last executing test programs: 30.854482902s ago: executing program 0 (id=499): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x88, 0x30, 0x1, 0x0, 0x0, {}, [{0x74, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x804}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r8}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93, 0xe8}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0xfffffffc}, {0x10001, 0x0, 0x0, 0x4000000, 0x7, 0x4}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x4}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x10, 0x6, 0x0, 0x0, 0xfffffff9}, {0x0, 0x404, 0x0, 0x8000000}, {0x0, 0xffffffff, 0x0, 0x0, 0xfffffffd}, {0x2, 0x0, 0x400000, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {0x800, 0x4, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x9}, {0x0, 0x2000}, {}, {0x0, 0x401, 0x0, 0x0, 0xffffffff}, {0x0, 0x1000, 0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffd}, {0xffffffff}, {}, {0x0, 0x0, 0xc, 0x0, 0x0, 0x6}, {0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0xffffff1d, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x1, 0xff}, {0x80, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x5, 0x1}, {}, {0x1, 0x8, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0xfffffffd, 0x15, 0x0, 0x48510}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0xd, 0xffffffff}, {}, {0x0, 0x0, 0x80}, {0x0, 0xfffefffd, 0x0, 0xffffffff}, {0x0, 0x0, 0x4, 0x2}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x6}, {0x5, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xad}, {0x0, 0xfffffffc, 0x0, 0x3ff, 0x40000000}, {0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x400000}, {0x4, 0x0, 0x200}, {0x0, 0x0, 0x1fd}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x5}, {}, {0x0, 0x0, 0x0, 0x4000, 0x0, 0xfb4}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xfdffffff}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x100000, 0x4000004, 0x9}, {0xfffffffe}, {0x0, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x2}, {}, {}, {}, {0x800000, 0x7, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x40, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffff}, {0x0, 0xfffffffe}, {0x0, 0x0, 0x6, 0x0, 0x4}, {0x0, 0x0, 0x2}, {}, {0x0, 0xfffffffd, 0x0, 0xffffffff}, {0x6}, {0x7f, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x0, 0x2, 0x10000, 0x0, 0x0, 0xfffffffe}, {}, {0x0, 0x0, 0x0, 0x4000000, 0x0, 0x8}, {0x2, 0x0, 0x20000000, 0x0, 0x1}, {0x0, 0xfffffffc, 0x0, 0x2}, {}, {0x0, 0x4, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x9, 0x101}, {0xfffffffb, 0x5, 0x0, 0x0, 0x1}, {0x0, 0x5, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x3, 0x80, 0xfffffffc}, {0x10000000, 0x0, 0x0, 0x4, 0x4}, {0x0, 0x2e9c, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3, 0x0, 0x0, 0x4}, {0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8, 0x1, 0x6}, {}, {0x0, 0x0, 0x0, 0x1000000}, {0x0, 0xf}, {0xfffffffe, 0x0, 0x0, 0x0, 0x8000, 0x2}, {0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x80, 0xd70, 0x0, 0xfffffffc}, {0x0, 0x8000, 0x0, 0xfffffff2}, {0x0, 0x0, 0x10000, 0x0, 0xfffffffc, 0x2}, {0x0, 0x80000000, 0x0, 0x7dff800}, {}, {}, {0x0, 0x0, 0x0, 0x9}], [{}, {}, {0x0, 0x1}, {}, {}, {0x4}, {}, {0x0, 0x1}, {}, {}, {}, {0x3}, {0x0, 0x1}, {}, {}, {}, {0x2, 0x1}, {0x2, 0x1}, {}, {}, {}, {0x4}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x1, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {}, {}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x5}, {}, {0x4}, {0x7}, {0x2}, {}, {}, {}, {}, {0x3}, {0x5}, {}, {0x0, 0x1}, {0x3}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {0x3}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {0x3}, {}, {}, {}, {0x4}, {0x2}, {}, {}, {0x4}, {0x3}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) r9 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000340)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f00000000000000000000000000002eb8d32db25e6c81416f"], 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) r10 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r10, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) 3.665130635s ago: executing program 0 (id=550): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) 3.389692576s ago: executing program 0 (id=554): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x2, 0x8) syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh]}}}}}}}, 0x0) 3.124175847s ago: executing program 0 (id=555): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x202200, 0x0) close(r2) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 2.610915457s ago: executing program 0 (id=556): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001980)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) 2.251945291s ago: executing program 0 (id=558): sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffff1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x141000, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000880)=""/142) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) syz_io_uring_submit(0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x48e9, 0xf2bb, 0x2, 0x0, 0x0) prlimit64(0x0, 0x8, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) syz_emit_ethernet(0x4a, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) 1.668234304s ago: executing program 1 (id=560): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) 1.189275803s ago: executing program 1 (id=561): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000240)=0xf2b, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000040)=""/31, &(0x7f0000000080)=0x1f) 1.029594789s ago: executing program 1 (id=562): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffa}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfffff274}]}}}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) syz_emit_ethernet(0x6f, &(0x7f0000000300)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b0ec80", 0x39, 0x3a, 0xff, @remote, @mcast2, {[], @dest_unreach={0x1, 0x6, 0x0, 0x4, '\x00', {0x2, 0x6, "75d110", 0x3, 0x3a, 0x1, @local, @private2, [], "d82f2d9ac07648c46e"}}}}}}}, 0x0) 630.135145ms ago: executing program 1 (id=563): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001f00)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {0x0, 0x0, 0x1be}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x80, 0x2, 0x20, 0x7, 0x2, 0x2, 0x3, 0x75b, 0x7ff, 0x2, 0xd5a, 0x8d, 0x3, 0x7, 0x4, 0x3, 0x6, 0x80000001, 0x4, 0x6, 0x5, 0x4, 0xfffffff9, 0x2, 0x10, 0x8000, 0x1, 0x0, 0x7, 0x6, 0x3, 0x514, 0x200, 0x6, 0x80000000, 0x6, 0x9b2c, 0x2800000, 0x1, 0x8000, 0xff, 0x81, 0x7ff, 0x5, 0xa, 0x9, 0x400, 0xffff, 0x0, 0x400, 0xa, 0x100, 0x2, 0x2, 0x6, 0x0, 0x3, 0x5, 0x0, 0x4, 0x3, 0x6, 0xffff0000, 0x40, 0x8001, 0x62a8, 0x69b3, 0x1ff, 0x5, 0x7, 0x7, 0x3, 0x3, 0x2, 0x3, 0x1000000, 0x5, 0x5, 0x9, 0x1, 0xa000000, 0x9, 0x1, 0x0, 0x4, 0x5, 0x7c, 0x5, 0x4, 0x4, 0x6, 0x3, 0x4, 0x40, 0x40, 0x1, 0x0, 0x4, 0x65, 0x5, 0x4, 0x3ff, 0x80000000, 0x7, 0x80, 0xffff2532, 0x1, 0x8, 0xe9, 0x20, 0x7, 0x2, 0x2, 0xfffffff7, 0x0, 0x2, 0x8, 0x82f, 0x9, 0x9, 0xfff, 0x4, 0x6c3, 0x8, 0x2, 0xe, 0x6, 0x3, 0x5, 0x3, 0x3, 0xe6b, 0x8, 0x8, 0x9, 0x9, 0xcd, 0x6, 0x3, 0x10000, 0xc, 0x1, 0x8, 0x2, 0x80000001, 0x5, 0x2, 0x40, 0x6, 0x80000000, 0xcc, 0xbd2c, 0x5, 0x8, 0x7, 0x3, 0x1504000, 0x3, 0x9, 0x3ff, 0x1, 0xfffffff9, 0x4, 0x3, 0xe, 0x6, 0x2, 0x7fffffff, 0xffffffff, 0x3, 0x7, 0x9, 0x3, 0x66800000, 0x8000, 0xa, 0x3, 0x7, 0xfffffffb, 0x9, 0x1, 0xf, 0x5, 0x4, 0x3, 0x9, 0x8, 0x3, 0xfffff889, 0x7f, 0x2, 0x1, 0x8, 0x2, 0x4638, 0x95c, 0x3, 0x5, 0x4, 0x7, 0x1, 0xf8, 0x3, 0x5, 0x8, 0x0, 0x20000000, 0x1000, 0x8, 0xf2, 0x0, 0xd888, 0x8de, 0xb2, 0x0, 0x4, 0x8, 0x2, 0x0, 0x401, 0x7, 0xfffffff4, 0xf7f0000, 0x0, 0x7ecd, 0x0, 0x80000000, 0x4, 0x2, 0x994, 0x3, 0x2b, 0x9, 0x1, 0xdb0, 0xb, 0x8001, 0x1, 0x8, 0x1, 0x300, 0x6b3, 0x0, 0x3, 0x5, 0x7fffffff, 0xea78, 0x4, 0xfffffffb, 0x1, 0x2, 0x639f7d72, 0xfff, 0x796, 0x5, 0x400]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x5, 0x88f, 0x8, 0x8, {0x8, 0x2, 0x8, 0x99f, 0x9, 0x6}, {0x1, 0x0, 0x140, 0xff99, 0x0, 0x2}, 0x6, 0x800}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x488}}, 0x0) 277.007369ms ago: executing program 1 (id=564): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000fbdb0cf81c000000180001801400020074756e6c30"], 0x2c}}, 0x0) 0s ago: executing program 1 (id=565): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd27}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000890434000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) clock_adjtime(0x2, &(0x7f0000000fc0)={0x3, 0x2, 0x1, 0x1480fc61, 0xf, 0x0, 0x7000000000, 0x5b, 0x1, 0x100, 0xd, 0x0, 0x9, 0x1, 0x7, 0x5, 0x7, 0x8, 0x4, 0x2, 0x1c, 0x6, 0xf5, 0x8, 0xfa98, 0xfffffffeffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000f80), 0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x30, r3, 0x1, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x81}, 0x4004000) kernel console output (not intermixed with test programs): [ 46.870878][ T31] audit: type=1400 audit(46.800:56): avc: denied { read write } for pid=3115 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.873606][ T31] audit: type=1400 audit(46.800:57): avc: denied { open } for pid=3115 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13721' (ED25519) to