last executing test programs: 16.445616719s ago: executing program 1 (id=1343): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) mremap(&(0x7f00007b2000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000968000/0x3000)=nil) 16.182476739s ago: executing program 1 (id=1345): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, &(0x7f0000000200)={[0x8001a0ffffffff]}, 0x8) ioctl$int_in(r3, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) fcntl$setsig(r3, 0xa, 0x12) ppoll(&(0x7f0000000100)=[{r4}], 0x1, 0x0, 0x0, 0x0) dup2(r3, r4) mount$tmpfs(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[], [], 0x39}) fcntl$setown(r4, 0x8, r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) clock_adjtime(0x5, &(0x7f00000003c0)={0x7fffffff, 0x6, 0x8, 0x9, 0x9, 0x0, 0x8, 0x100000000, 0x9, 0x4, 0x7, 0x961, 0x1, 0xff, 0x693, 0xffffffff, 0x5, 0x3b, 0x0, 0xa6e, 0x5, 0xfffffffffffffff8, 0x5, 0x101, 0x4c88, 0x7}) tkill(r2, 0x13) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000), 0x208e24b) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b0001006272696467650000100002800c002e001600090003"], 0x40}}, 0x0) 13.481772108s ago: executing program 1 (id=1351): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000882b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x2000, @ipv4={'\x00', '\xff\xff', @remote}, 0xffffffff}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171, 0x0, 0x0, 0x20000000}, 0xa}], 0x400000000000172, 0x4000300) 12.871639204s ago: executing program 1 (id=1353): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 12.62321025s ago: executing program 1 (id=1354): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) pivot_root(&(0x7f0000000200)='./file0\x00', 0x0) 12.381109606s ago: executing program 1 (id=1356): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r2], 0x20}}, 0x0) 3.681447746s ago: executing program 0 (id=1364): fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0xffffffffffffff57) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000005000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getdents(0xffffffffffffffff, &(0x7f0000000680)=""/184, 0xb8) 2.97266369s ago: executing program 0 (id=1365): pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r1 = dup(r0) r2 = memfd_create(&(0x7f0000000080)='\b\x9dF\xd8\b\xb3~u\xa5\"\xdc\xfdq\xf6c\r;\xfcO\x8c=\x81\xb1\x8aSpA\xd4\x98\x85D\x89>N\x8ar\x17O\x0fKR\xe2{mn\xcc\xbf2\xc0\xa7\x14\xd0\xd4\xfe/\x9e\xee\xe7\xd7E\xe9\t\x83\xdeNX\xec\xe66\x1b\x97\xe7\xe6\x97\xf9\xb3\xf6\xb9\v\xb5$\xee\x84\x1cn,B\xd5?\xe5E:+Pm\x1d\xb4\xb8', 0x0) splice(r1, 0x0, r2, &(0x7f00000002c0)=0xfffffffffffffffd, 0x88, 0x0) 2.358458175s ago: executing program 0 (id=1366): r0 = socket$inet(0x2, 0x3, 0x33) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f00000002c0)="01000000a0caccf05a94a66bb55a2a630b00c145f94cd9ffbf111337b1", 0x1d, 0xffffffffffffffff) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000080)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0xc) 1.691075761s ago: executing program 0 (id=1367): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{}, 0x0, 0x0, 0x0, 0x0, "978e8e76a8cfd89c"}, 0x10}}, 0x0) 999.924152ms ago: executing program 0 (id=1368): r0 = getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setreuid(0xee00, 0x0) r3 = syz_pidfd_open(r0, 0x0) setns(r3, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x14860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 0s ago: executing program 0 (id=1369): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) set_tid_address(0x0) kernel console output (not intermixed with test programs): 6305] fuse: Unknown parameter 'group_i00000000000000000000' [ 612.168965][ T31] audit: type=1326 audit(612.070:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 612.169473][ T31] audit: type=1326 audit(612.070:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 612.169819][ T31] audit: type=1326 audit(612.070:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 612.170834][ T31] audit: type=1326 audit(612.070:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 612.174244][ T31] audit: type=1326 audit(612.080:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 612.184787][ T31] audit: type=1400 audit(612.090:349): avc: denied { remove_name } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 612.195829][ T31] audit: type=1400 audit(612.100:350): avc: denied { rename } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 612.204665][ T31] audit: type=1326 audit(612.110:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6306 comm="syz.0.621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 613.960664][ T31] audit: type=1326 audit(613.860:352): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6316 comm="syz.1.624" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 619.541484][ T6335] syz.1.629[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.541788][ T6335] syz.1.629[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.542386][ T6335] syz.1.629[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 620.484771][ T31] audit: type=1400 audit(620.390:353): avc: denied { write } for pid=6339 comm="syz.1.631" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 620.763943][ T31] audit: type=1400 audit(620.670:354): avc: denied { create } for pid=6344 comm="syz.0.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 620.788236][ T31] audit: type=1400 audit(620.690:355): avc: denied { ioctl } for pid=6344 comm="syz.0.633" path="socket:[8493]" dev="sockfs" ino=8493 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 627.371742][ T31] audit: type=1400 audit(627.280:356): avc: denied { write } for pid=6373 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 639.865329][ T31] audit: type=1326 audit(639.770:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 639.880600][ T31] audit: type=1326 audit(639.770:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 639.901598][ T31] audit: type=1326 audit(639.780:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 639.902580][ T31] audit: type=1326 audit(639.780:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 639.903747][ T31] audit: type=1326 audit(639.780:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 643.207303][ T31] audit: type=1326 audit(643.110:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6465 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 643.208324][ T31] audit: type=1326 audit(643.110:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6465 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 643.211944][ T31] audit: type=1326 audit(643.120:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6465 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=19 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 643.212644][ T31] audit: type=1326 audit(643.120:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6465 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 643.213367][ T31] audit: type=1326 audit(643.120:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6465 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 646.704046][ T6493] netlink: 28 bytes leftover after parsing attributes in process `syz.0.672'. [ 646.726333][ T6493] netlink: 40 bytes leftover after parsing attributes in process `syz.0.672'. [ 646.727152][ T6493] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 649.343962][ T6509] fuse: Bad value for 'fd' [ 653.318271][ T6530] fuse: Invalid rootmode [ 654.862219][ T6544] process 'syz.0.689' launched '/dev/fd/5' with NULL argv: empty string added [ 654.873989][ T31] audit: type=1400 audit(654.780:367): avc: denied { execute_no_trans } for pid=6543 comm="syz.0.689" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 658.174242][ T6566] block device autoloading is deprecated and will be removed. [ 658.175242][ T6566] syz.1.697: attempt to access beyond end of device [ 658.175242][ T6566] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 658.540521][ T31] audit: type=1326 audit(658.430:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.541564][ T31] audit: type=1326 audit(658.440:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.542203][ T31] audit: type=1326 audit(658.440:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.542819][ T31] audit: type=1326 audit(658.440:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.543509][ T31] audit: type=1326 audit(658.440:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.547594][ T31] audit: type=1326 audit(658.450:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.548892][ T31] audit: type=1326 audit(658.450:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.549544][ T31] audit: type=1326 audit(658.450:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 658.590474][ T31] audit: type=1326 audit(658.490:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6573 comm="syz.0.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 659.334422][ T6584] netlink: 368 bytes leftover after parsing attributes in process `syz.1.703'. [ 659.341201][ T6584] netlink: 64 bytes leftover after parsing attributes in process `syz.1.703'. [ 662.492408][ T6617] fuse: Bad value for 'rootmode' [ 663.547427][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 663.547517][ T31] audit: type=1400 audit(663.450:385): avc: denied { setopt } for pid=6624 comm="syz.0.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 663.691785][ T6628] fuse: Bad value for 'rootmode' [ 667.138745][ T31] audit: type=1326 audit(667.030:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6642 comm="syz.0.723" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 667.317389][ T6645] fuse: Bad value for 'rootmode' [ 671.114246][ T6666] fuse: Unknown parameter 'use00000000000000000000' [ 671.327110][ T31] audit: type=1326 audit(671.230:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6665 comm="syz.1.730" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 675.552576][ T6684] fuse: Unknown parameter 'use00000000000000000000' [ 676.506156][ T31] audit: type=1326 audit(676.390:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6685 comm="syz.0.736" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 677.167751][ T31] audit: type=1326 audit(677.070:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 677.178492][ T31] audit: type=1326 audit(677.080:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 677.194318][ T31] audit: type=1326 audit(677.090:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 677.195456][ T31] audit: type=1326 audit(677.090:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 678.254708][ T6697] fuse: Unknown parameter 'use00000000000000000000' [ 678.842626][ T31] audit: type=1326 audit(678.740:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 678.875678][ T31] audit: type=1326 audit(678.740:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 678.911355][ T31] audit: type=1326 audit(678.810:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 678.934164][ T31] audit: type=1326 audit(678.840:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 678.935114][ T31] audit: type=1326 audit(678.840:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 680.982463][ T6726] fuse: Unknown parameter 'user_i00000000000000000000' [ 681.557355][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 681.557458][ T31] audit: type=1326 audit(681.460:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.561661][ T31] audit: type=1326 audit(681.470:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.562633][ T31] audit: type=1326 audit(681.470:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.563687][ T31] audit: type=1326 audit(681.470:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.564531][ T31] audit: type=1326 audit(681.470:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.605097][ T31] audit: type=1326 audit(681.490:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.609068][ T31] audit: type=1326 audit(681.510:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.611070][ T31] audit: type=1326 audit(681.510:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.641197][ T31] audit: type=1326 audit(681.540:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 681.648592][ T31] audit: type=1326 audit(681.540:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6728 comm="syz.1.752" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 684.284988][ T6755] fuse: Unknown parameter 'user_id00000000000000000000' [ 685.779576][ T6769] fuse: Unknown parameter 'user_id00000000000000000000' [ 686.163177][ T6771] netlink: 'syz.0.765': attribute type 10 has an invalid length. [ 686.189669][ T6771] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 687.797155][ T6782] fuse: