last executing test programs: 39.769822465s ago: executing program 1 (id=479): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x2a8, 0x65, 0x400, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_matchall={{0xd}, {0xd8, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x8}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x3, 0xc}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}, @TCA_MATCHALL_ACT={0xb4, 0x2, [@m_nat={0xb0, 0xd, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x4, 0x2, 0x2, 0x5, 0x3}, @loopback, @multicast1}}]}, {0x5d, 0x6, "1166dc37c8f33a6b5954a31336bb55136e75f1c7a664d1848d33e74a4e611796b35f74f00d7d6f2b27c1546b714e7b621234fe28bf07f51890014cf376214b4cb8253768a42ffe50a4c695315966d3cba8c59d4e4ad6fcbd3c"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}]}}, @TCA_CHAIN={0x8}, @TCA_RATE={0x6}, @filter_kind_options=@f_route={{0xa}, {0x178, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_ACT={0x10c, 0x6, [@m_connmark={0x108, 0x0, 0x0, 0x0, {{0xd}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x0, 0x5}}}, @TCA_CONNMARK_PARMS={0x1c}, @TCA_CONNMARK_PARMS={0x1c}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x1}}}, @TCA_CONNMARK_PARMS={0x1c}]}, {0x2d, 0x6, "91a991d04aa8cb411880b88050856c4a5b99aafe5cf70a535f4e162db7c30535ebf5e9ab54237bf6d2"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_ACT={0x60, 0x6, [@m_nat={0x2c, 0x0, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x2a8}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x334}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 39.449270574s ago: executing program 1 (id=480): sched_setscheduler(0x0, 0x1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000020000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000640)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$xdp(0xffffffffffffffff, 0x0, 0x40054) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000080)=0xf3e, 0x62) sendto$packet(r5, &(0x7f00000000c0)="3f033608260812002c001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) 22.002316975s ago: executing program 1 (id=482): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000040)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc0105303, &(0x7f0000000080)={{0x2}}) tkill(r2, 0x7) 20.427272604s ago: executing program 0 (id=486): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001500)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade", 0x55}], 0x1}, 0x0) 19.989908295s ago: executing program 0 (id=487): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_open_dev$evdev(0x0, 0x0, 0x802) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r5}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x14, r7, 0x601}, 0x14}}, 0x0) 18.969942952s ago: executing program 1 (id=488): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) 4.849606356s ago: executing program 0 (id=489): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000280)=0x3) 4.546678283s ago: executing program 1 (id=490): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x800, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_COVERAGE_CLASS={0x5}, @NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0x8c}]}, 0x24}}, 0x80) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000200)={0x0, 0xffffffffffffff8c, &(0x7f0000000b00)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}}, 0x28}}, 0x0) 4.165432734s ago: executing program 1 (id=491): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) sendfile(r7, r6, 0x0, 0x4) quotactl$Q_QUOTAOFF(0xffffffff80000300, &(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x73, 0x101201) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000040)='xfrm0\x00', 0x10) 2.268185597s ago: executing program 0 (id=492): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2, 0x103) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) acct(&(0x7f00000001c0)='./file0\x00') acct(0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x0) acct(0x0) 508.066925ms ago: executing program 0 (id=493): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400"], 0x7c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x12, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x14, 0xfffffffffffffffe}, 0x42) 0s ago: executing program 0 (id=494): r0 = userfaultfd(0x1) unshare(0x2040400) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c07000/0x3000)=nil, &(0x7f0000508000/0x4000)=nil, 0x3000, 0x2}) kernel console output (not intermixed with test programs): [ 51.646611][ T31] audit: type=1400 audit(51.580:68): avc: denied { read write } for pid=3102 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.659133][ T31] audit: type=1400 audit(51.590:69): avc: denied { open } for pid=3102 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:61864' (ED25519) to the list of known hosts. [ 61.082676][ T31] audit: type=1400 audit(61.000:70): avc: denied { name_bind } for pid=3103 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.107914][ T31] audit: type=1400 audit(64.040:71): avc: denied { execute } for pid=3105 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.153677][ T31] audit: type=1400 audit(64.090:72): avc: denied { execute_no_trans } for pid=3105 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.502930][ T31] audit: type=1400 audit(67.440:73): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.505755][ T31] audit: type=1400 audit(67.440:74): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.524815][ T3105] cgroup: Unknown subsys name 'net' [ 67.534969][ T31] audit: type=1400 audit(67.470:75): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.808242][ T3105] cgroup: Unknown subsys name 'hugetlb' [ 67.810089][ T3105] cgroup: Unknown subsys name 'rlimit' [ 68.057846][ T31] audit: type=1400 audit(67.990:76): avc: denied { setattr } for pid=3105 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.059145][ T31] audit: type=1400 audit(68.000:77): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.059881][ T31] audit: type=1400 audit(68.000:78): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.284894][ T3107] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.288850][ T31] audit: type=1400 audit(68.220:79): avc: denied { relabelto } for pid=3107 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.295343][ T31] audit: type=1400 