the list of known hosts. [ 59.456098][ T31] audit: type=1400 audit(59.380:58): avc: denied { name_bind } for pid=3118 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.475666][ T31] audit: type=1400 audit(61.400:59): avc: denied { execute } for pid=3119 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.478651][ T31] audit: type=1400 audit(61.410:60): avc: denied { execute_no_trans } for pid=3119 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.955463][ T31] audit: type=1400 audit(63.880:61): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.955717][ T31] audit: type=1400 audit(63.880:62): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.959214][ T3119] cgroup: Unknown subsys name 'net' [ 63.963689][ T31] audit: type=1400 audit(63.890:63): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.158167][ T3119] cgroup: Unknown subsys name 'cpuset' [ 64.163578][ T3119] cgroup: Unknown subsys name 'hugetlb' [ 64.166610][ T3119] cgroup: Unknown subsys name 'rlimit' [ 64.409075][ T31] audit: type=1400 audit(64.340:64): avc: denied { setattr } for pid=3119 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.411410][ T31] audit: type=1400 audit(64.340:65): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 64.415949][ T31] audit: type=1400 audit(64.350:66): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 64.578286][ T3121] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 64.583392][ T31] audit: type=1400 audit(64.510:67): avc: denied { relabelto } for pid=3121 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.590184][ T31] audit: type=1400 audit(64.520:68): avc: denied { write } for pid=3121 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 64.621161][ T31] audit: type=1400 audit(64.550:69): avc: denied { read } for pid=3119 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.625318][ T31] audit: type=1400 audit(64.550:70): avc: denied { open } for pid=3119 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.004250][ T3119] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 72.807701][ T31] audit: type=1400 audit(72.740:71): avc: denied { execmem } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 72.849893][ T31] audit: type=1400 audit(72.780:72): avc: denied { read } for pid=3124 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.851881][ T31] audit: type=1400 audit(72.780:73): avc: denied { open } for pid=3124 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.860242][ T31] audit: type=1400 audit(72.790:74): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 72.877455][ T31] audit: type=1400 audit(72.810:75): avc: denied { module_request } for pid=3125 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.878977][ T31] audit: type=1400 audit(72.810:76): avc: denied { module_request } for pid=3124 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.947364][ T31] audit: type=1400 audit(72.880:77): avc: denied { sys_module } for pid=3125 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.632176][ T31] audit: type=1400 audit(73.560:78): avc: denied { ioctl } for pid=3125 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.759664][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.783048][ T3125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.787106][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.809260][ T3125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.570287][ T3124] hsr_slave_0: entered promiscuous mode [ 75.572860][ T3124] hsr_slave_1: entered promiscuous mode [ 75.651377][ T3125] hsr_slave_0: entered promiscuous mode [ 75.652730][ T3125] hsr_slave_1: entered promiscuous mode [ 75.653804][ T3125] debugfs: 'hsr0' already exists in 'hsr' [ 75.654313][ T3125] Cannot create hsr debugfs directory [ 76.067024][ T31] audit: type=1400 audit(76.000:79): avc: denied { create } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.068612][ T31] audit: type=1400 audit(76.000:80): avc: denied { write } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.076392][ T3124] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.087734][ T3124] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.108735][ T3124] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.129150][ T3124] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.214738][ T3125] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.225690][ T3125] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.237927][ T3125] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.250159][ T3125] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.926953][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.992121][ T3125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.670084][ T3124] veth0_vlan: entered promiscuous mode [ 79.704580][ T3124] veth1_vlan: entered promiscuous mode [ 79.717725][ T3125] veth0_vlan: entered promiscuous mode [ 79.742276][ T3125] veth1_vlan: entered promiscuous mode [ 79.791127][ T3124] veth0_macvtap: entered promiscuous mode [ 79.804048][ T3124] veth1_macvtap: entered promiscuous mode [ 79.830434][ T3125] veth0_macvtap: entered promiscuous mode [ 79.842291][ T3125] veth1_macvtap: entered promiscuous mode [ 79.920246][ T1053] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.920981][ T1053] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.921129][ T1053] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.921217][ T1053] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.927908][ T1053] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.928251][ T1053] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.928504][ T1053] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.928624][ T1053] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.068980][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 80.069919][ T31] audit: type=1400 audit(80.000:82): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.091544][ T31] audit: type=1400 audit(80.020:83): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.AOuDRn/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.101551][ T31] audit: type=1400 audit(80.030:84): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.114088][ T31] audit: type=1400 audit(80.040:85): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.AOuDRn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 80.120911][ T31] audit: type=1400 audit(80.050:86): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.AOuDRn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 80.149637][ T31] audit: type=1400 audit(80.080:87): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.158891][ T31] audit: type=1400 audit(80.090:88): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.162671][ T31] audit: type=1400 audit(80.090:89): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="gadgetfs" ino=883 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 80.172470][ T31] audit: type=1400 audit(80.100:90): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.178135][ T31] audit: type=1400 audit(80.110:91): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 80.258422][ T3124] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 80.258427][ T3125] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 89.308711][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 89.309121][ T31] audit: type=1400 audit(89.240:107): avc: denied { map_create } for pid=3863 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.314395][ T31] audit: type=1400 audit(89.240:108): avc: denied { map_read map_write } for pid=3863 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.847504][ T31] audit: type=1400 audit(89.780:109): avc: denied { audit_write } for pid=3870 comm="syz.1.19" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 89.849650][ T31] audit: type=1107 audit(89.780:110): pid=3870 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 90.031391][ T31] audit: type=1400 audit(89.960:111): avc: denied { create } for pid=3874 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.198392][ T31] audit: type=1400 audit(90.130:112): avc: denied { write } for pid=3874 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.173319][ T31] audit: type=1400 audit(93.100:113): avc: denied { create } for pid=3881 comm="syz.1.23" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 94.749050][ T31] audit: type=1400 audit(94.680:114): avc: denied { create } for pid=3884 comm="syz.0.24" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 94.827807][ T31] audit: type=1400 audit(94.760:115): avc: denied { unlink } for pid=3124 comm="syz-executor" name="file0" dev="tmpfs" ino=70 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 95.356156][ T31] audit: type=1400 audit(95.280:116): avc: denied { append } for pid=3889 comm="syz.0.26" name="001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 97.421197][ T31] audit: type=1400 audit(97.350:117): avc: denied { write } for pid=3881 comm="syz.1.23" name="file0" dev="tmpfs" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 97.424030][ T31] audit: type=1400 audit(97.350:118): avc: denied { open } for pid=3881 comm="syz.1.23" path="/12/file0" dev="tmpfs" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 99.027027][ T31] audit: type=1400 audit(98.950:119): avc: denied { create } for pid=3898 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 99.035597][ T31] audit: type=1400 audit(98.960:120): avc: denied { write } for pid=3898 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.481242][ T31] audit: type=1400 audit(108.410:121): avc: denied { unlink } for pid=3125 comm="syz-executor" name="file0" dev="tmpfs" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 108.662304][ T31] audit: type=1400 audit(108.590:122): avc: denied { create } for pid=3905 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.680266][ T31] audit: type=1400 audit(108.610:123): avc: denied { ioctl } for pid=3905 comm="syz.0.30" path="socket:[1017]" dev="sockfs" ino=1017 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.690143][ T31] audit: type=1400 audit(108.620:124): avc: denied { bind } for pid=3905 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.698908][ T31] audit: type=1400 audit(108.630:125): avc: denied { write } for pid=3905 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.715736][ T31] audit: type=1400 audit(108.640:126): avc: denied { read } for pid=3905 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 113.539116][ T31] audit: type=1400 audit(113.470:127): avc: denied { watch watch_reads } for pid=3919 comm="syz.1.35" path="/14" dev="tmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 113.606429][ T31] audit: type=1326 audit(113.540:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 113.609880][ T31] audit: type=1326 audit(113.540:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 113.617237][ T31] audit: type=1326 audit(113.550:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132280 code=0x7ffc0000 [ 113.626423][ T31] audit: type=1326 audit(113.560:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 113.632571][ T31] audit: type=1326 audit(113.560:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132280 code=0x7ffc0000 [ 113.644152][ T31] audit: type=1326 audit(113.570:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.36" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 114.134528][ T3929] netlink: 16 bytes leftover after parsing attributes in process `syz.0.39'. [ 114.647982][ T31] audit: type=1326 audit(114.580:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.0.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 114.649200][ T31] audit: type=1326 audit(114.580:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.0.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 114.652001][ T31] audit: type=1326 audit(114.580:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.0.40" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132280 code=0x7ffc0000 [ 116.906307][ T3073] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 117.091065][ T3073] usb 1-1: config 1 interface 0 altsetting 108 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 117.092307][ T3073] usb 1-1: config 1 interface 0 altsetting 108 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 117.095795][ T3073] usb 1-1: config 1 interface 0 has no altsetting 0 [ 117.128747][ T3073] usb 1-1: New USB device found, idVendor=046d, idProduct=c20e, bcdDevice= 0.40 [ 117.129065][ T3073] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.129301][ T3073] usb 1-1: Product: syz [ 117.129463][ T3073] usb 1-1: Manufacturer: syz [ 117.129770][ T3073] usb 1-1: SerialNumber: syz [ 117.146318][ T3942] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 117.397948][ T3073] usbhid 1-1:1.0: can't add hid device: -71 [ 117.398632][ T3073] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 117.416849][ T3073] usb 1-1: USB disconnect, device number 2 [ 117.757981][ T3948] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 117.781112][ T3948] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 121.943110][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 121.943273][ T31] audit: type=1326 audit(121.870:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3965 comm="syz.0.48" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 121.966391][ T31] audit: type=1326 audit(121.900:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3965 comm="syz.0.48" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 122.013647][ T31] audit: type=1326 audit(121.940:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3965 comm="syz.0.48" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132280 code=0x7ffc0000 [ 123.536679][ T31] audit: type=1326 audit(123.470:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3965 comm="syz.0.48" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 123.537051][ T31] audit: type=1326 audit(123.470:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3965 comm="syz.0.48" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 124.204731][ T31] audit: type=1326 audit(124.130:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 124.207478][ T31] audit: type=1326 audit(124.130:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 124.215346][ T31] audit: type=1326 audit(124.140:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x132280 code=0x7ffc0000 [ 124.215538][ T31] audit: type=1326 audit(124.140:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 129.079036][ T31] audit: type=1400 audit(129.010:188): avc: denied { create } for pid=4017 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 129.089180][ T31] audit: type=1400 audit(129.020:189): avc: denied { connect } for pid=4017 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 131.662841][ T31] audit: type=1400 audit(131.590:190): avc: denied { kexec_image_load } for pid=4037 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 131.751513][ T31] audit: type=1400 audit(131.680:191): avc: denied { create } for pid=4039 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 132.508342][ T31] audit: type=1400 audit(132.440:192): avc: denied { sqpoll } for pid=4039 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 134.831314][ T31] audit: type=1400 audit(134.750:193): avc: denied { name_bind } for pid=4054 comm="syz.0.71" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 134.831734][ T31] audit: type=1400 audit(134.760:194): avc: denied { node_bind } for pid=4054 comm="syz.0.71" saddr=::ffff:172.20.20.2 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 138.785723][ T31] audit: type=1326 audit(138.710:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.802718][ T31] audit: type=1326 audit(138.730:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.825748][ T31] audit: type=1326 audit(138.740:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.828147][ T31] audit: type=1326 audit(138.760:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.842223][ T31] audit: type=1326 audit(138.770:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.852202][ T31] audit: type=1326 audit(138.780:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.852589][ T31] audit: type=1326 audit(138.780:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 138.857815][ T31] audit: type=1326 audit(138.790:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4065 comm="syz.0.76" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132280 code=0x7ffc0000 [ 141.686535][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 141.686790][ T31] audit: type=1400 audit(141.620:217): avc: denied { write } for pid=4098 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 146.536169][ T31] audit: type=1400 audit(146.440:218): avc: denied { create } for pid=4140 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.536525][ T31] audit: type=1400 audit(146.460:219): avc: denied { connect } for pid=4140 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.536804][ T31] audit: type=1400 audit(146.460:220): avc: denied { bind } for pid=4140 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.588512][ T31] audit: type=1400 audit(146.520:221): avc: denied { read } for pid=4140 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.095555][ T31] audit: type=1400 audit(147.020:222): avc: denied { write } for pid=4140 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 149.138328][ T31] audit: type=1400 audit(149.070:223): avc: denied { create } for pid=4144 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.159269][ T31] audit: type=1400 audit(149.090:224): avc: denied { connect } for pid=4144 comm="syz.0.103" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.170726][ T31] audit: type=1400 audit(149.100:225): avc: denied { write } for pid=4144 comm="syz.0.103" laddr=fe80::c402:9bff:fe1f:f384 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.117441][ T4156] netlink: 36 bytes leftover after parsing attributes in process `syz.0.108'. [ 166.512165][ T31] audit: type=1400 audit(166.440:226): avc: denied { setcheckreqprot } for pid=4169 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 177.020246][ T31] audit: type=1400 audit(176.950:227): avc: denied { create } for pid=4185 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.321307][ T31] audit: type=1400 audit(177.230:228): avc: denied { write } for pid=4185 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.494307][ T31] audit: type=1400 audit(177.420:229): avc: denied { setopt } for pid=4188 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 