last executing test programs: 46.560899503s ago: executing program 1 (id=631): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x51}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x1064, 0x80, 0x200003, 0x1af}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {0x0}], 0x2}, 0x0, 0x3, 0x0, {0x2}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r2, 0x47f8, 0x0, 0x0, 0x0, 0x0) 44.264556895s ago: executing program 1 (id=632): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={0x24, 0x2, 0x3, 0x101, 0x0, 0x0, {0x1, 0x0, 0xffff}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x2e}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1f}]}, 0x24}}, 0x814) 43.999170246s ago: executing program 1 (id=633): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newtaction={0x60, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ctinfo={0x48, 0x1, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x0, 0x0, 0x20000000}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10004}, 0x0) 43.750161476s ago: executing program 1 (id=634): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x109041, 0x0) mount$bind(&(0x7f0000000880)='./file0/../file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x1adc11, 0x0) 43.40213128s ago: executing program 1 (id=635): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, 0x0, 0x4008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x66, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x64010101, @multicast1}, {0x0, 0x4e20, 0x8}}}}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0xffffffffffffff6b, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x82) 42.943833828s ago: executing program 1 (id=636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x9, 0x763, 0x5, 0xc, 0x9}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) 42.941475768s ago: executing program 32 (id=636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x9, 0x763, 0x5, 0xc, 0x9}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) 4.419969092s ago: executing program 0 (id=718): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000001080)={0x0, "ddbccf094c5457df7a3f7457a4e81d59f6bffca5bf7c026c91255969954a3cec19ae878c0ca3fce72e29df4e4dbd001eb127ffbed6cc47890c19c3edc50daa56", 0x26}, 0x48, 0x0) fchdir(0xffffffffffffffff) close(0x3) getgid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x4004110) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) r1 = socket(0x400000000010, 0x3, 0x0) dup2(r1, r0) 4.090422456s ago: executing program 0 (id=720): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={0x28, r0, 0x10ada85e65c25359, 0xfffffffd, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x1a}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8441}, 0x4000000) 3.286698768s ago: executing program 0 (id=722): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000010010000000ffdbdf2500000000", @ANYRES32, @ANYBLOB="20000000280e0400280012800b0001006d61637365630000180002800500030008"], 0x48}, 0x1, 0x0, 0x0, 0x24008001}, 0x0) 3.002277839s ago: executing program 0 (id=724): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 2.858142415s ago: executing program 2 (id=725): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'pim6reg0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f0000000140)={'batadv0\x00', 0x12}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x411}) 2.087845556s ago: executing program 2 (id=726): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000980)=0xfffffffb, 0x4) 1.748541329s ago: executing program 2 (id=727): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(r1, &(0x7f0000001540)="028988a8", 0x4, 0x8000050, &(0x7f0000000080)={0x11, 0x8100, r2, 0x1, 0xfb}, 0x14) 992.761689ms ago: executing program 0 (id=728): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x0, 0x0) 649.041643ms ago: executing program 2 (id=729): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x18) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 477.30973ms ago: executing program 2 (id=730): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$TIOCSSOFTCAR(r0, 0x5453, 0x0) 300.056457ms ago: executing program 0 (id=731): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)='%+9llu \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x20, &(0x7f0000000200)="df33c9f7b9a60000000000002000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bea100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x9}, 0x10, 0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a603f00000000000500000014000500200100000000000000000100000000001c00090008000000", @ANYRES32=r3], 0x4c}}, 0x0) 0s ago: executing program 2 (id=732): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x3e) kernel console output (not intermixed with test programs): [ 53.447344][ T31] audit: type=1400 audit(53.360:56): avc: denied { read write } for pid=3116 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.450999][ T31] audit: type=1400 audit(53.360:57): avc: denied { open } for pid=3116 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:10195' (ED25519) to the list of known hosts. [ 67.052545][ T31] audit: type=1400 audit(66.960:58): avc: denied { name_bind } for pid=3119 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.093196][ T31] audit: type=1400 audit(68.990:59): avc: denied { execute } for pid=3120 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.144445][ T31] audit: type=1400 audit(69.030:60): avc: denied { execute_no_trans } for pid=3120 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.856763][ T31] audit: type=1400 audit(71.760:61): avc: denied { mounton } for pid=3120 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 71.862434][ T31] audit: type=1400 audit(71.770:62): avc: denied { mount } for pid=3120 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.882975][ T3120] cgroup: Unknown subsys name 'net' [ 71.894098][ T31] audit: type=1400 audit(71.800:63): avc: denied { unmount } for pid=3120 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.100344][ T3120] cgroup: Unknown subsys name 'cpuset' [ 72.107953][ T3120] cgroup: Unknown subsys name 'hugetlb' [ 72.109078][ T3120] cgroup: Unknown subsys name 'rlimit' [ 72.420589][ T31] audit: type=1400 audit(72.330:64): avc: denied { setattr } for pid=3120 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.423684][ T31] audit: type=1400 audit(72.330:65): avc: denied { mounton } for pid=3120 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.430012][ T31] audit: type=1400 audit(72.330:66): avc: denied { mount } for pid=3120 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 72.668608][ T3122] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 72.672596][ T31] audit: type=1400 audit(72.580:67): avc: denied { relabelto } for pid=3122 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.680810][ T31] audit: type=1400 audit(72.590:68): avc: denied { write } for pid=3122 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.706622][ T31] audit: type=1400 audit(72.620:69): avc: denied { read } for pid=3120 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.711917][ T31] audit: type=1400 audit(72.620:70): avc: denied { open } for pid=3120 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.886994][ T3120] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.016866][ T31] audit: type=1400 audit(82.920:71): avc: denied { execmem } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.096949][ T31] audit: type=1400 audit(83.000:72): avc: denied { read } for pid=3125 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.099885][ T31] audit: type=1400 audit(83.010:73): avc: denied { open } for pid=3125 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.114127][ T31] audit: type=1400 audit(83.020:74): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.144233][ T31] audit: type=1400 audit(83.050:75): avc: denied { module_request } for pid=3126 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.150957][ T31] audit: type=1400 audit(83.060:76): avc: denied { module_request } for pid=3125 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.230416][ T31] audit: type=1400 audit(83.140:77): avc: denied { sys_module } for pid=3125 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 83.740793][ T31] audit: type=1400 audit(83.650:78): avc: denied { ioctl } for pid=3125 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.867773][ T3125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.879669][ T3125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.082908][ T3126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.092849][ T3126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.750139][ T3126] hsr_slave_0: entered promiscuous mode [ 85.753829][ T3126] hsr_slave_1: entered promiscuous mode [ 85.851816][ T3125] hsr_slave_0: entered promiscuous mode [ 85.852983][ T3125] hsr_slave_1: entered promiscuous mode [ 85.854920][ T3125] debugfs: 'hsr0' already exists in 'hsr' [ 85.856062][ T3125] Cannot create hsr debugfs directory [ 86.325152][ T31] audit: type=1400 audit(86.230:79): avc: denied { create } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.336259][ T31] audit: type=1400 audit(86.240:80): avc: denied { write } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.339495][ T3126] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.353414][ T3126] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.367114][ T3126] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.384814][ T3126] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.494643][ T3125] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.509316][ T3125] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.520728][ T3125] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.534282][ T3125] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.289817][ T3126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.371646][ T3125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.513178][ T3125] veth0_vlan: entered promiscuous mode [ 90.549234][ T3125] veth1_vlan: entered promiscuous mode [ 90.652998][ T3126] veth0_vlan: entered promiscuous mode [ 90.668362][ T3125] veth0_macvtap: entered promiscuous mode [ 90.693095][ T3126] veth1_vlan: entered promiscuous mode [ 90.698150][ T3125] veth1_macvtap: entered promiscuous mode [ 90.783803][ T3126] veth0_macvtap: entered promiscuous mode [ 90.831957][ T3126] veth1_macvtap: entered promiscuous mode [ 90.835231][ T2970] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.857468][ T2970] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.857821][ T2970] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.858140][ T2970] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.998618][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 90.998858][ T31] audit: type=1400 audit(90.910:82): avc: denied { mount } for pid=3125 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.013492][ T3815] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.013874][ T3815] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.014214][ T3815] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.014443][ T3815] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.021771][ T31] audit: type=1400 audit(90.930:83): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/syzkaller.0lNt2Y/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.039544][ T31] audit: type=1400 audit(90.950:84): avc: denied { mount } for pid=3125 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.058379][ T31] audit: type=1400 audit(90.970:85): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/syzkaller.0lNt2Y/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.071427][ T31] audit: type=1400 audit(90.980:86): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/syzkaller.0lNt2Y/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.127404][ T31] audit: type=1400 audit(91.030:87): avc: denied { unmount } for pid=3125 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.153316][ T31] audit: type=1400 audit(91.060:88): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.156089][ T31] audit: type=1400 audit(91.060:89): avc: denied { mount } for pid=3125 comm="syz-executor" name="/" dev="gadgetfs" ino=3163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.182394][ T31] audit: type=1400 audit(91.090:90): avc: denied { mount } for pid=3125 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.184578][ T31] audit: type=1400 audit(91.090:91): avc: denied { mounton } for pid=3125 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.294156][ T3125] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.923604][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 91.930918][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 92.048198][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 92.048712][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 92.294312][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 92.294800][ T3819] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.2'. [ 92.453298][ T3824] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 92.619938][ T3826] SELinux: ebitmap: truncated map [ 92.642762][ T3826] SELinux: failed to load policy [ 93.271104][ T3831] SELinux: policydb version -580955922 does not match my version range 15-35 [ 93.273469][ T3831] SELinux: failed to load policy [ 95.042794][ T3848] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 95.044113][ T3848] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 95.051001][ T3848] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 99.217900][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 99.218345][ T31] audit: type=1400 audit(99.130:119): avc: denied { create } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 99.390793][ T31] audit: type=1400 audit(99.300:120): avc: denied { connect } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 100.056229][ T3884] wireguard0: entered promiscuous mode [ 100.057468][ T3884] wireguard0: entered allmulticast mode [ 100.743210][ T31] audit: type=1400 audit(100.650:121): avc: denied { execute } for pid=3900 comm="syz.1.27" dev="tmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 100.744591][ T3902] process 'syz.1.27' launched '/dev/fd/5' with NULL argv: empty string added [ 100.747563][ T31] audit: type=1400 audit(100.650:122): avc: denied { execute_no_trans } for pid=3900 comm="syz.1.27" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 101.965999][ T31] audit: type=1400 audit(101.860:123): avc: denied { bind } for pid=3903 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 101.971900][ T31] audit: type=1400 audit(101.880:124): avc: denied { name_bind } for pid=3903 comm="syz.0.28" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 101.986043][ T31] audit: type=1400 audit(101.890:125): avc: denied { create } for pid=3903 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 101.998826][ T31] audit: type=1400 audit(101.910:126): avc: denied { name_bind } for pid=3903 comm="syz.0.28" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 102.002476][ T31] audit: type=1400 audit(101.910:127): avc: denied { node_bind } for pid=3903 comm="syz.0.28" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 103.787751][ T3914] pimreg: entered allmulticast mode [ 104.631502][ T3912] pimreg: left allmulticast mode [ 105.200374][ T31] audit: type=1326 audit(105.110:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.208537][ T31] audit: type=1326 audit(105.120:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.216434][ T31] audit: type=1326 audit(105.120:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.216936][ T31] audit: type=1326 audit(105.120:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.217173][ T31] audit: type=1326 audit(105.130:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.233992][ T31] audit: type=1326 audit(105.130:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.238219][ T31] audit: type=1326 audit(105.130:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.250194][ T31] audit: type=1326 audit(105.160:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.268571][ T31] audit: type=1326 audit(105.170:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 105.268940][ T31] audit: type=1326 audit(105.170:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3939 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 110.713773][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 110.713932][ T31] audit: type=1400 audit(110.610:157): avc: denied { bind } for pid=4000 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 112.208840][ T31] audit: type=1326 audit(112.120:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.209144][ T31] audit: type=1326 audit(112.120:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.219610][ T31] audit: type=1326 audit(112.130:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.238912][ T31] audit: type=1326 audit(112.140:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.239210][ T31] audit: type=1326 audit(112.150:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.252426][ T31] audit: type=1326 audit(112.160:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.286977][ T31] audit: type=1326 audit(112.200:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.287292][ T31] audit: type=1326 audit(112.200:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.299931][ T31] audit: type=1326 audit(112.210:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4011 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 112.724938][ T4016] IPv6: NLM_F_CREATE should be specified when creating new route [ 114.542156][ T4031] syz.1.61 uses obsolete (PF_INET,SOCK_PACKET) [ 121.851872][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 121.852230][ T31] audit: type=1400 audit(121.760:173): avc: denied { unmount } for pid=3125 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 122.007032][ T4044] netlink: 4 bytes leftover after parsing attributes in process `syz.0.65'. [ 130.990909][ T31] audit: type=1400 audit(130.900:174): avc: denied { bind } for pid=4098 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.993980][ T31] audit: type=1400 audit(130.900:175): avc: denied { node_bind } for pid=4098 comm="syz.0.69" saddr=fe80::aa scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 131.234613][ T31] audit: type=1400 audit(131.140:176): avc: denied { mount } for pid=4102 comm="syz.0.71" name="/" dev="ramfs" ino=3395 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 141.440463][ T31] audit: type=1326 audit(141.340:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 141.451049][ T31] audit: type=1326 audit(141.350:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 141.471172][ T31] audit: type=1326 audit(141.380:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 141.486792][ T31] audit: type=1326 audit(141.380:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 141.487201][ T31] audit: type=1326 audit(141.380:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.1.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 141.679036][ T31] audit: type=1400 audit(141.590:182): avc: denied { getopt } for pid=4119 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 144.339349][ T4132] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). [ 144.343712][ T31] audit: type=1400 audit(144.250:183): avc: denied { relabelfrom } for pid=4131 comm="syz.1.84" name="PACKET" dev="sockfs" ino=3468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 144.350630][ T31] audit: type=1400 audit(144.250:184): avc: denied { relabelto } for pid=4131 comm="syz.1.84" name="PACKET" dev="sockfs" ino=3468 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=packet_socket permissive=1 trawcon="system_u:object_r:iptables_unit_file_t:s0" [ 144.858434][ T31] audit: type=1326 audit(144.730:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 144.878561][ T31] audit: type=1326 audit(144.790:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=63 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 145.435278][ T4141] netlink: 8 bytes leftover after parsing attributes in process `syz.1.88'. [ 145.642956][ T4145] netlink: 8 bytes leftover after parsing attributes in process `syz.1.90'. [ 146.758019][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 146.776067][ T31] audit: type=1400 audit(146.660:202): avc: denied { create } for pid=4152 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.807478][ T31] audit: type=1400 audit(146.710:203): avc: denied { write } for pid=4152 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.820589][ T31] audit: type=1400 audit(146.730:204): avc: denied { read } for pid=4152 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 146.852756][ T31] audit: type=1400 audit(146.760:205): avc: denied { execmem } for pid=4152 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 147.324855][ T31] audit: type=1326 audit(147.230:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 147.333706][ T31] audit: type=1326 audit(147.240:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 147.340179][ T31] audit: type=1326 audit(147.250:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 147.358983][ T31] audit: type=1326 audit(147.260:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 147.396687][ T31] audit: type=1326 audit(147.280:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 147.427571][ T31] audit: type=1326 audit(147.340:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 148.248998][ T4165] netlink: 'syz.0.97': attribute type 16 has an invalid length. [ 148.249471][ T4165] netlink: 156 bytes leftover after parsing attributes in process `syz.0.97'. [ 149.446498][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.447923][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448079][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448192][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448421][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448532][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448636][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448784][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.448935][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.449068][ T3973] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 149.534904][ T3973] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 155.937520][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 155.937763][ T31] audit: type=1400 audit(155.840:237): avc: denied { read } for pid=4212 comm="syz.1.110" dev="nsfs" ino=4026532727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 155.969452][ T31] audit: type=1400 audit(155.880:238): avc: denied { open } for pid=4212 comm="syz.1.110" path="net:[4026532727]" dev="nsfs" ino=4026532727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 156.556299][ T31] audit: type=1400 audit(156.450:239): avc: denied { sys_module } for pid=4212 comm="syz.1.110" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 157.104659][ T31] audit: type=1326 audit(157.010:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.106835][ T31] audit: type=1326 audit(157.020:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.110840][ T31] audit: type=1326 audit(157.020:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.118786][ T31] audit: type=1326 audit(157.030:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.135313][ T31] audit: type=1326 audit(157.040:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.166355][ T31] audit: type=1326 audit(157.040:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 157.166796][ T31] audit: type=1326 audit(157.050:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4218 comm="syz.1.111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 160.957283][ T4247] netlink: 4 bytes leftover after parsing attributes in process `syz.0.117'. [ 162.328213][ T3973] hid_parser_main: 8 callbacks suppressed [ 162.328511][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.328828][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.328986][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329098][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329267][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329377][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329481][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329586][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329692][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.329795][ T3973] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 162.389353][ T3973] hid-generic 0008:0006:0007.0002: hidraw0: HID v0.0b Device [syz1] on syz1 [ 163.872105][ T4276] syzkaller0: entered promiscuous mode [ 163.872702][ T4276] syzkaller0: entered allmulticast mode [ 163.955052][ T4276] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 167.400486][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 167.402192][ T31] audit: type=1400 audit(167.310:258): avc: denied { create } for pid=4287 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 167.405822][ T31] audit: type=1400 audit(167.310:259): avc: denied { write } for pid=4287 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 168.857087][ T31] audit: type=1400 audit(168.760:260): avc: denied { load_policy } for pid=4297 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 168.910970][ T4299] SELinux: ebitmap: truncated map [ 168.948375][ T4299] SELinux: failed to load policy [ 172.580183][ T31] audit: type=1400 audit(172.490:261): avc: denied { create } for pid=4326 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 172.590346][ T31] audit: type=1400 audit(172.490:262): avc: denied { write } for pid=4326 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 172.739639][ T4327] netlink: 'syz.0.137': attribute type 10 has an invalid length. [ 172.740061][ T4327] netlink: 40 bytes leftover after parsing attributes in process `syz.0.137'. [ 173.323605][ T31] audit: type=1400 audit(173.230:263): avc: denied { setopt } for pid=4330 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 176.670982][ T31] audit: type=1400 audit(176.580:264): avc: denied { mount } for pid=4337 comm="syz.0.142" name="/" dev="ramfs" ino=3747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 190.083032][ T4344] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.144'. [ 190.585105][ T31] audit: type=1400 audit(190.490:265): avc: denied { name_bind } for pid=4345 comm="syz.1.145" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 190.587583][ T31] audit: type=1400 audit(190.490:266): avc: denied { node_bind } for pid=4345 comm="syz.1.145" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 194.159672][ T4355] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.149'. [ 195.526299][ T31] audit: type=1326 audit(195.430:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.530762][ T31] audit: type=1326 audit(195.440:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.534263][ T31] audit: type=1326 audit(195.440:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.546663][ T31] audit: type=1326 audit(195.460:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.559767][ T31] audit: type=1326 audit(195.470:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.567332][ T31] audit: type=1400 audit(195.470:272): avc: denied { getopt } for pid=4363 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 195.586633][ T31] audit: type=1326 audit(195.490:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.589240][ T31] audit: type=1326 audit(195.490:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4363 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 195.724153][ T4366] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.154'. [ 195.845032][ T31] audit: type=1400 audit(195.750:275): avc: denied { create } for pid=4367 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 195.861428][ T31] audit: type=1400 audit(195.770:276): avc: denied { connect } for pid=4367 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 195.878013][ T31] audit: type=1400 audit(195.790:277): avc: denied { write } for pid=4367 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 215.944337][ T31] audit: type=1400 audit(215.850:278): avc: denied { create } for pid=4394 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 215.952163][ T31] audit: type=1400 audit(215.860:279): avc: denied { ioctl } for pid=4394 comm="syz.1.157" path="socket:[2931]" dev="sockfs" ino=2931 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 218.702393][ T4423] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.159'. [ 220.722666][ T4434] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.164'. [ 221.804826][ T4441] netlink: 24 bytes leftover after parsing attributes in process `syz.1.168'. [ 222.082375][ T4456] netlink: 4536 bytes leftover after parsing attributes in process `syz.0.169'. [ 222.718700][ T31] audit: type=1400 audit(222.630:280): avc: denied { write } for pid=4462 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 223.093677][ T4467] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.175'. [ 223.389715][ T31] audit: type=1326 audit(223.300:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.407106][ T31] audit: type=1326 audit(223.310:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.477801][ T31] audit: type=1326 audit(223.390:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.480036][ T31] audit: type=1326 audit(223.390:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.497732][ T31] audit: type=1326 audit(223.400:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.641479][ T31] audit: type=1326 audit(223.550:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4474 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 223.682951][ T31] audit: type=1326 audit(223.580:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.683745][ T31] audit: type=1326 audit(223.590:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 223.809747][ T31] audit: type=1326 audit(223.720:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4470 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 224.134591][ T4480] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.180'. [ 226.285801][ C0] hrtimer: interrupt took 630000 ns [ 228.977872][ T4497] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.187'. [ 233.523551][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 233.523963][ T31] audit: type=1326 audit(233.430:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.524231][ T31] audit: type=1326 audit(233.430:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.554651][ T31] audit: type=1326 audit(233.440:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.555001][ T31] audit: type=1326 audit(233.440:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.555218][ T31] audit: type=1326 audit(233.440:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.608071][ T31] audit: type=1326 audit(233.520:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=349 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.612902][ T31] audit: type=1326 audit(233.520:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 233.613091][ T31] audit: type=1326 audit(233.520:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4506 comm="syz.1.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 234.031197][ T31] audit: type=1400 audit(233.940:311): avc: denied { create } for pid=4508 comm="syz.1.