last executing test programs: 27.719589703s ago: executing program 1 (id=1277): prlimit64(0x0, 0x7, &(0x7f0000000140)={0x1, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) 27.453511927s ago: executing program 1 (id=1278): socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x8c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) 15.479659306s ago: executing program 1 (id=1283): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x4e9c0, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x5452, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) getdents64(r3, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x5421, &(0x7f0000000200)) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 12.914389377s ago: executing program 1 (id=1286): r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) pipe2$watch_queue(&(0x7f0000000080), 0xb82e336200000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000004200)) socket$unix(0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000c40)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r0, 0x5451, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_DEFRAG(r2, 0x5450, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 12.794903637s ago: executing program 1 (id=1287): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') fsetxattr$security_ima(r3, &(0x7f0000000180), &(0x7f0000000640)=ANY=[], 0x3d, 0x0) 12.719943724s ago: executing program 1 (id=1288): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000940)={0x84, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$EVIOCGMASK(r1, 0x5b03, 0x0) 639.388612ms ago: executing program 0 (id=1303): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000008c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000003c0)={0x38, r2, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'nicvf0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x38}}, 0x0) 428.428601ms ago: executing program 0 (id=1304): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10) shutdown(r0, 0x0) 379.379386ms ago: executing program 0 (id=1305): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x28, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x28}}, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80900000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x44, 0x7, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xffff5d70}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000008c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000003c0)={0x50, r4, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'nicvf0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'batadv_slave_0\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x50}}, 0x0) 117.419159ms ago: executing program 0 (id=1306): r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) pipe2$watch_queue(&(0x7f0000000080), 0xb82e336200000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r1}, 0x0) socket$unix(0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000c40)) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r0, 0x5451, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_DEFRAG(r3, 0x5450, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 17.108628ms ago: executing program 0 (id=1307): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) 0s ago: executing program 0 (id=1308): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r1 = userfaultfd(0x1) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) r2 = io_uring_setup(0x3eaf, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r1, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) kernel console output (not intermixed with test programs): [ 33.937928][ T31] audit: type=1400 audit(33.890:68): avc: denied { read write } for pid=3096 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.938649][ T31] audit: type=1400 audit(33.890:69): avc: denied { open } for pid=3096 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:24505' (ED25519) to the list of known hosts. [ 42.295301][ T31] audit: type=1400 audit(42.250:70): avc: denied { name_bind } for pid=3102 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 43.257784][ T31] audit: type=1400 audit(43.210:71): avc: denied { execute } for pid=3104 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 43.300383][ T31] audit: type=1400 audit(43.260:72): avc: denied { execute_no_trans } for pid=3104 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 46.860843][ T31] audit: type=1400 audit(46.820:73): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 46.862586][ T31] audit: type=1400 audit(46.820:74): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 46.870645][ T3104] cgroup: Unknown subsys name 'net' [ 46.875190][ T31] audit: type=1400 audit(46.830:75): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.061937][ T3104] cgroup: Unknown subsys name 'hugetlb' [ 47.062481][ T3104] cgroup: Unknown subsys name 'rlimit' [ 47.267807][ T31] audit: type=1400 audit(47.220:76): avc: denied { setattr } for pid=3104 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.268766][ T31] audit: type=1400 audit(47.230:77): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 47.269615][ T31] audit: type=1400 audit(47.230:78): avc: denied { mount } for pid=3104 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 47.427287][ T3106] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 47.430953][ T31] audit: type=1400 audit(47.390:79): avc: denied { relabelto } for pid=3106 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.431926][ T31] audit: type=1400 audit(47.390:80): avc: denied { write } for pid=3106 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 47.468167][ T31] audit: type=1400 audit(47.420:81): avc: denied { read } for pid=3104 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 47.468853][ T31] audit: type=1400 audit(47.420:82): avc: denied { open } for pid=3104 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 51.371919][ T3104] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 52.744324][ T31] audit: type=1400 audit(52.700:83): avc: denied { execmem } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.796174][ T31] audit: type=1400 audit(52.750:84): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 52.797141][ T31] audit: type=1400 audit(52.750:85): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 52.806627][ T31] audit: type=1400 audit(52.760:86): avc: denied { read } for pid=3109 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.807080][ T31] audit: type=1400 audit(52.760:87): avc: denied { open } for pid=3109 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.813375][ T31] audit: type=1400 audit(52.770:88): avc: denied { mounton } for pid=3109 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 52.827390][ T31] audit: type=1400 audit(52.780:89): avc: denied { module_request } for pid=3109 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 52.877044][ T31] audit: type=1400 audit(52.830:90): avc: denied { sys_module } for pid=3109 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 53.394805][ T31] audit: type=1400 audit(53.350:91): avc: denied { ioctl } for pid=3110 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.082717][ T3109] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.100040][ T3109] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.125530][ T3110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.140290][ T3110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.640585][ T3109] hsr_slave_0: entered promiscuous mode [ 54.643150][ T3109] hsr_slave_1: entered promiscuous mode [ 54.741742][ T3110] hsr_slave_0: entered promiscuous mode [ 54.743051][ T3110] hsr_slave_1: entered promiscuous mode [ 54.743726][ T3110] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 54.743940][ T3110] Cannot create hsr debugfs directory [ 54.909370][ T31] audit: type=1400 audit(54.870:92): avc: denied { create } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 54.918223][ T3109] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 54.924422][ T3109] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 54.929278][ T3109] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 54.932795][ T3109] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 54.979487][ T3110] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 54.983544][ T3110] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 54.991312][ T3110] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 54.995103][ T3110] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 55.424856][ T3109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.493359][ T3110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.183711][ T3109] veth0_vlan: entered promiscuous mode [ 57.192855][ T3109] veth1_vlan: entered promiscuous mode [ 57.222208][ T3109] veth0_macvtap: entered promiscuous mode [ 57.226453][ T3109] veth1_macvtap: entered promiscuous mode [ 57.255744][ T3109] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.256157][ T3109] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.256332][ T3109] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.256514][ T3109] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.458398][ T3110] veth0_vlan: entered promiscuous mode [ 57.474068][ T3110] veth1_vlan: entered promiscuous mode [ 57.506962][ T3110] veth0_macvtap: entered promiscuous mode [ 57.513212][ T3110] veth1_macvtap: entered promiscuous mode [ 57.544705][ T3110] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.545002][ T3110] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.545183][ T3110] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.545442][ T3110] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 57.816081][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 57.816170][ T31] audit: type=1400 audit(57.770:106): avc: denied { ioctl } for pid=3795 comm="syz.0.5" path="net:[4026532751]" dev="nsfs" ino=4026532751 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.924372][ T31] audit: type=1400 audit(57.880:107): avc: denied { bind } for pid=3800 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 58.462159][ T3803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3803 comm=syz.1.8 [ 61.376549][ T31] audit: type=1400 audit(61.330:108): avc: denied { name_bind } for pid=3819 comm="syz.0.15" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.377299][ T31] audit: type=1400 audit(61.330:109): avc: denied { node_bind } for pid=3819 comm="syz.0.15" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.138506][ T31] audit: type=1400 audit(63.090:110): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 63.349931][ T31] audit: type=1400 audit(63.310:111): avc: denied { create } for pid=3838 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 63.822040][ T31] audit: type=1400 audit(63.780:112): avc: denied { name_bind } for pid=3844 comm="syz.0.26" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 63.826507][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 63.940838][ T31] audit: type=1400 audit(63.900:113): avc: denied { mounton } for pid=3848 comm="syz.0.28" path="/16/file0" dev="tmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 73.677329][ T31] audit: type=1400 audit(73.630:114): avc: denied { create } for pid=3908 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 74.806425][ T31] audit: type=1400 audit(74.760:115): avc: denied { create } for pid=3923 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 74.829363][ T31] audit: type=1400 audit(74.790:116): avc: denied { setopt } for pid=3923 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 75.366113][ T3924] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 75.366654][ T3924] syz.0.57: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 75.371287][ T3924] CPU: 0 UID: 0 PID: 3924 Comm: syz.0.57 Not tainted 6.11.0-rc5-syzkaller #0 [ 75.371646][ T3924] Hardware name: ARM-Versatile Express [ 75.371908][ T3924] Call trace: [ 75.372154][ T3924] [<81955560>] (dump_backtrace) from [<8195565c>] (show_stack+0x18/0x1c) [ 75.372970][ T3924] r7:ff800000 r6:82024e04 r5:60000013 r4:8200be6c [ 75.373165][ T3924] [<81955644>] (show_stack) from [<8197335c>] (dump_stack_lvl+0x70/0x7c) [ 75.373375][ T3924] [<819732ec>] (dump_stack_lvl) from [<81973380>] (dump_stack+0x18/0x1c) [ 75.373581][ T3924] r5:8420b000 r4:00000000 [ 75.373707][ T3924] [<81973368>] (dump_stack) from [<804b2fbc>] (warn_alloc+0xd8/0x178) [ 75.373982][ T3924] [<804b2ee4>] (warn_alloc) from [<804aa184>] (__vmalloc_node_range_noprof+0xcc/0x56c) [ 75.374205][ T3924] r3:20000000 r2:82024e04 [ 75.374327][ T3924] r6:00000dc0 r5:00000001 r4:20000000 [ 75.374468][ T3924] [<804aa0b8>] (__vmalloc_node_range_noprof) from [<80461694>] (__kvmalloc_node_noprof+0xc0/0x110) [ 75.374840][ T3924] r10:ea859d00 r9:848b3000 r8:815fe878 r7:ffffffff r6:00000dc0 r5:20000000 [ 75.375153][ T3924] r4:00000000 [ 75.375307][ T3924] [<804615d4>] (__kvmalloc_node_noprof) from [<815fe878>] (xt_alloc_entry_offsets+0x24/0x30) [ 75.375551][ T3924] r8:b5403587 r7:00000000 r6:20000360 r5:848b3040 r4:08000000 [ 75.375744][ T3924] [<815fe854>] (xt_alloc_entry_offsets) from [<816b717c>] (translate_table+0x70/0x78c) [ 75.375965][ T3924] [<816b710c>] (translate_table) from [<816b8338>] (do_replace+0xe8/0x5a0) [ 75.376199][ T3924] r10:00000126 r9:848b3040 r8:b5403587 r7:00000238 r6:20000360 r5:848b3000 [ 75.376396][ T3924] r4:84850000 [ 75.376479][ T3924] [<816b8250>] (do_replace) from [<816b8924>] (do_ipt_set_ctl+0x134/0x2a0) [ 75.376704][ T3924] r10:00000126 r9:8144c780 r8:848f0440 r7:00000298 r6:ea859da8 r5:845a1740 [ 75.376897][ T3924] r4:00000040 [ 75.376986][ T3924] [<816b87f0>] (do_ipt_set_ctl) from [<8158c370>] (nf_setsockopt+0x60/0x7c) [ 75.377226][ T3924] r10:00000126 r9:8144c780 r8:848f0440 r7:00000298 r6:845a1740 r5:816b87f0 [ 75.377626][ T3924] r4:827deda0 [ 75.377762][ T3924] [<8158c314>] (nf_setsockopt) from [<81624514>] (ip_setsockopt+0x88/0x98) [ 75.378126][ T3924] r6:845a1740 r5:00000298 r4:00000040 [ 75.378290][ T3924] [<81624490>] (ip_setsockopt) from [<81633f88>] (tcp_setsockopt+0x3c/0x58) [ 75.378617][ T3924] r6:00000000 r5:848f0000 r4:8162448c [ 75.378766][ T3924] [<81633f50>] (tcp_setsockopt) from [<8144c7b8>] (sock_common_setsockopt+0x38/0x40) [ 75.379080][ T3924] r4:81633f4c [ 75.379198][ T3924] [<8144c784>] (sock_common_setsockopt) from [<8185fd30>] (smc_setsockopt+0xa8/0x3c8) [ 75.379520][ T3924] r4:00000040 [ 75.379626][ T3924] [<8185fc8c>] (smc_setsockopt) from [<81447dd4>] (do_sock_setsockopt+0xb0/0x17c) [ 75.379890][ T3924] r9:8420b000 r8:8020029c r7:00000000 r6:85016f00 r5:00000000 r4:8185fc88 [ 75.380099][ T3924] [<81447d24>] (do_sock_setsockopt) from [<8144b2d4>] (sys_setsockopt+0x78/0xbc) [ 75.380493][ T3924] r6:85016f00 r5:00000040 r4:00000000 [ 75.380657][ T3924] [<8144b25c>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 75.381032][ T3924] Exception stack(0xea859fa8 to 0xea859ff0) [ 75.381383][ T3924] 9fa0: 00000298 00000000 00000003 00000000 00000040 20000300 [ 75.381621][ T3924] 9fc0: 00000298 00000000 002762f8 00000126 00000000 00006364 003d0f00 76b7b0bc [ 75.381855][ T3924] 9fe0: 76b7aec0 76b7aeb0 000189a0 00132d80 [ 75.382092][ T3924] r7:00000126 r6:002762f8 r5:00000000 r4:00000298 [ 75.383398][ T3924] Mem-Info: [ 75.383894][ T3924] active_anon:1616 inactive_anon:0 isolated_anon:0 [ 75.383894][ T3924] active_file:4704 inactive_file:34230 isolated_file:0 [ 75.383894][ T3924] unevictable:768 dirty:36 writeback:0 [ 75.383894][ T3924] slab_reclaimable:952 slab_unreclaimable:5055 [ 75.383894][ T3924] mapped:1867 shmem:1364 pagetables:199 [ 75.383894][ T3924] sec_pagetables:0 bounce:0 [ 75.383894][ T3924] kernel_misc_reclaimable:0 [ 75.383894][ T3924] free:438103 free_pcp:842 free_cma:4032 [ 75.384881][ T3924] Node 0 active_anon:6464kB inactive_anon:0kB active_file:18816kB inactive_file:136920kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:7468kB dirty:144kB writeback:0kB shmem:5456kB writeback_tmp:0kB kernel_stack:1440kB pagetables:796kB sec_pagetables:0kB all_unreclaimable? no [ 75.385781][ T3924] Normal free:1394292kB boost:0kB min:4780kB low:6208kB high:7636kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:560kB unevictable:0kB writepending:80kB present:1556480kB managed:1430076kB mlocked:0kB bounce:0kB free_pcp:3368kB local_pcp:2216kB free_cma:0kB [ 75.386522][ T3924] lowmem_reserve[]: 0 4224 0 [ 75.386789][ T3924] Normal: 3*4kB (UME) 1*8kB (U) 2*16kB (ME) 0*32kB 1*64kB (M) 2*128kB (UM) 5*256kB (M) 6*512kB (ME) 5*1024kB (ME) 4*2048kB (UME) 336*4096kB (M) = 1394292kB [ 75.394162][ T3924] 40298 total pagecache pages [ 75.394552][ T3924] 0 pages in swap cache [ 75.394733][ T3924] Free swap = 124996kB [ 75.394911][ T3924] Total swap = 124996kB [ 75.395110][ T3924] 524288 pages RAM [ 75.395263][ T3924] 135168 pages HighMem/MovableOnly [ 75.395427][ T3924] 31601 pages reserved [ 75.395522][ T3924] 4096 pages cma reserved [ 75.471707][ T3928] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 75.474813][ T31] audit: type=1400 audit(75.430:117): avc: denied { write } for pid=3927 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 75.476971][ T31] audit: type=1400 audit(75.430:118): avc: denied { ioctl } for pid=3927 comm="syz.0.58" path="socket:[3415]" dev="sockfs" ino=3415 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 75.537765][ T31] audit: type=1400 audit(75.490:119): avc: denied { create } for pid=3929 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 75.538474][ T31] audit: type=1400 audit(75.490:120): avc: denied { write } for pid=3929 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 75.704983][ T31] audit: type=1400 audit(75.660:121): avc: denied { map_create } for pid=3933 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.274147][ T3959] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 78.801030][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 78.801084][ T31] audit: type=1400 audit(78.760:131): avc: denied { setopt } for pid=3970 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 78.809576][ T31] audit: type=1400 audit(78.770:132): avc: denied { setopt } for pid=3970 comm="syz.1.68" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 78.832554][ T31] audit: type=1400 