last executing test programs: 6.069562508s ago: executing program 0 (id=4225): ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x5452, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x5450, 0x0) 5.988713313s ago: executing program 0 (id=4226): r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r2, r0, 0x0) r4 = accept$packet(r3, 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5451, 0x0) 5.89988991s ago: executing program 0 (id=4227): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$TUNSETVNETLE(r0, 0x5450, 0x0) 3.511104563s ago: executing program 1 (id=4229): r0 = timerfd_create(0x0, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = accept$inet(r0, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$inet_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) 3.321150939s ago: executing program 0 (id=4230): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$inet(r2, 0x0, 0x0) r4 = openat$selinux_validatetrans(0xffffff9c, &(0x7f0000000180), 0x1, 0x0) dup2(r3, r4) 3.226007697s ago: executing program 0 (id=4231): openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000600), 0x8) ioctl$BTRFS_IOC_SYNC(r0, 0x5450, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) msgget$private(0x0, 0x0) r1 = semget$private(0x0, 0x4, 0x200) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/157) 3.131209015s ago: executing program 0 (id=4232): r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001800)={0x77359400}) mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) socket$unix(0x1, 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDSETMODE(r1, 0x5452, 0x2071e201) 2.916951646s ago: executing program 1 (id=4233): pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r2, r0, 0x0) r3 = accept4$unix(r0, 0x0, 0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) 2.819900404s ago: executing program 1 (id=4234): r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x541b, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) write$binfmt_script(r1, &(0x7f0000000000), 0xffffff46) dup3(r0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) setuid(0x0) setxattr$incfs_id(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40), 0x0, 0x0, 0x0) 2.699882747s ago: executing program 1 (id=4235): r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40040, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x10a, 0x0}, 0x0) close(r2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x5451, 0x0) 101.44571ms ago: executing program 1 (id=4236): r0 = epoll_create1(0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$packet(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000300)=ANY=[], 0x4c2) 0s ago: executing program 1 (id=4237): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): [ 46.528700][ T31] audit: type=1400 audit(46.450:68): avc: denied { read write } for pid=3106 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.530077][ T31] audit: type=1400 audit(46.450:69): avc: denied { open } for pid=3106 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:45727' (ED25519) to the list of known hosts. [ 58.066635][ T31] audit: type=1400 audit(57.980:70): avc: denied { name_bind } for pid=3109 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.664255][ T31] audit: type=1400 audit(60.580:71): avc: denied { execute } for pid=3111 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.725308][ T31] audit: type=1400 audit(60.630:72): avc: denied { execute_no_trans } for pid=3111 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.852840][ T31] audit: type=1400 audit(64.770:73): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.856192][ T31] audit: type=1400 audit(64.780:74): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.872507][ T3111] cgroup: Unknown subsys name 'net' [ 64.881809][ T31] audit: type=1400 audit(64.800:75): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.078705][ T3111] cgroup: Unknown subsys name 'cpuset' [ 65.085316][ T3111] cgroup: Unknown subsys name 'hugetlb' [ 65.086413][ T3111] cgroup: Unknown subsys name 'rlimit' [ 65.327566][ T31] audit: type=1400 audit(65.250:76): avc: denied { setattr } for pid=3111 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.328769][ T31] audit: type=1400 audit(65.250:77): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 65.329647][ T31] audit: type=1400 audit(65.250:78): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 65.453860][ T3113] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 65.460369][ T31] audit: type=1400 audit(65.380:79): avc: denied { relabelto } for pid=3113 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.461925][ T31] audit: type=1400 audit(65.380:80): avc: denied { write } for pid=3113 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.479513][ T31] audit: type=1400 audit(65.400:81): avc: denied { read } for pid=3111 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.480231][ T31] audit: type=1400 audit(65.400:82): avc: denied { open } for pid=3111 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.325849][ T3111] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.640846][ T31] audit: type=1400 audit(74.560:83): avc: denied { execmem } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.703778][ T31] audit: type=1400 audit(74.620:85): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.704746][ T31] audit: type=1400 audit(74.620:84): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.706094][ T31] audit: type=1400 audit(74.620:86): avc: denied { mount } for pid=3117 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 74.706957][ T31] audit: type=1400 audit(74.620:87): avc: denied { read } for pid=3116 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.707598][ T31] audit: type=1400 audit(74.620:88): avc: denied { read } for pid=3117 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.708246][ T31] audit: type=1400 audit(74.620:89): avc: denied { open } for pid=3117 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.709322][ T31] audit: type=1400 audit(74.630:90): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.728402][ T31] audit: type=1400 audit(74.650:91): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.833685][ T31] audit: type=1400 audit(74.750:92): avc: denied { sys_module } for pid=3116 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.845204][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.855765][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.962825][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.971811][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.048434][ T3116] hsr_slave_0: entered promiscuous mode [ 78.052182][ T3116] hsr_slave_1: entered promiscuous mode [ 78.145190][ T3117] hsr_slave_0: entered promiscuous mode [ 78.147763][ T3117] hsr_slave_1: entered promiscuous mode [ 78.149190][ T3117] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.149617][ T3117] Cannot create hsr debugfs directory [ 78.615672][ T3116] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.628825][ T3116] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.646741][ T3116] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.665085][ T3116] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.721239][ T3117] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.734068][ T3117] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.743021][ T3117] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.761278][ T3117] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.595014][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.605436][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.660478][ T3116] veth0_vlan: entered promiscuous mode [ 82.674442][ T3116] veth1_vlan: entered promiscuous mode [ 82.730982][ T3117] veth0_vlan: entered promiscuous mode [ 82.736497][ T3116] veth0_macvtap: entered promiscuous mode [ 82.746381][ T3116] veth1_macvtap: entered promiscuous mode [ 82.758638][ T3117] veth1_vlan: entered promiscuous mode [ 82.803742][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.804358][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.804573][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.804774][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.901864][ T3117] veth0_macvtap: entered promiscuous mode [ 82.922877][ T3117] veth1_macvtap: entered promiscuous mode [ 82.955904][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 82.956006][ T31] audit: type=1400 audit(82.880:97): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.960659][ T31] audit: type=1400 audit(82.880:98): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.KN1d1W/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.971731][ T31] audit: type=1400 audit(82.890:99): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.991070][ T31] audit: type=1400 audit(82.910:100): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.006481][ T31] audit: type=1400 audit(82.930:101): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.019696][ T31] audit: type=1400 audit(82.940:102): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.051758][ T3117] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.052344][ T3117] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.052704][ T3117] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.056102][ T3117] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.260341][ T31] audit: type=1400 audit(83.180:103): avc: denied { read write } for pid=3116 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.261389][ T31] audit: type=1400 audit(83.180:104): avc: denied { open } for pid=3116 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.262269][ T31] audit: type=1400 audit(83.180:105): avc: denied { ioctl } for pid=3116 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.885180][ T31] audit: type=1400 audit(83.810:106): avc: denied { nlmsg_write } for pid=3809 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 89.252878][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 89.253020][ T31] audit: type=1400 audit(89.170:111): avc: denied { map_create } for pid=3831 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.254764][ T31] audit: type=1400 audit(89.170:112): avc: denied { bpf } for pid=3831 comm="syz.0.16" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.255711][ T31] audit: type=1400 audit(89.180:113): avc: denied { map_read map_write } for pid=3831 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.265778][ T31] audit: type=1400 audit(89.180:114): avc: denied { prog_load } for pid=3831 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.266670][ T31] audit: type=1400 audit(89.180:115): avc: denied { perfmon } for pid=3831 comm="syz.0.16" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.300754][ T31] audit: type=1400 audit(89.220:116): avc: denied { prog_run } for pid=3831 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.935440][ T3836] Zero length message leads to an empty skb [ 94.103993][ T31] audit: type=1400 audit(94.010:117): avc: denied { mounton } for pid=3850 comm="syz.0.24" path="/16/file1" dev="tmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 94.425623][ T31] audit: type=1400 audit(94.350:118): avc: denied { setattr } for pid=3850 comm="syz.0.24" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 94.494311][ T31] audit: type=1400 audit(94.410:119): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 95.246332][ T31] audit: type=1400 audit(95.170:120): avc: denied { execute } for pid=3860 comm="syz.0.28" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 96.847871][ T3874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3874 comm=syz.1.33 [ 97.942627][ T31] audit: type=1400 audit(97.860:121): avc: denied { create } for pid=3887 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.949123][ T31] audit: type=1400 audit(97.870:122): avc: denied { connect } for pid=3887 comm="syz.0.39" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.951979][ T31] audit: type=1400 audit(97.870:123): avc: denied { write } for pid=3887 comm="syz.0.39" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.373481][ C1] hrtimer: interrupt took 541728 ns [ 113.933683][ T31] audit: type=1400 audit(113.850:124): avc: denied { append } for pid=3963 comm="syz.0.68" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 113.953958][ T3964] serio: Serial port pts0 [ 119.608560][ T31] audit: type=1400 audit(119.530:125): avc: denied { create } for pid=4009 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.069651][ T31] audit: type=1400 audit(119.990:126): avc: denied { write } for pid=4009 comm="syz.1.87" path="socket:[2571]" dev="sockfs" ino=2571 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.101036][ T31] audit: type=1400 audit(120.010:127): avc: denied { create } for pid=4015 comm="syz.0.89" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 120.114393][ T31] audit: type=1400 audit(120.030:128): avc: denied { create } for pid=4015 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 120.137434][ T31] audit: type=1400 audit(120.060:129): avc: denied { connect } for pid=4015 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 122.811057][ T4026] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 122.819223][ T31] audit: type=1400 audit(122.740:130): avc: denied { ioctl } for pid=4025 comm="syz.0.92" path="socket:[3460]" dev="sockfs" ino=3460 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.828146][ T31] audit: type=1400 audit(122.750:131): avc: denied { read } for pid=4025 