last executing test programs: 2m27.766725461s ago: executing program 1 (id=415): r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r0, &(0x7f0000002a40)=[{{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f00000013c0)=""/50, 0x32}, {&(0x7f0000001400)=""/226, 0xe2}], 0x2}, 0x5}], 0x1, 0x10000, 0x0) 2m23.08679987s ago: executing program 1 (id=422): r0 = socket(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0xe64, 0xb, @empty, 0x5}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) sendto$inet6(r0, 0x0, 0x0, 0x20000081, &(0x7f0000000100)={0xa, 0x4e24, 0x5, @loopback, 0x7fffffff}, 0x1c) 2m22.729712964s ago: executing program 1 (id=424): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0xffa8) 2m22.439159236s ago: executing program 1 (id=426): timer_create(0x8, &(0x7f00000002c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_delete(r0) 2m21.960004875s ago: executing program 1 (id=428): syz_emit_ethernet(0x3e, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timerfd_create(0x7, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7"], &(0x7f0000000380)='GPL\x00', 0x10000, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 2m21.430828117s ago: executing program 1 (id=429): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000404000009"], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x64000600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000003000000040000000108000001000000", @ANYRES32=r0, @ANYBLOB="b41500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100fdff"], 0x50) 1m36.333398342s ago: executing program 32 (id=429): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000404000009"], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x64000600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000003000000040000000108000001000000", @ANYRES32=r0, @ANYBLOB="b41500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100fdff"], 0x50) 27.220209694s ago: executing program 2 (id=623): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) ioprio_get$pid(0x3, 0x0) 26.761098292s ago: executing program 2 (id=624): prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r0, 0x0, 0x91}, 0x18) fchmod(0xffffffffffffffff, 0x8) 26.57859773s ago: executing program 2 (id=625): r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [0x4, 0x6, 0x0, 0x5, 0x8, 0x6]}, &(0x7f00000000c0)=0x78) 26.31052202s ago: executing program 2 (id=626): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000104000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)\x00'/28], 0x50) timer_create(0x0, 0x0, &(0x7f0000000100)) r0 = socket(0x10, 0x3, 0x0) r1 = syz_io_uring_setup(0x304, &(0x7f0000000300)={0x0, 0x8006d85, 0x400, 0x2, 0x200118}, 0x0, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_enter(r1, 0x8aa, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r0, 0x0, 0x0, 0x10122, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) 3.177058762s ago: executing program 0 (id=633): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x3c0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x457}, {}, {0x0, 0xc}, 0x0, 0x3f0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2d, 0x2, 0x0, 0x5}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0x3cb1, 0x1c080, 0xa, 0x20002f7}) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 3.004186059s ago: executing program 0 (id=634): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x1022000, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) 2.519306918s ago: executing program 0 (id=635): r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x4) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2}, 0x94) close(r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x18, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000ffffff80e500020000000000c500fcff000000007f00feffd100000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='virtio_transport_alloc_pkt\x00', r2}, 0x18) sendmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="1b", 0x1}], 0x1}}], 0x1, 0x0) 1.180671512s ago: executing program 0 (id=636): openat$iommufd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a2, &(0x7f0000000000)='bridge0\x00') syz_emit_ethernet(0x22, &(0x7f0000000080)={@local, @random="429e82211cf8", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x2, 0x0, 0x14, 0x65, 0x0, 0x2, 0x6c, 0x0, @rand_addr=0x64010100, @broadcast}}}}}, 0x0) 576.546116ms ago: executing program 2 (id=637): socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36e, 0xc000, 0xc, 0xa0002f5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000000)=0x2200a, 0x4) io_uring_enter(r0, 0x2216, 0x7721, 0x16, 0x0, 0x3b) 439.303372ms ago: executing program 0 (id=638): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f", 0xd}], 0x1}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x4, &(0x7f0000000040)={0x0, 0xc89e, 0xc000, 0x8, 0x20002f7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x221a, 0x7721, 0x16, 0x0, 0x0) 189.919272ms ago: executing program 0 (id=639): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x6c, 0x9, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x84}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000005a40)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x1c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x51}, 0x0) 0s ago: executing program 2 (id=640): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi1\x00', 0x2180, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000300)={'comedi_parport\x00', [0x2f00, 0x5, 0xd09a, 0xffffffff, 0x3, 0xfffffffe, 0x20000004, 0x3, 0xffe, 0x7fffffff, 0xc, 0x2, 0x4, 0x8, 0xffff, 0x6, 0x5, 0x7ff, 0x830, 0x8, 0x10000, 0x9, 0x800, 0x101, 0x2, 0x8001, 0x7, 0x3, 0x4, 0x5, 0x70f]}) ioctl$COMEDI_INSN(r0, 0x8028640c, &(0x7f0000000000)={0x4000000, 0xf, &(0x7f0000000080)=[0x3, 0xfff, 0x4, 0xb, 0x663, 0x4, 0xe0, 0xfffffff7, 0x9, 0xf6, 0xffffffff, 0x2, 0x200, 0x4, 0x6], 0x3}) kernel console output (not intermixed with test programs): [ 45.728651][ T31] audit: type=1400 audit(45.660:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.731275][ T31] audit: type=1400 audit(45.660:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:44270' (ED25519) to the list of known hosts. [ 60.612550][ T31] audit: type=1400 audit(60.540:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.006435][ T31] audit: type=1400 audit(61.920:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.066211][ T31] audit: type=1400 audit(61.990:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.880068][ T31] audit: type=1400 audit(64.810:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.883731][ T31] audit: type=1400 audit(64.810:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.896032][ T3094] cgroup: Unknown subsys name 'net' [ 64.900802][ T31] audit: type=1400 audit(64.830:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.119602][ T3094] cgroup: Unknown subsys name 'cpuset' [ 65.127168][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 65.128421][ T3094] cgroup: Unknown subsys name 'rlimit' [ 65.430723][ T31] audit: type=1400 audit(65.360:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.433752][ T31] audit: type=1400 audit(65.360:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 65.436773][ T31] audit: type=1400 audit(65.370:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 65.643929][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 65.650062][ T31] audit: type=1400 audit(65.580:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.659353][ T31] audit: type=1400 audit(65.590:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 65.704469][ T31] audit: type=1400 audit(65.630:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.714064][ T31] audit: type=1400 audit(65.630:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.534036][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.347212][ T31] audit: type=1400 audit(74.280:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.409030][ T31] audit: type=1400 audit(74.340:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.412153][ T31] audit: type=1400 audit(74.340:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.420228][ T31] audit: type=1400 audit(74.350:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.449812][ T31] audit: type=1400 audit(74.380:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.451557][ T31] audit: type=1400 audit(74.380:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.532044][ T31] audit: type=1400 audit(74.460:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 74.533593][ T31] audit: type=1400 audit(74.460:78): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.029317][ T31] audit: type=1400 audit(74.960:79): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.935416][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.942569][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.186627][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.192936][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.826133][ T3100] hsr_slave_0: entered promiscuous mode [ 76.829815][ T3100] hsr_slave_1: entered promiscuous mode [ 77.181892][ T3099] hsr_slave_0: entered promiscuous mode [ 77.183621][ T3099] hsr_slave_1: entered promiscuous mode [ 77.185582][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 