audit(78.790:133): avc: denied { write } for pid=3970 comm="syz.1.68" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 79.279320][ T31] audit: type=1400 audit(79.210:134): avc: denied { ioctl } for pid=3982 comm="syz.1.74" path="socket:[3505]" dev="sockfs" ino=3505 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 79.943844][ T31] audit: type=1400 audit(79.900:135): avc: denied { create } for pid=3996 comm="syz.1.79" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.387992][ T31] audit: type=1400 audit(80.340:136): avc: denied { map } for pid=4006 comm="syz.0.82" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.389078][ T31] audit: type=1400 audit(80.340:137): avc: denied { read write } for pid=4006 comm="syz.0.82" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.462041][ T31] audit: type=1400 audit(80.420:138): avc: denied { create } for pid=4006 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 80.467803][ T31] audit: type=1400 audit(80.420:139): avc: denied { setopt } for pid=4006 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 80.622780][ T31] audit: type=1400 audit(80.580:140): avc: denied { audit_write } for pid=4009 comm="syz.1.83" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.750235][ T4007] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.230233][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 87.230330][ T31] audit: type=1400 audit(87.190:149): avc: denied { connect } for pid=4068 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.907876][ T31] audit: type=1400 audit(89.860:150): avc: denied { read } for pid=4086 comm="syz.1.109" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.488537][ T31] audit: type=1400 audit(91.450:151): avc: denied { create } for pid=4100 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 91.489954][ T31] audit: type=1400 audit(91.450:152): avc: denied { write } for pid=4100 comm="syz.0.116" path="socket:[3632]" dev="sockfs" ino=3632 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.837819][ T31] audit: type=1400 audit(93.780:153): avc: denied { read } for pid=4131 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.224043][ T4142] syz.0.132[4142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.224316][ T4142] syz.0.132[4142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.328561][ T4003] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 95.561175][ T4003] usb 2-1: Using ep0 maxpacket: 16 [ 95.567600][ C0] hrtimer: interrupt took 2059648 ns [ 95.584632][ T4003] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 95.585125][ T4003] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 95.585425][ T4003] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 95.585687][ T4003] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 166 [ 95.585993][ T4003] usb 2-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 22 [ 95.606684][ T4003] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 95.606971][ T4003] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 95.607198][ T4003] usb 2-1: SerialNumber: syz [ 95.625736][ T4149] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 95.640045][ T4003] cdc_acm 2-1:1.0: Control and data interfaces are not separated! [ 95.641765][ T4003] cdc_acm 2-1:1.0: probe with driver cdc_acm failed with error -12 [ 95.878280][ T4003] usb 2-1: USB disconnect, device number 2 [ 96.539513][ T4003] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 96.754276][ T4003] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 96.754648][ T4003] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 96.756120][ T4003] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 96.777757][ T4003] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 96.791161][ T4003] usb 2-1: config 0 descriptor?? [ 97.395680][ T4003] cp2112 0003:10C4:EA90.0001: item fetching failed at offset 5/7 [ 97.413030][ T4003] cp2112 0003:10C4:EA90.0001: parse failed [ 97.428316][ T4003] cp2112 0003:10C4:EA90.0001: probe with driver cp2112 failed with error -22 [ 97.582911][ T4003] usb 2-1: USB disconnect, device number 3 [ 110.449491][ T1613] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 110.628876][ T1613] usb 2-1: Using ep0 maxpacket: 16 [ 110.651568][ T1613] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 110.665249][ T1613] usb 2-1: New USB device found, idVendor=045e, idProduct=0721, bcdDevice=90.c4 [ 110.665921][ T1613] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 110.666264][ T1613] usb 2-1: Product: syz [ 110.666479][ T1613] usb 2-1: Manufacturer: syz [ 110.666717][ T1613] usb 2-1: SerialNumber: syz [ 110.676353][ T1613] usb 2-1: config 0 descriptor?? [ 118.698065][ T4003] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 118.878525][ T4003] usb 1-1: Using ep0 maxpacket: 16 [ 118.898454][ T4003] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 118.898962][ T4003] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 118.899239][ T4003] usb 1-1: Product: syz [ 118.899417][ T4003] usb 1-1: Manufacturer: syz [ 118.899597][ T4003] usb 1-1: SerialNumber: syz [ 118.907756][ T4003] r8152-cfgselector 1-1: Unknown version 0x0000 [ 118.908081][ T4003] r8152-cfgselector 1-1: config 0 descriptor?? [ 119.146020][ T4003] r8152-cfgselector 1-1: Unknown version 0x0000 [ 119.146828][ T4003] r8152-cfgselector 1-1: bad CDC descriptors [ 119.155150][ T4003] r8152-cfgselector 1-1: USB disconnect, device number 2 [ 121.038040][ T4003] usb 2-1: USB disconnect, device number 4 [ 131.761924][ T31] audit: type=1400 audit(131.720:154): avc: denied { create } for pid=4245 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 131.763539][ T31] audit: type=1400 audit(131.720:155): avc: denied { write } for pid=4245 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 131.765524][ T31] audit: type=1400 audit(131.720:156): avc: denied { ioctl } for pid=4245 comm="syz.0.148" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2706 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 134.302673][ T4250] fuse: Unknown parameter 'froup_id' [ 149.107282][ T4272] pim6reg1: entered promiscuous mode [ 149.108865][ T4272] pim6reg1: entered allmulticast mode [ 150.154106][ T31] audit: type=1400 audit(150.110:157): avc: denied { create } for pid=4285 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 150.158037][ T31] audit: type=1400 audit(150.110:158): avc: denied { bind } for pid=4285 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 150.632945][ T31] audit: type=1400 audit(150.590:159): avc: denied { setopt } for pid=4285 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 150.646962][ T31] audit: type=1400 audit(150.600:160): avc: denied { accept } for pid=4285 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 154.073654][ T31] audit: type=1400 audit(154.030:161): avc: denied { create } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 154.077973][ T31] audit: type=1400 audit(154.030:162): avc: denied { bind } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 154.105276][ T31] audit: type=1400 audit(154.050:163): avc: denied { listen } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 154.106166][ T31] audit: type=1400 audit(154.060:164): avc: denied { connect } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 155.810153][ T31] audit: type=1400 audit(155.770:165): avc: denied { create } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 155.821688][ T31] audit: type=1400 audit(155.780:166): avc: denied { write } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 155.831054][ T31] audit: type=1400 audit(155.790:167): avc: denied { connect } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 155.836494][ T31] audit: type=1400 audit(155.790:168): avc: denied { name_connect } for pid=4301 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 156.368215][ T31] audit: type=1400 audit(156.320:169): avc: denied { shutdown } for pid=4301 comm="syz.1.166" lport=57716 faddr=2001::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.424085][ T31] audit: type=1400 audit(156.380:170): avc: denied { getopt } for pid=4301 comm="syz.1.166" lport=57716 faddr=2001::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 158.468242][ T4317] sit0: entered promiscuous mode [ 158.473678][ T4317] netlink: 'syz.1.172': attribute type 1 has an invalid length. [ 158.474093][ T4317] netlink: 1 bytes leftover after parsing attributes in process `syz.1.172'. [ 159.509491][ T31] audit: type=1400 audit(159.470:171): avc: denied { write } for pid=4325 comm="syz.1.176" path="socket:[2786]" dev="sockfs" ino=2786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 159.516230][ T31] audit: type=1400 audit(159.470:172): avc: denied { accept } for pid=4325 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 159.558488][ T31] audit: type=1400 audit(159.510:173): avc: denied { read } for pid=4325 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.041866][ T4328] netlink: 4 bytes leftover after parsing attributes in process `syz.1.177'. [ 162.822079][ T31] audit: type=1400 audit(162.780:174): avc: denied { create } for pid=4334 comm="syz.0.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 164.269227][ T31] audit: type=1400 audit(164.230:175): avc: denied { write } for pid=4355 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 168.530365][ T31] audit: type=1400 audit(168.490:176): avc: denied { setopt } for pid=4384 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 169.050496][ T31] audit: type=1400 audit(169.010:177): avc: denied { read } for pid=4384 comm="syz.0.198" lport=44713 faddr=::ffff:100.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 172.809605][ T31] audit: type=1400 audit(172.770:178): avc: denied { ioctl } for pid=4412 comm="syz.0.209" path="socket:[2910]" dev="sockfs" ino=2910 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 174.383396][ T31] audit: type=1400 audit(174.340:179): avc: denied { bind } for pid=4417 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 176.060952][ T31] audit: type=1400 audit(176.020:180): avc: denied { create } for pid=4423 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 179.291453][ T31] audit: type=1400 audit(179.250:181): avc: denied { setopt } for pid=4454 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 179.709287][ T4458] syz.0.225 uses obsolete (PF_INET,SOCK_PACKET) [ 180.279417][ T31] audit: type=1400 audit(180.230:182): avc: denied { create } for pid=4464 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 180.291748][ T31] audit: type=1400 audit(180.250:183): avc: denied { getopt } for pid=4464 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 181.698863][ T31] audit: type=1400 audit(181.660:184): avc: denied { create } for pid=4471 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 181.709531][ T31] audit: type=1400 audit(181.660:185): avc: denied { getopt } for pid=4471 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 187.196776][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 188.192428][ T31] audit: type=1326 audit(188.150:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.192933][ T31] audit: type=1326 audit(188.150:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.193459][ T31] audit: type=1326 audit(188.150:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.193794][ T31] audit: type=1326 audit(188.150:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.194138][ T31] audit: type=1326 audit(188.150:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.196138][ T31] audit: type=1326 audit(188.150:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.196527][ T31] audit: type=1326 audit(188.150:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132d80 code=0x7ffc0000 [ 188.199773][ T4510] netlink: 'syz.1.243': attribute type 2 has an invalid length. [ 188.200149][ T4510] netlink: 4 bytes leftover after parsing attributes in process `syz.1.243'. [ 188.201327][ T31] audit: type=1326 audit(188.160:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13543c code=0x7ffc0000 [ 188.201866][ T31] audit: type=1326 audit(188.160:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x135218 code=0x7ffc0000 [ 