last executing test programs: 3.462135046s ago: executing program 1 (id=388): unshare(0x24040000) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) readv(0xffffffffffffffff, 0x0, 0x0) unshare(0x2c020400) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x54, 0x10, 0x401, 0x4006, 0x0, {0x0, 0x0, 0xffff, 0x0, 0xd108}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x10, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xf}}]}}}, @IFLA_IFNAME={0x14, 0x3, 'vlan0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4080}, 0x0) 3.461793306s ago: executing program 0 (id=389): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) getdents64(0xffffffffffffffff, 0x0, 0x0) 3.047036638s ago: executing program 0 (id=390): bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="120000000c00000004000000b47c000000000000", @ANYRESDEC], 0x50) 2.799385857s ago: executing program 1 (id=391): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = io_uring_setup(0x5f41, &(0x7f00000001c0)={0x0, 0x0, 0x800}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 2.690274155s ago: executing program 0 (id=392): r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x580000a, 0x13, r0, 0x0) pwritev2(r0, &(0x7f0000000500)=[{&(0x7f00000011c0)='(', 0x1}], 0x1, 0x1000000, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) 2.195186033s ago: executing program 1 (id=393): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.012409027s ago: executing program 0 (id=394): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r1 = io_uring_setup(0xf08, &(0x7f000000c480)={0x0, 0xfba1, 0x800, 0x20001, 0x1a2}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000540)=[{0x0}], 0x1) r2 = io_uring_setup(0x7624, &(0x7f00000006c0)={0x0, 0x72b7, 0x800, 0x2, 0x1000cc, 0x0, r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00'}) io_uring_register$IORING_REGISTER_FILES(r2, 0x1e, &(0x7f0000000000)=[r1], 0x1) 1.771042895s ago: executing program 1 (id=395): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x38, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dvmrp1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x40480c0) 1.330220439s ago: executing program 1 (id=396): bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="120000000c00000004000000b47c000000000000", @ANYRESDEC], 0x50) 1.100578206s ago: executing program 0 (id=397): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@newtaction={0x2a0, 0x30, 0x800, 0x71bd2a, 0x25dfdbff, {}, [{0x28c, 0x1, [@m_gact={0x154, 0x17, 0x0, 0x0, {{0x9}, {0x64, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1ae8, 0x5}}, @TCA_GACT_PARMS={0x18, 0x2, {0x65d6, 0x1, 0x8, 0x7, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x12c5, 0x20000005}}, @TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x8, 0x0, 0xbd1c, 0x4}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x583, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xaeb, 0x20000000}}]}, {0xc6, 0x6, "0f617356f0a663079abe295a350af32575b7576a2846e5b3b3d9b048dc90bac2c3b40552dc14f7774371c98d6e2763d4fda783e36f45e224474cc6a0e6a530d841c87c70bbf3448d6187a58197fa3ffb0b318a51ba59415ac311a355fe1d08f8de9966d8ba89a56bfbc37c6af7d37dcdeb618f98f29bf3b05a23cefbbf51193614c08c162352d9eaad342b2f307dd8babd71ab8a1c4f80bbbbccc8ce4d369a33f9c6fc16198b2cfa20bc906e08c92c0642310e03f00a0ed12baa1df64f1bf0502f23"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_sample={0x30, 0x12, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_bpf={0x2c, 0xa, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0xa0, 0x10, 0x0, 0x0, {{0x8}, {0x10, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x6b, 0x6, "bd3a5376a2440c64d6314cc7f446e251aa486d1931d16d2a624d085a1be90b436fdedf917b760ef37b4272893313d629bb02bcd42142bb0469eba6b0eddd9bc3612d9b46c64f145f45c89cb5bb716f4a44dc897bd951f9775a35dd8303b774f0c02924dc414d29"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_simple={0x38, 0x2, 0x0, 0x0, {{0xb}, {0x4}, {0x9, 0x6, "644cfabbe5"}, {0xc}, {0xc, 0x8, {0x3, 0x3}}}}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4000810}, 0x20040800) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x334}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 743.679633ms ago: executing program 0 (id=398): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb8af, @void, @value}, 0xa5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000600)='kfree\x00', r3}, 0x18) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0xa4, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x5, 0x4, 0x2, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x2]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x400}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8, 0x5, 0x7}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 0s ago: executing program 1 (id=399): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = io_uring_setup(0x5f41, &(0x7f00000001c0)={0x0, 0x0, 0x800}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:38275' (ED25519) to the list of known hosts. [ 140.002556][ T30] audit: type=1400 audit(139.680:46): avc: denied { name_bind } for pid=3310 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 140.332317][ T30] audit: type=1400 audit(140.010:47): avc: denied { execute } for pid=3311 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 140.342215][ T30] audit: type=1400 audit(140.020:48): avc: denied { execute_no_trans } for pid=3311 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 144.032832][ T30] audit: type=1400 audit(143.710:49): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 144.044927][ T30] audit: type=1400 audit(143.720:50): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 144.074881][ T3311] cgroup: Unknown subsys name 'net' [ 144.094420][ T30] audit: type=1400 audit(143.770:51): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 144.326507][ T3311] cgroup: Unknown subsys name 'cpuset' [ 144.373044][ T3311] cgroup: Unknown subsys name 'rlimit' [ 144.633369][ T30] audit: type=1400 audit(144.310:52): avc: denied { setattr } for pid=3311 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.638990][ T30] audit: type=1400 audit(144.310:53): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 144.643155][ T30] audit: type=1400 audit(144.320:54): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 145.023310][ T3313] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 145.031533][ T30] audit: type=1400 audit(144.710:55): avc: denied { relabelto } for pid=3313 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 145.040880][ T30] audit: type=1400 audit(144.710:56): avc: denied { write } for pid=3313 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 145.115861][ T30] audit: type=1400 audit(144.790:57): avc: denied { read } for pid=3311 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 145.116609][ T30] audit: type=1400 audit(144.790:58): avc: denied { open } for pid=3311 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 145.130470][ T3311] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 156.237738][ T30] audit: type=1400 audit(155.910:59): avc: denied { execmem } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 156.275714][ T30] audit: type=1400 audit(155.950:60): avc: denied { read } for pid=3316 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 156.280428][ T30] audit: type=1400 audit(155.960:61): avc: denied { open } for pid=3316 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 156.294758][ T30] audit: type=1400 audit(155.970:62): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 156.336586][ T30] audit: type=1400 audit(156.010:63): avc: denied { module_request } for pid=3316 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 156.489075][ T30] audit: type=1400 audit(156.160:64): avc: denied { sys_module } for pid=3316 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 