last executing test programs: 13.841404543s ago: executing program 0 (id=2865): socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0x5450, 0x0) socket$unix(0x1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5452, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r1 = mq_open(&(0x7f0000000080)='cgroup.subtree_control\x00', 0x40, 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5451, 0x0) 13.721016403s ago: executing program 0 (id=2866): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmmsg(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000140)="e43d04fd2170bd50125ffa6d1e179f98984b2c72ca3bffd4871a112972963a9b524958b63a1619122acc32a1e1c81a85", 0x30}, {&(0x7f0000000480)="149d044c07e578f48f6e7fb65172a61b0316e20d92e71c834e31de4335c697b4f63ff06e8ef72792bc9e4d188015c40f05384741eea7303566305add", 0x3c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000001140)="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", 0x8eb}], 0x1}}], 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0x18c, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0xd1, 0x1, "2fb016ae2d2f2bd7b733f89b9ee24e9933d517f13eb9fe07ffe2ba135da1167da690e541dad06c72742c62d780e6be426aaccdf414ba131fc86c4304e1b2fe7c1307f8a9ecd189addd7b4a4738092ff617b1fe314bf72728afa34be2ea535ec0a659b149af1f8d0316a1f3c6f117f124715294d8f1335bb4624fd1771074b65792db0e3bca8f336832b2142a16583cbf96967904e41a212060cf56fa5a102ecb4ee926276aacdfbeb4344fae0daa1c0b9e2db1eca5d5f14a3097f1a34b6c5e00010f47d512e597aef2746c2a96"}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0x18c}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 13.483491724s ago: executing program 0 (id=2868): timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) write$FUSE_WRITE(r1, &(0x7f0000000100)={0xfffffeec}, 0xffffffd1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)=0x0) write$FUSE_STATFS(r1, &(0x7f0000000340)={0x60}, 0x60) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000200)={{0x0, 0x3938700}, {r3, r4+60000000}}, 0x0) close(r1) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendto$unix(r5, 0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x9}}, 0x0) 13.131849746s ago: executing program 0 (id=2869): r0 = io_uring_setup(0x79bf, &(0x7f0000000180)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f00000001c0)={0x1d, r4, 0x1}, 0x18) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) 12.141670824s ago: executing program 0 (id=2870): gettid() openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = memfd_create(&(0x7f0000000000)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9b\x04\x00\x00\x00\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c< \xe7\x9dC\xe7\xe8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a]>\x9b6\xd0B0\x1aT\xa9\x1a\xb6\xfd}\x9cU[\x01W3C\xef\xfd\xef#\x8292\xf3P\x0e\x17\xa6a=\xbeZ\x87\xbe\xa2\xb1|\xb8\xa88?\xc3v#|\xf9\xcf\x1fut\xc2\xc0\xbci\xbb\xf7c\xb6\x94\x8e*', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) readv(0xffffffffffffffff, 0x0, 0x0) poll(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, 0x0, 0x8) 3.654604663s ago: executing program 0 (id=2879): r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0xfffffdb6) sendmmsg$unix(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)='P', 0x1}], 0x1, 0xffffffffffffffff}}], 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0xb) fcntl$setsig(r1, 0xa, 0x12) r2 = getpid() fcntl$setown(r1, 0x8, r2) close(r1) r3 = socket$inet(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f00000019c0)={0x2, 0x0, @remote}, 0x10) write$tun(r3, 0x0, 0x0) tkill(r0, 0x13) 2.622305346s ago: executing program 1 (id=2880): dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x91\xfdy\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0`\xaa8\xc7\xc8\x9d\xfdA\b\x10\x92(c\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\xcdI\x83\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7 \x1d\xa1\xce\x8b\xac\b\x00\x80\xdc\x02\xd7\x04\x9b\x9aL\x9f([4\x81\xd6_#\xa6\xb3\xcd\xa8\xdc\xa6\x8b\xe5\xb1\x85n\xfecJ\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4W;)\x9f\x9cR\xae\x12G\xd8\xa4y\x069\xfb\x13\xc3\x04_]\x0fcI\xca\xe2\x89IN\x9d\xff\t\x15\x90 \xf7\xeb\x9b\v[1u`\xf7\x94J\x94\xfa\xd7.\xf0\x8f\xedO\xa6\xc3\xfdUDL\xbd\xdc~Z\xed\xbc(\xc4m0:\xce\ni.hl\x860L\"_\x12M?t\xf4\xeb\xf1y\xd8\x8e\xa2\xf9\x9d\x10U\xfa<\x83\x16\xe3~|ia\xc9\xd7\x9f$\xef\xc0\x83\xda\xcf\x1f\xa9,3\x0f\xcc\xc7/\xd54\x02\xe8c\xf5\xba\xd6\x94\\\xcd\xc0\x8d\xdc\xe2\xe4<\xe5{\xe36\xd0\xff\x8c\xb13\x0f*2>X\xfe\xd7iv\x18}K\xe5\x03\xc6\x1cAE\xc7L!Y\x8f\xdf\xe9\xe4\xdeF>?6', 0x0) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000000)=0xffffffffffffffff, 0x12) memfd_create(&(0x7f0000000040)='(\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r2 = memfd_create(&(0x7f0000000b80)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\xf4\b\xe0\xfa\xb1\xd8N\xb2W\x06\xcd\xba{\x99$\xc3\x93u\x86\xfc\xc3\b\x1b\b\x1d\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x05kR\xfc\xcb[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xf5\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\b\x8d%K\x1d\xcb\x9fB:\xca\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+\x00\x02X\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\vG\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc3\x0e\t&\xbd\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x11\xcf\xe5\x93D\x8d~\x01\t\x00\x00\xaa\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UnY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/\xf2\x1d\xf0`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\xdem\xe3)q:3\xfa*\x98o\'f\xbcY\x8ey\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1x\x17/\v0\x9e\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea\x04\xf0\xd0\x00}\xfa}\xf1\x8bz\xca\xad\x8a\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c\x01@JRY\t\x00Pjk\xf7\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xaa\xa4\xb6H\x89D\x93L\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a\xf6\xf6\xa6\x88\xfd\xc2\xa9\x14\xf3\xe1}\r.\a\x97\xf1A\x16\xbb1\xe3\xb7-\x96\xc1\x19\x85\x00\x00\x00\x00\x00\xbe\xb3\x19\x82)h\xa0\xbb(<\xe6\xc1\xd7\n\x0e\x80K7]4\xb8\x1c\xe4\xd2C.h\x81\x8a\xec\x90\xb2\xf69\x1b\x8dl\xcc@\xd5\xaf4\x15\x1e\xb1\x12\xdc\xea\x1a6~\x95\x83\xca\xbfr\x92A\xdf3\xfb\xafP\x9b\x1e\x1f\tLl\xadIJ\xc8\x19\\\xe6\xcb\x06J\xb8X\x03N\xfd\x9f\xca\xb2\xde\xe5\x0f_S\x85\r\xdf\xf9\x1b\x85\xb6\x9a\xe5\xc535\xfb\xfb$(Kf\xbb\x1b\xef\xb7\x8c6q\x95w5\xda70\xaa\x91\xcb\x0f\x99\aj*\x91\x94\xee\xbd\xb1\x17\xb2g\xdb\xec\x10\x05V\xa3\xb0:z\xc5\xaa\x87\'\xc4vH6\\\xcb\xf5\x11Mz\xa16\xee\x8a\x1f\x9e\\%\x11\xce7\xdb\xa2\xcd\xd1Q\x05\x11\xf6\bN\x06\x91\xc7\xfa\xea\xa5X\x86\xc3U \xad\xa8\"G\x8e\x8eV\xc3\x8f!#t\xf3\x1e?', 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x0) fallocate(r2, 0x0, 0x0, 0x800000b) r3 = epoll_create(0x7) ioctl$TUNGETIFF(r3, 0x5451, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x6c03) openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 1.79365327s ago: executing program 1 (id=2881): socket$inet6(0xa, 0x2, 0x0) open$dir(&(0x7f0000002f80)='./file0\x00', 0x1c0, 0x0) open$dir(&(0x7f0000003a80)='./file0\x00', 0xa8080, 0x58) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), 0x4) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000900)={&(0x7f0000000800), 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x14, 0x0, 0x0, 0x70bd27}, 0x14}, 0x1, 0x0, 0x0, 0x20088181}, 0x0) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x57) r2 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@local, 0x5e, r3}) 1.429151292s ago: executing program 1 (id=2882): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmmsg(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000140)="e43d04fd2170bd50125ffa6d1e179f98984b2c72ca3bffd4871a112972963a9b524958b63a1619122acc32a1e1c81a85", 0x30}, {&(0x7f0000000480)="149d044c07e578f48f6e7fb65172a61b0316e20d92e71c834e31de4335c697b4f63ff06e8ef72792bc9e4d188015c40f05384741eea7303566305add", 0x3c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000001140)="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", 0x6b8}], 0x1}}], 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0xbc, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0xbc}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 848.567614ms ago: executing program 1 (id=2883): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmmsg(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000140)="e43d04fd2170bd50125ffa6d1e179f98984b2c72ca3bffd4", 0x18}, {&(0x7f0000000480)="149d044c07e578f48f6e7fb65172a61b0316e20d92e71c834e31de4335c697b4f63ff06e8ef72792bc9e4d1880", 0x2d}], 0x2}}], 0x1, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0xbc, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0xbc}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 197.193973ms ago: executing program 1 (id=2884): socket$inet_udp(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$KDDELIO(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000002a40)) r1 = mq_open(&(0x7f00000000c0)='cmdline\x00', 0x40, 0x48, &(0x7f0000000100)={0x0, 0x9, 0x5, 0x8000}) ioctl$FITRIM(0xffffffffffffffff, 0x5452, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001400)={0x0, [], 0x0, "fd30f568fb47c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 0s ago: executing program 1 (id=2885): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = mq_open(&(0x7f00000019c0)='\\%\x00\xc5\xffnB\xebs&\x9c\xf2\xa3\x02}\xba_\xdc\x8b\xe5\xecas9w\xe5\"\x01\xcc\xa2J\xb0jLk\x96\x8e\xf8\xcd\x02etl\b\xed\xa3\xb4\x14\f\xd8\x156\xf5\b\xa7\x19+\xfd\xaa\x98|\xe0\xde!a\xa5:\x91\x15\x96\x84\xbf\xa9\xdf\nh\x95\xcdc%L5\xf6\x9e\x9a_\x12\a3\xe6\xd7\xe5\x7fts6\x7f5\x84\x8c\x85\x82Y\xb2\xe3]\xfc\xfa\x13[\x90\xc00\xad\xfe\x06jX\xf4H\\e\xc6\xc2\xa9\xf8\xa2\xe5\xbf\xc9oA\x87\xa14[L\x86V\xc9!\x80y\xb1/\x02n\x8a\xea\xb6\x00\xd6\xc6e\xb5\xd4\xef\xb3\xd4?\xde\xe6\x03D%\xfe\x89\x8e\x1d\x803\xc9G\x87\x11\t`\x9dt\xb6\xe3\xde\x80\xe9\\\xcf#\xff\xc8\xccU\x04=9\xcbD\xf6\xf8\xe6\x134\\ql7 \xcbzS\x0e\xddpz\xd8,\x10\x15\x18a\xe6\x94\x9d=x\xd7}cI\x13\xdf\x05\xdc\xe8\xe4:!