179.216022][ T31] audit: type=1400 audit(179.140:230): avc: denied { relabelfrom } for pid=4193 comm="syz.0.122" name="NETLINK" dev="sockfs" ino=2951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 179.216358][ T31] audit: type=1400 audit(179.140:231): avc: denied { relabelto } for pid=4193 comm="syz.0.122" name="NETLINK" dev="sockfs" ino=2951 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 181.406692][ T31] audit: type=1400 audit(181.330:232): avc: denied { ioctl } for pid=4221 comm="syz.0.124" path="socket:[3453]" dev="sockfs" ino=3453 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 182.944591][ T31] audit: type=1326 audit(182.870:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4230 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 182.958839][ T31] audit: type=1326 audit(182.890:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4230 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 182.977452][ T31] audit: type=1326 audit(182.910:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4230 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132280 code=0x7ffc0000 [ 182.979230][ T31] audit: type=1326 audit(182.910:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4230 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 182.979437][ T31] audit: type=1326 audit(182.910:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4230 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 184.959298][ T31] audit: type=1400 audit(184.890:238): avc: denied { create } for pid=4238 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 185.740049][ T4240] netlink: 224 bytes leftover after parsing attributes in process `syz.0.131'. [ 187.194639][ T4253] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 187.337313][ T31] audit: type=1400 audit(187.270:239): avc: denied { execute } for pid=4256 comm="syz.0.135" name="file0" dev="tmpfs" ino=500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 187.791581][ T4262] bond0: (slave bond_slave_0): Releasing backup interface [ 187.836778][ T4262] bond0: (slave bond_slave_1): Releasing backup interface [ 187.890874][ T4262] Zero length message leads to an empty skb [ 192.229160][ T31] audit: type=1107 audit(192.160:240): pid=4286 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 193.040377][ T4293] netlink: 4 bytes leftover after parsing attributes in process `syz.1.147'. [ 193.068749][ T4293] netlink: 12 bytes leftover after parsing attributes in process `syz.1.147'. [ 194.508759][ T31] audit: type=1400 audit(194.440:241): avc: denied { create } for pid=4301 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 194.514134][ T31] audit: type=1400 audit(194.440:242): avc: denied { write } for pid=4301 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 196.285368][ T31] audit: type=1326 audit(196.210:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.288528][ T31] audit: type=1326 audit(196.210:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.302900][ T31] audit: type=1326 audit(196.230:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.315840][ T31] audit: type=1326 audit(196.240:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.316367][ T31] audit: type=1326 audit(196.240:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.326982][ T31] audit: type=1326 audit(196.260:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.333950][ T31] audit: type=1326 audit(196.260:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 196.722257][ T4330] netlink: 'syz.0.158': attribute type 1 has an invalid length. [ 197.002521][ T4330] 8021q: adding VLAN 0 to HW filter on device bond1 [ 197.067128][ T4330] 8021q: adding VLAN 0 to HW filter on device bond1 [ 197.068210][ T4330] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 197.070568][ T4330] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 197.280413][ T4330] gretap1: entered promiscuous mode [ 197.293291][ T4330] bond1: (slave gretap1): making interface the new active one [ 197.406368][ T4330] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 197.568059][ T4330] macvlan2: entered promiscuous mode [ 197.571587][ T4330] macvlan2: entered allmulticast mode [ 197.577461][ T4330] bond1: entered promiscuous mode [ 197.587055][ T4330] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 197.637839][ T4330] bond1: (slave macvlan2): the slave hw address is in use by the bond; giving it the hw address of gretap1 [ 197.703773][ T4330] bond1: left promiscuous mode [ 200.029110][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 200.031589][ T31] audit: type=1326 audit(199.930:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.063540][ T31] audit: type=1326 audit(199.960:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.088773][ T31] audit: type=1326 audit(200.010:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.089094][ T31] audit: type=1326 audit(200.010:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.089314][ T31] audit: type=1326 audit(200.010:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.182978][ T31] audit: type=1326 audit(200.050:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.183324][ T31] audit: type=1326 audit(200.110:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.183549][ T31] audit: type=1326 audit(200.110:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.183721][ T31] audit: type=1326 audit(200.110:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.199264][ T31] audit: type=1326 audit(200.130:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4395 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 200.698914][ T4402] netlink: 79 bytes leftover after parsing attributes in process `syz.1.167'. [ 201.035540][ T4409] mmap: syz.1.169 (4409) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 202.547865][ T4435] netlink: 12 bytes leftover after parsing attributes in process `syz.1.179'. [ 203.929667][ T4446] syzkaller0: entered promiscuous mode [ 203.929975][ T4446] syzkaller0: entered allmulticast mode [ 204.500646][ T4457] netlink: 8 bytes leftover after parsing attributes in process `syz.1.184'. [ 204.501053][ T4457] netlink: 312 bytes leftover after parsing attributes in process `syz.1.184'. [ 204.504465][ T4457] netlink: 8 bytes leftover after parsing attributes in process `syz.1.184'. [ 206.132768][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 206.133100][ T31] audit: type=1400 audit(206.030:293): avc: denied { override_creds } for pid=4469 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 207.938566][ T31] audit: type=1400 audit(207.870:294): avc: denied { create } for pid=4484 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 207.942895][ T31] audit: type=1400 audit(207.870:295): avc: denied { write } for pid=4484 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 207.954783][ T31] audit: type=1400 audit(207.880:296): avc: denied { nlmsg_write } for pid=4484 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 208.167093][ T4487] binfmt_misc: register: failed to install interpreter file ./file1 [ 208.560670][ T31] audit: type=1326 audit(208.490:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 208.567744][ T31] audit: type=1326 audit(208.500:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x132280 code=0x7ffc0000 [ 208.576474][ T31] audit: type=1326 audit(208.510:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 208.577708][ T31] audit: type=1326 audit(208.510:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 208.579097][ T31] audit: type=1326 audit(208.510:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=269 compat=0 ip=0x132280 code=0x7ffc0000 [ 208.579934][ T31] audit: type=1326 audit(208.510:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4492 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 209.240859][ T4508] netlink: 12 bytes leftover after parsing attributes in process `syz.1.201'. [ 209.388584][ T4511] netlink: 48 bytes leftover after parsing attributes in process `syz.0.202'. [ 209.423971][ T4507] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 209.467884][ T4507] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 211.153380][ T4528] netlink: 12 bytes leftover after parsing attributes in process `syz.1.206'. [ 211.811345][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 211.811627][ T31] audit: type=1326 audit(211.740:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.811871][ T31] audit: type=1326 audit(211.740:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.836718][ T31] audit: type=1326 audit(211.760:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.837049][ T31] audit: type=1326 audit(211.760:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.837297][ T31] audit: type=1326 audit(211.760:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.848809][ T31] audit: type=1326 audit(211.780:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.850490][ T31] audit: type=1326 audit(211.780:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.852795][ T31] audit: type=1326 audit(211.780:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.855374][ T31] audit: type=1326 audit(211.780:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 211.864729][ T31] audit: type=1326 