audit(68.230:80): avc: denied { write } for pid=3107 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.325502][ T31] audit: type=1400 audit(68.260:81): avc: denied { read } for pid=3105 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.330189][ T31] audit: type=1400 audit(68.270:82): avc: denied { open } for pid=3105 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.943186][ T3105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.893101][ T31] audit: type=1400 audit(77.830:83): avc: denied { execmem } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.977262][ T31] audit: type=1400 audit(77.900:84): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 77.978283][ T31] audit: type=1400 audit(77.900:85): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 77.979020][ T31] audit: type=1400 audit(77.910:86): avc: denied { read } for pid=3110 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.979774][ T31] audit: type=1400 audit(77.910:87): avc: denied { open } for pid=3110 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.980922][ T31] audit: type=1400 audit(77.910:88): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.002345][ T31] audit: type=1400 audit(77.940:89): avc: denied { module_request } for pid=3111 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.098357][ T31] audit: type=1400 audit(78.040:90): avc: denied { sys_module } for pid=3110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.787317][ T31] audit: type=1400 audit(78.720:91): avc: denied { ioctl } for pid=3110 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.706372][ T3110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.720559][ T3110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.089322][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.101378][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.642427][ T3110] hsr_slave_0: entered promiscuous mode [ 80.649811][ T3110] hsr_slave_1: entered promiscuous mode [ 80.760989][ T3111] hsr_slave_0: entered promiscuous mode [ 80.762861][ T3111] hsr_slave_1: entered promiscuous mode [ 80.764230][ T3111] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.764508][ T3111] Cannot create hsr debugfs directory [ 81.106551][ T31] audit: type=1400 audit(81.040:92): avc: denied { create } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.118189][ T3110] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.145952][ T3110] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.169495][ T3110] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.182601][ T3110] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.192072][ T3111] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.217233][ T3111] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.231322][ T3111] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.242196][ T3111] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.839145][ T3110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.974906][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.363602][ T3111] veth0_vlan: entered promiscuous mode [ 84.377648][ T3111] veth1_vlan: entered promiscuous mode [ 84.412224][ T3111] veth0_macvtap: entered promiscuous mode [ 84.418765][ T3111] veth1_macvtap: entered promiscuous mode [ 84.482139][ T3111] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.482594][ T3111] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.482793][ T3111] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.482985][ T3111] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.490755][ T3110] veth0_vlan: entered promiscuous mode [ 84.550592][ T3110] veth1_vlan: entered promiscuous mode [ 84.579790][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 84.579901][ T31] audit: type=1400 audit(84.520:95): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.581028][ T31] audit: type=1400 audit(84.520:96): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.0TSfUy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.581885][ T31] audit: type=1400 audit(84.520:97): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.603374][ T31] audit: type=1400 audit(84.540:98): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.610939][ T31] audit: type=1400 audit(84.550:99): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.611846][ T31] audit: type=1400 audit(84.550:100): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.629090][ T3110] veth0_macvtap: entered promiscuous mode [ 84.639691][ T3110] veth1_macvtap: entered promiscuous mode [ 84.701807][ T3110] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.702792][ T3110] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.703341][ T3110] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.703577][ T3110] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.817710][ T31] audit: type=1400 audit(84.750:101): avc: denied { read write } for pid=3111 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 84.818938][ T31] audit: type=1400 audit(84.750:102): avc: denied { open } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 84.819897][ T31] audit: type=1400 audit(84.750:103): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 84.934272][ T31] audit: type=1400 audit(84.870:104): avc: denied { prog_load } for pid=3789 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 85.288324][ T2904] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 85.496995][ C1] hrtimer: interrupt took 876608 ns [ 85.594203][ T2904] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 85.594695][ T2904] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 85.595005][ T2904] usb 2-1: Product: syz [ 85.595288][ T2904] usb 2-1: Manufacturer: syz [ 85.595578][ T2904] usb 2-1: SerialNumber: syz [ 94.367771][ T117] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 94.573410][ T117] usb 1-1: Using ep0 maxpacket: 8 [ 94.606280][ T117] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 94.610294][ T117] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 94.610851][ T117] usb 1-1: New USB device found, idVendor=06a3, idProduct=0ccd, bcdDevice= 0.00 [ 94.611285][ T117] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 94.624685][ T117] usb 1-1: config 0 descriptor?? [ 95.163627][ T117] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 95.179269][ T117] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 95.180153][ T117] saitek 0003:06A3:0CCD.0001: item fetching failed at offset 2/11 [ 95.180975][ T117] saitek 0003:06A3:0CCD.0001: parse failed [ 95.181423][ T117] saitek 0003:06A3:0CCD.0001: probe with driver saitek failed with error -22 [ 95.218873][ T117] usb 2-1: USB disconnect, device number 2 [ 95.323100][ T50] usb 1-1: USB disconnect, device number 2 [ 95.386142][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 95.386231][ T31] audit: type=1400 audit(95.320:113): avc: denied { write } for pid=3840 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.717793][ T31] audit: type=1400 audit(95.650:114): avc: denied { mounton } for pid=3846 comm="syz.0.14" path="/11/file0" dev="tmpfs" ino=72 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 96.587227][ T31] audit: type=1400 audit(96.520:115): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 98.491851][ T31] audit: type=1400 audit(98.430:116): avc: denied { map_create } for pid=3866 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.499442][ T31] audit: type=1400 audit(98.440:117): avc: denied { map_read map_write } for pid=3866 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.557267][ T31] audit: type=1400 audit(98.480:118): avc: denied { create } for pid=3866 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.565231][ T31] audit: type=1400 audit(98.500:119): avc: denied { write } for pid=3866 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.638215][ T3874] input: syz0 as /devices/virtual/input/input3 [ 102.862666][ T3878] ptrace attach of "/syz-executor exec"[3110] was attempted by "/syz-executor exec"[3878] [ 113.024875][ T3882] block device autoloading is deprecated and will be removed. [ 121.291730][ T31] audit: type=1400 audit(121.230:120): avc: denied { create } for pid=3897 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 121.427208][ T31] audit: type=1400 audit(121.350:121): avc: denied { setopt } for pid=3897 comm="syz.0.29" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.875310][ T3902] netlink: 24 bytes leftover after parsing attributes in process `syz.1.30'. [ 131.146444][ T3915] Driver unsupported XDP return value 0 on prog (id 10) dev N/A, expect packet loss! [ 134.970734][ T3919] netlink: 28 bytes leftover after parsing attributes in process `syz.0.36'. [ 134.975420][ T3919] netlink: 28 bytes leftover after parsing attributes in process `syz.0.36'. [ 155.285106][ T3932] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.331503][ T3932] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.133178][ T3932] hsr_slave_0: entered promiscuous mode [ 159.139589][ T3932] hsr_slave_1: entered promiscuous mode [ 159.146298][ T3932] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 159.147797][ T3932] Cannot create hsr debugfs directory [ 160.018771][ T3932] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.110845][ T3932] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.202180][ T3932] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.318480][ T3932] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.713688][ T3932] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 160.771879][ T3932] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 160.822744][ T3932] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 161.018943][ T3932] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 163.220596][ T3932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.875130][ T3932] veth0_vlan: entered promiscuous mode [ 168.895202][ T3932] veth1_vlan: entered promiscuous mode [ 168.962097][ T3932] veth0_macvtap: entered promiscuous mode [ 168.970944][ T3932] veth1_macvtap: entered promiscuous mode [ 169.012635][ T3932] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.012963][ T3932] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.013164][ T3932] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 169.013344][ T3932] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.139257][ T31] audit: type=1400 audit(175.080:122): avc: denied { create } for pid=4298 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 175.140310][ T31] audit: type=1400 audit(175.080:123): avc: denied { write } for pid=4298 comm="syz.0.47" path="socket:[3664]" dev="sockfs" ino=3664 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 175.141109][ T31] audit: type=1400 audit(175.080:124): avc: denied { nlmsg_read } for pid=4298 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 196.417063][ T31] audit: type=1326 audit(196.310:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 196.427406][ T31] audit: type=1326 audit(196.350:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 196.457498][ T31] audit: type=1326 audit(196.380:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 196.458504][ T31] audit: type=1326 audit(196.380:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 196.461049][ T31] audit: type=1326 audit(196.400:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 197.009226][ T2904] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 197.364153][ T2904] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 197.387450][ T2904] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 197.388057][ T2904] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 197.388758][ T2904] usb 1-1: New USB device found, idVendor=046d, idProduct=c293, bcdDevice= 0.00 [ 197.389082][ T2904] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 197.398815][ T2904] usb 1-1: config 0 descriptor?? [ 202.718811][ T2904] usbhid 1-1:0.0: can't add hid device: -32 [ 202.719591][ T2904] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 204.749385][ T31] audit: type=1400 audit(204.690:130): avc: denied { create } for pid=4318 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 204.767570][ T31] audit: type=1400 audit(204.700:131): avc: denied { ioctl } for pid=4318 comm="syz.0.53" path="socket:[2479]" dev="sockfs" ino=2479 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 204.770783][ T31] audit: type=1400 audit(204.710:132): avc: denied { setopt } for pid=4318 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 204.801726][ T31] audit: type=1400 audit(204.740:133): avc: denied { write } for pid=4318 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 