last executing test programs: 4m7.971642854s ago: executing program 1 (id=351): syz_io_uring_setup(0x3724, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e22, 0x9, @loopback, 0x6}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040)=0x42, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x23, @loopback, 0x23}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002440)="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", 0x1e8}, {&(0x7f00000004c0)="908dcc35a37973ebe5af2ac7f5856289c48b1f8c38d4923984a5cb9f0100000100000000b59fc0efd830f068ab004358cf04", 0x32}], 0x2}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000006c0)="04", 0x1}], 0x1}}], 0x2, 0x4000001) r1 = dup(r0) read$FUSE(r1, &(0x7f00000075c0)={0x2020}, 0x2020) ppoll(&(0x7f0000000400)=[{r1, 0x88}], 0x1, 0x0, 0x0, 0x0) 4m4.444333157s ago: executing program 1 (id=354): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0xe, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 4m4.183067508s ago: executing program 1 (id=355): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x8000f28, 0x0) splice(r2, 0x0, r1, 0x0, 0x7f, 0xe) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x81362000) r4 = userfaultfd(0x80801) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x100}) ioctl$UFFDIO_ZEROPAGE(r4, 0xc020aa08, &(0x7f0000000000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) rt_tgsigqueueinfo(0x0, 0x0, 0x3, 0x0) 3m58.601339819s ago: executing program 1 (id=356): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f00000001c0)='.\x00', &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x111509e, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 3m58.413779177s ago: executing program 1 (id=357): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_io_uring_setup(0x4175, &(0x7f0000000180)={0x0, 0xbf56, 0x10000, 0x2, 0x2d0}, &(0x7f0000001040), &(0x7f0000001080)) io_uring_enter(r0, 0x7b20, 0xe93c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000380)={0x8, 0x0, 0x0, 0x0, 0xffffff63}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, 0x0, 0x0) 3m58.083039761s ago: executing program 1 (id=358): r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0xa, 0x5, 0x87, 0x7}) 3m58.082880832s ago: executing program 32 (id=358): r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0xa, 0x5, 0x87, 0x7}) 21.575751318s ago: executing program 2 (id=580): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$RTC_PIE_OFF(r0, 0x7006) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0xfffffffc) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x30, r5, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}]}]}, 0x30}, 0x1, 0x0, 0x0, 0xaa34a4cfdb933201}, 0x10) 18.877950025s ago: executing program 2 (id=584): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="40000000090601020000000000000000000000000900020073797a31000000000500010007000000180007800c00018008000140fffffffe050003"], 0x40}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r7, 0x0, 0xf3a, 0x0) write(r3, &(0x7f0000000240)="94", 0x1) close(r6) tee(r2, r7, 0x8f5, 0x0) futex(&(0x7f000000cffc)=0x2, 0x189, 0x2, 0x0, 0x0, 0x1) futex(&(0x7f000000cffc), 0x8a, 0x0, 0x0, 0x0, 0x100004) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r7, 0x0, 0xd9) write(r4, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="040000000000000008003f006563060008001b"], 0x30}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000002280)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe4) quotactl_fd$Q_GETINFO(0xffffffffffffffff, 0xffffffff80000500, r8, &(0x7f00000001c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000500)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000011aec0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x7, "0dd3dd37761564"}) 14.141558449s ago: executing program 2 (id=591): r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) 13.831663412s ago: executing program 2 (id=593): socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a0000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x13) socket$can_bcm(0x1d, 0x2, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './cgroup\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount(&(0x7f0000000080)=@nullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f00000000c0)='affs\x00', 0xa08410, 0x0) io_uring_setup(0x3eb1, &(0x7f0000000080)={0x0, 0x3fde, 0xc00, 0x10, 0x147}) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000002f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001b00)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x2400c044}], 0x1, 0x8800) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sysfs$3(0x3) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000240)) 3.060879738s ago: executing program 0 (id=594): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000d, 0x12, r0, 0xdf5b3000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000680)=@ccm_128={{0x303}, "edf9cf3025afd883", "96f9818e689ded0e0289075c2745e0df", "f79f22f4", "7bab0316c790dae4"}, 0x28) 2.951084342s ago: executing program 0 (id=595): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000091aa5c5c8893c40204000000000000000000000000000000e1c6a607509a340a538cba82b25c411f4d44c8be29ee5db9d944c61cb1e45ffaece8e2b740fd919e7010387777d9d87948d287c8e8f19d7f906735377e6bb70aa66e6e84fcfeeb1ac72d0352120b2eecc8696cc16d7304c24275dbaf1879cf6f4b2fd44764942fe174300100a9884792d80d320fc22cf047281e604ab4978fdf2d22bf3520436c4d0798d52027c26437553719b847"], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000680)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r1, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r2, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) 2.580115049s ago: executing program 0 (id=596): r0 = syz_open_dev$sndmidi(&(0x7f0000000240), 0x2, 0x141800) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0205710, 0x0) 2.501028202s ago: executing program 0 (id=597): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000), 0x101000, 0x800, 0x3, 0x1}, 0x20) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000003c0)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000100)=0x1000000, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_virt_wifi\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x8, r1}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x104440, 0x4) 258.904499ms ago: executing program 0 (id=598): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000700)="4d00000015c6010100001c66059f2552eb0da00cd186b010004007af37ac3a9f4bfba6ab3411d0954730af98d797cc860762002d", 0x34, 0x48800, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0xc, 0x6, @random="625bec77540e"}, 0x14) 258.496539ms ago: executing program 2 (id=599): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1200000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"], 0x50) 12.0076ms ago: executing program 2 (id=600): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x5, 0x10000, 0x4, 0x5, 0x3b7, 0x5, 0x5, 0xa, 0x100, 0x2, 0x4, 0x1, 0x1, 0x6, 0x101, 0x0, 0x1a44b, 0x3, 0x40000003, 0x89, 0xcaa7, 0x0, 0x20001e58, 0xb, 0xe69, 0x3c, 0x8, 0x6, 0x0, 0xfffffff8]}) 0s ago: executing program 0 (id=601): r0 = syz_open_dev$sndmidi(&(0x7f0000000240), 0x2, 0x141800) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0205710, 0x0) kernel console output (not intermixed with test programs): [ 46.850759][ T31] audit: type=1400 audit(46.750:56): avc: denied { read write } for pid=3114 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.851135][ T31] audit: type=1400 audit(46.750:57): avc: denied { open } for pid=3114 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13994' (ED25519) to the list of known hosts. [ 59.388649][ T31] audit: type=1400 audit(59.290:58): avc: denied { name_bind } for