last executing test programs: 8m3.477130688s ago: executing program 0 (id=122): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/comedi4\x00', 0x42, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000740)="aa4c50332516dfeda229aba4da892464d36f8882554b0f0ddbf408a1f23c8a14698e2e", 0x23}], 0x1) 8m3.356632682s ago: executing program 0 (id=123): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a9646", 0x14, 0x6, 0x0, @empty, @local, {[], {{0x1, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x40, 0x90eb}}}}}}}, 0x0) 8m3.257691405s ago: executing program 0 (id=124): r0 = add_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0)={'syz', 0x3}, &(0x7f0000000800)="13", 0x1, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x0}, &(0x7f0000000900)="fe", 0x1, 0xfffffffffffffffc) r2 = add_key$user(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x0}, &(0x7f0000000a80)="b31a", 0x2, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000b00)={r0, r1, r2}, 0x0, 0x0, 0x0) 8m3.059550951s ago: executing program 0 (id=125): gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r1 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r1, r1, 0x16) 8m2.003308815s ago: executing program 0 (id=126): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) creat(&(0x7f0000000180)='./file0\x00', 0x10) 8m1.777851182s ago: executing program 0 (id=127): syz_open_dev$evdev(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0xffffffffffff8001, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x5d, 0x12, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x1ff}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x40}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xfc}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xd}}}}}]}}]}}, 0x0) 7m16.179100766s ago: executing program 32 (id=127): syz_open_dev$evdev(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) syz_usb_connect$cdc_ecm(0x2, 0x4d, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0xffffffffffff8001, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x5d, 0x12, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x1ff}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x40}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x0, 0x0, 0xfc}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0xd}}}}}]}}]}}, 0x0) 4m27.884933s ago: executing program 2 (id=365): r0 = getpgrp(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x7fff000a}]}) kcmp(r0, r0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) 4m27.784582113s ago: executing program 2 (id=367): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="f000000010000d0400"/20, @ANYRES32=0x0, @ANYBLOB="0008000000020000bc0012800c0001006d6163766c616e00ac000280080003000100000008000100100000000a0004000180c200000300000a00040000000000030000000800070005000000080007000a0000004c0005800a000400aaaaaaaaaabb00000a0004"], 0xf0}, 0x1, 0x0, 0x0, 0x4}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 4m27.588127939s ago: executing program 2 (id=369): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x7}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/49, 0x31}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0xfffffffe}, {0x0}, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1}}], 0x90}, 0x0) 4m27.327619957s ago: executing program 2 (id=371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000001980)={0x9, {"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", 0x1000}}, 0x1006) 4m27.035611397s ago: executing program 2 (id=373): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) 4m11.67735491s ago: executing program 2 (id=381): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 3m26.522486029s ago: executing program 33 (id=381): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 3m10.556903262s ago: executing program 1 (id=430): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r0 = socket$xdp(0x2c, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x400000000000004) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) 2m28.131657104s ago: executing program 1 (id=489): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x80003, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r4 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x0, 0x2000001, {0x0, 0x0, 0x0, r5, {0x1}, {0x10, 0xc}, {0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x220008c4) 2m27.557116963s ago: executing program 1 (id=490): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000500)='kmem_cache_free\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) recvmmsg(r2, &(0x7f0000007700), 0x318, 0xfc0, 0x0) 2m27.118374067s ago: executing program 1 (id=491): socket$igmp(0x2, 0x3, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) getgroups(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r3, {0x10, 0xb}, {0x0, 0x4}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 2m26.547454045s ago: executing program 1 (id=492): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x36, &(0x7f00000005c0)={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0300", 0x0, 0x6c, 0x0, @remote, @local}}}}, 0x0) 2m26.427796439s ago: executing program 1 (id=493): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) 1m41.304941458s ago: executing program 34 (id=493): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) 6.499766042s ago: executing program 4 (id=673): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff00"/131], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x8031, r0, 0x1000) r1 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) ioctl$sock_SIOCINQ(r1, 0x80084803, &(0x7f00000003c0)) 2.916406467s ago: executing program 4 (id=677): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) rmdir(0x0) 2.81450442s ago: executing program 4 (id=678): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[], 0x34}}, 0x880) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') mmap(&(0x7f0000200000/0x4000)=nil, 0x4000, 0x4, 0x200000006c832, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 2.561672488s ago: executing program 4 (id=679): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd29}, 0x14}}, 0x40000) 2.456279001s ago: executing program 4 (id=680): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={r1, 0x3, 0x6}, 0x10) 2.277314837s ago: executing program 4 (id=681): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a1000"/196], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x8031, r0, 0x1000) r1 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) ioctl$sock_SIOCINQ(r1, 0x80084803, &(0x7f00000003c0)) 1.696167466s ago: executing program 3 (id=682): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x20000000001}, 0x18) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r2, &(0x7f0000002140)={0xa, 0x4e28, 0x8, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 907.530041ms ago: executing program 3 (id=683): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x3, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r3, 0x0, 0x107}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x3d, &(0x7f00000005c0)="df12c9f7b9a6000000000000000096fc36dc2f8741d451f4117d2a7e856d7783dd24c267235638bc9848dc2a4802eb8368252950343416c0cc5e97c1ad38221bbee42fa6889347a1142eb02d2082edef45e3e6c986b5ac38b4da20680e38cfb2654edde484745f8540011d9bbb54745dfa48054f466adddae71c126e89108ffcd3397aeb659b430910aee5cf2cfb1b2ea381441c09a0d2edc5c3cfbc2e5a73945b148d5609de2360726517cd100704031259b829b7f8201a02fc0278a61d1dfbfa5d8840ddf3271e47444e87e3400b3f291c695dbc4ef710b0429828c87229b506bd7893194745c04adf82b656cbafa7d5c64ddf8e9beb0991b60cfff30cd024686fc44699e925d7e58f5756bde679da2a71755539a5f0f8304a7c378afdc42aecd4b881f1cd91a5f038e4a6981088d7307dbe16ba236ce0e69af08025e6188f8f0f920741aa719c6f5d848eaa760443e50bc849d6891481a26ce7cf06eb91553bdb6f27b7dac817", 0x0, 0x3, 0x0, 0x0, 0xfe25, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x2b) 758.014886ms ago: executing program 3 (id=684): sendmsg$NFC_CMD_GET_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd29}, 0x14}}, 0x40000) 535.869203ms ago: executing program 3 (id=685): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x3, 0x6}, 0x10) 364.804998ms ago: executing program 3 (id=686): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x10, 0x0, 0x7ffc0001}]}) rt_sigtimedwait(&(0x7f0000000280)={[0x8]}, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x8) 0s ago: executing program 3 (id=687): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bea100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a603f00000000000500000014000500200100000000000000000100000000001c00090008000000", @ANYRES32=r2], 0x4c}}, 0x0) kernel console output (not intermixed with test programs): 31] audit: type=1400 audit(110.970:129): avc: denied { create } for pid=3931 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.058233][ T31] audit: type=1400 audit(110.980:130): avc: denied { ioctl } for pid=3931 comm="syz.0.30" path="socket:[2403]" dev="sockfs" ino=2403 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.066639][ T31] audit: type=1400 audit(110.990:131): avc: denied { bind } for pid=3931 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.158503][ T47] usb 2-1: string descriptor 0 read error: -71 [ 111.189169][ T47] usb 2-1: USB disconnect, device number 3 [ 111.989533][ C0] vkms_vblank_simulate: vblank timer overrun [ 113.043456][ T3973] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 113.546268][ T3981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.814852][ T3981] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 113.815223][ T3981] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 113.819846][ T3981] veth1_vlan: left promiscuous mode [ 113.821963][ T3981] veth0_vlan: left promiscuous mode [ 113.823012][ T3981] veth0_vlan: entered promiscuous mode [ 113.835573][ T3981] veth1_vlan: entered promiscuous mode [ 113.873155][ T3981] veth1_macvtap: left promiscuous mode [ 113.884001][ T3981] veth0_macvtap: left promiscuous mode [ 113.887160][ T3981] veth0_macvtap: entered promiscuous mode [ 113.889174][ T3981] veth1_macvtap: entered promiscuous mode [ 114.037881][ T3813] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.038263][ T3813] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.038515][ T3813] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.039020][ T3813] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.265296][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 115.265687][ T31] audit: type=1400 audit(115.190:139): avc: denied { write } for pid=3994 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 117.321602][ T11] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 117.482562][ T11] usb 2-1: Using ep0 maxpacket: 32 [ 117.519305][ T11] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x82 has invalid wMaxPacketSize 0 [ 117.532501][ T11] usb 2-1: config 0 interface 0 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 0 [ 117.533960][ T11] usb 2-1: config 0 interface 0 has no altsetting 0 [ 117.561635][ T11] usb 2-1: New USB device found, idVendor=16d0, idProduct=10b8, bcdDevice=dc.8e [ 117.562236][ T11] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.565368][ T11] usb 2-1: Product: syz [ 117.565544][ T11] usb 2-1: Manufacturer: syz [ 117.565770][ T11] usb 2-1: SerialNumber: syz [ 117.579195][ T11] usb 2-1: config 0 descriptor?? [ 118.033503][ T11] gs_usb 2-1:0.0: Configuring for 1 interfaces [ 118.455746][ T11] gs_usb 2-1:0.0: Disabling termination support for channel 0 (-EPROTO) [ 118.481811][ T11] usb 2-1: USB disconnect, device number 4 [ 130.105425][ T31] audit: type=1400 audit(130.030:140): avc: denied { mounton } for pid=4049 comm="syz.0.59" path="/37/file0" dev="tmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 130.107426][ T4050] fuse: Bad value for 'fd' [ 131.731897][ T4044] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 131.891900][ T4044] usb 2-1: Using ep0 maxpacket: 32 [ 131.902186][ T4044] usb 2-1: New USB device found, idVendor=041e, idProduct=403c, bcdDevice=cc.d7 [ 131.903373][ T4044] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 131.908448][ T4044] usb 2-1: config 0 descriptor?? [ 132.634902][ T31] audit: type=1400 audit(132.560:141): avc: denied { ioctl } for pid=4051 comm="syz.0.60" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 132.635253][ T31] audit: type=1400 audit(132.560:142): avc: denied { set_context_mgr } for pid=4051 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 132.654892][ T4062] binder: 4051:4062 ioctl c0306201 20000480 returned -14 [ 138.942155][ T43] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 139.099700][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 139.099923][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 139.100187][ T43] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 139.100288][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 139.109183][ T43] usb 1-1: config 0 descriptor?? [ 