last executing test programs: 3m29.929207147s ago: executing program 1 (id=631): socket$key(0xf, 0x3, 0x2) sendmsg$inet(0xffffffffffffffff, 0x0, 0x41) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@remote, @in=@private=0xa010101, 0x4e24, 0x0, 0x4e22, 0x0, 0x2}, {0xffffffffffffffff, 0x4, 0x0, 0xffff, 0x0, 0x0, 0x4000}}, {{@in=@local, 0x0, 0x6c}, 0x0, @in=@remote, 0x200000, 0x2, 0x0, 0x0, 0x4, 0x2005}}, 0xe8) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@local, @random="f368656e065b", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}}}}}, 0x0) 3m29.452768801s ago: executing program 1 (id=632): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3m29.001827252s ago: executing program 1 (id=634): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffd}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x190da) 3m28.41175005s ago: executing program 1 (id=636): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/../file0\x00') 3m28.088447447s ago: executing program 1 (id=637): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r1, {0xffff, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x60000000}, 0x0) 3m27.18724572s ago: executing program 1 (id=639): r0 = socket(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x5, @loopback, 0x807, 0x20000003}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=']', 0x1}, {0x0}], 0x2}, 0x0) 3m27.18704505s ago: executing program 32 (id=639): r0 = socket(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x5, @loopback, 0x807, 0x20000003}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=']', 0x1}, {0x0}], 0x2}, 0x0) 38.168642078s ago: executing program 0 (id=1012): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004"], 0x50) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x104, 0x4, 0x3c8, 0x110, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@empty, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac}, {@empty, {[0x0, 0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'dvmrp0\x00', 'netdevsim0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x41}, @rand_addr=0x64010101, 0x8, 0x1}}}, {{@arp={@loopback, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'veth0\x00', {}, {}, 0x0, 0x20}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x80ca, 0x8}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 37.612944352s ago: executing program 0 (id=1014): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) io_cancel(0x0, 0x0, 0x0) 37.10906003s ago: executing program 0 (id=1016): r0 = syz_io_uring_setup(0xbe3, &(0x7f0000000440)={0x0, 0x5001, 0x400, 0xa, 0xffffff}, &(0x7f00000005c0), &(0x7f0000000740)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x2000000, 0x0) 36.211555263s ago: executing program 0 (id=1019): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) write$selinux_validatetrans(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB='system_h:object_r:semanage_t system_u:object_r:fixed_disk_device_t:s0 00000000000w'], 0x79) 35.28241918s ago: executing program 0 (id=1021): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x51}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x80fff, @empty, 0xfffffffc}, {0xa, 0x4e1d, 0x3bb, @mcast2, 0x7}, r1, 0x10000007}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f00000025c0)}}, 0x10) 32.49877824s ago: executing program 0 (id=1028): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000040)=ANY=[], 0x0) close_range(r1, 0xffffffffffffffff, 0x200000000000000) 2.401722804s ago: executing program 2 (id=1073): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=@getchain={0x24, 0x11, 0x1, 0x0, 0x1fffffd, {0x0, 0x0, 0x0, r2, {0x7}, {0xd}, {0x1, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048054) 1.892055633s ago: executing program 2 (id=1074): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000180)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) 1.316239928s ago: executing program 2 (id=1075): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xb0}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1.032247031s ago: executing program 2 (id=1076): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r0, r0, 0x0, 0xb) 544.222277ms ago: executing program 2 (id=1077): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x397, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0xffffffff, @loopback, 0xbf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}, 0x7ffffffe}], 0x1, 0x40002000, 0x0) 0s ago: executing program 2 (id=1078): openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x1b9}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r0, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x12345}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r0, 0x47f6, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): denied { create } for pid=3937 comm="syz.1.56" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 115.056574][ T29] audit: type=1400 audit(114.980:156): avc: denied { write } for pid=3937 comm="syz.1.56" name="file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 115.068096][ T29] audit: type=1400 audit(114.990:157): avc: denied { open } for pid=3937 comm="syz.1.56" path="/40/file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 115.129460][ T29] audit: type=1400 audit(115.050:158): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 115.681883][ T29] audit: type=1400 audit(115.600:159): avc: denied { create } for pid=3941 comm="syz.1.58" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 115.697171][ T29] audit: type=1400 audit(115.620:160): avc: denied { map } for pid=3941 comm="syz.1.58" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2410 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 115.707151][ T29] audit: type=1400 audit(115.620:161): avc: denied { read write } for pid=3941 comm="syz.1.58" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2410 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 116.989402][ T29] audit: type=1400 audit(116.910:162): avc: denied { create } for pid=3948 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 117.004487][ T29] audit: type=1400 audit(116.920:163): avc: denied { write } for pid=3948 comm="syz.1.61" name="kcm" dev="proc" ino=4026532733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 117.349043][ T29] audit: type=1326 audit(117.270:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3950 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 120.497020][ T3970] SELinux: Context system_u:object is not valid (left unmapped). [ 120.499888][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 120.500194][ T29] audit: type=1400 audit(120.420:190): avc: denied { relabelto } for pid=3968 comm="syz.1.70" name="cgroup.procs" dev="cgroup" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 120.500460][ T29] audit: type=1400 audit(120.420:191): avc: denied { associate } for pid=3968 comm="syz.1.70" name="cgroup.procs" dev="cgroup" ino=82 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object" [ 121.169527][ T29] audit: type=1326 audit(121.090:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.169878][ T29] audit: type=1326 audit(121.090:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.179552][ T29] audit: type=1326 audit(121.090:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.226235][ T29] audit: type=1326 audit(121.150:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.229962][ T29] audit: type=1326 audit(121.150:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.258918][ T29] audit: type=1326 audit(121.180:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.319487][ T29] audit: type=1326 audit(121.240:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.338356][ T29] audit: type=1326 audit(121.240:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 121.948538][ T3977] ALSA: seq fatal error: cannot create timer (-19) [ 123.094130][ C1] hrtimer: interrupt took 76491392 ns [ 123.282252][ T3994] netlink: 16 bytes leftover after parsing attributes in process `syz.1.78'. [ 124.568754][ T4008] netlink: 28 bytes leftover after parsing attributes in process `syz.0.82'. [ 127.455155][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 127.457145][ T29] audit: type=1326 audit(127.370:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.460329][ T29] audit: type=1326 audit(127.370:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.477163][ T29] audit: type=1326 audit(127.390:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.481719][ T29] audit: type=1326 audit(127.400:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.492756][ T29] audit: type=1326 audit(127.410:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.497535][ T29] audit: type=1326 audit(127.420:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.507227][ T29] audit: type=1326 audit(127.420:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.1.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 127.934397][ T29] audit: type=1400 audit(127.830:217): avc: denied { create } for pid=4036 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 127.960019][ T29] audit: type=1400 audit(127.880:218): avc: denied { bind } for pid=4036 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 127.963724][ T29] audit: type=1400 audit(127.880:219): avc: denied { listen } for pid=4036 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 130.661925][ T4066] Zero length message leads to an empty skb [ 133.705834][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 133.706260][ T29] audit: type=1326 audit(133.630:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.710923][ T29] audit: type=1326 audit(133.630:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.749842][ T29] audit: type=1326 audit(133.670:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.773736][ T29] audit: type=1326 audit(133.690:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.836684][ T29] audit: type=1326 audit(133.760:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.845609][ T29] audit: type=1326 audit(133.770:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=23 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.847969][ T29] audit: type=1326 audit(133.770:238): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 133.885104][ T29] audit: type=1326 audit(133.810:239): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.0.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 134.217507][ T29] audit: type=1326 audit(134.140:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4103 comm="syz.0.112" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 134.229307][ T29] audit: type=1326 audit(134.150:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4103 comm="syz.0.112" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132970 code=0x7ffc0000 [ 136.447718][ T4132] netlink: 'syz.1.120': attribute type 1 has an invalid length. [ 136.542767][ T4132] 8021q: adding VLAN 0 to HW filter on device bond1 [ 136.549854][ T4132] bond1: entered allmulticast mode [ 140.398909][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 140.401507][ T29] audit: type=1326 audit(140.290:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.403568][ T29] audit: type=1326 audit(140.320:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.408198][ T29] audit: type=1326 audit(140.320:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.411938][ T29] audit: type=1326 audit(140.320:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.412516][ T29] audit: type=1326 audit(140.330:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.412777][ T29] audit: type=1326 audit(140.330:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.413135][ T29] audit: type=1326 audit(140.330:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.429062][ T29] audit: type=1326 audit(140.350:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.431617][ T29] audit: type=1326 audit(140.350:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 140.433680][ T29] audit: type=1326 audit(140.350:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 141.147781][ T4248] netlink: 12 bytes leftover after parsing attributes in process `syz.1.135'. [ 141.902723][ T4256] netlink: 40 bytes leftover after parsing attributes in process `syz.1.137'. [ 144.077467][ T4276] netlink: 'syz.1.144': attribute type 83 has an invalid length. [ 144.932385][ T4308] syz.1.146 uses obsolete (PF_INET,SOCK_PACKET) [ 