\xb0\xb7\x8f\x1a\xdb\x92\xbf\xb0^\x19dBlR\xf3\x03\xd5k\xb2\x8fu\x861\nA\x14\xea2\xd9\xffUp\x00\xca\xce\xfe\x89\xf0\x06^]\a\xf7)\x80\v\x0f\x951z\x10\x1f\x1f\x1b\xe7Pq\xdc\xe0k\x1a\xf1\xf6\rv{+\xc3\n\xc5\xc7\xfa\x83\xe9\xa1G\vs\xc3\xaf\x05\xd4\x17f\x8b\xa6\xf4\xd5\x8e*\xb6\xa6|\xce\x87g\xdd>\xfa\xf8\x82:b\xc4\x83\xa6gl\xdf\x8f\xe3>C\x10\xf8?c4\xff', 0x40, 0x0, 0x0) dup3(r1, r2, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f0000003240), 0x8) ioctl$VT_OPENQRY(r4, 0x5451, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) kernel console output (not intermixed with test programs): [ 35.717052][ T31] audit: type=1400 audit(35.660:68): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.717719][ T31] audit: type=1400 audit(35.660:69): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:50788' (ED25519) to the list of known hosts. [ 43.825926][ T31] audit: type=1400 audit(43.770:70): avc: denied { name_bind } for pid=3103 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 45.601880][ T31] audit: type=1400 audit(45.540:71): avc: denied { execute } for pid=3105 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 45.651750][ T31] audit: type=1400 audit(45.590:72): avc: denied { execute_no_trans } for pid=3105 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 48.114832][ T31] audit: type=1400 audit(48.060:73): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.116308][ T31] audit: type=1400 audit(48.060:74): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.127787][ T3105] cgroup: Unknown subsys name 'net' [ 48.134435][ T31] audit: type=1400 audit(48.080:75): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.340817][ T3105] cgroup: Unknown subsys name 'hugetlb' [ 48.342204][ T3105] cgroup: Unknown subsys name 'rlimit' [ 48.558311][ T31] audit: type=1400 audit(48.500:76): avc: denied { setattr } for pid=3105 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.559212][ T31] audit: type=1400 audit(48.500:77): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.559729][ T31] audit: type=1400 audit(48.500:78): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 48.666190][ T3107] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 48.666951][ T31] audit: type=1400 audit(48.610:79): avc: denied { relabelto } for pid=3107 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 52.948682][ T3105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 54.534852][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 54.534911][ T31] audit: type=1400 audit(54.480:83): avc: denied { execmem } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 54.575094][ T31] audit: type=1400 audit(54.520:84): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 54.581932][ T31] audit: type=1400 audit(54.520:85): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 54.583121][ T31] audit: type=1400 audit(54.520:86): avc: denied { read } for pid=3110 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.583896][ T31] audit: type=1400 audit(54.520:87): avc: denied { open } for pid=3110 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.601663][ T31] audit: type=1400 audit(54.530:88): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 54.610944][ T31] audit: type=1400 audit(54.550:89): avc: denied { module_request } for pid=3111 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.612241][ T31] audit: type=1400 audit(54.550:90): avc: denied { module_request } for pid=3110 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.670986][ T31] audit: type=1400 audit(54.610:91): avc: denied { sys_module } for pid=3111 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 55.079821][ T31] audit: type=1400 audit(55.020:92): avc: denied { ioctl } for pid=3110 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.843951][ T3110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.849093][ T3110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.951842][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.955310][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.465221][ T3110] hsr_slave_0: entered promiscuous mode [ 56.467726][ T3110] hsr_slave_1: entered promiscuous mode [ 56.595912][ T3111] hsr_slave_0: entered promiscuous mode [ 56.598880][ T3111] hsr_slave_1: entered promiscuous mode [ 56.600333][ T3111] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 56.600742][ T3111] Cannot create hsr debugfs directory [ 56.762138][ T3110] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 56.770600][ T3110] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 56.793236][ T3110] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 56.800290][ T3110] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.879634][ T3111] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 56.888263][ T3111] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 56.895476][ T3111] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 56.903984][ T3111] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 57.308222][ T3110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.369628][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.173971][ T3110] veth0_vlan: entered promiscuous mode [ 59.185233][ T3110] veth1_vlan: entered promiscuous mode [ 59.237887][ T3110] veth0_macvtap: entered promiscuous mode [ 59.255704][ T3110] veth1_macvtap: entered promiscuous mode [ 59.260760][ T3111] veth0_vlan: entered promiscuous mode [ 59.271810][ T3111] veth1_vlan: entered promiscuous mode [ 59.313168][ T3111] veth0_macvtap: entered promiscuous mode [ 59.319641][ T3111] veth1_macvtap: entered promiscuous mode [ 59.330723][ T3110] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.333022][ T3110] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.333376][ T3110] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.333711][ T3110] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.416489][ T3111] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.416794][ T3111] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.416982][ T3111] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.417150][ T3111] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.629328][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 59.629436][ T31] audit: type=1400 audit(59.570:102): avc: denied { read write } for pid=3110 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 59.630738][ T31] audit: type=1400 audit(59.570:103): avc: denied { open } for pid=3110 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 59.640749][ T31] audit: type=1400 audit(59.570:104): avc: denied { ioctl } for pid=3110 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 59.720355][ T31] audit: type=1400 audit(59.660:105): avc: denied { mounton } for pid=3789 comm="syz.0.1" path="/0/file0" dev="tmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 60.356549][ T31] audit: type=1400 audit(60.300:106): avc: denied { name_bind } for pid=3805 comm="syz.1.8" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 60.357815][ T31] audit: type=1400 audit(60.300:107): avc: denied { node_bind } for pid=3805 comm="syz.1.8" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 60.365805][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 60.384877][ T31] audit: type=1400 audit(60.330:108): avc: denied { create } for pid=3805 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 60.637687][ T31] audit: type=1400 audit(60.580:109): avc: denied { create } for pid=3811 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 60.647967][ T31] audit: type=1400 audit(60.590:110): avc: denied { setopt } for pid=3811 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 60.650064][ T31] audit: type=1400 audit(60.590:111): avc: denied { connect } for pid=3811 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 61.163429][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 64.748450][ T3852] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 64.755296][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 64.755370][ T31] audit: type=1400 audit(64.700:115): avc: denied { ioctl } for pid=3851 comm="syz.1.25" path="socket:[2328]" dev="sockfs" ino=2328 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 64.903393][ T31] audit: type=1400 audit(64.850:116): avc: denied { ioctl } for pid=3851 comm="syz.1.25" path="socket:[2331]" dev="sockfs" ino=2331 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.970365][ T31] audit: type=1400 audit(64.910:117): avc: denied { prog_load } for pid=3859 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 64.974208][ T31] audit: type=1400 audit(64.910:118): avc: denied { bpf } for pid=3859 comm="syz.1.28" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 65.468711][ T3872] Zero length message leads to an empty skb [ 66.083876][ T31] audit: type=1400 audit(66.030:119): avc: denied { create } for pid=3878 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 66.087018][ T31] audit: type=1400 audit(66.030:120): avc: denied { bind } for pid=3878 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 66.090334][ T31] audit: type=1400 audit(66.030:121): avc: denied { write } for pid=3878 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 66.355319][ T31] audit: type=1400 audit(66.300:122): avc: denied { name_bind } for pid=3884 comm="syz.1.38" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 68.089916][ T31] audit: type=1400 audit(68.030:123): avc: denied { create } for pid=3887 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 69.407281][ T31] audit: type=1400 audit(69.350:124): avc: denied { watch watch_reads } for pid=3892 comm="syz.1.41" path="/19/control" dev="tmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 69.637503][ T3902] serio: Serial port pts0 [ 89.017420][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 89.017537][ T31] audit: type=1400 audit(88.960:126): avc: denied { setopt } for pid=3997 comm="syz.1.78" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.703739][ T3063] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 