140.163183][ T43] uclogic 0003:256C:006D.0001: failed retrieving string descriptor #100: -71 [ 140.163522][ T43] uclogic 0003:256C:006D.0001: failed retrieving pen parameters: -71 [ 140.164048][ T43] uclogic 0003:256C:006D.0001: failed probing pen v1 parameters: -71 [ 140.164441][ T43] uclogic 0003:256C:006D.0001: failed probing parameters: -71 [ 140.164629][ T43] uclogic 0003:256C:006D.0001: probe with driver uclogic failed with error -71 [ 140.173378][ T43] usb 1-1: USB disconnect, device number 3 [ 140.917517][ T4091] fuse: Bad value for 'fd' [ 141.391734][ T43] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 141.557217][ T43] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 141.557461][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 141.557660][ T43] usb 1-1: Product: syz [ 141.557816][ T43] usb 1-1: Manufacturer: syz [ 141.557860][ T43] usb 1-1: SerialNumber: syz [ 142.154511][ T43] usb 2-1: USB disconnect, device number 5 [ 142.439510][ T4113] fuse: Bad value for 'fd' [ 143.061596][ T11] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 143.218142][ T11] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has invalid wMaxPacketSize 0 [ 143.229627][ T11] usb 2-1: New USB device found, idVendor=134c, idProduct=0002, bcdDevice=ec.7e [ 143.229864][ T11] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 143.230107][ T11] usb 2-1: Product: syz [ 143.230154][ T11] usb 2-1: Manufacturer: syz [ 143.230206][ T11] usb 2-1: SerialNumber: syz [ 143.294276][ T11] usb 2-1: config 0 descriptor?? [ 143.299483][ T11] hub 2-1:0.0: bad descriptor, ignoring hub [ 143.302614][ T11] hub 2-1:0.0: probe with driver hub failed with error -5 [ 143.323550][ T11] input: syz syz as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/input/input3 [ 143.854360][ T31] audit: type=1400 audit(143.780:143): avc: denied { map } for pid=4114 comm="syz.1.70" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.122551][ T11] usb 2-1: USB disconnect, device number 6 [ 144.170439][ T31] audit: type=1400 audit(144.090:144): avc: denied { mount } for pid=4129 comm="syz.1.71" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 151.137691][ T3073] usb 1-1: USB disconnect, device number 4 [ 152.202997][ T31] audit: type=1400 audit(152.130:145): avc: denied { append } for pid=4138 comm="syz.1.72" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 152.244295][ T4157] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 167.421711][ T31] audit: type=1400 audit(167.310:146): avc: denied { connect } for pid=4191 comm="syz.1.87" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 181.327901][ T4213] serio: Serial port ptm0 [ 184.739230][ T4223] mmap: syz.0.95 (4223) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 188.041776][ T31] audit: type=1400 audit(187.950:147): avc: denied { accept } for pid=4237 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 195.416664][ T4255] smc: net device bond0 applied user defined pnetid SYZ2 [ 202.195385][ T31] audit: type=1400 audit(202.120:148): avc: denied { getopt } for pid=4259 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.200001][ T4260] netlink: 9 bytes leftover after parsing attributes in process `syz.1.102'. [ 202.207441][ T4260] gretap0: entered promiscuous mode [ 202.357974][ T31] audit: type=1400 audit(202.280:149): avc: denied { create } for pid=4263 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 202.601576][ T3072] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 202.758906][ T3072] usb 2-1: config index 0 descriptor too short (expected 19492, got 36) [ 202.759273][ T3072] usb 2-1: config 0 has too many interfaces: 36, using maximum allowed: 32 [ 202.759545][ T3072] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 36 [ 202.759749][ T3072] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 202.759909][ T3072] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 202.760105][ T3072] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 202.760394][ T3072] usb 2-1: New USB device found, idVendor=046d, idProduct=c225, bcdDevice= 0.00 [ 202.760542][ T3072] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 202.777321][ T3072] usb 2-1: config 0 descriptor?? [ 203.419234][ T3072] usbhid 2-1:0.0: can't add hid device: -71 [ 203.420270][ T3072] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 203.434463][ T3072] usb 2-1: USB disconnect, device number 7 [ 212.969808][ T31] audit: type=1400 audit(212.890:150): avc: denied { setopt } for pid=4291 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 212.986179][ T31] audit: type=1400 audit(212.910:151): avc: denied { write } for pid=4291 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 213.821779][ T3072] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 213.971646][ T3072] usb 2-1: Using ep0 maxpacket: 16 [ 213.977582][ T3072] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 213.977849][ T3072] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has invalid wMaxPacketSize 0 [ 213.978047][ T3072] usb 2-1: config 0 interface 0 has no altsetting 0 [ 213.978314][ T3072] usb 2-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 213.978482][ T3072] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 213.983606][ T3072] usb 2-1: config 0 descriptor?? [ 214.205236][ T3072] usbhid 2-1:0.0: can't add hid device: -71 [ 214.205656][ T3072] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 214.217229][ T3072] usb 2-1: USB disconnect, device number 8 [ 214.391977][ T31] audit: type=1400 audit(214.310:152): avc: denied { sqpoll } for pid=4316 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 216.139373][ T31] audit: type=1400 audit(216.060:153): avc: denied { create } for pid=4324 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 216.139720][ T31] audit: type=1400 audit(216.060:154): avc: denied { setopt } for pid=4324 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 216.451515][ T43] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 216.621554][ T43] usb 2-1: Using ep0 maxpacket: 16 [ 216.637259][ T43] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 216.637504][ T43] usb 2-1: config 0 interface 0 altsetting 9 endpoint 0x81 has invalid wMaxPacketSize 0 [ 216.637702][ T43] usb 2-1: config 0 interface 0 has no altsetting 0 [ 216.637788][ T43] usb 2-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 216.637826][ T43] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 216.645489][ T43] usb 2-1: config 0 descriptor?? [ 216.878278][ T43] usbhid 2-1:0.0: can't add hid device: -71 [ 216.878655][ T43] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 216.902543][ T43] usb 2-1: USB disconnect, device number 9 [ 217.263477][ T31] audit: type=1400 audit(217.190:155): avc: denied { create } for pid=4345 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 218.873170][ T31] audit: type=1400 audit(218.800:156): avc: denied { create } for pid=4345 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 222.411271][ T4044] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 222.569867][ T4044] usb 1-1: Using ep0 maxpacket: 16 [ 222.577958][ T4044] usb 1-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 222.578254][ T4044] usb 1-1: config 0 interface 0 has no altsetting 0 [ 222.578565][ T4044] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 222.578727][ T4044] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 222.586716][ T4044] usb 1-1: config 0 descriptor?? [ 223.018490][ T4044] usbhid 1-1:0.0: can't add hid device: -71 [ 223.019665][ T4044] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 223.032034][ T4044] usb 1-1: USB disconnect, device number 5 [ 223.395155][ T31] audit: type=1400 audit(223.320:157): avc: denied { write } for pid=4370 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 224.648068][ T31] audit: type=1326 audit(224.570:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 224.669907][ T31] audit: type=1326 audit(224.590:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 224.670374][ T31] audit: type=1326 audit(224.590:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132280 code=0x7ffc0000 [ 224.686862][ T31] audit: type=1326 audit(224.610:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 224.688818][ T31] audit: type=1326 audit(224.610:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4375 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 230.391594][ T4073] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 230.572325][ T4073] usb 1-1: config 1 interface 0 altsetting 93 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 230.577254][ T4073] usb 1-1: config 1 interface 0 has no altsetting 0 [ 230.603990][ T4073] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 230.604250][ T4073] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 230.614097][ T4073] usb 1-1: SerialNumber: syz [ 235.753828][ T4073] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -110 [ 237.135717][ T31] audit: type=1800 audit(237.040:163): pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.1.132" name="/" dev="sockfs" ino=2828 res=0 errno=0 [ 259.704052][ T31] audit: type=1400 audit(259.630:164): avc: denied { create } for pid=4435 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 259.716414][ T31] audit: type=1400 audit(259.640:165): avc: denied { bind } for pid=4435 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 259.724285][ T31] audit: type=1400 audit(259.650:166): avc: denied { connect } for pid=4435 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 259.757124][ T31] audit: type=1400 audit(259.680:167): avc: denied { mount } for pid=4435 comm="syz.1.142" name="/" dev="ramfs" ino=3682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 270.935718][ T31] audit: type=1326 audit(270.860:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.938854][ T31] audit: type=1326 audit(270.860:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.941978][ T31] audit: type=1326 audit(270.870:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.952563][ T31] audit: type=1326 audit(270.880:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.954604][ T31] audit: type=1326 audit(270.880:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.962760][ T31] audit: type=1326 audit(270.890:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.969047][ T31] audit: type=1326 audit(270.890:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.975208][ T31] audit: type=1326 audit(270.900:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.979414][ T31] audit: type=1326 audit(270.900:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 270.984457][ T31] audit: type=1326 audit(270.910:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 271.254757][ T4455] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 276.154483][ T4441] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.159496][ T4441] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.007966][ T4441] hsr_slave_0: entered promiscuous mode [ 279.008807][ T4441] hsr_slave_1: entered promiscuous mode [ 279.009195][ T4441] debugfs: 'hsr0' already exists in 'hsr' [ 279.009228][ T4441] Cannot create hsr debugfs directory [ 279.617441][ T4441] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 279.636830][ T4441] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 279.646510][ T4441] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 279.692549][ T4441] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 281.500080][ T4441] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.438447][ T4441] veth0_vlan: entered promiscuous mode [ 286.484628][ T4441] veth1_vlan: entered promiscuous mode [ 286.601863][ T4441] veth0_macvtap: entered promiscuous mode [ 286.622393][ T4441] veth1_macvtap: entered promiscuous mode [ 286.742749][ T2971] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.743128][ T2971] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.743453][ T2971] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.743704][ T2971] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.645946][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 287.646284][ T31] audit: type=1400 audit(287.570:186): avc: denied { create } for pid=4811 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 288.703991][ T4815] Zero length message leads to an empty skb [ 292.511789][ T4822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4822 comm=syz.1.151 [ 295.743331][ T4826] netlink: 12 bytes leftover after parsing attributes in process `syz.1.153'. [ 297.013200][ T4833] netlink: 'syz.1.154': attribute type 1 has an invalid length. [ 297.075612][ T4833] 8021q: adding VLAN 0 to HW filter on device bond1 [ 297.113337][ T4833] 8021q: adding VLAN 0 to HW filter on device bond1 [ 297.113960][ T4833] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 297.115129][ T4833] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 297.595030][ T31] audit: type=1326 