207.485383][ T1062] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 207.495303][ T1062] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 207.506044][ T1062] bond0 (unregistering): Released all slaves [ 207.603204][ T1062] hsr_slave_0: left promiscuous mode [ 207.606101][ T1062] hsr_slave_1: left promiscuous mode [ 207.615162][ T1062] veth1_macvtap: left promiscuous mode [ 207.615663][ T1062] veth0_macvtap: left promiscuous mode [ 207.615989][ T1062] veth1_vlan: left promiscuous mode [ 207.616347][ T1062] veth0_vlan: left promiscuous mode [ 212.872521][ T3788] usb 1-1: USB disconnect, device number 3 [ 217.201861][ T31] audit: type=1400 audit(217.140:134): avc: denied { bind } for pid=4384 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 217.507745][ T31] audit: type=1400 audit(217.430:135): avc: denied { create } for pid=4389 comm="syz.0.68" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 219.089860][ T31] audit: type=1400 audit(219.020:136): avc: denied { create } for pid=4405 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 223.766295][ T31] audit: type=1400 audit(223.700:137): avc: denied { create } for pid=4459 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.777403][ T31] audit: type=1400 audit(223.710:138): avc: denied { write } for pid=4459 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.778984][ T31] audit: type=1400 audit(223.710:139): avc: denied { shutdown } for pid=4459 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.873842][ T31] audit: type=1400 audit(223.810:140): avc: denied { read } for pid=4462 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.880160][ T31] audit: type=1400 audit(223.820:141): avc: denied { setopt } for pid=4462 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.981969][ T31] audit: type=1400 audit(223.920:142): avc: denied { connect } for pid=4465 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.347688][ T31] audit: type=1400 audit(224.280:143): avc: denied { name_connect } for pid=4482 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 224.851763][ T31] audit: type=1400 audit(224.790:144): avc: denied { name_connect } for pid=4482 comm="syz.0.105" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 225.362106][ T31] audit: type=1400 audit(225.300:145): avc: denied { read } for pid=4482 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 233.258924][ T4509] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4509 comm=syz.0.112 [ 236.971717][ T4516] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4516 comm=syz.1.115 [ 237.457354][ T31] audit: type=1400 audit(237.380:146): avc: denied { ioctl } for pid=4517 comm="syz.1.116" path="socket:[2729]" dev="sockfs" ino=2729 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.377726][ T31] audit: type=1400 audit(238.300:147): avc: denied { name_bind } for pid=4522 comm="syz.1.117" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 238.392701][ T31] audit: type=1400 audit(238.320:148): avc: denied { node_bind } for pid=4522 comm="syz.1.117" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 238.406302][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 238.879445][ T31] audit: type=1400 audit(238.820:149): avc: denied { create } for pid=4524 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 238.892971][ T31] audit: type=1400 audit(238.830:150): avc: denied { ioctl } for pid=4524 comm="syz.1.118" path="socket:[3995]" dev="sockfs" ino=3995 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 258.248610][ T31] audit: type=1400 audit(258.180:151): avc: denied { name_bind } for pid=4607 comm="syz.1.141" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 258.456298][ T31] audit: type=1400 audit(258.390:152): avc: denied { getopt } for pid=4610 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 258.731170][ T31] audit: type=1400 audit(258.670:153): avc: denied { bind } for pid=4616 comm="syz.1.145" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 258.732678][ T31] audit: type=1400 audit(258.670:154): avc: denied { node_bind } for pid=4616 comm="syz.1.145" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 258.736364][ T31] audit: type=1400 audit(258.670:155): avc: denied { connect } for pid=4616 comm="syz.1.145" laddr=172.20.20.170 lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 259.491759][ T31] audit: type=1400 audit(259.430:156): avc: denied { name_bind } for pid=4621 comm="syz.1.147" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 259.510922][ T31] audit: type=1326 audit(259.450:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.147" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x0 [ 267.030238][ T4645] all: renamed from team_slave_0 [ 273.077182][ T31] audit: type=1400 audit(273.010:158): avc: denied { mount } for pid=4646 comm="syz.1.153" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 273.168475][ T31] audit: type=1400 audit(273.090:159): avc: denied { remount } for pid=4646 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 273.342178][ T31] audit: type=1400 audit(273.280:160): avc: denied { write } for pid=4646 comm="syz.1.153" name="vlan0" dev="proc" ino=4026533102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 285.876430][ T31] audit: type=1326 audit(285.810:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.881593][ T31] audit: type=1326 audit(285.820:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.894366][ T31] audit: type=1326 audit(285.830:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.913489][ T31] audit: type=1326 audit(285.850:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.914420][ T31] audit: type=1326 audit(285.850:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.928630][ T31] audit: type=1326 audit(285.860:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.931654][ T31] audit: type=1326 audit(285.870:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.932563][ T31] audit: type=1326 audit(285.870:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.942877][ T31] audit: type=1326 audit(285.870:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 285.943806][ T31] audit: type=1326 audit(285.870:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.160" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 