89.931972][ T3063] usb 2-1: Using ep0 maxpacket: 32 [ 89.959340][ T3063] usb 2-1: New USB device found, idVendor=0424, idProduct=9907, bcdDevice= 3.2c [ 89.959931][ T3063] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 89.960270][ T3063] usb 2-1: Product: syz [ 89.960486][ T3063] usb 2-1: Manufacturer: syz [ 89.960692][ T3063] usb 2-1: SerialNumber: syz [ 89.967196][ T3063] usb 2-1: config 0 descriptor?? [ 89.976749][ T3063] smsc95xx v2.0.0 [ 89.977346][ T3063] smsc95xx 2-1:0.0 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 89.978863][ T3063] smsc95xx 2-1:0.0: probe with driver smsc95xx failed with error -22 [ 90.185366][ T24] usb 2-1: USB disconnect, device number 2 [ 97.357145][ T31] audit: type=1400 audit(97.300:127): avc: denied { create } for pid=4042 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.362381][ T31] audit: type=1400 audit(97.300:128): avc: denied { setopt } for pid=4042 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.649815][ T31] audit: type=1400 audit(97.590:129): avc: denied { getopt } for pid=4042 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 99.113915][ T31] audit: type=1400 audit(99.060:130): avc: denied { read } for pid=4060 comm="syz.0.96" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 99.115342][ T31] audit: type=1400 audit(99.060:131): avc: denied { open } for pid=4060 comm="syz.0.96" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 107.072297][ T31] audit: type=1400 audit(107.020:132): avc: denied { create } for pid=4106 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 113.418630][ T4167] serio: Serial port pts0 [ 121.832274][ T31] audit: type=1400 audit(121.770:133): avc: denied { map_create } for pid=4195 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.835526][ T31] audit: type=1400 audit(121.780:134): avc: denied { map_read map_write } for pid=4195 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.842294][ T31] audit: type=1400 audit(121.780:135): avc: denied { perfmon } for pid=4195 comm="syz.0.143" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 122.827927][ T31] audit: type=1400 audit(122.760:136): avc: denied { execute } for pid=4208 comm="syz.0.148" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D95336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 123.292388][ T31] audit: type=1400 audit(123.240:137): avc: denied { create } for pid=4221 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 127.750247][ T4248] serio: Serial port pts0 [ 134.077270][ T31] audit: type=1400 audit(134.020:138): avc: denied { create } for pid=4265 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.086632][ T31] audit: type=1400 audit(134.030:139): avc: denied { bind } for pid=4265 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.090444][ T31] audit: type=1400 audit(134.030:140): avc: denied { write } for pid=4265 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 138.272535][ T31] audit: type=1400 audit(138.210:141): avc: denied { create } for pid=4278 comm="syz.0.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 138.278849][ T31] audit: type=1400 audit(138.220:142): avc: denied { ioctl } for pid=4278 comm="syz.0.174" path="socket:[3834]" dev="sockfs" ino=3834 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.384227][ T4288] ======================================================= [ 141.384227][ T4288] WARNING: The mand mount option has been deprecated and [ 141.384227][ T4288] and is ignored by this kernel. Remove the mand [ 141.384227][ T4288] option from the mount to silence this warning. [ 141.384227][ T4288] ======================================================= [ 141.386213][ T31] audit: type=1400 audit(141.330:143): avc: denied { mount } for pid=4287 comm="syz.0.178" name="/" dev="ramfs" ino=3857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 141.416496][ T31] audit: type=1400 audit(141.360:144): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 144.823728][ T31] audit: type=1400 audit(144.770:145): avc: denied { ioctl } for pid=4341 comm="syz.0.201" path="socket:[4194]" dev="sockfs" ino=4194 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 149.894042][ T31] audit: type=1400 audit(149.840:146): avc: denied { ioctl } for pid=4394 comm="syz.0.223" path="pid:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 151.986270][ T4405] serio: Serial port pts0 [ 152.055476][ T31] audit: type=1400 audit(152.000:147): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 161.079639][ T31] audit: type=1400 audit(161.020:148): avc: denied { prog_run } for pid=4452 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 161.798572][ T4457] netlink: 36 bytes leftover after parsing attributes in process `syz.1.250'. [ 164.292461][ C0] hrtimer: interrupt took 12616576 ns [ 167.741631][ T31] audit: type=1400 audit(167.680:149): avc: denied { ioctl } for pid=4485 comm="syz.0.261" path="socket:[5265]" dev="sockfs" ino=5265 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 170.297449][ T31] audit: type=1400 audit(170.240:150): avc: denied { write } for pid=4505 comm="syz.0.269" name="unix" dev="proc" ino=4026532692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 177.993335][ T31] audit: type=1400 audit(177.940:151): avc: denied { setopt } for pid=4576 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.951723][ T31] audit: type=1400 audit(181.890:152): avc: denied { create } for pid=4620 comm="syz.1.315" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 181.955774][ T31] audit: type=1400 audit(181.900:153): avc: denied { create } for pid=4620 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 182.486008][ T31] audit: type=1400 audit(182.430:154): avc: denied { connect } for pid=4620 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 182.581747][ T31] audit: type=1400 audit(182.520:155): avc: denied { create } for pid=4643 comm="syz.0.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.989281][ T31] audit: type=1400 audit(182.930:156): avc: denied { write } for pid=4620 comm="syz.1.315" path="socket:[5466]" dev="sockfs" ino=5466 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 183.653355][ T4653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=4653 comm=syz.1.325 [ 184.392214][ T4664] serio: Serial port pts0 [ 184.695473][ T31] audit: type=1400 audit(184.640:157): avc: denied { create } for pid=4667 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 184.699755][ T31] audit: type=1400 audit(184.640:158): avc: denied { bind } for pid=4667 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 184.702644][ T31] audit: type=1400 audit(184.650:159): avc: denied { setopt } for pid=4667 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 184.708450][ T31] audit: type=1400 audit(184.650:160): avc: denied { accept } for pid=4667 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 184.709167][ T31] audit: type=1400 audit(184.650:161): avc: denied { ioctl } for pid=4667 comm="syz.0.330" path="socket:[4867]" dev="sockfs" ino=4867 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 185.634261][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 188.369539][ T4697] input: syz1 as /devices/virtual/input/input5 [ 206.978155][ T4853] serio: Serial port pts0 [ 208.844207][ T31] audit: type=1400 audit(208.790:162): avc: denied { read } for pid=4859 comm="syz.0.407" path="socket:[6324]" dev="sockfs" ino=6324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 218.940592][ T4902] serio: Serial port pts1 [ 222.066034][ T4939] serio: Serial port pts0 [ 235.910297][ T4996] SELinux: Context system_u:object_r:devtty_t:s0 is not valid (left unmapped). [ 235.913909][ T31] audit: type=1400 audit(235.860:163): avc: denied { relabelto } for pid=4995 comm="syz.0.452" name="cgroup.controllers" dev="tmpfs" ino=1511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 235.914677][ T31] audit: type=1400 audit(235.860:164): avc: denied { associate } for pid=4995 comm="syz.0.452" name="cgroup.controllers" dev="tmpfs" ino=1511 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devtty_t:s0" [ 235.940355][ T31] audit: type=1400 audit(235.880:165): avc: denied { unlink } for pid=3110 comm="syz-executor" name="cgroup.controllers" dev="tmpfs" ino=1511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 245.291753][ T31] audit: type=1400 audit(245.230:166): avc: denied { connect } for pid=5057 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 245.293000][ T31] audit: type=1400 audit(245.230:167): avc: denied { write } for pid=5057 comm="syz.0.477" path="socket:[7174]" dev="sockfs" ino=7174 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 245.851876][ T5062] serio: Serial port pts0 [ 258.917242][ T5095] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 258.919217][ T31] audit: type=1400 audit(258.860:168): avc: denied { getopt } for pid=5094 comm="syz.1.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 260.282351][ T31] audit: type=1400 audit(260.220:169): avc: denied { create } for pid=5108 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 260.291873][ T31] audit: type=1400 audit(260.230:170): avc: denied { write } for pid=5108 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 260.302411][ T31] audit: type=1400 audit(260.240:171): avc: denied { read } for pid=5108 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 260.794903][ T5112] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 260.822798][ T31] audit: type=1400 audit(260.760:172): avc: denied { create } for pid=5108 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 260.823697][ T31] audit: type=1400 audit(260.770:173): avc: denied { setopt } for pid=5108 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 263.324385][ T5121] serio: Serial port pts0 [ 264.469791][ T31] audit: type=1400 audit(264.410:174): avc: denied { setopt } for pid=5131 comm="syz.1.