pid=3117 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.869076][ T31] audit: type=1400 audit(60.770:59): avc: denied { execute } for pid=3118 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.893284][ T31] audit: type=1400 audit(60.790:60): avc: denied { execute_no_trans } for pid=3118 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.244994][ T31] audit: type=1400 audit(64.150:61): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.250175][ T31] audit: type=1400 audit(64.150:62): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.267607][ T3118] cgroup: Unknown subsys name 'net' [ 64.277009][ T31] audit: type=1400 audit(64.180:63): avc: denied { unmount } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.459295][ T3118] cgroup: Unknown subsys name 'cpuset' [ 64.465021][ T3118] cgroup: Unknown subsys name 'hugetlb' [ 64.466268][ T3118] cgroup: Unknown subsys name 'rlimit' [ 64.686131][ T31] audit: type=1400 audit(64.590:64): avc: denied { setattr } for pid=3118 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.693388][ T31] audit: type=1400 audit(64.590:65): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 64.706790][ T31] audit: type=1400 audit(64.590:66): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 64.901106][ T3120] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 64.904706][ T31] audit: type=1400 audit(64.810:67): avc: denied { relabelto } for pid=3120 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.908203][ T31] audit: type=1400 audit(64.810:68): avc: denied { write } for pid=3120 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 64.943355][ T31] audit: type=1400 audit(64.840:69): avc: denied { read } for pid=3118 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.945621][ T31] audit: type=1400 audit(64.850:70): avc: denied { open } for pid=3118 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.204637][ T3118] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.174348][ T31] audit: type=1400 audit(75.080:71): avc: denied { execmem } for pid=3121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.242159][ T31] audit: type=1400 audit(75.140:72): avc: denied { read } for pid=3123 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.245595][ T31] audit: type=1400 audit(75.150:73): avc: denied { open } for pid=3123 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.256784][ T31] audit: type=1400 audit(75.160:74): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.285586][ T31] audit: type=1400 audit(75.190:75): avc: denied { module_request } for pid=3124 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.288082][ T31] audit: type=1400 audit(75.190:76): avc: denied { module_request } for pid=3123 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.356549][ T31] audit: type=1400 audit(75.260:77): avc: denied { sys_module } for pid=3124 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.861610][ T31] audit: type=1400 audit(75.760:78): avc: denied { ioctl } for pid=3124 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.874851][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.938308][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.946385][ T3123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.005249][ T3123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.898338][ T3124] hsr_slave_0: entered promiscuous mode [ 77.900841][ T3124] hsr_slave_1: entered promiscuous mode [ 77.998197][ T3123] hsr_slave_0: entered promiscuous mode [ 78.000854][ T3123] hsr_slave_1: entered promiscuous mode [ 78.007429][ T3123] debugfs: 'hsr0' already exists in 'hsr' [ 78.008852][ T3123] Cannot create hsr debugfs directory [ 78.431686][ T31] audit: type=1400 audit(78.330:79): avc: denied { create } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.444079][ T31] audit: type=1400 audit(78.340:80): avc: denied { write } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.447830][ T3124] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.463968][ T3124] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.473560][ T3124] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.497661][ T3124] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.600230][ T3123] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.615712][ T3123] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.627424][ T3123] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.640890][ T3123] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.299391][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.367606][ T3123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.672056][ T3123] veth0_vlan: entered promiscuous mode [ 81.691432][ T3123] veth1_vlan: entered promiscuous mode [ 81.759495][ T3123] veth0_macvtap: entered promiscuous mode [ 81.771250][ T3123] veth1_macvtap: entered promiscuous mode [ 81.807204][ T3124] veth0_vlan: entered promiscuous mode [ 81.831308][ T3124] veth1_vlan: entered promiscuous mode [ 81.866255][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.874377][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.874674][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.874867][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.943905][ T3124] veth0_macvtap: entered promiscuous mode [ 81.961504][ T3124] veth1_macvtap: entered promiscuous mode [ 82.001001][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 82.001336][ T31] audit: type=1400 audit(81.900:82): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.024861][ T31] audit: type=1400 audit(81.920:83): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.0Z1wgQ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.025161][ T31] audit: type=1400 audit(81.920:84): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.049223][ T31] audit: type=1400 audit(81.950:85): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.0Z1wgQ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.051783][ T31] audit: type=1400 audit(81.950:86): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.0Z1wgQ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.089899][ T1056] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.091489][ T1056] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.098647][ T1056] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.102284][ T31] audit: type=1400 audit(82.000:87): avc: denied { unmount } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.111827][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.117694][ T31] audit: type=1400 audit(82.020:88): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.120854][ T31] audit: type=1400 audit(82.020:89): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="gadgetfs" ino=3252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.141911][ T31] audit: type=1400 audit(82.040:90): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.151032][ T31] audit: type=1400 audit(82.050:91): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.261415][ T3123] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 97.012149][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 97.012866][ T31] audit: type=1400 audit(96.910:105): avc: denied { create } for pid=3839 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 97.023062][ T31] audit: type=1400 audit(96.920:106): avc: denied { setopt } for pid=3839 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 97.104506][ T31] audit: type=1400 audit(97.000:107): avc: denied { read } for pid=3841 comm="syz.0.11" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.104854][ T31] audit: type=1400 audit(97.000:108): avc: denied { open } for pid=3841 comm="syz.0.11" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.111855][ T31] audit: type=1400 