Unknown parameter 'user_id00000000000000000000' [ 689.026242][ T6798] fuse: Bad value for 'fd' [ 689.444789][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 689.444921][ T31] audit: type=1326 audit(689.350:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.450847][ T31] audit: type=1326 audit(689.350:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.452056][ T31] audit: type=1326 audit(689.350:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.461876][ T31] audit: type=1326 audit(689.370:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.488228][ T31] audit: type=1326 audit(689.370:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.489132][ T31] audit: type=1326 audit(689.390:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.500949][ T31] audit: type=1326 audit(689.400:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.502276][ T31] audit: type=1326 audit(689.410:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.503074][ T31] audit: type=1326 audit(689.410:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 689.508049][ T31] audit: type=1326 audit(689.410:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.0.779" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 691.511292][ T6820] tmpfs: Unsupported parameter 'mpol' [ 692.293924][ T6831] mmap: syz.0.789 (6831) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 693.618198][ T6853] sch_tbf: peakrate 6 is lower than or equals to rate 705765376 ! [ 695.300771][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 695.300848][ T31] audit: type=1326 audit(695.200:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.310471][ T31] audit: type=1326 audit(695.210:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.310986][ T31] audit: type=1326 audit(695.210:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.311583][ T31] audit: type=1326 audit(695.210:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.312039][ T31] audit: type=1326 audit(695.210:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.321495][ T31] audit: type=1326 audit(695.230:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.324181][ T31] audit: type=1326 audit(695.230:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.324798][ T31] audit: type=1326 audit(695.230:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.334055][ T31] audit: type=1326 audit(695.240:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 695.363239][ T31] audit: type=1326 audit(695.270:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6875 comm="syz.1.803" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.325360][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 700.325414][ T31] audit: type=1326 audit(700.230:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.350623][ T31] audit: type=1326 audit(700.240:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.351572][ T31] audit: type=1326 audit(700.250:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.352512][ T31] audit: type=1326 audit(700.250:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=63 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.353275][ T31] audit: type=1326 audit(700.250:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.354579][ T31] audit: type=1326 audit(700.250:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.355604][ T31] audit: type=1326 audit(700.250:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.356613][ T31] audit: type=1326 audit(700.260:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.377162][ T31] audit: type=1326 audit(700.260:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 700.378109][ T31] audit: type=1326 audit(700.270:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6911 comm="syz.1.814" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 709.229392][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 709.229520][ T31] audit: type=1400 audit(709.130:531): avc: denied { read write } for pid=5261 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.233249][ T31] audit: type=1400 audit(709.130:532): avc: denied { open } for pid=5261 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.239621][ T31] audit: type=1400 audit(709.140:533): avc: denied { ioctl } for pid=5261 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.257141][ T31] audit: type=1400 audit(709.150:534): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 709.258883][ T31] audit: type=1400 audit(709.150:535): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 709.259721][ T31] audit: type=1400 audit(709.150:536): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 709.270850][ T31] audit: type=1400 audit(709.150:537): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 709.272050][ T31] audit: type=1400 audit(709.150:538): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 709.670780][ T31] audit: type=1400 audit(709.560:539): avc: denied { read } for pid=6962 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 709.720795][ T31] audit: type=1400 audit(709.620:540): avc: denied { map_create } for pid=6962 comm="syz.0.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 714.635790][ T6987] syz.1.838[6987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.637653][ T6987] syz.1.838[6987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 714.661623][ T6987] syz.1.838[6987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.078563][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 715.078678][ T31] audit: type=1400 audit(714.980:563): avc: denied { relabelfrom } for pid=6988 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 715.081798][ T31] audit: type=1400 audit(714.990:564): avc: denied { relabelto } for pid=6988 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 716.013536][ T31] audit: type=1400 audit(715.920:565): avc: denied { name_bind } for pid=6999 comm="syz.1.840" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 718.099868][ T31] audit: type=1400 audit(718.000:566): avc: denied { mounton } for pid=7003 comm="syz.1.841" path="/394/file0" dev="tmpfs" ino=2083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 718.115039][ T31] audit: type=1400 audit(718.020:567): avc: denied { mount } for pid=7003 comm="syz.1.841" name="/" dev="ramfs" ino=9342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 720.033986][ T6981] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 720.210716][ T31] audit: type=1326 audit(720.110:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz.1.844" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 720.220879][ T6981] usb 1-1: Using ep0 maxpacket: 32 [ 720.235273][ T31] audit: type=1326 audit(720.140:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz.1.844" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 720.245252][ T31] audit: type=1326 audit(720.140:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7014 comm="syz.1.844" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 720.251951][ T6981] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 720.252852][ T6981] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 720.253381][ T6981] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 720.253817][ T6981] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 720.303964][ T6981] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 720.304562][ T6981] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 720.304985][ T6981] usb 1-1: Product: syz [ 720.305336][ T6981] usb 1-1: Manufacturer: syz [ 720.305594][ T6981] usb 1-1: SerialNumber: syz [ 720.833977][ T31] audit: type=1400 audit(720.740:571): avc: denied { sys_module } for pid=7022 comm="syz.1.846" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 720.839133][ T31] audit: type=1400 audit(720.740:572): avc: denied { module_load } for pid=7022 comm="syz.1.846" path="/sys/power/sync_on_suspend" dev="sysfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 724.436452][ T31] audit: type=1326 audit(724.340:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.1.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 724.446778][ T31] audit: type=1326 audit(724.340:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.1.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 724.460893][ T31] audit: type=1326 audit(724.360:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.1.849" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 724.479210][ T31] audit: type=1326 audit(724.380:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.1.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 724.501265][ T31] audit: type=1326 audit(724.380:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7030 comm="syz.1.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 725.609441][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 725.609549][ T31] audit: type=1400 audit(725.510:584): avc: denied { create } for pid=7049 comm="syz.1.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 725.630932][ T31] audit: type=1400 audit(725.520:585): avc: denied { write } for pid=7049 comm="syz.1.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 725.638076][ T31] audit: type=1400 audit(725.520:586): avc: denied { nlmsg_write } for pid=7049 comm="syz.1.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 725.638954][ T31] audit: type=1400 audit(725.530:587): avc: denied { module_request } for pid=7049 comm="syz.1.851" kmod="crypto-cmac(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 726.694470][ T31] audit: type=1400 audit(726.600:588): avc: denied { mounton } for pid=7055 comm="syz.1.852" path="/405/file0" dev="tmpfs" ino=2141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 726.723906][ T31] audit: type=1400 audit(726.630:589): avc: denied { mount } for pid=7055 comm="syz.1.852" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 727.989006][ T31] audit: type=1400 audit(727.890:590): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 728.621453][ T31] audit: type=1326 audit(728.520:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7064 comm="syz.1.854" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 728.623613][ T31] audit: type=1326 audit(728.520:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7064 comm="syz.1.854" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 728.647411][ T31] audit: type=1326 audit(728.520:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7064 comm="syz.1.854" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.438223][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 732.438334][ T31] audit: type=1326 audit(732.340:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.1.858" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.454266][ T31] audit: type=1326 audit(732.360:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.1.858" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.455119][ T31] audit: type=1326 audit(732.360:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.1.858" exe="/syz-executor" sig=0 arch=40000028 syscall=104 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.455860][ T31] audit: type=1326 audit(732.360:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.1.858" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.705821][ T31] audit: type=1400 audit(732.610:622): avc: denied { create } for pid=7081 comm="syz.1.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 732.724407][ T31] audit: type=1400 audit(732.630:623): avc: denied { create } for pid=7081 comm="syz.1.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 732.738027][ T31] audit: type=1326 audit(732.640:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7081 comm="syz.1.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.751268][ T31] audit: type=1326 audit(732.640:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7081 comm="syz.1.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.755167][ T31] audit: type=1326 audit(732.660:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7081 comm="syz.1.859" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 732.756135][ T31] audit: type=1326 audit(732.660:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7081 comm="syz.1.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 736.733556][ T7103] netlink: 'syz.1.864': attribute type 30 has an invalid length. [ 736.735040][ T7103] (unnamed net_device) (uninitialized): option arp_missed_max: invalid value (0) [ 736.735665][ T7103] (unnamed net_device) (uninitialized): option arp_missed_max: allowed values 1 - 255 [ 736.866643][ T7105] syz.1.865[7105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.867083][ T7105] syz.1.865[7105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.867840][ T7105] syz.1.865[7105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.839305][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 737.839411][ T31] audit: type=1400 audit(737.740:636): avc: denied { setopt } for pid=7108 comm="syz.1.