77.186091][ T3099] Cannot create hsr debugfs directory [ 77.288725][ T31] audit: type=1400 audit(77.220:80): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.303888][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.320164][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.360716][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.380080][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.637735][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.649016][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.659515][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.669085][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.171037][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.422855][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.659604][ T3099] veth0_vlan: entered promiscuous mode [ 80.684100][ T3099] veth1_vlan: entered promiscuous mode [ 80.757905][ T3099] veth0_macvtap: entered promiscuous mode [ 80.768783][ T3099] veth1_macvtap: entered promiscuous mode [ 80.781873][ T3100] veth0_vlan: entered promiscuous mode [ 80.801007][ T3100] veth1_vlan: entered promiscuous mode [ 80.860499][ T1055] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.860992][ T1055] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.861121][ T1055] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.861197][ T1055] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.901641][ T3100] veth0_macvtap: entered promiscuous mode [ 80.950996][ T3100] veth1_macvtap: entered promiscuous mode [ 81.059916][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 81.062972][ T31] audit: type=1400 audit(80.990:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.075453][ T31] audit: type=1400 audit(81.000:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.SJ9fes/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.082522][ T31] audit: type=1400 audit(81.010:85): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.095163][ T31] audit: type=1400 audit(81.020:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.SJ9fes/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.101082][ T1055] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.101611][ T1055] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.101882][ T1055] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.101970][ T1055] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.109870][ T31] audit: type=1400 audit(81.040:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.SJ9fes/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.131779][ T31] audit: type=1400 audit(81.060:88): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.157539][ T31] audit: type=1400 audit(81.090:89): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.181479][ T31] audit: type=1400 audit(81.100:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.190215][ T31] audit: type=1400 audit(81.120:91): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.194457][ T31] audit: type=1400 audit(81.120:92): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.270086][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.080919][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 86.085551][ T31] audit: type=1400 audit(86.010:115): avc: denied { name_bind } for pid=3830 comm="syz.0.12" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 86.087355][ T31] audit: type=1400 audit(86.020:116): avc: denied { node_bind } for pid=3830 comm="syz.0.12" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 86.995854][ T31] audit: type=1400 audit(86.930:117): avc: denied { create } for pid=3843 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.011959][ T31] audit: type=1400 audit(86.940:118): avc: denied { bind } for pid=3843 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.245175][ T31] audit: type=1400 audit(87.170:119): avc: denied { create } for pid=3843 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 87.292131][ T31] audit: type=1400 audit(87.180:120): avc: denied { setopt } for pid=3843 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 89.595936][ T31] audit: type=1326 audit(89.520:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3848 comm="syz.0.16" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 89.607418][ T31] audit: type=1326 audit(89.530:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3848 comm="syz.0.16" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=0 ip=0x132510 code=0x7ffc0000 [ 89.608834][ T31] audit: type=1326 audit(89.540:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3848 comm="syz.0.16" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 89.612628][ T31] audit: type=1326 audit(89.540:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3848 comm="syz.0.16" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132510 code=0x7ffc0000 [ 90.205827][ T3855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.18'. [ 90.456220][ T3855] netlink: 4 bytes leftover after parsing attributes in process `syz.0.18'. [ 92.955362][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 92.955668][ T31] audit: type=1326 audit(92.880:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.979517][ T31] audit: type=1326 audit(92.910:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.988589][ T31] audit: type=1326 audit(92.920:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.988747][ T31] audit: type=1326 audit(92.920:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.988791][ T31] audit: type=1326 audit(92.920:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.992797][ T31] audit: type=1326 audit(92.920:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.999598][ T31] audit: type=1326 audit(92.930:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 92.999947][ T31] audit: type=1326 audit(92.930:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 93.013917][ T31] audit: type=1326 audit(92.940:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 93.029895][ T31] audit: type=1326 audit(92.960:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3875 comm="syz.0.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 94.042905][ T3889] capability: warning: `syz.1.28' uses deprecated v2 capabilities in a way that may be insecure [ 95.596554][ T3904] netlink: 4 bytes leftover after parsing attributes in process `syz.1.32'. [ 95.607476][ T3904] netlink: 4 bytes leftover after parsing attributes in process `syz.1.32'. [ 99.160594][ T3925] netlink: 28 bytes leftover after parsing attributes in process `syz.1.38'. [ 99.161555][ T3925] Zero length message leads to an empty skb [ 99.428363][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 99.428704][ T31] audit: type=1400 audit(99.360:165): avc: denied { write } for pid=3928 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 101.039558][ T3943] netlink: 24 bytes leftover after parsing attributes in process `syz.0.46'. [ 101.805925][ T31] audit: type=1400 audit(101.730:166): avc: denied { write } for pid=3948 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 102.440686][ T3956] netlink: 20 bytes leftover after parsing attributes in process `syz.0.51'. [ 103.110851][ T3961] Driver unsupported XDP return value 0 on prog (id 37) dev N/A, expect packet loss! [ 103.387764][ T3964] veth2: entered promiscuous mode [ 103.388291][ T3964] veth2: entered allmulticast mode [ 103.708786][ T31] audit: type=1326 audit(103.640:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3979 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 103.709149][ T31] audit: type=1326 audit(103.640:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3979 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 103.712013][ T31] audit: type=1326 audit(103.640:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3979 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x132510 code=0x7ffc0000 [ 103.712300][ T31] audit: type=1326 audit(103.640:170): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3979 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 103.712519][ T31] audit: type=1326 audit(103.640:171): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3979 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 105.630075][ T3991] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 106.402736][ T31] audit: type=1400 audit(106.330:172): avc: denied { create } for pid=3998 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 110.760034][ T4005] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 112.651832][ T31] audit: type=1400 audit(112.580:173): avc: denied { create } for pid=4010 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 112.667434][ T31] audit: type=1400 audit(112.590:174): avc: denied { bind } for pid=4010 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 112.728193][ T31] audit: type=1400 audit(112.660:175): avc: denied { write } for pid=4010 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 114.688699][ T31] audit: type=1400 audit(114.570:176): avc: denied { name_bind } for pid=4024 comm="syz.0.67" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 116.115291][ T31] audit: type=1400 audit(116.040:177): avc: denied { create } for pid=4030 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 118.330468][ T31] audit: type=1400 