151.479545][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 151.479917][ T29] audit: type=1400 audit(151.400:283): avc: denied { watch_reads } for pid=4372 comm="syz.0.163" path="/50" dev="tmpfs" ino=266 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 152.996711][ T29] audit: type=1400 audit(152.910:284): avc: denied { create } for pid=4382 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 153.000663][ T29] audit: type=1400 audit(152.920:285): avc: denied { setopt } for pid=4382 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 157.459068][ T29] audit: type=1326 audit(157.380:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.538150][ T29] audit: type=1326 audit(157.460:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.544687][ T29] audit: type=1326 audit(157.460:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 157.546863][ T29] audit: type=1326 audit(157.460:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 157.558042][ T29] audit: type=1326 audit(157.480:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.561242][ T29] audit: type=1326 audit(157.480:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.592520][ T29] audit: type=1326 audit(157.510:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.595743][ T29] audit: type=1326 audit(157.510:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.641296][ T29] audit: type=1326 audit(157.540:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.645531][ T29] audit: type=1326 audit(157.560:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4400 comm="syz.0.170" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 160.065812][ T4421] netlink: 'syz.1.175': attribute type 1 has an invalid length. [ 161.009610][ T4436] dummy0: entered promiscuous mode [ 161.033573][ T4436] dummy0: left promiscuous mode [ 162.929316][ T4450] 8021q: adding VLAN 0 to HW filter on device bond2 [ 162.978367][ T4450] bond2 (unregistering): Released all slaves [ 163.290874][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 163.293347][ T29] audit: type=1400 audit(163.210:316): avc: denied { sqpoll } for pid=4516 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 163.996307][ T29] audit: type=1400 audit(163.900:317): avc: denied { mount } for pid=4521 comm="syz.1.190" name="/" dev="ramfs" ino=4030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 165.934440][ T29] audit: type=1326 audit(165.850:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.934823][ T29] audit: type=1326 audit(165.850:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.940976][ T29] audit: type=1326 audit(165.850:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.942909][ T29] audit: type=1326 audit(165.850:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.946653][ T29] audit: type=1326 audit(165.860:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.951477][ T29] audit: type=1326 audit(165.860:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.956617][ T29] audit: type=1326 audit(165.860:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=0 ip=0x132970 code=0x7ffc0000 [ 165.959108][ T29] audit: type=1326 audit(165.860:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4528 comm="syz.0.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 169.437272][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 169.437762][ T29] audit: type=1400 audit(169.350:331): avc: denied { write } for pid=4562 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 171.421617][ T29] audit: type=1326 audit(171.340:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4584 comm="syz.1.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 171.423397][ T29] audit: type=1326 audit(171.340:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4584 comm="syz.1.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 171.425796][ T29] audit: type=1326 audit(171.350:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4584 comm="syz.1.212" exe="/syz-executor" sig=0 arch=40000028 syscall=29 compat=0 ip=0x132970 code=0x7ffc0000 [ 175.706843][ T29] audit: type=1400 audit(175.620:335): avc: denied { ioctl } for pid=4595 comm="syz.1.214" path="socket:[4147]" dev="sockfs" ino=4147 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 176.653379][ T4601] netlink: 4 bytes leftover after parsing attributes in process `syz.1.216'. [ 180.967152][ T4634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.226'. [ 182.346609][ T4640] netlink: 3 bytes leftover after parsing attributes in process `syz.1.228'. [ 182.347733][ T4640] 0ªX¹¦À: renamed from veth0 (while UP) [ 182.356746][ T4640] 0ªX¹¦À: entered allmulticast mode [ 182.365389][ T4640] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 184.617426][ T4654] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 184.623354][ T4654] SELinux: failed to load policy [ 186.388264][ T29] audit: type=1326 audit(186.310:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.388918][ T29] audit: type=1326 audit(186.310:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.396084][ T29] audit: type=1326 audit(186.310:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.410613][ T29] audit: type=1326 audit(186.330:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.411159][ T29] audit: type=1326 audit(186.330:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.411715][ T29] audit: type=1326 audit(186.330:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.411794][ T29] audit: type=1326 audit(186.330:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.439988][ T29] audit: type=1326 audit(186.350:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.447256][ T29] audit: type=1326 audit(186.360:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 186.448596][ T29] audit: type=1326 audit(186.370:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4669 comm="syz.1.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 194.403512][ T4692] netlink: 20 bytes leftover after parsing attributes in process `syz.1.246'. [ 195.363351][ T4697] SELinux: Context Ü is not valid (left unmapped). [ 195.939215][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 195.939736][ T29] audit: type=1326 audit(195.860:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.965704][ T29] audit: type=1326 audit(195.870:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.974757][ T29] audit: type=1326 audit(195.890:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.975126][ T29] audit: type=1326 audit(195.890:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.983834][ T29] audit: type=1326 audit(195.900:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.004975][ T29] audit: type=1326 audit(195.920:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.012865][ T29] audit: type=1326 audit(195.930:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.019423][ T29] audit: type=1326 audit(195.940:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.037358][ T29] audit: type=1326 audit(195.960:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.040767][ T29] audit: type=1326 audit(195.960:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4702 comm="syz.1.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 196.559119][ T4707] netlink: 20 bytes leftover after parsing attributes in process `syz.1.251'. [ 198.587614][ T4724] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.256' sets config #1 [ 198.901091][ T4726] sch_tbf: burst 2976 is lower than device lo mtu (65550) ! [ 199.151252][ T4729] IPv6: Can't replace route, no match found [ 201.818625][ T53] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.846514][ T53] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.854575][ T53] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.858300][ T53] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.109248][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 202.109716][ T29] audit: type=1326 audit(202.030:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4743 comm="syz.1.263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 202.129126][ T29] audit: type=1326 audit(202.040:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4743 comm="syz.1.263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 202.129610][ T29] audit: type=1326 audit(202.050:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4743 comm="syz.1.263" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132970 code=0x7ffc0000 [ 202.162219][ T29] audit: type=1326 audit(202.070:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4743 comm="syz.1.263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 202.162706][ T29] audit: type=1326 audit(202.080:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4743 comm="syz.1.263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 203.960681][ T29] audit: type=1400 audit(203.880:412): avc: denied { relabelfrom } for pid=4759 comm="syz.0.267" name="NETLINK" dev="sockfs" ino=4330 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 203.962204][ T4760] SELinux: Context system_u:object_r:udev_var_run_t:s0 is not valid (left unmapped). [ 203.963281][ T29] audit: type=1400 audit(203.880:413): avc: denied { relabelto } for pid=4759 comm="syz.0.267" name="NETLINK" dev="sockfs" ino=4330 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_generic_socket permissive=1 trawcon="system_u:object_r:udev_var_run_t:s0" [ 205.117001][ T4770] netlink: 64 bytes leftover after parsing attributes in process `syz.0.271'. [ 207.330935][ T4798] netlink: 'syz.0.280': attribute type 11 has an invalid length. [ 208.105372][ T4811] binfmt_misc: register: failed to install interpreter file ./file2 [ 208.554896][ T29] audit: type=1400 audit(208.440:414): avc: denied { setopt } for pid=4815 comm="syz.0.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 208.701492][ T29] audit: type=1326 audit(208.620:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.709989][ T29] audit: type=1326 audit(208.620:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.711738][ T29] audit: type=1326 audit(208.630:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.727513][ T29] audit: type=1326 audit(208.650:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.737964][ T29] audit: type=1326 audit(208.660:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.741364][ T29] audit: type=1326 audit(208.660:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.745196][ T29] audit: type=1326 audit(208.660:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.751676][ T29] audit: type=1326 audit(208.670:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.765898][ T29] audit: type=1326 audit(208.690:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.0.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 214.117675][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 214.118651][ T29] audit: type=1400 audit(214.040:446): avc: denied { bind } for pid=4840 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 217.476910][ T4867] netlink: 16 bytes leftover after parsing attributes in process `syz.0.303'. [ 217.479122][ T4867] netlink: 4 bytes leftover after parsing attributes in process `syz.0.303'. [ 218.594729][ T29] audit: type=1400 audit(218.500:447): avc: denied { create } for pid=4873 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 218.706975][ T29] audit: type=1400 audit(218.620:448): avc: denied { getopt } for pid=4873 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 220.047750][ T4878] ALSA: seq fatal error: cannot create timer (-19) [ 221.602704][ T29] audit: type=1400 audit(221.520:449): avc: denied { execute } for pid=4885 comm="syz.0.309" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1032 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 224.869117][ T29] audit: type=1400 audit(224.790:450): avc: denied { create } for pid=4901 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 225.353332][ T29] audit: type=1400 audit(225.270:451): avc: denied { create } for pid=4901 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 228.183139][ T4918] binfmt_misc: register: failed to install interpreter file ./file2 [ 232.372085][ T29] audit: type=1400 audit(232.290:452): avc: denied { map } for pid=4938 comm="syz.0.324" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 232.795021][ T29] audit: type=1326 audit(232.710:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.795437][ T29] audit: type=1326 audit(232.710:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.795648][ T29] audit: type=1326 audit(232.710:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.795841][ T29] audit: type=1326 audit(232.710:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=352 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.796046][ T29] audit: type=1326 audit(232.710:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.796276][ T29] audit: type=1326 audit(232.710:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.796468][ T29] audit: type=1326 audit(232.710:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.817708][ T29] audit: type=1326 audit(232.740:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 232.825427][ T29] audit: type=1326 audit(232.740:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.1.