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 123.542230][ T31] audit: type=1400 audit(123.460:132): avc: denied { name_bind } for pid=4034 comm="syz.0.96" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 127.409857][ T4060] ptrace attach of "/syz-executor exec"[3116] was attempted by "/syz-executor exec"[4060] [ 143.786285][ T31] audit: type=1400 audit(143.710:133): avc: denied { connect } for pid=4200 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.502069][ T31] audit: type=1400 audit(144.420:134): avc: denied { write } for pid=4206 comm="syz.1.161" name="file0" dev="fuse" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 153.044950][ T31] audit: type=1400 audit(152.970:135): avc: denied { map } for pid=4259 comm="syz.1.180" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 153.045870][ T31] audit: type=1400 audit(152.970:136): avc: denied { read write } for pid=4259 comm="syz.1.180" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 153.133995][ T4261] serio: Serial port ptm0 [ 156.227110][ T31] audit: type=1400 audit(156.150:137): avc: denied { create } for pid=4293 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.239975][ T31] audit: type=1400 audit(156.160:138): avc: denied { shutdown } for pid=4293 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.245597][ T31] audit: type=1400 audit(156.170:139): avc: denied { getopt } for pid=4293 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.254036][ T31] audit: type=1400 audit(156.170:140): avc: denied { connect } for pid=4293 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.255240][ T31] audit: type=1400 audit(156.170:141): avc: denied { name_connect } for pid=4293 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 157.909470][ T31] audit: type=1400 audit(157.830:142): avc: denied { ioctl } for pid=4289 comm="syz.1.190" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 161.278019][ T31] audit: type=1400 audit(161.200:143): avc: denied { create } for pid=4319 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 172.878197][ T31] audit: type=1400 audit(172.800:144): avc: denied { create } for pid=4390 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 172.882367][ T31] audit: type=1400 audit(172.800:145): avc: denied { write } for pid=4390 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 177.154863][ T31] audit: type=1400 audit(177.060:146): avc: denied { ioctl } for pid=4419 comm="syz.1.244" path="socket:[5178]" dev="sockfs" ino=5178 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 194.221377][ T31] audit: type=1400 audit(194.140:147): avc: denied { write } for pid=4508 comm="syz.0.279" name="fd" dev="proc" ino=5312 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 194.222341][ T31] audit: type=1400 audit(194.140:148): avc: denied { add_name } for pid=4508 comm="syz.0.279" name=07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 194.222989][ T31] audit: type=1400 audit(194.140:149): avc: denied { create } for pid=4508 comm="syz.0.279" name=07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 194.254088][ T31] audit: type=1400 audit(194.140:150): avc: denied { associate } for pid=4508 comm="syz.0.279" name=07 scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 198.160877][ T4538] serio: Serial port pts0 [ 227.076651][ T31] audit: type=1400 audit(227.000:151): avc: denied { create } for pid=4636 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 227.785255][ T31] audit: type=1400 audit(227.710:152): avc: denied { name_bind } for pid=4672 comm="syz.0.328" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 227.786801][ T31] audit: type=1400 audit(227.710:153): avc: denied { node_bind } for pid=4672 comm="syz.0.328" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 228.311410][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 229.088783][ T4630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.105224][ T4630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.809050][ T4630] hsr_slave_0: entered promiscuous mode [ 230.812356][ T4630] hsr_slave_1: entered promiscuous mode [ 230.816370][ T4630] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 230.816750][ T4630] Cannot create hsr debugfs directory [ 231.311034][ T4630] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 231.405550][ T4630] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 231.479744][ T4630] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 231.561557][ T4630] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 231.722292][ T4630] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 231.739438][ T4630] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 231.762335][ T4630] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 231.769580][ T4630] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 232.939805][ T4630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.415965][ T31] audit: type=1400 audit(235.340:154): avc: denied { create } for pid=5002 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 235.438626][ T31] audit: type=1400 audit(235.360:155): avc: denied { bind } for pid=5002 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 235.447922][ T31] audit: type=1400 audit(235.370:156): avc: denied { listen } for pid=5002 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 235.457357][ T31] audit: type=1400 audit(235.380:157): avc: denied { connect } for pid=5002 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 235.483603][ T31] audit: type=1400 audit(235.400:158): avc: denied { write } for pid=5002 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 237.268196][ T4630] veth0_vlan: entered promiscuous mode [ 237.315519][ T4630] veth1_vlan: entered promiscuous mode [ 237.436890][ T4630] veth0_macvtap: entered promiscuous mode [ 237.459142][ T4630] veth1_macvtap: entered promiscuous mode [ 237.548574][ T4630] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.549176][ T4630] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.549570][ T4630] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 237.550019][ T4630] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 241.420059][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 241.429187][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 241.438757][ T11] bond0 (unregistering): Released all slaves [ 241.515320][ T11] hsr_slave_0: left promiscuous mode [ 241.517706][ T11] hsr_slave_1: left promiscuous mode [ 241.524407][ T11] veth1_macvtap: left promiscuous mode [ 241.525078][ T11] veth0_macvtap: left promiscuous mode [ 241.525489][ T11] veth1_vlan: left promiscuous mode [ 241.525915][ T11] veth0_vlan: left promiscuous mode [ 243.651536][ T31] audit: type=1400 audit(243.570:159): avc: denied { mount } for pid=5086 