audit(97.010:109): avc: denied { ioctl } for pid=3841 comm="syz.0.11" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 97.114761][ T31] audit: type=1400 audit(97.010:110): avc: denied { set_context_mgr } for pid=3841 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 97.140170][ T31] audit: type=1400 audit(97.040:111): avc: denied { map } for pid=3841 comm="syz.0.11" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 98.504749][ T31] audit: type=1400 audit(98.410:112): avc: denied { mount } for pid=3844 comm="syz.1.12" name="/" dev="ramfs" ino=3323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 98.570718][ T31] audit: type=1400 audit(98.470:113): avc: denied { create } for pid=3846 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.585268][ T31] audit: type=1400 audit(98.480:114): avc: denied { bind } for pid=3846 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.450357][ T3854] netlink: 20 bytes leftover after parsing attributes in process `syz.1.14'. [ 110.288183][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 110.288533][ T31] audit: type=1400 audit(110.190:121): avc: denied { append } for pid=3861 comm="syz.0.16" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 110.498169][ T31] audit: type=1400 audit(110.400:122): avc: denied { mounton } for pid=3867 comm="syz.0.17" path="/6/file0" dev="tmpfs" ino=48 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 112.448795][ T31] audit: type=1400 audit(112.350:123): avc: denied { ioctl } for pid=3878 comm="syz.1.21" path="socket:[2242]" dev="sockfs" ino=2242 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.681865][ T3884] fuse: Unknown parameter 'use00000000000000000000' [ 112.966250][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.014714][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.058380][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.125044][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.462362][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 113.475070][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 113.479210][ T12] bond0 (unregistering): Released all slaves [ 113.559165][ T12] hsr_slave_0: left promiscuous mode [ 113.562242][ T12] hsr_slave_1: left promiscuous mode [ 113.593376][ T12] veth1_macvtap: left promiscuous mode [ 113.593750][ T12] veth0_macvtap: left promiscuous mode [ 113.594012][ T12] veth1_vlan: left promiscuous mode [ 113.594265][ T12] veth0_vlan: left promiscuous mode [ 113.598808][ T31] audit: type=1400 audit(113.500:124): avc: denied { unmount } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 114.651900][ T3915] mmap: syz.0.26 (3915) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 116.987006][ T4042] fuse: Unknown parameter 'use00000000000000000000' [ 117.484982][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.609177][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.778537][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.918893][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.079621][ T3888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 118.092217][ T3888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 118.897472][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 118.906077][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 118.919670][ T12] bond0 (unregistering): Released all slaves [ 119.050548][ T12] hsr_slave_0: left promiscuous mode [ 119.093514][ T12] hsr_slave_1: left promiscuous mode [ 119.103519][ T12] veth1_macvtap: left promiscuous mode [ 119.104770][ T12] veth0_macvtap: left promiscuous mode [ 119.105819][ T12] veth1_vlan: left promiscuous mode [ 119.106818][ T12] veth0_vlan: left promiscuous mode [ 122.586187][ T3888] hsr_slave_0: entered promiscuous mode [ 122.587672][ T3888] hsr_slave_1: entered promiscuous mode [ 123.568352][ T3888] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 123.579686][ T3888] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 123.599484][ T3888] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 123.617505][ T3888] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 123.914341][ T4083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 123.919979][ T4083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 124.569676][ T3888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.411341][ T4083] hsr_slave_0: entered promiscuous mode [ 125.417327][ T4083] hsr_slave_1: entered promiscuous mode [ 125.418366][ T4083] debugfs: 'hsr0' already exists in 'hsr' [ 125.418435][ T4083] Cannot create hsr debugfs directory [ 126.130244][ T4083] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 126.143137][ T4083] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 126.149856][ T4083] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 126.161008][ T4083] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.355278][ T4083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.346055][ T3888] veth0_vlan: entered promiscuous mode [ 129.389758][ T3888] veth1_vlan: entered promiscuous mode [ 129.510826][ T3888] veth0_macvtap: entered promiscuous mode [ 129.532430][ T3888] veth1_macvtap: entered promiscuous mode [ 129.655086][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.656581][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.665292][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.665646][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.640124][ T4083] veth0_vlan: entered promiscuous mode [ 131.681697][ T4083] veth1_vlan: entered promiscuous mode [ 131.807461][ T4083] veth0_macvtap: entered promiscuous mode [ 131.831430][ T4083] veth1_macvtap: entered promiscuous mode [ 131.972216][ T3814] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.972918][ T3814] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.973235][ T3814] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 131.973468][ T3814] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.420494][ T4719] fuse: Unknown parameter 'use00000000000000000000' [ 133.928820][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 134.183053][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 134.287241][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 134.365820][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 134.851858][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 134.867255][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 134.881463][ T12] bond0 (unregistering): Released all slaves [ 135.016269][ T12] hsr_slave_0: left promiscuous mode [ 135.018712][ T12] hsr_slave_1: left promiscuous mode [ 135.033707][ T12] veth1_macvtap: left promiscuous mode [ 135.034034][ T12] veth0_macvtap: left promiscuous mode [ 135.034518][ T12] veth1_vlan: left promiscuous mode [ 135.034723][ T12] veth0_vlan: left promiscuous mode [ 137.783862][ T47] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 138.024188][ T47] usb 1-1: unable to get BOS descriptor or descriptor too short [ 138.027122][ T47] usb 1-1: not running at top speed; connect to a high speed hub [ 138.037657][ T47] usb 1-1: config 1 has an invalid interface number: 138 but max is 0 [ 138.037938][ T47] usb 1-1: config 1 has no interface number 0 [ 138.038449][ T47] usb 1-1: config 1 interface 138 has no altsetting 0 [ 138.117381][ T47] usb 1-1: New USB device found, idVendor=0cb8, idProduct=c90b, bcdDevice= d.ae [ 138.117671][ T47] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 138.117899][ T47] usb 1-1: Product: syz [ 138.117952][ T47] usb 1-1: Manufacturer: syz [ 138.117992][ T47] usb 1-1: SerialNumber: syz [ 138.458192][ T47] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 138.528871][ T47] usb 1-1: USB disconnect, device number 2 [ 138.718598][ T4916] fuse: Unknown parameter 