audit(211.790:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.208" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 212.698315][ T4540] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 214.239065][ T4558] SELinux: failed to load policy [ 215.639133][ T4578] netlink: 32 bytes leftover after parsing attributes in process `syz.1.221'. [ 217.867544][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 217.867790][ T31] audit: type=1400 audit(217.800:331): avc: denied { create } for pid=4601 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 217.881671][ T31] audit: type=1400 audit(217.810:332): avc: denied { sys_admin } for pid=4601 comm="syz.0.227" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 220.052609][ T4631] netlink: 24 bytes leftover after parsing attributes in process `syz.0.239'. [ 224.758646][ T4670] syz.0.247 uses obsolete (PF_INET,SOCK_PACKET) [ 227.869255][ T4685] syzkaller1: entered promiscuous mode [ 227.869788][ T4685] syzkaller1: entered allmulticast mode [ 227.872544][ T31] audit: type=1400 audit(227.800:333): avc: denied { ioctl } for pid=4684 comm="syz.0.249" path="socket:[4476]" dev="sockfs" ino=4476 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 231.812061][ T31] audit: type=1326 audit(231.740:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4708 comm="syz.0.255" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x0 [ 238.504370][ T4734] Illegal XDP return value 60 on prog (id 129) dev syz_tun, expect packet loss! [ 245.481972][ T4756] netlink: 32 bytes leftover after parsing attributes in process `syz.0.269'. [ 246.109136][ T31] audit: type=1400 audit(246.040:335): avc: denied { relabelfrom } for pid=4759 comm="syz.0.271" name="" dev="pipefs" ino=4557 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 249.354728][ T31] audit: type=1400 audit(249.280:336): avc: denied { create } for pid=4769 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 249.480485][ T31] audit: type=1400 audit(249.410:337): avc: denied { write } for pid=4769 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 249.517755][ T31] audit: type=1400 audit(249.450:338): avc: denied { ioctl } for pid=4769 comm="syz.0.274" path="socket:[3984]" dev="sockfs" ino=3984 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 252.662607][ T4816] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 252.674588][ T31] audit: type=1400 audit(252.600:339): avc: denied { getopt } for pid=4814 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 252.805782][ T31] audit: type=1400 audit(252.730:340): avc: denied { read write } for pid=3125 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 252.806090][ T31] audit: type=1400 audit(252.730:341): avc: denied { open } for pid=3125 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 252.859368][ T31] audit: type=1400 audit(252.730:342): avc: denied { ioctl } for pid=3125 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 252.954004][ T31] audit: type=1400 audit(252.880:343): avc: denied { read } for pid=4817 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 253.051640][ T31] audit: type=1400 audit(252.980:344): avc: denied { create } for pid=4817 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 253.125867][ T31] audit: type=1400 audit(253.040:345): avc: denied { prog_load } for pid=4817 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 253.137562][ T31] audit: type=1400 audit(253.070:346): avc: denied { bpf } for pid=4817 comm="syz.1.286" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 253.137860][ T31] audit: type=1400 audit(253.070:347): avc: denied { perfmon } for pid=4817 comm="syz.1.286" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 253.144075][ T31] audit: type=1400 audit(253.070:348): avc: denied { allowed } for pid=4817 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 257.515647][ T4615] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 257.836917][ T4615] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 257.837192][ T4615] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 257.839876][ T4615] usb 2-1: Product: syz [ 257.841456][ T4615] usb 2-1: Manufacturer: syz [ 257.841799][ T4615] usb 2-1: SerialNumber: syz [ 260.713147][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 260.714155][ T31] audit: type=1400 audit(260.640:376): avc: denied { create } for pid=4867 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 261.669273][ T31] audit: type=1400 audit(261.600:377): avc: denied { create } for pid=4870 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 261.868010][ T31] audit: type=1400 audit(261.800:378): avc: denied { create } for pid=4872 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 261.874658][ T31] audit: type=1400 audit(261.800:379): avc: denied { setopt } for pid=4872 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 262.385757][ T31] audit: type=1400 audit(262.310:380): avc: denied { getopt } for pid=4872 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 262.935494][ T31] audit: type=1400 audit(262.860:381): avc: denied { execmem } for pid=4872 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 267.243624][ T4579] usb 2-1: USB disconnect, device number 2 [ 267.332414][ T31] audit: type=1326 audit(267.260:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 267.339425][ T31] audit: type=1326 audit(267.270:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 267.343287][ T31] audit: type=1326 audit(267.270:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=399 compat=0 ip=0x132280 code=0x7ffc0000 [ 267.356718][ T31] audit: type=1326 audit(267.290:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 267.357151][ T31] audit: type=1326 audit(267.290:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 267.730298][ T31] audit: type=1400 audit(267.660:387): avc: denied { read } for pid=4891 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 267.758878][ T31] audit: type=1400 audit(267.690:388): avc: denied { create } for pid=4892 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 267.777897][ T31] audit: type=1400 audit(267.710:389): avc: denied { setopt } for pid=4892 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 267.781394][ T31] audit: type=1400 audit(267.710:390): avc: denied { bind } for pid=4892 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 268.046457][ T31] audit: type=1400 audit(267.980:391): avc: denied { setopt } for pid=4900 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 268.626225][ T4904] netlink: 8 bytes leftover after parsing attributes in process `syz.1.310'. [ 271.006067][ T4918] netlink: 8 bytes leftover after parsing attributes in process `syz.0.317'. [ 273.095399][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 273.110785][ T31] audit: type=1400 audit(273.020:397): avc: denied { create } for pid=4927 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 273.412959][ T31] audit: type=1400 audit(273.340:398): avc: denied { ioctl } for pid=4927 comm="syz.0.322" path="socket:[5130]" dev="sockfs" ino=5130 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 278.401815][ T31] audit: type=1400 audit(278.330:399): avc: denied { sys_module } for pid=4941 comm="syz.0.328" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 279.042523][ T4947] netlink: 94 bytes leftover after parsing attributes in process `syz.0.329'. [ 279.059270][ T4947] netlink: 60 bytes leftover after parsing attributes in process `syz.0.329'. [ 282.855431][ T31] audit: type=1400 audit(282.720:400): avc: denied { ioctl } for pid=5004 comm="syz.0.342" path="socket:[5187]" dev="sockfs" ino=5187 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 282.881321][ T31] audit: type=1400 audit(282.790:401): avc: denied { bind } for pid=5004 comm="syz.0.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.752417][ T31] audit: type=1400 audit(283.680:402): avc: denied { validate_trans } for pid=5033 comm="syz.0.346" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 286.268104][ T31] audit: type=1400 audit(286.200:403): avc: denied { create } for pid=5051 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 288.557993][ T5055] netlink: 'syz.1.354': attribute type 10 has an invalid length. [ 288.570088][ T5055] bond0: (slave bond_slave_1): Releasing backup interface [ 288.900030][ T31] audit: type=1400 audit(288.830:404): avc: denied { append } for pid=5059 comm="syz.1.357" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 289.128948][ T5061] syzkaller0: entered promiscuous mode [ 289.136241][ T5061] syzkaller0: entered allmulticast mode [ 289.215558][ T5065] random: crng reseeded on system resumption [ 289.937134][ T31] audit: type=1326 audit(289.870:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.937507][ T31] audit: type=1326 audit(289.870:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.960023][ T31] audit: type=1326 audit(289.890:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.962060][ T31] audit: type=1326 audit(289.890:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.966472][ T31] audit: type=1326 audit(289.890:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.975851][ T31] audit: type=1326 audit(289.900:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.977707][ T31] audit: type=1326 