286.988084][ T4680] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.163'. [ 289.171615][ T4697] netlink: 12 bytes leftover after parsing attributes in process `syz.1.169'. [ 289.484721][ T4703] syz.1.171[4703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.485194][ T4703] syz.1.171[4703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.903670][ T4714] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.175'. [ 290.909916][ T4712] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.175'. [ 290.997662][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 290.997776][ T31] audit: type=1400 audit(290.930:213): avc: denied { append } for pid=4711 comm="syz.0.175" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 291.009264][ T31] audit: type=1400 audit(290.950:214): avc: denied { getopt } for pid=4711 comm="syz.0.175" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.798563][ T4719] syz.0.177 uses obsolete (PF_INET,SOCK_PACKET) [ 322.907487][ T31] audit: type=1400 audit(322.850:215): avc: denied { getopt } for pid=4845 comm="syz.0.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 325.897056][ T31] audit: type=1400 audit(325.830:216): avc: denied { create } for pid=4858 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.907860][ T31] audit: type=1400 audit(325.840:217): avc: denied { ioctl } for pid=4858 comm="syz.0.223" path="socket:[5319]" dev="sockfs" ino=5319 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.909149][ T31] audit: type=1400 audit(325.840:218): avc: denied { setopt } for pid=4858 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.909745][ T31] audit: type=1400 audit(325.840:219): avc: denied { create } for pid=4858 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 326.167644][ T31] audit: type=1400 audit(326.100:220): avc: denied { bind } for pid=4858 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 326.168596][ T31] audit: type=1400 audit(326.100:221): avc: denied { write } for pid=4858 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 328.457122][ C0] vcan0: j1939_tp_rxtimer: 0x850e1e00: rx timeout, send abort [ 328.458597][ C0] vcan0: j1939_tp_rxtimer: 0x850e1200: rx timeout, send abort [ 328.459883][ C0] vcan0: j1939_xtp_rx_abort_one: 0x850e1e00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 328.461670][ C0] vcan0: j1939_xtp_rx_abort_one: 0x850e1200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 328.951768][ T31] audit: type=1400 audit(328.890:222): avc: denied { bind } for pid=4864 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 328.952549][ T31] audit: type=1400 audit(328.890:223): avc: denied { name_bind } for pid=4864 comm="syz.0.225" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 328.953340][ T31] audit: type=1400 audit(328.890:224): avc: denied { node_bind } for pid=4864 comm="syz.0.225" saddr=fe88::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 328.991663][ T31] audit: type=1400 audit(328.930:225): avc: denied { bind } for pid=4864 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.014234][ T31] audit: type=1400 audit(328.950:226): avc: denied { setopt } for pid=4864 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.767490][ T50] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 329.957443][ T50] usb 1-1: Using ep0 maxpacket: 16 [ 329.972157][ T50] usb 1-1: config 0 interface 0 altsetting 44 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 329.972735][ T50] usb 1-1: config 0 interface 0 altsetting 44 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 329.973230][ T50] usb 1-1: config 0 interface 0 has no altsetting 0 [ 330.021355][ T50] usb 1-1: New USB device found, idVendor=134c, idProduct=0002, bcdDevice=ec.7e [ 330.022213][ T50] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 330.022541][ T50] usb 1-1: Product: syz [ 330.022732][ T50] usb 1-1: Manufacturer: syz [ 330.022928][ T50] usb 1-1: SerialNumber: syz [ 330.088876][ T50] usb 1-1: config 0 descriptor?? [ 330.101611][ T50] input: syz syz as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input4 [ 330.312876][ T50] usb 1-1: USB disconnect, device number 4 [ 337.118614][ C0] vcan0: j1939_tp_rxtimer: 0x850e1200: rx timeout, send abort [ 337.119967][ C0] vcan0: j1939_tp_rxtimer: 0x850e1e00: rx timeout, send abort [ 337.122183][ C0] vcan0: j1939_xtp_rx_abort_one: 0x850e1200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 337.124863][ C0] vcan0: j1939_xtp_rx_abort_one: 0x850e1e00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 339.250538][ C1] vcan0: j1939_tp_rxtimer: 0x850fc200: rx timeout, send abort [ 339.251500][ C1] vcan0: j1939_tp_rxtimer: 0x850fc600: rx timeout, send abort [ 339.252069][ C1] vcan0: j1939_xtp_rx_abort_one: 0x850fc200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 339.252800][ C1] vcan0: j1939_xtp_rx_abort_one: 0x850fc600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 340.090318][ T4916] netlink: 4 bytes leftover after parsing attributes in process `syz.1.237'. [ 344.010839][ T4940] tc_dump_action: action bad kind [ 344.110061][ T4940] random: crng reseeded on system resumption [ 359.878705][ T31] audit: type=1400 audit(359.820:227): avc: denied { create } for pid=4944 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 359.890628][ T31] audit: type=1400 audit(359.830:228): avc: denied { write } for pid=4944 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 363.017871][ T31] audit: type=1400 audit(362.950:229): avc: denied { connect } for pid=4951 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 363.988814][ T3920] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 364.239033][ T3920] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 364.242273][ T3920] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 364.246537][ T3920] usb 1-1: New USB device found, idVendor=6666, idProduct=8801, bcdDevice= 0.00 [ 364.253799][ T3920] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 364.314818][ T3920] usb 1-1: config 0 descriptor?? [ 367.502756][ T3920] smartjoyplus 0003:6666:8801.0002: unknown main item tag 0x0 [ 367.505248][ T3920] smartjoyplus 0003:6666:8801.0002: ignoring exceeding usage max [ 367.518128][ T3920] smartjoyplus 0003:6666:8801.0002: usage index exceeded [ 367.518734][ T3920] smartjoyplus 0003:6666:8801.0002: item 0 0 2 0 parsing failed [ 367.519088][ T3920] smartjoyplus 0003:6666:8801.0002: parse failed [ 367.520559][ T3920] smartjoyplus 0003:6666:8801.0002: probe with driver smartjoyplus failed with error -22 [ 367.655980][ T3788] usb 1-1: USB disconnect, device number 5 [ 386.727486][ T31] audit: type=1400 audit(386.660:230): avc: denied { bind } for pid=5002 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 387.346217][ T5015] netlink: 4 bytes leftover after parsing attributes in process `syz.0.267'. [ 387.963271][ T5036] netlink: 4 bytes leftover after parsing attributes in process `syz.1.275'. [ 389.066244][ T5059] netlink: 4 bytes leftover after parsing attributes in process `syz.1.283'. [ 390.338126][ T31] audit: type=1400 audit(902.277:231): avc: denied { setopt } for pid=5085 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 390.342800][ T31] audit: type=1400 audit(902.277:232): avc: denied { write } for pid=5085 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 390.343593][ T31] audit: type=1400 audit(902.277:233): avc: denied { nlmsg_write } for pid=5085 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 392.357732][ T5091] netlink: 4 bytes leftover after parsing attributes in process `syz.0.293'. [ 392.769034][ T31] audit: type=1326 audit(904.697:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.0.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 392.769968][ T31] audit: type=1326 audit(904.697:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.0.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 392.770947][ T31] audit: type=1326 audit(904.697:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.0.294" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 392.773313][ T31] audit: type=1326 audit(904.697:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.0.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 392.776099][ T31] audit: type=1326 audit(904.697:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.0.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 393.136016][ T31] audit: type=1400 audit(905.067:239): avc: denied { watch watch_reads } for pid=5099 comm="syz.0.295" path="/proc/374" dev="proc" ino=4676 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 393.447748][ T31] audit: type=1326 audit(905.377:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 393.450058][ T31] audit: type=1326 audit(905.387:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 393.452708][ T31] audit: type=1326 audit(905.387:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 393.477396][ T31] audit: type=1326 audit(905.387:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=361 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 394.448646][ T5110] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 395.178848][ T5114] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 398.937905][ T5141] netlink: 4 bytes leftover after parsing attributes in process `syz.0.309'. [ 404.332627][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 404.332705][ T31] audit: type=1400 audit(916.267:337): avc: denied { relabelfrom } for pid=5153 comm="syz.0.314" name="UNIX-STREAM" dev="sockfs" ino=5674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 404.333844][ T5154] SELinux: Context *)&^]* is not valid (left unmapped). [ 404.334277][ T31] audit: type=1400 audit(916.267:338): avc: denied { relabelto } for pid=5153 comm="syz.0.314" name="UNIX-STREAM" dev="sockfs" ino=5674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=unix_stream_socket permissive=1 trawcon="*)&^]*" [ 404.469997][ T5156] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 404.479987][ T31] audit: type=1326 audit(916.417:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.491571][ T31] audit: type=1326 audit(916.417:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.492924][ T31] audit: type=1326 audit(916.427:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.497323][ T31] audit: type=1326 audit(916.427:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.512020][ T31] audit: type=1326 audit(916.447:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.513245][ T31] audit: type=1326 audit(916.447:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.530327][ T31] audit: type=1326 audit(916.457:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 404.531730][ T31] audit: type=1326 audit(916.467:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 406.602235][ T5169] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 411.797230][ T5157] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 411.977290][ T5157] usb 1-1: Using ep0 maxpacket: 32 [ 411.990418][ T5157] usb 1-1: config 1 interface 0 altsetting 1 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 411.991029][ T5157] usb 1-1: config 1 interface 0 has no altsetting 0 [ 412.034387][ T5157] usb 1-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice= 0.40 [ 412.034850][ T5157] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 412.035099][ T5157] usb 1-1: Manufacturer: 㠊 [ 412.035265][ T5157] usb 1-1: SerialNumber: ࠠ [ 417.145946][ T5157] usbhid 1-1:1.0: can't add hid device: -32 [ 417.147382][ T5157] usbhid 1-1:1.0: probe with driver usbhid failed with error -32 [ 434.715745][ T8] usb 1-1: USB disconnect, device number 6 [ 439.952547][ T5231] netlink: 4 bytes leftover after parsing attributes in process `syz.0.334'. [ 440.701938][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 440.702037][ T31] audit: type=1400 audit(952.637:356): avc: denied { ioctl } for pid=5237 comm="syz.0.335" path="socket:[5779]" dev="sockfs" ino=5779 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 445.637500][ T5247] syzkaller1: entered promiscuous mode [ 445.639870][ T5247] syzkaller1: entered allmulticast mode [ 447.362059][ T31] audit: type=1400 audit(959.297:357): avc: denied { sqpoll } for pid=5256 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 455.399347][ T5197] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 455.606134][ T5197] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 455.607571][ T5197] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 455.608044][ T5197] usb 1-1: New USB device found, idVendor=044f, idProduct=b65d, bcdDevice= 0.00 [ 455.608408][ T5197] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 455.613760][ T5197] usb 1-1: config 0 descriptor?? [ 456.084554][ T5197] hid-thrustmaster 0003:044F:B65D.0003: unknown main item tag 0x0 [ 456.097214][ T5197] hid-thrustmaster 0003:044F:B65D.0003: unknown main item tag 0x0 [ 456.097623][ T5197] hid-thrustmaster 0003:044F:B65D.0003: unknown main item tag 0x0 [ 456.098086][ T5197] hid-thrustmaster 0003:044F:B65D.0003: unknown main item tag 0x0 [ 456.100512][ T5197] hid-thrustmaster 0003:044F:B65D.0003: unknown main item tag 0x0 [ 456.118659][ T5197] hid-thrustmaster 0003:044F:B65D.0003: hidraw0: USB HID v0.00 Device [HID 044f:b65d] on usb-dummy_hcd.0-1/input0 [ 456.119292][ T5197] hid-thrustmaster 0003:044F:B65D.0003: Wrong number of endpoints? [ 456.418886][ C0] hid-thrustmaster 0003:044F:B65D.0003: URB to get model id failed with error -71 [ 456.428202][ T5197] usb 1-1: USB disconnect, device number 7 [ 460.859372][ T31] audit: type=1400 audit(972.797:358): avc: denied { setopt } for pid=5323 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 466.427698][ T5349] netlink: 4 bytes leftover after parsing attributes in process `syz.1.359'. [ 469.740094][ T5387] netlink: 4 bytes leftover after parsing attributes in process `syz.0.364'. [ 476.520806][ T5418] netlink: 4 bytes leftover after parsing attributes in process `syz.1.374'. [ 486.451007][ T5428] random: crng reseeded on system resumption [ 488.316551][ T5434] Zero length message leads to an empty skb [ 488.838733][ T31] audit: type=1400 audit(1000.777:359): avc: denied { create } for pid=5433 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 488.845521][ T31] audit: type=1400 audit(1000.777:360): avc: denied { ioctl } for pid=5433 comm="syz.0.378" path="socket:[4967]" dev="sockfs" ino=4967 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 488.857400][ T31] audit: type=1400 audit(1000.787:361): avc: denied { write } for pid=5433 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 488.861315][ T31] audit: type=1400 audit(1000.797:362): avc: denied { ioctl } for pid=5433 comm="syz.0.378" path="socket:[4969]" dev="sockfs" ino=4969 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 501.565081][ T5467] IPv6: Can't replace route, no match found [ 504.083642][ T5479] syz.0.393[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.083852][ T5479] syz.0.393[5479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.184100][ T31] audit: type=1326 audit(1016.087:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.207188][ T31] audit: type=1326 audit(1016.137:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.209835][ T31] audit: type=1326 audit(1016.147:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.212213][ T31] audit: type=1326 audit(1016.147:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.221740][ T31] audit: type=1326 audit(1016.157:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.224005][ T31] audit: type=1326 audit(1016.157:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.233206][ T31] audit: type=1326 audit(1016.167:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.239201][ T31] audit: type=1326 audit(1016.167:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.264618][ T31] audit: type=1326 audit(1016.177:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 504.279738][ T31] audit: type=1326 audit(1016.197:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5478 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.252758][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 510.252824][ T31] audit: type=1326 audit(1022.177:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.268992][ T31] audit: type=1326 audit(1022.207:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.269946][ T31] audit: type=1326 audit(1022.207:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.271027][ T31] audit: type=1326 audit(1022.207:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.289657][ T31] audit: type=1326 audit(1022.227:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.291013][ T31] audit: type=1326 audit(1022.227:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.291949][ T31] audit: type=1326 audit(1022.227:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.292691][ T31] audit: type=1326 audit(1022.227:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=133 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.293451][ T31] audit: type=1326 audit(1022.227:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 510.294275][ T31] audit: type=1326 audit(1022.227:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5509 comm="syz.1.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 515.237935][ T5538] netlink: 4 bytes leftover after parsing attributes in process `syz.1.415'. [ 523.195975][ T5564] netlink: 4 bytes leftover after parsing attributes in process `syz.0.421'. [ 525.193459][ T5576] netlink: 12 bytes leftover after parsing attributes in process `syz.1.420'. [ 525.203092][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 525.203179][ T31] audit: type=1400 audit(1037.137:388): avc: denied { ioctl } for pid=5561 comm="syz.1.420" path="socket:[7249]" dev="sockfs" ino=7249 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 562.269266][ T31] audit: type=1326 audit(1074.207:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 562.270469][ T31] audit: type=1326 audit(1074.207:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 562.272123][ T31] audit: type=1326 audit(1074.207:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.458" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 562.273503][ T31] audit: type=1326 audit(1074.207:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 562.294375][ T31] audit: type=1326 audit(1074.227:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 563.260618][ T31] audit: type=1400 audit(1075.197:394): avc: denied { execute } for pid=5726 comm="syz.1.463" path="/198/cgroup.stat" dev="tmpfs" ino=1086 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 566.118890][ T31] audit: type=1326 audit(1078.047:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.1.464" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 566.121656][ T31] audit: type=1326 audit(1078.057:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.1.464" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 