160.999656][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.018141][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.328042][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.345372][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.022185][ T3317] hsr_slave_0: entered promiscuous mode [ 163.038232][ T3317] hsr_slave_1: entered promiscuous mode [ 163.480302][ T3316] hsr_slave_0: entered promiscuous mode [ 163.484309][ T3316] hsr_slave_1: entered promiscuous mode [ 163.490497][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.492741][ T3316] Cannot create hsr debugfs directory [ 164.772407][ T30] audit: type=1400 audit(164.450:65): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.775840][ T30] audit: type=1400 audit(164.450:66): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.786833][ T30] audit: type=1400 audit(164.460:67): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 164.798551][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 164.848974][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 164.879615][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 164.946558][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 165.136819][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 165.164702][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 165.211940][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 165.236760][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 166.973987][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.119658][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.406578][ T3316] veth0_vlan: entered promiscuous mode [ 173.485135][ T3316] veth1_vlan: entered promiscuous mode [ 173.685947][ T3317] veth0_vlan: entered promiscuous mode [ 173.795316][ T3317] veth1_vlan: entered promiscuous mode [ 173.813814][ T3316] veth0_macvtap: entered promiscuous mode [ 173.851368][ T3316] veth1_macvtap: entered promiscuous mode [ 174.053192][ T3316] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.054926][ T3316] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.055964][ T3316] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.056563][ T3316] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.214011][ T3317] veth0_macvtap: entered promiscuous mode [ 174.255812][ T3317] veth1_macvtap: entered promiscuous mode [ 174.422263][ T30] audit: type=1400 audit(174.090:68): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 174.445910][ T30] audit: type=1400 audit(174.120:69): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.RJkIn9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 174.464273][ T30] audit: type=1400 audit(174.140:70): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 174.485033][ T30] audit: type=1400 audit(174.160:71): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.RJkIn9/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 174.494051][ T30] audit: type=1400 audit(174.170:72): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzkaller.RJkIn9/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 174.553554][ T30] audit: type=1400 audit(174.230:73): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 174.570172][ T30] audit: type=1400 audit(174.250:74): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 174.578811][ T30] audit: type=1400 audit(174.250:75): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="gadgetfs" ino=4115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 174.604918][ T30] audit: type=1400 audit(174.280:76): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 174.610445][ T30] audit: type=1400 audit(174.290:77): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 174.684170][ T3317] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.685501][ T3317] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.686611][ T3317] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.688453][ T3317] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.996155][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 175.651689][ T3453] lo: entered promiscuous mode [ 175.654800][ T3453] tunl0: entered promiscuous mode [ 175.671529][ T3453] gre0: entered promiscuous mode [ 175.689673][ T3453] gretap0: entered promiscuous mode [ 175.692264][ T3453] erspan0: entered promiscuous mode [ 175.710113][ T3453] ip_vti0: entered promiscuous mode [ 175.712768][ T3453] ip6_vti0: entered promiscuous mode [ 175.730447][ T3453] sit0: entered promiscuous mode [ 175.733637][ T3453] ip6tnl0: entered promiscuous mode [ 175.753041][ T3453] ip6gre0: entered promiscuous mode [ 175.761245][ T3453] syz_tun: entered promiscuous mode [ 175.763879][ T3453] ip6gretap0: entered promiscuous mode [ 175.782776][ T3453] vcan0: entered promiscuous mode [ 175.791984][ T3453] bond0: entered promiscuous mode [ 175.799164][ T3453] bond_slave_0: entered promiscuous mode [ 175.800514][ T3453] bond_slave_1: entered promiscuous mode [ 175.804193][ T3453] dummy0: entered promiscuous mode [ 175.822208][ T3453] nlmon0: entered promiscuous mode [ 175.825277][ T3453] vxcan0: entered promiscuous mode [ 175.840701][ T3453] vxcan1: entered promiscuous mode [ 175.851003][ T3453] veth0: entered promiscuous mode [ 175.853844][ T3453] veth1: entered promiscuous mode [ 175.856156][ T3453] wg0: entered promiscuous mode [ 175.885919][ T3453] wg1: entered promiscuous mode [ 175.893476][ T3453] wg2: entered promiscuous mode [ 175.896113][ T3453] veth0_to_bridge: entered promiscuous mode [ 175.924715][ T3453] bridge_slave_0: entered promiscuous mode [ 175.932662][ T3453] veth1_to_bridge: entered promiscuous mode [ 175.953224][ T3453] bridge_slave_1: entered promiscuous mode [ 175.956774][ T3453] veth0_to_bond: entered promiscuous mode [ 175.963449][ T3453] veth1_to_bond: entered promiscuous mode [ 175.968865][ T3453] veth0_to_team: entered promiscuous mode [ 175.976340][ T3453] team_slave_0: entered promiscuous mode [ 175.981973][ T3453] veth1_to_team: entered promiscuous mode [ 175.986167][ T3453] team_slave_1: entered promiscuous mode [ 176.022784][ T3453] veth0_to_batadv: entered promiscuous mode [ 176.025413][ T3453] batadv_slave_0: entered promiscuous mode [ 176.036682][ T3453] veth1_to_batadv: entered promiscuous mode [ 176.056384][ T3453] batadv_slave_1: entered promiscuous mode [ 176.102430][ T3453] xfrm0: entered promiscuous mode [ 176.125026][ T3453] veth0_to_hsr: entered promiscuous mode [ 176.145761][ T3453] veth1_to_hsr: entered promiscuous mode [ 176.183854][ T3453] hsr0: entered promiscuous mode [ 176.186556][ T3453] veth1_virt_wifi: entered promiscuous mode [ 176.243928][ T3453] veth0_virt_wifi: entered promiscuous mode [ 176.253383][ T3453] vlan0: entered promiscuous mode [ 176.258568][ T3453] vlan1: entered promiscuous mode [ 176.262171][ T3453] macvlan0: entered promiscuous mode [ 176.266147][ T3453] macvlan1: entered promiscuous mode [ 176.275311][ T3453] ipvlan0: entered promiscuous mode [ 176.292197][ T3453] ipvlan1: entered promiscuous mode [ 176.333119][ T3453] macvtap0: entered promiscuous mode [ 176.338833][ T3453] macsec0: entered promiscuous mode [ 176.342725][ T3453] geneve0: entered promiscuous mode [ 176.345699][ T3453] geneve1: entered promiscuous mode [ 176.349277][ T3453] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 176.352325][ T3453] netdevsim netdevsim1 netdevsim1: entered promiscuous mode [ 176.355127][ T3453] netdevsim netdevsim1 netdevsim2: entered promiscuous mode [ 176.365393][ T3453] netdevsim netdevsim1 netdevsim3: entered promiscuous mode [ 177.460670][ T3466] netlink: 'syz.1.6': attribute type 1 has an invalid length. [ 180.058942][ T3473] syzkaller0: entered promiscuous mode [ 180.061177][ T3473] syzkaller0: entered allmulticast mode [ 181.130508][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 181.131100][ T30] audit: type=1400 audit(180.790:96): avc: denied { create } for pid=3490 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.137828][ T30] audit: type=1400 audit(180.810:97): avc: denied { bind } for pid=3490 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.726060][ T3492] syz.0.15 uses obsolete (PF_INET,SOCK_PACKET) [ 181.762371][ T30] audit: type=1400 audit(181.440:98): avc: denied { ioctl } for pid=3490 comm="syz.0.15" path="socket:[3442]" dev="sockfs" ino=3442 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 197.190674][ T30] audit: type=1400 audit(196.860:99): avc: denied { read write } for pid=3509 comm="syz.1.21" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 197.191327][ T30] audit: type=1400 audit(196.860:100): avc: denied { open } for pid=3509 comm="syz.1.21" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 197.191863][ T30] audit: type=1400 audit(196.870:101): avc: denied { ioctl } for pid=3509 comm="syz.1.21" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 197.240834][ T3510] mmap: syz.1.21 (3510) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 197.258614][ T30] audit: type=1400 audit(196.920:102): avc: denied { create } for pid=3509 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 197.261278][ T30] audit: type=1400 audit(196.940:103): avc: denied { setopt } for pid=3509 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 197.960511][ T30] audit: type=1326 audit(197.640:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3513 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 197.965624][ T30] audit: type=1326 audit(197.640:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3513 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=51 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 197.969209][ T30] audit: type=1326 audit(197.640:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3513 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 200.129957][ T3523] netlink: 12 bytes leftover after parsing attributes in process `syz.1.27'. [ 204.403368][ T30] audit: type=1400 audit(204.080:107): avc: denied { prog_run } for pid=3533 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 205.483444][ T30] audit: type=1400 audit(205.160:108): avc: denied { create } for pid=3540 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 205.494926][ T30] audit: type=1400 audit(205.170:109): avc: denied { write } for pid=3540 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 206.970499][ T30] audit: type=1326 audit(206.650:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.972235][ T30] audit: type=1326 audit(206.650:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.980186][ T30] audit: type=1326 audit(206.660:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=287 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.981917][ T30] audit: type=1326 audit(206.660:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.990895][ T30] audit: type=1326 audit(206.670:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=134 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.994393][ T30] audit: type=1326 audit(206.670:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 206.996393][ T30] audit: type=1326 audit(206.670:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3548 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 211.700989][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 211.701567][ T30] audit: type=1400 audit(211.380:127): avc: denied { create } for pid=3560 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.716701][ T30] audit: type=1400 audit(211.390:128): avc: denied { setopt } for pid=3560 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.735133][ T30] audit: type=1400 audit(211.410:129): avc: denied { bind } for pid=3560 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.768885][ T30] audit: type=1400 audit(211.430:130): avc: denied { name_bind } for pid=3560 comm="syz.1.45" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 211.769488][ T30] audit: type=1400 audit(211.430:131): avc: denied { node_bind } for pid=3560 comm="syz.1.45" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 211.778999][ T30] audit: type=1400 audit(211.450:132): avc: denied { write } for pid=3560 comm="syz.1.45" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.784025][ T30] audit: type=1400 audit(211.460:133): avc: denied { connect } for pid=3560 comm="syz.1.45" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.796832][ T30] audit: type=1400 audit(211.470:134): avc: denied { name_connect } for pid=3560 comm="syz.1.45" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 217.971307][ T30] audit: type=1400 audit(217.650:135): avc: denied { write } for pid=3576 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 218.012983][ T3577] netlink: 16 bytes leftover after parsing attributes in process `syz.1.52'. [ 218.021137][ T30] audit: type=1400 audit(217.650:136): avc: denied { nlmsg_write } for pid=3576 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 219.062714][ T30] audit: type=1400 audit(218.740:137): avc: denied { name_connect } for pid=3583 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 219.089758][ T30] audit: type=1400 audit(218.770:138): avc: denied { listen } for pid=3583 comm="syz.1.54" lport=44696 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 219.576647][ T30] audit: type=1400 audit(219.250:139): avc: denied { accept } for pid=3583 comm="syz.1.54" lport=44696 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 219.599423][ T30] audit: type=1400 audit(219.280:140): avc: denied { setopt } for pid=3583 comm="syz.1.54" lport=44696 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 220.690284][ T3595] netlink: 128 bytes leftover after parsing attributes in process `syz.1.58'. [ 220.992941][ T30] audit: type=1400 audit(220.670:141): avc: denied { create } for pid=3596 comm="syz.1.59" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 221.349708][ T30] audit: type=1400 audit(221.020:142): avc: denied { read write } for pid=3598 comm="syz.1.60" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 221.350309][ T30] audit: type=1400 audit(221.020:143): avc: denied { open } for pid=3598 comm="syz.1.60" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 221.683494][ T30] audit: type=1400 audit(221.360:144): avc: denied { allowed } for pid=3600 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 223.204880][ T3611] lo: left promiscuous mode [ 223.218606][ T3611] tunl0: left promiscuous mode [ 223.221027][ T3611] gre0: left promiscuous mode [ 223.230988][ T3611] gretap0: left promiscuous mode [ 223.242753][ T3611] erspan0: left promiscuous mode [ 223.254366][ T3611] ip_vti0: left promiscuous mode [ 223.270803][ T3611] ip6_vti0: left promiscuous mode [ 223.273000][ T3611] sit0: left promiscuous mode [ 223.274915][ T3611] ip6tnl0: left promiscuous mode [ 223.276673][ T3611] ip6gre0: left promiscuous mode [ 223.296827][ T3611] syz_tun: left promiscuous mode [ 223.311301][ T3611] ip6gretap0: left promiscuous mode [ 223.321997][ T3611] vcan0: left promiscuous mode [ 223.330626][ T3611] bond0: left promiscuous mode [ 223.344787][ T3611] dummy0: left promiscuous mode [ 223.362298][ T3611] nlmon0: left promiscuous mode [ 223.381078][ T3611] vxcan0: left promiscuous mode [ 223.382778][ T3611] vxcan1: left promiscuous mode [ 223.383951][ T3611] veth0: left promiscuous mode [ 223.386107][ T3611] veth1: left promiscuous mode [ 223.404730][ T3611] wg0: left promiscuous mode [ 223.418261][ T3611] wg1: left promiscuous mode [ 223.420745][ T3611] wg2: left promiscuous mode [ 223.432077][ T3611] veth0_to_bridge: left promiscuous mode [ 223.455244][ T3611] bridge_slave_0: left promiscuous mode [ 223.473766][ T3611] veth1_to_bridge: left promiscuous mode [ 223.476792][ T3611] bridge_slave_1: left promiscuous mode [ 223.494958][ T3611] veth0_to_bond: left promiscuous mode [ 223.505068][ T3611] bond_slave_0: left promiscuous mode [ 223.530944][ T3611] veth1_to_bond: left promiscuous mode [ 223.533859][ T3611] bond_slave_1: left promiscuous mode [ 223.541676][ T3611] veth0_to_team: left promiscuous mode [ 223.548911][ T3611] team_slave_0: left promiscuous mode [ 223.552414][ T3611] veth1_to_team: left promiscuous mode [ 223.564182][ T3611] team_slave_1: left promiscuous mode [ 223.566675][ T3611] veth0_to_batadv: left promiscuous mode [ 223.586177][ T3611] batadv_slave_0: left promiscuous mode [ 223.605242][ T3611] veth1_to_batadv: left promiscuous mode [ 223.616139][ T3611] batadv_slave_1: left promiscuous mode [ 223.622659][ T3611] xfrm0: left promiscuous mode [ 223.636113][ T3611] veth0_to_hsr: left promiscuous mode [ 223.642639][ T3611] veth1_to_hsr: left promiscuous mode [ 223.656506][ T3611] hsr0: left promiscuous mode [ 223.659894][ T3611] veth1_virt_wifi: left promiscuous mode [ 223.665836][ T3611] veth0_virt_wifi: left promiscuous mode [ 223.697935][ T3611] vlan0: left promiscuous mode [ 223.701119][ T3611] vlan1: left promiscuous mode [ 223.721753][ T3611] macvlan0: left promiscuous mode [ 223.726341][ T3611] macvlan1: left promiscuous mode [ 223.734629][ T3611] ipvlan0: left promiscuous mode [ 223.769723][ T3611] ipvlan1: left promiscuous mode [ 223.783490][ T3611] macvtap0: left promiscuous mode [ 223.786746][ T3611] macsec0: left promiscuous mode [ 223.810025][ T3611] geneve0: left promiscuous mode [ 223.812652][ T3611] geneve1: left promiscuous mode [ 223.829445][ T3611] netdevsim netdevsim1 netdevsim0: left promiscuous mode [ 223.833185][ T3611] netdevsim netdevsim1 netdevsim1: left promiscuous mode [ 223.849497][ T3611] netdevsim netdevsim1 netdevsim2: left promiscuous mode [ 223.851717][ T3611] netdevsim netdevsim1 netdevsim3: left promiscuous mode [ 225.572002][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 225.575224][ T30] audit: type=1326 audit(225.250:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.579283][ T30] audit: type=1326 audit(225.250:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.579926][ T30] audit: type=1326 audit(225.260:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.596427][ T30] audit: type=1326 audit(225.270:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.602216][ T30] audit: type=1326 audit(225.280:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.609250][ T30] audit: type=1326 audit(225.280:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=206 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.634164][ T30] audit: type=1326 audit(225.310:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 225.668376][ T30] audit: type=1326 audit(225.340:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3620 comm="syz.1.70" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 226.968545][ T3628] SELinux: syz.1.73 (3628) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 228.440327][ T30] audit: type=1400 audit(228.120:157): avc: denied { block_suspend } for pid=3637 comm="syz.1.78" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 228.820344][ T30] audit: type=1400 audit(228.500:158): avc: denied { create } for pid=3639 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 231.307989][ T3657] netlink: 52 bytes leftover after parsing attributes in process `syz.0.86'. [ 231.974250][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 231.974820][ T30] audit: type=1400 audit(231.650:163): avc: denied { setcheckreqprot } for pid=3660 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 232.232795][ T30] audit: type=1326 audit(231.910:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3662 comm="syz.0.89" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 232.252408][ T30] audit: type=1326 audit(231.930:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3662 comm="syz.0.89" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 232.260492][ T30] audit: type=1326 audit(231.930:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3662 comm="syz.0.89" exe="/syz-executor" sig=0 arch=c00000b7 syscall=216 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 232.311812][ T30] audit: type=1326 audit(231.980:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3662 comm="syz.0.89" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 232.827786][ T30] audit: type=1326 audit(232.500:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.1.92" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 232.830303][ T30] audit: type=1326 audit(232.510:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.1.92" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 232.854755][ T30] audit: type=1326 audit(232.530:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.1.92" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffa4158c94 code=0x7ffc0000 [ 232.855392][ T30] audit: type=1326 audit(232.530:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.1.92" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffa4158c94 code=0x7ffc0000 [ 232.855913][ T30] audit: type=1326 audit(232.530:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.1.92" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 233.744162][ T3671] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.396151][ T3671] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.712033][ T3671] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.140772][ T3671] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.693892][ T3671] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.774965][ T3671] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.871781][ T3671] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.962968][ T3671] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.004626][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 240.010691][ T30] audit: type=1400 audit(239.680:200): avc: denied { append } for pid=3688 comm="syz.0.100" name="loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.755082][ T30] audit: type=1400 audit(240.430:201): avc: denied { execute } for pid=3695 comm="syz.0.103" path="/36/cpuset.memory_pressure_enabled" dev="tmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 241.680480][ T3705] C: renamed from batadv_slave_0 (while UP) [ 241.724858][ T3705] netlink: 'syz.1.107': attribute type 1 has an invalid length. [ 241.725588][ T3705] netlink: 152 bytes leftover after parsing attributes in process `syz.1.107'. [ 241.741752][ T3705] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 242.606849][ T30] audit: type=1400 audit(242.280:202): avc: denied { module_load } for pid=3711 comm="syz.0.111" path="/sys/kernel/notes" dev="sysfs" ino=869 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 242.620586][ T3712] Invalid ELF header magic: != ELF [ 243.168969][ T30] audit: type=1400 audit(242.840:203): avc: denied { connect } for pid=3716 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 243.302155][ T30] audit: type=1326 audit(242.980:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3719 comm="syz.0.115" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 243.303919][ T30] audit: type=1326 audit(242.980:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3719 comm="syz.0.115" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 243.328041][ T30] audit: type=1326 audit(243.000:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3719 comm="syz.0.115" exe="/syz-executor" sig=0 arch=c00000b7 syscall=43 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 243.329899][ T30] audit: type=1326 audit(243.000:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3719 comm="syz.0.115" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 243.444146][ T3722] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 243.467522][ T30] audit: type=1400 