(0x7f00000002c0)=[@ip_retopts={{0x10}}], 0x10}, 0x4840) 5m35.382847414s ago: executing program 0 (id=567): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) getrandom(0x0, 0x0, 0x3) munlockall() r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @broadcast}, {0x4, 0x4e24, @loopback}, {0x2, 0x0, @remote}, 0x184, 0x0, 0x0, 0xfdffffffffffffff, 0x4, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x6}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newqdisc={0x12c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {0x6, 0xffff}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x7fff}, @TCA_STAB={0x100, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x7, 0x2, 0x0, 0x2, 0x5, 0xfffffffa, 0x5}}, {0xe, 0x2, [0x8, 0xf, 0x437, 0x8, 0x3]}}, {{0x1c, 0x1, {0x62, 0x8, 0xf, 0x9, 0x1, 0x2, 0x6, 0x9}}, {0x16, 0x2, [0x0, 0x0, 0x9, 0x1, 0x2, 0x8, 0x7ff, 0x7fff, 0x2d0]}}, {{0x1c, 0x1, {0x3, 0x7, 0x0, 0x10000, 0x2, 0x96, 0x0, 0x6}}, {0x10, 0x2, [0xe, 0xaa30, 0x5, 0x5, 0x9, 0xa850]}}, {{0x1c, 0x1, {0x80, 0x3, 0x6, 0x6d4a, 0x2, 0xc17, 0xfffff2a8, 0x4}}, {0xc, 0x2, [0x8, 0x4, 0xc, 0x3]}}, {{0x1c, 0x1, {0x1, 0x8, 0x401, 0x0, 0x1, 0xe, 0xd8, 0x2}}, {0x8, 0x2, [0x4, 0xc70]}}, {{0x1c, 0x1, {0xc, 0x4, 0x9, 0xaf, 0x1, 0x8000, 0x2747, 0x2}}, {0x8, 0x2, [0x7, 0xef99]}}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x48801}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) r5 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) socket(0x1e, 0x4, 0x0) r6 = dup(r5) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000100)={0x0, 'ip6_vti0\x00', {0x2}, 0x3}) fsmount(0xffffffffffffffff, 0x0, 0x5) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000201005) 4m49.834351112s ago: executing program 32 (id=567): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) getrandom(0x0, 0x0, 0x3) munlockall() r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @broadcast}, {0x4, 0x4e24, @loopback}, {0x2, 0x0, @remote}, 0x184, 0x0, 0x0, 0xfdffffffffffffff, 0x4, &(0x7f0000000180)='lo\x00', 0x0, 0x0, 0x6}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newqdisc={0x12c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {0x6, 0xffff}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x7fff}, @TCA_STAB={0x100, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x7, 0x2, 0x0, 0x2, 0x5, 0xfffffffa, 0x5}}, {0xe, 0x2, [0x8, 0xf, 0x437, 0x8, 0x3]}}, {{0x1c, 0x1, {0x62, 0x8, 0xf, 0x9, 0x1, 0x2, 0x6, 0x9}}, {0x16, 0x2, [0x0, 0x0, 0x9, 0x1, 0x2, 0x8, 0x7ff, 0x7fff, 0x2d0]}}, {{0x1c, 0x1, {0x3, 0x7, 0x0, 0x10000, 0x2, 0x96, 0x0, 0x6}}, {0x10, 0x2, [0xe, 0xaa30, 0x5, 0x5, 0x9, 0xa850]}}, {{0x1c, 0x1, {0x80, 0x3, 0x6, 0x6d4a, 0x2, 0xc17, 0xfffff2a8, 0x4}}, {0xc, 0x2, [0x8, 0x4, 0xc, 0x3]}}, {{0x1c, 0x1, {0x1, 0x8, 0x401, 0x0, 0x1, 0xe, 0xd8, 0x2}}, {0x8, 0x2, [0x4, 0xc70]}}, {{0x1c, 0x1, {0xc, 0x4, 0x9, 0xaf, 0x1, 0x8000, 0x2747, 0x2}}, {0x8, 0x2, [0x7, 0xef99]}}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x48801}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) r5 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) socket(0x1e, 0x4, 0x0) r6 = dup(r5) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000100)={0x0, 'ip6_vti0\x00', {0x2}, 0x3}) fsmount(0xffffffffffffffff, 0x0, 0x5) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000201005) 3m56.971684866s ago: executing program 2 (id=703): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xc7, 0x1, 0x0, 0xffffffffffffffff, 0x8}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, 0x0}, 0x20) 3m56.69583141s ago: executing program 2 (id=704): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) mq_notify(0xffffffffffffffff, 0x0) 3m56.272559431s ago: executing program 2 (id=705): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={0x0, &(0x7f0000000f40)=""/4089, 0x0, 0xff9, 0x8}, 0x28) 3m56.094863801s ago: executing program 2 (id=707): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000f100000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='io_uring_create\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='io_uring_create\x00', r2}, 0x18) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6, 0x0, 0x3, 0x0, 0x0, r2}) 3m55.892583561s ago: executing program 2 (id=708): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf250f00000005002f000100000005002ae800000000050029000100000008000300", @ANYRES32=r3], 0x54}, 0x1, 0x0, 0x0, 0x24004040}, 0x24008824) 3m55.064693162s ago: executing program 2 (id=710): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000040900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001208000240000000", @ANYRES16=r1], 0xc4}}, 0x0) 3m10.052114264s ago: executing program 33 (id=710): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000040900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001208000240000000", @ANYRES16=r1], 0xc4}}, 0x0) 2.318626254s ago: executing program 3 (id=1068): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, 0x0, 0x0) syz_emit_ethernet(0x3f, &(0x7f0000000200)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x31, 0x0, 0xf00, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, '\x00'}}}}}, 0x0) 2.281273696s ago: executing program 3 (id=1069): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x402c5839, 0x0) 2.171994511s ago: executing program 1 (id=1070): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000340)=""/132) 2.171753562s ago: executing program 3 (id=1071): r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000000c0)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback, 0x10003}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e21, 0x2, @private0, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@dontfrag={{0x10, 0x29, 0x3e, 0x80000001}}], 0x10}}], 0x2, 0xff00) 2.021152289s ago: executing program 3 (id=1072): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x80, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x1, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x4e24, 0x4e20, 0x4d, 0x0, @wg=@initiation={0x1, 0x1, "65a252e7cb7a5918c004a9971a46afced2c32642b1ec9fe34818d8ccd82041b7", "c930713c550e74ee13c2638ac75b2a9666efd31a34fce4498df8105d8bd8ed283a220c3a9becd8a70d3607ea8270d351", "ae12e16b560f2f8ac4ca3e745ce285f12f6e8719e7f1e7f286a68f76", {"980aa8fb8f80d69f1fb587086447e93e", "55e824bb69e833bd36300b088233545a"}}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}, 0x6e1}], 0x1, 0x20, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x8}}}}}, 0x0) 2.020879879s ago: executing program 1 (id=1073): unshare(0x22020400) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_timeval(r0, 0x1, 0x4c, 0x0, 0x0) 1.732579093s ago: executing program 1 (id=1074): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x5, 0x8}]}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001280)="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", 0x147}], 0x1}}], 0x1, 0x40000d0) 1.304203055s ago: executing program 1 (id=1075): r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x488, &(0x7f00000001c0), &(0x7f0000000200)=0x30) 1.231932928s ago: executing program 3 (id=1076): socket$netlink(0x10, 0x3, 0x10) socket(0x10, 0x803, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000400)}, 0x2}], 0x1, 0x60, 0x0) socket(0x10, 0x3, 0x0) socket$kcm(0x11, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7734, 0x80, 0x3, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x15523ea56aa22b9a, 0x0, 0x0, 0x0, 0x23456}) io_uring_enter(r2, 0x47bc, 0x0, 0x61, 0x0, 0x0) 1.093101156s ago: executing program 1 (id=1077): openat$sysctl(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_sack\x00', 0x1, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) pselect6(0x40, &(0x7f0000000100)={0x300, 0x0, 0x1fffffffffe, 0xfffffffffffffffd, 0x0, 0x0, 0x1000001000, 0x6}, 0x0, 0x0, 0x0, 0x0) 732.121723ms ago: executing program 1 (id=1078): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000001009500000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_usb_connect(0x3, 0x3c, &(0x7f0000000380)=ANY=[@ANYBLOB="120101000814c910be0632a2f333010203010902120001000000000904"], 0x0) syz_usb_control_io$uac1(r1, 0x0, 0x0) syz_usb_control_io$printer(r1, 0x0, 0x0) r2 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) ioctl$I2C_RDWR(r2, 0x707, &(0x7f0000000280)={&(0x7f0000002080)=[{0x7, 0x211, 0x0, 0x0}, {0x50, 0x4000, 0x0, 0x0}], 0x2}) 0s ago: executing program 3 (id=1079): socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x2}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000001440)=[{&(0x7f0000001a00)="ce", 0x1}], 0x1, 0x4) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) read$FUSE(r1, &(0x7f0000009780)={0x2020}, 0x2020) kernel console output (not intermixed with test programs): .641383][ T31] audit: type=1326 audit(196.570:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 196.646335][ T31] audit: type=1326 audit(196.570:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 196.650191][ T31] audit: type=1326 audit(196.570:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 196.662080][ T31] audit: type=1326 audit(196.590:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 196.664414][ T31] audit: type=1326 audit(196.590:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 196.668179][ T31] audit: type=1326 audit(196.590:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4624 comm="syz.1.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 198.884701][ T4636] netlink: 'syz.1.265': attribute type 4 has an invalid length. [ 199.578534][ T4645] netlink: 40 bytes leftover after parsing attributes in process `syz.1.269'. [ 202.673286][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 202.677719][ T31] audit: type=1404 audit(202.600:526): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 202.695479][ T31] audit: type=1400 audit(202.620:527): avc: denied { prog_load } for pid=4677 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 202.702144][ T31] audit: type=1400 audit(202.630:528): avc: denied { prog_load } for pid=4677 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 202.703995][ T31] audit: type=1400 audit(202.630:529): avc: denied { allowed } for pid=4677 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 202.717215][ T31] audit: type=1400 audit(202.630:530): avc: denied { execmem } for pid=4677 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 202.851030][ T31] audit: type=1404 audit(202.780:531): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 202.853965][ T31] audit: type=1400 audit(202.780:532): avc: denied { read write } for pid=3121 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 202.854285][ T31] audit: type=1400 audit(202.780:533): avc: denied { open } for pid=3121 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 202.854481][ T31] audit: type=1400 audit(202.780:534): avc: denied { ioctl } for pid=3121 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 202.966038][ T31] audit: type=1400 audit(202.870:535): avc: denied { read } for pid=4680 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 207.055099][ T4706] netlink: 96 bytes leftover after parsing attributes in process `syz.1.294'. [ 208.086022][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 208.086367][ T31] audit: type=1400 audit(208.010:557): avc: denied { mounton } for pid=4684 comm="syz.0.284" path="/115/file0" dev="tmpfs" ino=601 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 208.103581][ T31] audit: type=1400 audit(208.030:558): avc: denied { mount } for pid=4684 comm="syz.0.284" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 208.117206][ T31] audit: type=1400 audit(208.040:559): avc: denied { mounton } for pid=4684 comm="syz.0.284" path="/115/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 208.678034][ T4686] ======================================================= [ 208.678034][ T4686] WARNING: The mand mount option has been deprecated and [ 208.678034][ T4686] and is ignored by this kernel. Remove the mand [ 208.678034][ T4686] option from the mount to silence this warning. [ 208.678034][ T4686] ======================================================= [ 