'user_i00000000000000000000' [ 139.356297][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.431897][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.555648][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.902518][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.935473][ T4728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 139.976219][ T4728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 140.794546][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 140.854423][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 140.885401][ T12] bond0 (unregistering): Released all slaves [ 141.203820][ T12] hsr_slave_0: left promiscuous mode [ 141.206383][ T12] hsr_slave_1: left promiscuous mode [ 141.214009][ T12] veth1_macvtap: left promiscuous mode [ 141.215095][ T12] veth0_macvtap: left promiscuous mode [ 141.216251][ T12] veth1_vlan: left promiscuous mode [ 141.223344][ T12] veth0_vlan: left promiscuous mode [ 144.388687][ T4728] hsr_slave_0: entered promiscuous mode [ 144.414508][ T4728] hsr_slave_1: entered promiscuous mode [ 146.469795][ T4728] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 146.565513][ T4728] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 146.593978][ T4728] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 146.640912][ T4728] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 147.780927][ T4926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.892086][ T4926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 148.664237][ T4728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.306778][ T4926] hsr_slave_0: entered promiscuous mode [ 149.308783][ T4926] hsr_slave_1: entered promiscuous mode [ 149.311790][ T4926] debugfs: 'hsr0' already exists in 'hsr' [ 149.313845][ T4926] Cannot create hsr debugfs directory [ 150.121164][ T4926] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 150.139879][ T4926] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 150.156487][ T4926] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 150.169601][ T4926] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 151.196752][ T4926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.387413][ T4728] veth0_vlan: entered promiscuous mode [ 152.429720][ T4728] veth1_vlan: entered promiscuous mode [ 152.551143][ T4728] veth0_macvtap: entered promiscuous mode [ 152.579553][ T4728] veth1_macvtap: entered promiscuous mode [ 152.717045][ T1056] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.723795][ T1056] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.724858][ T1056] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.725756][ T1056] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.029138][ T31] audit: type=1400 audit(152.930:125): avc: denied { name_bind } for pid=5551 comm="syz.1.34" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 153.140846][ T5555] fuse: Bad value for 'fd' [ 153.924671][ T5573] fuse: Unknown parameter 'user_i00000000000000000000' [ 154.249875][ T1056] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 154.375582][ T1056] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 154.471168][ T1056] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 154.559767][ T1056] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 154.930370][ T1056] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 154.941510][ T1056] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 154.949900][ T1056] bond0 (unregistering): Released all slaves [ 155.034778][ T1056] hsr_slave_0: left promiscuous mode [ 155.044287][ T1056] hsr_slave_1: left promiscuous mode [ 155.055440][ T1056] veth1_macvtap: left promiscuous mode [ 155.055803][ T1056] veth0_macvtap: left promiscuous mode [ 155.064485][ T1056] veth1_vlan: left promiscuous mode [ 155.064949][ T1056] veth0_vlan: left promiscuous mode [ 156.315717][ T4926] veth0_vlan: entered promiscuous mode [ 156.388887][ T4926] veth1_vlan: entered promiscuous mode [ 156.520955][ T4926] veth0_macvtap: entered promiscuous mode [ 156.539349][ T4926] veth1_macvtap: entered promiscuous mode [ 156.700974][ T1056] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.703012][ T1056] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.721876][ T1056] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.731634][ T1056] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 157.225657][ T31] audit: type=1400 audit(157.130:126): avc: denied { create } for pid=5748 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 157.244463][ T31] audit: type=1400 audit(157.130:127): avc: denied { write } for pid=5748 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 157.565951][ T5583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 157.577706][ T5583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.624074][ T5583] hsr_slave_0: entered promiscuous mode [ 158.626620][ T5583] hsr_slave_1: entered promiscuous mode [ 159.271322][ T5583] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 159.282106][ T5583] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 159.290010][ T5583] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 159.300623][ T5583] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 160.089633][ T5583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.211105][ T5979] fuse: Unknown parameter 'user_i00000000000000000000' [ 160.606717][ T1056] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.690932][ T1056] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.759924][ T1056] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.886617][ T1056] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.227146][ T1056] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 161.236188][ T1056] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 161.244804][ T1056] bond0 (unregistering): Released all slaves [ 161.327689][ T1056] hsr_slave_0: left promiscuous mode [ 161.329744][ T1056] hsr_slave_1: left promiscuous mode [ 161.349635][ T1056] veth1_macvtap: left promiscuous mode [ 161.350052][ T1056] veth0_macvtap: left promiscuous mode [ 161.350279][ T1056] veth1_vlan: left promiscuous mode [ 161.350425][ T1056] veth0_vlan: left promiscuous mode [ 163.956892][ T5990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.975033][ T5990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.996597][ T5990] hsr_slave_0: entered promiscuous mode [ 164.998246][ T5990] hsr_slave_1: entered promiscuous mode [ 165.001082][ T5990] debugfs: 'hsr0' already exists in 'hsr' [ 165.001321][ T5990] Cannot create hsr debugfs directory [ 165.137811][ T5583] veth0_vlan: entered promiscuous mode [ 165.156849][ T5583] veth1_vlan: entered promiscuous mode [ 165.278181][ T5583] veth0_macvtap: entered promiscuous mode [ 165.326014][ T5583] veth1_macvtap: entered promiscuous mode [ 165.521301][ T1056] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.522028][ T1056] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.525880][ T1056] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.526535][ T1056] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.767924][ T5990] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 165.785520][ T5990] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 165.790348][ T5990] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 165.798413][ T5990] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 167.488289][ T5990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.340160][ T31] audit: type=1400 audit(174.240:128): avc: denied { watch watch_reads } for pid=6480 comm="syz.1.72" path="/23/file1" dev="tmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 175.929985][ T5990] veth0_vlan: entered promiscuous mode [ 175.969900][ T5990] veth1_vlan: entered promiscuous