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.979306][ T31] audit: type=1400 audit(264.920:175): avc: denied { append } for pid=5139 comm="syz.0.505" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.986945][ T5140] serio: Serial port pts0 [ 271.670729][ T31] audit: type=1400 audit(271.610:176): avc: denied { mounton } for pid=5188 comm="syz.1.523" path="/228/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=fifo_file permissive=1 [ 271.855341][ T31] audit: type=1400 audit(271.800:177): avc: denied { mount } for pid=5188 comm="syz.1.523" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 278.883308][ T31] audit: type=1400 audit(278.830:178): avc: denied { write } for pid=5241 comm="syz.0.539" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.506817][ T5271] serio: Serial port pts0 [ 286.408434][ T31] audit: type=1400 audit(286.350:179): avc: denied { getopt } for pid=5303 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.304825][ T5390] serio: Serial port pts0 [ 313.288881][ T5411] serio: Serial port pts1 [ 318.181978][ T31] audit: type=1400 audit(318.120:180): avc: denied { create } for pid=5423 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 318.716753][ T31] audit: type=1400 audit(318.650:181): avc: denied { getopt } for pid=5430 comm="syz.1.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 319.574454][ T31] audit: type=1400 audit(319.520:182): avc: denied { create } for pid=5434 comm="syz.1.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 321.940088][ T5448] serio: Serial port pts0 [ 321.953076][ T31] audit: type=1400 audit(321.900:183): avc: denied { read } for pid=5449 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 321.954893][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 325.681841][ T31] audit: type=1400 audit(325.610:184): avc: denied { write } for pid=5486 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 327.174573][ T31] audit: type=1400 audit(327.100:185): avc: denied { connect } for pid=5494 comm="syz.1.622" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 336.315790][ T31] audit: type=1400 audit(336.260:186): avc: denied { bind } for pid=5526 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 336.319584][ T31] audit: type=1400 audit(336.260:187): avc: denied { listen } for pid=5526 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 336.345898][ T31] audit: type=1400 audit(336.290:188): avc: denied { connect } for pid=5526 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 336.367285][ T31] audit: type=1400 audit(336.310:189): avc: denied { setopt } for pid=5526 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 336.824546][ T31] audit: type=1400 audit(336.770:190): avc: denied { create } for pid=5528 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 336.842263][ T31] audit: type=1400 audit(336.780:191): avc: denied { write } for pid=5528 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 340.580120][ T31] audit: type=1400 audit(340.520:192): avc: denied { read } for pid=5551 comm="syz.0.642" path="socket:[7927]" dev="sockfs" ino=7927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 340.816915][ T31] audit: type=1400 audit(340.760:193): avc: denied { write } for pid=5553 comm="syz.1.643" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 340.835443][ T31] audit: type=1400 audit(340.760:194): avc: denied { remove_name } for pid=5553 comm="syz.1.643" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 340.850179][ T31] audit: type=1400 audit(340.760:195): avc: denied { unlink } for pid=5553 comm="syz.1.643" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 340.906164][ T5554] netlink: 24 bytes leftover after parsing attributes in process `syz.1.643'. [ 347.441870][ T3063] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 347.631581][ T3063] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 347.632069][ T3063] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 347.632401][ T3063] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 347.632711][ T3063] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 347.632883][ T3063] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 347.646346][ T3063] usb 2-1: config 0 descriptor?? [ 348.188649][ T3063] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 348.190304][ T3063] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 348.236694][ T3063] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 349.652394][ T3063] usb 2-1: reset high-speed USB device number 3 using dummy_hcd [ 350.473170][ T5609] usb 2-1: USB disconnect, device number 3 [ 359.762179][ T5656] serio: Serial port pts0 [ 361.443604][ T5668] serio: Serial port pts0 [ 363.088629][ T5682] serio: Serial port pts0 [ 364.941818][ T132] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 365.125264][ T132] usb 1-1: config 1 interface 0 altsetting 251 endpoint 0x81 has invalid maxpacket 512, setting to 8 [ 365.125755][ T132] usb 1-1: config 1 interface 0 altsetting 251 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 365.126009][ T132] usb 1-1: config 1 interface 0 has no altsetting 0 [ 365.136078][ T132] usb 1-1: string descriptor 0 read error: -22 [ 365.136650][ T132] usb 1-1: New USB device found, idVendor=09da, idProduct=0006, bcdDevice= 0.40 [ 365.137111][ T132] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 365.143216][ T5693] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 365.144328][ T5693] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 365.153396][ T132] usbhid 1-1:1.0: can't add hid device: -22 [ 365.153782][ T132] usbhid 1-1:1.0: probe with driver usbhid failed with error -22 [ 365.358949][ T132] usb 1-1: USB disconnect, device number 2 [ 365.622216][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 365.622329][ T31] audit: type=1400 audit(365.560:198): avc: denied { nlmsg_write } for pid=5713 comm="syz.0.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 365.632340][ T5714] lo: entered promiscuous mode [ 365.634160][ T5713] lo: left promiscuous mode [ 366.748114][ T5725] serio: Serial port pts0 [ 370.586058][ T5741] serio: Serial port pts0 [ 375.890935][ T31] audit: type=1400 audit(375.830:199): avc: denied { rename } for pid=5767 comm="syz.0.695" name="file0" dev="tmpfs" ino=2207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 375.912113][ T31] audit: type=1400 audit(375.850:200): avc: denied { unlink } for pid=3110 comm="syz-executor" name="file0" dev="tmpfs" ino=2207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 376.019787][ T5772] serio: Serial port pts0 [ 377.887935][ T5790] serio: Serial port pts0 [ 379.072286][ T31] audit: type=1400 audit(379.020:201): avc: denied { write } for pid=5801 comm="syz.1.707" path="socket:[9307]" dev="sockfs" ino=9307 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 379.073223][ T31] audit: type=1400 audit(379.020:202): avc: denied { nlmsg_write } for pid=5801 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 380.945677][ T5825] serio: Serial port pts0 [ 389.112958][ T31] audit: type=1400 audit(389.060:203): avc: denied { create } for pid=5895 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 389.122767][ T31] audit: type=1400 audit(389.060:204): avc: denied { write } for pid=5895 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 389.692149][ T31] audit: type=1400 audit(389.620:205): avc: denied { ioctl } for pid=5895 comm="syz.0.739" path="socket:[8809]" dev="sockfs" ino=8809 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 392.457713][ T5924] serio: Serial port pts0 [ 397.006210][ T5946] serio: Serial port pts0 [ 399.680222][ T5959] serio: Serial port pts0 [ 400.658242][ T5968] serio: Serial port pts1 [ 405.346195][ T31] audit: type=1400 audit(405.290:206): avc: denied { create } for pid=5986 comm="syz.1.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 405.402000][ T31] audit: type=1400 audit(405.350:207): avc: denied { ioctl } for pid=5986 comm="syz.1.761" path="socket:[8967]" dev="sockfs" ino=8967 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 407.476706][ T5998] serio: Serial port pts1 [ 410.770573][ T6011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6011 comm=syz.1.769 [ 416.781534][ T6045] serio: Serial port pts0 [ 422.643949][ T6078] serio: Serial port pts0 [ 425.068614][ T31] audit: type=1400 audit(425.010:208): avc: denied { write } for pid=6095 comm="syz.0.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 428.596568][ T31] audit: type=1400 audit(428.540:209): avc: denied { connect } for pid=6117 comm="syz.1.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 431.805330][ T6139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6139 comm=syz.1.811 [ 433.248070][ T31] audit: type=1400 audit(433.180:210): avc: denied { write } for pid=6149 comm="syz.0.815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 434.652832][ T6161] serio: Serial port pts0 [ 436.502534][ T31] audit: type=1400 audit(436.450:211): avc: denied { bind } for pid=6171 comm="syz.0.822" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 436.503601][ T31] audit: type=1400 audit(436.450:212): avc: denied { node_bind } for pid=6171 comm="syz.0.822" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 437.331611][ T6182] serio: Serial port pts0 [ 440.979096][ T6203] serio: Serial port pts0 [ 447.040157][ T6225] serio: Serial port pts1 [ 449.654345][ T6240] serio: Serial port pts1 [ 457.734434][ T31] audit: type=1400 audit(457.670:213): avc: denied { shutdown } for pid=6276 comm="syz.0.856" laddr=172.20.20.170 lport=2 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 458.464353][ T31] audit: type=1400 audit(458.410:214): avc: denied { create } for pid=6287 comm="syz.0.