208.702029][ T31] audit: type=1400 audit(208.630:560): avc: denied { unmount } for pid=4684 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 208.921310][ T4752] netlink: 'syz.1.304': attribute type 1 has an invalid length. [ 208.998683][ T4752] 8021q: adding VLAN 0 to HW filter on device bond1 [ 210.173731][ T4811] netlink: 12 bytes leftover after parsing attributes in process `syz.1.307'. [ 210.452513][ T31] audit: type=1400 audit(210.380:561): avc: denied { module_request } for pid=4817 comm="syz.1.308" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 210.482086][ T31] audit: type=1400 audit(210.400:562): avc: denied { watch } for pid=4819 comm="syz.0.309" path="/117" dev="tmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 210.821104][ T31] audit: type=1400 audit(210.750:563): avc: denied { read } for pid=4817 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 211.624519][ T31] audit: type=1326 audit(211.550:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4829 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 211.635296][ T31] audit: type=1326 audit(211.560:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4829 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 211.637555][ T31] audit: type=1326 audit(211.560:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4829 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 212.320661][ T4834] netlink: 'syz.1.314': attribute type 10 has an invalid length. [ 213.780565][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 213.792180][ T31] audit: type=1400 audit(213.700:604): avc: denied { load_policy } for pid=4849 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 213.800589][ T4851] SELinux: failed to load policy [ 214.004734][ T31] audit: type=1400 audit(213.930:605): avc: denied { allowed } for pid=4853 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 214.007237][ T31] audit: type=1400 audit(213.930:606): avc: denied { create } for pid=4853 comm="syz.0.321" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 214.012989][ T31] audit: type=1400 audit(213.930:607): avc: denied { map } for pid=4853 comm="syz.0.321" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 214.014718][ T31] audit: type=1400 audit(213.930:608): avc: denied { read write } for pid=4853 comm="syz.0.321" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 214.241224][ T31] audit: type=1326 audit(214.170:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4855 comm="syz.1.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.242834][ T31] audit: type=1326 audit(214.170:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4855 comm="syz.1.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.406188][ T31] audit: type=1326 audit(214.330:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4855 comm="syz.1.322" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.406404][ T31] audit: type=1326 audit(214.330:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4855 comm="syz.1.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.410569][ T31] audit: type=1326 audit(214.330:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4855 comm="syz.1.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 219.192476][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 219.192917][ T31] audit: type=1400 audit(219.120:632): avc: denied { create } for pid=4898 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 219.219869][ T31] audit: type=1400 audit(219.140:633): avc: denied { execmem } for pid=4898 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 221.055980][ T4907] netlink: 4 bytes leftover after parsing attributes in process `syz.1.337'. [ 221.300740][ T31] audit: type=1400 audit(221.230:634): avc: denied { create } for pid=4906 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 221.323650][ T31] audit: type=1400 audit(221.250:635): avc: denied { setopt } for pid=4906 comm="syz.1.337" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 221.341075][ T4907] netlink: 4 bytes leftover after parsing attributes in process `syz.1.337'. [ 221.558653][ T31] audit: type=1400 audit(221.480:636): avc: denied { write } for pid=4910 comm="syz.1.338" name="unix" dev="proc" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 221.596077][ T31] audit: type=1400 audit(221.520:637): avc: denied { block_suspend } for pid=4910 comm="syz.1.338" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 222.624024][ T31] audit: type=1400 audit(222.530:638): avc: denied { bind } for pid=4918 comm="syz.1.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 222.733855][ T31] audit: type=1400 audit(222.620:639): avc: denied { write } for pid=4918 comm="syz.1.340" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.722133][ T31] audit: type=1400 audit(223.650:640): avc: denied { create } for pid=4922 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 229.744928][ T31] audit: type=1400 audit(229.670:641): avc: denied { write } for pid=4965 comm="syz.1.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 229.926655][ T31] audit: type=1400 audit(229.850:642): avc: denied { create } for pid=4968 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 229.944725][ T31] audit: type=1400 audit(229.870:643): avc: denied { write } for pid=4968 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 230.087593][ T31] audit: type=1400 audit(230.010:644): avc: denied { bind } for pid=4970 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 230.089742][ T31] audit: type=1400 audit(230.010:645): avc: denied { name_bind } for pid=4970 comm="syz.1.351" src=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 230.102608][ T31] audit: type=1400 audit(230.030:646): avc: denied { node_bind } for pid=4970 comm="syz.1.351" saddr=::1 src=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 230.316649][ T31] audit: type=1400 audit(230.240:647): avc: denied { create } for pid=4972 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 230.481281][ T31] audit: type=1400 audit(230.410:648): avc: denied { execute } for pid=4972 comm="syz.1.352" path="/217/cpu.stat" dev="tmpfs" ino=1118 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 231.041995][ T31] audit: type=1326 audit(230.970:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4975 comm="syz.1.353" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.044823][ T31] audit: type=1326 audit(230.970:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4975 comm="syz.1.353" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 235.351098][ T5005] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 236.044898][ T5011] netlink: 12 bytes leftover after parsing attributes in process `syz.1.363'. [ 236.046911][ T5011] netlink: 'syz.1.363': attribute type 1 has an invalid length. [ 236.047927][ T5011] netlink: 12 bytes leftover after parsing attributes in process `syz.1.363'. [ 236.383536][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 236.409632][ T31] audit: type=1400 audit(236.310:663): avc: denied { ioctl } for pid=5012 comm="syz.1.364" path="socket:[4676]" dev="sockfs" ino=4676 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 238.274116][ T31] audit: type=1326 audit(238.170:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.274413][ T31] audit: type=1326 audit(238.200:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.310438][ T31] audit: type=1326 audit(238.210:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.324607][ T31] audit: type=1326 audit(238.250:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.324923][ T31] audit: type=1326 audit(238.250:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.325239][ T31] audit: type=1326 audit(238.250:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.343449][ T31] audit: type=1326 audit(238.270:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.343763][ T31] audit: type=1326 audit(238.270:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5023 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 238.996601][ T31] audit: type=1400 audit(238.920:672): avc: denied { create } for pid=5025 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 244.628058][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 244.641031][ T31] audit: type=1326 audit(244.550:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.643386][ T31] audit: type=1326 audit(244.550:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.645338][ T31] audit: type=1326 audit(244.560:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.660369][ T31] audit: type=1326 audit(244.560:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.660725][ T31] audit: type=1326 audit(244.560:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.660918][ T31] audit: type=1326 audit(244.560:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.661133][ T31] audit: type=1326 audit(244.560:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.661318][ T31] audit: type=1326 audit(244.560:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.661503][ T31] audit: type=1326 audit(244.560:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.661687][ T31] audit: type=1326 audit(244.570:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 251.320694][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 251.325168][ T31] audit: type=1400 audit(251.230:703): avc: denied { getopt } for pid=5076 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 251.829687][ T31] audit: type=1400 audit(251.750:704): avc: denied { read write } for pid=3122 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 251.832488][ T31] audit: type=1400 audit(251.760:705): avc: denied { open } for pid=3122 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 251.841179][ T31] audit: type=1400 audit(251.770:706): avc: denied { ioctl } for pid=3122 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 252.043550][ T31] audit: type=1400 audit(251.970:707): avc: denied { read } for pid=5080 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 252.230746][ T31] audit: type=1400 audit(252.160:708): avc: denied { load_policy } for pid=5080 comm="syz.1.387" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 252.231010][ T5081] SELinux: policydb version 0 does not match my version range 15-35 [ 252.231160][ T5081] SELinux: failed to load policy [ 252.560001][ T31] audit: type=1400 audit(252.480:709): avc: denied { prog_load } for pid=5082 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 252.562148][ T31] audit: type=1400 audit(252.480:710): avc: denied { bpf } for pid=5082 comm="syz.1.388" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 252.567082][ T31] audit: type=1400 audit(252.480:711): avc: denied { perfmon } for pid=5082 comm="syz.1.388" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 252.571623][ T31] audit: type=1400 audit(252.480:712): avc: denied { prog_run } for pid=5082 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 256.814917][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 256.815374][ T31] audit: type=1400 audit(256.740:720): avc: denied { ioctl } for pid=5096 comm="syz.0.393" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 257.306697][ T5104] capability: warning: `syz.0.396' uses 32-bit capabilities (legacy support in use) [ 258.060658][ T31] audit: type=1326 audit(257.990:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.071194][ T31] audit: type=1326 audit(257.990:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.073427][ T31] audit: type=1326 audit(258.000:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.076971][ T31] audit: type=1326 audit(258.000:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.091460][ T31] audit: type=1326 audit(258.000:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.093806][ T31] audit: type=1326 audit(258.010:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.095893][ T31] audit: type=1326 audit(258.020:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.097694][ T31] audit: type=1326 audit(258.020:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 258.107355][ T31] audit: type=1326 audit(258.020:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5109 comm="syz.0.399" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300b8 code=0x7ffc0000 [ 261.859863][ T5122] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 261.861159][ T5122] SELinux: failed to load policy [ 262.260634][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 262.261882][ T31] audit: type=1400 audit(262.180:748): avc: denied { name_bind } for pid=5123 comm="syz.0.406" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 263.346915][ T31] audit: type=1400 audit(263.260:749): avc: denied { create } for pid=5126 comm="syz.1.