188.202277][ T31] audit: type=1326 audit(188.160:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x135138 code=0x7ffc0000 [ 188.271399][ T4513] netlink: 'syz.1.244': attribute type 2 has an invalid length. [ 188.271671][ T4513] netlink: 4 bytes leftover after parsing attributes in process `syz.1.244'. [ 188.346039][ T4516] netlink: 40 bytes leftover after parsing attributes in process `syz.1.245'. [ 188.346535][ T4516] Zero length message leads to an empty skb [ 188.437735][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 191.016568][ T4540] input: syz0 as /devices/virtual/input/input3 [ 192.629203][ T4549] ======================================================= [ 192.629203][ T4549] WARNING: The mand mount option has been deprecated and [ 192.629203][ T4549] and is ignored by this kernel. Remove the mand [ 192.629203][ T4549] option from the mount to silence this warning. [ 192.629203][ T4549] ======================================================= [ 195.395276][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 195.395333][ T31] audit: type=1400 audit(195.350:246): avc: denied { create } for pid=4562 comm="syz.1.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 204.296230][ T4623] syzkaller0: entered promiscuous mode [ 204.296547][ T4623] syzkaller0: entered allmulticast mode [ 204.322117][ T31] audit: type=1400 audit(204.280:247): avc: denied { relabelfrom } for pid=4622 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 204.322670][ T31] audit: type=1400 audit(204.280:248): avc: denied { relabelto } for pid=4622 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 205.094732][ T31] audit: type=1400 audit(205.050:249): avc: denied { bind } for pid=4638 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 205.112592][ T31] audit: type=1400 audit(205.060:250): avc: denied { name_bind } for pid=4638 comm="syz.1.288" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 205.138392][ T31] audit: type=1400 audit(205.060:251): avc: denied { node_bind } for pid=4638 comm="syz.1.288" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 206.089540][ T31] audit: type=1400 audit(206.040:252): avc: denied { nlmsg_write } for pid=4630 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 206.497571][ C0] sched: RT throttling activated [ 209.968053][ T31] audit: type=1400 audit(209.920:253): avc: denied { ioctl } for pid=4662 comm="syz.0.292" path="socket:[4352]" dev="sockfs" ino=4352 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 220.651982][ T31] audit: type=1400 audit(220.610:254): avc: denied { write } for pid=4672 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 221.307817][ T718] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 221.491664][ T718] usb 1-1: config 0 contains an unexpected descriptor of type 0x1, skipping [ 221.491944][ T718] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 221.492183][ T718] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 221.497724][ T718] usb 1-1: New USB device found, idVendor=468c, idProduct=90ea, bcdDevice=99.6d [ 221.498000][ T718] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 221.498175][ T718] usb 1-1: Product: syz [ 221.498310][ T718] usb 1-1: Manufacturer: syz [ 221.498417][ T718] usb 1-1: SerialNumber: syz [ 221.510743][ T718] usb 1-1: config 0 descriptor?? [ 231.773607][ T4035] usb 1-1: USB disconnect, device number 3 [ 231.899626][ T31] audit: type=1400 audit(231.860:255): avc: denied { setopt } for pid=4705 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 246.249343][ T31] audit: type=1400 audit(246.210:256): avc: denied { getopt } for pid=4812 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 249.485347][ T31] audit: type=1400 audit(249.440:257): avc: denied { ioctl } for pid=4833 comm="syz.0.354" path="socket:[4640]" dev="sockfs" ino=4640 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 250.095278][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 254.032187][ T31] audit: type=1400 audit(253.990:258): avc: denied { create } for pid=4904 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 255.304172][ T4925] fuse: Bad value for 'fd' [ 255.499395][ T4938] fuse: Bad value for 'fd' [ 255.660890][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::1]:20002. Sending cookies. [ 256.875400][ T4949] fuse: Bad value for 'fd' [ 257.462267][ T31] audit: type=1400 audit(257.420:259): avc: denied { read } for pid=4950 comm="syz.0.404" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 257.463581][ T31] audit: type=1400 audit(257.420:260): avc: denied { open } for pid=4950 comm="syz.0.404" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 257.465861][ T31] audit: type=1400 audit(257.420:261): avc: denied { ioctl } for pid=4950 comm="syz.0.404" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 265.735055][ T31] audit: type=1400 audit(265.690:262): avc: denied { write } for pid=5070 comm="syz.0.452" name="protocols" dev="proc" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 272.633284][ T5125] fuse: Bad value for 'group_id' [ 272.633612][ T5125] fuse: Bad value for 'group_id' [ 273.996499][ T5139] fuse: Bad value for 'group_id' [ 273.997098][ T5139] fuse: Bad value for 'group_id' [ 275.549276][ T5153] fuse: Bad value for 'group_id' [ 275.551192][ T5153] fuse: Bad value for 'group_id' [ 299.892544][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 301.088528][ T31] audit: type=1400 audit(301.040:263): avc: denied { connect } for pid=5388 comm="syz.1.