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 458.721719][ T6292] serio: Serial port pts0 [ 474.295665][ T6369] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6369 comm=syz.0.887 [ 474.862617][ T6376] serio: Serial port pts0 [ 479.003491][ T6408] serio: Serial port pts1 [ 481.331593][ T6424] serio: Serial port pts0 [ 481.533484][ T31] audit: type=1400 audit(481.480:215): avc: denied { read } for pid=6426 comm="syz.1.902" path="socket:[10195]" dev="sockfs" ino=10195 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 483.772567][ T6444] serio: Serial port pts0 [ 486.067113][ T31] audit: type=1326 audit(485.990:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.0.910" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x0 [ 486.551622][ T6457] serio: Serial port pts0 [ 486.913653][ T6460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6460 comm=syz.0.912 [ 488.894275][ T6473] serio: Serial port pts0 [ 492.456660][ T31] audit: type=1400 audit(492.400:217): avc: denied { map } for pid=6496 comm="syz.1.924" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10623 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 492.471562][ T31] audit: type=1400 audit(492.410:218): avc: denied { read write } for pid=6496 comm="syz.1.924" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10623 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 493.759722][ T6511] serio: Serial port pts0 [ 496.233503][ T6522] serio: Serial port pts0 [ 498.514809][ T6536] serio: Serial port pts0 [ 501.109317][ T6549] serio: Serial port pts0 [ 510.271348][ T6604] serio: Serial port pts0 [ 512.745166][ T31] audit: type=1400 audit(512.690:219): avc: denied { ioctl } for pid=6614 comm="syz.1.958" path="socket:[10754]" dev="sockfs" ino=10754 ioctlcmd=0x8913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 512.767807][ T6616] input: syz0 as /devices/virtual/input/input7 [ 518.264159][ T6658] serio: Serial port pts0 [ 533.298712][ T31] audit: type=1400 audit(533.240:220): avc: denied { read } for pid=6663 comm="syz.0.976" path="socket:[10782]" dev="sockfs" ino=10782 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 541.231583][ T6705] serio: Serial port pts0 [ 544.702496][ T31] audit: type=1400 audit(544.650:221): avc: denied { ioctl } for pid=6740 comm="syz.1.997" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 544.861321][ T6744] serio: Serial port pts0 [ 545.159261][ T6746] process 'syz.0.994' launched './file0' with NULL argv: empty string added [ 545.832580][ T31] audit: type=1400 audit(545.780:222): avc: denied { sqpoll } for pid=6732 comm="syz.0.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 549.728942][ T31] audit: type=1400 audit(549.670:223): avc: denied { write } for pid=6770 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 550.191728][ T6779] serio: Serial port pts0 [ 552.587618][ T6793] serio: Serial port pts0 [ 555.455934][ T6808] serio: Serial port pts0 [ 557.146503][ T6817] serio: Serial port pts0 [ 557.351599][ T6822] serio: Serial port pts1 [ 559.192721][ T31] audit: type=1400 audit(559.120:224): avc: denied { write } for pid=6833 comm="syz.1.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 559.887760][ T6841] serio: Serial port pts0 [ 562.096850][ T6852] raw_sendmsg: syz.0.1028 forgot to set AF_INET. Fix it! [ 563.881846][ T6872] serio: Serial port pts0 [ 563.972586][ T132] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 564.249804][ T132] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 564.255739][ T132] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 564.259144][ T132] usb 2-1: New USB device found, idVendor=056a, idProduct=00fb, bcdDevice= 0.00 [ 564.261648][ T132] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 564.269953][ T132] usb 2-1: config 0 descriptor?? [ 564.293652][ T132] usbhid 2-1:0.0: can't add hid device: -22 [ 564.294982][ T132] usbhid 2-1:0.0: probe with driver usbhid failed with error -22 [ 564.705610][ T1624] usb 2-1: USB disconnect, device number 4 [ 566.299302][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 566.666163][ T6903] serio: Serial port pts0 [ 570.409336][ T5518] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 570.621985][ T5518] usb 1-1: Using ep0 maxpacket: 32 [ 570.739149][ T5518] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 570.770519][ T5518] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 570.772384][ T5518] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 570.772730][ T5518] usb 1-1: Product: syz [ 570.772944][ T5518] usb 1-1: Manufacturer: syz [ 570.773402][ T5518] usb 1-1: SerialNumber: syz [ 570.816702][ T5518] usb 1-1: config 0 descriptor?? [ 570.850536][ T6923] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 570.944069][ T5518] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 571.184674][ T5518] usb 1-1: USB disconnect, device number 3 [ 590.447924][ T31] audit: type=1400 audit(590.390:225): avc: denied { accept } for pid=7050 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 590.586295][ T7053] serio: Serial port pts0 [ 591.759352][ T7058] serio: Serial port pts1 [ 593.687670][ T31] audit: type=1400 audit(593.630:226): avc: denied { create } for pid=7073 comm="syz.0.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 596.266331][ T7087] serio: Serial port pts0 [ 601.442816][ T7116] serio: Serial port pts0 [ 606.264314][ T7135] serio: Serial port pts0 [ 609.419314][ T7160] serio: Serial port pts0 [ 613.214121][ T7182] serio: Serial port pts0 [ 614.925836][ T7189] serio: Serial port pts1 [ 615.294096][ T7192] serio: Serial port pts0 [ 620.160105][ T7227] serio: Serial port pts0 [ 624.879535][ T31] audit: type=1400 audit(624.810:227): avc: denied { ioctl } for pid=7258 comm="syz.1.1146" path="socket:[13461]" dev="sockfs" ino=13461 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 625.106062][ T7263] serio: Serial port pts0 [ 627.442109][ T7276] serio: Serial port pts0 [ 630.158402][ T7297] serio: Serial port pts0 [ 632.284181][ T7310] serio: Serial port pts0 [ 637.115268][ T31] audit: type=1400 audit(637.060:228): avc: denied { listen } for pid=7347 comm="syz.0.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 637.641803][ T31] audit: type=1400 audit(637.580:229): avc: denied { ioctl } for pid=7347 comm="syz.0.1169" path="socket:[13551]" dev="sockfs" ino=13551 ioctlcmd=0x500c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 639.437107][ T7393] serio: Serial port pts0 [ 640.596895][ T7398] serio: Serial port pts1 [ 648.760665][ T31] audit: type=1400 audit(648.700:230): avc: denied { write } for pid=7453 comm="syz.0.1194" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 650.261694][ T7467] serio: Serial port pts0 [ 653.115984][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 655.762078][ T31] audit: type=1400 audit(655.710:231): avc: denied { write } for pid=7489 comm="syz.0.1205" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 661.485755][ T7507] serio: Serial port pts0 [ 662.771918][ T98] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 663.086030][ T98] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 663.086460][ T98] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 663.088120][ T98] usb 1-1: New USB device found, idVendor=1020, idProduct=0006, bcdDevice= 0.00 [ 663.088616][ T98] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 663.093656][ T98] usb 1-1: config 0 descriptor?? [ 663.572527][ T98] belkin 0003:1020:0006.0002: item fetching failed at offset 2/5 [ 663.573253][ T98] belkin 0003:1020:0006.0002: parse failed [ 663.574407][ T98] belkin 0003:1020:0006.0002: probe with driver belkin failed with error -22 [ 663.907074][ T8] usb 1-1: USB disconnect, device number 4 [ 664.172449][ T7544] serio: Serial port pts0 [ 680.741743][ T7627] serio: Serial port pts0 [ 681.739064][ T31] audit: type=1400 audit(681.680:232): avc: denied { accept } for pid=7629 comm="syz.0.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 682.721882][ T7640] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1251'. [ 682.736283][ T31] audit: type=1400 audit(682.680:233): avc: denied { connect } for pid=7638 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 686.974917][ T31] audit: type=1400 audit(686.920:234): avc: denied { rename } for pid=7659 comm="syz.0.1257" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 688.415077][ T7682] serio: Serial port pts0 [ 696.407417][ T7727] serio: Serial port pts0 [ 701.712323][ T7738] serio: Serial port pts0 [ 714.738497][ T7803] serio: Serial port pts0 [ 717.132183][ T7822] serio: Serial port pts0 [ 721.443328][ T7853] serio: Serial port pts0 [ 725.332381][ T31] audit: type=1400 audit(725.260:235): avc: denied { write } for pid=7881 comm="syz.0.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 725.478758][ T31] audit: type=1400 audit(725.420:236): avc: denied { getopt } for pid=7884 comm="syz.0.1326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 730.302191][ T7911] serio: Serial port pts0 [ 734.525230][ T7934] serio: Serial port pts0 [ 736.313302][ T7949] serio: Serial port pts0 [ 738.214662][ T7974] serio: Serial port pts0 [ 738.290913][ T7977] serio: Serial port pts1 [ 741.863935][ T7996] serio: Serial port pts1 [ 748.553343][ T8014] serio: Serial port pts1 [ 753.006567][ T8029] serio: Serial port pts1 [ 760.204662][ T8077] serio: Serial port pts0 [ 761.828301][ T8093] serio: Serial port pts1 [ 774.988101][ T8133] serio: Serial port pts0 [ 776.745350][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 779.702943][ T8164] serio: Serial port pts0 [ 780.787070][ T8170] can: request_module (can-proto-0) failed. [ 785.149799][ T31] audit: type=1400 audit(785.090:237): avc: denied { execute_no_trans } for pid=8199 comm="syz.0.1415" path="/710/file1" dev="tmpfs" ino=3958 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 785.699975][ T31] audit: type=1400 audit(785.640:238): avc: denied { read } for pid=8213 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 785.759328][ T8216] serio: Serial port pts0 [ 793.668273][ T8239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8239 comm=syz.1.1425 [ 793.775032][ T8243] serio: Serial port pts0 [ 806.875772][ T8275] serio: Serial port pts1 [ 816.917506][ T31] audit: type=1400 audit(816.860:239): avc: denied { map } for pid=8325 comm="syz.1.1447" path="socket:[15833]" dev="sockfs" ino=15833 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 824.468034][ T8371] serio: Serial port pts0 [ 840.490621][ T8386] fuse: root generation should be zero [ 841.025882][ T8394] serio: Serial port pts0 [ 847.156709][ T31] audit: type=1400 audit(847.100:240): avc: denied { accept } for pid=8431 comm="syz.0.