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 743.116701][ T31] audit: type=1400 audit(743.010:637): avc: denied { execute } for pid=7128 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 743.140723][ T31] audit: type=1400 audit(743.020:638): avc: denied { execute_no_trans } for pid=7128 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 743.201348][ T31] audit: type=1400 audit(743.100:639): avc: denied { read } for pid=7129 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 743.215264][ T31] audit: type=1400 audit(743.110:640): avc: denied { open } for pid=7129 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 743.218189][ T31] audit: type=1400 audit(743.110:641): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 746.533085][ T7149] usb 1-1: USB disconnect, device number 9 [ 746.622265][ T5267] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.792075][ T5267] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.952653][ T5267] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 747.077164][ T5267] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 748.280797][ T5267] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 748.301156][ T5267] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 748.312543][ T5267] bond0 (unregistering): Released all slaves [ 748.552629][ T5267] hsr_slave_0: left promiscuous mode [ 748.585472][ T5267] hsr_slave_1: left promiscuous mode [ 748.611737][ T5267] veth1_macvtap: left promiscuous mode [ 748.612284][ T5267] veth0_macvtap: left promiscuous mode [ 748.612672][ T5267] veth1_vlan: left promiscuous mode [ 748.613086][ T5267] veth0_vlan: left promiscuous mode [ 749.526636][ T31] audit: type=1400 audit(749.430:642): avc: denied { write } for pid=7283 comm="syz.1.882" name="dev_mcast" dev="proc" ino=4026532670 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 750.094182][ T7288] sch_tbf: peakrate 6 is lower than or equals to rate 705765376 ! [ 751.325922][ T31] audit: type=1400 audit(751.230:643): avc: denied { write } for pid=7325 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 751.330755][ T31] audit: type=1400 audit(751.230:644): avc: denied { open } for pid=7325 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 751.371250][ T31] audit: type=1400 audit(751.250:645): avc: denied { getattr } for pid=7325 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 751.377537][ T31] audit: type=1400 audit(751.250:646): avc: denied { ioctl } for pid=7325 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 751.634306][ T7129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 751.651850][ T7129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 751.992287][ T31] audit: type=1400 audit(751.900:647): avc: denied { search } for pid=7328 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.086626][ T31] audit: type=1400 audit(751.990:648): avc: denied { read } for pid=7378 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.088310][ T31] audit: type=1400 audit(751.990:649): avc: denied { open } for pid=7378 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.091518][ T31] audit: type=1400 audit(752.000:650): avc: denied { getattr } for pid=7378 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.204945][ T31] audit: type=1400 audit(752.110:651): avc: denied { write } for pid=7328 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 754.534991][ T7129] hsr_slave_0: entered promiscuous mode [ 754.546717][ T7129] hsr_slave_1: entered promiscuous mode [ 756.222479][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 756.222577][ T31] audit: type=1400 audit(756.130:663): avc: denied { ioctl } for pid=7538 comm="syz.1.893" path="socket:[10619]" dev="sockfs" ino=10619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 756.397017][ T7129] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 756.417600][ T7129] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 756.454259][ T7129] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 756.517883][ T7129] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 758.952580][ T7129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.418651][ T31] audit: type=1326 audit(760.320:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.419980][ T31] audit: type=1326 audit(760.320:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.425142][ T31] audit: type=1326 audit(760.330:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.441099][ T31] audit: type=1326 audit(760.330:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.442389][ T31] audit: type=1326 audit(760.330:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.443440][ T31] audit: type=1326 audit(760.340:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.444943][ T31] audit: type=1326 audit(760.340:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.470475][ T31] audit: type=1326 audit(760.340:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=432 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 760.483260][ T31] audit: type=1326 audit(760.340:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7595 comm="syz.1.898" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 764.030801][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 764.030911][ T31] audit: type=1400 audit(763.930:677): avc: denied { create } for pid=7625 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 765.250008][ T7640] netlink: 8 bytes leftover after parsing attributes in process `syz.1.903'. [ 765.551650][ T31] audit: type=1400 audit(765.440:678): avc: denied { create } for pid=7643 comm="syz.1.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 765.552690][ T31] audit: type=1400 audit(765.450:679): avc: denied { block_suspend } for pid=7643 comm="syz.1.904" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 768.602480][ T7129] veth0_vlan: entered promiscuous mode [ 768.742211][ T7129] veth1_vlan: entered promiscuous mode [ 768.945647][ T7129] veth0_macvtap: entered promiscuous mode [ 768.957220][ T7129] veth1_macvtap: entered promiscuous mode [ 769.085021][ T7129] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 769.085558][ T7129] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 769.085881][ T7129] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 769.086204][ T7129] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 769.429067][ T31] audit: type=1400 audit(769.330:680): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/syzkaller.gUo0uU/syz-tmp" dev="vda" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 769.482991][ T31] audit: type=1400 audit(769.390:681): avc: denied { mount } for pid=7129 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 769.521216][ T31] audit: type=1400 audit(769.390:682): avc: denied { mount } for pid=7129 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 769.522140][ T31] audit: type=1400 audit(769.420:683): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/syzkaller.gUo0uU/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 769.522852][ T31] audit: type=1400 audit(769.420:684): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/syzkaller.gUo0uU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=10773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 769.544473][ T31] audit: type=1400 audit(769.450:685): avc: denied { unmount } for pid=7129 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 769.576498][ T31] audit: type=1400 audit(769.480:686): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 769.579747][ T31] audit: type=1400 audit(769.480:687): avc: denied { mount } for pid=7129 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 769.593715][ T31] audit: type=1400 audit(769.500:688): avc: denied { mounton } for pid=7129 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 769.596142][ T31] audit: type=1400 audit(769.500:689): avc: denied { connect } for pid=7669 comm="syz.1.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 770.434179][ T7680] netlink: 4 bytes leftover after parsing attributes in process `syz.1.911'. [ 773.434368][ T7696] netlink: 12 bytes leftover after parsing attributes in process `syz.1.915'. [ 777.725166][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 777.725279][ T31] audit: type=1400 audit(777.630:693): avc: denied { bind } for pid=7720 comm="syz.1.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 777.734522][ T31] audit: type=1400 audit(777.630:694): avc: denied { name_bind } for pid=7720 comm="syz.1.920" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 777.751972][ T31] audit: type=1400 audit(777.630:695): avc: denied { node_bind } for pid=7720 comm="syz.1.920" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 777.772912][ T31] audit: type=1400 audit(777.680:696): avc: denied { write } for pid=7720 comm="syz.1.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 777.773823][ T31] audit: type=1400 audit(777.680:697): avc: denied { connect } for pid=7720 comm="syz.1.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 777.776105][ T31] audit: type=1400 audit(777.680:698): avc: denied { name_connect } for pid=7720 comm="syz.1.920" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 779.222752][ T31] audit: type=1400 audit(779.130:699): avc: denied { create } for pid=7729 comm="syz.1.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 779.262564][ T31] audit: type=1400 audit(779.170:700): avc: denied { setopt } for pid=7729 comm="syz.1.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 780.680910][ T31] audit: type=1326 audit(780.580:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7731 comm="syz.1.922" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 783.493640][ T31] audit: type=1400 audit(783.400:702): avc: denied { unmount } for pid=7747 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 784.826936][ T31] audit: type=1326 audit(784.730:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7755 comm="syz.1.928" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 787.346935][ T31] audit: type=1326 audit(787.250:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7766 comm="syz.1.930" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 787.348198][ T31] audit: type=1326 audit(787.250:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7766 comm="syz.1.930" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 787.349362][ T31] audit: type=1326 audit(787.250:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7766 comm="syz.1.930" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 787.374107][ T31] audit: type=1326 audit(787.250:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7766 comm="syz.1.930" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 787.480727][ T7769] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 787.634121][ T7769] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 787.793452][ T7769] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 787.958992][ T7769] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 788.128375][ T7769] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.155559][ T31] audit: type=1326 audit(788.060:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.157202][ T31] audit: type=1326 audit(788.060:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.157645][ T31] audit: type=1326 audit(788.060:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.159260][ T7769] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.175698][ T7769] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.191181][ T31] audit: type=1326 audit(788.080:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.281239][ T7769] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.927790][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 788.927906][ T31] audit: type=1326 audit(788.830:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=0 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.929110][ T31] audit: type=1326 audit(788.830:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 788.942558][ T31] audit: type=1326 audit(788.830:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 789.389315][ T31] audit: type=1326 audit(789.290:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 789.404402][ T31] audit: type=1326 audit(789.310:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 789.405596][ T31] audit: type=1326 audit(789.310:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7773 comm="syz.1.932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 791.316660][ T31] audit: type=1326 audit(791.220:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7800 