audit(243.140:208): avc: denied { lock } for pid=3721 comm="syz.1.116" path="socket:[4636]" dev="sockfs" ino=4636 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.723784][ T3725] netlink: 'syz.1.118': attribute type 12 has an invalid length. [ 244.212874][ T30] audit: type=1400 audit(243.890:209): avc: denied { create } for pid=3729 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 244.429456][ T3732] capability: warning: `syz.1.121' uses deprecated v2 capabilities in a way that may be insecure [ 246.004639][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 246.009161][ T30] audit: type=1400 audit(245.680:212): avc: denied { create } for pid=3740 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 246.062635][ T30] audit: type=1400 audit(245.740:213): avc: denied { setopt } for pid=3740 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 246.262520][ T3743] netlink: 'syz.0.126': attribute type 27 has an invalid length. [ 248.539693][ T3749] infiniband syz!: set down [ 248.541942][ T3749] infiniband syz!: added team_slave_0 [ 248.812064][ T3749] RDS/IB: syz!: added [ 248.830267][ T3749] smc: adding ib device syz! with port count 1 [ 248.832576][ T3749] smc: ib device syz! port 1 has pnetid [ 249.897984][ T30] audit: type=1326 audit(249.570:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3758 comm="syz.1.131" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 249.899513][ T30] audit: type=1326 audit(249.580:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3758 comm="syz.1.131" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 249.902371][ T30] audit: type=1326 audit(249.580:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3758 comm="syz.1.131" exe="/syz-executor" sig=0 arch=c00000b7 syscall=136 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 249.913053][ T30] audit: type=1326 audit(249.590:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3758 comm="syz.1.131" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 258.408695][ T30] audit: type=1400 audit(258.080:218): avc: denied { read } for pid=3806 comm="syz.0.153" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 258.409376][ T30] audit: type=1400 audit(258.080:219): avc: denied { open } for pid=3806 comm="syz.0.153" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 258.503913][ T30] audit: type=1400 audit(258.180:220): avc: denied { ioctl } for pid=3806 comm="syz.0.153" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 258.850145][ T3809] netlink: 8 bytes leftover after parsing attributes in process `syz.0.154'. [ 260.106568][ T3821] Zero length message leads to an empty skb [ 260.894302][ T3829] process 'syz.0.163' launched './file1' with NULL argv: empty string added [ 260.901912][ T30] audit: type=1400 audit(260.580:221): avc: denied { execute_no_trans } for pid=3828 comm="syz.0.163" path="/71/file1" dev="tmpfs" ino=375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 261.371426][ T3833] netlink: 'syz.0.165': attribute type 10 has an invalid length. [ 261.773989][ T30] audit: type=1400 audit(261.450:222): avc: denied { create } for pid=3834 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 261.789675][ T30] audit: type=1400 audit(261.470:223): avc: denied { connect } for pid=3834 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 261.984953][ T30] audit: type=1400 audit(261.660:224): avc: denied { setopt } for pid=3836 comm="syz.0.167" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.812117][ T30] audit: type=1400 audit(262.490:225): avc: denied { create } for pid=3843 comm="syz.0.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 262.830503][ T30] audit: type=1400 audit(262.510:226): avc: denied { read } for pid=3840 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 262.841895][ T30] audit: type=1400 audit(262.520:227): avc: denied { ioctl } for pid=3843 comm="syz.0.170" path="socket:[4868]" dev="sockfs" ino=4868 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 265.746025][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 265.752019][ T30] audit: type=1400 audit(265.420:233): avc: denied { bind } for pid=3863 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 266.269739][ T30] audit: type=1400 audit(265.950:234): avc: denied { create } for pid=3867 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 268.810619][ T30] audit: type=1326 audit(268.480:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.0.189" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 268.820698][ T30] audit: type=1326 audit(268.500:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.0.189" exe="/syz-executor" sig=0 arch=c00000b7 syscall=281 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 268.831775][ T30] audit: type=1326 audit(268.500:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.0.189" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 271.939662][ T30] audit: type=1400 audit(271.610:238): avc: denied { bind } for pid=3901 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.945270][ T30] audit: type=1400 audit(271.620:239): avc: denied { setopt } for pid=3901 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.944841][ T30] audit: type=1326 audit(272.620:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.945982][ T30] audit: type=1326 audit(272.620:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.964652][ T30] audit: type=1326 audit(272.630:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.965805][ T30] audit: type=1326 audit(272.630:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.969333][ T30] audit: type=1326 audit(272.630:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.970022][ T30] audit: type=1326 audit(272.640:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.970553][ T30] audit: type=1326 audit(272.640:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=111 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 272.971082][ T30] audit: type=1326 audit(272.640:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3904 comm="syz.0.197" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 273.465499][ T3907] netlink: 4 bytes leftover after parsing attributes in process `syz.1.196'. [ 274.678965][ T3922] netlink: 4 bytes leftover after parsing attributes in process `syz.1.203'. [ 275.944505][ T3926] bond1: entered promiscuous mode [ 275.945147][ T3926] bond1: entered allmulticast mode [ 275.953030][ T3926] 8021q: adding VLAN 0 to HW filter on device bond1 [ 276.994176][ T3926] bond1 (unregistering): Released all slaves [ 277.673216][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 277.680903][ T30] audit: type=1400 audit(277.350:250): avc: denied { create } for pid=3935 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 277.696152][ T30] audit: type=1400 audit(277.370:251): avc: denied { ioctl } for pid=3935 comm="syz.1.209" path="socket:[5196]" dev="sockfs" ino=5196 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 278.055625][ T30] audit: type=1400 audit(277.730:252): avc: denied { create } for pid=3935 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_tcpdiag_socket permissive=1 [ 278.070608][ T30] audit: type=1400 audit(277.750:253): avc: denied { write } for pid=3935 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_tcpdiag_socket permissive=1 [ 278.091246][ T30] audit: type=1400 audit(277.760:254): avc: denied { nlmsg_read } for pid=3935 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_tcpdiag_socket permissive=1 [ 281.679307][ T30] audit: type=1400 audit(281.350:255): avc: denied { create } for pid=3953 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 281.790729][ T30] audit: type=1400 audit(281.420:256): avc: denied { write } for pid=3953 comm="syz.0.216" path="socket:[5091]" dev="sockfs" ino=5091 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 282.337784][ T30] audit: type=1400 audit(282.010:257): avc: denied { setopt } for pid=3953 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 282.572678][ T3958] syz_tun: entered allmulticast mode [ 282.633842][ T3958] netlink: 14 bytes leftover after parsing attributes in process `syz.1.217'. [ 282.825323][ T3958] syz_tun (unregistering): left allmulticast mode [ 284.412241][ T30] audit: type=1400 audit(284.090:258): avc: denied { write } for pid=3961 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 286.784211][ T30] audit: type=1326 audit(286.460:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.809678][ T30] audit: type=1326 audit(286.490:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.812072][ T30] audit: type=1326 audit(286.490:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.812385][ T30] audit: type=1326 audit(286.490:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.814553][ T30] audit: type=1326 audit(286.490:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.815859][ T30] audit: type=1326 audit(286.490:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.831464][ T30] audit: type=1326 audit(286.510:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.840673][ T30] audit: type=1326 audit(286.520:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=180 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 286.899928][ T30] audit: type=1326 audit(286.570:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3970 comm="syz.0.223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 288.186857][ T3973] block device autoloading is deprecated and will be removed. [ 288.222537][ T3973] syz.0.224: attempt to access beyond end of device [ 288.222537][ T3973] md33: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 289.232791][ T3981] netlink: 56 bytes leftover after parsing attributes in process `syz.0.227'. [ 299.161073][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 299.163525][ T30] audit: type=1400 audit(298.840:272): avc: denied { write } for pid=4002 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 299.671595][ T4007] wg2: entered allmulticast mode [ 303.370862][ T4015] netlink: 4 bytes leftover after parsing attributes in process `syz.0.240'. [ 303.381840][ T4015] netlink: 32 bytes leftover after parsing attributes in process `syz.0.240'. [ 308.069702][ T30] audit: type=1400 audit(307.750:273): avc: denied { connect } for pid=4025 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 309.345283][ T30] audit: type=1400 audit(309.020:274): avc: denied { getopt } for pid=4031 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 310.271675][ T4039] netlink: 8 bytes leftover after parsing attributes in process `syz.1.251'. [ 313.146876][ T30] audit: type=1400 audit(312.820:275): avc: denied { ioctl } for pid=4047 comm="syz.0.255" path="socket:[5346]" dev="sockfs" ino=5346 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 316.685859][ T30] audit: type=1400 audit(316.360:276): avc: denied { write } for pid=4067 comm="syz.1.262" lport=52258 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 317.563170][ T30] audit: type=1400 audit(317.240:277): avc: denied { compute_member } for pid=4072 comm="syz.1.264" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 324.126702][ T30] audit: type=1400 audit(323.800:278): avc: denied { write } for pid=4092 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 325.479247][ T4100] IPv6: Can't replace route, no match found [ 327.355325][ T30] audit: type=1326 audit(327.030:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.360095][ T30] audit: type=1326 audit(327.040:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.362953][ T30] audit: type=1326 audit(327.040:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.373744][ T30] audit: type=1326 audit(327.040:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.380966][ T30] audit: type=1326 audit(327.060:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.383828][ T30] audit: type=1326 audit(327.060:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.389240][ T30] audit: type=1326 audit(327.070:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.391891][ T30] audit: type=1326 audit(327.070:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 327.396371][ T30] audit: type=1326 audit(327.070:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4102 comm="syz.0.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=146 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 337.743888][ T4117] wireguard0: entered promiscuous mode [ 337.744420][ T4117] wireguard0: entered allmulticast mode [ 338.428774][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 338.432472][ T30] audit: type=1400 audit(338.110:290): avc: denied { name_bind } for pid=4121 comm="syz.0.283" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 341.493991][ T4134] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 341.504759][ T30] audit: type=1400 audit(341.180:291): avc: denied { relabelto } for pid=4133 comm="syz.1.288" name="147" dev="tmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 341.511941][ T30] audit: type=1400 audit(341.190:292): avc: denied { associate } for pid=4133 comm="syz.1.288" name="147" dev="tmpfs" ino=752 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 341.561757][ T30] audit: type=1400 audit(341.230:293): avc: denied { remove_name } for pid=3317 comm="syz-executor" name="binderfs" dev="tmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 341.579020][ T30] audit: type=1400 audit(341.250:294): avc: denied { rmdir } for pid=3317 comm="syz-executor" name="147" dev="tmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 344.989633][ T30] audit: type=1400 audit(344.660:295): avc: denied { bind } for pid=4148 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 345.004882][ T30] audit: type=1400 audit(344.680:296): avc: denied { write } for pid=4148 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 346.307866][ T30] audit: type=1400 audit(345.980:297): avc: denied { shutdown } for pid=4151 comm="syz.1.296" laddr=fe80::16 lport=43639 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 347.915391][ T30] audit: type=1326 audit(347.590:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.923425][ T30] audit: type=1326 audit(347.600:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.925431][ T30] audit: type=1326 audit(347.600:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.938889][ T30] audit: type=1326 audit(347.610:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.945906][ T30] audit: type=1326 audit(347.620:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.948408][ T30] audit: type=1326 audit(347.620:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 347.955040][ T30] audit: type=1326 audit(347.630:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.1.299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 349.261986][ T4167] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 364.735764][ T30] kauditd_printk_skb: 56 callbacks suppressed [ 364.751902][ T30] audit: type=1400 audit(364.410:361): avc: denied { create } for pid=4190 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 365.484663][ T4197] netlink: 80 bytes leftover after parsing attributes in process `syz.0.314'. [ 369.626670][ T30] audit: type=1326 audit(369.300:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.639553][ T30] audit: type=1326 audit(369.310:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.653564][ T30] audit: type=1326 audit(369.310:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.661484][ T30] audit: type=1326 audit(369.310:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.665386][ T30] audit: type=1326 audit(369.310:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.683752][ T30] audit: type=1326 