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 263.372847][ T31] audit: type=1400 audit(263.270:750): avc: denied { write } for pid=5126 comm="syz.1.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 263.724507][ T31] audit: type=1400 audit(263.650:751): avc: denied { read } for pid=5126 comm="syz.1.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 264.016801][ T31] audit: type=1400 audit(263.940:752): avc: denied { read } for pid=5130 comm="syz.1.408" dev="nsfs" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 264.025198][ T5131] smc: net device bond0 applied user defined pnetid SYZ0 [ 264.033314][ T5131] smc: net device bond0 erased user defined pnetid SYZ0 [ 264.044180][ T31] audit: type=1400 audit(263.940:753): avc: denied { open } for pid=5130 comm="syz.1.408" path="net:[4026532721]" dev="nsfs" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 264.485394][ T31] audit: type=1400 audit(264.410:754): avc: denied { execmem } for pid=5123 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 265.259693][ T31] audit: type=1400 audit(265.170:755): avc: denied { create } for pid=5134 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 265.281635][ T5135] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 265.298574][ T31] audit: type=1400 audit(265.220:756): avc: denied { bind } for pid=5134 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 265.320012][ T31] audit: type=1400 audit(265.240:757): avc: denied { name_bind } for pid=5134 comm="syz.1.410" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 266.173314][ T5141] netlink: 12 bytes leftover after parsing attributes in process `syz.1.412'. [ 267.996726][ T5159] 8021q: adding VLAN 0 to HW filter on device bond2 [ 268.020950][ T5159] netlink: 4 bytes leftover after parsing attributes in process `syz.1.420'. [ 268.036932][ T5159] bond2 (unregistering): Released all slaves [ 268.061459][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 268.061720][ T31] audit: type=1326 audit(267.990:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.061940][ T31] audit: type=1326 audit(267.990:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.071262][ T31] audit: type=1326 audit(268.000:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.073928][ T31] audit: type=1326 audit(268.000:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.074767][ T31] audit: type=1326 audit(268.000:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.090330][ T31] audit: type=1326 audit(268.010:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.090648][ T31] audit: type=1326 audit(268.010:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.093654][ T31] audit: type=1326 audit(268.010:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.194008][ T31] audit: type=1326 audit(268.120:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 268.204391][ T31] audit: type=1326 audit(268.130:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5182 comm="syz.0.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.728154][ T5243] netlink: 16 bytes leftover after parsing attributes in process `syz.0.427'. [ 271.446131][ T5289] netlink: 208 bytes leftover after parsing attributes in process `syz.1.437'. [ 271.520714][ T5289] netlink: 208 bytes leftover after parsing attributes in process `syz.1.437'. [ 271.831976][ T5293] dummy0: entered allmulticast mode [ 274.468199][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 274.468544][ T31] audit: type=1400 audit(274.390:800): avc: denied { create } for pid=5321 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.471952][ T5323] netlink: 20 bytes leftover after parsing attributes in process `syz.1.449'. [ 274.472386][ T31] audit: type=1400 audit(274.400:801): avc: denied { write } for pid=5321 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.472539][ T31] audit: type=1400 audit(274.400:802): avc: denied { nlmsg_write } for pid=5321 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.780578][ T31] audit: type=1400 audit(274.700:803): avc: denied { create } for pid=5326 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 275.003718][ T31] audit: type=1400 audit(274.930:804): avc: denied { create } for pid=5328 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 275.007442][ T31] audit: type=1400 audit(274.930:805): avc: denied { write } for pid=5328 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 276.227544][ T31] audit: type=1400 audit(276.150:806): avc: denied { create } for pid=5338 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 276.250595][ T31] audit: type=1400 audit(276.170:807): avc: denied { bind } for pid=5338 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 276.275186][ T31] audit: type=1400 audit(276.200:808): avc: denied { write } for pid=5338 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 279.991315][ T5418] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 281.540755][ T31] audit: type=1326 audit(281.450:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.544740][ T31] audit: type=1326 audit(281.460:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.546788][ T31] audit: type=1326 audit(281.460:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.553391][ T31] audit: type=1326 audit(281.460:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.555613][ T31] audit: type=1326 audit(281.470:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.557525][ T31] audit: type=1326 audit(281.470:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=75 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.636474][ T31] audit: type=1326 audit(281.470:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.661701][ T31] audit: type=1326 audit(281.470:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 281.751461][ T31] audit: type=1400 audit(281.680:817): avc: denied { getopt } for pid=5435 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 281.953928][ T31] audit: type=1326 audit(281.880:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5441 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 286.850169][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 286.850594][ T31] audit: type=1400 audit(286.740:825): avc: denied { unlink } for pid=3121 comm="syz-executor" name="file1" dev="tmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 286.993816][ T31] audit: type=1326 audit(286.920:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5488 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 287.000972][ T31] audit: type=1326 audit(286.930:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5488 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 287.003610][ T31] audit: type=1326 audit(286.930:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5488 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 291.114661][ T31] audit: type=1400 audit(291.010:829): avc: denied { read write } for pid=3121 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 291.115031][ T31] audit: type=1400 audit(291.040:830): avc: denied { open } for pid=3121 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 291.115230][ T31] audit: type=1400 audit(291.040:831): avc: denied { ioctl } for pid=3121 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 291.353222][ T31] audit: type=1400 audit(291.280:832): avc: denied { read } for pid=5519 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 291.445238][ T31] audit: type=1400 audit(291.370:833): avc: denied { create } for pid=5519 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.480034][ T31] audit: type=1400 audit(291.390:834): avc: denied { write } for pid=5523 comm="syz.1.496" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 291.881819][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 291.882143][ T31] audit: type=1400 audit(291.810:845): avc: denied { prog_run } for pid=5523 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 292.029967][ T31] audit: type=1400 audit(291.930:846): avc: denied { create } for pid=5519 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 292.030399][ T31] audit: type=1400 audit(291.930:847): avc: denied { getopt } for pid=5519 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 292.034984][ T31] audit: type=1400 audit(291.960:848): avc: denied { create } for pid=5519 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 292.052955][ T31] audit: type=1400 audit(291.980:849): avc: denied { write } for pid=5523 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 292.062379][ T31] audit: type=1400 audit(291.990:850): avc: denied { read } for pid=5523 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 292.080325][ T31] audit: type=1400 audit(291.990:851): avc: denied { ioctl } for pid=5523 comm="syz.1.496" path="/dev/virtual_nci" dev="devtmpfs" ino=658 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.511643][ T5534] netlink: 14 bytes leftover after parsing attributes in process `syz.0.497'. [ 293.383866][ T31] audit: type=1400 audit(293.310:852): avc: denied { bind } for pid=5551 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 293.392370][ T31] audit: type=1400 audit(293.320:853): avc: denied { write } for pid=5551 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 293.612353][ T31] audit: type=1400 audit(293.540:854): avc: denied { create } for pid=5553 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 297.776953][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 297.777173][ T31] audit: type=1400 audit(297.700:870): avc: denied { sys_module } for pid=5573 comm="syz.0.505" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 299.087179][ T31] audit: type=1400 audit(299.010:871): avc: denied { create } for pid=5586 comm="syz.0.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 299.104743][ T31] audit: type=1400 audit(299.020:872): avc: denied { setopt } for pid=5586 comm="syz.0.508" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 301.360402][ T31] audit: type=1400 audit(301.280:873): avc: denied { bind } for pid=5596 comm="syz.0.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 301.421951][ T31] audit: type=1400 audit(301.350:874): avc: denied { setopt } for pid=5596 comm="syz.0.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 301.483330][ T5597] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.594832][ T5597] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.711887][ T5597] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.782405][ T5597] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.985781][ T12] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.005985][ T12] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.110668][ T12] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.170814][ T12] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.473332][ T5619] netlink: 36 bytes leftover after parsing attributes in process `syz.0.511'. [ 302.622067][ T31] audit: type=1400 audit(302.540:875): avc: denied { create } for pid=5620 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 302.953222][ T5627] netlink: 36 bytes leftover after parsing attributes in process `syz.1.504'. [ 306.907460][ T12] nci: nci_add_new_protocol: the target found does not have the desired protocol [ 309.050441][ T31] audit: type=1400 audit(308.950:876): avc: denied { nlmsg_write } for pid=5649 comm="syz.0.