audit(118.230:178): avc: denied { create } for pid=4048 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 118.343580][ T31] audit: type=1400 audit(118.270:179): avc: denied { write } for pid=4048 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 118.349012][ T31] audit: type=1400 audit(118.270:180): avc: denied { nlmsg_write } for pid=4048 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.556243][ T31] audit: type=1400 audit(119.490:181): avc: denied { setopt } for pid=4053 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.361614][ T31] audit: type=1400 audit(120.290:182): avc: denied { create } for pid=4061 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 120.384529][ T31] audit: type=1400 audit(120.310:183): avc: denied { write } for pid=4061 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 120.410161][ T31] audit: type=1326 audit(120.340:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4061 comm="syz.0.79" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 120.412257][ T31] audit: type=1326 audit(120.340:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4061 comm="syz.0.79" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132510 code=0x7ffc0000 [ 120.414103][ T31] audit: type=1326 audit(120.340:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4061 comm="syz.0.79" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 120.425043][ T31] audit: type=1326 audit(120.350:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4061 comm="syz.0.79" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 123.471306][ T4094] netlink: 'syz.0.90': attribute type 10 has an invalid length. [ 123.472505][ T4094] netlink: 40 bytes leftover after parsing attributes in process `syz.0.90'. [ 124.647024][ T31] audit: type=1400 audit(124.580:188): avc: denied { create } for pid=4105 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 125.215553][ T31] audit: type=1400 audit(125.130:189): avc: denied { mount } for pid=4105 comm="syz.0.94" name="/" dev="configfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 125.229271][ T31] audit: type=1400 audit(125.160:190): avc: denied { search } for pid=4105 comm="syz.0.94" name="/" dev="configfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 125.238626][ T31] audit: type=1400 audit(125.170:191): avc: denied { search } for pid=4105 comm="syz.0.94" name="/" dev="configfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 125.238779][ T31] audit: type=1400 audit(125.170:192): avc: denied { read open } for pid=4105 comm="syz.0.94" path="/" dev="configfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 125.315092][ T31] audit: type=1400 audit(125.240:193): avc: denied { create } for pid=4115 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.255130][ T31] audit: type=1400 audit(127.170:194): avc: denied { create } for pid=4125 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 129.479941][ T31] audit: type=1400 audit(129.410:195): avc: denied { ioctl } for pid=4137 comm="syz.0.102" path="socket:[3531]" dev="sockfs" ino=3531 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 131.015503][ T31] audit: type=1400 audit(130.870:196): avc: denied { setopt } for pid=4115 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.586807][ T31] audit: type=1400 audit(146.520:197): avc: denied { setopt } for pid=4186 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 146.603479][ T31] audit: type=1400 audit(146.530:198): avc: denied { ioctl } for pid=4186 comm="syz.1.111" path="socket:[3590]" dev="sockfs" ino=3590 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 150.108926][ T31] audit: type=1400 audit(150.040:199): avc: denied { create } for pid=4205 comm="syz.1.116" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 150.120800][ T31] audit: type=1400 audit(150.050:200): avc: denied { write } for pid=4205 comm="syz.1.116" name="file0" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 150.121154][ T31] audit: type=1400 audit(150.050:201): avc: denied { open } for pid=4205 comm="syz.1.116" path="/30/file0" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 150.181159][ T31] audit: type=1400 audit(150.110:202): avc: denied { unlink } for pid=3100 comm="syz-executor" name="file0" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 150.699447][ T31] audit: type=1400 audit(150.630:203): avc: denied { audit_write } for pid=4211 comm="syz.1.119" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 150.700315][ T31] audit: type=1107 audit(150.630:204): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 154.098321][ T4243] netlink: 16 bytes leftover after parsing attributes in process `syz.1.131'. [ 156.999395][ T31] audit: type=1326 audit(156.930:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 157.001315][ T31] audit: type=1326 audit(156.930:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132510 code=0x7ffc0000 [ 157.002038][ T31] audit: type=1326 audit(156.930:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 157.004007][ T31] audit: type=1326 audit(156.930:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.905787][ T31] audit: type=1326 audit(162.820:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.906142][ T31] audit: type=1326 audit(162.830:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.906212][ T31] audit: type=1326 audit(162.840:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.906314][ T31] audit: type=1326 audit(162.840:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.910264][ T31] audit: type=1326 audit(162.840:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132510 code=0x7ffc0000 [ 162.918687][ T31] audit: type=1326 audit(162.850:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 164.332152][ T4268] netlink: 'syz.1.142': attribute type 4 has an invalid length. [ 164.405878][ T4268] netlink: 'syz.1.142': attribute type 4 has an invalid length. [ 178.812171][ T31] audit: type=1400 audit(178.740:215): avc: denied { mount } for pid=4284 comm="syz.1.150" name="/" dev="ramfs" ino=2753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 179.074467][ T31] audit: type=1400 audit(179.000:216): avc: denied { mount } for pid=4287 comm="syz.1.151" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 179.104167][ T31] audit: type=1400 audit(179.030:217): avc: denied { mounton } for pid=4287 comm="syz.1.151" path="/64/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 179.237874][ T31] audit: type=1400 audit(179.170:218): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 179.751291][ T31] audit: type=1400 audit(179.680:219): avc: denied { sqpoll } for pid=4291 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 180.309358][ T4297] lo: entered allmulticast mode [ 180.341189][ T4297] tunl0: entered allmulticast mode [ 180.345580][ T4297] gre0: entered allmulticast mode [ 180.348870][ T4297] gretap0: entered allmulticast mode [ 180.349859][ T4297] erspan0: entered allmulticast mode [ 180.367103][ T4297] ip_vti0: entered allmulticast mode [ 180.371663][ T4297] ip6_vti0: entered allmulticast mode [ 180.416395][ T4297] sit0: entered allmulticast mode [ 180.438708][ T4297] ip6tnl0: entered allmulticast mode [ 180.460648][ T4297] ip6gre0: entered allmulticast mode [ 180.482366][ T4297] syz_tun: entered allmulticast mode [ 180.509173][ T4297] ip6gretap0: entered allmulticast mode [ 180.529704][ T4297] vcan0: entered allmulticast mode [ 180.531262][ T4297] bond0: entered allmulticast mode [ 180.531712][ T4297] bond_slave_0: entered allmulticast mode [ 180.531877][ T4297] bond_slave_1: entered allmulticast mode [ 180.532952][ T4297] dummy0: entered allmulticast mode [ 180.534247][ T4297] nlmon0: entered allmulticast mode [ 180.544275][ T4297] vxcan0: entered allmulticast mode [ 180.600544][ T4297] vxcan1: entered allmulticast mode [ 180.601569][ T4297] veth0: entered allmulticast mode [ 180.602175][ T4297] veth1: entered allmulticast mode [ 180.603135][ T4297] wg0: entered allmulticast mode [ 180.604222][ T4297] wg1: entered allmulticast mode [ 180.617215][ T4297] wg2: entered allmulticast mode [ 180.638749][ T4297] veth0_to_bridge: entered allmulticast mode [ 180.639860][ T4297] bridge_slave_0: entered allmulticast mode [ 180.640782][ T4297] veth1_to_bridge: entered allmulticast mode [ 180.641719][ T4297] bridge_slave_1: entered allmulticast mode [ 180.642688][ T4297] veth0_to_bond: entered allmulticast mode [ 180.662970][ T4297] veth1_to_bond: entered allmulticast mode [ 180.688701][ T4297] veth0_to_team: entered allmulticast mode [ 180.718581][ T4297] team_slave_0: entered allmulticast mode [ 180.720771][ T4297] veth1_to_team: entered allmulticast mode [ 180.735856][ T4297] team_slave_1: entered allmulticast mode [ 180.737632][ T4297] veth0_to_batadv: entered allmulticast mode [ 180.740040][ T4297] batadv_slave_0: entered allmulticast mode [ 180.741193][ T4297] veth1_to_batadv: entered allmulticast mode [ 180.742166][ T4297] batadv_slave_1: entered allmulticast mode [ 180.743533][ T4297] xfrm0: entered allmulticast mode [ 180.764147][ T4297] veth0_to_hsr: entered allmulticast mode [ 180.766554][ T4297] hsr_slave_0: entered allmulticast mode [ 180.769147][ T4297] veth1_to_hsr: entered allmulticast mode [ 180.773521][ T4297] hsr_slave_1: entered allmulticast mode [ 