comm="syz.1.934" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 792.168046][ T7807] netlink: 256 bytes leftover after parsing attributes in process `syz.0.935'. [ 796.663232][ T31] audit: type=1326 audit(796.550:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.664468][ T31] audit: type=1326 audit(796.550:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.705060][ T31] audit: type=1326 audit(796.600:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.705893][ T31] audit: type=1326 audit(796.610:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.709164][ T31] audit: type=1326 audit(796.610:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.715568][ T31] audit: type=1326 audit(796.620:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.722761][ T31] audit: type=1326 audit(796.630:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.728350][ T31] audit: type=1326 audit(796.630:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.745159][ T31] audit: type=1326 audit(796.640:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.746943][ T31] audit: type=1326 audit(796.650:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7832 comm="syz.0.944" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 796.955823][ T7836] netlink: 8 bytes leftover after parsing attributes in process `syz.1.945'. [ 805.429152][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.429764][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.436346][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.436686][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.437014][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.437365][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.437653][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.437873][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.438122][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.438444][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.438677][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.438880][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.439196][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.439457][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.439710][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.439907][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.442448][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 805.442524][ T31] audit: type=1400 audit(805.350:778): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 805.443831][ T31] audit: type=1400 audit(805.350:779): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 805.453742][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.454264][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.454604][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.454989][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.455667][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.456218][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.456754][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.457125][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.457599][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.458080][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.458508][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.461658][ T31] audit: type=1400 audit(805.360:780): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.462767][ T31] audit: type=1400 audit(805.360:781): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.465782][ T31] audit: type=1400 audit(805.360:782): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.471312][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.471891][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.472302][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.472664][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.473153][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.473742][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.474318][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.474716][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.475227][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.488968][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.489557][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.490642][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.491155][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.491566][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.492038][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.492450][ T5902] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 805.501416][ T5902] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 805.780976][ T31] audit: type=1400 audit(805.670:783): avc: denied { create } for pid=7900 comm="syz.1.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 805.856704][ T31] audit: type=1400 audit(805.760:784): avc: denied { setopt } for pid=7900 comm="syz.1.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 806.458545][ T31] audit: type=1400 audit(806.360:785): avc: denied { create } for pid=7909 comm="syz.0.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 806.473278][ T7910] syz.0.967[7910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 806.473729][ T7910] syz.0.967[7910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 806.474497][ T7910] syz.0.967[7910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 806.494397][ T31] audit: type=1400 audit(806.400:786): avc: denied { write } for pid=7909 comm="syz.0.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 806.921475][ T7915] netlink: 28 bytes leftover after parsing attributes in process `syz.0.969'. [ 807.037998][ T7920] netlink: 8 bytes leftover after parsing attributes in process `syz.1.970'. [ 807.152055][ T31] audit: type=1400 audit(807.060:787): avc: denied { create } for pid=7921 comm="syz.0.971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 809.078273][ T7939] syz.0.977[7939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 809.083455][ T7939] syz.0.977[7939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 809.093296][ T7939] syz.0.977[7939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 810.570489][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 810.570606][ T31] audit: type=1400 audit(810.470:846): avc: denied { recv } for pid=7946 comm="modprobe" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 811.028934][ T31] audit: type=1400 audit(810.930:847): avc: denied { write } for pid=7948 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 811.030963][ T31] audit: type=1400 audit(810.930:848): avc: denied { open } for pid=7948 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 811.061080][ T31] audit: type=1400 audit(810.930:849): avc: denied { getattr } for pid=7948 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 811.062816][ T31] audit: type=1400 audit(810.930:850): avc: denied { ioctl } for pid=7948 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 811.081926][ T31] audit: type=1400 audit(810.990:851): avc: denied { search } for pid=7948 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.125768][ T31] audit: type=1400 audit(811.030:852): avc: denied { read } for pid=7950 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.126714][ T31] audit: type=1400 audit(811.030:853): avc: denied { open } for pid=7950 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.127783][ T31] audit: type=1400 audit(811.030:854): avc: denied { getattr } for pid=7950 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.321005][ T31] audit: type=1400 audit(811.220:855): avc: denied { write } for pid=7948 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 815.112279][ T7964] netlink: 8 bytes leftover after parsing attributes in process `syz.0.981'. [ 821.692268][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 821.692330][ T31] audit: type=1400 audit(821.600:864): avc: denied { ioctl } for pid=7976 comm="syz.0.986" path="socket:[11482]" dev="sockfs" ino=11482 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 821.710423][ T31] audit: type=1400 audit(821.610:865): avc: denied { write } for pid=7976 comm="syz.0.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 830.177307][ T31] audit: type=1326 audit(830.060:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.178824][ T31] audit: type=1326 audit(830.080:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.193031][ T31] audit: type=1326 audit(830.100:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.253586][ T31] audit: type=1326 audit(830.150:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.263103][ T31] audit: type=1326 audit(830.170:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.264499][ T31] audit: type=1326 audit(830.170:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.265171][ T31] audit: type=1326 audit(830.170:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.271231][ T31] audit: type=1326 audit(830.170:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.271856][ T31] audit: type=1326 audit(830.170:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 830.272394][ T31] audit: type=1326 audit(830.180:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8004 comm="syz.0.994" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 834.017641][ T8019] netlink: 4 bytes leftover after parsing attributes in process `syz.0.999'. [ 835.779547][ T8023] netlink: 'syz.0.1001': attribute type 10 has an invalid length. [ 836.199653][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 836.220830][ T31] audit: type=1400 audit(836.100:881): avc: denied { write } for pid=8022 comm="syz.0.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 836.822856][ T31] audit: type=1400 audit(836.730:882): avc: denied { read } for pid=8022 comm="syz.0.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.314691][ T31] audit: type=1400 audit(838.220:883): avc: denied { execute } for pid=8026 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 838.325230][ T31] audit: type=1400 audit(838.230:884): avc: denied { execute_no_trans } for pid=8026 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 838.362045][ T31] audit: type=1400 audit(838.260:885): avc: denied { execmem } for pid=8026 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 838.403371][ T31] audit: type=1400 audit(838.310:886): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 839.987160][ T31] audit: type=1400 audit(839.890:887): avc: denied { create } for pid=8037 comm="syz.0.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 841.116724][ T31] audit: type=1400 audit(841.020:888): avc: denied { create } for pid=8045 comm="syz.0.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 841.141026][ T31] audit: type=1400 audit(841.040:889): avc: denied { sys_admin } for pid=8045 comm="syz.0.1005" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 844.302199][ T8198] syz.0.1008[8198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.302614][ T8198] syz.0.1008[8198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.303391][ T8198] syz.0.1008[8198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.721567][ T31] audit: type=1400 audit(844.620:890): avc: denied { shutdown } for pid=8200 comm="syz.0.1009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 844.767939][ T31] audit: type=1400 audit(844.670:891): avc: denied { execute } for pid=8200 comm="syz.0.1009" path="/69/cpu.stat" dev="tmpfs" ino=379 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 845.303855][ T8027] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 845.309706][ T8027] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.802975][ T31] audit: type=1400 audit(845.710:892): avc: denied { name_bind } for pid=8258 comm="syz.0.1012" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 845.804722][ T31] audit: type=1400 audit(845.710:893): avc: denied { node_bind } for pid=8258 comm="syz.0.1012" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 847.392059][ T31] audit: type=1400 audit(847.290:894): avc: denied { setopt } for pid=8271 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 848.593318][ T31] audit: type=1400 audit(848.500:895): avc: denied { block_suspend } for pid=8304 comm="syz.0.1017" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 849.155096][ T8027] hsr_slave_0: entered promiscuous mode [ 849.159187][ T8027] hsr_slave_1: entered promiscuous mode [ 849.162487][ T8027] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 849.162856][ T8027] Cannot create hsr debugfs directory [ 850.725260][ T8027] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 850.740923][ T8027] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 850.749189][ T8027] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 850.769977][ T8027] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 851.243807][ T8427] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1021'. [ 852.093563][ T31] audit: type=1326 audit(852.000:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.095650][ T31] audit: type=1326 audit(852.000:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.101146][ T31] audit: type=1326 audit(852.000:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.108242][ T31] audit: type=1326 audit(852.000:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.109056][ T31] audit: type=1326 audit(852.000:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.109735][ T31] audit: type=1326 audit(852.000:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=93 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.124420][ T31] audit: type=1326 audit(852.000:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.125377][ T31] audit: type=1326 audit(852.010:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.126031][ T31] audit: type=1326 audit(852.010:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.126875][ T31] audit: type=1326 audit(852.010:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8438 comm="syz.0.1024" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 852.392532][ T8443] syz.0.1025[8443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.398490][ T8443] syz.0.1025[8443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.407345][ T8443] syz.0.1025[8443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.426402][ T8443] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1025'. [ 853.325166][ T8027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 854.301418][ T8463] pim6reg: entered allmulticast mode [ 854.304244][ T8463] pim6reg: left allmulticast mode [ 858.204150][ T8508] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1038'. [ 858.290773][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 858.290828][ T31] audit: type=1400 audit(858.190:908): avc: denied { connect } for pid=8507 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 858.291485][ T31] audit: type=1400 audit(858.190:909): avc: denied { create } for pid=8507 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 858.291876][ T31] audit: type=1400 audit(858.190:910): avc: denied { bind } for pid=8507 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 858.468010][ T31] audit: type=1400 audit(858.370:911): avc: denied { write } for pid=8507 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 858.474401][ T31] audit: type=1400 audit(858.380:912): avc: denied { write } for pid=8507 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 858.693422][ T31] audit: type=1400 audit(858.600:913): avc: denied { create } for pid=8513 comm="syz.0.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 858.695166][ T31] audit: type=1400 audit(858.600:914): avc: denied { write } for pid=8513 comm="syz.0.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 862.811539][ T8027] veth0_vlan: entered promiscuous mode [ 862.864679][ T8027] veth1_vlan: entered promiscuous mode [ 862.986922][ T8027] veth0_macvtap: entered promiscuous mode [ 863.007351][ T8027] veth1_macvtap: entered promiscuous mode [ 863.117530][ T8027] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.118071][ T8027] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.118435][ T8027] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.118759][ T8027] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.431301][ T31] audit: type=1400 audit(863.330:915): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/syzkaller.4pGrim/syz-tmp" dev="vda" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 863.451048][ T31] audit: type=1400 audit(863.350:916): avc: denied { mount } for pid=8027 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 863.456726][ T31] audit: type=1400 audit(863.360:917): avc: denied { mount } for pid=8027 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 863.469065][ T31] audit: type=1400 audit(863.370:918): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/syzkaller.4pGrim/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 863.483028][ T31] audit: type=1400 audit(863.390:919): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/syzkaller.4pGrim/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12560 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 863.521674][ T31] audit: type=1400 audit(863.410:920): avc: denied { unmount } for pid=8027 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 863.565426][ T31] audit: type=1400 audit(863.470:921): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 863.571852][ T31] audit: type=1400 audit(863.470:922): avc: denied { mount } for pid=8027 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 863.576447][ T31] audit: type=1400 audit(863.470:923): avc: denied { mounton } for pid=8027 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 863.908060][ T31] audit: type=1400 audit(863.810:924): avc: denied { ioctl } for pid=8559 comm="syz.0.1047" path="socket:[11869]" dev="sockfs" ino=11869 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 865.802683][ T8580] netlink: 'syz.1.1052': attribute type 15 has an invalid length. [ 874.460884][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 874.461025][ T31] audit: type=1400 audit(874.360:936): avc: denied { create } for pid=8622 comm="syz.0.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 874.528392][ T31] audit: type=1400 audit(874.430:937): avc: denied { getopt } for pid=8622 comm="syz.0.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 875.928675][ T8639] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1070'. [ 876.326317][ T31] audit: type=1326 audit(876.230:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.349100][ T31] audit: type=1326 audit(876.250:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.351376][ T31] audit: type=1326 audit(876.250:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.352254][ T31] audit: type=1326 audit(876.250:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.363214][ T31] audit: type=1326 audit(876.260:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.364225][ T31] audit: type=1326 audit(876.260:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.365477][ T31] audit: type=1326 audit(876.260:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 876.391608][ T31] audit: type=1326 audit(876.290:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.0.1072" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.194707][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 880.194799][ T31] audit: type=1326 audit(880.100:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="syz.0.1078" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.203542][ T31] audit: type=1326 audit(880.110:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="syz.0.1078" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.230822][ T31] audit: type=1326 audit(880.130:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="syz.0.1078" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.231942][ T31] audit: type=1326 audit(880.130:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.237407][ T31] audit: type=1326 audit(880.140:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.238263][ T31] audit: type=1326 audit(880.140:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.261611][ T31] audit: type=1326 audit(880.160:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.275120][ T31] audit: type=1326 audit(880.180:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.276045][ T31] audit: type=1326 audit(880.180:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 880.276942][ T31] audit: type=1326 audit(880.180:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8668 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 884.752955][ T8730] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1101'. [ 884.923704][ T8730] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1101'. [ 886.583935][ T8751] syz_tun: entered promiscuous mode [ 886.624860][ T8751] batadv_slave_0: entered promiscuous mode [ 886.701503][ T8751] syz_tun: left promiscuous mode [ 886.724097][ T8751] batadv_slave_0: left promiscuous mode [ 887.118986][ T8761] netem: change failed [ 887.610503][ T8768] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1111'. [ 888.983291][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 888.983402][ T31] audit: type=1400 audit(888.890:987): avc: denied { unmount } for pid=8786 comm="syz.1.1118" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 889.949439][ T8800] syz.1.1123[8800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 889.949853][ T8800] syz.1.1123[8800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 889.957345][ T8800] syz.1.1123[8800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.384341][ T8807] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8807 comm=syz.0.1126 [ 890.739608][ T31] audit: type=1400 audit(890.640:988): avc: denied { bind } for pid=8810 comm="syz.1.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 890.773319][ T31] audit: type=1400 audit(890.680:989): avc: denied { setopt } for pid=8810 comm="syz.1.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 893.967902][ T8828] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 893.973672][ T8828] IPv6: NLM_F_CREATE should be set when creating new route [ 894.453027][ T31] audit: type=1400 audit(894.360:990): avc: denied { create } for pid=8833 comm="syz.0.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 894.524547][ T31] audit: type=1400 audit(894.430:991): avc: denied { setopt } for pid=8833 comm="syz.0.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 895.195661][ T8842] syzkaller0: entered promiscuous mode [ 895.196152][ T8842] syzkaller0: entered allmulticast mode [ 895.629856][ T31] audit: type=1326 audit(895.530:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.633410][ T31] audit: type=1326 audit(895.540:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.635504][ T31] audit: type=1326 audit(895.540:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.642007][ T31] audit: type=1326 audit(895.550:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.646913][ T31] audit: type=1326 audit(895.550:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.660796][ T31] audit: type=1326 audit(895.550:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.662152][ T31] audit: type=1326 audit(895.550:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 895.662856][ T31] audit: type=1326 audit(895.560:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8851 comm="syz.0.1141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 897.467098][ T8873] serio: Serial port ptm0 [ 898.875263][ T8884] syz.1.1150[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.875712][ T8884] syz.1.1150[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.881098][ T8884] syz.1.1150[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 901.098237][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 901.098343][ T31] audit: type=1326 audit(901.000:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8911 comm="syz.0.1158" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 901.117678][ T31] audit: type=1326 audit(901.000:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8911 comm="syz.0.1158" exe="/syz-executor" sig=0 arch=40000028 syscall=335 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 903.760828][ T31] audit: type=1326 audit(903.650:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8924 comm="syz.1.1162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 903.761907][ T31] audit: type=1326 audit(903.650:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8924 comm="syz.1.1162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 903.762741][ T31] audit: type=1326 audit(903.670:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8924 comm="syz.1.1162" exe="/syz-executor" sig=0 arch=40000028 syscall=351 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 903.763534][ T31] audit: type=1326 audit(903.670:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8924 comm="syz.1.1162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 903.764178][ T31] audit: type=1326 audit(903.670:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8924 comm="syz.1.1162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 904.821190][ T5997] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 904.970984][ T5997] usb 2-1: device descriptor read/64, error -71 [ 905.097805][ T8939] netlink: 536 bytes leftover after parsing