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 309.290021][ T31] audit: type=1400 audit(309.220:877): avc: denied { execute } for pid=5651 comm="syz.0.518" name="file1" dev="tmpfs" ino=1064 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 309.295518][ T31] audit: type=1400 audit(309.220:878): avc: denied { execute_no_trans } for pid=5651 comm="syz.0.518" path="/206/file1" dev="tmpfs" ino=1064 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 309.513303][ T31] audit: type=1400 audit(309.440:879): avc: denied { ioctl } for pid=5653 comm="syz.0.519" path="socket:[7283]" dev="sockfs" ino=7283 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 313.457768][ T31] audit: type=1400 audit(313.380:880): avc: denied { name_bind } for pid=5673 comm="syz.0.524" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 313.482399][ T31] audit: type=1400 audit(313.410:881): avc: denied { node_bind } for pid=5673 comm="syz.0.524" saddr=::ffff:172.20.20.170 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 314.664493][ T31] audit: type=1326 audit(314.590:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.674358][ T31] audit: type=1326 audit(314.600:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.674724][ T31] audit: type=1326 audit(314.600:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.711685][ T31] audit: type=1326 audit(314.640:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.712044][ T31] audit: type=1326 audit(314.640:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.712290][ T31] audit: type=1326 audit(314.640:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.719794][ T31] audit: type=1326 audit(314.640:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.740488][ T31] audit: type=1326 audit(314.660:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.740903][ T31] audit: type=1326 audit(314.660:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 314.745155][ T31] audit: type=1326 audit(314.670:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5682 comm="syz.0.528" exe="/syz-executor" sig=0 arch=40000028 syscall=438 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 315.561251][ T5692] netlink: 763 bytes leftover after parsing attributes in process `syz.0.530'. [ 321.823617][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 321.823892][ T31] audit: type=1400 audit(321.750:894): avc: denied { allowed } for pid=5700 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 321.826083][ T31] audit: type=1400 audit(321.750:895): avc: denied { create } for pid=5700 comm="syz.0.534" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 321.831960][ T31] audit: type=1400 audit(321.750:896): avc: denied { map } for pid=5700 comm="syz.0.534" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7339 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 321.832100][ T31] audit: type=1400 audit(321.750:897): avc: denied { read write } for pid=5700 comm="syz.0.534" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7339 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 322.373324][ T5706] dummy0: entered promiscuous mode [ 322.660478][ T31] audit: type=1400 audit(322.580:898): avc: denied { bind } for pid=5707 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 322.676417][ T31] audit: type=1400 audit(322.600:899): avc: denied { write } for pid=5707 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 322.978601][ T5710] $Hÿ: renamed from dummy0 [ 323.366401][ T31] audit: type=1326 audit(323.290:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5711 comm="syz.0.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 323.367011][ T31] audit: type=1326 audit(323.290:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5711 comm="syz.0.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 323.371102][ T31] audit: type=1326 audit(323.300:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5711 comm="syz.0.538" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 323.371756][ T31] audit: type=1326 audit(323.300:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5711 comm="syz.0.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 324.450069][ T5727] SELinux: policydb version 0 does not match my version range 15-35 [ 324.450560][ T5727] SELinux: failed to load policy [ 325.260479][ T5732] netlink: 8 bytes leftover after parsing attributes in process `syz.0.543'. [ 325.262154][ T5732] netlink: 8 bytes leftover after parsing attributes in process `syz.0.543'. [ 325.870516][ T5734] netlink: 4 bytes leftover after parsing attributes in process `syz.0.544'. [ 325.874127][ T5734] hsr_slave_0: left promiscuous mode [ 325.880698][ T5734] hsr_slave_1: left promiscuous mode [ 328.024224][ T5747] ip6gretap0: entered promiscuous mode [ 328.080974][ T5747] ip6gretap0: left promiscuous mode [ 328.841507][ T5756] SELinux: policydb version 0 does not match my version range 15-35 [ 328.859754][ T5756] SELinux: failed to load policy [ 330.081202][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 330.081494][ T31] audit: type=1400 audit(330.010:926): avc: denied { create } for pid=5762 comm="syz.1.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 330.089854][ T31] audit: type=1400 audit(330.010:927): avc: denied { write } for pid=5762 comm="syz.1.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 330.632513][ T31] audit: type=1326 audit(330.560:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.636174][ T31] audit: type=1326 audit(330.560:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.652611][ T31] audit: type=1326 audit(330.580:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.653082][ T31] audit: type=1326 audit(330.580:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.653325][ T31] audit: type=1326 audit(330.580:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.657418][ T31] audit: type=1326 audit(330.580:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.682690][ T31] audit: type=1326 audit(330.610:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.684952][ T31] audit: type=1326 audit(330.610:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5772 comm="syz.1.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.850196][ T5781] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 333.030322][ T5781] usb 2-1: Using ep0 maxpacket: 8 [ 333.094364][ T5781] usb 2-1: unable to get BOS descriptor or descriptor too short [ 333.099776][ T5781] usb 2-1: config 0 has an invalid interface number: 88 but max is 0 [ 333.100742][ T5781] usb 2-1: config 0 has no interface number 0 [ 333.101383][ T5781] usb 2-1: config 0 interface 88 altsetting 8 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 333.102730][ T5781] usb 2-1: config 0 interface 88 has no altsetting 0 [ 333.112004][ T5781] usb 2-1: language id specifier not provided by device, defaulting to English [ 333.121229][ T5781] usb 2-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=96.31 [ 333.121896][ T5781] usb 2-1: New USB device strings: Mfr=1, Product=84, SerialNumber=3 [ 333.122545][ T5781] usb 2-1: Product: syz [ 333.123127][ T5781] usb 2-1: Manufacturer: 뫫憶ë¸å‹²ë½”৳ì»á°ã¹¥è‚—䌛䢌á¿â¤ƒâ­‘튢竹룖㗄Ҥ꨿㯅腺꫓莯묳䢮ã‚ꡧᜥ褷ç¸éŠšáµŸï¢“á²®ä½«ç¯´ä€á¯˜íŒ­êƒ® [ 333.123969][ T5781] usb 2-1: SerialNumber: syz [ 333.151078][ T5781] usb 2-1: config 0 descriptor?? [ 338.185424][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 338.185710][ T31] audit: type=1400 audit(337.990:945): avc: denied { create } for pid=5801 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 338.202633][ T31] audit: type=1400 audit(338.100:946): avc: denied { setopt } for pid=5801 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 338.266396][ T5781] input: 뫫憶ë¸å‹²ë½”৳ì»á°ã¹¥è‚—䌛䢌á¿â¤ƒâ­‘튢竹룖㗄Ҥ꨿㯅腺꫓莯묳䢮ã‚ꡧᜥ褷ç¸éŠšáµŸï¢“á²®ä½«ç¯´ä€á¯˜íŒ­êƒ as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.88/input/input3 [ 339.145723][ T31] audit: type=1400 audit(339.070:947): avc: denied { mount } for pid=5816 comm="syz.0.564" name="/" dev="ramfs" ino=7481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 339.287516][ T31] audit: type=1326 audit(339.210:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.310371][ T31] audit: type=1326 audit(339.230:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.310720][ T31] audit: type=1326 audit(339.230:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.311179][ T31] audit: type=1326 audit(339.230:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.311250][ T31] audit: type=1326 audit(339.230:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.311291][ T31] audit: type=1326 audit(339.230:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.311330][ T31] audit: type=1326 audit(339.230:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.0.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 343.921850][ T5803] usb 2-1: USB disconnect, device number 2 [ 345.212069][ T5847] netlink: 16 bytes leftover after parsing attributes in process `syz.1.570'. [ 345.982260][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 345.982526][ T31] audit: type=1326 audit(345.900:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.024214][ T31] audit: type=1326 audit(345.950:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.083127][ T31] audit: type=1326 audit(345.990:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.086392][ T31] audit: type=1326 audit(346.010:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.125252][ T31] audit: type=1326 audit(346.030:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.190002][ T31] audit: type=1326 audit(346.110:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.300792][ T31] audit: type=1326 audit(346.230:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.330246][ T31] audit: type=1326 audit(346.250:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.451969][ T31] audit: type=1326 audit(346.380:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 346.452350][ T31] audit: type=1326 audit(346.380:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 347.858575][ T5858] netlink: 120 bytes leftover after parsing attributes in process `syz.1.574'. [ 348.113740][ T5823] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 348.123730][ T5823] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 348.346420][ T5864] bond0: (slave bond_slave_0): Releasing backup interface [ 348.510498][ T5864] bond0: (slave bond_slave_1): Releasing backup interface [ 351.453893][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 351.473722][ T31] audit: type=1400 audit(351.380:1069): avc: denied { name_bind } for pid=5869 comm="syz.1.576" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 352.476844][ T31] audit: type=1400 audit(352.400:1070): avc: denied { create } for pid=5871 comm="syz.1.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 352.493323][ T31] audit: type=1400 audit(352.420:1071): avc: denied { ioctl } for pid=5871 comm="syz.1.577" path="socket:[7540]" dev="sockfs" ino=7540 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 353.531667][ T5877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.578'. [ 353.536579][ T5877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.578'. [ 353.570383][ T5877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.578'. [ 353.573280][ T5877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.578'. [ 353.835982][ T5879] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 353.836421][ T5879] IPv6: NLM_F_CREATE should be set when creating new route [ 354.171162][ T31] audit: type=1400 audit(354.090:1072): avc: denied { create } for pid=5880 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 354.201291][ T31] audit: type=1400 audit(354.130:1073): avc: denied { connect } for pid=5880 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 354.482931][ T5883] netlink: 48 bytes leftover after parsing attributes in process `syz.1.581'. [ 355.127875][ T31] audit: type=1400 audit(355.050:1074): avc: denied { watch } for pid=5886 comm="syz.1.583" path="/332/file0" dev="tmpfs" ino=1699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 360.140111][ T31] audit: type=1400 audit(360.060:1075): avc: denied { create } for pid=5898 comm="syz.1.