180.774588][ T4297] hsr0: entered allmulticast mode [ 180.783311][ T4297] veth1_virt_wifi: entered allmulticast mode [ 180.788543][ T4297] veth0_virt_wifi: entered allmulticast mode [ 180.789648][ T4297] veth1_vlan: entered allmulticast mode [ 180.790217][ T4297] veth0_vlan: entered allmulticast mode [ 180.792856][ T4297] vlan0: entered allmulticast mode [ 180.793986][ T4297] vlan1: entered allmulticast mode [ 180.809404][ T4297] macvlan0: entered allmulticast mode [ 180.811196][ T4297] macvlan1: entered allmulticast mode [ 180.813560][ T4297] ipvlan0: entered allmulticast mode [ 180.918936][ T4297] ipvlan1: entered allmulticast mode [ 180.940397][ T4297] veth1_macvtap: entered allmulticast mode [ 180.948406][ T4297] veth0_macvtap: entered allmulticast mode [ 180.956407][ T4297] macvtap0: entered allmulticast mode [ 180.958468][ T4297] macsec0: entered allmulticast mode [ 180.966777][ T4297] geneve0: entered allmulticast mode [ 180.968952][ T4297] geneve1: entered allmulticast mode [ 180.971294][ T4297] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 180.996900][ T4297] netdevsim netdevsim1 netdevsim1: entered allmulticast mode [ 181.076698][ T4297] netdevsim netdevsim1 netdevsim2: entered allmulticast mode [ 181.078121][ T4297] netdevsim netdevsim1 netdevsim3: entered allmulticast mode [ 181.388660][ T31] audit: type=1400 audit(181.320:220): avc: denied { ioctl } for pid=4302 comm="syz.1.158" path="socket:[3708]" dev="sockfs" ino=3708 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.397216][ T31] audit: type=1400 audit(181.330:221): avc: denied { write } for pid=4302 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.687249][ T4307] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 182.967434][ T31] audit: type=1400 audit(182.890:222): avc: denied { write } for pid=4318 comm="syz.1.166" name="ip_mr_vif" dev="proc" ino=4026532676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 183.425657][ T4323] netlink: 'syz.1.167': attribute type 4 has an invalid length. [ 183.447853][ T4323] netlink: 'syz.1.167': attribute type 4 has an invalid length. [ 185.141049][ T4336] netlink: 4 bytes leftover after parsing attributes in process `syz.0.173'. [ 185.208593][ T31] audit: type=1400 audit(185.140:223): avc: denied { create } for pid=4335 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 186.963258][ T31] audit: type=1326 audit(186.890:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4345 comm="syz.1.176" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 186.963666][ T31] audit: type=1326 audit(186.890:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4345 comm="syz.1.176" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 186.981214][ T31] audit: type=1326 audit(186.900:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4345 comm="syz.1.176" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x132510 code=0x7ffc0000 [ 186.983937][ T31] audit: type=1326 audit(186.910:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4345 comm="syz.1.176" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 187.770072][ T4358] netlink: 4 bytes leftover after parsing attributes in process `syz.1.182'. [ 187.848919][ T4358] erspan0: entered promiscuous mode [ 187.849460][ T4358] macvtap1: entered promiscuous mode [ 187.849960][ T4358] macvtap1: entered allmulticast mode [ 187.887950][ T4358] erspan0: left promiscuous mode [ 187.896232][ T4358] macvtap1: left promiscuous mode [ 187.897232][ T4358] macvtap1: left allmulticast mode [ 191.305562][ T31] audit: type=1400 audit(191.230:228): avc: denied { watch_reads } for pid=4382 comm="syz.1.193" path="/82" dev="tmpfs" ino=431 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 191.769984][ T31] audit: type=1400 audit(191.700:229): avc: denied { setopt } for pid=4389 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 194.070922][ T31] audit: type=1400 audit(194.000:230): avc: denied { bind } for pid=4412 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 196.346507][ T31] audit: type=1400 audit(196.280:231): avc: denied { create } for pid=4434 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 196.389032][ T31] audit: type=1400 audit(196.320:232): avc: denied { connect } for pid=4434 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 198.928985][ T4438] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4438 comm=syz.1.217 [ 199.870047][ T4443] netlink: 96 bytes leftover after parsing attributes in process `GPL'. [ 201.789162][ T4451] netlink: 16 bytes leftover after parsing attributes in process `syz.0.223'. [ 202.115263][ T31] audit: type=1326 audit(202.030:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.115672][ T31] audit: type=1326 audit(202.030:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.150443][ T31] audit: type=1326 audit(202.080:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.162644][ T31] audit: type=1326 audit(202.080:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.164908][ T31] audit: type=1326 audit(202.080:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.166687][ T31] audit: type=1326 audit(202.090:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.178237][ T31] audit: type=1326 audit(202.110:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.181262][ T31] audit: type=1326 audit(202.110:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.188401][ T31] audit: type=1326 audit(202.120:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.198484][ T31] audit: type=1326 audit(202.130:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.0.225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 205.447991][ T4484] syz.0.237 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 207.219301][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 207.220345][ T31] audit: type=1326 audit(207.150:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.223279][ T31] audit: type=1326 audit(207.150:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.225261][ T31] audit: type=1326 audit(207.150:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.227913][ T31] audit: type=1326 audit(207.150:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.235825][ T31] audit: type=1326 audit(207.150:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.237659][ T31] audit: type=1326 audit(207.160:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.239149][ T31] audit: type=1326 audit(207.160:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.241518][ T31] audit: type=1326 audit(207.160:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.243273][ T31] audit: type=1326 audit(207.160:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 207.247152][ T31] audit: type=1326 audit(207.170:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4495 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 208.812063][ T4528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=4528 comm=syz.1.247 [ 211.237095][ T4563] netlink: 27 bytes leftover after parsing attributes in process `syz.1.259'. [ 211.315832][ T4563] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 211.690706][ T4569] netlink: 12 bytes leftover after parsing attributes in process `syz.1.262'. [ 213.126988][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 213.127202][ T31] audit: type=1400 audit(213.060:288): avc: denied { bind } for pid=4595 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 213.207285][ T31] audit: type=1400 audit(213.090:289): avc: denied { read } for pid=4593 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 214.453271][ T4605] mmap: syz.0.276 (4605) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 214.981631][ T31] audit: type=1326 audit(214.910:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 214.987339][ T31] audit: type=1326 audit(214.920:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 214.987622][ T31] audit: type=1326 audit(214.920:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 214.987836][ T31] audit: type=1326 audit(214.920:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 214.998262][ T31] audit: type=1326 audit(214.930:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132510 code=0x7ffc0000 [ 214.998765][ T31] audit: type=1326 audit(214.930:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 215.002811][ T31] audit: type=1326 audit(214.930:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 215.003139][ T31] audit: type=1326 audit(214.930:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132510 code=0x7ffc0000 [ 216.979140][ T4630] SELinux: Context system_u:object_r:dhcp_state_t:s0 is not valid (left unmapped). [ 218.933944][ T4645] netlink: 4 bytes leftover after parsing attributes in process `syz.1.288'. [ 218.959476][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 218.959772][ T31] audit: type=1400 audit(218.890:325): avc: denied { write } for pid=4643 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 221.907126][ T31] audit: type=1400 audit(221.840:326): avc: denied { read } for pid=4691 comm="syz.1.297" path="socket:[4246]" dev="sockfs" ino=4246 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 223.923162][ T31] audit: type=1400 audit(223.850:327): avc: denied { block_suspend } for pid=4702 comm="syz.0.300" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 