audit(297.520:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 297.606998][ T31] audit: type=1326 audit(297.530:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132280 code=0x7ffc0000 [ 297.616083][ T31] audit: type=1326 audit(297.540:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 297.624563][ T31] audit: type=1326 audit(297.540:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x132280 code=0x7ffc0000 [ 297.624837][ T31] audit: type=1326 audit(297.550:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4877 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 298.158290][ T31] audit: type=1326 audit(298.080:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.1.158" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 298.158595][ T31] audit: type=1326 audit(298.080:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.1.158" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 298.158969][ T31] audit: type=1326 audit(298.080:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.1.158" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 298.201940][ T31] audit: type=1326 audit(298.120:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.1.158" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 298.202489][ T31] audit: type=1326 audit(298.120:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.1.158" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 302.977331][ T4901] process 'syz.1.165' launched './file0' with NULL argv: empty string added [ 302.981632][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 302.981854][ T31] audit: type=1400 audit(302.900:217): avc: denied { execute } for pid=4900 comm="syz.1.165" name="file0" dev="tmpfs" ino=462 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 302.982106][ T31] audit: type=1400 audit(302.900:218): avc: denied { execute_no_trans } for pid=4900 comm="syz.1.165" path="/87/file0" dev="tmpfs" ino=462 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 303.553052][ T4907] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 303.554401][ T4907] SELinux: failed to load policy [ 303.554925][ T31] audit: type=1400 audit(303.430:219): avc: denied { load_policy } for pid=4905 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 306.387479][ T31] audit: type=1400 audit(306.310:220): avc: denied { create } for pid=4937 comm="syz.2.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 306.394129][ T31] audit: type=1400 audit(306.320:221): avc: denied { prog_load } for pid=4937 comm="syz.2.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 306.403375][ T31] audit: type=1400 audit(306.330:222): avc: denied { bpf } for pid=4937 comm="syz.2.176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 306.704224][ T31] audit: type=1400 audit(306.630:223): avc: denied { read } for pid=4940 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 306.830509][ T31] audit: type=1400 audit(306.750:224): avc: denied { create } for pid=4940 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 306.844242][ T31] audit: type=1400 audit(306.770:225): avc: denied { perfmon } for pid=4940 comm="syz.2.177" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 306.954858][ T31] audit: type=1400 audit(306.880:226): avc: denied { prog_run } for pid=4940 comm="syz.2.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 308.382382][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 308.382736][ T31] audit: type=1400 audit(308.310:233): avc: denied { setopt } for pid=4949 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 308.625789][ T31] audit: type=1400 audit(308.550:234): avc: denied { read } for pid=4953 comm="syz.2.181" dev="nsfs" ino=4026532927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 308.662189][ T31] audit: type=1400 audit(308.580:235): avc: denied { open } for pid=4953 comm="syz.2.181" path="net:[4026532927]" dev="nsfs" ino=4026532927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 308.875122][ T31] audit: type=1400 audit(308.800:236): avc: denied { read } for pid=4956 comm="syz.2.182" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 308.991525][ T31] audit: type=1400 audit(308.890:237): avc: denied { open } for pid=4956 comm="syz.2.182" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 309.015428][ T31] audit: type=1400 audit(308.940:238): avc: denied { ioctl } for pid=4956 comm="syz.2.182" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 309.495998][ T31] audit: type=1400 audit(309.420:239): avc: denied { open } for pid=4980 comm="syz.2.184" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.508431][ T31] audit: type=1400 audit(309.430:240): avc: denied { mounton } for pid=4980 comm="syz.2.184" path="/16/file0" dev="tmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 309.529910][ T4982] fuse: Unknown parameter 'group_i00000000000000000000' [ 309.812692][ T31] audit: type=1400 audit(309.730:241): avc: denied { name_bind } for pid=4983 comm="syz.2.185" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 309.813041][ T31] audit: type=1400 audit(309.740:242): avc: denied { node_bind } for pid=4983 comm="syz.2.185" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 322.705198][ T4987] usb 1-1: USB disconnect, device number 6 [ 322.775983][ T3813] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.946640][ T3813] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.077496][ T3813] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.148244][ T3813] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.287554][ T3813] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 324.298430][ T3813] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 324.305916][ T3813] bond0 (unregistering): Released all slaves [ 324.391541][ T3813] hsr_slave_0: left promiscuous mode [ 324.394570][ T3813] hsr_slave_1: left promiscuous mode [ 324.412071][ T3813] veth1_macvtap: left promiscuous mode [ 324.413102][ T3813] veth0_macvtap: left promiscuous mode [ 324.414324][ T3813] veth1_vlan: left promiscuous mode [ 324.417538][ T3813] veth0_vlan: left promiscuous mode [ 325.709178][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 325.709495][ T31] audit: type=1400 audit(325.630:244): avc: denied { write } for pid=5019 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 325.709741][ T31] audit: type=1400 audit(325.630:245): avc: denied { open } for pid=5019 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 326.130129][ T31] audit: type=1400 audit(326.050:246): avc: denied { search } for pid=5020 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.130465][ T31] audit: type=1400 audit(326.050:247): avc: denied { search } for pid=5020 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.131266][ T31] audit: type=1400 audit(326.050:248): avc: denied { search } for pid=5020 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.133435][ T31] audit: type=1400 audit(326.050:249): avc: denied { search } for pid=5020 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.221835][ T31] audit: type=1400 audit(326.120:250): avc: denied { read open } for pid=5021 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.222172][ T31] audit: type=1400 audit(326.130:251): avc: denied { getattr } for pid=5021 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.294855][ T31] audit: type=1400 audit(326.220:252): avc: denied { add_name } for pid=5020 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.295199][ T31] audit: type=1400 audit(326.220:253): avc: denied { create } for pid=5020 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.726483][ T5033] fuse: Unknown parameter 'group_i00000000000000000000' [ 331.056903][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 331.057260][ T31] audit: type=1400 audit(330.980:265): avc: denied { create } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.063693][ T31] audit: type=1400 audit(330.990:266): avc: denied { bind } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.070034][ T31] audit: type=1400 audit(330.990:267): avc: denied { listen } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.083189][ T5046] capability: warning: `syz.1.193' uses deprecated v2 capabilities in a way that may be insecure [ 331.093488][ T31] audit: type=1400 audit(331.020:268): avc: denied { connect } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.211392][ T31] audit: type=1400 audit(331.130:269): avc: denied { write } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.214121][ T31] audit: type=1400 audit(331.130:270): avc: denied { setopt } for pid=5045 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.592607][ T5051] fuse: Unknown parameter 'group_i00000000000000000000' [ 333.278481][ T31] audit: type=1400 audit(333.200:271): avc: denied { create } for pid=5060 comm="syz.2.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 333.355474][ T31] audit: type=1400 audit(333.280:272): avc: denied { write } for pid=5060 comm="syz.2.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 333.695723][ T5072] fuse: Unknown parameter 'group_id00000000000000000000' [ 334.048660][ T31] audit: type=1400 audit(333.970:273): avc: denied { create } for pid=5074 comm="syz.2.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 334.059735][ T31] audit: type=1400 audit(333.980:274): avc: denied { setopt } for pid=5074 comm="syz.2.200" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 334.395642][ T5079] netlink: 332 bytes leftover after parsing attributes in process `syz.2.201'. [ 334.396688][ T5079] netlink: 'syz.2.201': attribute type 9 has an invalid length. [ 334.396807][ T5079] netlink: 108 bytes leftover after parsing attributes in process `syz.2.201'. [ 334.396958][ T5079] netlink: 32 bytes leftover after parsing attributes in process `syz.2.201'. [ 335.021848][ T5088] netlink: 'syz.2.203': attribute type 21 has an invalid length. [ 335.022860][ T5088] netlink: 156 bytes leftover after parsing attributes in process `syz.2.203'. [ 335.025434][ T5088] netlink: 4 bytes leftover after parsing attributes in process `syz.2.203'. [ 336.498514][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 336.498814][ T31] audit: type=1400 audit(336.420:284): avc: denied { create } for pid=5105 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 339.759581][ T5121] syz.1.209 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 340.802826][ T31] audit: type=1400 audit(340.730:285): avc: denied { allowed } for pid=5134 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 340.826969][ T31] audit: type=1400 audit(340.750:286): avc: denied { create } for pid=5134 comm="syz.1.214" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 341.094451][ T5141] ip6gre1: entered allmulticast mode [ 341.326877][ T5149] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 341.326951][ T31] audit: type=1400 audit(341.250:287): avc: denied { load_policy } for pid=5147 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 341.329076][ T5149] SELinux: failed to load policy [ 342.007865][ T31] audit: type=1400 audit(341.930:288): avc: denied { map } for pid=5161 comm="syz.1.224" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4393 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.008279][ T31] audit: type=1400 audit(341.930:289): avc: denied { read write } for pid=5161 comm="syz.1.224" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4393 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.053821][ T31] audit: type=1400 audit(341.980:290): avc: denied { mounton } for pid=5159 comm="syz.2.223" path="/36/file0" dev="tmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 342.056795][ T31] audit: type=1400 audit(341.980:291): avc: denied { mount } for pid=5159 comm="syz.2.223" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 342.096687][ T31] audit: type=1400 audit(342.020:292): avc: denied { watch watch_reads } for pid=5159 comm="syz.2.223" path="/36/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 342.212891][ T5162] netlink: 14 bytes leftover after parsing attributes in process `syz.2.223'. [ 342.422606][ T5162] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.520008][ T5162] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.619916][ T5162] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.748206][ T5162] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.902088][ T2971] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.946398][ T2971] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.993837][ T2971] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.027835][ T2971] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.261858][ T5205] fuse: Unknown parameter 'group_id00000000000000000000' [ 345.713896][ T5221] fuse: Bad value for 'user_id' [ 345.714244][ T5221] fuse: Bad value for 'user_id' [ 345.867979][ T31] audit: type=1326 audit(345.790:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 345.893370][ T31] audit: type=1326 audit(345.790:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 345.896136][ T31] audit: type=1326 audit(345.820:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 345.902028][ T31] audit: type=1326 audit(345.820:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 345.933749][ T31] audit: type=1326 audit(345.860:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 346.836828][ T5204] hid-generic 0000:0004:0000.0002: unknown main item tag 0x0 [ 346.837194][ T5204] hid-generic 0000:0004:0000.0002: unknown main item tag 0x0 [ 346.837398][ T5204] hid-generic 0000:0004:0000.0002: unknown main item tag 0x0 [ 346.841758][ T5204] hid-generic 0000:0004:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 347.114904][ T5241] (unnamed net_device) (uninitialized): option ad_user_port_key: invalid value (1280) [ 347.115374][ T5241] (unnamed net_device) (uninitialized): option ad_user_port_key: allowed values 0 - 1023 [ 347.232166][ T5244] fuse: Bad value for 'user_id' [ 347.232341][ T5244] fuse: Bad value for 'user_id' [ 347.402652][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 347.402952][ T31] audit: type=1400 audit(347.330:305): avc: denied { write } for pid=5245 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 347.407287][ T5247] netlink: 36 bytes leftover after parsing attributes in process `syz.1.241'. [ 347.665483][ T5251] ip6gre1: entered allmulticast mode [ 348.205700][ T5262] fuse: Bad value for 'user_id' [ 348.212382][ T5262] fuse: Bad value for 'user_id' [ 348.442871][ T31] audit: type=1400 audit(348.360:306): avc: denied { create } for pid=5264 comm="syz.2.