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 233.188832][ T4951] netlink: 4 bytes leftover after parsing attributes in process `syz.0.330'. [ 234.098377][ T4960] netlink: 8 bytes leftover after parsing attributes in process `syz.0.333'. [ 234.192169][ T4960] netlink: 312 bytes leftover after parsing attributes in process `syz.0.333'. [ 234.193174][ T4960] netlink: 8 bytes leftover after parsing attributes in process `syz.0.333'. [ 234.996356][ T4969] netlink: 8 bytes leftover after parsing attributes in process `syz.0.337'. [ 237.403285][ T4991] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 241.222245][ T5023] capability: warning: `syz.1.352' uses 32-bit capabilities (legacy support in use) [ 244.861014][ T5035] capability: warning: `syz.0.356' uses deprecated v2 capabilities in a way that may be insecure [ 244.906418][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 244.907433][ T29] audit: type=1400 audit(244.830:503): avc: denied { setopt } for pid=5034 comm="syz.0.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 248.934466][ T29] audit: type=1326 audit(248.840:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.937192][ T29] audit: type=1326 audit(248.840:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.940135][ T29] audit: type=1326 audit(248.840:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.943115][ T29] audit: type=1326 audit(248.840:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=107 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.959030][ T29] audit: type=1326 audit(248.840:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.961516][ T29] audit: type=1326 audit(248.840:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.964683][ T29] audit: type=1326 audit(248.860:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 248.983481][ T29] audit: type=1326 audit(248.900:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.331308][ T29] audit: type=1326 audit(250.250:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.342588][ T29] audit: type=1326 audit(250.260:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.356205][ T29] audit: type=1326 audit(250.280:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.361224][ T29] audit: type=1326 audit(250.280:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.371942][ T29] audit: type=1326 audit(250.290:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.386323][ T29] audit: type=1326 audit(250.310:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.391790][ T29] audit: type=1326 audit(250.310:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.401973][ T29] audit: type=1326 audit(250.320:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.407612][ T29] audit: type=1326 audit(250.330:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 250.425781][ T29] audit: type=1326 audit(250.340:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5076 comm="syz.1.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 259.285832][ T5136] can0: slcan on ptm0. [ 259.635039][ T5135] can0 (unregistered): slcan off ptm0. [ 262.190652][ T5160] netlink: 8 bytes leftover after parsing attributes in process `syz.0.396'. [ 263.304648][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 263.305824][ T29] audit: type=1400 audit(263.220:531): avc: denied { write } for pid=5177 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 263.661063][ T5182] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 263.857492][ T5182] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 264.067781][ T5182] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 264.257633][ T5182] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 264.515038][ T53] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.554988][ T63] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.587172][ T63] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.622659][ T53] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.095741][ T5209] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 265.097872][ T29] audit: type=1400 audit(265.020:532): avc: denied { relabelto } for pid=5208 comm="syz.0.406" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 265.101745][ T29] audit: type=1400 audit(265.020:533): avc: denied { associate } for pid=5208 comm="syz.0.406" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 275.898110][ T29] audit: type=1326 audit(275.820:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.902648][ T29] audit: type=1326 audit(275.820:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.914429][ T29] audit: type=1326 audit(275.830:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.918237][ T29] audit: type=1326 audit(275.830:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.921187][ T29] audit: type=1326 audit(275.830:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.946837][ T29] audit: type=1326 audit(275.860:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.947214][ T29] audit: type=1326 audit(275.870:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.947431][ T29] audit: type=1326 audit(275.870:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.966804][ T29] audit: type=1326 audit(275.890:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 275.971186][ T29] audit: type=1326 audit(275.890:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5266 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 277.758100][ T5280] netlink: 24 bytes leftover after parsing attributes in process `syz.1.428'. [ 286.096824][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 286.097604][ T29] audit: type=1326 audit(286.020:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.1.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 286.111103][ T29] audit: type=1326 audit(286.020:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.1.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 286.111703][ T29] audit: type=1326 audit(286.030:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.1.449" exe="/syz-executor" sig=0 arch=40000028 syscall=275 compat=0 ip=0x132970 code=0x7ffc0000 [ 286.115469][ T29] audit: type=1326 audit(286.030:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.1.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 289.496328][ T5374] netlink: 4 bytes leftover after parsing attributes in process `syz.1.456'. [ 291.589855][ T5376] netlink: 'syz.1.457': attribute type 6 has an invalid length. [ 291.874538][ T29] audit: type=1400 audit(291.780:554): avc: denied { getopt } for pid=5377 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 297.322084][ T5396] netlink: 19 bytes leftover after parsing attributes in process `syz.0.464'. [ 299.702890][ T5414] netlink: 'syz.0.468': attribute type 12 has an invalid length. [ 300.628771][ T5420] netlink: 32 bytes leftover after parsing attributes in process `syz.0.470'. [ 303.206945][ T29] audit: type=1400 audit(303.130:555): avc: denied { mount } for pid=5441 comm="syz.0.477" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 303.218537][ T29] audit: type=1400 audit(303.130:556): avc: denied { mounton } for pid=5441 comm="syz.0.477" path="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 303.269359][ T29] audit: type=1400 audit(303.180:557): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 303.271068][ T29] audit: type=1400 audit(303.190:558): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 303.556183][ T29] audit: type=1400 audit(303.460:559): avc: denied { create } for pid=5445 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 304.341579][ T29] audit: type=1326 audit(304.260:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5452 comm="syz.1.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 304.341993][ T29] audit: type=1326 audit(304.260:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5452 comm="syz.1.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 304.347920][ T29] audit: type=1326 audit(304.270:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5452 comm="syz.1.481" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 304.349820][ T29] audit: type=1326 audit(304.270:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5452 comm="syz.1.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 304.369783][ T29] audit: type=1326 audit(304.270:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5452 comm="syz.1.481" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 305.846780][ T5460] Invalid ELF header type: 3 != 1 [ 307.364921][ T5466] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 307.535987][ T5466] usb 1-1: Using ep0 maxpacket: 8 [ 307.563080][ T5466] usb 1-1: unable to get BOS descriptor or descriptor too short [ 307.595100][ T5466] usb 1-1: config 0 has no interfaces? [ 307.613659][ T5466] usb 1-1: New USB device found, idVendor=058f, idProduct=6610, bcdDevice=48.05 [ 307.615249][ T5466] usb 1-1: New USB device strings: Mfr=2, Product=0, SerialNumber=3 [ 307.616125][ T5466] usb 1-1: Manufacturer: syz [ 307.616864][ T5466] usb 1-1: SerialNumber: syz [ 307.626794][ T5466] usb 1-1: config 0 descriptor?? [ 307.907713][ T5466] usb 1-1: USB disconnect, device number 2 [ 308.310469][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 308.310926][ T29] audit: type=1400 audit(308.230:574): avc: denied { setopt } for pid=5498 comm="syz.0.492" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 308.316961][ T29] audit: type=1400 audit(308.240:575): avc: denied { write } for pid=5498 comm="syz.0.492" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 308.612245][ T5503] netlink: 36 bytes leftover after parsing attributes in process `syz.0.494'. [ 308.879687][ T5506] netlink: 64 bytes leftover after parsing attributes in process `syz.0.496'. [ 309.841530][ T29] audit: type=1400 audit(309.760:576): avc: denied { bind } for pid=5520 comm="syz.1.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 309.851018][ T5521] netlink: 32 bytes leftover after parsing attributes in process `syz.1.500'. [ 310.098444][ T29] audit: type=1400 audit(310.020:577): avc: denied { create } for pid=5523 comm="syz.1.501" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.100255][ T29] audit: type=1400 audit(310.020:578): avc: denied { map } for pid=5523 comm="syz.1.501" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5094 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.100948][ T29] audit: type=1400 audit(310.020:579): avc: denied { read write } for pid=5523 comm="syz.1.501" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5094 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.136935][ T53] netdevsim netdevsim0 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 310.138397][ T53] netdevsim netdevsim0 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 310.140323][ T53] netdevsim netdevsim0 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 310.141624][ T53] netdevsim netdevsim0 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 311.773288][ T29] audit: type=1326 audit(311.690:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 311.778710][ T29] audit: type=1326 audit(311.690:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 311.781469][ T29] audit: type=1326 audit(311.690:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 311.789989][ T29] audit: type=1326 audit(311.700:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x7ffc0000 [ 313.343503][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 313.344180][ T29] audit: type=1326 audit(313.260:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5543 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 313.356855][ T29] audit: type=1326 audit(313.280:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.0.505" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 314.944688][ T4031] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 315.084848][ T4031] usb 1-1: device descriptor read/64, error -71 [ 315.326560][ T4031] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 315.464735][ T4031] usb 1-1: device descriptor read/64, error -71 [ 315.576219][ T4031] usb usb1-port1: attempt power cycle [ 315.926441][ T4031] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 315.950957][ T4031] usb 1-1: device descriptor read/8, error -71 [ 316.194828][ T4031] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 316.219957][ T4031] usb 1-1: device descriptor read/8, error -71 [ 316.328112][ T4031] usb usb1-port1: unable to enumerate USB device [ 320.038157][ T5556] ip6tnl1: entered promiscuous mode [ 320.039622][ T5556] ip6tnl1: entered allmulticast mode [ 323.045882][ T29] audit: type=1400 audit(322.950:587): avc: denied { nlmsg_read } for pid=5568 comm="syz.1.