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 847.160787][ T31] audit: type=1400 audit(847.100:241): avc: denied { read } for pid=8431 comm="syz.0.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 851.276301][ T8465] serio: Serial port pts2 [ 868.244923][ T8548] serio: Serial port pts0 [ 883.048508][ T31] audit: type=1400 audit(882.990:242): avc: denied { mounton } for pid=8614 comm="syz.1.1522" path="/763/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 891.819279][ T31] audit: type=1400 audit(891.760:243): avc: denied { bind } for pid=8682 comm="syz.0.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 891.899667][ T31] audit: type=1400 audit(891.840:244): avc: denied { mounton } for pid=8684 comm="syz.0.1543" path="/proc/2046/task" dev="proc" ino=16363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 895.306046][ T8714] serio: Serial port pts0 [ 900.403768][ T8737] serio: Serial port pts1 [ 900.472990][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 901.635218][ T8748] serio: Serial port pts0 [ 906.246254][ T8787] serio: Serial port pts0 [ 907.606232][ T31] audit: type=1326 audit(907.550:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8802 comm="syz.1.1574" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x0 [ 914.510539][ T31] audit: type=1400 audit(914.450:246): avc: denied { getattr } for pid=8828 comm="syz.0.1580" path="ipc:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 914.512894][ T8829] capability: warning: `syz.0.1580' uses deprecated v2 capabilities in a way that may be insecure [ 926.240079][ T8877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8877 comm=syz.0.1592 [ 926.247919][ T8877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8877 comm=syz.0.1592 [ 926.826358][ T8884] serio: Serial port pts0 [ 944.465972][ T31] audit: type=1400 audit(944.410:247): avc: denied { ioctl } for pid=8971 comm="syz.0.1614" path="socket:[16980]" dev="sockfs" ino=16980 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 948.725954][ T31] audit: type=1400 audit(948.650:248): avc: denied { connect } for pid=9004 comm="syz.0.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 961.432643][ T9083] serio: Serial port pts0 [ 970.344900][ T9112] serio: Serial port pts0 [ 975.081637][ T3063] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 975.271734][ T3063] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 975.272254][ T3063] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 975.272836][ T3063] usb 2-1: New USB device found, idVendor=046d, idProduct=c086, bcdDevice= 0.00 [ 975.273194][ T3063] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 975.277011][ T3063] usb 2-1: config 0 descriptor?? [ 975.325488][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 975.716507][ T9131] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 975.718479][ T9131] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 975.747574][ T3063] usbhid 2-1:0.0: can't add hid device: -71 [ 975.747890][ T3063] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 975.750234][ T3063] usb 2-1: USB disconnect, device number 5 [ 980.076424][ T9184] serio: Serial port pts0 [ 984.408614][ T31] audit: type=1400 audit(984.350:249): avc: denied { getopt } for pid=9210 comm="syz.1.1673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 986.733295][ T9225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=9225 comm=syz.1.1676 [ 991.765005][ T9240] syz.1.1680 uses obsolete (PF_INET,SOCK_PACKET) [ 997.392122][ T9272] serio: Serial port pts0 [ 1004.774044][ T9306] EXT4-fs (vda): resizing filesystem from 262144 to 2 blocks [ 1004.774848][ T9306] EXT4-fs warning (device vda): ext4_resize_fs:2041: can't shrink FS - resize aborted [ 1014.381870][ T9366] serio: Serial port pts0 [ 1034.701696][ T5925] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1034.897395][ T5925] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1034.897813][ T5925] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1034.898036][ T5925] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 1034.898378][ T5925] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1034.898582][ T5925] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1034.900928][ T5925] usb 2-1: config 0 descriptor?? [ 1035.001396][ T9478] serio: Serial port pts0 [ 1035.338143][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.338523][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.338746][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.338966][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.339246][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.339474][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.339734][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.339966][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.340191][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.340417][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.340644][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.344029][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.344389][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.344624][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.344850][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.345085][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.345330][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.345600][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.345832][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.346064][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.346503][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.346854][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.347217][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.347494][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.347716][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.347925][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.348131][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.348384][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.348650][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.348943][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.349185][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.349477][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.349787][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.350096][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.350371][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.350823][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.351871][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.352320][ T5925] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 1035.353168][ T5925] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 1035.355616][ T5925] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.00 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1042.605006][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1045.556240][ T5812] usb 2-1: USB disconnect, device number 6 [ 1051.525924][ T31] audit: type=1400 audit(1051.460:250): avc: denied { setopt } for pid=9547 comm="syz.1.1754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1055.407482][ T31] audit: type=1400 audit(1055.350:251): avc: denied { setopt } for pid=9560 comm="syz.1.1757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1055.583090][ T9571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9571 comm=syz.0.1760 [ 1067.866606][ T31] audit: type=1400 audit(1067.810:252): avc: denied { connect } for pid=9668 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1068.517242][ T9678] serio: Serial port pts0 [ 1070.453477][ T9685] serio: Serial port pts1 [ 1084.012390][ T9741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9741 comm=syz.0.1808 [ 1099.912569][ T31] audit: type=1400 audit(1099.860:253): avc: denied { getattr } for pid=9839 comm="syz.0.1838" name="[io_uring]" dev="anon_inodefs" ino=20138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1102.026997][ T9846] serio: Serial port pts0 [ 1108.350785][ T9879] serio: Serial port pts1 [ 1123.369624][ T9938] serio: Serial port pts0 [ 1130.768655][ T9988] serio: Serial port pts1 [ 1133.703132][ T31] audit: type=1400 audit(1133.650:254): avc: denied { write } for pid=9998 comm="syz.1.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1153.189489][ T31] audit: type=1400 audit(1153.130:255): avc: denied { execute } for pid=10143 comm="syz.0.1923" path="/selinux/commit_pending_bools" dev="selinuxfs" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 1160.279054][T10192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10192 comm=syz.1.1932 [ 1166.262776][T10214] serio: Serial port pts0 [ 1168.635566][T10230] serio: Serial port pts0 [ 1174.005536][ T31] audit: type=1400 audit(1173.950:256): avc: denied { getopt } for pid=10253 comm="syz.0.1952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1175.544359][T10266] input: syz0 as /devices/virtual/input/input8 [ 1176.151599][ T5812] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1176.374519][ T5812] usb 1-1: Using ep0 maxpacket: 32 [ 1176.394169][ T5812] usb 1-1: config 0 has no interfaces? [ 1176.396102][ T5812] usb 1-1: New USB device found, idVendor=048d, idProduct=8595, bcdDevice= 0.00 [ 1176.398610][ T5812] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1176.451904][ T5812] usb 1-1: config 0 descriptor?? [ 1176.741553][ T5812] usb 1-1: USB disconnect, device number 5 [ 1179.776957][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1192.143899][ T31] audit: type=1400 audit(1192.090:257): avc: denied { name_bind } for pid=10404 comm="syz.1.1986" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1192.149668][ T31] audit: type=1400 audit(1192.090:258): avc: denied { map } for pid=10404 comm="syz.1.1986" path="socket:[20917]" dev="sockfs" ino=20917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1192.157119][ T31] audit: type=1400 audit(1192.100:259): avc: denied { read } for pid=10404 comm="syz.1.1986" path="socket:[20917]" dev="sockfs" ino=20917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1209.997235][ T31] audit: type=1400 audit(1209.940:260): avc: denied { getopt } for pid=10503 comm="syz.0.