audit(369.320:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=158 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.684298][ T30] audit: type=1326 audit(369.320:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 369.684679][ T30] audit: type=1326 audit(369.320:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.1.328" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 373.463106][ T30] audit: type=1326 audit(373.140:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4247 comm="syz.1.336" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 373.475669][ T30] audit: type=1326 audit(373.150:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4247 comm="syz.1.336" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 373.488276][ T30] audit: type=1326 audit(373.160:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4247 comm="syz.1.336" exe="/syz-executor" sig=0 arch=c00000b7 syscall=188 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 373.488909][ T30] audit: type=1326 audit(373.160:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4247 comm="syz.1.336" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 373.506635][ T30] audit: type=1326 audit(373.180:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4247 comm="syz.1.336" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa415a768 code=0x7ffc0000 [ 375.570765][ T4255] Restarting kernel threads ... [ 375.576971][ T4255] Done restarting kernel threads. [ 378.204340][ T30] audit: type=1326 audit(377.880:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4275 comm="syz.0.347" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 378.204902][ T30] audit: type=1326 audit(377.880:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4275 comm="syz.0.347" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 378.219509][ T30] audit: type=1326 audit(377.900:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4275 comm="syz.0.347" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 378.222477][ T30] audit: type=1326 audit(377.900:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4275 comm="syz.0.347" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 378.223799][ T30] audit: type=1326 audit(377.900:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4275 comm="syz.0.347" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 381.418748][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 381.419277][ T30] audit: type=1400 audit(381.090:391): avc: denied { mount } for pid=4291 comm="syz.1.354" name="/" dev="ramfs" ino=5764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 387.235582][ T30] audit: type=1400 audit(386.910:392): avc: denied { read } for pid=4302 comm="syz.1.356" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 387.244713][ T30] audit: type=1400 audit(386.920:393): avc: denied { open } for pid=4302 comm="syz.1.356" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 387.325363][ T30] audit: type=1400 audit(387.000:394): avc: denied { ioctl } for pid=4302 comm="syz.1.356" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 391.088540][ T30] audit: type=1400 audit(390.760:395): avc: denied { bind } for pid=4317 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 391.465120][ T4320] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.363'. [ 395.474844][ T4349] netlink: 12 bytes leftover after parsing attributes in process `syz.0.376'. [ 396.185860][ T30] audit: type=1326 audit(395.860:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.191487][ T30] audit: type=1326 audit(395.860:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.199146][ T30] audit: type=1326 audit(395.870:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.215066][ T30] audit: type=1326 audit(395.890:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.223797][ T30] audit: type=1326 audit(395.900:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.226531][ T30] audit: type=1326 audit(395.900:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.239563][ T30] audit: type=1326 audit(395.910:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.245848][ T30] audit: type=1326 audit(395.920:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.259206][ T30] audit: type=1326 audit(395.940:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 396.262781][ T30] audit: type=1326 audit(395.940:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4354 comm="syz.0.379" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 399.959855][ T4373] netlink: 'syz.1.387': attribute type 1 has an invalid length. [ 400.095909][ T4373] 8021q: adding VLAN 0 to HW filter on device bond1 [ 400.111408][ T4373] netlink: 4 bytes leftover after parsing attributes in process `syz.1.387'. [ 401.074566][ T4373] bond1 (unregistering): Released all slaves [ 401.697016][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 401.705115][ T30] audit: type=1326 audit(401.350:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.713070][ T30] audit: type=1326 audit(401.380:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.724159][ T4377] vlan0: entered promiscuous mode [ 401.728788][ T30] audit: type=1326 audit(401.400:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.735801][ T30] audit: type=1326 audit(401.410:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.777967][ T30] audit: type=1326 audit(401.430:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.779058][ T30] audit: type=1326 audit(401.430:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.779592][ T30] audit: type=1326 audit(401.430:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=61 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 401.780087][ T30] audit: type=1326 audit(401.430:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.389" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7b5a768 code=0x7ffc0000 [ 428.677516][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [syz.1.399:4398] [ 428.677960][ C1] Modules linked in: [ 428.678283][ C1] irq event stamp: 7850 [ 428.679487][ C1] hardirqs last enabled at (7849): [] exit_to_kernel_mode+0x38/0x118 [ 428.680717][ C1] hardirqs last disabled at (7850): [] el1_interrupt+0x24/0x54 [ 428.681401][ C1] softirqs last enabled at (7842): [] handle_softirqs+0x88c/0xdb4 [ 428.682228][ C1] softirqs last disabled at (7837): [] __do_softirq+0x14/0x20 [ 428.683498][ C1] CPU: 1 UID: 0 PID: 4398 Comm: syz.1.399 Not tainted 6.15.0-syzkaller-08486-gf66bc387efbe #0 PREEMPT [ 428.683738][ C1] Hardware name: linux,dummy-virt (DT) [ 428.684028][ C1] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 428.684125][ C1] pc : smp_call_function_many_cond+0x38c/0x1528 [ 428.684190][ C1] lr : smp_call_function_many_cond+0x38c/0x1528 [ 428.684242][ C1] sp : ffff80008dfc78d0 [ 428.684305][ C1] x29: ffff80008dfc78d0 x28: 1fffe0000d418a21 x27: dfff800000000000 [ 428.684512][ C1] x26: 0000000000000000 x25: dfff800000000000 x24: ffff800087141528 [ 428.684629][ C1] x23: 0000000000000000 x22: ffffffffffffffff x21: ffff00006a0c5100 [ 428.684716][ C1] x20: ffff00006a0a7e68 x19: 1ffff00011bf8f38 x18: 0000000000000000 [ 428.684802][ C1] x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200001c0 [ 428.684886][ C1] x14: 0000000000000000 x13: 0000000000000000 x12: ffff60000d414fce [ 428.684970][ C1] x11: 1fffe0000d414fcd x10: ffff60000d414fcd x9 : dfff800000000000 [ 428.685103][ C1] x8 : ffff00006a0a7e6b x7 : 0000000000000001 x6 : ffff60000d414fcd [ 428.685188][ C1] x5 : ffff00006a0a7e68 x4 : ffff60000d414fce x3 : ffff80008045b7c8 [ 428.685273][ C1] x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 [ 428.685527][ C1] Call trace: [ 428.685742][ C1] smp_call_function_many_cond+0x38c/0x1528 (P) [ 428.685905][ C1] kick_all_cpus_sync+0x3c/0x94 [ 428.685974][ C1] arch_jump_label_transform_apply+0x10/0x1c [ 428.686028][ C1] __jump_label_update+0x1cc/0x2e4 [ 428.686080][ C1] jump_label_update+0x270/0x3f0 [ 428.686127][ C1] static_key_slow_inc_cpuslocked+0x7c/0x100 [ 428.686176][ C1] static_key_slow_inc+0x20/0x3c [ 428.686263][ C1] io_uring_setup+0x11e4/0x1914 [ 428.686366][ C1] __arm64_sys_io_uring_setup+0x90/0x1a0 [ 428.686417][ C1] invoke_syscall+0x6c/0x258 [ 428.686460][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 428.686504][ C1] do_el0_svc+0x40/0x58 [ 428.686547][ C1] el0_svc+0x50/0x198 [ 428.686603][ C1] el0t_64_sync_handler+0x10c/0x138 [ 428.686652][ C1] el0t_64_sync+0x198/0x19c [ 428.687074][ C1] Sending NMI from CPU 1 to CPUs 0: [ 438.711362][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 438.737548][ C1] CPU: 1 UID: 0 PID: 4398 Comm: syz.1.399 Tainted: G L 6.15.0-syzkaller-08486-gf66bc387efbe #0 PREEMPT [ 438.738261][ C1] Tainted: [L]=SOFTLOCKUP [ 438.738644][ C1] Hardware name: linux,dummy-virt (DT) [ 438.739039][ C1] Call trace: [ 438.739359][ C1] show_stack+0x18/0x24 (C) [ 438.739719][ C1] dump_stack_lvl+0x38/0xf4 [ 438.740008][ C1] dump_stack+0x1c/0x28 [ 438.740308][ C1] panic+0x5b0/0x664 [ 438.740618][ C1] watchdog_timer_fn+0x448/0x5c8 [ 438.740994][ C1] __hrtimer_run_queues+0x550/0xb38 [ 438.741280][ C1] hrtimer_interrupt+0x2a0/0x768 [ 438.741690][ C1] arch_timer_handler_phys+0x40/0x6c [ 438.742093][ C1] handle_percpu_devid_irq+0x19c/0x30c [ 438.742417][ C1] handle_irq_desc+0xd0/0x110 [ 438.742715][ C1] generic_handle_domain_irq+0x1c/0x28 [ 438.743112][ C1] gic_handle_irq+0x54/0x184 [ 438.743380][ C1] call_on_irq_stack+0x24/0x30 [ 438.743751][ C1] do_interrupt_handler+0x12c/0x150 [ 438.744107][ C1] el1_interrupt+0x34/0x54 [ 438.744412][ C1] el1h_64_irq_handler+0x18/0x24 [ 438.744770][ C1] el1h_64_irq+0x6c/0x70 [ 438.745173][ C1] smp_call_function_many_cond+0x38c/0x1528 (P) [ 438.745660][ C1] kick_all_cpus_sync+0x3c/0x94 [ 438.746060][ C1] arch_jump_label_transform_apply+0x10/0x1c [ 438.746393][ C1] __jump_label_update+0x1cc/0x2e4 [ 438.746781][ C1] jump_label_update+0x270/0x3f0 [ 438.747171][ C1] static_key_slow_inc_cpuslocked+0x7c/0x100 [ 438.747590][ C1] static_key_slow_inc+0x20/0x3c [ 438.747945][ C1] io_uring_setup+0x11e4/0x1914 [ 438.748288][ C1] __arm64_sys_io_uring_setup+0x90/0x1a0 [ 438.748694][ C1] invoke_syscall+0x6c/0x258 [ 438.749004][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 438.749403][ C1] do_el0_svc+0x40/0x58 [ 438.749664][ C1] el0_svc+0x50/0x198 [ 438.749963][ C1] el0t_64_sync_handler+0x10c/0x138 [ 438.750286][ C1] el0t_64_sync+0x198/0x19c [ 438.751218][ C1] SMP: stopping secondary CPUs [ 440.567054][ C1] SMP: failed to stop secondary CPUs 0 [ 440.572074][ C1] Kernel Offset: disabled [ 440.572982][ C1] CPU features: 0x1040,000800d0,02000800,0400421b [ 440.574024][ C1] Memory Limit: none [ 440.575127][ C1] [ 440.575641][ C1] ============================= [ 440.576241][ C1] [ BUG: Invalid wait context ] [ 440.576934][ C1] 6.15.0-syzkaller-08486-gf66bc387efbe #0 Tainted: G L [ 440.578065][ C1] ----------------------------- [ 440.578786][ C1] syz.1.399/4398 is trying to lock: [ 440.579494][ C1] ffff00000e3d4128 (&k->list_lock){+.+.}-{3:3}, at: bus_to_subsys+0x34/0x130 [ 440.581832][ C1] other info that might help us debug this: [ 440.582583][ C1] context-{2:2} [ 440.583108][ C1] 3 locks held by syz.1.399/4398: [ 440.583834][ C1] #0: ffff8000871e47d0 (cpu_hotplug_lock){++++}-{0:0}, at: cpus_read_lock+0x10/0x1c [ 440.585697][ C1] #1: ffff800087444828 (jump_label_mutex){+.+.}-{4:4}, at: static_key_slow_inc_cpuslocked+0x54/0x100 [ 440.587470][ C1] #2: ffff80008733fd60 (rcu_read_lock){....}-{1:3}, at: atomic_notifier_call_chain+0x0/0x134 [ 440.589318][ C1] stack backtrace: [ 440.590022][ C1] CPU: 1 UID: 0 PID: 4398 Comm: syz.1.399 Tainted: G L 6.15.0-syzkaller-08486-gf66bc387efbe #0 PREEMPT [ 440.591316][ C1] Tainted: [L]=SOFTLOCKUP [ 440.591806][ C1] Hardware name: linux,dummy-virt (DT) [ 440.592379][ C1] Call trace: [ 440.592855][ C1] show_stack+0x18/0x24 (C) [ 440.593579][ C1] dump_stack_lvl+0x38/0xf4 [ 440.594223][ C1] dump_stack+0x1c/0x28 [ 440.594886][ C1] __lock_acquire+0xaf8/0x2380 [ 440.595597][ C1] lock_acquire+0x310/0x38c [ 440.596362][ C1] _raw_spin_lock+0x48/0x60 [ 440.597183][ C1] bus_to_subsys+0x34/0x130 [ 440.597914][ C1] bus_for_each_dev+0x7c/0x17c [ 440.598556][ C1] coresight_panic_cb+0x28/0x38 [ 440.599440][ C1] notifier_call_chain+0x11c/0x49c [ 440.600131][ C1] atomic_notifier_call_chain+0x70/0x134 [ 440.600829][ C1] panic+0x2ac/0x664 [ 440.601513][ C1] watchdog_timer_fn+0x448/0x5c8 [ 440.602269][ C1] __hrtimer_run_queues+0x550/0xb38 [ 440.602986][ C1] hrtimer_interrupt+0x2a0/0x768 [ 440.603765][ C1] arch_timer_handler_phys+0x40/0x6c [ 440.604676][ C1] handle_percpu_devid_irq+0x19c/0x30c [ 440.605306][ C1] handle_irq_desc+0xd0/0x110 [ 440.605971][ C1] generic_handle_domain_irq+0x1c/0x28 [ 440.606790][ C1] gic_handle_irq+0x54/0x184 [ 440.607564][ C1] call_on_irq_stack+0x24/0x30 [ 440.608441][ C1] do_interrupt_handler+0x12c/0x150 [ 440.609266][ C1] el1_interrupt+0x34/0x54 [ 440.609922][ C1] el1h_64_irq_handler+0x18/0x24 [ 440.610573][ C1] el1h_64_irq+0x6c/0x70 [ 440.611294][ C1] smp_call_function_many_cond+0x38c/0x1528 (P) [ 440.612100][ C1] kick_all_cpus_sync+0x3c/0x94 [ 440.612821][ C1] arch_jump_label_transform_apply+0x10/0x1c [ 440.613619][ C1] __jump_label_update+0x1cc/0x2e4 [ 440.614425][ C1] jump_label_update+0x270/0x3f0 [ 440.614970][ C1] static_key_slow_inc_cpuslocked+0x7c/0x100 [ 440.615960][ C1] static_key_slow_inc+0x20/0x3c [ 440.616709][ C1] io_uring_setup+0x11e4/0x1914 [ 440.617311][ C1] __arm64_sys_io_uring_setup+0x90/0x1a0 [ 440.618021][ C1] invoke_syscall+0x6c/0x258 [ 440.618715][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 440.619544][ C1] do_el0_svc+0x40/0x58 [ 440.620095][ C1] el0_svc+0x50/0x198 [ 440.620636][ C1] el0t_64_sync_handler+0x10c/0x138 [ 440.621314][ C1] el0t_64_sync+0x198/0x19c [ 440.623230][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:26:48 Registers: info registers vcpu 0 CPU#0 PC=ffff80008031d68c X00=00000000000000c0 X01=ffff7fffe2fb2000 X02=0000000000000000 X03=1fffe00002eb2791 X04=0000000000000000 X05=ffff800080007b80 X06=ffff700010000f70 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010000f70 X11=1ffff00010000f70 X12=ffff700010000f71 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff800080000000 X17=ffff7fffe2fb2000 X18=0000000000000000 X19=ffff8000870da448 X20=ffff80008d32f810 X21=ffff80008144e7d0 X22=ffff000017594788 X23=00000000000000c0 X24=ffff000017593c80 X25=0000000000000004 X26=00000000000000c0 X27=dfff800000000000 X28=ffff0000170bf340 X29=ffff800080007b70 X30=ffff80008031d66c SP=ffff800080007b70 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc7461d40:0000ffffc7461d40 Q17=ffffff80ffffffd0:0000ffffc7461d10 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081b83558 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=ffff800087a9bc00 X06=ffff700010f53780 X07=0000000000000001 X08=ffff800087a9bc00 X09=dfff800000000000 X10=ffff700010f53780 X11=1ffff00010f53780 X12=ffff700010f53781 X13=0000000000008000 X14=666666663c5b203a X15=3130303830303038 X16=5f205d3e30363730 X17=74666f735f6f645f X18=0000000000000000 X19=ffff00000ee24080 X20=ffff80008d4cb018 X21=ffff800087b17420 X22=000000000000006c X23=dfff800000000000 X24=ffff00000ecd2065 X25=0000000000000000 X26=ffff00000ee242d8 X27=ffff00000ee24080 X28=dfff800000000000 X29=ffff80008d4d7580 X30=ffff800081b837e4 SP=ffff80008d4d7580 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffd58b91e0:c03d7ec434dd1000 Q02=0000ffffd58b91c0:ffffff80ffffffd8 Q03=0000ffffd58b9270:0000ffffd58b9270 Q04=0000ffffd58b9270:0000ffffa4136848 Q05=0000ffffd58b9240:0000ffffd58b9270 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd58b9490:0000ffffd58b9490 Q17=ffffff80ffffffd0:0000ffffd58b9460 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000