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 315.682655][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 320.534821][ T31] audit: type=1400 audit(320.490:264): avc: denied { getopt } for pid=5524 comm="syz.1.633" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 324.087037][ T31] audit: type=1400 audit(324.040:265): avc: denied { execute } for pid=5541 comm="syz.0.640" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 332.100152][ T5620] fuse: Bad value for 'fd' [ 332.863469][ T5630] fuse: Bad value for 'fd' [ 335.554606][ T5666] fuse: Bad value for 'fd' [ 336.552734][ T5678] fuse: Unknown parameter '00000000000000000003' [ 337.728646][ T5694] fuse: Unknown parameter '00000000000000000003' [ 339.689673][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::1]:20002. Sending cookies. [ 345.175621][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::1]:20002. Sending cookies. [ 363.581782][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 377.270707][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 386.533578][ T31] audit: type=1400 audit(386.490:266): avc: denied { mount } for pid=6036 comm="syz.1.825" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 386.535893][ T31] audit: type=1400 audit(386.490:267): avc: denied { mounton } for pid=6036 comm="syz.1.825" path="/430/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 386.557783][ T31] audit: type=1400 audit(386.510:268): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 394.516707][ T6116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=269 sclass=netlink_route_socket pid=6116 comm=syz.0.859 [ 405.203347][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 421.363789][ T31] audit: type=1400 audit(421.320:269): avc: denied { setattr } for pid=6290 comm="syz.0.923" name="RAW" dev="sockfs" ino=9072 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 431.151867][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 431.309241][ T31] audit: type=1400 audit(431.270:270): avc: denied { getattr } for pid=6365 comm="syz.0.954" name="/" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 432.934593][ T31] audit: type=1400 audit(432.890:271): avc: denied { remount } for pid=6384 comm="syz.0.962" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 450.051529][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 454.842934][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 461.252430][ T31] audit: type=1400 audit(461.210:272): avc: denied { write } for pid=6616 comm="syz.1.1058" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 503.863034][ T1069] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 503.924037][ T1069] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 503.980238][ T1069] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.014912][ T1069] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.264209][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 504.271795][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 504.274565][ T1069] bond0 (unregistering): Released all slaves [ 504.393574][ T1069] hsr_slave_0: left promiscuous mode [ 504.395259][ T1069] hsr_slave_1: left promiscuous mode [ 504.400646][ T1069] veth1_macvtap: left promiscuous mode [ 504.401040][ T1069] veth0_macvtap: left promiscuous mode [ 504.401388][ T1069] veth1_vlan: left promiscuous mode [ 504.401663][ T1069] veth0_vlan: left promiscuous mode [ 505.639609][ T6947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 505.650579][ T6947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 506.459589][ T6947] hsr_slave_0: entered promiscuous mode [ 506.462227][ T6947] hsr_slave_1: entered promiscuous mode [ 506.965538][ T6947] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 506.979580][ T6947] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 506.984498][ T6947] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 506.991710][ T6947] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 507.721663][ T6947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.408781][ T6947] veth0_vlan: entered promiscuous mode [ 510.421234][ T6947] veth1_vlan: entered promiscuous mode [ 510.464635][ T6947] veth0_macvtap: entered promiscuous mode [ 510.471934][ T6947] veth1_macvtap: entered promiscuous mode [ 510.505019][ T6947] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.505437][ T6947] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.505701][ T6947] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.505854][ T6947] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.931953][ T5663] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 511.973723][ T5663] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 512.040492][ T5663] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 512.084709][ T5663] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 512.284050][ T5663] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 512.288894][ T5663] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 512.293444][ T5663] bond0 (unregistering): Released all slaves [ 512.427005][ T5663] hsr_slave_0: left promiscuous mode [ 512.429448][ T5663] hsr_slave_1: left promiscuous mode [ 512.441010][ T5663] veth1_macvtap: left promiscuous mode [ 512.441504][ T5663] veth0_macvtap: left promiscuous mode [ 512.441957][ T5663] veth1_vlan: left promiscuous mode [ 512.442337][ T5663] veth0_vlan: left promiscuous mode [ 513.449528][ T7385] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 513.460377][ T7385] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 514.242547][ T7385] hsr_slave_0: entered promiscuous mode [ 514.244714][ T7385] hsr_slave_1: entered promiscuous mode [ 514.245681][ T7385] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 514.245978][ T7385] Cannot create hsr debugfs directory [ 514.774304][ T7385] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 514.785460][ T7385] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 514.808755][ T7385] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 514.828409][ T7385] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 515.476255][ T7385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 517.887908][ T7807] netlink: 'syz.0.1211': attribute type 4 has an invalid length. [ 517.888259][ T7807] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1211'. [ 517.900211][ T7807] A link change request failed with some changes committed already. Interface veth1_vlan may have been left with an inconsistent configuration, please check. [ 517.922715][ T7807] netlink: 'syz.0.1211': attribute type 33 has an invalid length. [ 518.933246][ T7385] veth0_vlan: entered promiscuous mode [ 519.003501][ T7385] veth1_vlan: entered promiscuous mode [ 519.166994][ T7385] veth0_macvtap: entered promiscuous mode [ 519.220866][ T7385] veth1_macvtap: entered promiscuous mode [ 519.333858][ T7385] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 519.334326][ T7385] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 519.334670][ T7385] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 519.335019][ T7385] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 522.170068][ T31] audit: type=1400 audit(522.130:273): avc: denied { nlmsg_read } for pid=7827 comm="syz.0.