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 328.254545][ T29] audit: type=1326 audit(328.170:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.269222][ T29] audit: type=1326 audit(328.190:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.274675][ T29] audit: type=1326 audit(328.190:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.288572][ T29] audit: type=1326 audit(328.210:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.300983][ T29] audit: type=1326 audit(328.220:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.309905][ T29] audit: type=1326 audit(328.230:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.316885][ T29] audit: type=1326 audit(328.230:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.328539][ T29] audit: type=1326 audit(328.250:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.333375][ T29] audit: type=1326 audit(328.250:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 328.335677][ T29] audit: type=1326 audit(328.250:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5600 comm="syz.0.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 329.724914][ T5617] netlink: 12 bytes leftover after parsing attributes in process `syz.0.526'. [ 329.946420][ T5620] syzkaller1: entered promiscuous mode [ 329.955044][ T5620] syzkaller1: entered allmulticast mode [ 334.142868][ T5656] binfmt_misc: register: failed to install interpreter file ./file0 [ 336.162432][ T5675] SELinux: failed to load policy [ 336.624787][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 336.626046][ T29] audit: type=1326 audit(336.540:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.639919][ T29] audit: type=1326 audit(336.560:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.642450][ T29] audit: type=1326 audit(336.560:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.683208][ T29] audit: type=1326 audit(336.580:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.684778][ T29] audit: type=1326 audit(336.580:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.740541][ T29] audit: type=1326 audit(336.640:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.831747][ T29] audit: type=1326 audit(336.650:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.832364][ T29] audit: type=1326 audit(336.670:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.832610][ T29] audit: type=1326 audit(336.680:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 336.832865][ T29] audit: type=1326 audit(336.680:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.0.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 338.540202][ T5703] SELinux: failed to load policy [ 341.720426][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 341.720899][ T29] audit: type=1326 audit(341.640:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 341.721257][ T29] audit: type=1326 audit(341.640:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 341.724948][ T29] audit: type=1326 audit(341.640:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 341.725152][ T29] audit: type=1326 audit(341.640:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 341.725803][ T29] audit: type=1326 audit(341.640:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 341.744220][ T29] audit: type=1326 audit(341.640:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 341.749727][ T29] audit: type=1326 audit(341.670:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 341.749879][ T29] audit: type=1326 audit(341.670:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 341.756744][ T29] audit: type=1326 audit(341.670:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 341.757112][ T29] audit: type=1326 audit(341.670:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.0.561" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 342.878202][ T5727] netlink: 'syz.0.563': attribute type 1 has an invalid length. [ 343.039324][ T5727] bond1: entered promiscuous mode [ 343.039852][ T5727] bond1: entered allmulticast mode [ 343.041426][ T5727] 8021q: adding VLAN 0 to HW filter on device bond1 [ 343.148826][ T5727] veth3: entered promiscuous mode [ 343.150561][ T5727] veth3: entered allmulticast mode [ 343.153374][ T5727] bond1: (slave veth3): Enslaving as a backup interface with a down link [ 346.300131][ T5799] netlink: 8 bytes leftover after parsing attributes in process `syz.0.569'. [ 347.110873][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 347.112061][ T29] audit: type=1400 audit(347.030:756): avc: denied { wake_alarm } for pid=5807 comm="syz.0.572" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 347.313720][ T29] audit: type=1400 audit(347.230:757): avc: denied { override_creds } for pid=5812 comm="syz.1.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 354.898035][ T5859] ip6erspan0: entered promiscuous mode [ 355.261223][ T5867] netlink: 24 bytes leftover after parsing attributes in process `syz.1.591'. [ 355.918362][ T5875] sch_tbf: burst 2 is lower than device lo mtu (65550) ! [ 356.039657][ T5875] serio: Serial port ptm0 [ 356.735859][ T5884] netlink: 48 bytes leftover after parsing attributes in process `syz.1.597'. [ 358.137544][ T5897] can0: slcan on ptm0. [ 358.679869][ T5894] can0 (unregistered): slcan off ptm0. [ 359.410053][ T29] audit: type=1400 audit(359.330:758): avc: denied { kexec_image_load } for pid=5915 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 359.430563][ T29] audit: type=1400 audit(359.350:759): avc: denied { listen } for pid=5917 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 362.877817][ T5950] netlink: 8 bytes leftover after parsing attributes in process `syz.0.613'. [ 362.879927][ T5950] netlink: 40 bytes leftover after parsing attributes in process `syz.0.613'. [ 365.907732][ T29] audit: type=1400 audit(365.830:760): avc: denied { create } for pid=5985 comm="syz.0.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 367.388165][ T29] audit: type=1400 audit(367.310:761): avc: denied { create } for pid=6004 comm="syz.0.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 367.426204][ T29] audit: type=1326 audit(367.350:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6003 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.428446][ T29] audit: type=1326 audit(367.350:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.441009][ T29] audit: type=1326 audit(367.350:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6003 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.464616][ T29] audit: type=1326 audit(367.370:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.465138][ T29] audit: type=1326 audit(367.370:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.494488][ T29] audit: type=1326 audit(367.390:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.497994][ T29] audit: type=1326 audit(367.390:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 367.498486][ T29] audit: type=1326 audit(367.390:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6004 comm="syz.0.628" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 369.317447][ T6021] SELinux: failed to load policy [ 369.708562][ T6024] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x4 [ 369.715570][ T6024] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x2 [ 369.717325][ T6024] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x3 [ 369.727747][ T6024] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 371.086041][ T1340] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.105290][ T1340] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.116362][ T1340] bond0 (unregistering): Released all slaves [ 371.154566][ T1340] bond1 (unregistering): Released all slaves [ 371.285319][ T1340] hsr_slave_0: left promiscuous mode [ 371.288162][ T1340] hsr_slave_1: left promiscuous mode [ 377.257728][ T6047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 377.288654][ T6047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 380.577842][ T6047] hsr_slave_0: entered promiscuous mode [ 380.595405][ T6047] hsr_slave_1: entered promiscuous mode [ 380.605096][ T6047] debugfs: 'hsr0' already exists in 'hsr' [ 380.605416][ T6047] Cannot create hsr debugfs directory [ 381.892399][ T6047] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 381.968692][ T6047] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 381.981596][ T6047] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 382.028773][ T6047] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 384.652873][ T6047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 385.895907][ T6451] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6451 comm=syz.0.657 [ 393.007423][ T6493] tls_set_device_offload_rx: netdev not found [ 393.551348][ T6047] veth0_vlan: entered promiscuous mode [ 393.600905][ T6047] veth1_vlan: entered promiscuous mode [ 393.739041][ T6047] veth0_macvtap: entered promiscuous mode [ 393.779163][ T6047] veth1_macvtap: entered promiscuous mode [ 393.986611][ T53] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.988422][ T53] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.989605][ T53] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.990612][ T53] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 394.307145][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 394.307455][ T29] audit: type=1400 audit(394.230:817): avc: denied { add_name } for pid=6047 comm="syz-executor" name="syz2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 394.307832][ T29] audit: type=1400 audit(394.230:818): avc: denied { create } for pid=6047 comm="syz-executor" name="syz2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 394.308107][ T29] audit: type=1400 audit(394.230:819): avc: denied { associate } for pid=6047 comm="syz-executor" name="syz2" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 394.985621][ T6511] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 394.987371][ T6511] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 395.573746][ T29] audit: type=1400 audit(395.490:820): avc: denied { connect } for pid=6518 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 395.609586][ T29] audit: type=1400 audit(395.530:821): avc: denied { write } for pid=6521 comm="syz.2.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 395.767190][ T29] audit: type=1326 audit(395.690:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6523 comm="syz.2.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.772723][ T29] audit: type=1326 audit(395.690:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6523 comm="syz.2.670" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.780367][ T29] audit: type=1326 audit(395.700:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6523 comm="syz.2.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.803013][ T29] audit: type=1326 audit(395.720:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6523 comm="syz.2.670" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.810742][ T29] audit: type=1326 audit(395.730:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6523 comm="syz.2.