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 240.004466][ T4512] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.192'. [ 243.407803][ T31] audit: type=1400 audit(243.320:312): avc: denied { create } for pid=4520 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 244.766961][ T31] audit: type=1326 audit(244.670:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.767334][ T31] audit: type=1326 audit(244.680:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.774944][ T31] audit: type=1326 audit(244.680:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.775678][ T31] audit: type=1326 audit(244.680:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.775935][ T31] audit: type=1326 audit(244.680:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.794699][ T31] audit: type=1326 audit(244.700:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=324 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.817152][ T31] audit: type=1326 audit(244.720:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.817544][ T31] audit: type=1326 audit(244.720:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=333 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 244.817776][ T31] audit: type=1326 audit(244.720:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 250.038447][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 250.045986][ T31] audit: type=1400 audit(249.950:373): avc: denied { create } for pid=4557 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 250.048481][ T31] audit: type=1400 audit(249.950:374): avc: denied { bind } for pid=4557 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 255.139043][ T31] audit: type=1326 audit(255.050:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.150684][ T31] audit: type=1326 audit(255.060:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.154457][ T31] audit: type=1326 audit(255.060:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.168231][ T31] audit: type=1326 audit(255.070:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.171091][ T31] audit: type=1326 audit(255.080:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.179014][ T31] audit: type=1326 audit(255.090:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.186167][ T31] audit: type=1326 audit(255.090:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.192185][ T31] audit: type=1326 audit(255.100:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.212452][ T31] audit: type=1326 audit(255.110:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 255.217826][ T31] audit: type=1326 audit(255.120:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.1.214" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 263.001657][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 263.007120][ T31] audit: type=1400 audit(262.910:401): avc: denied { read } for pid=4603 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 263.031267][ T31] audit: type=1400 audit(262.940:402): avc: denied { prog_load } for pid=4603 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 263.041936][ T31] audit: type=1400 audit(262.950:403): avc: denied { bpf } for pid=4603 comm="syz.0.225" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 263.044591][ T31] audit: type=1400 audit(262.950:404): avc: denied { perfmon } for pid=4603 comm="syz.0.225" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 263.048771][ T31] audit: type=1400 audit(262.960:405): avc: denied { prog_run } for pid=4603 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 263.071306][ T31] audit: type=1400 audit(262.980:406): avc: denied { append } for pid=4603 comm="syz.0.225" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 263.076169][ T31] audit: type=1400 audit(262.980:407): avc: denied { open } for pid=4603 comm="syz.0.225" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 263.082114][ T31] audit: type=1400 audit(262.990:408): avc: denied { ioctl } for pid=4603 comm="syz.0.225" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 263.156325][ T31] audit: type=1400 audit(263.060:409): avc: denied { create } for pid=4603 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 263.159353][ T31] audit: type=1400 audit(263.070:410): avc: denied { write } for pid=4603 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 268.024095][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 268.024339][ T31] audit: type=1400 audit(267.930:413): avc: denied { create } for pid=4624 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 268.089055][ T4625] netlink: 'syz.0.230': attribute type 10 has an invalid length. [ 271.858229][ T31] audit: type=1400 audit(271.760:414): avc: denied { allowed } for pid=4635 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 271.861093][ T31] audit: type=1400 audit(271.770:415): avc: denied { create } for pid=4635 comm="syz.0.235" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 271.862639][ T31] audit: type=1400 audit(271.770:416): avc: denied { map } for pid=4635 comm="syz.0.235" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4094 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 271.863135][ T31] audit: type=1400 audit(271.770:417): avc: denied { read write } for pid=4635 comm="syz.0.235" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4094 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 272.106686][ T31] audit: type=1400 audit(272.000:418): avc: denied { unmount } for pid=3126 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 272.177153][ T31] audit: type=1400 audit(272.080:419): avc: denied { read write } for pid=3126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.191155][ T31] audit: type=1400 audit(272.100:420): avc: denied { open } for pid=3126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.194948][ T31] audit: type=1400 audit(272.100:421): avc: denied { ioctl } for pid=3126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 272.573012][ T31] audit: type=1400 audit(272.480:422): avc: denied { map_create } for pid=4641 comm="syz.0.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 273.409499][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 273.410248][ T31] audit: type=1400 audit(273.320:424): avc: denied { write } for pid=4649 comm="syz.0.241" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 273.418006][ T31] audit: type=1400 audit(273.330:425): avc: denied { mounton } for pid=4649 comm="syz.0.241" path="/101/file0" dev="tmpfs" ino=527 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 273.442988][ T31] audit: type=1400 audit(273.350:426): avc: denied { mount } for pid=4649 comm="syz.0.241" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 275.955094][ T31] audit: type=1400 audit(275.860:427): avc: denied { load_policy } for pid=4662 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 275.955159][ T4663] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 275.966387][ T4663] SELinux: failed to load policy [ 276.797708][ T4667] netlink: 'syz.1.248': attribute type 10 has an invalid length. [ 277.144886][ T31] audit: type=1400 audit(277.020:428): avc: denied { create } for pid=4668 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 277.310702][ T31] audit: type=1400 audit(277.220:429): avc: denied { write } for pid=4668 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 278.495210][ T31] audit: type=1400 audit(278.400:430): avc: denied { create } for pid=4672 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 278.560420][ T31] audit: type=1400 audit(278.460:431): avc: denied { write } for pid=4672 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 287.142598][ T4691] ip6gre1: entered allmulticast mode [ 287.830739][ T4697] netlink: 4536 bytes leftover after parsing attributes in process `syz.0.261'. [ 288.690981][ T31] audit: type=1400 audit(288.600:432): avc: denied { mount } for pid=4685 comm="+}[@" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 288.799026][ T4686] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 293.076447][ T31] audit: type=1326 audit(292.980:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.086672][ T31] audit: type=1326 audit(292.990:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.093771][ T31] audit: type=1326 audit(293.000:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.129043][ T31] audit: type=1326 audit(293.040:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.141260][ T31] audit: type=1326 audit(293.050:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.159090][ T31] audit: type=1326 audit(293.060:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.184253][ T31] audit: type=1326 audit(293.090:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.187809][ T31] audit: type=1326 audit(293.100:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.210824][ T4710] capability: warning: `syz.1.265' uses deprecated v2 capabilities in a way that may be insecure [ 293.217733][ T31] audit: type=1326 audit(293.110:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4709 comm="syz.1.265" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 293.793234][ T4713] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.266'. [ 294.468344][ T4715] syz_tun: refused to change device tx_queue_len [ 297.486202][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 297.486486][ T31] audit: type=1400 audit(297.390:444): avc: denied { ioctl } for pid=4720 comm="syz.1.269" path="socket:[5257]" dev="sockfs" ino=5257 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.190671][ T31] audit: type=1400 audit(298.100:445): avc: denied { sys_module } for pid=4720 comm="syz.1.269" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 299.754911][ T4728] netlink: 4536 bytes leftover after parsing attributes in process `syz.1.271'. [ 303.406751][ T4739] netlink: 40 bytes leftover after parsing attributes in process `syz.1.275'. [ 304.407124][ T4744] Illegal XDP return value 252 on prog (id 151) dev N/A, expect packet loss! [ 308.040091][ T4759] *** NOT YET: opcode db *** [ 309.326139][ T31] audit: type=1400 audit(309.230:446): avc: denied { create } for pid=4764 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 309.412991][ T31] audit: type=1400 audit(309.320:447): avc: denied { write } for pid=4764 comm="syz.1.283" path="socket:[5329]" dev="sockfs" ino=5329 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 310.927414][ T31] audit: type=1400 audit(310.840:448): avc: denied { create } for pid=4769 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 310.938659][ T31] audit: type=1400 audit(310.840:449): avc: denied { bind } for pid=4769 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 310.941179][ T31] audit: type=1400 audit(310.850:450): avc: denied { read } for pid=4769 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 311.517567][ T31] audit: type=1400 audit(311.430:451): avc: denied { write } for pid=4769 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 312.595142][ T31] audit: type=1400 audit(312.500:452): avc: denied { create } for pid=4775 comm="syz.1.