audit(289.900:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.980625][ T31] audit: type=1326 audit(289.900:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x132280 code=0x7ffc0000 [ 289.983707][ T31] audit: type=1326 audit(289.900:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 295.269902][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 295.270275][ T31] audit: type=1400 audit(295.160:436): avc: denied { read } for pid=5084 comm="syz.0.366" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 295.270549][ T31] audit: type=1400 audit(295.160:437): avc: denied { open } for pid=5084 comm="syz.0.366" path="net:[4026532645]" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 296.168519][ T31] audit: type=1326 audit(296.100:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 296.170815][ T31] audit: type=1326 audit(296.100:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5075 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 297.621478][ T31] audit: type=1400 audit(297.550:440): avc: denied { load_policy } for pid=5091 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 297.622640][ T5092] SELinux: failed to load policy [ 297.835802][ T31] audit: type=1400 audit(297.750:441): avc: denied { create } for pid=5094 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 299.354528][ T31] audit: type=1326 audit(299.280:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 299.359359][ T31] audit: type=1326 audit(299.290:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 299.363804][ T31] audit: type=1326 audit(299.290:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132280 code=0x7ffc0000 [ 299.374796][ T31] audit: type=1326 audit(299.300:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.1.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 301.407252][ T5119] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 301.696272][ T5121] SELinux: policydb version 0 does not match my version range 15-35 [ 301.701349][ T5121] SELinux: failed to load policy [ 302.348294][ T5123] *** NOT YET: opcode c3 *** [ 302.630693][ T5125] netlink: 132 bytes leftover after parsing attributes in process `syz.1.382'. [ 303.406742][ T5131] process 'syz.1.385' launched './file1' with NULL argv: empty string added [ 303.409897][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 303.410826][ T31] audit: type=1400 audit(303.340:447): avc: denied { execute_no_trans } for pid=5130 comm="syz.1.385" path="/160/file1" dev="tmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 308.555630][ T31] audit: type=1400 audit(308.470:448): avc: denied { sqpoll } for pid=5144 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 310.515863][ T31] audit: type=1326 audit(310.430:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5173 comm="syz.1.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 310.516902][ T31] audit: type=1326 audit(310.450:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5173 comm="syz.1.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 310.520149][ T31] audit: type=1326 audit(310.450:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5173 comm="syz.1.393" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x132280 code=0x7ffc0000 [ 310.521402][ T31] audit: type=1326 audit(310.450:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5173 comm="syz.1.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 310.523495][ T31] audit: type=1326 audit(310.450:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5173 comm="syz.1.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 310.806479][ T31] audit: type=1400 audit(310.700:454): avc: denied { create } for pid=5177 comm="syz.1.395" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 310.925507][ T31] audit: type=1400 audit(310.850:455): avc: denied { unlink } for pid=3125 comm="syz-executor" name="file0" dev="tmpfs" ino=887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 311.432520][ T31] audit: type=1400 audit(311.360:456): avc: denied { create } for pid=5181 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 311.447373][ T31] audit: type=1400 audit(311.380:457): avc: denied { ioctl } for pid=5181 comm="syz.1.397" path="socket:[6244]" dev="sockfs" ino=6244 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 311.490780][ T5182] netlink: 4 bytes leftover after parsing attributes in process `syz.1.397'. [ 315.047855][ T5194] capability: warning: `syz.1.401' uses deprecated v2 capabilities in a way that may be insecure [ 315.766547][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 315.766889][ T31] audit: type=1326 audit(315.700:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.769610][ T31] audit: type=1326 audit(315.700:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.769904][ T31] audit: type=1326 audit(315.700:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.785692][ T31] audit: type=1326 audit(315.710:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.786052][ T31] audit: type=1326 audit(315.710:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.806258][ T31] audit: type=1326 audit(315.730:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.806554][ T31] audit: type=1326 audit(315.730:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.806821][ T31] audit: type=1326 audit(315.730:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.806885][ T31] audit: type=1326 audit(315.730:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 315.827780][ T31] audit: type=1326 audit(315.760:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5199 comm="syz.0.404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 323.305753][ T4138] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 323.516396][ T4138] usb 1-1: Invalid ep0 maxpacket: 64 [ 323.699044][ T4138] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 323.906309][ T4138] usb 1-1: Invalid ep0 maxpacket: 64 [ 323.910041][ T4138] usb usb1-port1: attempt power cycle [ 324.295664][ T4138] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 324.322431][ T4138] usb 1-1: Invalid ep0 maxpacket: 64 [ 324.446378][ T4138] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 324.467936][ T4138] usb 1-1: Invalid ep0 maxpacket: 64 [ 324.477149][ T4138] usb usb1-port1: unable to enumerate USB device [ 329.835520][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 329.835886][ T31] audit: type=1326 audit(329.750:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.836170][ T31] audit: type=1326 audit(329.750:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.836369][ T31] audit: type=1326 audit(329.750:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=441 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.836562][ T31] audit: type=1326 audit(329.760:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.840460][ T31] audit: type=1326 audit(329.770:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=251 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.840583][ T31] audit: type=1400 audit(329.770:488): avc: denied { block_suspend } for pid=5223 comm="syz.1.413" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.860780][ T31] audit: type=1326 audit(329.790:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 329.863668][ T31] audit: type=1326 audit(329.790:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5223 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 331.699523][ T31] audit: type=1400 audit(331.630:491): avc: denied { ioctl } for pid=5237 comm="syz.1.418" path="socket:[6313]" dev="sockfs" ino=6313 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 333.140668][ T31] audit: type=1326 audit(333.070:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.421" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 335.552696][ T5258] netlink: 44 bytes leftover after parsing attributes in process `syz.1.425'. [ 336.031826][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 336.046441][ T31] audit: type=1400 audit(335.960:506): avc: denied { write } for pid=5263 comm="syz.1.428" name="protocols" dev="proc" ino=4026532658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 336.359080][ T31] audit: type=1400 audit(336.290:507): avc: denied { create } for pid=5265 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 336.385988][ T31] audit: type=1400 audit(336.310:508): avc: denied { write } for pid=5265 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 337.045476][ T31] audit: type=1400 audit(336.970:509): avc: denied { read write } for pid=3125 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 337.052307][ T31] audit: type=1400 audit(336.980:510): avc: denied { open } for pid=3125 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 337.085663][ T31] audit: type=1400 audit(336.990:511): avc: denied { ioctl } for pid=3125 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 337.099848][ T31] audit: type=1400 audit(337.030:512): avc: denied { read } for pid=5270 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.365753][ T31] audit: type=1400 audit(337.290:513): avc: denied { map_create } for pid=5272 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.366071][ T31] audit: type=1400 audit(337.290:514): avc: denied { perfmon } for pid=5272 comm="syz.1.432" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 337.366416][ T31] audit: type=1400 audit(337.290:515): avc: denied { map_read map_write } for pid=5272 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 341.105854][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 341.106167][ T31] audit: type=1400 audit(341.030:554): avc: denied { create } for pid=5299 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.209583][ T31] audit: type=1400 audit(341.140:555): avc: denied { write } for pid=5299 comm="syz.1.443" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.486525][ T31] audit: type=1400 audit(341.420:556): avc: denied { open } for pid=5301 comm="syz.1.444" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.491260][ T31] audit: type=1400 audit(341.420:557): avc: denied { ioctl } for pid=5301 comm="syz.1.444" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 342.223924][ T31] audit: type=1400 audit(342.150:558): avc: denied { create } for pid=5301 comm="syz.1.