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 361.561963][ T5904] netlink: 'syz.1.588': attribute type 3 has an invalid length. [ 365.785022][ T5916] netlink: 24 bytes leftover after parsing attributes in process `syz.1.591'. [ 369.200956][ T5934] netlink: 87 bytes leftover after parsing attributes in process `syz.1.593'. [ 373.496787][ T31] audit: type=1400 audit(373.420:1076): avc: denied { create } for pid=5943 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 375.874455][ T31] audit: type=1326 audit(375.740:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.874796][ T31] audit: type=1326 audit(375.790:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.945038][ T31] audit: type=1326 audit(375.870:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.945518][ T31] audit: type=1326 audit(375.870:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.945761][ T31] audit: type=1326 audit(375.870:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.945985][ T31] audit: type=1326 audit(375.870:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=393 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.946096][ T31] audit: type=1326 audit(375.870:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.946154][ T31] audit: type=1326 audit(375.870:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 375.953176][ T31] audit: type=1326 audit(375.880:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5953 comm="syz.1.598" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.249646][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 380.249942][ T31] audit: type=1326 audit(380.170:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.250190][ T31] audit: type=1326 audit(380.170:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.275212][ T31] audit: type=1326 audit(380.200:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=359 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.290634][ T31] audit: type=1326 audit(380.200:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.290964][ T31] audit: type=1326 audit(380.220:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.302312][ T31] audit: type=1326 audit(380.230:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.302722][ T31] audit: type=1326 audit(380.230:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.302965][ T31] audit: type=1326 audit(380.230:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5968 comm="syz.1.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 380.643587][ T31] audit: type=1400 audit(380.570:1102): avc: denied { block_suspend } for pid=5972 comm="syz.1.603" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 385.575321][ T31] audit: type=1400 audit(385.500:1103): avc: denied { execute } for pid=5984 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 385.577850][ T31] audit: type=1400 audit(385.500:1104): avc: denied { execute_no_trans } for pid=5984 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 385.699826][ T31] audit: type=1400 audit(385.620:1105): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 387.155885][ T31] audit: type=1326 audit(387.080:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5992 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 387.211912][ T31] audit: type=1326 audit(387.140:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5992 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=235 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 387.213234][ T31] audit: type=1326 audit(387.140:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5992 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 388.110794][ T31] audit: type=1400 audit(387.990:1109): avc: denied { relabelfrom } for pid=5998 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 388.167704][ T31] audit: type=1400 audit(388.090:1110): avc: denied { relabelto } for pid=5998 comm="syz.1.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 388.618523][ T31] audit: type=1400 audit(388.540:1111): avc: denied { create } for pid=6077 comm="syz.1.610" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 388.636992][ T31] audit: type=1400 audit(388.560:1112): avc: denied { write } for pid=6077 comm="syz.1.610" name="file0" dev="tmpfs" ino=1831 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 389.826292][ T6140] wireguard0: entered promiscuous mode [ 389.826644][ T6140] wireguard0: entered allmulticast mode [ 390.553357][ T5985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 390.571805][ T5985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 392.277020][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 392.277289][ T31] audit: type=1326 audit(392.200:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.277819][ T31] audit: type=1326 audit(392.200:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.277911][ T31] audit: type=1326 audit(392.200:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.277941][ T31] audit: type=1326 audit(392.200:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.277994][ T31] audit: type=1326 audit(392.200:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.291886][ T31] audit: type=1326 audit(392.220:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.315881][ T31] audit: type=1400 audit(392.240:1121): avc: denied { mount } for pid=6236 comm="syz.1.618" name="/" dev="configfs" ino=1084 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 392.316362][ T31] audit: type=1326 audit(392.240:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.316611][ T31] audit: type=1326 audit(392.240:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.323958][ T31] audit: type=1326 audit(392.250:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6236 comm="syz.1.618" exe="/syz-executor" sig=0 arch=40000028 syscall=432 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 392.815047][ T5985] hsr_slave_0: entered promiscuous mode [ 392.817362][ T5985] hsr_slave_1: entered promiscuous mode [ 393.965619][ T5985] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 393.985203][ T5985] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 394.004578][ T5985] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 394.024220][ T5985] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 395.657152][ T5985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.773126][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 398.773412][ T31] audit: type=1400 audit(398.700:1128): avc: denied { read } for pid=6400 comm="syz.1.626" path="socket:[8050]" dev="sockfs" ino=8050 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 399.707732][ T31] audit: type=1400 audit(399.630:1129): avc: denied { mount } for pid=6408 comm="syz.1.627" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 399.951278][ T6412] netlink: 'syz.1.628': attribute type 1 has an invalid length. [ 400.173654][ T31] audit: type=1326 audit(400.100:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.190584][ T31] audit: type=1326 audit(400.120:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.212244][ T31] audit: type=1326 audit(400.140:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.216741][ T31] audit: type=1326 audit(400.140:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.222053][ T31] audit: type=1326 audit(400.150:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.241691][ T31] audit: type=1326 audit(400.160:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.243495][ T31] audit: type=1326 audit(400.160:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.245166][ T31] audit: type=1326 audit(400.160:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6415 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 403.204484][ T5985] veth0_vlan: entered promiscuous mode [ 403.247871][ T5985] veth1_vlan: entered promiscuous mode [ 403.371641][ T5985] veth0_macvtap: entered promiscuous mode [ 403.395818][ T5985] veth1_macvtap: entered promiscuous mode [ 403.635452][ T2972] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.636035][ T2972] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.636225][ T2972] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.636400][ T2972] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.848007][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 403.848338][ T31] audit: type=1400 audit(403.770:1159): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/syzkaller.0OQdmW/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 403.848606][ T31] audit: type=1400 audit(403.770:1160): avc: denied { mount } for pid=5985 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 403.863837][ T31] audit: type=1400 audit(403.790:1161): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/syzkaller.0OQdmW/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 403.866233][ T31] audit: type=1400 audit(403.790:1162): avc: denied { mount } for pid=5985 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 403.894221][ T31] audit: type=1400 audit(403.820:1163): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/syzkaller.0OQdmW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 403.896773][ T31] audit: type=1400 audit(403.820:1164): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/syzkaller.0OQdmW/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6960 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 403.922696][ T31] audit: type=1400 audit(403.840:1165): avc: denied { unmount } for pid=5985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 405.216429][ T31] audit: type=1400 audit(405.140:1166): avc: denied { mounton } for pid=5985 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 405.218575][ T31] audit: type=1400 audit(405.140:1167): avc: denied { mount } for pid=5985 comm="syz-executor" name="/" dev="gadgetfs" ino=3088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 405.275720][ T31] audit: type=1400 audit(405.160:1168): avc: denied { mount } for pid=5985 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 406.268426][ T6467] netlink: 28 bytes leftover after parsing attributes in process `syz.1.637'. [ 408.034585][ T6482] netlink: 360 bytes leftover after parsing attributes in process `syz.2.643'. [ 409.542117][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 409.542381][ T31] audit: type=1326 audit(409.470:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.542631][ T31] audit: type=1326 audit(409.470:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.552608][ T31] audit: type=1326 audit(409.480:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.554424][ T31] audit: type=1326 audit(409.480:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.574343][ T31] audit: type=1326 audit(409.490:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.597219][ T31] audit: type=1326 audit(409.520:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.760580][ T31] audit: type=1326 audit(409.610:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.761099][ T31] audit: type=1326 audit(409.680:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.761373][ T31] audit: type=1326 audit(409.680:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 409.761520][ T31] audit: type=1326 audit(409.690:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.1.650" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 410.726167][ T6523] netlink: '+}[@': attribute type 13 has an invalid length. [ 415.490107][ T6557] wg2: entered promiscuous mode [ 415.490736][ T6557] wg2: entered allmulticast mode [ 417.276128][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 417.276486][ T31] audit: type=1400 audit(417.200:1206): avc: denied { write } for pid=6570 comm="syz.2.