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 348.765613][ T31] audit: type=1400 audit(348.690:307): avc: denied { create } for pid=5267 comm="syz.2.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.909201][ T31] audit: type=1400 audit(348.830:308): avc: denied { write } for pid=5267 comm="syz.2.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.909626][ T31] audit: type=1400 audit(348.830:309): avc: denied { nlmsg_write } for pid=5267 comm="syz.2.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 353.956896][ T5297] fuse: Bad value for 'fd' [ 354.633307][ T31] audit: type=1400 audit(354.560:310): avc: denied { sys_module } for pid=5298 comm="syz.2.252" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 355.508473][ T31] audit: type=1326 audit(355.430:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.510758][ T31] audit: type=1326 audit(355.430:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.514269][ T31] audit: type=1326 audit(355.440:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.519399][ T31] audit: type=1326 audit(355.440:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=439 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.520240][ T31] audit: type=1326 audit(355.440:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.524782][ T31] audit: type=1326 audit(355.450:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5309 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 355.836616][ T5316] fuse: Bad value for 'fd' [ 356.282500][ T5323] netlink: 'syz.2.258': attribute type 1 has an invalid length. [ 356.344257][ T5323] 8021q: adding VLAN 0 to HW filter on device bond1 [ 356.378495][ T5323] 8021q: adding VLAN 0 to HW filter on device bond1 [ 356.379232][ T5323] bond1: (slave vxcan1): The slave device specified does not support setting the MAC address [ 356.384677][ T5323] bond1: (slave vxcan1): Error -95 calling set_mac_address [ 356.633828][ T31] audit: type=1400 audit(356.560:317): avc: denied { create } for pid=5366 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 356.787489][ T31] audit: type=1400 audit(356.710:318): avc: denied { create } for pid=5369 comm="syz.2.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 356.806973][ T31] audit: type=1400 audit(356.730:319): avc: denied { write } for pid=5369 comm="syz.2.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 356.989856][ T5374] fuse: Bad value for 'fd' [ 357.599854][ T5377] vlan2: entered allmulticast mode [ 357.601613][ T5377] bridge_slave_0: entered allmulticast mode [ 358.633299][ T5387] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.784448][ T5387] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.882620][ T5387] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.964481][ T5387] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.355151][ T2971] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.377696][ T2971] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.499771][ T3813] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.580333][ T3813] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.064167][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 360.064505][ T31] audit: type=1400 audit(359.990:321): avc: denied { kexec_image_load } for pid=5405 comm="syz.2.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 360.723028][ T5409] fuse: Bad value for 'fd' [ 367.746558][ T5422] fuse: Bad value for 'fd' [ 368.227364][ T31] audit: type=1326 audit(368.150:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5423 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 368.233111][ T31] audit: type=1326 audit(368.160:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5423 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 368.245392][ T31] audit: type=1326 audit(368.170:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5423 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=97 compat=0 ip=0x132280 code=0x7ffc0000 [ 368.246618][ T31] audit: type=1326 audit(368.170:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5423 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 368.252550][ T31] audit: type=1326 audit(368.180:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5423 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 384.294708][ T5440] netlink: 4 bytes leftover after parsing attributes in process `syz.1.277'. [ 385.045386][ T5454] netlink: 64 bytes leftover after parsing attributes in process `syz.1.281'. [ 385.824827][ T31] audit: type=1400 audit(385.750:327): avc: denied { setopt } for pid=5463 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 386.348773][ T5466] netlink: 60 bytes leftover after parsing attributes in process `syz.1.286'. [ 389.977687][ T31] audit: type=1400 audit(389.900:328): avc: denied { write } for pid=5477 comm="syz.1.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 392.285725][ T31] audit: type=1401 audit(392.210:329): op=setxattr invalid_context="" [ 392.553299][ T31] audit: type=1400 audit(392.480:330): avc: denied { create } for pid=5494 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 392.568250][ T31] audit: type=1400 audit(392.490:331): avc: denied { ioctl } for pid=5494 comm="syz.1.294" path="socket:[4743]" dev="sockfs" ino=4743 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 399.348554][ T31] audit: type=1400 audit(399.270:332): avc: denied { ioctl } for pid=5507 comm="syz.2.299" path="socket:[4770]" dev="sockfs" ino=4770 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 399.844383][ T5515] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 399.845981][ T5515] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 405.465201][ T31] audit: type=1400 audit(405.390:333): avc: denied { create } for pid=5539 comm="syz.2.311" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 405.576885][ T31] audit: type=1400 audit(405.500:334): avc: denied { unlink } for pid=4441 comm="syz-executor" name="file0" dev="tmpfs" ino=490 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 406.328706][ T31] audit: type=1400 audit(406.250:335): avc: denied { connect } for pid=5545 comm="syz.2.314" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 406.683104][ T5550] team_slave_0: entered promiscuous mode [ 406.686414][ T5550] ipvlan0: entered promiscuous mode [ 406.688711][ T5550] ipvlan0: left promiscuous mode [ 406.689982][ T5550] team_slave_0: left promiscuous mode [ 406.911404][ T5556] macvtap0: refused to change device tx_queue_len [ 407.309690][ T31] audit: type=1400 audit(407.230:336): avc: denied { read } for pid=5559 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 407.357224][ T31] audit: type=1400 audit(407.280:337): avc: denied { map_create } for pid=5559 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.358869][ T31] audit: type=1400 audit(407.280:338): avc: denied { perfmon } for pid=5559 comm="syz.2.319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 407.361920][ T31] audit: type=1400 audit(407.290:339): avc: denied { map_read map_write } for pid=5559 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.374942][ T31] audit: type=1400 audit(407.300:340): avc: denied { prog_load } for pid=5559 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 407.375861][ T31] audit: type=1400 audit(407.300:341): avc: denied { bpf } for pid=5559 comm="syz.2.319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 407.380626][ T31] audit: type=1400 audit(407.300:342): avc: denied { prog_run } for pid=5559 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 408.286173][ T5564] netlink: 60 bytes leftover after parsing attributes in process `syz.2.321'. [ 408.934907][ T5573] netlink: 4 bytes leftover after parsing attributes in process `syz.2.323'. [ 411.256699][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 411.257152][ T31] audit: type=1326 audit(411.180:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5579 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132280 code=0x7ffc0000 [ 416.161372][ T31] audit: type=1400 audit(416.080:365): avc: denied { setcurrent } for pid=5584 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 416.163070][ T31] audit: type=1401 audit(416.090:366): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 416.621814][ T31] audit: type=1400 audit(416.540:367): avc: denied { create } for pid=5588 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 416.622150][ T31] audit: type=1400 audit(416.540:368): avc: denied { ioctl } for pid=5588 comm="syz.1.329" path="socket:[6104]" dev="sockfs" ino=6104 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 418.329869][ T5596] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 418.335278][ T31] audit: type=1400 audit(418.250:369): avc: denied { create } for pid=5595 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 419.291391][ T31] audit: type=1400 audit(419.210:370): avc: denied { listen } for pid=5604 comm="syz.1.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 419.508239][ T31] audit: type=1400 audit(419.430:371): avc: denied { create } for pid=5608 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 419.781508][ T31] audit: type=1326 audit(419.700:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 419.801951][ T31] audit: type=1326 audit(419.720:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 419.802392][ T31] audit: type=1326 audit(419.720:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 419.802932][ T31] audit: type=1326 audit(419.720:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 419.803125][ T31] audit: type=1326 audit(419.720:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 420.004332][ T5614] fuse: Unknown parameter '0x0000000000000004' [ 424.945630][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 424.945917][ T31] audit: type=1400 audit(424.870:393): avc: denied { create } for pid=5617 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 425.061483][ T31] audit: type=1400 audit(424.980:394): avc: denied { write } for pid=5617 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 425.189275][ T31] audit: type=1400 audit(425.110:395): avc: denied { connect } for pid=5617 comm="syz.1.341" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 425.196521][ T31] audit: type=1400 audit(425.110:396): avc: denied { setopt } for pid=5617 comm="syz.1.341" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 431.841330][ T31] audit: type=1326 audit(431.760:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.845809][ T31] audit: type=1326 audit(431.770:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.852243][ T31] audit: type=1326 audit(431.780:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.856723][ T31] audit: type=1326 audit(431.780:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.864398][ T31] audit: type=1326 audit(431.790:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.867585][ T31] audit: type=1326 audit(431.790:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.873729][ T31] audit: type=1326 audit(431.800:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.876601][ T31] audit: type=1326 audit(431.800:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.881718][ T31] audit: type=1326 audit(431.800:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 431.884404][ T31] audit: type=1326 audit(431.810:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5623 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x132280 code=0x7ffc0000 [ 433.635395][ T5635] netlink: 4 bytes leftover after parsing attributes in process `syz.2.345'. [ 433.658880][ T5635] netlink: 4 bytes leftover after parsing attributes in process `syz.2.345'. [ 436.699711][ T5674] ip6gre2: entered allmulticast mode [ 437.088791][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 437.089181][ T31] audit: type=1400 audit(437.010:433): avc: denied { read } for pid=5681 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 437.204097][ T31] audit: type=1400 audit(437.130:434): avc: denied { prog_load } for pid=5681 comm="syz.2.