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 398.977957][ T6550] veth4: entered promiscuous mode [ 398.978319][ T6550] veth4: entered allmulticast mode [ 399.630529][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 399.630999][ T29] audit: type=1326 audit(399.530:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.631545][ T29] audit: type=1326 audit(399.530:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=392 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.632275][ T29] audit: type=1326 audit(399.540:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.632679][ T29] audit: type=1326 audit(399.540:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.633022][ T29] audit: type=1326 audit(399.540:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.677825][ T6576] netlink: 20 bytes leftover after parsing attributes in process `syz.0.680'. [ 399.751476][ T29] audit: type=1326 audit(399.670:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 399.752280][ T29] audit: type=1326 audit(399.670:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.2.681" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 401.664764][ T29] audit: type=1326 audit(401.570:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6593 comm="syz.2.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 401.665923][ T29] audit: type=1326 audit(401.570:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6593 comm="syz.2.686" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 401.666153][ T29] audit: type=1326 audit(401.580:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6593 comm="syz.2.686" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132970 code=0x7ffc0000 [ 401.721474][ T6600] IPv6: Can't replace route, no match found [ 402.925995][ T6618] mmap: syz.0.691 (6618) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 427.318436][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 427.318788][ T29] audit: type=1400 audit(427.240:861): avc: denied { getopt } for pid=6731 comm="syz.2.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 430.257441][ T6752] binfmt_misc: register: failed to install interpreter file ./file2 [ 430.751954][ T6755] SELinux: policydb table sizes (0,538976256) do not match mine (8,7) [ 430.758087][ T6755] SELinux: failed to load policy [ 433.438170][ T29] audit: type=1326 audit(433.360:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.439810][ T29] audit: type=1326 audit(433.360:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.449315][ T29] audit: type=1326 audit(433.370:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.451220][ T29] audit: type=1326 audit(433.370:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.465533][ T29] audit: type=1326 audit(433.390:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.471687][ T29] audit: type=1326 audit(433.390:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.503500][ T29] audit: type=1326 audit(433.420:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.526672][ T29] audit: type=1326 audit(433.440:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.528221][ T29] audit: type=1326 audit(433.440:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 433.528331][ T29] audit: type=1326 audit(433.440:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6771 comm="syz.2.733" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 435.974438][ T6793] netlink: 20 bytes leftover after parsing attributes in process `syz.2.740'. [ 438.797868][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 438.798188][ T29] audit: type=1326 audit(438.720:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6828 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 438.799596][ T29] audit: type=1326 audit(438.720:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6828 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 438.801670][ T29] audit: type=1326 audit(438.720:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6828 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x132970 code=0x7ffc0000 [ 438.802703][ T29] audit: type=1326 audit(438.720:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6828 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 438.803696][ T29] audit: type=1326 audit(438.720:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6828 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 438.818280][ T6827] binfmt_misc: register: failed to install interpreter file ./file2 [ 440.111599][ T29] audit: type=1326 audit(440.030:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6844 comm="syz.0.760" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 440.114355][ T29] audit: type=1326 audit(440.030:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6844 comm="syz.0.760" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 440.128923][ T29] audit: type=1326 audit(440.050:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6844 comm="syz.0.760" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 440.131014][ T29] audit: type=1326 audit(440.050:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6844 comm="syz.0.760" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 440.132846][ T29] audit: type=1326 audit(440.050:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6844 comm="syz.0.760" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 440.642236][ T6850] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6850 comm=syz.2.761 [ 440.642671][ T6850] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=6850 comm=syz.2.761 [ 444.267339][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 444.268341][ T29] audit: type=1400 audit(444.190:943): avc: denied { connect } for pid=6883 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 444.289537][ T29] audit: type=1400 audit(444.210:944): avc: denied { getopt } for pid=6883 comm="syz.0.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 444.799126][ T6900] netlink: 32 bytes leftover after parsing attributes in process `syz.0.777'. [ 446.112825][ T29] audit: type=1326 audit(446.030:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.121886][ T29] audit: type=1326 audit(446.040:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.152965][ T29] audit: type=1326 audit(446.060:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.274681][ T29] audit: type=1326 audit(446.190:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.300363][ T29] audit: type=1326 audit(446.210:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.323150][ T29] audit: type=1326 audit(446.230:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.358335][ T29] audit: type=1326 audit(446.260:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 446.371352][ T29] audit: type=1326 audit(446.280:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6913 comm="syz.2.783" exe="/syz-executor" sig=0 arch=40000028 syscall=348 compat=0 ip=0x132970 code=0x7ffc0000 [ 447.867864][ T6933] netlink: 36 bytes leftover after parsing attributes in process `syz.0.789'. [ 450.514882][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 450.516231][ T29] audit: type=1326 audit(450.430:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.518448][ T29] audit: type=1326 audit(450.430:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.520842][ T29] audit: type=1326 audit(450.430:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.523443][ T29] audit: type=1326 audit(450.430:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.534854][ T29] audit: type=1326 audit(450.430:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.536693][ T29] audit: type=1326 audit(450.430:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.538402][ T29] audit: type=1326 audit(450.430:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.540159][ T29] audit: type=1326 audit(450.430:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.541860][ T29] audit: type=1326 audit(450.430:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 450.545288][ T29] audit: type=1326 audit(450.430:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6949 comm="syz.2.793" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 451.301138][ T6952] netlink: 'syz.0.794': attribute type 1 has an invalid length. [ 455.748251][ T6987] SELinux: failed to load policy [ 456.881673][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 456.882184][ T29] audit: type=1326 audit(456.800:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6992 comm="syz.0.806" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 456.907802][ T29] audit: type=1326 audit(456.820:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6992 comm="syz.0.806" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 456.934612][ T29] audit: type=1326 audit(456.830:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6992 comm="syz.0.806" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132970 code=0x7ffc0000 [ 457.136418][ T29] audit: type=1326 audit(457.060:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6992 comm="syz.0.806" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 457.137123][ T29] audit: type=1326 audit(457.060:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6992 comm="syz.0.806" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 459.561441][ T7021] netlink: 'syz.0.817': attribute type 27 has an invalid length. [ 462.165228][ T7021] bond1: left promiscuous mode [ 462.165652][ T7021] veth3: left promiscuous mode [ 462.166438][ T7021] bond1: left allmulticast mode [ 462.166632][ T7021] veth3: left allmulticast mode [ 462.187393][ T7021] veth4: left promiscuous mode [ 462.188587][ T7021] veth4: left allmulticast mode [ 462.190789][ T38] netdevsim netdevsim0 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 462.191066][ T38] netdevsim netdevsim0 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 462.191342][ T38] netdevsim netdevsim0 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 462.191541][ T38] netdevsim netdevsim0 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 462.191782][ T38] netdevsim netdevsim0 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 462.191974][ T38] netdevsim netdevsim0 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 462.192227][ T38] netdevsim netdevsim0 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 462.192429][ T38] netdevsim netdevsim0 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 465.167990][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.168575][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.168933][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.169194][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.169337][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.169490][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.169641][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.169849][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.170043][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.170199][ T6985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 465.197022][ T6985] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 465.670546][ T29] audit: type=1400 audit(465.590:1006): avc: denied { read } for pid=7041 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 466.948855][ T29] audit: type=1400 audit(466.870:1007): avc: denied { ioctl } for pid=7052 comm="syz.0.826" path="socket:[9472]" dev="sockfs" ino=9472 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 466.950688][ T7054] syzkaller1: entered promiscuous mode [ 466.950774][ T7054] syzkaller1: entered allmulticast mode [ 469.474743][ T29] audit: type=1326 audit(469.370:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7074 comm="syz.2.831" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 469.475359][ T29] audit: type=1326 audit(469.400:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7074 comm="syz.2.831" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 469.489396][ T29] audit: type=1326 audit(469.410:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7074 comm="syz.2.831" exe="/syz-executor" sig=0 arch=40000028 syscall=93 compat=0 ip=0x132970 code=0x7ffc0000 [ 469.515412][ T29] audit: type=1326 audit(469.410:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7074 comm="syz.2.831" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 469.516726][ T29] audit: type=1326 audit(469.440:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7074 comm="syz.2.831" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 474.458931][ T7118] netlink: 8 bytes leftover after parsing attributes in process `syz.0.845'. [ 477.237352][ T29] audit: type=1400 audit(477.160:1013): avc: denied { setopt } for pid=7124 comm="syz.2.