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 424.900359][ T6629] netlink: 16 bytes leftover after parsing attributes in process `syz.2.684'. [ 425.694958][ T31] audit: type=1326 audit(425.620:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.697270][ T31] audit: type=1326 audit(425.620:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.700014][ T31] audit: type=1326 audit(425.620:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.702668][ T31] audit: type=1326 audit(425.630:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.705181][ T31] audit: type=1326 audit(425.630:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.707643][ T31] audit: type=1326 audit(425.630:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.717920][ T31] audit: type=1326 audit(425.630:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.726306][ T31] audit: type=1326 audit(425.650:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.743308][ T31] audit: type=1326 audit(425.650:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 425.743611][ T31] audit: type=1326 audit(425.650:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6647 comm="syz.2.689" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 429.616843][ T6661] netlink: 12 bytes leftover after parsing attributes in process `syz.1.690'. [ 435.556848][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 435.557945][ T31] audit: type=1326 audit(435.480:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.564661][ T31] audit: type=1326 audit(435.480:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.567358][ T31] audit: type=1326 audit(435.480:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.570436][ T31] audit: type=1326 audit(435.480:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.572652][ T31] audit: type=1326 audit(435.480:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.575570][ T31] audit: type=1326 audit(435.480:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.577775][ T31] audit: type=1326 audit(435.500:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.582206][ T31] audit: type=1326 audit(435.500:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.584488][ T31] audit: type=1326 audit(435.500:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 435.586216][ T31] audit: type=1326 audit(435.500:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6651 comm="syz.2.691" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 436.157460][ T6668] netlink: 12 bytes leftover after parsing attributes in process `syz.1.693'. [ 441.835207][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 441.836013][ T31] audit: type=1400 audit(441.760:1264): avc: denied { write } for pid=6734 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 441.837610][ T31] audit: type=1400 audit(441.760:1265): avc: denied { open } for pid=6734 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 441.862236][ T31] audit: type=1400 audit(441.790:1266): avc: denied { search } for pid=6734 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 441.864228][ T31] audit: type=1400 audit(441.790:1267): avc: denied { search } for pid=6734 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 441.866047][ T31] audit: type=1400 audit(441.790:1268): avc: denied { search } for pid=6734 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 441.868081][ T31] audit: type=1400 audit(441.790:1269): avc: denied { search } for pid=6734 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.099576][ T31] audit: type=1400 audit(442.010:1270): avc: denied { read open } for pid=6735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.109785][ T31] audit: type=1400 audit(442.010:1271): avc: denied { getattr } for pid=6735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.216155][ T31] audit: type=1400 audit(442.140:1272): avc: denied { add_name } for pid=6734 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 442.217908][ T31] audit: type=1400 audit(442.140:1273): avc: denied { create } for pid=6734 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 450.424045][ T6747] netlink: 'syz.1.712': attribute type 10 has an invalid length. [ 450.424490][ T6747] netlink: 40 bytes leftover after parsing attributes in process `syz.1.712'. [ 450.492769][ T6747] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 451.113643][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 451.114711][ T31] audit: type=1326 audit(451.040:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.192436][ T31] audit: type=1326 audit(451.120:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.297401][ T31] audit: type=1326 audit(451.140:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.303216][ T31] audit: type=1326 audit(451.230:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.305197][ T31] audit: type=1326 audit(451.230:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.330373][ T31] audit: type=1326 audit(451.250:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.386521][ T31] audit: type=1326 audit(451.310:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.450059][ T31] audit: type=1326 audit(451.350:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.454251][ T31] audit: type=1326 audit(451.380:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 451.455182][ T31] audit: type=1326 audit(451.380:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6750 comm="syz.1.714" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 460.882677][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 460.883636][ T31] audit: type=1326 audit(460.810:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6766 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 460.886162][ T31] audit: type=1326 audit(460.810:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6766 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 460.909828][ T31] audit: type=1326 audit(460.830:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6766 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 460.920559][ T31] audit: type=1326 audit(460.850:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6766 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 460.922149][ T31] audit: type=1326 audit(460.850:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6766 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.434757][ T31] audit: type=1326 audit(485.360:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.440149][ T31] audit: type=1326 audit(485.360:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.452817][ T31] audit: type=1326 audit(485.380:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.457652][ T31] audit: type=1326 audit(485.380:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.471738][ T31] audit: type=1326 audit(485.400:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.477214][ T31] audit: type=1326 audit(485.400:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.495235][ T31] audit: type=1326 audit(485.420:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.497311][ T31] audit: type=1326 audit(485.420:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.654271][ T31] audit: type=1326 audit(485.480:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 485.656353][ T31] audit: type=1326 audit(485.580:1310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6830 comm="syz.1.746" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 491.422292][ T6832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 491.439077][ T6832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 493.954393][ T6832] hsr_slave_0: entered promiscuous mode [ 493.970228][ T6832] hsr_slave_1: entered promiscuous mode [ 493.971812][ T6832] debugfs: 'hsr0' already exists in 'hsr' [ 493.972190][ T6832] Cannot create hsr debugfs directory [ 494.562746][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 494.563092][ T31] audit: type=1326 audit(494.490:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7131 comm="syz.1.764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 494.590453][ T31] audit: type=1326 audit(494.510:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7131 comm="syz.1.764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 494.596998][ T31] audit: type=1326 audit(494.520:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7131 comm="syz.1.764" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 494.610456][ T31] audit: type=1326 audit(494.520:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7131 comm="syz.1.764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 494.610796][ T31] audit: type=1326 audit(494.540:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7131 comm="syz.1.764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.142087][ T6832] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 495.161169][ T6832] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 495.180335][ T6832] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 495.201519][ T6832] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 496.184660][ T31] audit: type=1400 audit(496.110:1326): avc: denied { connect } for pid=7202 comm="syz.1.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 496.272587][ T31] audit: type=1400 audit(496.200:1327): avc: denied { setopt } for pid=7202 comm="syz.1.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 496.424076][ T31] audit: type=1326 audit(496.350:1328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.1.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 496.433457][ T31] audit: type=1326 audit(496.360:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.1.768" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1280bc code=0x7ffc0000 [ 496.433768][ T31] audit: type=1326 audit(496.360:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7202 comm="syz.1.768" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef508 code=0x7ffc0000 [ 496.895442][ T6832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 499.588795][ T7224] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 499.588904][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 499.589831][ T31] audit: type=1400 audit(499.510:1393): avc: denied { mac_admin } for pid=7223 comm="syz.1.773" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 502.355911][ T7245] netlink: 12 bytes leftover after parsing attributes in process `syz.1.779'. [ 505.371630][ T6832] veth0_vlan: entered promiscuous mode [ 505.417130][ T6832] veth1_vlan: entered promiscuous mode [ 505.608549][ T6832] veth0_macvtap: entered promiscuous mode [ 505.655675][ T6832] veth1_macvtap: entered promiscuous mode [ 505.975004][ T6451] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 505.975362][ T6451] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 505.978329][ T6451] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 505.978710][ T6451] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 507.928085][ T7278] netlink: 'syz.1.787': attribute type 4 has an invalid length. [ 508.807899][ T7287] netlink: 12 bytes leftover after parsing attributes in process `syz.1.791'. [ 508.808234][ T7287] netlink: 5 bytes leftover after parsing attributes in process `syz.1.791'. [ 509.334915][ T31] audit: type=1400 audit(510.254:1394): avc: denied { getopt } for pid=7290 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.238880][ T7295] smc: net device bond0 applied user defined pnetid SYZ0 [ 510.245669][ T7295] smc: net device bond0 erased user defined pnetid SYZ0 [ 512.391986][ T7303] netlink: 40 bytes leftover after parsing attributes in process `syz.1.799'. [ 515.421965][ T7315] netlink: 92 bytes leftover after parsing attributes in process `syz.1.803'. [ 515.424224][ T7315] netlink: 24 bytes leftover after parsing attributes in process `syz.1.803'. [ 515.427595][ T7315] netlink: 24 bytes leftover after parsing attributes in process `syz.1.803'. [ 516.090910][ T31] audit: type=1400 audit(517.014:1395): avc: denied { getopt } for pid=7318 comm="syz.1.805" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 517.131584][ T31] audit: type=1400 audit(518.054:1396): avc: denied { mounton } for pid=7324 comm="syz.1.808" path="/501/file2" dev="tmpfs" ino=2559 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 520.191793][ T31] audit: type=1400 audit(521.114:1397): avc: denied { mount } for pid=7340 comm="syz.1.816" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 520.263580][ T31] audit: type=1400 audit(521.184:1398): avc: denied { unmount } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 521.033224][ T31] audit: type=1400 audit(521.954:1399): avc: denied { write } for pid=7344 comm="syz.1.818" name="protocols" dev="proc" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 523.449974][ T31] audit: type=1400 audit(524.334:1400): avc: denied { lock } for pid=7356 comm="syz.1.824" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 530.288537][ T7391] netlink: 'syz.1.838': attribute type 10 has an invalid length. [ 531.948319][ T7401] netlink: 'syz.1.843': attribute type 1 has an invalid length. [ 532.051161][ T7403] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 532.053244][ T7403] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 532.473614][ T31] audit: type=1400 audit(533.394:1401): avc: denied { create } for pid=7411 comm="syz.1.