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.205704][ T31] audit: type=1400 audit(437.130:435): avc: denied { bpf } for pid=5681 comm="syz.2.357" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.217688][ T31] audit: type=1400 audit(437.130:436): avc: denied { perfmon } for pid=5681 comm="syz.2.357" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.353312][ T31] audit: type=1400 audit(437.280:437): avc: denied { setopt } for pid=5675 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 437.373862][ T31] audit: type=1400 audit(437.300:438): avc: denied { prog_run } for pid=5683 comm="syz.2.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.517636][ T31] audit: type=1400 audit(437.440:439): avc: denied { map_create } for pid=5686 comm="syz.2.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.523163][ T31] audit: type=1400 audit(437.440:440): avc: denied { map_read map_write } for pid=5686 comm="syz.2.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.858015][ T31] audit: type=1400 audit(437.780:441): avc: denied { create } for pid=5688 comm="syz.2.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 437.867078][ T31] audit: type=1400 audit(437.790:442): avc: denied { write } for pid=5688 comm="syz.2.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 437.879739][ T5689] netlink: 'syz.2.360': attribute type 139 has an invalid length. [ 438.161523][ T5691] netlink: 12 bytes leftover after parsing attributes in process `syz.2.361'. [ 438.796536][ T5701] smc: net device bond0 applied user defined pnetid SYZ0 [ 438.803189][ T5701] smc: net device bond0 erased user defined pnetid SYZ0 [ 438.855901][ T5703] netlink: 20 bytes leftover after parsing attributes in process `syz.2.367'. [ 438.862499][ T5703] netlink: 36 bytes leftover after parsing attributes in process `syz.2.367'. [ 443.407621][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 443.408529][ T31] audit: type=1400 audit(443.330:499): avc: denied { execmem } for pid=5728 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 457.003154][ T31] audit: type=1404 audit(456.930:500): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 457.026697][ T31] audit: type=1404 audit(456.950:501): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 457.056542][ T31] audit: type=1400 audit(456.980:502): avc: denied { read } for pid=5731 comm="syz.1.380" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 457.062718][ T31] audit: type=1400 audit(456.990:503): avc: denied { open } for pid=5731 comm="syz.1.380" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 457.066279][ T31] audit: type=1400 audit(456.990:504): avc: denied { prog_load } for pid=5731 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 457.071243][ T31] audit: type=1400 audit(456.990:505): avc: denied { bpf } for pid=5731 comm="syz.1.380" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 457.073776][ T31] audit: type=1400 audit(456.990:506): avc: denied { perfmon } for pid=5731 comm="syz.1.380" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 457.076405][ T31] audit: type=1400 audit(457.000:507): avc: denied { prog_run } for pid=5731 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 457.084883][ T31] audit: type=1400 audit(457.010:508): avc: denied { ioctl } for pid=5731 comm="syz.1.380" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 457.429780][ T31] audit: type=1400 audit(457.350:509): avc: denied { execmem } for pid=5738 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 462.110147][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 462.123513][ T31] audit: type=1400 audit(462.030:588): avc: denied { write } for pid=5751 comm="syz.1.386" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 462.126982][ T31] audit: type=1400 audit(462.050:589): avc: denied { mounton } for pid=5751 comm="syz.1.386" path="/187/file0" dev="tmpfs" ino=982 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 462.155805][ T31] audit: type=1400 audit(462.080:590): avc: denied { mount } for pid=5751 comm="syz.1.386" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 464.936914][ T31] audit: type=1400 audit(464.860:591): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 465.444317][ T31] audit: type=1400 audit(465.350:592): avc: denied { name_bind } for pid=5760 comm="syz.1.388" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 465.949894][ T31] audit: type=1400 audit(465.870:593): avc: denied { validate_trans } for pid=5762 comm="syz.1.389" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 466.166346][ T5765] netlink: 'syz.1.390': attribute type 4 has an invalid length. [ 466.185593][ T5765] netlink: 'syz.1.390': attribute type 4 has an invalid length. [ 466.394067][ T31] audit: type=1400 audit(466.310:594): avc: denied { create } for pid=5766 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 466.975769][ T31] audit: type=1400 audit(466.900:595): avc: denied { create } for pid=5773 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 466.986181][ T31] audit: type=1400 audit(466.910:596): avc: denied { ioctl } for pid=5773 comm="syz.1.394" path="socket:[5083]" dev="sockfs" ino=5083 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 472.316041][ T31] audit: type=1400 audit(472.240:597): avc: denied { append } for pid=5777 comm="syz.1.395" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 482.434704][ T31] audit: type=1400 audit(482.360:598): avc: denied { allowed } for pid=5781 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 482.439249][ T31] audit: type=1400 audit(482.360:599): avc: denied { create } for pid=5781 comm="syz.1.396" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 482.443071][ T31] audit: type=1400 audit(482.370:600): avc: denied { map } for pid=5781 comm="syz.1.396" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5092 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 482.445206][ T31] audit: type=1400 audit(482.370:601): avc: denied { read write } for pid=5781 comm="syz.1.396" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5092 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 482.466552][ T31] audit: type=1400 audit(482.390:602): avc: denied { create } for pid=5781 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 482.851495][ T31] audit: type=1326 audit(482.770:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 482.862997][ T31] audit: type=1326 audit(482.790:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 482.867050][ T31] audit: type=1326 audit(482.790:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.398" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 482.868811][ T31] audit: type=1326 audit(482.790:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 482.870315][ T31] audit: type=1326 audit(482.790:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.1.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 487.697464][ T5811] netlink: 24 bytes leftover after parsing attributes in process `syz.1.408'. [ 487.945412][ T5811] netlink: 4 bytes leftover after parsing attributes in process `syz.1.408'. [ 488.216051][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 488.222896][ T31] audit: type=1326 audit(488.140:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5828 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 488.228693][ T31] audit: type=1326 audit(488.150:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5828 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=139 compat=0 ip=0x132280 code=0x7ffc0000 [ 488.243394][ T31] audit: type=1326 audit(488.170:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5828 comm="syz.1.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 488.494037][ T31] audit: type=1400 audit(488.420:646): avc: denied { create } for pid=5830 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 490.292943][ T31] audit: type=1400 audit(490.220:647): avc: denied { load_policy } for pid=5837 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 490.294473][ T5838] SELinux: failed to load policy [ 490.532425][ T31] audit: type=1400 audit(490.450:648): avc: denied { connect } for pid=5839 comm="syz.1.414" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 490.554764][ T31] audit: type=1400 audit(490.480:649): avc: denied { write } for pid=5839 comm="syz.1.414" path="socket:[6520]" dev="sockfs" ino=6520 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 490.795110][ T31] audit: type=1400 audit(490.720:650): avc: denied { relabelfrom } for pid=5841 comm="syz.1.415" name="NETLINK" dev="sockfs" ino=6523 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 490.804754][ T31] audit: type=1400 audit(490.720:651): avc: denied { relabelto } for pid=5841 comm="syz.1.415" name="NETLINK" dev="sockfs" ino=6523 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_route_socket permissive=1 [ 491.043925][ T31] audit: type=1400 audit(490.970:652): avc: denied { create } for pid=5843 comm="syz.1.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 491.053432][ T5844] netlink: 268 bytes leftover after parsing attributes in process `syz.1.416'. [ 498.634275][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 498.634680][ T31] audit: type=1400 audit(498.560:673): avc: denied { create } for pid=5865 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 498.952704][ T31] audit: type=1400 audit(498.870:674): avc: denied { create } for pid=5865 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 498.956880][ T31] audit: type=1400 audit(498.880:675): avc: denied { ioctl } for pid=5865 comm="syz.1.421" path="socket:[7206]" dev="sockfs" ino=7206 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 498.976509][ T31] audit: type=1400 audit(498.900:676): avc: denied { bind } for pid=5865 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 499.002962][ T31] audit: type=1400 audit(498.930:677): avc: denied { setopt } for pid=5865 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 499.046366][ T31] audit: type=1400 audit(498.960:678): avc: denied { write } for pid=5865 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 499.288846][ C0] vcan0: j1939_tp_rxtimer: 0x85e8f600: rx timeout, send abort [ 499.298149][ T31] audit: type=1400 audit(499.220:679): avc: denied { read } for pid=2929 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 499.304764][ T31] audit: type=1400 audit(499.220:680): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 499.309865][ T31] audit: type=1400 audit(499.220:681): avc: denied { search } for pid=2929 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 499.317411][ T31] audit: type=1400 audit(499.220:682): avc: denied { add_name } for pid=2929 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 499.789693][ C0] vcan0: j1939_tp_rxtimer: 0x85e8f600: abort rx timeout. Force session deactivation [ 499.795363][ C0] vcan0: j1939_tp_rxtimer: 0x85e8f700: rx timeout, send abort [ 500.295834][ C0] vcan0: j1939_tp_rxtimer: 0x85e8f700: abort rx timeout. Force session deactivation [ 503.701445][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 503.701706][ T31] audit: type=1400 audit(503.620:692): avc: denied { create } for pid=5956 comm="syz.1.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 503.721082][ T31] audit: type=1400 audit(503.640:693): avc: denied { setopt } for pid=5956 comm="syz.1.