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 313.746025][ T31] audit: type=1326 audit(313.650:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4780 comm="syz.1.289" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 313.757789][ T31] audit: type=1326 audit(313.670:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4780 comm="syz.1.289" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 313.776371][ T31] audit: type=1326 audit(313.680:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4780 comm="syz.1.289" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 317.078820][ T4795] SELinux: Context system_u:object_r:random_device_t:s0 is not valid (left unmapped). [ 317.078918][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 317.080946][ T31] audit: type=1400 audit(316.990:460): avc: denied { mac_admin } for pid=4794 comm="syz.1.293" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 317.083767][ T31] audit: type=1400 audit(316.990:461): avc: denied { relabelto } for pid=4794 comm="syz.1.293" name="file0" dev="tmpfs" ino=946 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:random_device_t:s0" [ 317.087154][ T31] audit: type=1400 audit(316.990:462): avc: denied { associate } for pid=4794 comm="syz.1.293" name="file0" dev="tmpfs" ino=946 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:random_device_t:s0" [ 317.399558][ T31] audit: type=1400 audit(317.310:463): avc: denied { read } for pid=4796 comm="syz.1.294" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.402122][ T31] audit: type=1400 audit(317.310:464): avc: denied { open } for pid=4796 comm="syz.1.294" path="pid:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.524150][ T31] audit: type=1400 audit(317.430:465): avc: denied { ioctl } for pid=4796 comm="syz.1.294" path="pid:[4026532636]" dev="nsfs" ino=4026532636 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 318.282061][ T4801] Zero length message leads to an empty skb [ 319.076081][ T31] audit: type=1326 audit(318.980:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.1.300" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x12809c code=0x7ffc0000 [ 319.077964][ T31] audit: type=1326 audit(318.990:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.1.300" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef4e8 code=0x7ffc0000 [ 319.080719][ T31] audit: type=1326 audit(318.990:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.1.300" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x12809c code=0x7ffc0000 [ 319.087257][ T31] audit: type=1326 audit(319.000:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.1.300" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef4e8 code=0x7ffc0000 [ 322.914785][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 322.918309][ T31] audit: type=1400 audit(322.820:495): avc: denied { read } for pid=4832 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 324.892676][ T31] audit: type=1400 audit(324.780:496): avc: denied { setopt } for pid=4842 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 331.688768][ T31] audit: type=1326 audit(331.600:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.707239][ T31] audit: type=1326 audit(331.620:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.710029][ T31] audit: type=1326 audit(331.620:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.711876][ T31] audit: type=1326 audit(331.620:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.713544][ T31] audit: type=1326 audit(331.620:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.726224][ T31] audit: type=1326 audit(331.620:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.726581][ T31] audit: type=1326 audit(331.620:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.730435][ T31] audit: type=1326 audit(331.640:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.730733][ T31] audit: type=1326 audit(331.640:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 331.730932][ T31] audit: type=1326 audit(331.640:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 333.437490][ T4876] netlink: 'syz.1.321': attribute type 10 has an invalid length. [ 333.987081][ T4883] syz_tun: refused to change device tx_queue_len [ 334.436890][ T4875] netlink: 4 bytes leftover after parsing attributes in process `syz.0.320'. [ 337.904032][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 337.913395][ T31] audit: type=1400 audit(337.810:522): avc: denied { write } for pid=4901 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 337.954519][ T31] audit: type=1400 audit(337.860:523): avc: denied { execmem } for pid=4901 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 347.565965][ T31] audit: type=1400 audit(347.460:524): avc: denied { create } for pid=4916 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.570836][ T31] audit: type=1400 audit(347.480:525): avc: denied { ioctl } for pid=4916 comm="syz.1.333" path="socket:[5545]" dev="sockfs" ino=5545 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.573355][ T31] audit: type=1400 audit(347.480:526): avc: denied { bind } for pid=4916 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.578393][ T31] audit: type=1400 audit(347.490:527): avc: denied { write } for pid=4916 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.581647][ T31] audit: type=1400 audit(347.490:528): avc: denied { read } for pid=4916 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 350.550400][ T31] audit: type=1400 audit(350.460:529): avc: denied { block_suspend } for pid=4927 comm="syz.1.336" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 353.508539][ T4945] smc: net device bond0 applied user defined pnetid SYZ0 [ 353.517641][ T4945] smc: net device bond0 erased user defined pnetid SYZ0 [ 354.369206][ T4953] netlink: 'syz.0.343': attribute type 1 has an invalid length. [ 354.496299][ T4953] bond1: entered promiscuous mode [ 354.498402][ T4953] 8021q: adding VLAN 0 to HW filter on device bond1 [ 355.039726][ T4988] netlink: 3 bytes leftover after parsing attributes in process `syz.0.343'. [ 356.762747][ T31] audit: type=1400 audit(356.670:530): avc: denied { accept } for pid=5000 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 356.777314][ T31] audit: type=1400 audit(356.690:531): avc: denied { read } for pid=5000 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 358.726548][ T5009] netlink: 32 bytes leftover after parsing attributes in process `syz.1.350'. [ 359.558990][ T31] audit: type=1326 audit(359.470:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5018 comm="syz.1.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 359.567947][ T31] audit: type=1326 audit(359.480:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5018 comm="syz.1.354" exe="/syz-executor" sig=0 arch=40000028 syscall=19 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 359.568595][ T31] audit: type=1326 audit(359.480:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5018 comm="syz.1.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 360.068081][ T31] audit: type=1400 audit(359.980:535): avc: denied { create } for pid=5022 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 360.091363][ T31] audit: type=1400 audit(360.000:536): avc: denied { write } for pid=5022 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 360.517429][ T31] audit: type=1400 audit(360.420:537): avc: denied { ioctl } for pid=5030 comm="syz.1.360" path="socket:[5662]" dev="sockfs" ino=5662 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.907582][ T5047] netlink: 'syz.0.368': attribute type 27 has an invalid length. [ 367.646884][ T5047] ip6gre1: left allmulticast mode [ 367.654071][ T5047] bond1: left promiscuous mode [ 367.727953][ T5048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.051094][ T5048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 368.051481][ T5048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 368.069607][ T5048] veth1_macvtap: left promiscuous mode [ 368.071700][ T5048] veth0_macvtap: left promiscuous mode [ 368.073395][ T5048] veth0_macvtap: entered promiscuous mode [ 368.098525][ T5048] veth1_macvtap: entered promiscuous mode [ 368.136950][ T5048] 8021q: adding VLAN 0 to HW filter on device bond1 [ 369.679486][ T5056] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 385.673789][ T5074] netlink: 'syz.1.379': attribute type 27 has an invalid length. [ 386.906916][ T12] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.907448][ T12] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.907691][ T12] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.908030][ T12] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 387.021703][ T31] audit: type=1400 audit(386.930:538): avc: denied { name_bind } for pid=5077 comm="syz.0.381" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 389.421283][ T5097] netlink: 28 bytes leftover after parsing attributes in process `syz.0.387'. [ 389.422799][ T5097] netlink: 196 bytes leftover after parsing attributes in process `syz.0.387'. [ 389.432519][ T5097] netlink: 28 bytes leftover after parsing attributes in process `syz.0.387'. [ 389.438695][ T5097] netlink: 196 bytes leftover after parsing attributes in process `syz.0.387'. [ 390.664292][ T31] audit: type=1400 audit(390.570:539): avc: denied { create } for pid=5106 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 390.707453][ T31] audit: type=1400 audit(390.620:540): avc: denied { write } for pid=5106 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 390.717089][ T5107] netlink: 240 bytes leftover after parsing attributes in process `syz.0.391'. [ 390.718446][ T31] audit: type=1400 audit(390.630:541): avc: denied { nlmsg_write } for pid=5106 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 397.800062][ T31] audit: type=1400 audit(397.710:542): avc: denied { connect } for pid=5129 comm="syz.0.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 397.817341][ T31] audit: type=1400 audit(397.730:543): avc: denied { setopt } for pid=5129 comm="syz.0.