mode [ 176.079347][ T5990] veth0_macvtap: entered promiscuous mode [ 176.113995][ T5990] veth1_macvtap: entered promiscuous mode [ 176.410955][ T1056] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.412236][ T1056] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.433469][ T1056] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.434927][ T1056] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.240281][ T31] audit: type=1400 audit(177.140:129): avc: denied { create } for pid=6497 comm="syz.0.74" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 177.251889][ T31] audit: type=1400 audit(177.150:130): avc: denied { ioctl } for pid=6497 comm="syz.0.74" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7463 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 181.295046][ T31] audit: type=1400 audit(181.190:131): avc: denied { setopt } for pid=6524 comm="syz.0.86" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 181.423971][ T31] audit: type=1400 audit(181.300:132): avc: denied { write } for pid=6524 comm="syz.0.86" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 181.836836][ T31] audit: type=1400 audit(181.690:133): avc: denied { read } for pid=6522 comm="syz.1.85" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 189.810420][ T31] audit: type=1400 audit(189.710:134): avc: denied { write } for pid=6548 comm="syz.0.95" name="mcfilter6" dev="proc" ino=4026532731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 193.050421][ T6567] kernel read not supported for file /¡sxt (pid: 6567 comm: syz.0.102) [ 193.054762][ T31] audit: type=1800 audit(192.950:135): pid=6567 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.0.102" name=A17378741A dev="mqueue" ino=7558 res=0 errno=0 [ 194.005692][ T6585] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 194.245698][ T31] audit: type=1400 audit(194.150:136): avc: denied { view } for pid=6590 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 195.451296][ T31] audit: type=1400 audit(195.350:137): avc: denied { write } for pid=6611 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.597305][ T31] audit: type=1400 audit(195.500:138): avc: denied { read } for pid=6615 comm="syz.0.125" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6743 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 199.068004][ T31] audit: type=1400 audit(198.970:139): avc: denied { setopt } for pid=6638 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 199.073135][ T31] audit: type=1400 audit(198.970:140): avc: denied { getopt } for pid=6638 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.014299][ T31] audit: type=1400 audit(201.920:141): avc: denied { watch } for pid=6650 comm="syz.0.138" path="/proc/111/fdinfo" dev="proc" ino=6778 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 202.079447][ T31] audit: type=1326 audit(201.980:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.082168][ T31] audit: type=1326 audit(201.980:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.083107][ T31] audit: type=1326 audit(201.980:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.088778][ T31] audit: type=1326 audit(201.990:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.098302][ T31] audit: type=1326 audit(201.990:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.098624][ T31] audit: type=1326 audit(202.000:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.098807][ T31] audit: type=1326 audit(202.000:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.108759][ T31] audit: type=1326 audit(202.010:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=324 compat=0 ip=0x132510 code=0x7ffc0000 [ 202.109075][ T31] audit: type=1326 audit(202.010:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.784814][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 209.785429][ T31] audit: type=1326 audit(209.690:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.796396][ T31] audit: type=1326 audit(209.690:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.799764][ T31] audit: type=1326 audit(209.700:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.799840][ T31] audit: type=1326 audit(209.700:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.799868][ T31] audit: type=1326 audit(209.700:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.799892][ T31] audit: type=1326 audit(209.700:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.800587][ T31] audit: type=1326 audit(209.700:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.801109][ T31] audit: type=1326 audit(209.700:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132510 code=0x7ffc0000 [ 209.801551][ T31] audit: type=1326 audit(209.700:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6677 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132510 code=0x7ffc0000 [ 210.045978][ T31] audit: type=1400 audit(209.940:176): avc: denied { ioctl } for pid=6679 comm="syz.1.149" path="socket:[6841]" dev="sockfs" ino=6841 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 216.247388][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 216.247729][ T31] audit: type=1400 audit(216.150:196): avc: denied { create } for pid=6712 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 216.270557][ T31] audit: type=1400 audit(216.170:197): avc: denied { write } for pid=6712 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 222.122097][ T31] audit: type=1400 audit(222.020:198): avc: denied { setopt } for pid=6738 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 227.083741][ T31] audit: type=1326 audit(226.990:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.084809][ T31] audit: type=1326 audit(226.990:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.085794][ T31] audit: type=1326 audit(226.990:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.087072][ T31] audit: type=1326 audit(226.990:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=52 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.087939][ T31] audit: type=1326 audit(226.990:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.088987][ T31] audit: type=1326 audit(226.990:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.089976][ T31] audit: type=1326 audit(226.990:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.090864][ T31] audit: type=1326 audit(226.990:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.091544][ T31] audit: type=1326 audit(226.990:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6783 comm="syz.0.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.568896][ T31] audit: type=1326 audit(227.470:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.569232][ T31] audit: type=1326 audit(227.470:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.590998][ T31] audit: type=1326 audit(227.490:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.597193][ T31] audit: type=1326 audit(227.500:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.608394][ T31] audit: type=1326 audit(227.510:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.612081][ T31] audit: type=1326 audit(227.510:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.612306][ T31] audit: type=1326 audit(227.510:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.628169][ T31] audit: type=1326 audit(227.530:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.630736][ T31] audit: type=1326 audit(227.530:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132510 code=0x7ffc0000 [ 227.631040][ T31] audit: type=1326 audit(227.530:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6790 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132510 code=0x7ffc0000 [ 229.272900][ T6807] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=22 