224.576597][ T31] audit: type=1400 audit(224.510:328): avc: denied { ioctl } for pid=4709 comm="syz.0.301" path="/170/file0" dev="tmpfs" ino=883 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 226.525972][ T4735] netlink: 'syz.0.310': attribute type 1 has an invalid length. [ 227.061913][ T4742] netlink: 16 bytes leftover after parsing attributes in process `syz.1.313'. [ 227.702894][ T31] audit: type=1326 audit(227.630:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.703549][ T31] audit: type=1326 audit(227.630:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.716871][ T31] audit: type=1326 audit(227.650:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=244 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.807100][ T31] audit: type=1326 audit(227.730:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.811750][ T31] audit: type=1326 audit(227.740:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.185053][ T31] audit: type=1400 audit(231.100:334): avc: denied { unmount } for pid=4767 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 231.739988][ T31] audit: type=1326 audit(231.670:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.741425][ T31] audit: type=1326 audit(231.670:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.751028][ T31] audit: type=1326 audit(231.680:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.770252][ T31] audit: type=1326 audit(231.700:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.770636][ T31] audit: type=1326 audit(231.700:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.775362][ T31] audit: type=1326 audit(231.700:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.784501][ T31] audit: type=1326 audit(231.710:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.789880][ T31] audit: type=1326 audit(231.720:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 231.793444][ T31] audit: type=1326 audit(231.720:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 237.169707][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 237.171405][ T31] audit: type=1400 audit(237.090:359): avc: denied { sys_module } for pid=4812 comm="syz.0.338" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 237.171669][ T31] audit: type=1400 audit(237.100:360): avc: denied { module_request } for pid=4812 comm="syz.0.338" kmod="syzkaller1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 237.808705][ T31] audit: type=1400 audit(237.720:361): avc: denied { read } for pid=4818 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.096887][ T31] audit: type=1400 audit(238.030:362): avc: denied { allowed } for pid=4818 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 238.099133][ T31] audit: type=1400 audit(238.030:363): avc: denied { create } for pid=4818 comm="syz.0.339" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 238.100902][ T31] audit: type=1400 audit(238.030:364): avc: denied { map } for pid=4818 comm="syz.0.339" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5358 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 238.104314][ T31] audit: type=1400 audit(238.030:365): avc: denied { read write } for pid=4818 comm="syz.0.339" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5358 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 238.129225][ T31] audit: type=1400 audit(238.060:366): avc: denied { prog_load } for pid=4818 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 238.142888][ T31] audit: type=1400 audit(238.070:367): avc: denied { bpf } for pid=4818 comm="syz.0.339" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 238.164440][ T31] audit: type=1400 audit(238.090:368): avc: denied { perfmon } for pid=4818 comm="syz.0.339" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 239.571772][ T4823] netlink: 4 bytes leftover after parsing attributes in process `syz.0.341'. [ 245.022819][ T4843] netlink: 24 bytes leftover after parsing attributes in process `syz.0.345'. [ 245.025371][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 245.025573][ T31] audit: type=1400 audit(244.950:392): avc: denied { create } for pid=4838 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 245.025784][ T31] audit: type=1400 audit(244.950:393): avc: denied { write } for pid=4838 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.340683][ T31] audit: type=1400 audit(256.270:394): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 256.341902][ T31] audit: type=1400 audit(256.270:395): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 256.343373][ T31] audit: type=1400 audit(256.270:396): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 256.612292][ T31] audit: type=1400 audit(256.540:397): avc: denied { create } for pid=4866 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 258.090901][ T31] audit: type=1400 audit(258.020:398): avc: denied { setopt } for pid=4878 comm="syz.1.351" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 263.069646][ T31] audit: type=1400 audit(263.000:399): avc: denied { create } for pid=4900 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 263.080387][ T31] audit: type=1400 audit(263.010:400): avc: denied { write } for pid=4900 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 263.965490][ T31] audit: type=1326 audit(263.890:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4906 comm="syz.1.360" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 267.518268][ T31] audit: type=1400 audit(267.450:402): avc: denied { create } for pid=4918 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 267.521874][ T31] audit: type=1400 audit(267.450:403): avc: denied { setopt } for pid=4918 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 267.528911][ T31] audit: type=1400 audit(267.460:404): avc: denied { read } for pid=4918 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 268.204877][ C0] hrtimer: interrupt took 8002112 ns [ 271.152428][ T31] audit: type=1400 audit(271.080:405): avc: denied { write } for pid=4927 comm="syz.1.367" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 271.415069][ T31] audit: type=1326 audit(271.330:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.419313][ T31] audit: type=1326 audit(271.350:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.433640][ T31] audit: type=1326 audit(271.360:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.458598][ T31] audit: type=1326 audit(271.390:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.458895][ T31] audit: type=1326 audit(271.390:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.459514][ T31] audit: type=1326 audit(271.390:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.463587][ T31] audit: type=1326 audit(271.390:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.463658][ T31] audit: type=1326 audit(271.390:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 271.490444][ T31] audit: type=1326 audit(271.420:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 273.551048][ T4956] netlink: 12 bytes leftover after parsing attributes in process `syz.1.375'. [ 275.943154][ T4982] serio: Serial port ptm0 [ 276.848076][ T4988] netlink: 'syz.1.384': attribute type 4 has an invalid length. [ 276.897881][ T4988] netlink: 'syz.1.384': attribute type 4 has an invalid length. [ 276.928902][ T4988] netlink: 24 bytes leftover after parsing attributes in process `syz.1.384'. [ 278.306563][ T1055] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 278.307779][ T1055] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 278.308722][ T1055] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 278.309687][ T1055] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 282.632699][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 282.633867][ T31] audit: type=1400 audit(283.555:457): avc: denied { name_bind } for pid=4997 comm="syz.1.388" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 282.646748][ T31] audit: type=1400 audit(283.575:458): avc: denied { node_bind } for pid=4997 comm="syz.1.388" saddr=::ffff:0.0.0.0 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 284.618417][ T31] audit: type=1400 audit(285.545:459): avc: denied { create } for pid=5000 comm="syz.1.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 284.625173][ T31] audit: type=1400 audit(285.545:460): avc: denied { write } for pid=5000 comm="syz.1.