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 398.203302][ T5133] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 399.322097][ T31] audit: type=1400 audit(399.230:544): avc: denied { connect } for pid=5139 comm="syz.1.402" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 399.331916][ T31] audit: type=1400 audit(399.240:545): avc: denied { write } for pid=5139 comm="syz.1.402" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 399.456971][ T31] audit: type=1326 audit(399.370:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 399.486836][ T31] audit: type=1326 audit(399.390:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 399.487227][ T31] audit: type=1326 audit(399.390:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 399.493912][ T31] audit: type=1326 audit(399.400:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 399.494303][ T31] audit: type=1326 audit(399.400:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 399.505917][ T31] audit: type=1326 audit(399.410:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 404.523108][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 404.523513][ T31] audit: type=1400 audit(404.430:569): avc: denied { mount } for pid=5170 comm="syz.1.415" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 404.528090][ T31] audit: type=1400 audit(404.440:570): avc: denied { search } for pid=5170 comm="syz.1.415" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 404.540313][ T31] audit: type=1400 audit(404.450:571): avc: denied { search } for pid=5170 comm="syz.1.415" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 404.540776][ T31] audit: type=1400 audit(404.450:572): avc: denied { search } for pid=5170 comm="syz.1.415" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 405.874682][ T31] audit: type=1400 audit(405.780:573): avc: denied { bind } for pid=5174 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 405.877614][ T31] audit: type=1400 audit(405.790:574): avc: denied { setopt } for pid=5174 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 406.438369][ T31] audit: type=1326 audit(406.340:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 406.453838][ T31] audit: type=1326 audit(406.360:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 406.454935][ T31] audit: type=1326 audit(406.360:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 406.585307][ T31] audit: type=1326 audit(406.360:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 409.770143][ T5214] netlink: 28 bytes leftover after parsing attributes in process `syz.1.423'. [ 409.771495][ T5214] netlink: 28 bytes leftover after parsing attributes in process `syz.1.423'. [ 412.989266][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 412.990377][ T31] audit: type=1326 audit(412.900:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 412.999631][ T31] audit: type=1326 audit(412.900:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.012096][ T31] audit: type=1326 audit(412.920:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.030218][ T31] audit: type=1326 audit(412.920:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.032177][ T31] audit: type=1326 audit(412.920:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.033893][ T31] audit: type=1326 audit(412.940:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.036568][ T31] audit: type=1326 audit(412.940:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.048814][ T31] audit: type=1326 audit(412.940:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.063829][ T31] audit: type=1326 audit(412.960:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.068023][ T31] audit: type=1326 audit(412.960:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5230 comm="syz.1.429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 413.223234][ T5233] netlink: 'syz.1.430': attribute type 7 has an invalid length. [ 413.247700][ T5233] netlink: 'syz.1.430': attribute type 8 has an invalid length. [ 418.769700][ T5257] netlink: 3 bytes leftover after parsing attributes in process `syz.1.438'. [ 419.289276][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 419.290528][ T31] audit: type=1326 audit(419.200:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5261 comm="syz.1.440" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x0 [ 421.399781][ T5273] netlink: 8 bytes leftover after parsing attributes in process `syz.1.445'. [ 423.867984][ T5308] netlink: 'syz.1.451': attribute type 1 has an invalid length. [ 424.432606][ T31] audit: type=1400 audit(424.340:595): avc: denied { name_bind } for pid=5313 comm="syz.1.454" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 424.447084][ T31] audit: type=1400 audit(424.340:596): avc: denied { node_bind } for pid=5313 comm="syz.1.454" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 424.470745][ T31] audit: type=1400 audit(424.380:597): avc: denied { create } for pid=5313 comm="syz.1.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 424.772549][ T5316] SELinux: Context Ü is not valid (left unmapped). [ 425.879689][ T5322] veth1_to_bond: entered allmulticast mode [ 425.908562][ T5322] veth1_to_bond: left allmulticast mode [ 430.688063][ T31] audit: type=1326 audit(430.580:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.697441][ T31] audit: type=1326 audit(430.600:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.701624][ T31] audit: type=1326 audit(430.600:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.703613][ T31] audit: type=1326 audit(430.600:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.707913][ T31] audit: type=1326 audit(430.620:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.721586][ T31] audit: type=1326 audit(430.630:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.724387][ T31] audit: type=1326 audit(430.630:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.727115][ T31] audit: type=1326 audit(430.630:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.737209][ T31] audit: type=1326 audit(430.650:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 430.748017][ T31] audit: type=1326 audit(430.660:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5359 comm="syz.1.466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 436.322741][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 436.324120][ T31] audit: type=1400 audit(436.230:633): avc: denied { setopt } for pid=5412 comm="syz.0.479" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 437.970838][ T31] audit: type=1400 audit(437.880:634): avc: denied { read } for pid=5422 comm="syz.1.484" path="socket:[5105]" dev="sockfs" ino=5105 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 438.846921][ T5430] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 438.973792][ T5430] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.187443][ T5430] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.302632][ T5430] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.470034][ T1055] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.534061][ T1055] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.534486][ T1055] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.581332][ T1055] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.846430][ T31] audit: type=1326 audit(440.740:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.857932][ T31] audit: type=1326 audit(440.770:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.869321][ T31] audit: type=1326 audit(440.780:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.881122][ T31] audit: type=1326 audit(440.790:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.888380][ T31] audit: type=1326 audit(440.800:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.891310][ T31] audit: type=1326 audit(440.800:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.897292][ T31] audit: type=1326 audit(440.810:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 440.910183][ T31] audit: type=1326 audit(440.820:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5460 comm="syz.1.494" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 447.468646][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 447.468972][ T31] audit: type=1400 audit(447.380:645): avc: denied { create } for pid=5505 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 447.477299][ T31] audit: type=1400 audit(447.380:646): avc: denied { bind } for pid=5505 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 451.799586][ T5519] netdevsim netdevsim1 5Â: renamed from netdevsim0 [ 452.189472][ T5521] netlink: 16 bytes leftover after parsing attributes in process `syz.1.503'. [ 452.396743][ T5523] netlink: 12 bytes leftover after parsing attributes in process `syz.1.504'. [ 453.182489][ T5529] syz.1.506 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 453.987121][ T5535] netlink: 12 bytes leftover after parsing attributes in process `syz.1.509'. [ 454.974952][ T5545] netlink: 12 bytes leftover after parsing attributes in process `syz.1.514'. [ 455.760517][ T5553] netlink: 44 bytes leftover after parsing attributes in process `syz.1.518'. [ 455.761013][ T5553] netlink: 8 bytes leftover after parsing attributes in process `syz.1.518'. [ 456.363598][ T5557] netlink: 4 bytes leftover after parsing attributes in process `syz.1.520'. [ 456.408284][ T5557] netlink: 12 bytes leftover after parsing attributes in process `syz.1.520'. [ 457.612447][ T31] audit: type=1400 audit(457.520:647): avc: denied { read open } for pid=5566 comm="syz.1.524" path="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 458.060861][ T5572] batadv_slave_1: entered promiscuous mode [ 461.837940][ T31] audit: type=1400 audit(461.750:648): avc: denied { create } for pid=5584 comm="syz.1.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 462.296214][ T31] audit: type=1326 audit(462.190:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.323668][ T31] audit: type=1326 audit(462.230:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.353651][ T31] audit: type=1326 audit(462.260:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.391246][ T31] audit: type=1326 audit(462.270:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.399111][ T31] audit: type=1326 audit(462.310:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.408741][ T31] audit: type=1326 audit(462.310:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.430718][ T31] audit: type=1326 audit(462.340:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 462.431252][ T31] audit: type=1326 audit(462.340:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5587 comm="syz.1.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 465.539875][ T5596] netlink: 8 bytes leftover after parsing attributes in process `syz.1.534'. [ 486.192598][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 486.192814][ T31] audit: type=1326 audit(486.100:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 486.192969][ T31] audit: type=1326 audit(486.100:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 486.193089][ T31] audit: type=1326 audit(486.100:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 486.194112][ T31] audit: type=1326 audit(486.100:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5658 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 486.299352][ T31] audit: type=1400 audit(486.200:664): avc: denied { bind } for pid=5660 comm="syz.1.