comm="syz.1.367" name="/" dev="ramfs" ino=4836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 247.201644][ T31] audit: type=1400 audit(247.120:160): avc: denied { create } for pid=5135 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 247.209186][ T31] audit: type=1400 audit(247.130:161): avc: denied { setopt } for pid=5135 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 248.457802][ T31] audit: type=1400 audit(248.380:162): avc: denied { create } for pid=5151 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 248.460774][ T31] audit: type=1400 audit(248.380:163): avc: denied { connect } for pid=5151 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 248.464323][ T31] audit: type=1400 audit(248.380:164): avc: denied { setopt } for pid=5151 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 248.470013][ T31] audit: type=1400 audit(248.390:165): avc: denied { bind } for pid=5151 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 248.476612][ T31] audit: type=1400 audit(248.390:166): avc: denied { write } for pid=5151 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 254.399045][ T31] audit: type=1400 audit(254.320:167): avc: denied { listen } for pid=5192 comm="syz.1.406" lport=53139 faddr=fc00:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 255.384325][ T50] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 255.555859][ T50] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 255.556435][ T50] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 255.556991][ T50] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 255.557351][ T50] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 255.561492][ T50] usb 2-1: config 0 descriptor?? [ 256.013620][ T50] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 256.019101][ T50] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 259.575611][ T31] audit: type=1400 audit(259.500:168): avc: denied { block_suspend } for pid=5246 comm="syz.0.423" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 259.988951][ T50] usb 2-1: USB disconnect, device number 2 [ 263.109486][ T31] audit: type=1400 audit(263.030:169): avc: denied { create } for pid=5307 comm="syz.1.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 263.443765][ T31] audit: type=1400 audit(263.360:170): avc: denied { bind } for pid=5316 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 263.444207][ T31] audit: type=1400 audit(263.360:171): avc: denied { write } for pid=5316 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.354248][ T5330] nbd0: detected capacity change from 0 to 12 [ 264.366101][ T5330] block nbd0: Send control failed (result -89) [ 264.366534][ T5330] block nbd0: Request send failed, requeueing [ 264.368060][ T53] block nbd0: Receive control failed (result -32) [ 264.368729][ T25] block nbd0: Dead connection, failed to find a fallback [ 264.369830][ T25] block nbd0: shutting down sockets [ 264.370441][ T25] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.370977][ T25] Buffer I/O error on dev nbd0, logical block 0, async page read [ 264.372554][ T5330] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 264.372919][ T5330] Buffer I/O error on dev nbd0, logical block 0, async page read [ 264.375736][ T5330] nbd0: unable to read partition table [ 274.277504][ T31] audit: type=1400 audit(274.200:172): avc: denied { read } for pid=5376 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.286317][ T31] audit: type=1400 audit(274.210:173): avc: denied { shutdown } for pid=5376 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 275.314329][ T31] audit: type=1400 audit(275.230:174): avc: denied { setopt } for pid=5379 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 287.611732][ T5442] serio: Serial port pts0 [ 290.910569][ T31] audit: type=1400 audit(290.830:175): avc: denied { write } for pid=5454 comm="syz.1.496" name="arp" dev="proc" ino=4026532982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 309.337601][ T5559] input: syz0 as /devices/virtual/input/input3 [ 320.524652][ T31] audit: type=1400 audit(320.450:176): avc: denied { map } for pid=5613 comm="syz.0.558" path="/dev/audio" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 346.146530][ T31] audit: type=1400 audit(346.070:177): avc: denied { module_load } for pid=5717 comm="syz.1.595" path="/sys/power/wakeup_count" dev="sysfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 347.507783][ T31] audit: type=1400 audit(347.430:178): avc: denied { name_bind } for pid=5743 comm="syz.1.603" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 348.667704][ T46] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 348.838597][ T46] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 348.839017][ T46] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 348.839304][ T46] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 348.839575][ T46] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 348.839807][ T46] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 348.844357][ T46] usb 2-1: config 0 descriptor?? [ 349.270025][ T46] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 349.271246][ T46] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 349.281405][ T46] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 353.244311][ T10] usb 2-1: USB disconnect, device number 3 [ 360.884655][ T5834] fuse: root generation should be zero [ 384.573712][ T6049] ======================================================= [ 384.573712][ T6049] WARNING: The mand mount option has been deprecated and [ 384.573712][ T6049] and is ignored by this kernel. Remove the mand [ 384.573712][ T6049] option from the mount to silence this warning. [ 384.573712][ T6049] ======================================================= [ 384.612592][ T31] audit: type=1400 audit(384.530:179): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 392.823980][ T31] audit: type=1400 audit(392.740:180): avc: denied { read } for pid=6106 comm="syz.0.733" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 392.825585][ T31] audit: type=1400 audit(392.740:181): avc: denied { open } for pid=6106 comm="syz.0.733" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 398.796653][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 401.334727][ T31] audit: type=1400 audit(401.260:182): avc: denied { create } for pid=6168 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 401.337190][ T31] audit: type=1400 audit(401.260:183): avc: denied { bind } for pid=6168 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 401.340693][ T31] audit: type=1400 audit(401.260:184): avc: denied { accept } for pid=6168 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 401.344163][ T31] audit: type=1400 audit(401.260:185): avc: denied { write } for pid=6168 