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 477.257996][ T7125] netlink: 16 bytes leftover after parsing attributes in process `syz.2.847'. [ 477.775603][ T7131] netlink: 96 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 482.995524][ T29] audit: type=1400 audit(482.920:1014): avc: denied { setopt } for pid=7176 comm="syz.0.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 484.618130][ T29] audit: type=1326 audit(484.540:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7186 comm="syz.0.869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 484.661205][ T29] audit: type=1326 audit(484.580:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7186 comm="syz.0.869" exe="/syz-executor" sig=0 arch=40000028 syscall=347 compat=0 ip=0x132970 code=0x7ffc0000 [ 484.726042][ T29] audit: type=1326 audit(484.650:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7186 comm="syz.0.869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 484.727831][ T29] audit: type=1326 audit(484.650:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7186 comm="syz.0.869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 485.450464][ T7195] netlink: 4 bytes leftover after parsing attributes in process `syz.0.871'. [ 485.474878][ T7195] netlink: 32 bytes leftover after parsing attributes in process `syz.0.871'. [ 486.794275][ T29] audit: type=1326 audit(486.710:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.0.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 486.802391][ T29] audit: type=1326 audit(486.720:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.0.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 486.812875][ T29] audit: type=1326 audit(486.730:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.0.873" exe="/syz-executor" sig=0 arch=40000028 syscall=96 compat=0 ip=0x132970 code=0x7ffc0000 [ 486.822187][ T29] audit: type=1326 audit(486.730:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.0.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 486.836593][ T29] audit: type=1326 audit(486.740:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.0.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 489.258110][ T29] audit: type=1400 audit(489.180:1024): avc: denied { create } for pid=7227 comm="syz.0.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 489.827355][ T29] audit: type=1400 audit(489.750:1025): avc: denied { listen } for pid=7232 comm="syz.0.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 490.889409][ T29] audit: type=1326 audit(490.800:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.898039][ T29] audit: type=1326 audit(490.820:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.908272][ T29] audit: type=1326 audit(490.820:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=264 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.908767][ T29] audit: type=1326 audit(490.820:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.908948][ T29] audit: type=1326 audit(490.830:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.909044][ T29] audit: type=1326 audit(490.830:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.909105][ T29] audit: type=1326 audit(490.830:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 490.911917][ T29] audit: type=1326 audit(490.830:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7236 comm="syz.2.883" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 491.449452][ T7234] netlink: 7 bytes leftover after parsing attributes in process `syz.0.882'. [ 494.450054][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 494.450445][ T29] audit: type=1400 audit(494.360:1053): avc: denied { nlmsg_write } for pid=7262 comm="syz.0.889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 494.451161][ T7264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7264 comm=syz.0.889 [ 495.867132][ T29] audit: type=1326 audit(495.790:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7277 comm="syz.0.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 495.879410][ T29] audit: type=1326 audit(495.800:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7277 comm="syz.0.895" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 495.879975][ T29] audit: type=1326 audit(495.800:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7277 comm="syz.0.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 495.896166][ T29] audit: type=1326 audit(495.810:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7277 comm="syz.0.895" exe="/syz-executor" sig=0 arch=40000028 syscall=352 compat=0 ip=0x132970 code=0x7ffc0000 [ 495.896580][ T29] audit: type=1326 audit(495.810:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7277 comm="syz.0.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.423558][ T29] audit: type=1326 audit(499.340:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.425566][ T29] audit: type=1326 audit(499.350:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.440659][ T29] audit: type=1326 audit(499.350:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.459937][ T29] audit: type=1326 audit(499.380:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.462960][ T29] audit: type=1326 audit(499.380:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.471311][ T29] audit: type=1326 audit(499.390:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.497892][ T38] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 499.498498][ T38] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 499.498634][ T38] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 499.498719][ T38] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 499.506127][ T29] audit: type=1326 audit(499.430:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.506564][ T29] audit: type=1326 audit(499.430:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7322 comm="syz.2.909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 500.124654][ T29] audit: type=1326 audit(500.030:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7330 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 500.125187][ T29] audit: type=1326 audit(500.030:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7330 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 500.188082][ T29] audit: type=1326 audit(500.060:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7330 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132970 code=0x7ffc0000 [ 500.188368][ T29] audit: type=1326 audit(500.070:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7330 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 500.188503][ T29] audit: type=1326 audit(500.070:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7330 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 503.668604][ T7369] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 503.669168][ T7369] SELinux: failed to load policy [ 506.759618][ T7386] SELinux: failed to load policy [ 507.377757][ T7395] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 507.379370][ T7395] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 507.381327][ T7395] netdevsim netdevsim2: Falling back to sysfs fallback for: . [ 507.381593][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 507.382497][ T29] audit: type=1400 audit(507.300:1087): avc: denied { firmware_load } for pid=7392 comm="syz.2.934" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 509.520003][ T7406] process 'syz.0.937' launched './file0' with NULL argv: empty string added [ 509.522059][ T29] audit: type=1400 audit(509.440:1088): avc: denied { execute_no_trans } for pid=7405 comm="syz.0.937" path="/421/file0" dev="tmpfs" ino=2153 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 510.831276][ T29] audit: type=1400 audit(510.740:1089): avc: denied { setcurrent } for pid=7414 comm="syz.2.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 510.831807][ T29] audit: type=1401 audit(510.740:1090): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 512.049705][ T7428] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 512.060314][ T7428] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 512.099261][ T7431] macvtap1: entered promiscuous mode [ 512.100277][ T7431] syz_tun: entered promiscuous mode [ 512.108642][ T7431] syz_tun: left promiscuous mode [ 512.700446][ T29] audit: type=1326 audit(512.620:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7441 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 512.712087][ T29] audit: type=1326 audit(512.630:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7441 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=325 compat=0 ip=0x132970 code=0x7ffc0000 [ 512.712558][ T29] audit: type=1326 audit(512.630:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7441 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 513.046151][ T7445] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 514.535021][ T29] audit: type=1326 audit(514.450:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.537754][ T29] audit: type=1326 audit(514.460:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=440 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.539415][ T29] audit: type=1326 audit(514.460:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.540603][ T29] audit: type=1326 audit(514.460:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.542831][ T29] audit: type=1326 audit(514.460:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.548981][ T29] audit: type=1326 audit(514.470:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 514.557607][ T29] audit: type=1326 audit(514.480:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7455 comm="syz.2.951" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 517.566747][ T7487] netlink: 204 bytes leftover after parsing attributes in process `syz.2.958'. [ 522.319798][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 522.320217][ T29] audit: type=1326 audit(522.240:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.335533][ T29] audit: type=1326 audit(522.260:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.351800][ T29] audit: type=1326 audit(522.270:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.356932][ T29] audit: type=1326 audit(522.270:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.366546][ T29] audit: type=1326 audit(522.290:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.367005][ T29] audit: type=1326 audit(522.290:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.376435][ T29] audit: type=1326 audit(522.300:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.386160][ T29] audit: type=1326 audit(522.310:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.386758][ T29] audit: type=1326 audit(522.310:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.406707][ T29] audit: type=1326 audit(522.310:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7518 comm="syz.2.966" exe="/syz-executor" sig=0 arch=40000028 syscall=300 compat=0 ip=0x132970 code=0x7ffc0000 [ 522.927276][ T7525] netlink: 4 bytes leftover after parsing attributes in process `syz.2.968'. [ 532.704973][ T7636] netlink: 96 bytes leftover after parsing attributes in process `syz.2.989'. [ 533.924485][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 533.924867][ T29] audit: type=1400 audit(533.840:1195): avc: denied { prog_load } for pid=7598 comm="syz.0.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 533.925131][ T29] audit: type=1400 audit(533.840:1196): avc: denied { bpf } for pid=7598 comm="syz.0.978" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 533.925331][ T29] audit: type=1400 audit(533.840:1197): avc: denied { perfmon } for pid=7598 comm="syz.0.978" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 533.925519][ T29] audit: type=1400 audit(533.840:1198): avc: denied { prog_run } for pid=7598 comm="syz.0.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 534.014452][ T29] audit: type=1400 audit(533.930:1199): avc: denied { ioctl } for pid=7646 comm="syz.2.993" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5443 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 534.245637][ T29] audit: type=1400 audit(534.160:1200): avc: denied { read } for pid=7649 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 534.528568][ T29] audit: type=1400 audit(534.450:1201): avc: denied { create } for pid=7651 comm="syz.2.