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 342.294233][ T31] audit: type=1400 audit(342.220:559): avc: denied { ioctl } for pid=5301 comm="syz.1.444" path="socket:[6416]" dev="sockfs" ino=6416 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 342.799827][ T31] audit: type=1326 audit(342.730:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5308 comm="syz.1.445" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 342.809665][ T31] audit: type=1326 audit(342.740:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5308 comm="syz.1.445" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132280 code=0x7ffc0000 [ 342.810008][ T31] audit: type=1326 audit(342.740:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5308 comm="syz.1.445" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 342.817007][ T31] audit: type=1326 audit(342.750:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5308 comm="syz.1.445" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 348.937393][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 348.937708][ T31] audit: type=1400 audit(348.840:574): avc: denied { relabelfrom } for pid=5319 comm="syz.0.448" name="" dev="pipefs" ino=5520 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 349.677264][ T31] audit: type=1400 audit(349.610:575): avc: denied { ioctl } for pid=5323 comm="syz.0.450" path="socket:[5527]" dev="sockfs" ino=5527 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.933897][ T31] audit: type=1400 audit(349.860:576): avc: denied { create } for pid=5325 comm="syz.0.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 349.982120][ T31] audit: type=1400 audit(349.910:577): avc: denied { write } for pid=5325 comm="syz.0.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 350.023495][ T5326] netlink: 32 bytes leftover after parsing attributes in process `syz.0.451'. [ 351.781522][ T31] audit: type=1326 audit(351.710:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 351.785984][ T31] audit: type=1326 audit(351.710:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 351.806629][ T31] audit: type=1326 audit(351.740:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 351.823242][ T31] audit: type=1326 audit(351.740:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 351.823765][ T31] audit: type=1326 audit(351.740:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 351.836633][ T31] audit: type=1326 audit(351.750:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.453" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 354.201340][ T5347] netlink: '+}[@': attribute type 10 has an invalid length. [ 354.528770][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 354.530857][ T31] audit: type=1400 audit(354.460:612): avc: denied { create } for pid=5348 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 354.548889][ T31] audit: type=1400 audit(354.480:613): avc: denied { connect } for pid=5348 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 354.796846][ T5351] netlink: 4 bytes leftover after parsing attributes in process `syz.0.463'. [ 354.824585][ T5351] netlink: 'syz.0.463': attribute type 1 has an invalid length. [ 355.277074][ T5355] netlink: 7 bytes leftover after parsing attributes in process `syz.0.465'. [ 355.297700][ T5355] netlink: 68 bytes leftover after parsing attributes in process `syz.0.465'. [ 355.302254][ T5355] netlink: 68 bytes leftover after parsing attributes in process `syz.0.465'. [ 355.449342][ T5357] veth0_to_bond: entered allmulticast mode [ 357.199223][ T31] audit: type=1326 audit(357.130:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.201279][ T31] audit: type=1326 audit(357.130:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.204497][ T31] audit: type=1326 audit(357.130:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.207176][ T31] audit: type=1326 audit(357.130:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.210047][ T31] audit: type=1326 audit(357.130:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.216444][ T31] audit: type=1326 audit(357.150:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.225588][ T31] audit: type=1326 audit(357.150:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 357.227903][ T31] audit: type=1326 audit(357.160:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5368 comm="syz.0.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 358.620853][ T5376] tmpfs: Unsupported parameter 'mpol' [ 359.259685][ T5383] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.402659][ T5383] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.624692][ T5383] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.788504][ T5383] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.949775][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 359.950097][ T31] audit: type=1400 audit(359.880:655): avc: denied { ioctl } for pid=5382 comm="syz.0.478" path="socket:[5652]" dev="sockfs" ino=5652 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 359.952047][ T2956] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.952163][ T2956] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.048655][ T2956] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.052619][ T2956] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.100100][ T31] audit: type=1400 audit(360.030:656): avc: denied { sys_module } for pid=5382 comm="syz.0.478" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 360.373209][ T31] audit: type=1326 audit(360.300:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5379 comm="syz.0.476" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132280 code=0x7ffc0000 [ 361.875479][ T5412] syzkaller0: entered promiscuous mode [ 361.875771][ T5412] syzkaller0: entered allmulticast mode [ 363.933141][ T31] audit: type=1400 audit(363.860:658): avc: denied { associate } for pid=5424 comm="syz.0.486" name="604" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 364.841320][ T31] audit: type=1326 audit(364.740:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 364.856658][ T31] audit: type=1326 audit(364.790:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 364.871305][ T31] audit: type=1326 audit(364.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132280 code=0x7ffc0000 [ 364.873275][ T31] audit: type=1326 audit(364.800:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 364.876127][ T31] audit: type=1326 audit(364.800:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 364.889983][ T31] audit: type=1326 audit(364.820:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5430 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 365.856343][ T5439] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=5439 comm=syz.0.493 [ 365.860066][ T5439] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5439 comm=syz.0.493 [ 366.002420][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 366.005950][ T31] audit: type=1400 audit(365.930:674): avc: denied { create } for pid=5440 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 366.010030][ T31] audit: type=1400 audit(365.940:675): avc: denied { setopt } for pid=5440 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 366.108192][ T31] audit: type=1400 audit(366.040:676): avc: denied { write } for pid=5442 comm="syz.0.495" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 366.213751][ T5443] veth0_to_team: entered promiscuous mode [ 366.362118][ T31] audit: type=1400 audit(366.290:677): avc: denied { write } for pid=5445 comm="syz.0.496" name="kcm" dev="proc" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 367.763911][ T31] audit: type=1326 audit(367.690:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5450 comm="syz.0.498" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 367.782968][ T31] audit: type=1326 audit(367.710:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5450 comm="syz.0.498" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132280 code=0x7ffc0000 [ 367.790186][ T31] audit: type=1326 audit(367.710:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5450 comm="syz.0.498" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 370.195713][ T31] audit: type=1400 audit(370.120:681): avc: denied { kexec_image_load } for pid=5460 comm="syz.1.