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 532.839826][ T31] audit: type=1400 audit(533.754:1402): avc: denied { wake_alarm } for pid=7415 comm="syz.3.849" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 534.505367][ T7432] dummy0: entered promiscuous mode [ 534.505878][ T7432] vlan3: entered promiscuous mode [ 535.393867][ T31] audit: type=1400 audit(536.314:1403): avc: denied { read write } for pid=7433 comm="syz.3.854" name="file0" dev="fuse" ino=33554435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 535.408436][ T31] audit: type=1400 audit(536.314:1404): avc: denied { open } for pid=7433 comm="syz.3.854" path="/10/file0/file0" dev="fuse" ino=33554435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 535.576377][ T31] audit: type=1400 audit(536.494:1405): avc: denied { unmount } for pid=6832 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 535.744006][ T7448] netlink: 8 bytes leftover after parsing attributes in process `syz.3.858'. [ 537.534187][ T3811] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 537.553632][ T31] audit: type=1400 audit(538.474:1406): avc: denied { watch watch_reads } for pid=7462 comm="syz.1.864" path="pipe:[899]" dev="pipefs" ino=899 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 537.597744][ T7463] fanotify: failed to encode fid (type=0, len=0, err=-2) [ 537.631973][ T3811] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 537.753169][ T3811] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 537.826766][ T3811] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.253643][ T7480] netlink: 16 bytes leftover after parsing attributes in process `syz.3.866'. [ 538.259817][ T7480] netlink: 32 bytes leftover after parsing attributes in process `syz.3.866'. [ 538.725481][ T3811] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 538.741084][ T3811] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 538.745216][ T3811] bond0 (unregistering): Released all slaves [ 538.932992][ T3811] veth1_macvtap: left promiscuous mode [ 538.934101][ T3811] veth0_macvtap: left promiscuous mode [ 540.436108][ T31] audit: type=1400 audit(541.354:1407): avc: denied { create } for pid=7499 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 540.460241][ T31] audit: type=1400 audit(541.374:1408): avc: denied { bind } for pid=7499 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 540.463722][ T31] audit: type=1400 audit(541.384:1409): avc: denied { setopt } for pid=7499 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 540.467395][ T31] audit: type=1400 audit(541.384:1410): avc: denied { accept } for pid=7499 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 540.488827][ T31] audit: type=1400 audit(541.404:1411): avc: denied { read } for pid=7499 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 541.379806][ T5773] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 541.614801][ T5773] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 541.615059][ T5773] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 541.615239][ T5773] usb 2-1: Product: syz [ 541.615347][ T5773] usb 2-1: Manufacturer: syz [ 541.615384][ T5773] usb 2-1: SerialNumber: syz [ 543.142261][ T5773] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000118. ret = -EPROTO [ 543.143307][ T5773] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 543.156948][ T5773] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 543.161279][ T5773] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 543.194676][ T5773] usb 2-1: USB disconnect, device number 3 [ 544.660482][ T7533] netlink: 'syz.1.879': attribute type 10 has an invalid length. [ 548.526990][ T31] audit: type=1400 audit(549.444:1412): avc: denied { write } for pid=7565 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 550.258818][ T31] audit: type=1400 audit(551.174:1413): avc: denied { getopt } for pid=7577 comm="syz.1.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 563.012536][ T7604] netlink: 28 bytes leftover after parsing attributes in process `syz.1.895'. [ 563.013046][ T7604] netlink: 28 bytes leftover after parsing attributes in process `syz.1.895'. [ 563.045796][ T7604] ip6gretap0: entered promiscuous mode [ 563.047841][ T7604] syz_tun: entered promiscuous mode [ 564.940894][ T31] audit: type=1400 audit(565.864:1414): avc: denied { ioctl } for pid=7619 comm="syz.1.897" path="socket:[10571]" dev="sockfs" ino=10571 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 564.963643][ T31] audit: type=1400 audit(565.884:1415): avc: denied { write } for pid=7619 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 565.330699][ T6754] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 565.500292][ T6754] usb 2-1: Using ep0 maxpacket: 8 [ 565.564770][ T6754] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 565.645368][ T6754] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a3, bcdDevice= 0.40 [ 565.646461][ T6754] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 565.647370][ T6754] usb 2-1: Product: syz [ 565.648022][ T6754] usb 2-1: Manufacturer: syz [ 565.648753][ T6754] usb 2-1: SerialNumber: syz [ 565.682120][ T6754] usbtest 2-1:1.0: couldn't get endpoints, -22 [ 565.683306][ T6754] usbtest 2-1:1.0: probe with driver usbtest failed with error -22 [ 565.894765][ T7623] netlink: 32 bytes leftover after parsing attributes in process `syz.1.898'. [ 565.921770][ T7623] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.898'. [ 565.934394][ T6685] usb 2-1: USB disconnect, device number 4 [ 567.156544][ T31] audit: type=1400 audit(568.074:1416): avc: denied { write } for pid=7647 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 567.158816][ T31] audit: type=1400 audit(568.074:1417): avc: denied { nlmsg_write } for pid=7647 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 568.975277][ T7663] netlink: 'syz.1.905': attribute type 1 has an invalid length. [ 568.998738][ T7663] netlink: 36 bytes leftover after parsing attributes in process `syz.1.905'. [ 569.103583][ T31] audit: type=1400 audit(570.024:1418): avc: denied { ioctl } for pid=7665 comm="syz.3.906" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10615 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 571.159812][ T6754] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 571.501529][ T6754] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 571.502745][ T6754] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 571.503776][ T6754] usb 2-1: Product: syz [ 571.504591][ T6754] usb 2-1: Manufacturer: syz [ 571.505356][ T6754] usb 2-1: SerialNumber: syz [ 572.452150][ T6754] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000010. ret = -EPROTO [ 572.463520][ T6754] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 572.465154][ T6754] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 572.471211][ T6754] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 572.490642][ T6754] usb 2-1: USB disconnect, device number 5 [ 572.790090][ T31] audit: type=1400 audit(573.704:1419): avc: denied { setopt } for pid=7694 comm="syz.1.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 572.808136][ T31] audit: type=1400 audit(573.724:1420): avc: denied { bind } for pid=7694 comm="syz.1.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 572.869991][ T31] audit: type=1400 audit(573.774:1421): avc: denied { write } for pid=7694 comm="syz.1.911" path="socket:[10646]" dev="sockfs" ino=10646 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 572.882281][ T7666] syz.3.906 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 574.955309][ T7723] IPv6: Can't replace route, no match found [ 575.994454][ T7737] netlink: 168 bytes leftover after parsing attributes in process `syz.3.929'. [ 584.494154][ T31] audit: type=1400 audit(585.414:1422): avc: denied { create } for pid=7778 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 584.524707][ T31] audit: type=1400 audit(585.444:1423): avc: denied { ioctl } for pid=7778 comm="syz.1.943" path="socket:[10786]" dev="sockfs" ino=10786 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 584.921307][ T4183] syz_tun (unregistering): left promiscuous mode [ 585.071152][ T3811] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.168432][ T3811] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.265093][ T3811] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.383323][ T3811] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.881954][ T3811] ip6gretap0 (unregistering): left promiscuous mode [ 586.222943][ T3811] bond0 (unregistering): Released all slaves [ 586.258035][ T3811] bond1 (unregistering): Released all slaves [ 586.442727][ T3811] hsr_slave_0: left promiscuous mode [ 586.451789][ T3811] hsr_slave_1: left promiscuous mode [ 586.485322][ T3811] veth1_macvtap: left promiscuous mode [ 586.491348][ T3811] veth0_macvtap: left promiscuous mode [ 586.498227][ T3811] veth1_vlan: left promiscuous mode [ 586.501476][ T3811] veth0_vlan: left promiscuous mode [ 587.675547][ T3811] dummy0 (unregistering): left allmulticast mode [ 588.862024][ T7848] block nbd3: shutting down sockets [ 591.905060][ T7785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 591.915069][ T7785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 593.770326][ T31] audit: type=1400 audit(594.684:1424): avc: denied { connect } for pid=8053 comm="syz.3.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 593.834214][ T8054] netlink: 4 bytes leftover after parsing attributes in process `syz.3.959'. [ 595.071497][ T7785] hsr_slave_0: entered promiscuous mode [ 595.073875][ T7785] hsr_slave_1: entered promiscuous mode [ 595.103621][ T7785] debugfs: 'hsr0' already exists in 'hsr' [ 595.104867][ T7785] Cannot create hsr debugfs directory [ 595.674433][ T31] audit: type=1400 audit(596.594:1425): avc: denied { connect } for pid=8134 comm="syz.3.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 595.685620][ T31] audit: type=1400 audit(596.604:1426): avc: denied { setopt } for pid=8134 comm="syz.3.965" laddr=172.20.20.10 lport=4 faddr=172.20.20.187 fport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 595.693769][ T31] audit: type=1400 audit(596.614:1427): avc: denied { read } for pid=8134 comm="syz.3.965" path="socket:[11975]" dev="sockfs" ino=11975 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 596.872523][ T7785] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 596.905023][ T7785] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 596.926122][ T7785] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 596.957675][ T7785] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 599.368204][ T31] audit: type=1400 audit(600.284:1428): avc: denied { create } for pid=8229 comm="syz.3.