566.137113][ T31] audit: type=1326 audit(1078.067:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.1.464" exe="/syz-executor" sig=0 arch=40000028 syscall=93 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 566.137805][ T31] audit: type=1326 audit(1078.067:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.1.464" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 581.828188][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 581.828327][ T31] audit: type=1400 audit(1093.757:409): avc: denied { watch watch_reads } for pid=5748 comm="syz.1.472" path="/207" dev="tmpfs" ino=1129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 582.146530][ T31] audit: type=1400 audit(1094.077:410): avc: denied { watch } for pid=5750 comm="syz.1.473" path="/208/file0" dev="tmpfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 582.707293][ T31] audit: type=1400 audit(1094.637:411): avc: denied { map } for pid=5754 comm="syz.1.475" path="/dev/audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 582.708608][ T31] audit: type=1400 audit(1094.637:412): avc: denied { execute } for pid=5754 comm="syz.1.475" path="/dev/audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 583.235778][ T5757] fuse: Bad value for 'fd' [ 584.242241][ T31] audit: type=1400 audit(1096.167:413): avc: denied { map } for pid=5760 comm="syz.1.478" path="socket:[6433]" dev="sockfs" ino=6433 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 603.476183][ T31] audit: type=1400 audit(1115.407:414): avc: denied { create } for pid=5782 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 604.022864][ T5787] netlink: 'syz.0.486': attribute type 4 has an invalid length. [ 604.023180][ T5787] netlink: 17 bytes leftover after parsing attributes in process `syz.0.486'. [ 624.141972][ T31] audit: type=1400 audit(1136.077:415): avc: denied { ioctl } for pid=5819 comm="syz.0.494" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7559 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 624.263296][ T5820] ------------[ cut here ]------------ [ 624.263910][ T5820] WARNING: CPU: 0 PID: 5820 at mm/highmem.c:622 kunmap_local_indexed+0x210/0x228 [ 624.265179][ T5820] Modules linked in: [ 624.276788][ T5820] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 624.278710][ T5820] CPU: 0 UID: 0 PID: 5820 Comm: syz.0.494 Not tainted 6.11.0-rc6-syzkaller #0 [ 624.279222][ T5820] Hardware name: ARM-Versatile Express [ 624.279695][ T5820] Call trace: [ 624.280263][ T5820] [<8195d0e0>] (dump_backtrace) from [<8195d1dc>] (show_stack+0x18/0x1c) [ 624.281003][ T5820] r7:00000000 r6:826228c4 r5:00000000 r4:8200ca8c [ 624.281373][ T5820] [<8195d1c4>] (show_stack) from [<8197af00>] (dump_stack_lvl+0x54/0x7c) [ 624.281753][ T5820] [<8197aeac>] (dump_stack_lvl) from [<8197af40>] (dump_stack+0x18/0x1c) [ 624.282115][ T5820] r5:00000000 r4:8286dd18 [ 624.282308][ T5820] [<8197af28>] (dump_stack) from [<8195dc84>] (panic+0x120/0x368) [ 624.282682][ T5820] [<8195db64>] (panic) from [<802421e4>] (get_taint+0x0/0x1c) [ 624.283075][ T5820] r3:8260c5c4 r2:00000001 r1:81ff52b0 r0:81ffd088 [ 624.283466][ T5820] r7:80481844 [ 624.283632][ T5820] [<80242170>] (check_panic_on_warn) from [<80242338>] (__warn+0x7c/0x180) [ 624.283962][ T5820] [<802422bc>] (__warn) from [<802425b4>] (warn_slowpath_fmt+0x178/0x1f4) [ 624.284295][ T5820] r8:00000009 r7:820245c0 r6:df9d5d14 r5:84994800 r4:00000000 [ 624.284578][ T5820] [<80242440>] (warn_slowpath_fmt) from [<80481844>] (kunmap_local_indexed+0x210/0x228) [ 624.285121][ T5820] r10:ffefd038 r9:83f9d500 r8:20508000 r7:00000000 r6:00000003 r5:84994800 [ 624.285531][ T5820] r4:ffefd000 [ 624.285751][ T5820] [<80481634>] (kunmap_local_indexed) from [<804f7ecc>] (move_pages+0x7e8/0x149c) [ 624.286141][ T5820] r7:00000000 r6:00000000 r5:852e2810 r4:ffefb840 [ 624.286409][ T5820] [<804f76e4>] (move_pages) from [<80572ee4>] (userfaultfd_ioctl+0x1260/0x2314) [ 624.286931][ T5820] r10:20c0a000 r9:df9d5e98 r8:20000080 r7:83f9d500 r6:00000001 r5:00000000 [ 624.287574][ T5820] r4:853d5000 [ 624.287915][ T5820] [<80571c84>] (userfaultfd_ioctl) from [<80520dac>] (sys_ioctl+0x134/0xda4) [ 624.288630][ T5820] r10:84994800 r9:00000003 r8:850edc00 r7:20000080 r6:850edc00 r5:00000000 [ 624.288996][ T5820] r4:c028aa05 [ 624.289261][ T5820] [<80520c78>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 624.289825][ T5820] Exception stack(0xdf9d5fa8 to 0xdf9d5ff0) [ 624.290084][ T5820] 5fa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 624.290411][ T5820] 5fc0: 00000000 00000000 002762f0 00000036 00000000 00006364 003d0f00 76b760bc [ 624.290760][ T5820] 5fe0: 76b75ec0 76b75eb0 000189f0 00132dd0 [ 624.290943][ T5820] r10:00000036 r9:84994800 r8:8020029c r7:00000036 r6:002762f0 r5:00000000 [ 624.291231][ T5820] r4:00000000 [ 624.292859][ T5820] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:23:32 Registers: info registers vcpu 0 CPU#0 R00=1f031a05 R01=00000009 R02=00000105 R03=8197cc94 R04=826f54c8 R05=826f54c0 R06=00000028 R07=00000006 R08=826f54c8 R09=00000000 R10=82e3b884 R11=df801e4c R12=df801e50 R13=df801e40 R14=8197b924 R15=8197cca8 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=928df000 R01=dfd8b000 R02=00000001 R03=802199d8 R04=7f00b000 R05=00000001 R06=828bdf68 R07=7f00b000 R08=dfd8b000 R09=8260cad0 R10=828beb8c R11=df9b1dbc R12=df9b1dc0 R13=df9b1d90 R14=802109bc R15=802199f0 PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005027e9 s17=00000000 d08=00000000005027e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=03280200 s33=d402002e d16=d402002e03280200 s34=00300302 s35=02ec0008 d17=02ec000800300302 s36=08060601 s37=01000002 d18=0100000208060601 s38=08000002 s39=f3800338 d19=f380033808000002 s40=ffff0201 s41=0303ffff d20=0303ffffffff0201 s42=0001f388 s43=90030008 d21=900300080001f388 s44=ff0201f3 s45=03ffffff d22=03ffffffff0201f3 s46=01f39803 s47=03000800 d23=0300080001f39803 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=d86fb617 s53=f1a6a0b0 d26=f1a6a0b0d86fb617 s54=b497cc89 s55=64643169 d27=64643169b497cc89 s56=efb3a104 s57=9824845e d28=9824845eefb3a104 s58=9892cfd5 s59=dad953c3 d29=dad953c39892cfd5 s60=327a524b s61=8e383fc2 d30=8e383fc2327a524b s62=cf62a8ed s63=a41a4192 d31=a41a4192cf62a8ed FPSCR: 00000000