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 370.486112][ T31] audit: type=1326 audit(370.410:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5462 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 370.498515][ T31] audit: type=1326 audit(370.430:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5462 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.488809][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 373.496938][ T31] audit: type=1400 audit(373.420:696): avc: denied { create } for pid=5452 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 373.602641][ T31] audit: type=1400 audit(373.510:697): avc: denied { setopt } for pid=5452 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 373.603074][ T31] audit: type=1400 audit(373.530:698): avc: denied { create } for pid=5452 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 373.603398][ T31] audit: type=1400 audit(373.530:699): avc: denied { write } for pid=5452 comm="syz.0.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 373.690407][ T31] audit: type=1326 audit(373.620:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.705722][ T31] audit: type=1326 audit(373.630:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.707867][ T31] audit: type=1326 audit(373.630:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.711311][ T31] audit: type=1326 audit(373.640:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.714349][ T31] audit: type=1326 audit(373.640:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 373.739949][ T31] audit: type=1326 audit(373.670:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.1.509" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 375.614370][ T5485] netlink: 24 bytes leftover after parsing attributes in process `syz.1.512'. [ 375.942357][ T5487] netlink: 68 bytes leftover after parsing attributes in process `syz.1.513'. [ 382.371337][ T5543] netlink: 8 bytes leftover after parsing attributes in process `syz.1.538'. [ 382.570026][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 382.577436][ T31] audit: type=1326 audit(382.500:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.1.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 382.578892][ T31] audit: type=1326 audit(382.510:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.1.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 382.600706][ T31] audit: type=1326 audit(382.530:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.1.539" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132280 code=0x7ffc0000 [ 382.601030][ T31] audit: type=1326 audit(382.530:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.1.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 382.601385][ T31] audit: type=1326 audit(382.530:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5544 comm="syz.1.539" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 385.197110][ T31] audit: type=1400 audit(385.130:761): avc: denied { load_policy } for pid=5554 comm="syz.1.544" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 385.202226][ T5555] SELinux: failed to load policy [ 386.051066][ T31] audit: type=1326 audit(385.980:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5559 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 386.085738][ T31] audit: type=1326 audit(386.010:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5559 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 386.099380][ T31] audit: type=1326 audit(386.020:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5559 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132280 code=0x7ffc0000 [ 386.133682][ T31] audit: type=1326 audit(386.060:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5559 comm="syz.1.546" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.439515][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 395.439859][ T31] audit: type=1326 audit(395.370:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.443983][ T31] audit: type=1326 audit(395.370:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.447443][ T31] audit: type=1326 audit(395.370:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.457961][ T31] audit: type=1326 audit(395.390:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.467838][ T31] audit: type=1326 audit(395.400:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.468134][ T31] audit: type=1326 audit(395.400:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.468358][ T31] audit: type=1326 audit(395.400:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.494721][ T31] audit: type=1326 audit(395.420:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.503817][ T31] audit: type=1326 audit(395.430:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.504076][ T31] audit: type=1326 audit(395.430:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.1.553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 395.737983][ T5579] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 395.783708][ T5579] syzkaller0: refused to change device tx_queue_len [ 399.101840][ T5605] ------------[ cut here ]------------ [ 399.102332][ T5605] WARNING: CPU: 1 PID: 5605 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x390/0x45c [ 399.105905][ T5605] verifier bug: REG INVARIANTS VIOLATION (alu): range bounds violation u64=[0xfffffffffffffffd, 0xfffffffffffffffc] s64=[0xfffffffffffffffd, 0xfffffffffffffffc] u32=[0xfffffffd, 0xfffffffc] s32=[0xfffffffd, 0xfffffffc] var_off=(0xfffffffffffffffc, 0x0)(1) [ 399.108656][ T5605] Modules linked in: [ 399.110042][ T5605] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 399.111091][ T5605] CPU: 1 UID: 0 PID: 5605 Comm: syz.1.565 Not tainted syzkaller #0 PREEMPT [ 399.114058][ T5605] Hardware name: ARM-Versatile Express [ 399.115497][ T5605] Call trace: [ 399.115979][ T5605] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 399.116596][ T5605] r7:00000000 r6:8281f77c r5:00000000 r4:82260aec [ 399.116929][ T5605] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 399.117272][ T5605] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 399.117657][ T5605] r5:00000000 r4:82a77d18 [ 399.117826][ T5605] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 399.118114][ T5605] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 399.118472][ T5605] r7:803d4444 [ 399.118614][ T5605] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 399.119000][ T5605] r3:8280c684 r2:00000001 r1:82247508 r0:8224ef84 [ 399.119219][ T5605] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 399.119578][ T5605] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 399.119893][ T5605] r8:00000009 r7:822673ec r6:dfa559d4 r5:85ab3c00 r4:00000000 [ 399.120140][ T5605] [<80254bd0>] (warn_slowpath_fmt) from [<803d4444>] (reg_bounds_sanity_check+0x390/0x45c) [ 399.120671][ T5605] r10:85498000 r9:fffffffd r8:ffffffff r7:fffffffd r6:fffffffc r5:82267d48 [ 399.121198][ T5605] r4:8582b168 [ 399.121457][ T5605] [<803d40b4>] (reg_bounds_sanity_check) from [<803ebb68>] (check_alu_op+0x110/0xa78) [ 399.121951][ T5605] r10:0000000b r9:8549d000 r8:00000000 r7:00000010 r6:8582b000 r5:85498000 [ 399.122344][ T5605] r4:dfa49058 [ 399.122510][ T5605] [<803eba58>] (check_alu_op) from [<803f64f0>] (do_check_common+0x1650/0x311c) [ 399.122897][ T5605] r10:0000000b r9:8549d000 r8:dfa49028 r7:00000005 r6:dfa49000 r5:867d8ae0 [ 399.123258][ T5605] r4:85498000 [ 399.123403][ T5605] [<803f4ea0>] (do_check_common) from [<803fb778>] (bpf_check+0x28c8/0x3038) [ 399.123737][ T5605] r10:00000000 r9:854987b8 r8:85498000 r7:00000001 r6:8549d000 r5:0000000e [ 399.124031][ T5605] r4:00000a7b [ 399.124236][ T5605] [<803f8eb0>] (bpf_check) from [<803cdc24>] (bpf_prog_load+0x68c/0xc20) [ 399.124648][ T5605] r10:85ab3c00 r9:869bf330 r8:00000048 r7:dfa55d90 r6:00000000 r5:00000000 [ 399.125201][ T5605] r4:dfa55ec0 [ 399.125364][ T5605] [<803cd598>] (bpf_prog_load) from [<803cf260>] (__sys_bpf+0x42c/0x20f0) [ 399.125795][ T5605] r10:b5403587 r9:200017c0 r8:00000000 r7:00000000 r6:00000005 r5:dfa55e90 [ 399.126138][ T5605] r4:00000048 [ 399.126321][ T5605] [<803cee34>] (__sys_bpf) from [<803d14c4>] (sys_bpf+0x2c/0x48) [ 399.126728][ T5605] r10:00000182 r9:85ab3c00 r8:8020029c r7:00000182 r6:002f6308 r5:00000000 [ 399.127055][ T5605] r4:00000000 [ 399.127225][ T5605] [<803d1498>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 399.127612][ T5605] Exception stack(0xdfa55fa8 to 0xdfa55ff0) [ 399.127990][ T5605] 5fa0: 00000000 00000000 00000005 200017c0 00000048 00000000 [ 399.128322][ T5605] 5fc0: 00000000 00000000 002f6308 00000182 002e0000 00000000 00006364 76f710bc [ 399.128658][ T5605] 5fe0: 76f70ec0 76f70eb0 0001946c 00132280 [ 399.131181][ T5605] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:03:35 Registers: info registers vcpu 0 CPU#0 R00=d3474000 R01=dfa7d000 R02=00000001 R03=80239bb8 R04=7f003000 R05=00000001 R06=82ac8f44 R07=82ac8320 R08=7f003000 R09=dfa7d000 R10=8280c9b4 R11=dfa65d9c R12=dfa65da0 R13=dfa65d70 R14=80230af0 R15=80239bd0 PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=000000fd R01=00000000 R02=00000000 R03=85ab3c00 R04=822673ec R05=00000aa2 R06=00000009 R07=803d4444 R08=85ab3c00 R09=803d4444 R10=82267dbc R11=dfa559bc R12=dfa55900 R13=dfa55990 R14=80254aac R15=802066f4 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000