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 489.929329][ T31] audit: type=1400 audit(489.840:665): avc: denied { getopt } for pid=5672 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 490.113543][ T31] audit: type=1326 audit(490.020:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5674 comm="syz.1.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 490.127688][ T31] audit: type=1326 audit(490.040:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5674 comm="syz.1.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 490.131364][ T31] audit: type=1326 audit(490.040:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5674 comm="syz.1.552" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 490.134236][ T31] audit: type=1326 audit(490.040:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5674 comm="syz.1.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 493.976928][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 493.978783][ T31] audit: type=1400 audit(493.880:680): avc: denied { create } for pid=5691 comm="syz.1.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 495.129177][ T5707] netlink: 64 bytes leftover after parsing attributes in process `syz.0.563'. [ 495.273518][ T31] audit: type=1326 audit(495.180:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.297584][ T31] audit: type=1326 audit(495.210:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.300180][ T31] audit: type=1326 audit(495.210:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.304172][ T31] audit: type=1326 audit(495.210:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.327226][ T31] audit: type=1326 audit(495.240:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.332441][ T31] audit: type=1326 audit(495.240:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.343494][ T31] audit: type=1326 audit(495.240:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.344957][ T31] audit: type=1326 audit(495.250:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.355845][ T31] audit: type=1326 audit(495.260:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5709 comm="syz.1.565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 495.602829][ T5722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5722 comm=syz.1.567 [ 495.616969][ T5722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5722 comm=syz.1.567 [ 497.659530][ T5763] SELinux: ebitmap: truncated map [ 497.693364][ T5763] SELinux: failed to load policy [ 497.900470][ T5766] netlink: 4 bytes leftover after parsing attributes in process `syz.1.581'. [ 501.813088][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 501.814942][ T31] audit: type=1326 audit(501.720:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5793 comm="syz.0.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 501.831873][ T31] audit: type=1326 audit(501.730:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5793 comm="syz.0.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 501.836443][ T31] audit: type=1326 audit(501.740:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5793 comm="syz.0.590" exe="/syz-executor" sig=0 arch=40000028 syscall=343 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 501.844406][ T31] audit: type=1326 audit(501.750:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5793 comm="syz.0.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 503.846542][ T5808] SELinux: syz.0.593 (5808) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 505.891152][ T31] audit: type=1400 audit(505.800:737): avc: denied { shutdown } for pid=5838 comm="syz.1.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 506.109817][ T5841] syzkaller0: entered promiscuous mode [ 506.111258][ T5841] syzkaller0: entered allmulticast mode [ 506.452974][ T31] audit: type=1326 audit(506.360:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 506.453471][ T31] audit: type=1326 audit(506.360:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 506.453679][ T31] audit: type=1326 audit(506.360:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 506.453870][ T31] audit: type=1326 audit(506.360:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 506.454082][ T31] audit: type=1326 audit(506.360:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5847 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 506.980812][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 506.981126][ T31] audit: type=1400 audit(506.890:757): avc: denied { name_bind } for pid=5850 comm="syz.1.601" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 507.985944][ T31] audit: type=1400 audit(507.890:758): avc: denied { execute_no_trans } for pid=5863 comm="syz.1.605" path="/394/file1" dev="tmpfs" ino=2033 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 508.103558][ T31] audit: type=1326 audit(508.010:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5849 comm="syz.1.600" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 508.737933][ T5874] netlink: 12 bytes leftover after parsing attributes in process `syz.1.608'. [ 509.054140][ T31] audit: type=1326 audit(508.960:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 509.077400][ T31] audit: type=1326 audit(508.980:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 509.083718][ T31] audit: type=1326 audit(508.990:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 509.084105][ T31] audit: type=1326 audit(508.990:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 509.704935][ T31] audit: type=1400 audit(509.610:764): avc: denied { wake_alarm } for pid=5881 comm="syz.1.611" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 510.414773][ T31] audit: type=1326 audit(510.310:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5885 comm="syz.1.613" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 510.420120][ T31] audit: type=1326 audit(510.330:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5885 comm="syz.1.613" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 510.913623][ T5893] netlink: 12 bytes leftover after parsing attributes in process `syz.1.615'. [ 511.731015][ T5907] netlink: 12 bytes leftover after parsing attributes in process `syz.1.620'. [ 512.588778][ T5917] SELinux: ebitmap: truncated map [ 512.613692][ T5917] SELinux: failed to load policy [ 512.861438][ T5919] netlink: 12 bytes leftover after parsing attributes in process `syz.1.625'. [ 513.264507][ T5924] netlink: 4 bytes leftover after parsing attributes in process `syz.1.627'. [ 514.083058][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 514.083501][ T31] audit: type=1326 audit(513.990:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.083802][ T31] audit: type=1326 audit(513.990:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.084038][ T31] audit: type=1326 audit(513.990:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.101617][ T31] audit: type=1326 audit(514.010:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.102132][ T31] audit: type=1326 audit(514.010:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.102370][ T31] audit: type=1326 audit(514.010:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.102455][ T31] audit: type=1326 audit(514.010:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.105072][ T31] audit: type=1326 audit(514.010:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.108727][ T31] audit: type=1326 audit(514.020:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 514.115104][ T31] audit: type=1326 audit(514.020:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5928 comm="syz.1.629" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 517.610902][ T5945] ======================================================= [ 517.610902][ T5945] WARNING: The mand mount option has been deprecated and [ 517.610902][ T5945] and is ignored by this kernel. Remove the mand [ 517.610902][ T5945] option from the mount to silence this warning. [ 517.610902][ T5945] ======================================================= [ 518.708402][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 518.734532][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 518.748683][ T1055] bond0 (unregistering): Released all slaves [ 518.907726][ T1055] hsr_slave_0: left promiscuous mode [ 518.916472][ T1055] hsr_slave_1: left promiscuous mode [ 520.638461][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 520.639331][ T31] audit: type=1400 audit(520.550:805): avc: denied { write } for pid=5969 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 520.641282][ T31] audit: type=1400 audit(520.550:806): avc: denied { open } for pid=5969 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 520.807194][ T31] audit: type=1400 audit(520.720:807): avc: denied { search } for pid=5973 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.809605][ T31] audit: type=1400 audit(520.720:808): avc: denied { search } for pid=5973 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.811861][ T31] audit: type=1400 audit(520.720:809): avc: denied { search } for pid=5973 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.852067][ T31] audit: type=1400 audit(520.730:810): avc: denied { search } for pid=5973 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.917209][ T31] audit: type=1400 audit(520.830:811): avc: denied { read open } for pid=5974 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.919933][ T31] audit: type=1400 audit(520.830:812): avc: denied { getattr } for pid=5974 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 521.064915][ T31] audit: type=1400 audit(520.970:813): avc: denied { add_name } for pid=5973 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 521.076550][ T31] audit: type=1400 audit(520.980:814): avc: denied { create } for pid=5973 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 523.939902][ T5949] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 523.945250][ T5949] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 526.573879][ T5949] hsr_slave_0: entered promiscuous mode [ 526.587644][ T5949] hsr_slave_1: entered promiscuous mode [ 527.087759][ T6236] syzkaller0: entered promiscuous mode [ 527.088498][ T6236] syzkaller0: entered allmulticast mode [ 527.543898][ T5949] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 527.563910][ T5949] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 527.582729][ T5949] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 527.610585][ T5949] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 528.747116][ T6322] netlink: 'syz.0.644': attribute type 4 has an invalid length. [ 528.797424][ T6322] netlink: 'syz.0.644': attribute