comm="syz.1.759" path="socket:[8704]" dev="sockfs" ino=8704 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 403.672352][ T31] audit: type=1400 audit(403.590:186): avc: denied { watch } for pid=6179 comm="syz.0.763" path="/419/control" dev="tmpfs" ino=2351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 405.089437][ T6186] serio: Serial port pts0 [ 433.189528][ T31] audit: type=1400 audit(433.110:187): avc: denied { mounton } for pid=6330 comm="syz.1.820" path="/proc/510/task" dev="proc" ino=8977 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 433.196067][ T6331] capability: warning: `syz.1.820' uses 32-bit capabilities (legacy support in use) [ 437.402161][ T6358] syz.0.829[6358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.405015][ T6358] syz.0.829[6358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.865714][ T6387] serio: Serial port pts0 [ 446.870184][ T31] audit: type=1400 audit(446.790:188): avc: denied { unmount } for pid=4630 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 447.041168][ T31] audit: type=1400 audit(446.960:189): avc: denied { create } for pid=6420 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 467.054302][ T6693] loop7: detected capacity change from 0 to 16384 [ 467.483822][ T8] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 467.644474][ T8] usb 2-1: Using ep0 maxpacket: 8 [ 467.698855][ T8] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 467.699201][ T8] usb 2-1: config 179 has no interface number 0 [ 467.699366][ T8] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 467.699640][ T8] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 467.700008][ T8] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 467.700249][ T8] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 467.700496][ T8] usb 2-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 467.700776][ T8] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 467.701044][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 467.717560][ T6697] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 468.056673][ T8] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:179.65/input/input4 [ 468.349013][ T6710] serio: Serial port pts0 [ 468.471535][ T2900] usb 2-1: USB disconnect, device number 4 [ 468.479637][ C0] xpad 2-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 468.482797][ T2900] xpad 2-1:179.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 476.212866][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 483.870017][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 497.617687][ T31] audit: type=1400 audit(497.540:190): avc: denied { read } for pid=7143 comm="syz.0.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 502.556380][ T7248] serio: Serial port pts0 [ 505.012432][ T31] audit: type=1400 audit(504.930:191): avc: denied { audit_write } for pid=7288 comm="syz.1.1250" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 505.017199][ T31] audit: type=1107 audit(504.940:192): pid=7288 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='C'[Iۄ?L#/>& <Ȏ:'[RRܧT6FǂŠoM kӪvoZWH$+9qˉKa0vGibAD0ҭNv˔pQ\ ÝT YB~U*HVoE] _CSڙgL&U)?j!BSioa$J kěBwVGNeL5EReˆzdI|YzXT A NØ>>L>u\.G#G8f4oLx(0ρAs3kx[7@:ӢW;dxWwSNlf-LېR"@A8{Sܴħ[#MtZC.d̉}Ie~ qLl^S7Wbq죪їwD 6ɻI+Y G_D.ì-p˳i=);䊷Wh3eRޞl }' [ 522.159531][ T31] audit: type=1400 audit(522.080:193): avc: denied { create } for pid=7585 comm="syz.1.1389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 522.583875][ T31] audit: type=1400 audit(522.500:194): avc: denied { create } for pid=7597 comm="syz.0.1394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 522.588840][ T31] audit: type=1400 audit(522.510:195): avc: denied { write } for pid=7597 comm="syz.0.1394" path="socket:[14570]" dev="sockfs" ino=14570 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 522.589753][ T31] audit: type=1400 audit(522.510:196): avc: denied { ioctl } for pid=7597 comm="syz.0.1394" path="socket:[14570]" dev="sockfs" ino=14570 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 531.024044][ T31] audit: type=1400 audit(530.940:197): avc: denied { getopt } for pid=7694 comm="syz.1.1437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 534.480839][ T31] audit: type=1400 audit(534.400:198): avc: denied { create } for pid=7762 comm="syz.1.1470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 535.724368][ T31] audit: type=1400 audit(535.650:199): avc: denied { unlink } for pid=7766 comm="syz.1.1472" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 540.459381][ T31] audit: type=1400 audit(540.380:200): avc: denied { module_load } for pid=7870 comm="syz.1.1518" path="/562/bus" dev="tmpfs" ino=3254 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 556.357705][ T8123] serio: Serial port pts0 [ 570.030175][ T8315] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00316019, b_size=4096, device vda blocksize: 4096 [ 570.030839][ T8315] grow_buffers: requested out-of-range block 144115188075855872 for device vda [ 570.031179][ T8315] EXT4-fs warning (device vda): ext4_resize_fs:2018: can't read last block, resize aborted [ 574.924044][ T31] audit: type=1400 audit(574.840:201): avc: denied { mounton } for pid=8388 comm="syz.1.1752" path="/proc/1536/cgroup" dev="proc" ino=17221 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 575.283607][ T31] audit: type=1800 audit(575.200:202): pid=8404 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.1.1760" name="/" dev="vda" ino=456 res=0 errno=0 [ 577.497016][ T50] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 577.675579][ T50] usb 1-1: config 0 has no interfaces? [ 577.676011][ T50] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 577.676319][ T50] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 577.679812][ T50] usb 1-1: config 0 descriptor?? [ 577.897458][ T50] usb 1-1: USB disconnect, device number 2 [ 599.397852][ T31] audit: type=1400 audit(599.320:203): avc: denied { setopt } for pid=8815 comm="syz.0.1945" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 603.771592][ T8853] coredump: 2242(syz.0.1961): written to core: VMAs: 18, size 42029056; core: 13027743 bytes, pos 42033152 [ 604.419236][ T8865] serio: Serial port pts0 [ 617.605707][ T31] audit: type=1400 audit(617.530:204): avc: denied { create } for pid=9006 comm="syz.1.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 617.611946][ T31] audit: type=1400 audit(617.530:205): avc: denied { sys_admin } for pid=9006 comm="syz.1.2032" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 629.655824][ T31] audit: type=1400 audit(629.580:206): avc: denied { create } for pid=9218 comm="syz.0.