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 599.528336][ T7785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 609.008665][ T7785] veth0_vlan: entered promiscuous mode [ 609.066897][ T7785] veth1_vlan: entered promiscuous mode [ 609.272122][ T7785] veth0_macvtap: entered promiscuous mode [ 609.286733][ T7785] veth1_macvtap: entered promiscuous mode [ 609.440147][ T3811] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 609.440582][ T3811] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 609.440752][ T3811] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 609.441151][ T3811] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.499774][ T31] audit: type=1326 audit(611.414:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8321 comm="syz.1.989" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 613.661173][ T31] audit: type=1326 audit(614.564:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8328 comm="syz.3.990" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.679772][ T31] audit: type=1326 audit(614.594:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8328 comm="syz.3.990" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.690352][ T31] audit: type=1326 audit(614.594:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8328 comm="syz.3.990" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.690478][ T31] audit: type=1326 audit(614.594:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8328 comm="syz.3.990" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.693005][ T31] audit: type=1326 audit(614.594:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8328 comm="syz.3.990" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 617.282455][ T8346] bond0: (slave bond_slave_0): Releasing backup interface [ 617.301438][ T8346] bond0: (slave bond_slave_1): Releasing backup interface [ 618.513455][ T8357] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 618.516646][ T8357] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 620.207336][ T5520] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 620.274681][ T8375] af_packet: tpacket_rcv: packet too big, clamped from 60 to 4294967272. macoff=96 [ 620.429554][ T5520] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 620.429851][ T5520] usb 2-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.00 [ 620.429986][ T5520] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 620.442130][ T5520] usb 2-1: config 0 descriptor?? [ 620.447849][ T8370] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 621.008317][ T5520] elan 0003:04F3:0755.0003: hidraw0: USB HID v1.01 Device [HID 04f3:0755] on usb-dummy_hcd.1-1/input0 [ 621.173528][ T6754] usb 2-1: USB disconnect, device number 6 [ 623.140582][ T5520] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 623.359872][ T5520] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 623.371346][ T5520] usb 2-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.00 [ 623.375239][ T5520] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 623.393481][ T5520] usb 2-1: config 0 descriptor?? [ 623.415818][ T8411] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 623.890787][ T5520] elan 0003:04F3:0755.0004: hidraw0: USB HID v1.01 Device [HID 04f3:0755] on usb-dummy_hcd.1-1/input0 [ 624.160618][ T5520] usb 2-1: USB disconnect, device number 7 [ 627.230349][ T31] audit: type=1400 audit(628.144:1435): avc: denied { read } for pid=8444 comm="syz.1.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 628.795226][ T31] audit: type=1400 audit(629.714:1436): avc: denied { bind } for pid=8450 comm="syz.1.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 636.380023][ T31] audit: type=1400 audit(637.294:1437): avc: denied { bind } for pid=8464 comm="syz.1.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 636.381970][ T31] audit: type=1400 audit(637.294:1438): avc: denied { name_bind } for pid=8464 comm="syz.1.1027" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 636.384250][ T31] audit: type=1400 audit(637.294:1439): avc: denied { node_bind } for pid=8464 comm="syz.1.1027" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 636.687501][ T3811] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.781852][ T3811] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.854892][ T3811] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.935043][ T3811] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 637.277809][ T3811] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 637.297933][ T3811] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 637.305806][ T3811] bond0 (unregistering): Released all slaves [ 637.391277][ T3811] hsr_slave_0: left promiscuous mode [ 637.403115][ T3811] hsr_slave_1: left promiscuous mode [ 637.422247][ T3811] veth1_macvtap: left promiscuous mode [ 637.423453][ T3811] veth0_macvtap: left promiscuous mode [ 637.425698][ T3811] veth1_vlan: left promiscuous mode [ 637.426725][ T3811] veth0_vlan: left promiscuous mode [ 638.949793][ T31] audit: type=1400 audit(639.864:1440): avc: denied { watch watch_reads } for pid=8487 comm="syz.1.1028" path="/28/file1" dev="tmpfs" ino=159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 639.830415][ T6754] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 639.992734][ T6754] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 639.994075][ T6754] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 640.003886][ T6754] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 640.004921][ T6754] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 640.005980][ T6754] usb 2-1: Manufacturer: syz [ 640.013284][ T6754] usb 2-1: config 0 descriptor?? [ 640.260713][ T6754] rc_core: IR keymap rc-hauppauge not found [ 640.261162][ T6754] Registered IR keymap rc-empty [ 640.265536][ T6754] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 640.276912][ T6754] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input4 [ 640.298348][ C0] igorplugusb 2-1:0.0: Error: urb status = -32 [ 640.333707][ T6754] usb 2-1: USB disconnect, device number 8 [ 640.658238][ T8542] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1039'. [ 640.773383][ T8542] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1039'. [ 643.945890][ T31] audit: type=1400 audit(644.854:1441): avc: denied { listen } for pid=8546 comm="syz.3.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 655.157881][ T31] audit: type=1326 audit(656.074:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.1.1046" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 655.158377][ T31] audit: type=1326 audit(656.074:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.1.1046" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 655.172078][ T31] audit: type=1326 audit(656.094:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.1.1046" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 655.177880][ T31] audit: type=1326 audit(656.094:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.1.1046" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 655.184542][ T31] audit: type=1326 audit(656.104:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.1.1046" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 655.358638][ T8620] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 657.990720][ T8640] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 657.992691][ T8640] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 671.106359][ T8664] capability: warning: `syz.1.1052' uses deprecated v2 capabilities in a way that may be insecure [ 673.144109][ T31] audit: type=1326 audit(674.054:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.148637][ T31] audit: type=1326 audit(674.064:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.163183][ T31] audit: type=1326 audit(674.064:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.165459][ T31] audit: type=1326 audit(674.064:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.167113][ T31] audit: type=1326 audit(674.074:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.168652][ T31] audit: type=1326 audit(674.084:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.171041][ T31] audit: type=1326 audit(674.084:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=304 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.172733][ T31] audit: type=1326 audit(674.084:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 673.187603][ T31] audit: type=1326 audit(674.094:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8712 comm="syz.1.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 674.087751][ T31] audit: type=1400 audit(674.994:1456): avc: denied { getopt } for pid=8723 comm="syz.1.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 674.930357][ T5518] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 675.100005][ T5518] usb 2-1: Using ep0 maxpacket: 16 [ 675.188257][ T5518] usb 2-1: New USB device found, idVendor=06be, idProduct=a232, bcdDevice=33.f3 [ 675.188571][ T5518] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 675.188774][ T5518] usb 2-1: Product: syz [ 675.189890][ T5518] usb 2-1: Manufacturer: syz [ 675.189960][ T5518] usb 2-1: SerialNumber: syz [ 675.205608][ T5518] usb 2-1: config 0 descriptor?? [ 676.404955][ T8742] ------------[ cut here ]------------ [ 676.405513][ T8742] WARNING: CPU: 0 PID: 8742 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 676.408727][ T8742] Modules linked in: [ 676.411437][ T8742] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 676.418747][ T8742] CPU: 0 UID: 0 PID: 8742 Comm: syz.3.1079 Not tainted syzkaller #0 PREEMPT [ 676.419693][ T8742] Hardware name: ARM-Versatile Express [ 676.420232][ T8742] Call trace: [ 676.420810][ T8742] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 676.421622][ T8742] r7:00000000 r6:8281f77c r5:00000000 r4:822603d4 [ 676.422281][ T8742] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 676.423045][ T8742] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 676.423692][ T8742] r5:00000000 r4:82a77d18 [ 676.423987][ T8742] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 676.424460][ T8742] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 676.425020][ T8742] r7:804bec80 [ 676.425374][ T8742] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 676.425946][ T8742] r3:8280c684 r2:00000001 r1:82246df0 r0:8224e86c [ 676.426244][ T8742] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 676.426878][ T8742] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 676.427564][ T8742] r8:00000009 r7:8227ac18 r6:dfb41d14 r5:84188c00 r4:00000000 [ 676.428069][ T8742] [<80254bd0>] (warn_slowpath_fmt) from [<804bec80>] (kunmap_local_indexed+0x20c/0x224) [ 676.428917][ T8742] r10:00000000 r9:ded49e80 r8:decf0c5c r7:00a00000 r6:00000003 r5:84188c00 [ 676.429400][ T8742] r4:ffefd000 [ 676.429551][ T8742] [<804bea74>] (kunmap_local_indexed) from [<8053b464>] (move_pages+0xb1c/0x1a00) [ 676.430109][ T8742] r7:00a00000 r6:00000000 r5:85ec2e1c r4:ffefb000 [ 676.430467][ T8742] [<8053a948>] (move_pages) from [<805c4abc>] (userfaultfd_ioctl+0x1254/0x2408) [ 676.430954][ T8742] r10:85e49d40 r9:dfb41e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 676.431455][ T8742] r4:8ddc2080 [ 676.431625][ T8742] [<805c3868>] (userfaultfd_ioctl) from [<8056cd68>] (sys_ioctl+0x130/0xba0) [ 676.432102][ T8742] r10:84188c00 r9:00000004 r8:85fde000 r7:20000040 r6:85fde001 r5:00000000 [ 676.432465][ T8742] r4:c028aa05 [ 676.432610][ T8742] [<8056cc38>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 676.433017][ T8742] Exception stack(0xdfb41fa8 to 0xdfb41ff0) [ 676.433382][ T8742] 1fa0: 00000000 00000000 00000004 c028aa05 20000040 00000000 [ 676.433795][ T8742] 1fc0: 00000000 00000000 002f63a8 00000036 002e0000 00000000 00006364 76f730bc [ 676.434141][ T8742] 1fe0: 76f72ec0 76f72eb0 0001948c 001322c0 [ 676.434457][ T8742] r10:00000036 r9:84188c00 r8:8020029c r7:00000036 r6:002f63a8 r5:00000000 [ 676.434770][ T8742] r4:00000000 [ 676.438313][ T8742] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:27:40 Registers: info registers vcpu 0 CPU#0 R00=84185840 R01=00000063 R02=eb803000 R03=00000000 R04=82abb116 R05=84185840 R06=80a795bc R07=82abb144 R08=82826ef8 R09=00000000 R10=0000072d R11=dfb41a74 R12=00000002 R13=dfb41a68 R14=829590c4 R15=80a79618 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=a70fc000 R01=eb204000 R02=00000001 R03=80239bb8 R04=7f26e000 R05=00000001 R06=82ac8f44 R07=82ac8320 R08=7f26e000 R09=eb204000 R10=8280c9b4 R11=eab91d9c R12=eab91da0 R13=eab91d70 R14=80230af0 R15=80239bd0 PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000