attributes in process `syz.0.1165'. [ 905.221848][ T5997] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 905.350994][ T5997] usb 2-1: device descriptor read/64, error -71 [ 905.471118][ T5997] usb usb2-port1: attempt power cycle [ 905.811397][ T5997] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 905.835374][ T5997] usb 2-1: device descriptor read/8, error -71 [ 906.102530][ T5997] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 906.137718][ T5997] usb 2-1: device descriptor read/8, error -71 [ 906.242429][ T5997] usb usb2-port1: unable to enumerate USB device [ 906.327225][ T8945] tmpfs: Unsupported parameter 'mpol' [ 908.350031][ T8954] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 908.369688][ T8954] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 915.011965][ T31] audit: type=1400 audit(914.920:1015): avc: denied { create } for pid=8969 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 915.042095][ T31] audit: type=1400 audit(914.930:1016): avc: denied { connect } for pid=8969 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 915.418622][ T31] audit: type=1400 audit(915.320:1017): avc: denied { create } for pid=8980 comm="syz.0.1177" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 915.442089][ T31] audit: type=1400 audit(915.350:1018): avc: denied { write } for pid=8980 comm="syz.0.1177" name="file0" dev="tmpfs" ino=929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 915.450944][ T31] audit: type=1400 audit(915.350:1019): avc: denied { open } for pid=8980 comm="syz.0.1177" path="/177/file0" dev="tmpfs" ino=929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 915.517351][ T31] audit: type=1400 audit(915.420:1020): avc: denied { ioctl } for pid=8980 comm="syz.0.1177" path="/177/file0" dev="tmpfs" ino=929 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 915.567892][ T31] audit: type=1400 audit(915.470:1021): avc: denied { unlink } for pid=7129 comm="syz-executor" name="file0" dev="tmpfs" ino=929 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 915.847508][ T31] audit: type=1326 audit(915.750:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.0.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 915.870524][ T31] audit: type=1326 audit(915.750:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.0.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=83 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 915.913568][ T31] audit: type=1326 audit(915.810:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.0.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 916.534322][ T8993] netlink: 'syz.0.1182': attribute type 10 has an invalid length. [ 922.992893][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x1 [ 922.993600][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.994260][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.994835][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.995407][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.996570][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.997435][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.997836][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x2 [ 922.998219][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.998612][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.999025][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.999431][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 922.999811][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x4 [ 923.022869][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.050795][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.051437][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.051820][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.052226][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.052589][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.054154][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.054513][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.054878][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.055271][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.055626][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.055973][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.056331][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.056679][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.057032][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.057386][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.057734][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.058092][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.058448][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.058798][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.059184][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.059543][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.070648][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.071196][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.071681][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.072111][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.072590][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.074778][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.103151][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.105276][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.105886][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.106400][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.106931][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.107693][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.122877][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.123479][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.123871][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.124241][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.124619][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.125203][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.125779][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.126259][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.126663][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.129202][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.149669][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.158014][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.159470][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.172696][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.173287][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.173966][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.175192][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.175536][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.175884][ T9036] hid-generic 0000:0006:0008.0002: unknown main item tag 0x0 [ 923.176357][ T9036] hid-generic 0000:0006:0008.0002: item fetching failed at offset 72/161 [ 923.177209][ T9036] hid-generic 0000:0006:0008.0002: probe with driver hid-generic failed with error -22 [ 924.838746][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 924.838846][ T31] audit: type=1326 audit(924.710:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.844861][ T31] audit: type=1326 audit(924.740:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.853265][ T31] audit: type=1326 audit(924.750:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.863249][ T31] audit: type=1326 audit(924.770:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.864050][ T31] audit: type=1326 audit(924.770:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.864634][ T31] audit: type=1326 audit(924.770:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.882880][ T31] audit: type=1326 audit(924.770:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.883739][ T31] audit: type=1326 audit(924.770:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.899525][ T31] audit: type=1326 audit(924.800:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 924.905042][ T31] audit: type=1326 audit(924.810:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9066 comm="syz.0.1205" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.830537][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 934.830638][ T31] audit: type=1326 audit(934.730:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.831576][ T31] audit: type=1326 audit(934.730:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.832025][ T31] audit: type=1326 audit(934.730:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.832410][ T31] audit: type=1326 audit(934.730:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.832818][ T31] audit: type=1326 audit(934.730:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.854613][ T31] audit: type=1326 audit(934.740:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.856325][ T31] audit: type=1326 audit(934.760:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.858782][ T31] audit: type=1326 audit(934.760:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.863915][ T31] audit: type=1326 audit(934.770:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 934.876073][ T31] audit: type=1326 audit(934.770:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9135 comm="syz.0.1218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 942.610526][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 942.610627][ T31] audit: type=1400 audit(942.510:1077): avc: denied { bind } for pid=9175 comm="syz.0.1227" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 942.612107][ T31] audit: type=1400 audit(942.510:1078): avc: denied { name_bind } for pid=9175 comm="syz.0.1227" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 942.612926][ T31] audit: type=1400 audit(942.510:1079): avc: denied { node_bind } for pid=9175 comm="syz.0.1227" saddr=100.1.1.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 945.312484][ T31] audit: type=1400 audit(945.210:1080): avc: denied { connect } for pid=9193 comm="syz.1.1233" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 945.318247][ T31] audit: type=1400 audit(945.220:1081): avc: denied { write } for pid=9193 comm="syz.1.1233" path="socket:[13616]" dev="sockfs" ino=13616 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 946.703081][ T9210] €: renamed from bond0 (while UP) [ 946.822602][ T9213] capability: warning: `syz.0.1238' uses deprecated v2 capabilities in a way that may be insecure [ 947.152214][ T31] audit: type=1400 audit(947.060:1082): avc: denied { setopt } for pid=9215 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 947.161254][ T31] audit: type=1400 audit(947.070:1083): avc: denied { bind } for pid=9215 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 947.170908][ T31] audit: type=1400 audit(947.070:1084): avc: denied { listen } for pid=9215 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 947.206234][ T31] audit: type=1400 audit(947.110:1085): avc: denied { write } for pid=9215 comm="syz.1.1239" path="socket:[13650]" dev="sockfs" ino=13650 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 947.279828][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 947.281174][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 947.505181][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 947.505904][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 948.106143][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 948.106994][ T9220] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1240'. [ 948.750810][ T31] audit: type=1326 audit(948.650:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9229 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 948.752804][ T31] audit: type=1326 audit(948.650:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9229 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 948.834225][ T31] audit: type=1326 audit(948.740:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9229 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 948.835485][ T31] audit: type=1326 audit(948.740:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9229 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 951.507860][ T31] audit: type=1326 audit(951.410:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9242 comm="syz.1.1246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 951.512322][ T31] audit: type=1326 audit(951.420:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9242 comm="syz.1.1246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 951.513451][ T31] audit: type=1326 audit(951.420:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9242 comm="syz.1.1246" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 953.983060][ T31] audit: type=1400 audit(953.880:1093): avc: denied { audit_write } for