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 630.218496][ T9232] serio: Serial port pts0 [ 630.734534][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 635.130912][ T9257] serio: Serial port pts1 [ 645.979073][ T31] audit: type=1400 audit(645.900:207): avc: denied { lock } for pid=9439 comm="syz.1.2215" path="socket:[22058]" dev="sockfs" ino=22058 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 655.832002][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 663.609914][ T31] audit: type=1400 audit(663.530:208): avc: denied { watch_reads } for pid=9725 comm="syz.1.2346" path="/999/control" dev="tmpfs" ino=5840 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 678.272376][ T31] audit: type=1400 audit(678.190:209): avc: denied { setopt } for pid=9960 comm="syz.1.2455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 681.585204][ T31] audit: type=1400 audit(681.510:210): avc: denied { ioctl } for pid=10032 comm="syz.1.2487" path="socket:[24325]" dev="sockfs" ino=24325 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 682.593816][ T31] audit: type=1400 audit(682.510:211): avc: denied { write } for pid=10032 comm="syz.1.2487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 684.216728][T10062] : renamed from ipvlan1 [ 688.069935][T10144] serio: Serial port pts0 [ 699.973020][ T31] audit: type=1400 audit(699.890:212): avc: denied { ioctl } for pid=10260 comm="syz.1.2591" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25794 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 699.987533][ T31] audit: type=1400 audit(699.900:213): avc: denied { setattr } for pid=10260 comm="syz.1.2591" name="nbd1" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.651766][ T31] audit: type=1400 audit(705.570:214): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 709.680018][ T31] audit: type=1400 audit(709.600:215): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 722.958728][T10412] coredump: 2467(syz.1.2645): written to core: VMAs: 19, size 42143744; core: 42022782 bytes, pos 42147840 [ 724.392456][T10559] serio: Serial port pts0 [ 728.834147][ T31] audit: type=1400 audit(728.750:216): avc: denied { mount } for pid=10629 comm="syz.0.2764" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 763.025964][T11146] kernel profiling enabled (shift: 0) [ 813.720760][T11838] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 818.422512][ T31] audit: type=1400 audit(818.340:217): avc: denied { watch watch_reads } for pid=11894 comm="syz.1.3369" path="/proc/3020" dev="proc" ino=32203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 818.438037][ T31] audit: type=1400 audit(818.360:218): avc: denied { create } for pid=11894 comm="syz.1.3369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 818.453901][ T31] audit: type=1400 audit(818.360:219): avc: denied { write } for pid=11894 comm="syz.1.3369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 829.799888][ T31] audit: type=1400 audit(829.720:220): avc: denied { create } for pid=12018 comm="syz.0.3425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 832.585516][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 835.816251][ T31] audit: type=1400 audit(835.740:221): avc: denied { watch watch_reads } for pid=12059 comm="syz.1.3442" path="/1440/control" dev="tmpfs" ino=8454 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 843.485027][T12110] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3459'. [ 857.558373][ T31] audit: type=1400 audit(857.480:222): avc: denied { ioctl } for pid=12250 comm="syz.0.3519" path="socket:[33897]" dev="sockfs" ino=33897 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 858.307696][T12267] netlink: 44306 bytes leftover after parsing attributes in process `syz.1.3527'. [ 873.748060][ T31] audit: type=1400 audit(873.670:223): avc: denied { ioctl } for pid=12461 comm="syz.1.3614" path="socket:[34324]" dev="sockfs" ino=34324 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 888.066383][T12515] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 894.570014][T12591] coredump: 4237(syz.0.3669): written to core: VMAs: 20, size 42160128; core: 13032479 bytes, pos 42164224 [ 897.558564][T12622] capability: warning: `syz.0.3683' uses deprecated v2 capabilities in a way that may be insecure [ 908.704360][ T8] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 908.854011][ T8] usb 2-1: Using ep0 maxpacket: 32 [ 908.872220][ T8] usb 2-1: New USB device found, idVendor=0424, idProduct=9907, bcdDevice= 3.2c [ 908.872842][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 908.873780][ T8] usb 2-1: Product: syz [ 908.874030][ T8] usb 2-1: Manufacturer: syz [ 908.874255][ T8] usb 2-1: SerialNumber: syz [ 908.878428][ T8] usb 2-1: config 0 descriptor?? [ 908.885436][ T8] smsc95xx v2.0.0 [ 908.886167][ T8] smsc95xx 2-1:0.0 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 908.886707][ T8] smsc95xx 2-1:0.0: probe with driver smsc95xx failed with error -22 [ 909.086389][ T8] usb 2-1: USB disconnect, device number 5 [ 947.304912][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 947.370295][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 947.447117][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 947.510427][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 947.829263][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 947.841946][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 947.849197][ T11] bond0 (unregistering): Released all slaves [ 947.965082][ T11] hsr_slave_0: left promiscuous mode [ 947.968205][ T11] hsr_slave_1: left promiscuous mode [ 947.979112][ T11] veth1_macvtap: left promiscuous mode [ 947.979702][ T11] veth0_macvtap: left promiscuous mode [ 947.980076][ T11] veth1_vlan: left promiscuous mode [ 947.980465][ T11] veth0_vlan: left promiscuous mode [ 949.776165][T12748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 949.781354][T12748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 950.063870][T12744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 950.070532][T12744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 951.322578][T12748] hsr_slave_0: entered promiscuous mode [ 951.327060][T12748] hsr_slave_1: entered promiscuous mode [ 951.421853][T12744] hsr_slave_0: entered promiscuous mode [ 951.436225][T12744] hsr_slave_1: entered promiscuous mode [ 951.437873][T12744] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 951.438658][T12744] Cannot create hsr debugfs directory [ 952.190559][T12744] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 952.265926][T12744] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 952.315306][T12744] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 952.376515][T12744] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 952.447829][T12748] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 952.457330][T12748] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 