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1209.999035][ T31] audit: type=1400 audit(1209.940:261): avc: denied { write } for pid=10503 comm="syz.0.2011" path="socket:[21072]" dev="sockfs" ino=21072 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1215.131123][T10533] serio: Serial port pts0 [ 1221.216054][T10555] serio: Serial port pts1 [ 1233.323920][T10577] serio: Serial port pts0 [ 1252.819485][T10633] syz.1.2050 (10633): /proc/10632/oom_adj is deprecated, please use /proc/10632/oom_score_adj instead. [ 1252.862325][ T31] audit: type=1400 audit(1252.800:262): avc: denied { bind } for pid=10632 comm="syz.1.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1252.863899][ T31] audit: type=1400 audit(1252.800:263): avc: denied { node_bind } for pid=10632 comm="syz.1.2050" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1252.875337][ T31] audit: type=1400 audit(1252.810:264): avc: denied { watch } for pid=10632 comm="syz.1.2050" path="/1002" dev="tmpfs" ino=5526 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1254.105001][ T31] audit: type=1400 audit(1254.040:265): avc: denied { create } for pid=10638 comm="syz.1.2052" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1254.106221][ T31] audit: type=1400 audit(1254.050:266): avc: denied { link } for pid=10638 comm="syz.1.2052" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=5541 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1259.785759][ T31] audit: type=1400 audit(1259.730:267): avc: denied { connect } for pid=10643 comm="syz.0.2054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1259.786645][ T31] audit: type=1400 audit(1259.730:268): avc: denied { name_connect } for pid=10643 comm="syz.0.2054" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1262.024937][ T31] audit: type=1400 audit(1261.970:269): avc: denied { create } for pid=10654 comm="syz.0.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1263.995829][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1276.588839][T10737] serio: Serial port pts0 [ 1287.423983][T10799] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10799 comm=syz.1.2101 [ 1289.455744][ T31] audit: type=1400 audit(1289.400:270): avc: denied { accept } for pid=10813 comm="syz.0.2104" lport=55860 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1289.649778][ T31] audit: type=1400 audit(1289.590:271): avc: denied { write } for pid=10813 comm="syz.0.2104" lport=55860 faddr=fc00:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1311.071457][T10920] serio: Serial port pts0 [ 1333.401592][T11025] serio: Serial port pts0 [ 1337.618355][ T31] audit: type=1400 audit(1337.560:272): avc: denied { setattr } for pid=11040 comm="syz.1.2170" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1345.624177][ T31] audit: type=1400 audit(1345.570:273): avc: denied { mounton } for pid=11099 comm="syz.0.2188" path="/1107/file0" dev="ramfs" ino=23969 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 1346.896507][T11105] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2190'. [ 1346.915929][T11105] vxcan1: entered promiscuous mode [ 1347.371492][ T31] audit: type=1400 audit(1347.310:274): avc: denied { read } for pid=11110 comm="syz.1.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1347.473902][T11112] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11112 comm=syz.0.2190 [ 1347.476323][ T31] audit: type=1400 audit(1347.420:275): avc: denied { read } for pid=11104 comm="syz.0.2190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1347.478092][T11112] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2190'. [ 1367.256185][T11233] input: syz0 as /devices/virtual/input/input9 [ 1370.429180][T10407] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1370.634976][T10407] usb 2-1: Using ep0 maxpacket: 32 [ 1370.655169][T10407] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1370.655478][T10407] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1370.655741][T10407] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1370.655966][T10407] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 1370.656278][T10407] usb 2-1: New USB device found, idVendor=1b96, idProduct=9f0a, bcdDevice= 0.15 [ 1370.656493][T10407] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1370.658593][T10407] usb 2-1: config 0 descriptor?? [ 1371.133887][T10407] hid-generic 0003:1B96:9F0A.0004: hidraw0: USB HID v0.00 Device [HID 1b96:9f0a] on usb-dummy_hcd.1-1/input0 [ 1373.283471][T10995] usb 2-1: USB disconnect, device number 7 [ 1373.641814][T11270] serio: Serial port pts0 [ 1385.323998][T11301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11301 comm=syz.1.2250 [ 1385.326085][T11301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=11301 comm=syz.1.2250 [ 1395.622577][ T31] audit: type=1400 audit(1395.570:276): avc: denied { bind } for pid=11331 comm="syz.1.2260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1397.282035][ T31] audit: type=1400 audit(1397.220:277): avc: denied { mounton } for pid=11338 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1397.887378][ T31] audit: type=1400 audit(1397.830:278): avc: denied { lock } for pid=11342 comm="syz.1.2262" path="socket:[23235]" dev="sockfs" ino=23235 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1399.870935][T11338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1399.876487][T11338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1400.387308][T11338] hsr_slave_0: entered promiscuous mode [ 1400.389284][T11338] hsr_slave_1: entered promiscuous mode [ 1400.390122][T11338] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1400.390354][T11338] Cannot create hsr debugfs directory [ 1400.526332][T11338] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1400.558136][T11338] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1400.614074][T11338] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1400.674125][T11338] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1400.776385][T11338] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1400.802436][T11338] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1400.805769][T11338] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1400.808444][T11338] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1401.302062][T11338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1403.180040][T11338] veth0_vlan: entered promiscuous mode [ 1403.192220][T11338] veth1_vlan: entered promiscuous mode [ 1403.225627][T11338] veth0_macvtap: entered promiscuous mode [ 1403.230159][T11338] veth1_macvtap: entered promiscuous mode [ 1403.263231][T11338] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.263537][T11338] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.263739][T11338] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.263955][T11338] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.345649][ T31] audit: type=1400 audit(1403.290:279): avc: denied { mount } for pid=11338 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1404.066221][T11713] serio: Serial port pts0 [ 1413.341647][ T31] audit: type=1400 audit(1413.280:280): avc: denied { accept } for pid=11744 comm="syz.0.2277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1416.756809][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1417.328355][ T31] audit: type=1400 audit(1417.270:281): avc: denied { ioctl } for pid=11771 comm="syz.0.2286" path="socket:[23396]" dev="sockfs" ino=23396 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1424.197812][ T31] audit: type=1400 audit(1424.140:282): avc: denied { getattr } for pid=11806 comm="syz.1.2300" path="socket:[23499]" dev="sockfs" ino=23499 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1428.506240][ T7388] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1428.515467][ T7388] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1428.519722][ T7388] bond0 (unregistering): Released all slaves [ 1428.659266][ T7388] hsr_slave_0: left promiscuous mode [ 1428.660576][ T7388] hsr_slave_1: left promiscuous mode [ 1428.668144][ T7388] veth1_macvtap: left promiscuous mode [ 1428.668465][ T7388] veth0_macvtap: left promiscuous mode [ 1428.668696][ T7388] veth1_vlan: left promiscuous mode [ 1428.668853][ T7388] veth0_vlan: left promiscuous mode [ 1429.226369][ T31] audit: type=1400 audit(1429.170:283): avc: denied { connect } for pid=11840 comm="syz.0.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1429.228101][ T31] audit: type=1400 audit(1429.170:284): avc: denied { setopt } for pid=11840 comm="syz.0.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1429.230856][ T31] audit: type=1400 audit(1429.170:285): avc: denied { bind } for pid=11840 comm="syz.0.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1429.266913][ T31] audit: type=1400 audit(1429.210:286): avc: denied { write } for pid=11840 comm="syz.0.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1429.290206][ T31] audit: type=1400 audit(1429.230:287): avc: denied { remove_name } for pid=2923 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1429.290817][ T31] audit: type=1400 audit(1429.230:288): avc: denied { rename } for pid=2923 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1431.106598][T11848] serio: Serial port pts0 [ 1447.565829][T11927] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2338'. [ 1447.637487][T11927] vxcan3: entered promiscuous mode [ 1448.166297][T11932] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11932 comm=syz.1.2338 [ 1448.189039][T11932] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2338'. [ 1452.371296][ C0] sched: RT throttling activated [ 1477.650535][ T31] audit: type=1400 audit(1477.590:289): avc: denied { ioctl } for pid=12064 comm="syz.1.2378" path="socket:[25313]" dev="sockfs" ino=25313 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1488.456888][ T31] audit: type=1400 audit(1488.400:290): avc: denied { audit_write } for pid=12090 comm="syz.0.2385" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1491.267700][T12105] can: request_module (can-proto-0) failed. [ 1491.436342][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1494.335577][ T31] audit: type=1400 audit(1494.280:291): avc: denied { lock } for pid=12124 comm="syz.0.2396" path="socket:[25429]" dev="sockfs" ino=25429 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1499.171797][ T31] audit: type=1400 audit(1499.110:292): avc: denied { setopt } for pid=12149 comm="syz.0.