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 505.234498][ T5869] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 505.247810][ T5869] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 505.533831][ T31] audit: type=1326 audit(505.460:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 505.564079][ T31] audit: type=1326 audit(505.490:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 505.564440][ T31] audit: type=1326 audit(505.490:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132280 code=0x7ffc0000 [ 505.571434][ T31] audit: type=1326 audit(505.490:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322b8 code=0x7ffc0000 [ 505.674980][ T31] audit: type=1326 audit(505.590:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322b8 code=0x7ffc0000 [ 505.675317][ T31] audit: type=1326 audit(505.590:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 505.793041][ T31] audit: type=1326 audit(505.670:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 505.793378][ T31] audit: type=1326 audit(505.720:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5956 comm="syz.1.426" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132280 code=0x7ffc0000 [ 507.716382][ T5869] hsr_slave_0: entered promiscuous mode [ 507.717449][ T5869] hsr_slave_1: entered promiscuous mode [ 507.718008][ T5869] debugfs: 'hsr0' already exists in 'hsr' [ 507.725723][ T5869] Cannot create hsr debugfs directory [ 508.688014][ T5869] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 508.706727][ T5869] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 508.716740][ T5869] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 508.774960][ T5869] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 511.043358][ T5869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 517.802892][ T5869] veth0_vlan: entered promiscuous mode [ 517.860246][ T5869] veth1_vlan: entered promiscuous mode [ 518.038383][ T5869] veth0_macvtap: entered promiscuous mode [ 518.066621][ T5869] veth1_macvtap: entered promiscuous mode [ 518.170615][ T2971] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.171725][ T2971] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.171806][ T2971] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.171843][ T2971] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.345846][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 518.346137][ T31] audit: type=1400 audit(518.260:727): avc: denied { mounton } for pid=5869 comm="syz-executor" path="/syzkaller.UqbOx0/syz-tmp" dev="vda" ino=817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 518.346327][ T31] audit: type=1400 audit(518.270:728): avc: denied { mount } for pid=5869 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 518.346511][ T31] audit: type=1400 audit(518.270:729): avc: denied { mounton } for pid=5869 comm="syz-executor" path="/syzkaller.UqbOx0/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 518.356561][ T31] audit: type=1400 audit(518.280:730): avc: denied { mount } for pid=5869 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 518.448407][ T31] audit: type=1400 audit(518.370:731): avc: denied { mounton } for pid=5869 comm="syz-executor" path="/syzkaller.UqbOx0/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 518.457559][ T31] audit: type=1400 audit(518.380:732): avc: denied { mounton } for pid=5869 comm="syz-executor" path="/syzkaller.UqbOx0/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7385 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 518.483130][ T31] audit: type=1400 audit(518.390:733): avc: denied { unmount } for pid=5869 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 518.488963][ T31] audit: type=1400 audit(518.410:734): avc: denied { mounton } for pid=5869 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 518.489410][ T31] audit: type=1400 audit(518.410:735): avc: denied { mount } for pid=5869 comm="syz-executor" name="/" dev="gadgetfs" ino=2259 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 518.499440][ T31] audit: type=1400 audit(518.420:736): avc: denied { mount } for pid=5869 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 518.838699][ T6263] netlink: 16 bytes leftover after parsing attributes in process `syz.3.422'. [ 524.867665][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 524.867921][ T31] audit: type=1326 audit(524.790:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6283 comm="syz.3.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 524.868144][ T31] audit: type=1326 audit(524.790:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6283 comm="syz.3.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 524.885767][ T31] audit: type=1326 audit(524.790:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6283 comm="syz.3.435" exe="/syz-executor" sig=0 arch=40000028 syscall=300 compat=0 ip=0x132280 code=0x7ffc0000 [ 524.887390][ T31] audit: type=1326 audit(524.810:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6283 comm="syz.3.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 524.901476][ T31] audit: type=1326 audit(524.810:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6283 comm="syz.3.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 528.161550][ T31] audit: type=1400 audit(528.080:744): avc: denied { name_bind } for pid=6295 comm="syz.3.439" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 529.325917][ T31] audit: type=1400 audit(529.250:745): avc: denied { getopt } for pid=6307 comm="syz.3.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 531.829810][ T6326] netlink: 4 bytes leftover after parsing attributes in process `syz.3.451'. [ 532.170538][ T31] audit: type=1400 audit(532.090:746): avc: denied { setcheckreqprot } for pid=6329 comm="syz.3.453" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 532.300027][ T5114] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 532.304631][ T5114] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 535.814649][ T31] audit: type=1400 audit(535.740:747): avc: denied { getopt } for pid=6342 comm="syz.3.456" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 536.313246][ T5163] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 536.317471][ T5163] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 539.575916][ T6358] netlink: 12 bytes leftover after parsing attributes in process `syz.3.460'. [ 539.590066][ T6358] netlink: 12 bytes leftover after parsing attributes in process `syz.3.460'. [ 540.661747][ T31] audit: type=1326 audit(540.580:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.665777][ T31] audit: type=1326 audit(540.590:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.667745][ T31] audit: type=1326 audit(540.590:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.671442][ T31] audit: type=1326 audit(540.590:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.692232][ T31] audit: type=1326 audit(540.600:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.694307][ T31] audit: type=1326 audit(540.620:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.697324][ T31] audit: type=1326 audit(540.620:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.700200][ T31] audit: type=1326 audit(540.620:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=253 compat=0 ip=0x132280 code=0x7ffc0000 [ 540.717499][ T31] audit: type=1326 audit(540.640:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.3.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 541.344663][ T6370] netlink: 'syz.3.466': attribute type 10 has an invalid length. [ 543.010322][ T31] audit: type=1326 audit(542.930:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.3.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.052333][ T6387] netlink: 20 bytes leftover after parsing attributes in process `syz.3.472'. [ 546.889311][ T31] kauditd_printk_skb: 595 callbacks suppressed [ 546.892057][ T31] audit: type=1326 audit(546.810:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.895616][ T31] audit: type=1326 audit(546.820:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.903185][ T31] audit: type=1326 audit(546.830:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.915733][ T31] audit: type=1326 audit(546.840:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.917557][ T31] audit: type=1326 audit(546.840:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.920093][ T31] audit: type=1326 audit(546.840:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.927740][ T31] audit: type=1326 audit(546.850:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.928080][ T31] audit: type=1326 audit(546.850:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.928459][ T31] audit: type=1326 audit(546.850:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 546.951546][ T31] audit: type=1326 audit(546.860:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.3.476" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 547.750099][ T6403] netlink: 8 bytes leftover after parsing attributes in process `syz.3.478'. [ 549.418509][ T5067] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 549.439199][ T5067] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 556.892136][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 556.892447][ T31] audit: type=1400 audit(556.810:1386): avc: denied { mount } for pid=6423 comm="syz.3.485" name="/" dev="ramfs" ino=8244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 557.336531][ T31] audit: type=1326 audit(557.260:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.359840][ T31] audit: type=1326 audit(557.280:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.387309][ T31] audit: type=1326 audit(557.310:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.394640][ T31] audit: type=1326 audit(557.320:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6429 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd34 code=0x7ffc0000 [ 557.422711][ T31] audit: type=1326 audit(557.350:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.435024][ T31] audit: type=1326 audit(557.360:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.435336][ T31] audit: type=1326 audit(557.360:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.442735][ T31] audit: type=1326 audit(557.370:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=0 ip=0x132280 code=0x7ffc0000 [ 557.444520][ T31] audit: type=1326 audit(557.370:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.3.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 558.727195][ T6433] netlink: 4 bytes leftover after parsing attributes in process `syz.1.489'. [ 559.216672][ T6441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.490'. [ 559.252826][ T6441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.490'. [ 559.254184][ T6441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.490'. [ 559.255119][ T6441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.490'. [ 559.915201][ T6443] netlink: 4 bytes leftover after parsing attributes in process `syz.1.491'. [ 562.345026][ T31] audit: type=1326 audit(562.270:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.395949][ T31] audit: type=1326 audit(562.320:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.417135][ T31] audit: type=1326 audit(562.330:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.465528][ T31] audit: type=1326 audit(562.360:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.465780][ T31] audit: type=1326 audit(562.390:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.472697][ T31] audit: type=1326 audit(562.400:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.537685][ T31] audit: type=1326 audit(562.440:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.537964][ T31] audit: type=1326 audit(562.460:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.547544][ T31] audit: type=1326 audit(562.470:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 562.672458][ T31] audit: type=1326 audit(562.600:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.3.495" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 564.222441][ T6460] $Hÿ: renamed from dummy0 (while UP) [ 564.227015][ T6460] $Hÿ: entered promiscuous mode [ 569.751615][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 569.751977][ T31] audit: type=1326 audit(569.670:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.770128][ T31] audit: type=1326 audit(569.690:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.774699][ T31] audit: type=1326 audit(569.690:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.780312][ T31] audit: type=1326 audit(569.700:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.807755][ T31] audit: type=1326 audit(569.700:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.835489][ T31] audit: type=1326 audit(569.740:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.854400][ T31] audit: type=1326 audit(569.770:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.957031][ T31] audit: type=1326 audit(569.870:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.972163][ T31] audit: type=1326 audit(569.870:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 569.993201][ T31] audit: type=1326 audit(569.900:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6464 comm="syz.3.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 577.093186][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 577.093444][ T31] audit: type=1400 audit(577.020:1474): avc: denied { bind } for pid=6490 comm="syz.3.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 577.181598][ T31] audit: type=1400 audit(577.090:1475): avc: denied { write } for pid=6490 comm="syz.3.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 581.135200][ T6496] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 586.873743][ T6513] tmpfs: Unsupported parameter 'mpol' [ 590.609247][ T31] audit: type=1400 audit(590.530:1476): avc: denied { create } for pid=6525 comm="syz.3.