pid=9252 comm="syz.0.1249" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 953.984084][ T31] audit: type=1107 audit(953.880:1094): pid=9252 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 954.285937][ T31] audit: type=1400 audit(954.190:1095): avc: denied { ioctl } for pid=9256 comm="syz.1.1250" path="socket:[13245]" dev="sockfs" ino=13245 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 954.292118][ T31] audit: type=1400 audit(954.200:1096): avc: denied { write } for pid=9256 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 954.308588][ T31] audit: type=1400 audit(954.210:1097): avc: denied { read } for pid=9256 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 954.864452][ T31] audit: type=1400 audit(954.770:1098): avc: denied { map } for pid=9256 comm="syz.1.1250" path="socket:[13247]" dev="sockfs" ino=13247 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 954.865518][ T31] audit: type=1400 audit(954.770:1099): avc: denied { read } for pid=9256 comm="syz.1.1250" path="socket:[13247]" dev="sockfs" ino=13247 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 955.000408][ T31] audit: type=1400 audit(954.900:1100): avc: denied { setopt } for pid=9256 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 957.080556][ T31] audit: type=1326 audit(956.980:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9268 comm="syz.0.1253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 957.091257][ T31] audit: type=1326 audit(957.000:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9268 comm="syz.0.1253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.810868][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 960.811260][ T31] audit: type=1326 audit(960.710:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="syz.0.1258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.812614][ T31] audit: type=1326 audit(960.710:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="syz.0.1258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.813483][ T31] audit: type=1326 audit(960.710:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="syz.0.1258" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.814473][ T31] audit: type=1326 audit(960.710:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.815112][ T31] audit: type=1326 audit(960.710:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.820946][ T31] audit: type=1326 audit(960.710:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.821714][ T31] audit: type=1326 audit(960.710:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.822568][ T31] audit: type=1326 audit(960.720:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.835768][ T31] audit: type=1326 audit(960.740:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 960.837041][ T31] audit: type=1326 audit(960.740:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9286 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 965.622052][ T9341] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1268'. [ 970.954733][ T9363] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1273'. [ 971.318721][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 971.318819][ T31] audit: type=1326 audit(971.220:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9368 comm="syz.0.1274" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 971.332203][ T31] audit: type=1326 audit(971.240:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9368 comm="syz.0.1274" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 971.333236][ T31] audit: type=1326 audit(971.240:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9368 comm="syz.0.1274" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 975.757831][ T9381] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1279'. [ 981.050695][ T9399] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1286'. [ 986.150638][ T9442] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1304'. [ 986.645491][ T31] audit: type=1400 audit(986.550:1150): avc: denied { watch } for pid=9445 comm="syz.1.1306" path="/proc/197" dev="proc" ino=14501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 986.661681][ T31] audit: type=1400 audit(986.560:1151): avc: denied { watch_reads } for pid=9445 comm="syz.1.1306" path="/proc/197" dev="proc" ino=14501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 987.830846][ T31] audit: type=1400 audit(987.730:1152): avc: denied { write } for pid=9462 comm="syz.0.1313" name="sockstat6" dev="proc" ino=4026532924 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 988.144636][ T9463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=9463 comm=syz.0.1313 [ 994.837150][ T31] audit: type=1400 audit(994.730:1153): avc: denied { mount } for pid=9530 comm="syz.0.1337" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 994.843070][ T31] audit: type=1400 audit(994.750:1154): avc: denied { unmount } for pid=9530 comm="syz.0.1337" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 997.085692][ T9585] tmpfs: Unknown parameter '9' [ 997.762417][ T31] audit: type=1326 audit(997.660:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.766925][ T31] audit: type=1326 audit(997.670:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.767789][ T31] audit: type=1326 audit(997.670:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.768485][ T31] audit: type=1326 audit(997.670:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.783097][ T31] audit: type=1326 audit(997.670:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.784770][ T31] audit: type=1326 audit(997.690:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.785554][ T31] audit: type=1326 audit(997.690:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 997.786278][ T31] audit: type=1326 audit(997.690:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9588 comm="syz.0.1348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 999.363759][ T9608] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1352'. [ 1000.294868][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1000.295029][ T31] audit: type=1326 audit(1000.180:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.330836][ T31] audit: type=1326 audit(1000.210:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.332410][ T31] audit: type=1326 audit(1000.210:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.334463][ T31] audit: type=1326 audit(1000.240:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.338319][ T31] audit: type=1326 audit(1000.240:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.353207][ T31] audit: type=1326 audit(1000.260:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.356872][ T31] audit: type=1326 audit(1000.260:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.357979][ T31] audit: type=1326 audit(1000.260:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.384675][ T31] audit: type=1326 audit(1000.260:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1000.389535][ T31] audit: type=1326 audit(1000.270:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9615 comm="syz.0.1355" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1007.678990][ T9638] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1007.686056][ T9638] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1008.878399][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1008.878493][ T31] audit: type=1326 audit(1008.770:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9641 comm="syz.0.1364" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1008.892158][ T31] audit: type=1326 audit(1008.780:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9641 comm="syz.0.1364" exe="/syz-executor" sig=0 arch=40000028 syscall=141 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1008.893154][ T31] audit: type=1326 audit(1008.800:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9641 comm="syz.0.1364" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1010.150820][ T31] audit: type=1400 audit(1010.050:1191): avc: denied { getopt } for pid=9645 comm="syz.0.1366" lport=51 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1011.721990][ T31] audit: type=1400 audit(1011.630:1192): avc: denied { checkpoint_restore } for pid=9649 comm="syz.0.1368" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1012.228918][ T31] audit: type=1326 audit(1012.130:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.0.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1012.242207][ T31] audit: type=1326 audit(1012.140:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.0.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1012.249636][ T31] audit: type=1326 audit(1012.150:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.0.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1012.254362][ T31] audit: type=1326 audit(1012.160:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.0.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1012.255729][ T31] audit: type=1326 audit(1012.160:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.0.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 1012.401722][ T32] INFO: task kworker/1:5:4537 blocked for more than 430 seconds. [ 1012.402643][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.403028][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1012.403515][ T32] task:kworker/1:5 state:D stack:0 pid:4537 tgid:4537 ppid:2 flags:0x00000000 [ 1012.404240][ T32] Workqueue: events bpf_prog_free_deferred [ 1012.404819][ T32] Call trace: [ 1012.405519][ T32] [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc) [ 1012.406435][ T32] r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:df90dda4 r5:84b40c00 [ 1012.407357][ T32] r4:84b40c00 [ 1012.407668][ T32] [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24) [ 1012.409808][ T32] r5:84b40c00 r4:82717b60 [ 1012.413281][ T32] [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1012.413813][ T32] [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18) [ 1012.422717][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df90de20 [ 1012.423456][ T32] r4:00000000 [ 1012.432905][ T32] [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40) [ 1012.433574][ T32] [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240) [ 1012.434399][ T32] [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4) [ 1012.434846][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85218c40 [ 1012.436131][ T32] r4:00000000 [ 1012.436396][ T32] [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64) [ 1012.436801][ T32] r9:84b40c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f232000 [ 1012.437978][ T32] [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14) [ 1012.438578][ T32] r5:00001000 r4:dfc5f000 SYZFAIL: failed to recv rpc [ 1012.441343][ T32] [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4) [ 1012.444721][ T32] [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1012.445288][ T32] r5:85032b54 r4:85032800 [ 1012.445512][ T32] [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1012.446053][ T32] r7:ddde40c0 r6:82c18200 r5:85032b54 r4:8516f400 [ 1012.446502][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1012.446934][ T32] r10:84b40c00 r9:8516f42c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1012.447385][ T32] r4:8516f400 [ 1012.447606][ T32] [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134) [ 1012.448007][ T32] r10:00000000 r9:dfd6de78 r8:852251c0 r7:8516f400 r6:80266a2c r5:84b40c00 [ 1012.448427][ T32] r4:852255c0 [ 1012.461850][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1012.462195][ T32] Exception stack(0xdf90dfb0 to 0xdf90dff8) [ 1012.462871][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1012.463858][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1012.464153][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1012.464374][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:852255c0 [ 1012.465287][ T32] INFO: task kworker/0:34:6020 blocked for more than 430 seconds. [ 1012.465560][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.465691][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1012.465952][ T32] task:kworker/0:34 state:D stack:0 pid:6020 tgid:6020 ppid:2 flags:0x00000000 [ 1012.470534][ T32] Workqueue: events bpf_prog_free_deferred fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1012.503674][ T32] Call trace: [ 1012.503952][ T32] [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc) [ 1012.504194][ T32] r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:dfd81da4 r5:84b83c00 [ 1012.504414][ T32] r4:84b83c00 [ 1012.504543][ T32] [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24) [ 1012.504830][ T32] r5:84b83c00 r4:82717b60 [ 1012.504943][ T32] [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1012.505225][ T32] [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18) [ 1012.505466][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e20 [ 1012.505666][ T32] r4:00000000 [ 1012.505763][ T32] [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40) [ 1012.506009][ T32] [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240) [ 1012.506287][ T32] [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4) [ 1012.506589][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c640 [ 1012.507020][ T32] r4:00000000 [ 1012.507302][ T32] [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64) [ 1012.507667][ T32] r9:84b83c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f230000 [ 1012.508096][ T32] [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14) [ 1012.508556][ T32] r5:00001000 r4:dfbc5000 [ 1012.508765][ T32] [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4) [ 1012.509231][ T32] [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1012.509642][ T32] r5:85033354 r4:85033000 [ 1012.509899][ T32] [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1012.520686][ T32] r7:dddd00c0 r6:82c18000 r5:85033354 r4:84541d80 [ 1012.520877][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1012.521117][ T32] r10:84b83c00 r9:84541dac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1012.521344][ T32] r4:84541d80 [ 1012.521437][ T32] [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134) [ 1012.521713][ T32] r10:00000000 r9:dfd19e78 r8:8514f5c0 r7:84541d80 r6:80266a2c r5:84b83c00 [ 1012.522077][ T32] r4:84457700 [ 1012.522174][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1012.522517][ T32] Exception stack(0xdfd81fb0 to 0xdfd81ff8) [ 1012.522670][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1012.522934][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1012.523297][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1012.523552][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:84457700 [ 1012.524349][ T32] INFO: task kworker/1:32:6100 blocked for more than 430 seconds. [ 1012.524543][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.524729][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1012.524999][ T32] task:kworker/1:32 state:D stack:0 pid:6100 tgid:6100 ppid:2 flags:0x00000000 [ 1012.525291][ T32] Workqueue: events bpf_prog_free_deferred [ 1012.525464][ T32] Call trace: [ 1012.525575][ T32] [<819bb694>] (__schedule) from [<819bc2d4>] (schedule+0x2c/0xfc) [ 1012.525824][ T32] r10:8260ca7c r9:00000000 r8:82717b64 r7:00000002 r6:dfe65da4 r5:85105400 [ 1012.526140][ T32] r4:85105400 [ 1012.526317][ T32] [<819bc2a8>] (schedule) from [<819bc688>] (schedule_preempt_disabled+0x18/0x24) [ 1012.526807][ T32] r5:85105400 r4:82717b60 [ 1012.527082][ T32] [<819bc670>] (schedule_preempt_disabled) from [<819bf160>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1012.527661][ T32] [<819bee78>] (__mutex_lock.constprop.0) from [<819bfa2c>] (__mutex_lock_slowpath+0x14/0x18) [ 1012.528384][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe65e20 [ 1012.528830][ T32] r4:00000000 [ 1012.529033][ T32] [<819bfa18>] (__mutex_lock_slowpath) from [<819bfa6c>] (mutex_lock+0x3c/0x40) [ 1012.529621][ T32] [<819bfa30>] (mutex_lock) from [<804adbe8>] (_vm_unmap_aliases+0x68/0x240) [ 1012.562784][ T32] [<804adb80>] (_vm_unmap_aliases) from [<804b1944>] (vfree+0x170/0x1e4) [ 1012.563275][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e6dc0 [ 1012.563527][ T32] r4:00000000 [ 1012.563692][ T32] [<804b17d4>] (vfree) from [<8050fb80>] (execmem_free+0x30/0x64) [ 1012.563989][ T32] r9:85105400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f252000 [ 1012.564248][ T32] [<8050fb50>] (execmem_free) from [<8039c4ac>] (bpf_jit_free_exec+0x10/0x14) [ 1012.564584][ T32] r5:00001000 r4:e0037000 [ 1012.564766][ T32] [<8039c49c>] (bpf_jit_free_exec) from [<8039c88c>] (bpf_jit_free+0x68/0xe4) [ 1012.565027][ T32] [<8039c824>] (bpf_jit_free) from [<8039d9e0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1012.565242][ T32] r5:85031b54 r4:85031800 [ 1012.565355][ T32] [<8039d894>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1012.565710][ T32] r7:ddde40c0 r6:82c18200 r5:85031b54 r4:84468180 [ 1012.565860][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1012.566124][ T32] r10:85105400 r9:844681ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1012.566311][ T32] r4:84468180 [ 1012.566403][ T32] [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134) [ 1012.566579][ T32] r10:00000000 r9:dfdcde78 r8:8523c780 r7:84468180 r6:80266a2c r5:85105400 [ 1012.589866][ T32] r4:841fdb00 [ 1012.590671][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1012.592059][ T32] Exception stack(0xdfe65fb0 to 0xdfe65ff8) [ 1012.593390][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1012.595366][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1012.597200][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1012.598846][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:841fdb00 [ 1012.605885][ T32] NMI backtrace for cpu 1 [ 1012.606280][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.606615][ T32] Hardware name: ARM-Versatile Express [ 1012.606833][ T32] Call trace: [ 1012.607032][ T32] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 1012.607295][ T32] r7:00000000 r6:00000013 r5:60000093 r4:8203d408 [ 1012.607477][ T32] [<819992bc>] (show_stack) from [<819b7780>] (dump_stack_lvl+0x70/0x7c) [ 1012.607712][ T32] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 1012.607975][ T32] r5:00000001 r4:00000001 [ 1012.608095][ T32] [<819b778c>] (dump_stack) from [<81986498>] (nmi_cpu_backtrace+0x160/0x17c) [ 1012.608619][ T32] [<81986338>] (nmi_cpu_backtrace) from [<819865e4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1012.609010][ T32] r7:00000001 r6:8260c5d0 r5:8261af0c r4:ffffffff [ 1012.609196][ T32] [<819864b4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1012.609564][ T32] r9:0001164c r8:828b6cf8 r7:8260c730 r6:00007d4d r5:8261b4c8 r4:8589601c [ 1012.609849][ T32] [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803581b0>] (watchdog+0x498/0x5b8) [ 1012.610429][ T32] [<80357d18>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134) [ 1012.610741][ T32] r10:00000000 r9:df819e58 r8:82f18400 r7:00000000 r6:80357d18 r5:82fd8c00 [ 1012.610960][ T32] r4:82ecfa00 [ 1012.611087][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1012.611309][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1012.611517][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1012.611720][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1012.611926][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1012.612098][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82ecfa00 [ 1012.613221][ T32] Sending NMI from CPU 1 to CPUs 0: [ 1012.614016][ C0] NMI backtrace for cpu 0 [ 1012.614291][ C0] CPU: 0 UID: 0 PID: 3079 Comm: sshd Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.614370][ C0] Hardware name: ARM-Versatile Express [ 1012.614418][ C0] PC is at _raw_write_unlock_irq+0x24/0x50 [ 1012.614525][ C0] LR is at release_task+0x468/0x62c [ 1012.614584][ C0] pc : [<819c4b38>] lr : [<80247d04>] psr: 60000013 [ 1012.614629][ C0] sp : df815da8 ip : df815db8 fp : df815db4 [ 1012.614668][ C0] r10: 84278000 r9 : 82870d08 r8 : 00000000 [ 1012.614708][ C0] r7 : 83528000 r6 : 83e0df00 r5 : 00000011 r4 : 84278000 [ 1012.614753][ C0] r3 : 00000000 r2 : 00000004 r1 : 84278000 r0 : 82604040 [ 1012.614873][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1012.614945][ C0] Control: 30c5387d Table: 84150a80 DAC: fffffffd [ 1012.615081][ C0] Call trace: [ 1012.615137][ C0] [<819c4b14>] (_raw_write_unlock_irq) from [<80247d04>] (release_task+0x468/0x62c) [ 1012.615195][ C0] [<8024789c>] (release_task) from [<802483c4>] (wait_consider_task+0x4fc/0xb80) [ 1012.615278][ C0] r10:00000010 r9:00f0b414 r8:0000ff00 r7:83e9aa00 r6:00000c22 r5:df815edc [ 1012.615300][ C0] r4:84278000 [ 1012.615325][ C0] [<80247ec8>] (wait_consider_task) from [<802499b8>] (__do_wait+0x8c/0x224) [ 1012.615386][ C0] r10:00000072 r9:84278000 r8:8427daac r7:000006ac r6:8427d400 r5:8427d400 [ 1012.615415][ C0] r4:df815edc [ 1012.615429][ C0] [<8024992c>] (__do_wait) from [<80249bbc>] (do_wait+0x6c/0x14c) [ 1012.615487][ C0] r9:8427d400 r8:df815ef4 r7:00000001 r6:df815edc r5:8427d400 r4:00000005 [ 1012.615514][ C0] [<80249b50>] (do_wait) from [<8024a174>] (kernel_wait4+0x9c/0x154) [ 1012.615589][ C0] r9:8427d400 r8:00000000 r7:00000000 r6:7ec79238 r5:00000000 r4:00000005 [ 1012.615607][ C0] [<8024a0d8>] (kernel_wait4) from [<8024a3bc>] (sys_wait4+0xf4/0x100) [ 1012.615694][ C0] r9:8427d400 r8:8020029c r7:ffffffff r6:00000001 r5:00000000 r4:7ec79238 [ 1012.615709][ C0] [<8024a2c8>] (sys_wait4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1012.615755][ C0] Exception stack(0xdf815fa8 to 0xdf815ff0) [ 1012.615794][ C0] 5fa0: 00000000 ffffffff ffffffff 7ec79238 00000001 00000000 [ 1012.615827][ C0] 5fc0: 00000000 ffffffff 76f02c80 00000072 00689488 ffffffff 00000001 005308c8 [ 1012.615853][ C0] 5fe0: 00530c10 7ec79170 76ad97f8 76ad96a8 [ 1012.615882][ C0] r7:00000072 r6:76f02c80 r5:ffffffff r4:00000000 [ 1012.616986][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1012.632326][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 1012.632690][ T32] Hardware name: ARM-Versatile Express [ 1012.632970][ T32] Call trace: [ 1012.633195][ T32] [<819991d8>] (dump_backtrace) from [<819992d4>] (show_stack+0x18/0x1c) [ 1012.633575][ T32] r7:00000000 r6:82622f44 r5:00000000 r4:8203d408 [ 1012.633852][ T32] [<819992bc>] (show_stack) from [<819b7764>] (dump_stack_lvl+0x54/0x7c) [ 1012.634226][ T32] [<819b7710>] (dump_stack_lvl) from [<819b77a4>] (dump_stack+0x18/0x1c) [ 1012.634586][ T32] r5:00000000 r4:82870d18 [ 1012.634800][ T32] [<819b778c>] (dump_stack) from [<81999e00>] (panic+0x120/0x374) [ 1012.635155][ T32] [<81999ce0>] (panic) from [<80358030>] (watchdog+0x318/0x5b8) [ 1012.635509][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8203df08 [ 1012.635733][ T32] r7:8260c730 [ 1012.635819][ T32] [<80357d18>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134) [ 1012.636034][ T32] r10:00000000 r9:df819e58 r8:82f18400 r7:00000000 r6:80357d18 r5:82fd8c00 [ 1012.636254][ T32] r4:82ecfa00 [ 1012.636409][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1012.636628][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1012.636754][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1012.636923][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1012.637083][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1012.637228][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82ecfa00 [ 1012.639120][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:20:21 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000002 R03=819b95d0 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=836aec00 R11=df9c5e2c R12=df9c5e30 R13=df9c5e20 R14=819b8268 R15=819b95e0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=fffdee6f d01=fffdee6f00000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fe93b257 s09=00e62b28 d04=00e62b28fe93b257 s10=ffffffff s11=00000000 d05=00000000ffffffff s12=014f53c5 s13=ff338c9a d06=ff338c9a014f53c5 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=00000000 s17=0869f319 d08=0869f31900000000 s18=96000000 s19=0000077d d09=0000077d96000000 s20=018ff6ce s21=ff338c9d d10=ff338c9d018ff6ce s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=0093b257 s25=00000000 d12=000000000093b257 s26=00000000 s27=fffdee6f d13=fffdee6f00000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=009d48b0 s33=ff810ed9 d16=ff810ed9009d48b0 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=01b6944d s37=00e4ff7a d18=00e4ff7a01b6944d s38=00000000 s39=00000000 d19=0000000000000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=000b3c61 s43=00000000 d21=00000000000b3c61 s44=00000000 s45=00000000 d22=0000000000000000 s46=0003becb s47=00000000 d23=000000000003becb s48=018e1aff s49=0869f319 d24=0869f319018e1aff s50=00472911 s51=00000000 d25=0000000000472911 s52=feba7f80 s53=fe1e48e0 d26=fe1e48e0feba7f80 s54=01617c26 s55=ff2b6a66 d27=ff2b6a6601617c26 s56=014949d9 s57=ff953bc6 d28=ff953bc6014949d9 s58=ffca9de3 s59=01617c26 d29=01617c26ffca9de3 s60=009ff239 s61=fffdee6f d30=fffdee6f009ff239 s62=3a4c8946 s63=0027207f d31=0027207f3a4c8946 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=827584a4 R01=eb0fd030 R02=827585e0 R03=00000030 R04=83ea7c40 R05=60000093 R06=00000f01 R07=00000001 R08=00000000 R09=00000061 R10=00000001 R11=df8e1cb8 R12=00000002 R13=df8e1c94 R14=00000008 R15=809ecc40 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000