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 285.037467][ T31] audit: type=1400 audit(285.965:461): avc: denied { create } for pid=5006 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 285.044309][ T31] audit: type=1400 audit(285.965:462): avc: denied { write } for pid=5006 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 285.048478][ T31] audit: type=1400 audit(285.975:463): avc: denied { nlmsg_write } for pid=5006 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 285.070701][ T5007] netlink: 8 bytes leftover after parsing attributes in process `syz.1.391'. [ 285.072101][ T5007] netlink: 8 bytes leftover after parsing attributes in process `syz.1.391'. [ 285.073487][ T5007] netlink: 4 bytes leftover after parsing attributes in process `syz.1.391'. [ 285.720695][ T31] audit: type=1400 audit(286.645:464): avc: denied { map } for pid=5014 comm="syz.1.393" path="socket:[4590]" dev="sockfs" ino=4590 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 285.962601][ T5017] process 'syz.1.394' launched '/dev/fd/5' with NULL argv: empty string added [ 285.963428][ T31] audit: type=1400 audit(286.885:465): avc: denied { execute } for pid=5016 comm="syz.1.394" dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 285.975548][ T31] audit: type=1400 audit(286.895:466): avc: denied { execute_no_trans } for pid=5016 comm="syz.1.394" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 286.230862][ T5021] netlink: 'syz.1.396': attribute type 142 has an invalid length. [ 286.232184][ T5021] netlink: 16 bytes leftover after parsing attributes in process `syz.1.396'. [ 292.298342][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 292.308311][ T31] audit: type=1400 audit(293.205:470): avc: denied { create } for pid=5068 comm="syz.0.411" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 292.326735][ T31] audit: type=1400 audit(293.235:471): avc: denied { write } for pid=5068 comm="syz.0.411" name="file0" dev="tmpfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 292.330112][ T31] audit: type=1400 audit(293.235:472): avc: denied { open } for pid=5068 comm="syz.0.411" path="/210/file0" dev="tmpfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 292.333244][ T31] audit: type=1400 audit(293.255:473): avc: denied { ioctl } for pid=5068 comm="syz.0.411" path="/210/file0" dev="tmpfs" ino=1088 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 292.387305][ T31] audit: type=1400 audit(293.295:474): avc: denied { unlink } for pid=3099 comm="syz-executor" name="file0" dev="tmpfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 293.918115][ T5080] netlink: 64 bytes leftover after parsing attributes in process `syz.0.414'. [ 295.017817][ T31] audit: type=1326 audit(295.945:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5090 comm="syz.0.419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 295.020603][ T31] audit: type=1326 audit(295.945:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5090 comm="syz.0.419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 295.027795][ T31] audit: type=1326 audit(295.955:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5090 comm="syz.0.419" exe="/syz-executor" sig=0 arch=40000028 syscall=230 compat=0 ip=0x132510 code=0x7ffc0000 [ 295.029731][ T31] audit: type=1326 audit(295.955:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5090 comm="syz.0.419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 295.037334][ T31] audit: type=1326 audit(295.965:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5090 comm="syz.0.419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 299.401309][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 299.401715][ T31] audit: type=1400 audit(300.315:488): avc: denied { wake_alarm } for pid=5112 comm="syz.1.426" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 302.523723][ T31] audit: type=1326 audit(303.445:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.0.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 302.528034][ T31] audit: type=1326 audit(303.455:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.0.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 302.531559][ T31] audit: type=1326 audit(303.455:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.0.435" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x132510 code=0x7ffc0000 [ 302.542806][ T31] audit: type=1326 audit(303.465:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.0.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 302.543999][ T31] audit: type=1326 audit(303.465:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.0.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 304.533617][ T31] audit: type=1400 audit(305.445:494): avc: denied { nlmsg_write } for pid=5163 comm="syz.0.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 304.559960][ T31] audit: type=1400 audit(305.455:495): avc: denied { audit_write } for pid=5163 comm="syz.0.439" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 304.560323][ T31] audit: type=1107 audit(305.455:496): pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 309.477144][ T31] audit: type=1400 audit(310.405:497): avc: denied { mounton } for pid=5199 comm="syz.0.443" path="/236" dev="tmpfs" ino=1215 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 309.485604][ T5203] cgroup: noprefix used incorrectly [ 310.651986][ T31] audit: type=1326 audit(311.575:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5207 comm="syz.0.445" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 314.263443][ T5214] netlink: 24 bytes leftover after parsing attributes in process `syz.0.447'. [ 317.046405][ T31] audit: type=1326 audit(317.975:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5235 comm="syz.0.454" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 323.452316][ T31] audit: type=1400 audit(324.375:500): avc: denied { create } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.452701][ T31] audit: type=1400 audit(324.375:501): avc: denied { connect } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.453765][ T31] audit: type=1400 audit(324.375:502): avc: denied { setopt } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.472159][ T31] audit: type=1400 audit(324.395:503): avc: denied { bind } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.473550][ T31] audit: type=1400 audit(324.395:504): avc: denied { write } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 324.005901][ T31] audit: type=1400 audit(324.935:505): avc: denied { read } for pid=5249 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 326.535192][ T31] audit: type=1400 audit(327.455:506): avc: denied { write } for pid=5270 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 326.614944][ T31] audit: type=1400 audit(327.535:507): avc: denied { sqpoll } for pid=5270 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 326.629830][ T31] audit: type=1400 audit(327.555:508): avc: denied { ioctl } for pid=5270 comm="syz.0.464" path="socket:[4793]" dev="sockfs" ino=4793 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 345.278044][ T31] audit: type=1400 audit(346.205:509): avc: denied { execute } for pid=5306 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 345.280987][ T31] audit: type=1400 audit(346.205:510): avc: denied { execute_no_trans } for pid=5306 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 345.359080][ T31] audit: type=1400 audit(346.285:511): avc: denied { read } for pid=5307 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 345.359374][ T31] audit: type=1400 audit(346.285:512): avc: denied { open } for pid=5307 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 345.365914][ T31] audit: type=1400 audit(346.285:513): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 347.549176][ T5307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 347.552475][ T5307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 348.469299][ T5503] syz.0.473 uses obsolete (PF_INET,SOCK_PACKET) [ 349.633182][ T5307] hsr_slave_0: entered promiscuous mode [ 349.634183][ T5307] hsr_slave_1: entered promiscuous mode [ 349.647043][ T5307] debugfs: 'hsr0' already exists in 'hsr' [ 349.647201][ T5307] Cannot create hsr debugfs directory [ 350.357233][ T5307] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 350.377075][ T5307] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 350.398078][ T5307] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 350.428617][ T5307] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 351.692510][ T31] audit: type=1400 audit(352.615:514): avc: denied { connect } for pid=5637 comm="syz.0.474" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 351.969854][ T5307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.479509][ T31] audit: type=1400 audit(356.395:515): avc: denied { setopt } for pid=5724 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 355.503501][ T31] audit: type=1400 audit(356.425:516): avc: denied { write } for pid=5724 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 355.531122][ T5726] netlink: 4 bytes leftover after parsing attributes in process `syz.0.477'. [ 356.082017][ T31] audit: type=1326 audit(357.005:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.089552][ T31] audit: type=1326 audit(357.015:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.101319][ T31] audit: type=1326 audit(357.025:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.106801][ T31] audit: type=1326 audit(357.035:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.116538][ T31] audit: type=1326 audit(357.045:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.127867][ T31] audit: type=1326 audit(357.055:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x132510 code=0x7ffc0000 [ 356.128204][ T31] audit: type=1326 audit(357.055:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 357.062993][ T5745] netlink: 12 bytes leftover after parsing attributes in process `syz.0.482'. [ 358.768206][ T5307] veth0_vlan: entered promiscuous mode [ 358.792230][ T5307] veth1_vlan: entered promiscuous mode [ 358.961726][ T5307] veth0_macvtap: entered promiscuous mode [ 358.987828][ T5307] veth1_macvtap: entered promiscuous mode [ 359.127491][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.127940][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.128376][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.129009][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.282941][ T31] audit: type=1400 audit(360.195:524): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.UcOjSS/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 359.297729][ T31] audit: type=1400 audit(360.225:525): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 359.311317][ T31] audit: type=1400 audit(360.235:526): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 359.315053][ T31] audit: type=1400 audit(360.235:527): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.UcOjSS/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 359.316667][ T31] audit: type=1400 audit(360.245:528): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/syzkaller.UcOjSS/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 359.367260][ T31] audit: type=1400 audit(360.295:529): avc: denied { unmount } for pid=5307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 359.374235][ T31] audit: type=1400 audit(360.295:530): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 359.392846][ T31] audit: type=1400 audit(360.315:531): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="gadgetfs" ino=6184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 359.393018][ T31] audit: type=1400 audit(360.315:532): avc: denied { mount } for pid=5307 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 359.393132][ T31] audit: type=1400 audit(360.315:533): avc: denied { mounton } for pid=5307 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 359.505605][ T5767] netlink: 'syz.0.489': attribute type 16 has an invalid length. [ 359.506547][ T5767] netlink: 156 bytes leftover after parsing attributes in process `syz.0.489'. [ 360.858674][ T5784] ip6erspan0: entered promiscuous mode [ 365.440543][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 365.444988][ T31] audit: type=1326 audit(366.365:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.447257][ T31] audit: type=1326 audit(366.365:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.449245][ T31] audit: type=1326 audit(366.365:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.466783][ T31] audit: type=1326 audit(366.385:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.467208][ T31] audit: type=1326 audit(366.385:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.467435][ T31] audit: type=1326 audit(366.395:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.635030][ T31] audit: type=1326 audit(366.555:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 365.652415][ T31] audit: type=1326 audit(366.565:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 366.032447][ T31] audit: type=1400 audit(366.965:547): avc: denied { ioctl } for pid=5827 comm="syz.2.510" path="socket:[6247]" dev="sockfs" ino=6247 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 366.905918][ T5834] netlink: 'syz.2.512': attribute type 10 has an invalid length. [ 366.906213][ T5834] macvtap0: entered allmulticast mode [ 366.906489][ T5834] veth0_macvtap: entered allmulticast mode [ 369.611148][ T31] audit: type=1400 audit(370.535:548): avc: denied { block_suspend } for pid=5846 comm="syz.2.517" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 370.077733][ T5853] netlink: 60 bytes leftover after parsing attributes in process `syz.2.518'. [ 375.018728][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.045662][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.049126][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.056152][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.057157][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.058130][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.059126][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.066521][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.076615][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.077842][ T5137] hid-generic 0006:0003:0000.0001: unknown main item tag 0x0 [ 375.087561][ T5137] hid-generic 0006:0003:0000.0001: hidraw0: VIRTUAL HID v8b.5f Device [syz1] on syz0 [ 378.171840][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 378.172280][ T31] audit: type=1400 audit(379.095:550): avc: denied { mac_admin } for pid=5886 comm="syz.2.528" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 378.175690][ T5887] SELinux: Context Ü is not valid (left unmapped). [ 379.572674][ T31] audit: type=1326 audit(380.495:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.595268][ T31] audit: type=1326 audit(380.515:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.611544][ T31] audit: type=1326 audit(380.515:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.617077][ T31] audit: type=1326 audit(380.545:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.618977][ T31] audit: type=1326 audit(380.545:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5903 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15ffc4 code=0x7ffc0000 [ 379.632094][ T31] audit: type=1326 audit(380.555:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.647934][ T31] audit: type=1326 audit(380.575:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef5d8 code=0x7ffc0000 [ 379.649687][ T31] audit: type=1326 audit(380.575:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.672490][ T31] audit: type=1326 audit(380.575:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5900 comm="syz.2.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.967032][ T5902] netlink: 2 bytes leftover after parsing attributes in process `syz.0.534'. [ 380.801785][ T5902] veth2: left promiscuous mode [ 380.802062][ T5902] veth2: left allmulticast mode [ 380.805152][ T12] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.805538][ T12] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.805765][ T12] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.805977][ T12] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.562258][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 383.563398][ T31] audit: type=1400 audit(384.485:582): avc: denied { connect } for pid=5921 comm="syz.2.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 384.787902][ T5928] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5928 comm=syz.2.545 [ 384.805510][ T31] audit: type=1400 audit(385.695:583): avc: denied { nlmsg_tty_audit } for pid=5927 comm="syz.2.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 386.357192][ T31] audit: type=1400 audit(387.285:584): avc: denied { create } for pid=5940 comm="syz.2.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 386.582993][ T5941] netlink: 4 bytes leftover after parsing attributes in process `syz.2.549'. [ 388.608145][ T31] audit: type=1326 audit(389.535:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5950 comm="syz.2.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.611363][ T31] audit: type=1326 audit(389.535:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5950 comm="syz.2.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.616493][ T31] audit: type=1326 audit(389.545:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5950 comm="syz.2.553" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.619089][ T31] audit: type=1326 audit(389.545:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5950 comm="syz.2.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.625520][ T31] audit: type=1326 audit(389.555:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5950 comm="syz.2.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.835646][ T31] audit: type=1326 audit(389.755:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5952 comm="syz.0.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.857871][ T31] audit: type=1326 audit(389.765:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5952 comm="syz.0.554" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=0 ip=0x132510 code=0x7ffc0000 [ 388.860932][ T31] audit: type=1326 audit(389.785:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5952 comm="syz.0.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 389.806026][ T31] audit: type=1400 audit(390.735:593): avc: denied { bind } for pid=5965 comm="syz.2.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 390.097966][ T31] audit: type=1326 audit(391.015:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5970 comm="syz.2.