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 590.623231][ T31] audit: type=1400 audit(590.550:1477): avc: denied { setopt } for pid=6525 comm="syz.3.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 590.630035][ T31] audit: type=1400 audit(590.550:1478): avc: denied { execute } for pid=6525 comm="syz.3.522" name="cgroup" dev="tmpfs" ino=454 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=lnk_file permissive=1 [ 590.702350][ T31] audit: type=1326 audit(590.610:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6525 comm="syz.3.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 590.702650][ T31] audit: type=1326 audit(590.610:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6525 comm="syz.3.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 591.730095][ T31] audit: type=1400 audit(591.650:1481): avc: denied { create } for pid=6535 comm="syz.3.526" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 591.971889][ T31] audit: type=1400 audit(591.880:1482): avc: denied { unlink } for pid=5869 comm="syz-executor" name="file0" dev="tmpfs" ino=479 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 592.600416][ T31] audit: type=1400 audit(592.520:1483): avc: denied { create } for pid=6543 comm="syz.3.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 599.118176][ T31] audit: type=1326 audit(599.040:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6561 comm="syz.3.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.122571][ T31] audit: type=1326 audit(599.050:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6561 comm="syz.3.537" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.125344][ T31] audit: type=1326 audit(599.050:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6561 comm="syz.3.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.593448][ T31] audit: type=1326 audit(599.520:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.593776][ T31] audit: type=1326 audit(599.520:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.600538][ T31] audit: type=1326 audit(599.520:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.601339][ T31] audit: type=1326 audit(599.520:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.605778][ T31] audit: type=1326 audit(599.520:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.606098][ T31] audit: type=1326 audit(599.530:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 599.622611][ T31] audit: type=1326 audit(599.550:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6565 comm="syz.3.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 607.663328][ T6116] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.737072][ T6116] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.854694][ T6116] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.924051][ T6116] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.352781][ T6116] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 609.358760][ T6116] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 609.364448][ T6116] bond0 (unregistering): Released all slaves [ 609.375896][ T6116] bond1 (unregistering): Released all slaves [ 609.556465][ T6116] hsr_slave_0: left promiscuous mode [ 609.627855][ T6116] hsr_slave_1: left promiscuous mode [ 609.651376][ T6116] veth1_macvtap: left promiscuous mode [ 609.651763][ T6116] veth0_macvtap: left promiscuous mode [ 609.652123][ T6116] veth1_vlan: left promiscuous mode [ 609.652273][ T6116] veth0_vlan: left promiscuous mode [ 613.878115][ T6601] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 613.907388][ T6601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 617.032319][ T6601] hsr_slave_0: entered promiscuous mode [ 617.034294][ T6601] hsr_slave_1: entered promiscuous mode [ 617.036762][ T6601] debugfs: 'hsr0' already exists in 'hsr' [ 617.037311][ T6601] Cannot create hsr debugfs directory [ 618.236013][ T6601] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 618.284438][ T6601] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 618.314524][ T6601] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 618.334773][ T6601] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 620.179133][ T6601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 628.421944][ T6601] veth0_vlan: entered promiscuous mode [ 628.471701][ T6601] veth1_vlan: entered promiscuous mode [ 628.514491][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 628.515531][ T31] audit: type=1326 audit(628.410:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.517821][ T31] audit: type=1326 audit(628.440:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.519412][ T31] audit: type=1326 audit(628.440:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.522497][ T31] audit: type=1326 audit(628.440:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.536468][ T31] audit: type=1326 audit(628.440:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.543451][ T31] audit: type=1326 audit(628.470:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.547475][ T31] audit: type=1326 audit(628.470:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.559688][ T31] audit: type=1326 audit(628.470:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.568487][ T31] audit: type=1326 audit(628.480:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.587203][ T31] audit: type=1326 audit(628.510:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 628.825157][ T6601] veth0_macvtap: entered promiscuous mode [ 628.848801][ T6601] veth1_macvtap: entered promiscuous mode [ 629.105237][ T2971] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.105624][ T2971] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.105848][ T2971] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.106074][ T2971] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.158377][ T7056] syz.3.560 uses obsolete (PF_INET,SOCK_PACKET) [ 636.522175][ T6116] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.773351][ T6116] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.972489][ T6116] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 637.169085][ T6116] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 640.793913][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 640.794825][ T31] audit: type=1326 audit(640.720:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.798812][ T31] audit: type=1326 audit(640.720:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.803007][ T31] audit: type=1326 audit(640.730:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.805027][ T31] audit: type=1326 audit(640.730:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.808047][ T31] audit: type=1326 audit(640.730:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.813300][ T31] audit: type=1326 audit(640.740:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.815564][ T31] audit: type=1326 audit(640.740:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.818689][ T31] audit: type=1326 audit(640.740:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.822565][ T31] audit: type=1326 audit(640.750:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 640.824744][ T31] audit: type=1326 audit(640.750:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7093 comm="syz.4.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 641.305452][ T6116] smc: removing net device bond0 with user defined pnetid SYZ2 [ 641.327373][ T6116] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 641.435343][ T6116] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 641.453951][ T6116] bond0 (unregistering): Released all slaves [ 641.472751][ T6116] bond1 (unregistering): Released all slaves [ 641.538984][ T6116] hsr_slave_0: left promiscuous mode [ 641.542182][ T6116] hsr_slave_1: left promiscuous mode [ 641.551869][ T6116] veth1_macvtap: left promiscuous mode [ 641.552743][ T6116] veth0_macvtap: left promiscuous mode [ 641.553432][ T6116] veth1_vlan: left promiscuous mode [ 641.553862][ T6116] veth0_vlan: left promiscuous mode [ 646.319369][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 646.320234][ T31] audit: type=1326 audit(646.240:1563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.324781][ T31] audit: type=1326 audit(646.250:1564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.328112][ T31] audit: type=1326 audit(646.250:1565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=279 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.329829][ T31] audit: type=1326 audit(646.250:1566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.333857][ T31] audit: type=1326 audit(646.260:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.336198][ T31] audit: type=1326 audit(646.260:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 646.344159][ T31] audit: type=1326 audit(646.270:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7153 comm="syz.3.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 650.864121][ T7185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7185 comm=syz.4.595 [ 650.930332][ T31] audit: type=1400 audit(650.840:1570): avc: denied { create } for pid=7177 comm="syz.4.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 651.644944][ T7197] random: crng reseeded on system resumption [ 651.673999][ T7197] Restarting kernel threads ... [ 651.675971][ T7197] Done restarting kernel threads. [ 651.897618][ T31] audit: type=1400 audit(651.820:1571): avc: denied { search } for pid=7186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 652.160431][ T31] audit: type=1400 audit(652.080:1572): avc: denied { read } for pid=7199 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.232880][ T31] audit: type=1400 audit(652.160:1573): avc: denied { map_create } for pid=7198 comm="syz.3.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.234730][ T31] audit: type=1400 audit(652.160:1574): avc: denied { perfmon } for pid=7198 comm="syz.3.600" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 652.241105][ T31] audit: type=1400 audit(652.160:1575): avc: denied { map_read map_write } for pid=7198 comm="syz.3.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.241411][ T31] audit: type=1400 audit(652.160:1576): avc: denied { prog_load } for pid=7199 comm="syz.4.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.241598][ T31] audit: type=1400 audit(652.160:1577): avc: denied { bpf } for pid=7199 comm="syz.4.599" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 652.258454][ T31] audit: type=1400 audit(652.180:1578): avc: denied { prog_run } for pid=7199 comm="syz.4.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.329133][ T31] audit: type=1400 audit(652.240:1579): avc: denied { create } for pid=7198 comm="syz.3.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 652.339792][ T31] audit: type=1400 audit(652.260:1580): avc: denied { getopt } for pid=7198 comm="syz.3.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 659.016511][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 659.016756][ T31] audit: type=1400 audit(658.940:1663): avc: denied { load_policy } for pid=7255 comm="syz.3.614" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 659.017650][ T7256] SELinux: policydb version -1497064854 does not match my version range 15-35 [ 659.017936][ T7256] SELinux: failed to load policy [ 659.995596][ T31] audit: type=1400 audit(659.920:1664): avc: denied { write } for pid=7263 comm="syz.3.617" name="uhid" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 660.121971][ T31] audit: type=1400 audit(660.040:1665): avc: denied { execmem } for pid=7263 comm="syz.3.617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 664.925389][ T31] audit: type=1400 audit(664.850:1666): avc: denied { mounton } for pid=7274 comm="syz.3.618" path="/160/file0" dev="tmpfs" ino=827 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 664.931830][ T7275] tmpfs: Unsupported parameter 'mpol' [ 665.186795][ T31] audit: type=1400 audit(665.110:1667): avc: denied { create } for pid=7277 comm="syz.4.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 665.265632][ T31] audit: type=1400 audit(665.160:1668): avc: denied { ioctl } for pid=7277 comm="syz.4.620" path="socket:[9592]" dev="sockfs" ino=9592 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 665.475008][ T31] audit: type=1400 audit(665.400:1669): avc: denied { sys_module } for pid=7280 comm="syz.3.621" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 665.478208][ T31] audit: type=1400 audit(665.400:1670): avc: denied { module_load } for pid=7280 comm="syz.3.621" path="/sys/kernel/notes" dev="sysfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 666.354256][ T31] audit: type=1400 audit(666.280:1671): avc: denied { create } for pid=7286 comm="syz.3.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 667.650732][ T31] audit: type=1400 audit(667.570:1672): avc: denied { setopt } for pid=7291 comm="syz.3.