sclass=netlink_tcpdiag_socket pid=6807 comm=syz.0.199 [ 233.060642][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 233.062306][ T31] audit: type=1400 audit(232.960:220): avc: denied { setcurrent } for pid=6846 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 235.039790][ T31] audit: type=1400 audit(234.940:221): avc: denied { connect } for pid=6872 comm="syz.0.223" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 235.743398][ T6880] Zero length message leads to an empty skb [ 236.706627][ T31] audit: type=1400 audit(236.610:222): avc: denied { bind } for pid=6893 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 236.717588][ T31] audit: type=1400 audit(236.620:223): avc: denied { setopt } for pid=6893 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 238.112198][ T31] audit: type=1400 audit(238.010:224): avc: denied { block_suspend } for pid=6928 comm="syz.0.238" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 242.590493][ T6963] capability: warning: `syz.0.248' uses deprecated v2 capabilities in a way that may be insecure [ 243.087987][ T31] audit: type=1400 audit(242.990:225): avc: denied { unmount } for pid=5990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 247.960057][ T6997] sch_tbf: burst 19872 is lower than device lo mtu (12746767) ! [ 250.278054][ T31] audit: type=1400 audit(250.180:226): avc: denied { sqpoll } for pid=7007 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 250.827238][ T31] audit: type=1326 audit(250.730:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.853009][ T31] audit: type=1326 audit(250.740:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.857259][ T31] audit: type=1326 audit(250.760:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.858842][ T31] audit: type=1326 audit(250.760:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.859135][ T31] audit: type=1326 audit(250.760:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.862916][ T31] audit: type=1326 audit(250.760:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.864061][ T31] audit: type=1326 audit(250.770:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 250.873714][ T31] audit: type=1326 audit(250.780:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7010 comm="syz.0.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 276.794755][ T31] audit: type=1400 audit(276.700:235): avc: denied { watch } for pid=7081 comm="syz.0.293" path="/142" dev="tmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 276.838696][ T31] audit: type=1400 audit(276.740:236): avc: denied { unlink } for pid=5990 comm="syz-executor" name="file0" dev="tmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 286.018053][ T31] audit: type=1400 audit(285.920:237): avc: denied { execute } for pid=7114 comm="syz.0.306" name="file0" dev="tmpfs" ino=792 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 286.019054][ T7115] process 'syz.0.306' launched './file0' with NULL argv: empty string added [ 286.020799][ T31] audit: type=1400 audit(285.920:238): avc: denied { execute_no_trans } for pid=7114 comm="syz.0.306" path="/148/file0" dev="tmpfs" ino=792 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 287.275419][ T31] audit: type=1400 audit(287.170:239): avc: denied { create } for pid=7133 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 287.318935][ T31] audit: type=1400 audit(287.220:240): avc: denied { setopt } for pid=7133 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 288.503615][ T31] audit: type=1400 audit(288.400:241): avc: denied { bind } for pid=7133 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 295.023643][ T31] audit: type=1400 audit(294.920:242): avc: denied { mounton } for pid=7187 comm="syz.0.334" path="/proc/371/task" dev="proc" ino=9453 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 295.266604][ T31] audit: type=1326 audit(295.170:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.0.335" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 295.269051][ T31] audit: type=1326 audit(295.170:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.0.335" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x0 [ 295.723168][ T31] audit: type=1400 audit(295.620:245): avc: denied { ioctl } for pid=7196 comm="syz.1.337" path="socket:[9473]" dev="sockfs" ino=9473 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 303.248805][ T31] audit: type=1400 audit(303.150:246): avc: denied { lock } for pid=7239 comm="syz.1.345" path="socket:[8660]" dev="sockfs" ino=8660 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 322.341908][ T7276] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.352003][ T7276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.271875][ T7276] hsr_slave_0: entered promiscuous mode [ 323.306912][ T7276] hsr_slave_1: entered promiscuous mode [ 323.314802][ T7276] debugfs: 'hsr0' already exists in 'hsr' [ 323.316348][ T7276] Cannot create hsr debugfs directory [ 323.865608][ T7276] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 323.872204][ T7276] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 323.884489][ T7276] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 323.891097][ T7276] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 324.559276][ T7276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.021558][ T7276] veth0_vlan: entered promiscuous mode [ 328.045834][ T7276] veth1_vlan: entered promiscuous mode [ 328.117503][ T7276] veth0_macvtap: entered promiscuous mode [ 328.138067][ T7276] veth1_macvtap: entered promiscuous mode [ 328.210491][ T3814] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.210870][ T3814] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.219969][ T3814] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.220692][ T3814] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.380311][ T7705] af_packet: tpacket_rcv: packet too big, clamped from 112 to 4294967272. macoff=96 [ 359.932832][ C1] hrtimer: interrupt took 10000128 ns [ 370.154811][ T31] audit: type=1400 audit(370.060:247): avc: denied { create } for pid=7783 comm="syz.2.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 371.737603][ T31] audit: type=1400 audit(371.640:248): avc: denied { watch_reads } for pid=7793 comm="syz.0.418" path="/proc/437" dev="proc" ino=10135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 372.152917][ T31] audit: type=1400 audit(372.050:249): avc: denied { append } for pid=7796 comm="syz.0.419" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 372.164089][ T31] audit: type=1400 audit(372.060:250): avc: denied { map } for pid=7796 comm="syz.0.419" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.817169][ T7802] dvmrp1: tun_chr_ioctl cmd 2147767511 [ 375.435709][ T3814] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.513840][ T3814] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.602857][ T3814] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.690718][ T3814] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 376.128119][ T3814] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 376.234759][ T3814] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 376.257323][ T3814] bond0 (unregistering): Released all slaves [ 376.384482][ T3814] hsr_slave_0: left promiscuous mode [ 376.403056][ T3814] hsr_slave_1: left promiscuous mode [ 376.414162][ T3814] veth1_macvtap: left promiscuous mode [ 376.414495][ T3814] veth0_macvtap: left promiscuous mode [ 376.415008][ T3814] veth1_vlan: left promiscuous mode [ 376.415090][ T3814] veth0_vlan: left promiscuous mode [ 379.331678][ T31] audit: type=1326 audit(379.230:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.332110][ T31] audit: type=1326 audit(379.230:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.332350][ T31] audit: type=1326 audit(379.230:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.344670][ T31] audit: type=1326 audit(379.240:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.346616][ T31] audit: type=1326 audit(379.240:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.348519][ T31] audit: type=1326 audit(379.240:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.350232][ T31] audit: type=1326 audit(379.240:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.354455][ T31] audit: type=1326 audit(379.240:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.361345][ T31] audit: type=1326 audit(379.240:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 379.373343][ T31] audit: type=1326 audit(379.240:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7928 comm="syz.2.