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 395.455395][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 395.456861][ T31] audit: type=1326 audit(396.375:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.2.577" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 395.458480][ T31] audit: type=1326 audit(396.375:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.2.577" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 395.460171][ T31] audit: type=1326 audit(396.385:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.2.577" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132510 code=0x7ffc0000 [ 395.467576][ T31] audit: type=1326 audit(396.385:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.2.577" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 401.426976][ T6038] netlink: '+}[@': attribute type 21 has an invalid length. [ 401.431041][ T6038] netlink: 132 bytes leftover after parsing attributes in process `+}[@'. [ 401.433105][ T6038] netlink: '+}[@': attribute type 1 has an invalid length. [ 401.500603][ T31] audit: type=1326 audit(402.425:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.502798][ T31] audit: type=1326 audit(402.425:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.508682][ T31] audit: type=1326 audit(402.435:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.547657][ T31] audit: type=1326 audit(402.475:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.549630][ T31] audit: type=1326 audit(402.475:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.675866][ T31] audit: type=1326 audit(402.485:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.677682][ T31] audit: type=1326 audit(402.605:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 401.679565][ T31] audit: type=1326 audit(402.605:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6035 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 402.448583][ T6046] netlink: 8 bytes leftover after parsing attributes in process `syz.0.596'. [ 403.775064][ T31] audit: type=1326 audit(404.685:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6061 comm="syz.0.603" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 403.775322][ T31] audit: type=1326 audit(404.695:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6061 comm="syz.0.603" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 431.228512][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 431.228839][ T31] audit: type=1326 audit(432.155:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 431.230778][ T31] audit: type=1326 audit(432.155:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 431.236981][ T31] audit: type=1326 audit(432.165:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=165 compat=0 ip=0x132510 code=0x7ffc0000 [ 431.238826][ T31] audit: type=1326 audit(432.165:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 431.245533][ T31] audit: type=1326 audit(432.165:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 441.767790][ T6186] 8<--- cut here --- [ 441.767952][ T6186] Unable to handle kernel paging request at virtual address fee02f00 when write [ 441.768075][ T6186] [fee02f00] *pgd=80000080007003, *pmd=00000000 [ 441.769626][ T6186] Internal error: Oops: a06 [#1] SMP ARM [ 441.774825][ T6186] Modules linked in: [ 441.776931][ T6186] CPU: 1 UID: 0 PID: 6186 Comm: syz.2.640 Not tainted syzkaller #0 PREEMPT [ 441.777259][ T6186] Hardware name: ARM-Versatile Express [ 441.777562][ T6186] PC is at parport_attach+0x174/0x1d0 [ 441.777863][ T6186] LR is at parport_attach+0x164/0x1d0 [ 441.778129][ T6186] pc : [<813cb760>] lr : [<813cb750>] psr: 60000013 [ 441.778613][ T6186] sp : dfc0dd30 ip : dfc0dd30 fp : dfc0dd54 [ 441.778897][ T6186] r10: 82b24908 r9 : 00000003 r8 : 84183c00 [ 441.779177][ T6186] r7 : dfc0dd90 r6 : 84183c00 r5 : 00000000 r4 : 00000000 [ 441.779506][ T6186] r3 : fee02f00 r2 : 81e1765c r1 : 00000001 r0 : 813cb3d0 [ 441.779985][ T6186] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 441.780382][ T6186] Control: 30c5387d Table: 86391300 DAC: 00000000 [ 441.780701][ T6186] Register r0 information: non-slab/vmalloc memory [ 441.781346][ T6186] Register r1 information: non-paged memory [ 441.783661][ T6186] Register r2 information: non-slab/vmalloc memory [ 441.784887][ T6186] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 441.785626][ T6186] Register r4 information: NULL pointer [ 441.785954][ T6186] Register r5 information: NULL pointer [ 441.786249][ T6186] Register r6 information: slab kmalloc-192 start 84183c00 pointer offset 0 size 192 [ 441.787426][ T6186] Register r7 information: 2-page vmalloc region starting at 0xdfc0c000 allocated at kernel_clone+0xac/0x3ec [ 441.788197][ T6186] Register r8 information: slab kmalloc-192 start 84183c00 pointer offset 0 size 192 [ 441.788781][ T6186] Register r9 information: non-paged memory [ 441.789071][ T6186] Register r10 information: non-slab/vmalloc memory [ 441.789414][ T6186] Register r11 information: 2-page vmalloc region starting at 0xdfc0c000 allocated at kernel_clone+0xac/0x3ec [ 441.789931][ T6186] Register r12 information: 2-page vmalloc region starting at 0xdfc0c000 allocated at kernel_clone+0xac/0x3ec [ 441.793096][ T6186] Process syz.2.640 (pid: 6186, stack limit = 0xdfc0c000) [ 441.793938][ T6186] Stack: (0xdfc0dd30 to 0xdfc0e000) [ 441.794969][ T6186] dd20: 823ecc98 84183c00 829d1b3c 829d1b3c [ 441.795559][ T6186] dd40: 81e17b1c 84183c44 dfc0dd8c dfc0dd58 813c77ec 813cb5f8 20000300 00000000 [ 441.795882][ T6186] dd60: dfc0dd7c 20000300 84183c00 b5403587 20000300 84d8a400 40946400 00000001 [ 441.796205][ T6186] dd80: dfc0de4c dfc0dd90 813c3338 813c76f0 656d6f63 705f6964 6f707261 00007472 [ 441.796578][ T6186] dda0: 00000000 00002f00 00000005 0000d09a ffffffff 00000003 fffffffe 20000004 [ 441.796892][ T6186] ddc0: 00000003 00000ffe 7fffffff 0000000c 00000002 00000004 00000008 0000ffff [ 441.797242][ T6186] dde0: 00000006 00000005 000007ff 00000830 00000008 00010000 00000009 00000800 [ 441.799288][ T6186] de00: 00000101 00000002 00008001 00000007 00000003 00000004 00000005 0000070f [ 441.799621][ T6186] de20: 00000000 e32a65ea 00000000 86000000 84183c00 20000300 20000300 84d8a400 [ 441.799979][ T6186] de40: dfc0df14 dfc0de50 813c4304 813c3244 00000000 00000000 00000000 e32a65ea [ 441.800299][ T6186] de60: 00000000 00000000 8245d5b4 0000005f 83db4250 84183c30 83e40f84 84d8a400 [ 441.802014][ T6186] de80: dfc0dee4 dfc0de90 807a5fa4 8079c39c 00000064 00000001 00000000 dfc0deac [ 441.802437][ T6186] dea0: 84a1dcd0 83432b28 00006400 0000000b dfc0dea0 00000000 00000000 e32a65ea [ 441.802833][ T6186] dec0: 86000000 40946400 20000300 20000300 86000000 00000003 dfc0def4 dfc0dee8 [ 441.803219][ T31] audit: type=1400 audit(442.725:656): avc: denied { write } for pid=3094 comm="syz-executor" path="pipe:[1761]" dev="pipefs" ino=1761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 441.803306][ T6186] dee0: 807a60c4 e32a65ea dfc0df14 40946400 00000000 86000001 20000300 86000000 [ 441.804472][ T6186] df00: 00000003 84d8a400 dfc0dfa4 dfc0df18 80577dc8 813c3d34 ecac8b10 84d8a400 [ 441.804842][ T6186] df20: dfc0df3c dfc0df30 81a363f8 81a362c8 dfc0df54 dfc0df40 8025c478 8028d90c [ 441.805226][ T6186] df40: dfc0dfb0 40000000 dfc0df84 dfc0df58 802229ec 8025c434 00000000 8281cf74 [ 441.805549][ T6186] df60: dfc0dfb0 0014ca70 ecac8b10 80222940 00000000 e32a65ea dfc0dfac 00000000 [ 441.805863][ T6186] df80: 00000000 00316308 00000036 8020029c 84d8a400 00000036 00000000 dfc0dfa8 [ 441.806226][ T6186] dfa0: 80200060 80577ca4 00000000 00000000 00000003 40946400 20000300 00000000 [ 441.806583][ T6186] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f4d0bc [ 441.807036][ T6186] dfe0: 76f4cec0 76f4ceb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 441.807485][ T6186] Call trace: [ 441.807979][ T6186] [<813cb5ec>] (parport_attach) from [<813c77ec>] (comedi_device_attach+0x108/0x250) [ 441.808802][ T6186] r6:84183c44 r5:81e17b1c r4:829d1b3c SYZFAIL: failed to recv rpc [ 441.809115][ T6186] [<813c76e4>] (comedi_device_attach) from [<813c3338>] (do_devconfig_ioctl+0x100/0x220) [ 441.809991][ T6186] r10:00000001 r9:40946400 r8:84d8a400 r7:20000300 r6:b5403587 r5:84183c00 [ 441.810474][ T6186] r4:20000300 [ 441.810652][ T6186] [<813c3238>] (do_devconfig_ioctl) from [<813c4304>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 441.811074][ T6186] r8:84d8a400 r7:20000300 r6:20000300 r5:84183c00 r4:86000000 [ 441.811349][ T6186] [<813c3d28>] (comedi_unlocked_ioctl) from [<80577dc8>] (sys_ioctl+0x130/0xba0) [ 441.811838][ T6186] r10:84d8a400 r9:00000003 r8:86000000 r7:20000300 r6:86000001 r5:00000000 [ 441.812180][ T6186] r4:40946400 [ 441.812350][ T6186] [<80577c98>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 441.813379][ T6186] Exception stack(0xdfc0dfa8 to 0xdfc0dff0) [ 441.813736][ T6186] dfa0: 00000000 00000000 00000003 40946400 20000300 00000000 [ 441.814177][ T6186] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f4d0bc [ 441.815239][ T6186] dfe0: 76f4cec0 76f4ceb0 000195a4 00132510 [ 441.815686][ T6186] r10:00000036 r9:84d8a400 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 441.816337][ T6186] r4:00000000 [ 441.817022][ T6186] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 441.817758][ T6186] ---[ end trace 0000000000000000 ]--- [ 441.818722][ T6186] Kernel panic - not syncing: Fatal exception [ 441.821239][ T6186] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:58:50 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000004 R03=81a36c30 R04=00000006 R05=828f7dc8 R06=00000000 R07=828f7dc0 R08=84d8bc00 R09=00000028 R10=828f7dc8 R11=df801854 R12=df801858 R13=df801848 R14=8033d624 R15=81a36c40 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=8223c3c4 R02=00000000 R03=000000a0 R04=00000000 R05=8224dfd0 R06=82a77d18 R07=00000000 R08=82a7745c R09=0000182a R10=00000000 R11=dfc0db14 R12=00000014 R13=dfc0dad0 R14=00646574 R15=80252ea8 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000