952.464862][T12748] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 952.468847][T12748] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 952.502815][T12744] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 952.510775][T12744] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 952.522449][T12744] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 952.530672][T12744] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 953.073001][T12744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 953.404915][T12748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 955.611378][T12759] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 955.621509][T12759] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 955.631683][T12759] bond0 (unregistering): Released all slaves [ 955.717533][T12759] hsr_slave_0: left promiscuous mode [ 955.719740][T12759] hsr_slave_1: left promiscuous mode [ 955.735672][T12759] veth1_macvtap: left promiscuous mode [ 955.735970][T12759] veth0_macvtap: left promiscuous mode [ 955.736229][T12759] veth1_vlan: left promiscuous mode [ 955.736463][T12759] veth0_vlan: left promiscuous mode [ 956.479268][T12744] veth0_vlan: entered promiscuous mode [ 956.522983][T12744] veth1_vlan: entered promiscuous mode [ 956.640444][T12744] veth0_macvtap: entered promiscuous mode [ 956.650864][T12744] veth1_macvtap: entered promiscuous mode [ 956.710285][T12744] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.710881][T12744] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.711314][T12744] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 956.711920][T12744] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 957.109976][T12748] veth0_vlan: entered promiscuous mode [ 957.137149][T12748] veth1_vlan: entered promiscuous mode [ 957.227794][T12748] veth0_macvtap: entered promiscuous mode [ 957.241750][T12748] veth1_macvtap: entered promiscuous mode [ 957.321606][T12748] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 957.322237][T12748] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 957.323014][T12748] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 957.324393][T12748] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 957.814746][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 987.641677][ T31] audit: type=1400 audit(987.560:224): avc: denied { accept } for pid=13780 comm="syz.0.3838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 996.988743][ T31] audit: type=1400 audit(996.910:225): avc: denied { create } for pid=13872 comm="syz.1.3874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1025.649647][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1039.608461][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 1041.280134][T14190] SELinux: Context system_u:object_r:system_map_t:s0 is not valid (left unmapped). [ 1041.281438][ T31] audit: type=1400 audit(1041.200:226): avc: denied { relabelto } for pid=14189 comm="syz.1.4006" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 1041.283926][ T31] audit: type=1400 audit(1041.210:227): avc: denied { associate } for pid=14189 comm="syz.1.4006" name="mixer" dev="devtmpfs" ino=735 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_map_t:s0" [ 1060.355824][ T31] audit: type=1400 audit(1060.270:228): avc: denied { bind } for pid=14281 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1061.974430][ T31] audit: type=1400 audit(1061.880:229): avc: denied { accept } for pid=14281 comm="syz.1.4041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1085.194278][ T31] audit: type=1400 audit(1085.120:230): avc: denied { setopt } for pid=14390 comm="syz.1.4083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1090.380779][T14399] coredump: 345(syz.1.4085): written to core: VMAs: 19, size 40046592; core: 10918911 bytes, pos 40050688 [ 1096.601512][T14437] coredump: 358(syz.1.4102): written to core: VMAs: 19, size 42143744; core: 13016063 bytes, pos 42147840 [ 1100.086781][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1140.643043][T12819] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1140.717905][T12819] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1140.799230][T12819] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1140.861014][T12819] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1141.107594][T12819] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1141.119975][T12819] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1141.125975][T12819] bond0 (unregistering): Released all slaves [ 1141.192838][T12819] hsr_slave_0: left promiscuous mode [ 1141.197262][T12819] hsr_slave_1: left promiscuous mode [ 1141.204095][T12819] veth1_macvtap: left promiscuous mode [ 1141.204606][T12819] veth0_macvtap: left promiscuous mode [ 1141.205105][T12819] veth1_vlan: left promiscuous mode [ 1141.205481][T12819] veth0_vlan: left promiscuous mode [ 1142.932780][T14476] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1142.941406][T14476] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1144.077104][T14476] hsr_slave_0: entered promiscuous mode [ 1144.081104][T14476] hsr_slave_1: entered promiscuous mode [ 1144.792694][T14476] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1144.804846][T14476] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1144.816784][T14476] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1144.826421][T14476] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1145.527730][T14476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1148.862286][T14476] veth0_vlan: entered promiscuous mode [ 1148.891537][T14476] veth1_vlan: entered promiscuous mode [ 1148.969461][T14476] veth0_macvtap: entered promiscuous mode [ 1148.989499][T14476] veth1_macvtap: entered promiscuous mode [ 1149.069156][T14476] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1149.069812][T14476] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1149.070229][T14476] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1149.070572][T14476] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1149.624089][ T8] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1149.774259][ T8] usb 1-1: Using ep0 maxpacket: 32 [ 1149.802024][ T8] usb 1-1: New USB device found, idVendor=0424, idProduct=9907, bcdDevice= 3.2c [ 1149.802598][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1149.802943][ T8] usb 1-1: Product: syz [ 1149.814035][ T8] usb 1-1: Manufacturer: syz [ 1149.814447][ T8] usb 1-1: SerialNumber: syz [ 1149.818243][ T8] usb 1-1: config 0 descriptor?? [ 1149.824169][ T8] smsc95xx v2.0.0 [ 1149.824493][ T8] smsc95xx 1-1:0.0 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 1149.825158][ T8] smsc95xx 1-1:0.0: probe with driver smsc95xx failed with error -22 [ 1150.029054][ T8] usb 1-1: USB disconnect, device