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 667.691611][ T31] audit: type=1400 audit(667.600:1673): avc: denied { bind } for pid=7291 comm="syz.3.625" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 667.697673][ T31] audit: type=1400 audit(667.620:1674): avc: denied { name_bind } for pid=7291 comm="syz.3.625" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 667.706433][ T31] audit: type=1400 audit(667.630:1675): avc: denied { node_bind } for pid=7291 comm="syz.3.625" saddr=172.20.20.170 src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 671.318523][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 671.318817][ T31] audit: type=1400 audit(671.240:1677): avc: denied { mount } for pid=7306 comm="syz.4.630" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 671.649374][ T31] audit: type=1400 audit(671.570:1678): avc: denied { create } for pid=7308 comm="syz.4.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 671.657370][ T31] audit: type=1400 audit(671.580:1679): avc: denied { write } for pid=7308 comm="syz.4.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 672.102489][ T31] audit: type=1400 audit(671.980:1680): avc: denied { read } for pid=7314 comm="syz.4.633" dev="nsfs" ino=4026532727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 672.102804][ T31] audit: type=1400 audit(672.010:1681): avc: denied { open } for pid=7314 comm="syz.4.633" path="net:[4026532727]" dev="nsfs" ino=4026532727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 673.387713][ T31] audit: type=1400 audit(673.310:1682): avc: denied { name_bind } for pid=7303 comm="syz.3.629" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 673.389371][ T31] audit: type=1400 audit(673.310:1683): avc: denied { node_bind } for pid=7303 comm="syz.3.629" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 678.045208][ T31] audit: type=1400 audit(677.970:1684): avc: denied { append } for pid=7348 comm="syz.4.637" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 678.046671][ T7350] random: crng reseeded on system resumption [ 680.293290][ T31] audit: type=1400 audit(680.220:1685): avc: denied { name_bind } for pid=7348 comm="syz.4.637" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 684.827202][ T31] audit: type=1400 audit(684.750:1686): avc: denied { create } for pid=7361 comm="syz.4.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 684.828526][ T31] audit: type=1400 audit(684.750:1687): avc: denied { write } for pid=7361 comm="syz.4.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 684.830074][ T31] audit: type=1400 audit(684.750:1688): avc: denied { nlmsg_write } for pid=7361 comm="syz.4.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 684.936169][ T31] audit: type=1400 audit(684.860:1689): avc: denied { create } for pid=7363 comm="syz.4.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 692.679215][ T7383] netlink: 'syz.3.648': attribute type 10 has an invalid length. [ 693.408676][ T7386] netlink: 'syz.3.649': attribute type 4 has an invalid length. [ 693.591572][ T31] audit: type=1400 audit(693.510:1690): avc: denied { setcurrent } for pid=7388 comm="syz.4.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 693.592910][ T31] audit: type=1401 audit(693.520:1691): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 694.463881][ T7399] netlink: 8 bytes leftover after parsing attributes in process `syz.3.655'. [ 694.862632][ T7401] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 695.177953][ T31] audit: type=1326 audit(695.100:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7402 comm="syz.3.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 695.192815][ T31] audit: type=1326 audit(695.120:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7402 comm="syz.3.657" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=0 ip=0x132280 code=0x7ffc0000 [ 695.201664][ T31] audit: type=1326 audit(695.120:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7402 comm="syz.3.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 695.202023][ T31] audit: type=1326 audit(695.120:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7402 comm="syz.3.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 696.376704][ T31] audit: type=1400 audit(696.300:1696): avc: denied { bind } for pid=7408 comm="syz.3.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 696.395377][ T7409] netlink: 4 bytes leftover after parsing attributes in process `syz.3.660'. [ 696.919592][ T31] audit: type=1400 audit(696.840:1697): avc: denied { write } for pid=7412 comm="syz.3.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 697.213034][ T31] audit: type=1400 audit(697.140:1698): avc: denied { watch } for pid=7416 comm="syz.3.663" path="/184/file0" dev="cgroup2" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 697.240508][ T31] audit: type=1400 audit(697.160:1699): avc: denied { mac_admin } for pid=7416 comm="syz.3.663" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 698.365964][ T7430] ipip0: entered promiscuous mode [ 699.964179][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 699.964433][ T31] audit: type=1326 audit(699.870:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7444 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 699.967001][ T31] audit: type=1326 audit(699.890:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7444 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 699.969288][ T31] audit: type=1326 audit(699.890:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7444 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x132280 code=0x7ffc0000 [ 699.972866][ T31] audit: type=1326 audit(699.890:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7444 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 699.982722][ T31] audit: type=1326 audit(699.910:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7444 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 701.085807][ T4945] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 701.121845][ T4945] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 706.379575][ T31] audit: type=1326 audit(706.300:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.3.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 706.382308][ T31] audit: type=1326 audit(706.310:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.3.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 706.418546][ T31] audit: type=1326 audit(706.310:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.3.686" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x132280 code=0x7ffc0000 [ 706.435374][ T31] audit: type=1326 audit(706.350:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.3.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 706.438634][ T31] audit: type=1326 audit(706.360:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.3.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 706.755138][ T7486] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 706.755630][ T7486] IPv6: NLM_F_CREATE should be set when creating new route [ 706.755965][ T7486] IPv6: NLM_F_CREATE should be set when creating new route [ 706.757192][ T7486] ------------[ cut here ]------------ [ 706.757579][ T7486] WARNING: CPU: 0 PID: 7486 at drivers/net/netdevsim/fib.c:831 nsim_fib_event_nb+0x218/0x52c [ 706.760138][ T7486] Modules linked in: [ 706.771608][ T7486] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 706.772819][ T7486] CPU: 0 UID: 0 PID: 7486 Comm: syz.3.687 Not tainted syzkaller #0 PREEMPT [ 706.773210][ T7486] Hardware name: ARM-Versatile Express [ 706.773661][ T7486] Call trace: [ 706.774613][ T7486] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 706.776362][ T7486] r7:00000000 r6:8281f77c r5:00000000 r4:82260aec [ 706.776659][ T7486] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 706.776965][ T7486] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 706.777270][ T7486] r5:00000000 r4:82a77d18 [ 706.777442][ T7486] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 706.777718][ T7486] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 706.777999][ T7486] r7:80e4dcc4 [ 706.778125][ T7486] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 706.778409][ T7486] r3:8280c684 r2:00000001 r1:82247508 r0:8224ef84 [ 706.778609][ T7486] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 706.778911][ T7486] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 706.779201][ T7486] r8:00000009 r7:82348270 r6:dfa998e4 r5:84df3c00 r4:00000000 [ 706.779423][ T7486] [<80254bd0>] (warn_slowpath_fmt) from [<80e4dcc4>] (nsim_fib_event_nb+0x218/0x52c) [ 706.779784][ T7486] r10:85d1ee00 r9:85f4c444 r8:00000001 r7:85d1ee00 r6:dfa999ec r5:85f4cf40 [ 706.780257][ T7486] r4:83e8cc00 [ 706.780510][ T7486] [<80e4daac>] (nsim_fib_event_nb) from [<802855fc>] (notifier_call_chain+0x60/0x1b4) [ 706.781234][ T7486] r10:dfa999ec r9:dfa99b34 r8:80e4daac r7:00000000 r6:ffffffff r5:83e8cc00 [ 706.781650][ T7486] r4:00000000 [ 706.781803][ T7486] [<8028559c>] (notifier_call_chain) from [<80285878>] (atomic_notifier_call_chain+0x3c/0x50) [ 706.782200][ T7486] r10:dfa99a40 r9:dfa99b34 r8:00000003 r7:00000005 r6:dfa999ec r5:00000001 [ 706.784327][ T7486] r4:84996688 [ 706.790869][ T7486] [<8028583c>] (atomic_notifier_call_chain) from [<815b924c>] (call_fib_notifiers+0x44/0x58) [ 706.793841][ T7486] r6:84996680 r5:dfa999ec r4:00000001 [ 706.794107][ T7486] [<815b9208>] (call_fib_notifiers) from [<81871e2c>] (call_fib6_notifiers+0x18/0x1c) [ 706.794513][ T7486] r7:00000000 r6:85d1ee00 r5:00000000 r4:00000000 [ 706.794761][ T7486] [<81871e14>] (call_fib6_notifiers) from [<818477d4>] (call_fib6_multipath_entry_notifiers+0x48/0x6c) [ 706.795164][ T7486] [<8184778c>] (call_fib6_multipath_entry_notifiers) from [<8184402c>] (ip6_route_multipath_add+0x5c8/0x7ac) [ 706.795573][ T7486] r4:00000001 [ 706.795706][ T7486] [<81843a64>] (ip6_route_multipath_add) from [<81844290>] (inet6_rtm_newroute+0x80/0xc4) [ 706.796090][ T7486] r10:00000000 r9:00000000 r8:82c1f5a8 r7:862a60c0 r6:85c078c0 r5:862a60c0 [ 706.796379][ T7486] r4:dfa99c48 [ 706.796530][ T7486] [<81844210>] (inet6_rtm_newroute) from [<815922c8>] (rtnetlink_rcv_msg+0x2e0/0x334) [ 706.796905][ T7486] r6:0000000a r5:81844210 r4:85c078c0 [ 706.797143][ T7486] [<81591fe8>] (rtnetlink_rcv_msg) from [<81672424>] (netlink_rcv_skb+0xc0/0x120) [ 706.797500][ T7486] r10:00000000 r9:00000000 r8:84f91d80 r7:0000004c r6:85c078c0 r5:81591fe8 [ 706.797784][ T7486] r4:862a60c0 [ 706.797934][ T7486] [<81672364>] (netlink_rcv_skb) from [<81590e94>] (rtnetlink_rcv+0x18/0x1c) [ 706.798298][ T7486] r7:862a60c0 r6:85631900 r5:0000004c r4:858abc00 [ 706.798535][ T7486] [<81590e7c>] (rtnetlink_rcv) from [<81671bf0>] (netlink_unicast+0x1f0/0x30c) [ 706.798907][ T7486] [<81671a00>] (netlink_unicast) from [<81671ed8>] (netlink_sendmsg+0x1cc/0x444) [ 706.799279][ T7486] r9:00000000 r8:00000000 r7:85b15c00 r6:0000004c r5:862a60c0 r4:dfa99f20 [ 706.799580][ T7486] [<81671d0c>] (netlink_sendmsg) from [<81543bb0>] (__sock_sendmsg+0x44/0x78) [ 706.799974][ T7486] r10:00000000 r9:dfa99dc4 r8:dfa99dc4 r7:00000000 r6:850b4780 r5:dfa99f20 [ 706.800285][ T7486] r4:00000000 [ 706.800419][ T7486] [<81543b6c>] (__sock_sendmsg) from [<81544f08>] (____sys_sendmsg+0x298/0x2cc) [ 706.800777][ T7486] r7:00000000 r6:850b4780 r5:00000000 r4:dfa99f20 [ 706.807526][ T7486] [<81544c70>] (____sys_sendmsg) from [<81546ed0>] (___sys_sendmsg+0x9c/0xd0) [ 706.808112][ T7486] r10:dfa99e24 r9:20000100 r8:00000000 r7:00000000 r6:850b4780 r5:dfa99f20 [ 706.808462][ T7486] r4:00000000 [ 706.808636][ T7486] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 706.809074][ T7486] r10:00000128 r9:84df3c00 r8:85c81780 r7:00000000 r6:20000100 r5:85c81781 [ 706.809405][ T7486] r4:00000005 [ 706.809585][ T7486] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 706.810084][ T7486] r8:8020029c r7:00000128 r6:002f6308 r5:00000000 r4:00000000 [ 706.810373][ T7486] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 706.811020][ T7486] Exception stack(0xdfa99fa8 to 0xdfa99ff0) [ 706.811694][ T7486] 9fa0: 00000000 00000000 00000005 20000100 00000000 00000000 [ 706.817803][ T7486] 9fc0: 00000000 00000000 002f6308 00000128 002e0000 00000000 00006364 76ff50bc [ 706.818209][ T7486] 9fe0: 76ff4ec0 76ff4eb0 0001946c 00132280 [ 706.822098][ T7486] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:49:54 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82aa9cc4 R02=00000000 R03=82aa9cc4 R04=00000000 R05=00000004 R06=dddc43d5 R07=00000000 R08=00000000 R09=00000000 R10=82826ef0 R11=dfa997bc R12=fffffffe R13=dfa99738 R14=802e09ec R15=802e0e10 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=91b60000 R01=dfdfc000 R02=00000001 R03=80239bb8 R04=7f26e000 R05=00000001 R06=82ac8f44 R07=82ac8320 R08=7f26e000 R09=dfdfc000 R10=8280c9b4 R11=dfb5dd9c R12=dfb5dda0 R13=dfb5dd70 R14=80230af0 R15=80239bd0 PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000