type 4 has an invalid length. [ 529.192669][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 529.194953][ T31] audit: type=1400 audit(529.100:823): avc: denied { setopt } for pid=6326 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 529.209643][ T31] audit: type=1400 audit(529.110:824): avc: denied { connect } for pid=6326 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 529.568494][ T6332] netlink: 4 bytes leftover after parsing attributes in process `syz.0.646'. [ 529.585090][ T6332] netlink: 4 bytes leftover after parsing attributes in process `syz.0.646'. [ 529.816658][ T5949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 530.466230][ T31] audit: type=1400 audit(530.370:825): avc: denied { ioctl } for pid=6339 comm="syz.0.648" path="socket:[7137]" dev="sockfs" ino=7137 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 530.690384][ T6340] netlink: 8 bytes leftover after parsing attributes in process `syz.0.648'. [ 536.354864][ T6401] netlink: 4 bytes leftover after parsing attributes in process `syz.0.659'. [ 539.084290][ T6435] netlink: 24 bytes leftover after parsing attributes in process `syz.0.666'. [ 539.102112][ T5949] veth0_vlan: entered promiscuous mode [ 539.120327][ T6435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6435 comm=syz.0.666 [ 539.180297][ T5949] veth1_vlan: entered promiscuous mode [ 539.437004][ T5949] veth0_macvtap: entered promiscuous mode [ 539.520223][ T5949] veth1_macvtap: entered promiscuous mode [ 539.885151][ T3815] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.896548][ T3815] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.897874][ T3815] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.898974][ T3815] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 541.831283][ T31] audit: type=1400 audit(541.730:826): avc: denied { mounton } for pid=5949 comm="syz-executor" path="/syzkaller.A8CCAH/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 541.831860][ T31] audit: type=1400 audit(541.730:827): avc: denied { mount } for pid=5949 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 541.870609][ T31] audit: type=1400 audit(541.770:828): avc: denied { mounton } for pid=5949 comm="syz-executor" path="/syzkaller.A8CCAH/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 541.872799][ T31] audit: type=1400 audit(541.780:829): avc: denied { mounton } for pid=5949 comm="syz-executor" path="/syzkaller.A8CCAH/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8362 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 541.901621][ T31] audit: type=1400 audit(541.810:830): avc: denied { unmount } for pid=5949 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 541.991877][ T31] audit: type=1400 audit(541.810:831): avc: denied { mounton } for pid=5949 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 541.992363][ T31] audit: type=1400 audit(541.880:832): avc: denied { mount } for pid=5949 comm="syz-executor" name="/" dev="gadgetfs" ino=3163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 541.992608][ T31] audit: type=1400 audit(541.900:833): avc: denied { mount } for pid=5949 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 541.992829][ T31] audit: type=1400 audit(541.900:834): avc: denied { mounton } for pid=5949 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 543.095139][ T31] audit: type=1400 audit(543.000:835): avc: denied { write } for pid=6462 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 544.563238][ T6484] netlink: 4 bytes leftover after parsing attributes in process `syz.2.682'. [ 547.389180][ T6514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6514 comm=syz.2.688 [ 547.411264][ T6514] netlink: 12 bytes leftover after parsing attributes in process `syz.2.688'. [ 556.368538][ T6629] netlink: 4 bytes leftover after parsing attributes in process `syz.2.715'. [ 556.609453][ T6632] netlink: 'syz.0.716': attribute type 21 has an invalid length. [ 556.617485][ T6632] netlink: 'syz.0.716': attribute type 1 has an invalid length. [ 556.618863][ T6632] netlink: 132 bytes leftover after parsing attributes in process `syz.0.716'. [ 557.986633][ T6650] netlink: 12 bytes leftover after parsing attributes in process `syz.0.722'. [ 559.122483][ T31] audit: type=1400 audit(559.030:836): avc: denied { create } for pid=6664 comm="syz.2.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 559.141779][ T31] audit: type=1400 audit(559.050:837): avc: denied { setopt } for pid=6664 comm="syz.2.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 561.268930][ T6683] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 561.269544][ T6683] IPv6: NLM_F_CREATE should be set when creating new route [ 561.269904][ T6683] IPv6: NLM_F_CREATE should be set when creating new route [ 561.278768][ T6683] ------------[ cut here ]------------ [ 561.279469][ T6683] WARNING: CPU: 1 PID: 6683 at drivers/net/netdevsim/fib.c:831 nsim_fib_event_nb+0x218/0x52c [ 561.282633][ T6683] Modules linked in: [ 561.284035][ T6683] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 561.285994][ T6683] CPU: 1 UID: 0 PID: 6683 Comm: syz.0.731 Not tainted syzkaller #0 PREEMPT [ 561.286588][ T6683] Hardware name: ARM-Versatile Express [ 561.287420][ T6683] Call trace: [ 561.287832][ T6683] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 561.288313][ T6683] r7:00000000 r6:8281f77c r5:00000000 r4:82260bc4 [ 561.288609][ T6683] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 561.288860][ T6683] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 561.289107][ T6683] r5:00000000 r4:82a77d18 [ 561.289221][ T6683] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 561.289422][ T6683] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 561.289642][ T6683] r7:80e4dddc [ 561.289737][ T6683] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 561.289935][ T6683] r3:8280c684 r2:00000001 r1:822475e0 r0:8224f05c [ 561.290146][ T6683] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 561.290387][ T6683] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 561.290647][ T6683] r8:00000009 r7:82348364 r6:dfecd8e4 r5:85b98000 r4:00000000 [ 561.291209][ T6683] [<80254bd0>] (warn_slowpath_fmt) from [<80e4dddc>] (nsim_fib_event_nb+0x218/0x52c) [ 561.295693][ T6683] r10:85abce00 r9:858a4884 r8:00000001 r7:85abce00 r6:dfecd9ec r5:858a4800 [ 561.296186][ T6683] r4:833cee00 [ 561.296355][ T6683] [<80e4dbc4>] (nsim_fib_event_nb) from [<802855fc>] (notifier_call_chain+0x60/0x1b4) [ 561.296800][ T6683] r10:dfecd9ec r9:dfecdb34 r8:80e4dbc4 r7:00000000 r6:ffffffff r5:833cee00 [ 561.297241][ T6683] r4:00000000 [ 561.297449][ T6683] [<8028559c>] (notifier_call_chain) from [<80285878>] (atomic_notifier_call_chain+0x3c/0x50) [ 561.297852][ T6683] r10:dfecda40 r9:dfecdb34 r8:00000003 r7:00000005 r6:dfecd9ec r5:00000001 [ 561.298092][ T6683] r4:84ac8788 [ 561.298286][ T6683] [<8028583c>] (atomic_notifier_call_chain) from [<815b949c>] (call_fib_notifiers+0x44/0x58) [ 561.298725][ T6683] r6:84ac8780 r5:dfecd9ec r4:00000001 [ 561.298938][ T6683] [<815b9458>] (call_fib_notifiers) from [<81871f44>] (call_fib6_notifiers+0x18/0x1c) [ 561.299503][ T6683] r7:00000000 r6:85abce00 r5:00000000 r4:00000000 [ 561.299738][ T6683] [<81871f2c>] (call_fib6_notifiers) from [<818478ec>] (call_fib6_multipath_entry_notifiers+0x48/0x6c) [ 561.300153][ T6683] [<818478a4>] (call_fib6_multipath_entry_notifiers) from [<81844144>] (ip6_route_multipath_add+0x5c8/0x7ac) [ 561.300808][ T6683] r4:00000001 [ 561.300973][ T6683] [<81843b7c>] (ip6_route_multipath_add) from [<818443a8>] (inet6_rtm_newroute+0x80/0xc4) [ 561.301339][ T6683] r10:00000000 r9:00000000 r8:82c1f5a8 r7:84eca6c0 r6:85420d80 r5:84eca6c0 [ 561.301658][ T6683] r4:dfecdc48 [ 561.301873][ T6683] [<81844328>] (inet6_rtm_newroute) from [<815923e0>] (rtnetlink_rcv_msg+0x2e0/0x334) [ 561.302265][ T6683] r6:0000000a r5:81844328 r4:85420d80 [ 561.302504][ T6683] [<81592100>] (rtnetlink_rcv_msg) from [<81672674>] (netlink_rcv_skb+0xc0/0x120) [ 561.302850][ T6683] r10:00000000 r9:00000000 r8:85790000 r7:0000004c r6:85420d80 r5:81592100 [ 561.303031][ T6683] r4:84eca6c0 [ 561.303139][ T6683] [<816725b4>] (netlink_rcv_skb) from [<81590fac>] (rtnetlink_rcv+0x18/0x1c) [ 561.303405][ T6683] r7:84eca6c0 r6:84ac84c0 r5:0000004c r4:848e3400 [ 561.303655][ T6683] [<81590f94>] (rtnetlink_rcv) from [<81671e40>] (netlink_unicast+0x1f0/0x30c) [ 561.303911][ T6683] [<81671c50>] (netlink_unicast) from [<81672128>] (netlink_sendmsg+0x1cc/0x444) [ 561.304177][ T6683] r9:00000000 r8:00000000 r7:85d2e400 r6:0000004c r5:84eca6c0 r4:dfecdf20 [ 561.304394][ T6683] [<81671f5c>] (netlink_sendmsg) from [<81543cc8>] (__sock_sendmsg+0x44/0x78) [ 561.304986][ T6683] r10:00000000 r9:dfecddc4 r8:dfecddc4 r7:00000000 r6:85091180 r5:dfecdf20 [ 561.305562][ T6683] r4:00000000 [ 561.305783][ T6683] [<81543c84>] (__sock_sendmsg) from [<81545020>] (____sys_sendmsg+0x298/0x2cc) [ 561.306397][ T6683] r7:00000000 r6:85091180 r5:00000000 r4:dfecdf20 [ 561.306679][ T6683] [<81544d88>] (____sys_sendmsg) from [<81546fe8>] (___sys_sendmsg+0x9c/0xd0) [ 561.307075][ T6683] r10:dfecde24 r9:20000100 r8:00000000 r7:00000000 r6:85091180 r5:dfecdf20 [ 561.307772][ T6683] r4:00000000 [ 561.308000][ T6683] [<81546f4c>] (___sys_sendmsg) from [<81547480>] (__sys_sendmsg+0x8c/0xe0) [ 561.308616][ T6683] r10:00000128 r9:85b98000 r8:85a16d80 r7:00000000 r6:20000100 r5:85a16d81 [ 561.308948][ T6683] r4:00000006 [ 561.309108][ T6683] [<815473f4>] (__sys_sendmsg) from [<815474e8>] (sys_sendmsg+0x14/0x18) [ 561.309620][ T6683] r8:8020029c r7:00000128 r6:00306308 r5:00000000 r4:00000000 [ 561.310158][ T6683] [<815474d4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 561.310729][ T6683] Exception stack(0xdfecdfa8 to 0xdfecdff0) [ 561.311225][ T6683] dfa0: 00000000 00000000 00000006 20000100 00000000 00000000 [ 561.311752][ T6683] dfc0: 00000000 00000000 00306308 00000128 002f0000 00000000 00006364 76f220bc [ 561.312152][ T6683] dfe0: 76f21ec0 76f21eb0 0001948c 001322a0 [ 561.315626][ T6683] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:37:38 Registers: info registers vcpu 0 CPU#0 R00=dddcf080 R01=5b70d000 R02=000b6769 R03=81a3b630 R04=00000006 R05=828f7888 R06=00000000 R07=828f7880 R08=84a1d400 R09=00000028 R10=828f7888 R11=df80194c R12=df801950 R13=df801940 R14=8033d98c R15=81a3b640 PSR=60010193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84ca0c40 R01=0000005d R02=eb74f000 R03=eb74f018 R04=82abb101 R05=84ca0c40 R06=80a79c9c R07=82abb12f R08=82826ef8 R09=00000000 R10=000005ca R11=dfecd5bc R12=00000002 R13=dfecd5b0 R14=829590c4 R15=80a79cac PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000