number 3 [ 1153.650838][ T31] audit: type=1400 audit(1153.570:231): avc: denied { read } for pid=14941 comm="syz.0.4129" name="mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 1153.651747][ T31] audit: type=1400 audit(1153.570:232): avc: denied { open } for pid=14941 comm="syz.0.4129" path="/dev/mixer" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 1153.684244][ T31] audit: type=1400 audit(1153.600:233): avc: denied { ioctl } for pid=14941 comm="syz.0.4129" path="/dev/mixer" dev="devtmpfs" ino=735 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_map_t:s0" [ 1167.036443][ T31] audit: type=1400 audit(1166.960:234): avc: denied { read } for pid=14989 comm="syz.1.4150" path="socket:[41513]" dev="sockfs" ino=41513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1170.335615][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1170.714936][ T31] audit: type=1400 audit(1170.630:235): avc: denied { create } for pid=15035 comm="syz.0.4172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1170.720242][ T31] audit: type=1400 audit(1170.640:236): avc: denied { setopt } for pid=15035 comm="syz.0.4172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1170.847838][ T31] audit: type=1400 audit(1170.770:237): avc: denied { bind } for pid=15035 comm="syz.0.4172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1170.851139][ T31] audit: type=1400 audit(1170.770:238): avc: denied { write } for pid=15035 comm="syz.0.4172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1173.026373][T15082] SELinux: Context system_u:object_r:devtty_t:s0 is not valid (left unmapped). [ 1173.029776][ T31] audit: type=1400 audit(1172.950:239): avc: denied { relabelto } for pid=15081 comm="syz.1.4192" name="cgroup.controllers" dev="tmpfs" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 1173.039461][ T31] audit: type=1400 audit(1172.950:240): avc: denied { associate } for pid=15081 comm="syz.1.4192" name="cgroup.controllers" dev="tmpfs" ino=209 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devtty_t:s0" [ 1173.075448][ T31] audit: type=1400 audit(1173.000:241): avc: denied { unlink } for pid=14476 comm="syz-executor" name="cgroup.controllers" dev="tmpfs" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 1177.267033][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1183.680803][ T31] audit: type=1400 audit(1183.600:242): avc: denied { connect } for pid=15190 comm="syz.1.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1183.695031][T15191] ------------[ cut here ]------------ [ 1183.695604][T15191] WARNING: CPU: 0 PID: 15191 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 1183.696696][T15191] refcount_t: underflow; use-after-free. [ 1183.696998][T15191] Modules linked in: [ 1183.699290][T15191] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1183.700845][T15191] CPU: 0 UID: 0 PID: 15191 Comm: syz.1.4237 Not tainted 6.11.0-syzkaller #0 [ 1183.701539][T15191] Hardware name: ARM-Versatile Express [ 1183.702205][T15191] Call trace: [ 1183.702727][T15191] [<81985f40>] (dump_backtrace) from [<8198603c>] (show_stack+0x18/0x1c) [ 1183.703676][T15191] r7:00000000 r6:826228c4 r5:00000000 r4:82035a48 [ 1183.704613][T15191] [<81986024>] (show_stack) from [<819a431c>] (dump_stack_lvl+0x54/0x7c) [ 1183.705257][T15191] [<819a42c8>] (dump_stack_lvl) from [<819a435c>] (dump_stack+0x18/0x1c) [ 1183.705624][T15191] r5:00000000 r4:8286dd18 [ 1183.705818][T15191] [<819a4344>] (dump_stack) from [<81986b68>] (panic+0x120/0x370) [ 1183.706183][T15191] [<81986a48>] (panic) from [<802421dc>] (get_taint+0x0/0x1c) [ 1183.706516][T15191] r3:8260c5c4 r2:00000001 r1:8201e0ec r0:82025eb8 [ 1183.706885][T15191] r7:808348c0 [ 1183.707052][T15191] [<80242168>] (check_panic_on_warn) from [<8024233c>] (__warn+0x80/0x188) [ 1183.707430][T15191] [<802422bc>] (__warn) from [<8024262c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1183.707792][T15191] r8:00000009 r7:82084ad8 r6:ead41c84 r5:8483ec00 r4:00000000 [ 1183.708186][T15191] [<80242448>] (warn_slowpath_fmt) from [<808348c0>] (refcount_warn_saturate+0x13c/0x174) [ 1183.708649][T15191] r10:00000000 r9:849bde84 r8:00000000 r7:00000000 r6:81813f34 r5:00000002 [ 1183.709037][T15191] r4:844823c0 [ 1183.709227][T15191] [<80834784>] (refcount_warn_saturate) from [<814867d0>] (sk_skb_reason_drop+0x1d8/0x248) [ 1183.709724][T15191] [<814865f8>] (sk_skb_reason_drop) from [<81813f34>] (j1939_session_destroy+0x78/0x200) [ 1183.710134][T15191] r9:849bde84 r8:00000000 r7:ead41f38 r6:8490a850 r5:8490a800 r4:844823c0 [ 1183.710438][T15191] [<81813ebc>] (j1939_session_destroy) from [<81815250>] (j1939_session_put+0x54/0x58) [ 1183.710838][T15191] r6:8490a800 r5:84ca7b80 r4:00000004 [ 1183.711060][T15191] [<818151fc>] (j1939_session_put) from [<81813284>] (j1939_sk_sendmsg+0x41c/0x548) [ 1183.711415][T15191] [<81812e68>] (j1939_sk_sendmsg) from [<8147147c>] (__sock_sendmsg+0x44/0x78) [ 1183.711790][T15191] r10:00000000 r9:ead41dd4 r8:ead41dd4 r7:00000000 r6:84ca7b80 r5:ead41f38 [ 1183.712100][T15191] r4:00000000 [ 1183.712273][T15191] [<81471438>] (__sock_sendmsg) from [<81472480>] (____sys_sendmsg+0x2ac/0x2cc) [ 1183.712630][T15191] r7:00000000 r6:00000000 r5:84ca7b80 r4:ead41f38 [ 1183.712874][T15191] [<814721d4>] (____sys_sendmsg) from [<814743ec>] (___sys_sendmsg+0x9c/0xd0) [ 1183.713443][T15191] r10:ead41e34 r9:20000180 r8:00000000 r7:00000000 r6:84ca7b80 r5:ead41f38 [ 1183.714035][T15191] r4:00000000 [ 1183.714411][T15191] [<81474350>] (___sys_sendmsg) from [<81474904>] (sys_sendmsg+0x78/0xbc) [ 1183.714836][T15191] r10:00000128 r9:8483ec00 r8:8020029c r7:00000000 r6:20000180 r5:84ca7b80 [ 1183.715164][T15191] r4:00000000 [ 1183.715325][T15191] [<8147488c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1183.715760][T15191] Exception stack(0xead41fa8 to 0xead41ff0) [ 1183.716186][T15191] 1fa0: 00000000 00000000 00000004 20000180 00000000 00000000 [ 1183.716701][T15191] 1fc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76bad0bc [ 1183.717084][T15191] 1fe0: 76bacec0 76baceb0 000189d0 00132da0 [ 1183.717397][T15191] r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 1183.719717][T15191] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:13:54 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=06080607 R02=00000000 R03=00000000 R04=84095440 R05=20000093 R06=60000093 R07=00000000 R08=8287046c R09=00000051 R10=00000001 R11=ead41a84 R12=ead41a48 R13=ead41a60 R14=819b10f0 R15=809dd4d8 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=82085120 R01=deda86ec R02=ffffffff R03=00000000 R04=deda8710 R05=824bf045 R06=00000004 R07=00000004 R08=ffffffff R09=00000001 R10=00000001 R11=e0695af4 R12=e0695ad8 R13=e0695ae8 R14=819a5874 R15=80491700 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000