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 381.137977][ T7824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 381.165214][ T7824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 384.160190][ T7824] hsr_slave_0: entered promiscuous mode [ 384.163584][ T7824] hsr_slave_1: entered promiscuous mode [ 384.164367][ T7824] debugfs: 'hsr0' already exists in 'hsr' [ 384.164506][ T7824] Cannot create hsr debugfs directory [ 388.910669][ T7824] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 388.923946][ T7824] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 388.945758][ T7824] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 388.954787][ T7824] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 390.946772][ T7824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.441382][ T7824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 396.528672][ T8285] tap0: tun_chr_ioctl cmd 1074025684 [ 400.628928][ T7824] veth0_vlan: entered promiscuous mode [ 400.689803][ T7824] veth1_vlan: entered promiscuous mode [ 400.861791][ T7824] veth0_macvtap: entered promiscuous mode [ 400.905528][ T7824] veth1_macvtap: entered promiscuous mode [ 401.037890][ T1056] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.038553][ T1056] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.038703][ T1056] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.038847][ T1056] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.679670][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 419.693755][ T31] audit: type=1400 audit(419.580:311): avc: denied { wake_alarm } for pid=8389 comm="syz.0.474" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 419.735954][ T31] audit: type=1400 audit(419.630:312): avc: denied { open } for pid=8389 comm="syz.0.474" path="/5/file0/file0" dev="fuse" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 419.754638][ T8390] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 419.757624][ T8390] block device autoloading is deprecated and will be removed. [ 419.806425][ T31] audit: type=1400 audit(419.710:313): avc: denied { ioctl } for pid=8389 comm="syz.0.474" path="/5/file0/file0" dev="fuse" ino=2 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 424.794400][ T8409] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 424.823330][ T8409] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 427.589065][ T31] audit: type=1400 audit(427.490:314): avc: denied { read } for pid=8414 comm="syz.2.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 435.990492][ T31] audit: type=1400 audit(435.890:315): avc: denied { map } for pid=8422 comm="syz.2.482" path="socket:[10947]" dev="sockfs" ino=10947 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 441.410528][ T31] audit: type=1400 audit(441.310:316): avc: denied { create } for pid=8444 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 441.435329][ T31] audit: type=1400 audit(441.340:317): avc: denied { write } for pid=8444 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 448.540118][ T8449] netlink: 64 bytes leftover after parsing attributes in process `syz.0.491'. [ 449.887163][ T8455] netlink: 'syz.0.494': attribute type 1 has an invalid length. [ 451.083842][ T31] audit: type=1400 audit(450.960:318): avc: denied { create } for pid=8459 comm="syz.0.496" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 451.140679][ T31] audit: type=1400 audit(451.040:319): avc: denied { unlink } for pid=7824 comm="syz-executor" name="file0" dev="tmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 455.447257][ T6477] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 455.463311][ T6477] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 458.868028][ T8509] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 464.543566][ T31] audit: type=1400 audit(464.440:320): avc: denied { create } for pid=8550 comm="syz.0.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 464.626187][ T31] audit: type=1400 audit(464.520:321): avc: denied { getopt } for pid=8550 comm="syz.0.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 466.643823][ T8576] input: syz0 as /devices/virtual/input/input3 [ 469.238077][ T31] audit: type=1400 audit(469.140:322): avc: denied { connect } for pid=8534 comm="syz.2.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 469.319858][ T31] audit: type=1400 audit(469.220:323): avc: denied { ioctl } for pid=8534 comm="syz.2.514" path="socket:[11085]" dev="sockfs" ino=11085 ioctlcmd=0x6611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 469.345934][ T31] audit: type=1400 audit(469.240:324): avc: denied { bind } for pid=8534 comm="syz.2.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 469.514585][ T31] audit: type=1400 audit(469.410:325): avc: denied { write } for pid=8534 comm="syz.2.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 491.705536][ T31] audit: type=1400 audit(491.610:326): avc: denied { create } for pid=8725 comm="syz.0.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 491.718122][ T31] audit: type=1400 audit(491.620:327): avc: denied { setopt } for pid=8725 comm="syz.0.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 492.897510][ T31] audit: type=1400 audit(492.790:328): avc: denied { write } for pid=8732 comm="syz.2.536" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 495.909282][ T8748] ======================================================= [ 495.909282][ T8748] WARNING: The mand mount option has been deprecated and [ 495.909282][ T8748] and is ignored by this kernel. Remove the mand [ 495.909282][ T8748] option from the mount to silence this warning. [ 495.909282][ T8748] ======================================================= [ 495.928045][ T31] audit: type=1400 audit(495.830:329): avc: denied { mount } for pid=8747 comm="syz.0.539" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 495.936209][ T31] audit: type=1400 audit(495.840:330): avc: denied { mounton } for pid=8747 comm="syz.0.539" path="/34/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 496.047459][ T31] audit: type=1400 audit(495.950:331): avc: denied { mount } for pid=8747 comm="syz.0.539" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 496.070439][ T31] audit: type=1400 audit(495.970:332): avc: denied { unmount } for pid=7824 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 496.085796][ T31] audit: type=1400 audit(495.990:333): avc: denied { unmount } for pid=7824 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 496.174103][ T31] audit: type=1400 audit(496.080:334): avc: denied { bind } for pid=8750 comm="syz.0.540" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 496.178436][ T31] audit: type=1400 audit(496.080:335): avc: denied { node_bind } for pid=8750 comm="syz.0.540" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 499.569390][ T8772] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 511.667813][ T8808] syzkaller0: entered promiscuous mode [ 511.668534][ T8808] syzkaller0: entered allmulticast mode [ 512.711474][ T8816] syz_tun: entered allmulticast mode [ 512.769615][ T8815] syz_tun: left allmulticast mode [ 536.014296][ T31] audit: type=1400 audit(535.920:336): avc: denied { create } for pid=8886 comm="syz.2.