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 534.548315][ T29] audit: type=1400 audit(534.470:1202): avc: denied { write } for pid=7651 comm="syz.2.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 534.553617][ T29] audit: type=1400 audit(534.470:1203): avc: denied { read } for pid=7651 comm="syz.2.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 534.599048][ T7653] netdevsim netdevsim2 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.600274][ T7653] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.736899][ T7653] netdevsim netdevsim2 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.739886][ T7653] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.846917][ T7653] netdevsim netdevsim2 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.847379][ T7653] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 535.006561][ T7653] netdevsim netdevsim2 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 535.007078][ T7653] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 535.196332][ T38] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 535.196695][ T38] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.252979][ T38] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 535.253345][ T38] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.253705][ T38] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 535.255399][ T38] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.290555][ T7552] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 535.290909][ T7552] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.630469][ T29] audit: type=1400 audit(535.550:1204): avc: denied { map_create } for pid=7671 comm="syz.2.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 538.303170][ T7693] netlink: 'syz.2.1004': attribute type 15 has an invalid length. [ 539.182215][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 539.182577][ T29] audit: type=1400 audit(539.100:1219): avc: denied { create } for pid=7703 comm="syz.2.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.228635][ T29] audit: type=1400 audit(539.140:1220): avc: denied { connect } for pid=7703 comm="syz.2.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.229175][ T29] audit: type=1400 audit(539.150:1221): avc: denied { ioctl } for pid=7703 comm="syz.2.1008" path="socket:[10952]" dev="sockfs" ino=10952 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.232404][ T29] audit: type=1400 audit(539.150:1222): avc: denied { write } for pid=7703 comm="syz.2.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.397715][ T29] audit: type=1400 audit(539.320:1223): avc: denied { create } for pid=7706 comm="syz.0.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 540.524871][ T29] audit: type=1326 audit(540.440:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7717 comm="syz.0.1014" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 540.525327][ T29] audit: type=1326 audit(540.440:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7717 comm="syz.0.1014" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 540.535460][ T29] audit: type=1326 audit(540.450:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7717 comm="syz.0.1014" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 540.536869][ T29] audit: type=1326 audit(540.450:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7717 comm="syz.0.1014" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 540.584709][ T29] audit: type=1326 audit(540.480:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7717 comm="syz.0.1014" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 544.827268][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 544.827649][ T29] audit: type=1400 audit(544.750:1244): avc: denied { mounton } for pid=7753 comm="syz.2.1026" path="/194/file0" dev="tmpfs" ino=1001 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 544.844962][ T29] audit: type=1400 audit(544.760:1245): avc: denied { mount } for pid=7753 comm="syz.2.1026" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 545.048637][ T29] audit: type=1400 audit(544.960:1246): avc: denied { unmount } for pid=6047 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 548.965117][ T29] audit: type=1400 audit(548.880:1247): avc: denied { create } for pid=7776 comm="syz.2.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 548.965611][ T29] audit: type=1400 audit(548.880:1248): avc: denied { shutdown } for pid=7776 comm="syz.2.1033" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 548.965852][ T29] audit: type=1400 audit(548.880:1249): avc: denied { read } for pid=7776 comm="syz.2.1033" path="socket:[11037]" dev="sockfs" ino=11037 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 552.503416][ T29] audit: type=1400 audit(552.420:1250): avc: denied { create } for pid=7792 comm="syz.2.1036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 552.525402][ T29] audit: type=1400 audit(552.430:1251): avc: denied { write } for pid=7792 comm="syz.2.1036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 552.560875][ T7793] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 552.851629][ T29] audit: type=1326 audit(552.770:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.858004][ T29] audit: type=1326 audit(552.770:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.873221][ T29] audit: type=1326 audit(552.790:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.876964][ T29] audit: type=1326 audit(552.800:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.879720][ T29] audit: type=1326 audit(552.800:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.883400][ T29] audit: type=1326 audit(552.800:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=390 compat=0 ip=0x132970 code=0x7ffc0000 [ 552.888531][ T29] audit: type=1326 audit(552.810:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7794 comm="syz.2.1037" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 553.079341][ T29] audit: type=1400 audit(553.000:1259): avc: denied { execute } for pid=7797 comm="syz.2.1038" path="/205/memory.events.local" dev="tmpfs" ino=1058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 554.406784][ T7815] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1043'. [ 555.066259][ T7828] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1045'. [ 555.748129][ T7830] netlink: 'syz.2.1045': attribute type 10 has an invalid length. [ 555.840689][ T7830] netlink: 'syz.2.1045': attribute type 10 has an invalid length. [ 557.883714][ T7832] netlink: 332 bytes leftover after parsing attributes in process `syz.2.1046'. [ 558.217938][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 558.218525][ T29] audit: type=1400 audit(558.140:1300): avc: denied { create } for pid=7833 comm="syz.2.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 558.238642][ T29] audit: type=1400 audit(558.140:1301): avc: denied { write } for pid=7833 comm="syz.2.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 558.239170][ T29] audit: type=1400 audit(558.160:1302): avc: denied { nlmsg_write } for pid=7833 comm="syz.2.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 559.221269][ T7842] netlink: 'syz.2.1050': attribute type 10 has an invalid length. [ 559.242890][ T29] audit: type=1400 audit(559.160:1303): avc: denied { create } for pid=7840 comm="syz.2.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 559.265871][ T29] audit: type=1400 audit(559.180:1304): avc: denied { setopt } for pid=7840 comm="syz.2.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 559.276966][ T29] audit: type=1400 audit(559.200:1305): avc: denied { write } for pid=7840 comm="syz.2.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 560.269473][ T7851] netlink: 'syz.2.1053': attribute type 4 has an invalid length. [ 560.269850][ T7851] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.1053'. [ 560.571825][ T29] audit: type=1400 audit(560.490:1306): avc: denied { write } for pid=7853 comm="syz.2.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 560.611317][ T29] audit: type=1400 audit(560.530:1307): avc: denied { accept } for pid=7853 comm="syz.2.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 560.616560][ T29] audit: type=1400 audit(560.540:1308): avc: denied { read } for pid=7853 comm="syz.2.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 560.984912][ T29] audit: type=1400 audit(560.900:1309): avc: denied { remount } for pid=7856 comm="syz.2.1055" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 561.339079][ T7859] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1056'. [ 564.099638][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 564.100105][ T29] audit: type=1326 audit(564.010:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7871 comm="syz.2.1060" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.186134][ T29] audit: type=1326 audit(564.110:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1060" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xefa38 code=0x7ffc0000 [ 564.186589][ T29] audit: type=1326 audit(564.110:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1060" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.196051][ T29] audit: type=1326 audit(564.120:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1060" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.378853][ T29] audit: type=1326 audit(566.300:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.391497][ T29] audit: type=1326 audit(566.310:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.396133][ T29] audit: type=1326 audit(566.320:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.397398][ T29] audit: type=1326 audit(566.320:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.399813][ T29] audit: type=1326 audit(566.320:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 566.403052][ T29] audit: type=1326 audit(566.320:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7878 comm="syz.2.1062" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 569.616723][ T7889] netlink: 56 bytes leftover after parsing attributes in process `syz.2.1064'. [ 569.617594][ T7889] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1064'. [ 570.431498][ T7894] wireguard0: entered promiscuous mode [ 570.431765][ T7894] wireguard0: entered allmulticast mode [ 571.241940][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 571.242368][ T29] audit: type=1400 audit(571.160:1373): avc: denied { append } for pid=7902 comm="syz.2.1067" name="event1" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 571.256176][ T7903] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1067'. [ 571.318686][ T7903] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1067'. [ 571.814564][ T7903] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1067'. [ 571.816482][ T7903] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1067'. [ 571.817338][ T7903] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1067'. [ 572.454724][ T7908] netlink: 'syz.2.1068': attribute type 21 has an invalid length. [ 572.455249][ T7908] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1068'. [ 572.455451][ T7908] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1068'. [ 574.824826][ T29] audit: type=1326 audit(574.730:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.825233][ T29] audit: type=1326 audit(574.740:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.825334][ T29] audit: type=1326 audit(574.740:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.827454][ T29] audit: type=1326 audit(574.740:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.828733][ T29] audit: type=1326 audit(574.750:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.830153][ T29] audit: type=1326 audit(574.750:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.832960][ T29] audit: type=1326 audit(574.750:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=148 compat=0 ip=0x132970 code=0x7ffc0000 [ 574.835193][ T29] audit: type=1326 audit(574.750:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7912 comm="syz.2.1070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 575.538318][ T7923] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1073'. [ 577.022974][ T7935] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 579.765545][ T30] INFO: task kworker/1:36:4325 blocked for more than 430 seconds. [ 579.770818][ T30] Not tainted syzkaller #0 [ 579.776680][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 579.777235][ T30] task:kworker/1:36 