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1530.771796][T12344] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1535.998725][ T31] audit: type=1400 audit(1535.940:293): avc: denied { setopt } for pid=12387 comm="syz.0.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1536.000989][ T31] audit: type=1400 audit(1535.940:294): avc: denied { ioctl } for pid=12387 comm="syz.0.2484" path="socket:[26842]" dev="sockfs" ino=26842 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1558.392782][ T31] audit: type=1400 audit(1558.340:295): avc: denied { map } for pid=12463 comm="syz.0.2508" path="pipe:[26503]" dev="pipefs" ino=26503 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1564.334059][ T3063] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1564.744725][ T3063] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1564.765858][ T3063] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1564.824606][ T3063] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1564.825180][ T3063] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1564.831620][ T3063] usb 2-1: config 0 descriptor?? [ 1565.293129][ T3063] usbhid 2-1:0.0: can't add hid device: -71 [ 1565.293550][ T3063] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1565.295162][ T3063] usb 2-1: USB disconnect, device number 8 [ 1569.798954][T12541] serio: Serial port pts0 [ 1578.639546][T12586] serio: Serial port pts0 [ 1587.511401][ T31] audit: type=1400 audit(1587.450:296): avc: denied { create } for pid=12623 comm="syz.0.2558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1602.215025][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1605.344084][T12713] serio: Serial port pts0 [ 1606.843582][T12719] can: request_module (can-proto-0) failed. [ 1632.216789][T12808] syz.0.2615 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1636.048850][T12828] serio: Serial port pts0 [ 1642.514014][ T31] audit: type=1400 audit(1642.460:297): avc: denied { rename } for pid=12864 comm="syz.1.2632" name="file1" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1659.591965][T12963] serio: Serial port pts0 [ 1662.446532][ T31] audit: type=1400 audit(1662.390:298): avc: denied { ioctl } for pid=12980 comm="syz.1.2669" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=28835 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1671.606623][T13006] netlink: 'syz.1.2678': attribute type 27 has an invalid length. [ 1674.716349][T13006] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1674.719792][T13006] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1674.722019][T13006] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1674.722287][T13006] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1674.932757][T13008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1675.293789][T13008] veth1_vlan: left promiscuous mode [ 1675.326635][T13008] veth0_vlan: left promiscuous mode [ 1675.332196][T13008] veth0_vlan: entered promiscuous mode [ 1675.370104][T13008] veth1_vlan: entered promiscuous mode [ 1675.421642][T13008] veth1_macvtap: left promiscuous mode [ 1675.426693][T13008] veth0_macvtap: left promiscuous mode [ 1675.432726][T13008] veth0_macvtap: entered promiscuous mode [ 1675.434003][T13008] veth1_macvtap: entered promiscuous mode [ 1675.465863][T13008] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.466535][T13008] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.467208][T13008] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.467825][T13008] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.531919][T13008] A link change request failed with some changes committed already. Interface tunl0.0 may have been left with an inconsistent configuration, please check. [ 1694.021907][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1705.141782][ T31] audit: type=1400 audit(1705.080:299): avc: denied { getopt } for pid=13151 comm="syz.0.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1705.143139][ T31] audit: type=1400 audit(1705.080:300): avc: denied { accept } for pid=13151 comm="syz.0.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1707.283490][ T31] audit: type=1400 audit(1707.230:301): avc: denied { getopt } for pid=13167 comm="syz.0.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1713.217082][ T31] audit: type=1400 audit(1713.160:302): avc: denied { remount } for pid=13193 comm="syz.0.2738" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1745.275027][T13372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13372 comm=syz.1.2808 [ 1745.284811][T13372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=13372 comm=syz.1.2808 [ 1746.104715][T13390] serio: Serial port pts0 [ 1763.068627][ T31] audit: type=1400 audit(1763.010:303): avc: denied { ioctl } for pid=13429 comm="syz.0.2827" path="socket:[29808]" dev="sockfs" ino=29808 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1780.394423][T13500] serio: Serial port pts0 [ 1785.351854][ T31] audit: type=1400 audit(1785.290:304): avc: denied { read } for pid=13511 comm="syz.1.2857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1788.501545][ T31] audit: type=1400 audit(1788.430:305): avc: denied { read } for pid=13537 comm="syz.0.2869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1799.173260][T13573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13573 comm=syz.1.2881 [ 1805.334832][ C0] Dead loop on virtual device ipvlan1, fix it urgently! [ 1805.336358][ T0] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 1805.337400][ T0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.11.0-rc4-syzkaller #0 [ 1805.337822][ T0] Hardware name: ARM-Versatile Express [ 1805.338257][ T0] Call trace: [ 1805.338515][ T0] [<81954fc0>] (dump_backtrace) from [<819550bc>] (show_stack+0x18/0x1c) [ 1805.340340][ T0] r7:00000000 r6:826228c4 r5:00000000 r4:8200be34 [ 1805.340855][ T0] [<819550a4>] (show_stack) from [<81972d90>] (dump_stack_lvl+0x54/0x7c) [ 1805.341541][ T0] [<81972d3c>] (dump_stack_lvl) from [<81972dd0>] (dump_stack+0x18/0x1c) [ 1805.342334][ T0] r5:00000000 r4:8286bd18 [ 1805.342644][ T0] [<81972db8>] (dump_stack) from [<81955b64>] (panic+0x120/0x358) [ 1805.343076][ T0] [<81955a44>] (panic) from [<81977674>] (__schedule+0xb68/0xb6c) [ 1805.343868][ T0] r3:57ac6e9d r2:8260015d r1:8200be34 r0:81fff564 [ 1805.344316][ T0] r7:824b9340 [ 1805.344619][ T0] [<81976b0c>] (__schedule) from [<81977990>] (schedule_idle+0x24/0x68) [ 1805.345203][ T0] r10:00000000 r9:00000000 r8:00000000 r7:8260c5fc r6:8261ae40 r5:8260c5d0 [ 1805.345586][ T0] r4:8261ae40 [ 1805.345790][ T0] [<8197796c>] (schedule_idle) from [<80297ff0>] (do_idle+0x19c/0x2cc) [ 1805.346225][ T0] r5:8260c5d0 r4:00000000 [ 1805.346502][ T0] [<80297e54>] (do_idle) from [<80298454>] (cpu_startup_entry+0x30/0x34) [ 1805.347023][ T0] r10:8261a970 r9:821293f0 r8:8260c580 r7:00000000 r6:deffc061 r5:82625864 [ 1805.347570][ T0] r4:000000ee [ 1805.347747][ T0] [<80298424>] (cpu_startup_entry) from [<819750e0>] (kernel_init+0x0/0x138) [ 1805.348286][ T0] [<81975000>] (rest_init) from [<82401398>] (start_kernel+0x75c/0x778) [ 1805.348837][ T0] [<82400c3c>] (start_kernel) from [<00000000>] (0x0) [ 1805.352240][ T0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:37:56 Registers: info registers vcpu 0 CPU#0 R00=0000000c R01=00000000 R02=00000000 R03=8261ae40 R04=00000007 R05=82601e48 R06=e92dd8f0 R07=82601da0 R08=00000001 R09=81ff6bd4 R10=82601da0 R11=82601e20 R12=00000006 R13=82601d94 R14=00000010 R15=8020c380 PSR=40000093 -Z-- A S svc32 s00=04000000 s01=00000000 d00=0000000004000000 s02=10000000 s03=ffe57bf4 d01=ffe57bf410000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=019886f1 s09=0002cca3 d04=0002cca3019886f1 s10=00000000 s11=00000000 d05=0000000000000000 s12=01caf7b3 s13=ff0edf22 d06=ff0edf2201caf7b3 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=fe000000 s17=f70df050 d08=f70df050fe000000 s18=8e000000 s19=0000c2fd d09=0000c2fd8e000000 s20=011ca144 s21=ff0edf25 d10=ff0edf25011ca144 s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=079886f1 s25=00000000 d12=00000000079886f1 s26=10000000 s27=ffe57bf4 d13=ffe57bf410000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=ff7adbc7 s33=ffd79674 d16=ffd79674ff7adbc7 s34=ffffffff s35=ffffffff d17=ffffffffffffffff s36=fe9168aa s37=0081a2ce d18=0081a2cefe9168aa s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=01247c55 s43=00000000 d21=0000000001247c55 s44=00000001 s45=00000000 d22=0000000000000001 s46=00617ec7 s47=00000000 d23=0000000000617ec7 s48=ff38e364 s49=f70df050 d24=f70df050ff38e364 s50=073c68c5 s51=00000000 d25=00000000073c68c5 s52=ffb6ad17 s53=ffde3328 d26=ffde3328ffb6ad17 s54=fef5fe12 s55=011a9b14 d27=011a9b14fef5fe12 s56=00e1cf08 s57=01c912ba d28=01c912ba00e1cf08 s58=00e4895d s59=fef5fe12 d29=fef5fe1200e4895d s60=0660e96c s61=ffe57bf4 d30=ffe57bf40660e96c s62=e25c1e2c s63=003f9c19 d31=003f9c19e25c1e2c FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000148 R01=7eb2fbf8 R02=00000004 R03=00000001 R04=0198c7c0 R05=76ff15a0 R06=7eb2fbf8 R07=7eb2fbf4 R08=76ec0e60 R09=76ff15a0 R10=76ec0e60 R11=76f9a21a R12=76ec0e78 R13=7eb2fb18 R14=76df6554 R15=76df6800 PSR=60000010 -ZC- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=76f9a21a s17=00000000 d08=0000000076f9a21a s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000