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 536.019694][ T31] audit: type=1400 audit(535.920:337): avc: denied { write } for pid=8886 comm="syz.2.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 536.027300][ T31] audit: type=1400 audit(535.920:338): avc: denied { nlmsg_write } for pid=8886 comm="syz.2.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 537.548036][ T8896] syz_tun: entered allmulticast mode [ 537.571643][ T8895] syz_tun: left allmulticast mode [ 544.594237][ T31] audit: type=1400 audit(544.500:339): avc: denied { create } for pid=8934 comm="syz.2.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 558.469366][ T8965] 8<--- cut here --- [ 558.470934][ T8965] Unable to handle kernel paging request at virtual address fee04f27 when write [ 558.472640][ T8965] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 558.474186][ T8965] Internal error: Oops: a06 [#1] SMP ARM [ 558.485712][ T8965] Modules linked in: [ 558.488775][ T8965] CPU: 0 UID: 0 PID: 8965 Comm: syz.2.600 Not tainted syzkaller #0 PREEMPT [ 558.492687][ T8965] Hardware name: ARM-Versatile Express [ 558.496331][ T8965] PC is at parport_attach+0x174/0x1d0 [ 558.497343][ T8965] LR is at parport_attach+0x164/0x1d0 [ 558.498451][ T8965] pc : [<813acac8>] lr : [<813acab8>] psr: 60000013 [ 558.502636][ T8965] sp : dfa6dd30 ip : dfa6dd30 fp : dfa6dd54 [ 558.507002][ T8965] r10: 82b16f40 r9 : 00000003 r8 : 84206540 [ 558.508027][ T8965] r7 : dfa6dd90 r6 : 84206540 r5 : 00000000 r4 : 00000000 [ 558.508414][ T8965] r3 : fee04f27 r2 : 81e15684 r1 : 00000001 r0 : 813ac738 [ 558.508880][ T8965] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 558.517526][ T8965] Control: 30c5387d Table: 8542f500 DAC: fffffffd [ 558.522719][ T8965] Register r0 information: non-slab/vmalloc memory [ 558.523657][ T8965] Register r1 information: non-paged memory [ 558.524047][ T8965] Register r2 information: non-slab/vmalloc memory [ 558.524698][ T8965] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 558.525360][ T8965] Register r4 information: NULL pointer [ 558.525670][ T8965] Register r5 information: NULL pointer [ 558.526043][ T8965] Register r6 information: slab kmalloc-192 start 84206540 pointer offset 0 size 192 [ 558.527089][ T8965] Register r7 information: 2-page vmalloc region starting at 0xdfa6c000 allocated at kernel_clone+0xac/0x3ec [ 558.531365][ T8965] Register r8 information: slab kmalloc-192 start 84206540 pointer offset 0 size 192 [ 558.533222][ T8965] Register r9 information: non-paged memory [ 558.533577][ T8965] Register r10 information: non-slab/vmalloc memory [ 558.533929][ T8965] Register r11 information: 2-page vmalloc region starting at 0xdfa6c000 allocated at kernel_clone+0xac/0x3ec [ 558.534622][ T8965] Register r12 information: 2-page vmalloc region starting at 0xdfa6c000 allocated at kernel_clone+0xac/0x3ec [ 558.535666][ T8965] Process syz.2.600 (pid: 8965, stack limit = 0xdfa6c000) [ 558.536166][ T8965] Stack: (0xdfa6dd30 to 0xdfa6e000) [ 558.536613][ T8965] dd20: 823ff16c 84206540 829cf9ac 829cf9ac [ 558.537072][ T8965] dd40: 81e15b44 84206584 dfa6dd8c dfa6dd58 813a8b64 813ac960 200000c0 00000000 [ 558.537433][ T8965] dd60: dfa6dd7c 200000c0 84206540 b5403587 200000c0 8575c800 40946400 00000003 [ 558.537837][ T8965] dd80: dfa6de4c dfa6dd90 813a46b0 813a8a68 656d6f63 705f6964 6f707261 00007472 [ 558.538272][ T8965] dda0: 00000000 00004f27 00000005 00010000 00000004 00000005 000003b7 00000005 [ 558.538693][ T8965] ddc0: 00000005 0000000a 00000100 00000002 00000004 00000001 00000001 00000006 [ 558.539265][ T8965] dde0: 00000101 00000000 0001a44b 00000003 40000003 00000089 0000caa7 00000000 [ 558.539644][ T8965] de00: 20001e58 0000000b 00000e69 0000003c 00000008 00000006 00000000 fffffff8 [ 558.540081][ T8965] de20: 00000000 d6d7963e 00000000 859a5600 84206540 200000c0 200000c0 8575c800 [ 558.540778][ T8965] de40: dfa6df14 dfa6de50 813a567c 813a45bc 00000000 00000000 00000000 d6d7963e [ 558.541418][ T8965] de60: 00000000 00000000 8247154c 0000005f 83de5058 84206570 84231714 8575c800 [ 558.541930][ T8965] de80: dfa6dee4 dfa6de90 80797ecc 8078e230 00000064 00000001 00000000 dfa6deac [ 558.542618][ T8965] dea0: 85636550 834e7c38 00006400 0000000b dfa6dea0 00000000 00000000 d6d7963e [ 558.543440][ T8965] dec0: 859a5600 40946400 200000c0 200000c0 859a5600 00000003 dfa6def4 dfa6dee8 [ 558.544355][ T8965] dee0: 80797fec d6d7963e dfa6df14 40946400 00000000 859a5601 200000c0 859a5600 [ 558.545985][ T8965] df00: 00000003 8575c800 dfa6dfa4 dfa6df18 8056d0cc 813a50ac ecac8b10 8575c800 [ 558.553239][ T8965] df20: dfa6df3c dfa6df30 81a3b4b8 81a3b388 dfa6df54 dfa6df40 8025e490 8028ef6c [ 558.553831][ T8965] df40: dfa6dfb0 40000000 dfa6df84 dfa6df58 802229ec 8025e44c 00000000 8281cddc [ 558.554491][ T8965] df60: dfa6dfb0 0014ca70 ecac8b10 80222940 00000000 d6d7963e dfa6dfac 00000000 [ 558.554853][ T8965] df80: 00000000 00316308 00000036 8020029c 8575c800 00000036 00000000 dfa6dfa8 [ 558.555274][ T8965] dfa0: 80200060 8056cfa8 00000000 00000000 00000003 40946400 200000c0 00000000 [ 558.555607][ T8965] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f1f0bc [ 558.556075][ T8965] dfe0: 76f1eec0 76f1eeb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 558.556518][ T8965] Call trace: [ 558.556992][ T8965] [<813ac954>] (parport_attach) from [<813a8b64>] (comedi_device_attach+0x108/0x250) [ 558.557682][ T8965] r6:84206584 r5:81e15b44 r4:829cf9ac [ 558.558003][ T8965] [<813a8a5c>] (comedi_device_attach) from [<813a46b0>] (do_devconfig_ioctl+0x100/0x220) [ 558.558478][ T8965] r10:00000003 r9:40946400 r8:8575c800 r7:200000c0 r6:b5403587 r5:84206540 [ 558.558816][ T8965] r4:200000c0 [ 558.558985][ T8965] [<813a45b0>] (do_devconfig_ioctl) from [<813a567c>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 558.559395][ T8965] r8:8575c800 r7:200000c0 r6:200000c0 r5:84206540 r4:859a5600 [ 558.559798][ T8965] [<813a50a0>] (comedi_unlocked_ioctl) from [<8056d0cc>] (sys_ioctl+0x130/0xba0) [ 558.560326][ T8965] r10:8575c800 r9:00000003 r8:859a5600 r7:200000c0 r6:859a5601 r5:00000000 [ 558.560795][ T8965] r4:40946400 [ 558.560974][ T8965] [<8056cf9c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 558.561410][ T8965] Exception stack(0xdfa6dfa8 to 0xdfa6dff0) [ 558.561672][ T8965] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 558.562115][ T8965] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f1f0bc [ 558.562697][ T8965] dfe0: 76f1eec0 76f1eeb0 000195a4 00132510 [ 558.563355][ T8965] r10:00000036 r9:8575c800 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 558.572561][ T8965] r4:00000000 [ 558.573265][ T8965] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 558.574028][ T8965] ---[ end trace 0000000000000000 ]--- [ 558.574821][ T8965] Kernel panic - not syncing: Fatal exception [ 558.577036][ T8965] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:14:52 Registers: info registers vcpu 0 CPU#0 R00=8575c800 R01=00000000 R02=00000000 R03=8575c800 R04=00000000 R05=00000000 R06=00000a06 R07=60000193 R08=82a7745c R09=8281cdd8 R10=8575c800 R11=dfa6dc04 R12=dfa6dbd0 R13=dfa6dbd0 R14=802860f8 R15=80286110 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=00000000 R04=dfa29edc R05=855b3000 R06=dfa29edc R07=00000001 R08=dfa29ef4 R09=855b3000 R10=00000072 R11=dfa29eac R12=dfa29e48 R13=dfa29e88 R14=802914ec R15=8025c310 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000