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 579.779058][ T30] Workqueue: events bpf_prog_free_deferred [ 579.781063][ T30] Call trace: [ 579.782027][ T30] [<81a6391c>] (__schedule) from [<81a648b0>] (schedule+0x2c/0x130) [ 579.783218][ T30] r10:dfc05d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc05d8c r5:8421b000 [ 579.783532][ T30] r4:8421b000 [ 579.789340][ T29] audit: type=1400 audit(579.710:1382): avc: denied { write } for pid=3092 comm="syz-executor" path="pipe:[550]" dev="pipefs" ino=550 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 579.816325][ T30] [<81a64884>] (schedule) from [<81a64c98>] (schedule_preempt_disabled+0x18/0x24) [ 579.816828][ T30] r5:8421b000 r4:8291719c [ 579.816873][ T30] [<81a64c80>] (schedule_preempt_disabled) from [<81a67848>] (__mutex_lock.constprop.0+0x350/0xa24) [ 579.816968][ T30] [<81a674f8>] (__mutex_lock.constprop.0) from [<81a67ff0>] (__mutex_lock_slowpath+0x14/0x18) [ 579.817061][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 [ 579.817086][ T30] r4:00000000 [ 579.817185][ T30] [<81a67fdc>] (__mutex_lock_slowpath) from [<81a68030>] (mutex_lock+0x3c/0x40) [ 579.817261][ T30] [<81a67ff4>] (mutex_lock) from [<804ea354>] (_vm_unmap_aliases+0x68/0x240) [ 579.817330][ T30] [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210) [ 579.817408][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7f340 [ 579.817430][ T30] r4:00000000 [ 579.817447][ T30] [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50) [ 579.817525][ T30] r9:83018605 r8:8421b000 r7:00000000 r6:83018600 r5:00001000 r4:7f037000 [ 579.817546][ T30] [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 579.817616][ T30] r5:00001000 r4:dff97000 [ 579.817634][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 579.817739][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 579.817856][ T30] r5:85baeb8c r4:85b70f80 [ 579.817879][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 579.817963][ T30] r7:ddde3d80 r6:83018600 r5:85baeb8c r4:85b70f80 [ 579.817985][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 579.818069][ T30] r10:61c88647 r9:8421b000 r8:85b70fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 579.818107][ T30] r4:85b70f80 [ 579.818195][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 579.818290][ T30] r10:00000000 r9:85b70f80 r8:80278fec r7:ea579e60 r6:85b7a400 r5:8421b000 [ 579.818313][ T30] r4:00000001 [ 579.818362][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 579.818523][ T30] Exception stack(0xdfc05fb0 to 0xdfc05ff8) [ 579.818721][ T30] 5fa0: 00000000 00000000 00000000 00000000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 579.818782][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 579.818819][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 579.818904][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 579.818928][ T30] r4:85b7f680 [ 579.819711][ T30] INFO: task kworker/1:36:4325 is blocked on a mutex likely owned by task kworker/0:47:4333. [ 579.819828][ T30] task:kworker/0:47 state:R running task stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 579.820085][ T30] Workqueue: events bpf_prog_free_deferred [ 579.820159][ T30] Call trace: [ 579.820192][ T30] [<81a6391c>] (__schedule) from [<81a64ce4>] (preempt_schedule_irq+0x40/0xa8) [ 579.820294][ T30] r10:8280c9b4 r9:83ad8c00 r8:80200c04 r7:dfbfdd54 r6:ffffffff r5:83ad8c00 [ 579.820597][ T30] r4:00000000 [ 579.820831][ T30] [<81a64ca4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 579.820907][ T30] Exception stack(0xdfbfdd20 to 0xdfbfdd68) [ 579.820950][ T30] dd20: b3da2000 eba07000 00000001 80239bf8 7f029000 00000001 82acb1c4 82aca5a0 [ 579.820989][ T30] dd40: 7f029000 eba07000 8280c9b4 dfbfdd9c dfbfdda0 dfbfdd70 80230af0 80239c10 [ 579.821015][ T30] dd60: 80000013 ffffffff [ 579.821067][ T30] r5:80000013 r4:80239c10 [ 579.821087][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea118>] (__purge_vmap_area_lazy+0x284/0x458) [ 579.821160][ T30] r4:82acb1e4 [ 579.821177][ T30] [<804e9e94>] (__purge_vmap_area_lazy) from [<804ea4d0>] (_vm_unmap_aliases+0x1e4/0x240) [ 579.821264][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfbfddc0 r5:dfbfde08 [ 579.821287][ T30] r4:dfbfddc0 [ 579.821304][ T30] [<804ea2ec>] (_vm_unmap_aliases) from [<804ee134>] (vfree+0x16c/0x210) [ 579.821379][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a44000 [ 579.821401][ T30] r4:00000000 [ 579.821452][ T30] [<804edfc8>] (vfree) from [<80559050>] (execmem_free+0x30/0x50) [ 579.821539][ T30] r9:83018405 r8:83ad8c00 r7:00000000 r6:83018400 r5:00001000 r4:7f039000 [ 579.821560][ T30] [<80559020>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 579.821632][ T30] r5:00001000 r4:dfff1000 [ 579.821650][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 579.821714][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 579.822026][ T30] r5:85badb8c r4:85b7a780 [ 579.822052][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 579.822242][ T30] r7:dddcfd80 r6:83018400 r5:85badb8c r4:85b7a780 [ 579.822329][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 579.822477][ T30] r10:61c88647 r9:83ad8c00 r8:85b7a7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 579.822506][ T30] r4:85b7a780 [ 579.822520][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 579.822598][ T30] r10:00000000 r9:85b7a780 r8:80278fec r7:dfb91e60 r6:85b7a580 r5:83ad8c00 [ 579.822619][ T30] r4:00000001 [ 579.822633][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 579.822963][ T30] Exception stack(0xdfbfdfb0 to 0xdfbfdff8) [ 579.823011][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 579.823048][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 579.823271][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 579.823340][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 579.823364][ T30] r4:85a44480 [ 579.849205][ T30] NMI backtrace for cpu 1 [ 579.849622][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 579.849781][ T30] Hardware name: ARM-Versatile Express [ 579.849885][ T30] Call trace: [ 579.849969][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 579.850091][ T30] r7:00000000 r6:00000013 r5:60000093 r4:82252568 [ 579.850110][ T30] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 579.850171][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 579.850242][ T30] r5:00000001 r4:00000001 [ 579.850277][ T30] [<8021f8bc>] (dump_stack) from [<81a4d534>] (nmi_cpu_backtrace+0x160/0x17c) [ 579.850352][ T30] [<81a4d3d4>] (nmi_cpu_backtrace) from [<81a4d680>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 579.850422][ T30] r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [ 579.850438][ T30] [<81a4d550>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 579.850520][ T30] r9:8281ba28 r8:8280c810 r7:00006d41 r6:00007ca0 r5:82abf7d4 r4:86a5140c [ 579.850539][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850) [ 579.850609][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 579.850691][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 579.850712][ T30] r4:00000001 [ 579.850727][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 579.850778][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 579.850815][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 579.850871][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 579.850909][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 579.850949][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 579.850969][ T30] r4:833cb7c0 [ 579.851193][ T30] Sending NMI from CPU 1 to CPUs 0: [ 579.852433][ C0] NMI backtrace for cpu 0 [ 579.852608][ C0] CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 579.852669][ C0] Hardware name: ARM-Versatile Express [ 579.852721][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 579.852847][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 579.852914][ C0] pc : [<81a6d784>] lr : [<80a8f308>] psr: 60000113 [ 579.852956][ C0] sp : eae4deb0 ip : eae4dec0 fp : eae4debc [ 579.853010][ C0] r10: 82959594 r9 : 00000000 r8 : 00000000 [ 579.853056][ C0] r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 [ 579.853104][ C0] r3 : 00000ac6 r2 : 00000000 r1 : 60000113 r0 : 84133440 [ 579.853237][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 579.853321][ C0] Control: 30c5387d Table: 85a4b640 DAC: fffffffd [ 579.853388][ C0] Call trace: [ 579.853432][ C0] [<81a6d75c>] (_raw_spin_unlock_irqrestore) from [<80a8f308>] (pl011_console_device_unlock+0x20/0x24) [ 579.853502][ C0] [<80a8f2e8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100) [ 579.853563][ C0] [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4) [ 579.853633][ C0] r6:8280c690 r5:84b28000 r4:829594f8 [ 579.853651][ C0] [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 579.853726][ C0] r10:00000000 r9:829594f8 r8:802e37e0 r7:846e9000 r6:846e9000 r5:84b28000 [ 579.853749][ C0] r4:00000001 [ 579.853879][ C0] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 579.853948][ C0] Exception stack(0xeae4dfb0 to 0xeae4dff8) [ 579.853989][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 579.854025][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 579.854057][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 579.854095][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 579.854115][ C0] r4:84b78a40 [ 579.895945][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 579.904217][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 579.904862][ T30] Hardware name: ARM-Versatile Express [ 579.909952][ T30] Call trace: [ 579.915342][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 579.922840][ T30] r7:8225328c r6:8321c800 r5:00000000 r4:82252568 [ 579.924329][ T30] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 579.928066][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 579.939412][ T30] r5:00000000 r4:82a78d18 [ 579.940407][ T30] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 579.941616][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 579.944326][ T30] r7:00006d41 [ 579.944525][ T30] [<80202800>] (panic) from [<8037f948>] (watchdog+0x410/0x850) [ 579.944926][ T30] r3:00000001 r2:00000000 r1:00000000 r0:8225328c [ 579.947344][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 579.954498][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 579.960411][ T30] r4:00000001 [ 579.964236][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 579.984368][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 579.991132][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 579.994319][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 579.997037][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 580.004424][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 580.013782][ T30] r4:833cb7c0 [ 580.019442][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:32:44 Registers: info registers vcpu 0 CPU#0 R00=84133440 R01=0000000d R02=eae47000 R03=eae47018 R04=84223035 R05=84133440 R06=80a8f244 R07=84223035 R08=80a8f244 R09=00000036 R10=00000683 R11=eae4de24 R12=00000002 R13=eae4de18 R14=829594c4 R15=80a8f254 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82252568 R02=00000001 R03=81a615f8 R04=00000006 R05=828f7e48 R06=00000000 R07=828f7e40 R08=84b28c00 R09=00000028 R10=828f7e48 R11=df805ee4 R12=df805ee8 R13=df805ed8 R14=8033dd04 R15=81a61608 PSR=20010093 --C- A S svc32 s00=00000000 s01=00000095 d00=0000009500000000 s02=00000000 s03=2a4faf3f d01=2a4faf3f00000000 s04=65686361 s05=6572665f d02=6572665f65686361 s06=90030065 s07=00080656 d03=0008065690030065 s08=03010000 s09=08005698 d04=0800569803010000 s10=56a00300 s11=d8001000 d05=d800100056a00300 s12=00060101 s13=80022208 d06=8002220800060101 s14=20080056 s15=080a8003 d07=080a800320080056 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=02b00300 s33=03000800 d16=0300080002b00300 s34=080002b8 s35=02c00300 d17=02c00300080002b8 s36=ffffff04 s37=d00303ff d18=d00303ffffffff04 s38=00080002 s39=0002d803 d19=0002d80300080002 s40=e0030008 s41=ffdf0802 d20=ffdf0802e0030008 s42=ffffffff s43=01ffffff d21=01ffffffffffffff s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=e82a4c4a s53=291b8d43 d26=291b8d43e82a4c4a s54=e7bfa02c s55=65bf2384 d27=65bf2384e7bfa02c s56=1a25ca7c s57=4c57a814 d28=4c57a8141a25ca7c s58=503aa03b s59=6ef93e52 d29=6ef93e52503aa03b s60=a98a1c28 s61=b6a00c2b d30=b6a00c2ba98a1c28 s62=9e29dbfd s63=5d1af476 d31=5d1af4769e29dbfd FPSCR: 00000000