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 522.192293][ T31] audit: type=1400 audit(522.150:274): avc: denied { read } for pid=7827 comm="syz.0.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 529.658511][ T24] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 529.858950][ T24] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 529.859479][ T24] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 529.859811][ T24] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 529.860087][ T24] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 529.886093][ T24] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 529.886445][ T24] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 529.886620][ T24] usb 2-1: Manufacturer: syz [ 529.894526][ T24] usb 2-1: config 0 descriptor?? [ 530.317243][ T24] appleir 0003:05AC:8243.0002: unknown main item tag 0x0 [ 530.329455][ T24] appleir 0003:05AC:8243.0002: No inputs registered, leaving [ 530.372693][ T24] appleir 0003:05AC:8243.0002: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 530.791171][ T24] usb 2-1: USB disconnect, device number 5 [ 537.073760][ T7901] netlink: 165 bytes leftover after parsing attributes in process `syz.1.1228'. [ 542.117675][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 543.328440][ T31] audit: type=1400 audit(543.290:275): avc: denied { create } for pid=7925 comm="syz.0.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 543.350777][ T31] audit: type=1400 audit(543.310:276): avc: denied { connect } for pid=7925 comm="syz.0.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 544.461693][ T7930] netlink: 104 bytes leftover after parsing attributes in process `syz.0.1238'. [ 562.818020][ T31] audit: type=1400 audit(562.770:277): avc: denied { recv } for pid=3104 comm="syz-executor" saddr=127.0.0.1 src=33978 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 562.868689][ T31] audit: type=1400 audit(562.830:278): avc: denied { recv } for pid=7953 comm="syz.1.1245" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33978 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 562.897440][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 562.938570][ T31] audit: type=1400 audit(562.900:279): avc: denied { bind } for pid=7954 comm="syz.0.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 563.153508][ T31] audit: type=1400 audit(563.110:280): avc: denied { bind } for pid=7958 comm="syz.0.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 566.185615][ T7975] ip_vti0: entered promiscuous mode [ 566.186183][ T7975] vlan2: entered promiscuous mode [ 566.186708][ T7975] vlan2: entered allmulticast mode [ 566.187192][ T7975] ip_vti0: entered allmulticast mode [ 566.207721][ T7975] ip_vti0: left allmulticast mode [ 566.208471][ T7975] ip_vti0: left promiscuous mode [ 568.245097][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 568.955687][ T31] audit: type=1400 audit(568.910:281): avc: denied { connect } for pid=7988 comm="syz.0.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 571.786940][ T7995] netlink: 'syz.1.1257': attribute type 4 has an invalid length. [ 571.796720][ T7995] netlink: 'syz.1.1257': attribute type 4 has an invalid length. [ 576.845644][ T8011] capability: warning: `syz.1.1262' uses 32-bit capabilities (legacy support in use) [ 585.479072][ T31] audit: type=1400 audit(585.430:282): avc: denied { mounton } for pid=8038 comm="syz.0.1271" path="/33/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 602.703583][ T31] audit: type=1400 audit(602.660:283): avc: denied { mounton } for pid=8086 comm="syz.1.1287" path="/proc/120/task" dev="proc" ino=14382 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 603.027890][ T4117] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 603.207844][ T4117] usb 2-1: Using ep0 maxpacket: 8 [ 603.212342][ T4117] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 603.212680][ T4117] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 603.212880][ T4117] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 603.213094][ T4117] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 603.213312][ T4117] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 603.213616][ T4117] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 603.213798][ T4117] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 603.423836][ T4117] usb 2-1: usb_control_msg returned -32 [ 603.424124][ T4117] usbtmc 2-1:16.0: can't read capabilities [ 610.613191][ T31] audit: type=1400 audit(610.570:284): avc: denied { bind } for pid=8121 comm="syz.0.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 610.615583][ T31] audit: type=1400 audit(610.570:285): avc: denied { name_bind } for pid=8121 comm="syz.0.1298" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 610.616332][ T31] audit: type=1400 audit(610.570:286): avc: denied { node_bind } for pid=8121 comm="syz.0.1298" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 610.623695][ T31] audit: type=1400 audit(610.580:287): avc: denied { name_connect } for pid=8121 comm="syz.0.1298" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 615.096859][ T31] audit: type=1400 audit(615.050:288): avc: denied { create } for pid=8146 comm="syz.0.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 615.100209][ T31] audit: type=1400 audit(615.060:289): avc: denied { write } for pid=8146 comm="syz.0.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 615.104436][ T31] audit: type=1400 audit(615.060:290): avc: denied { setopt } for pid=8146 comm="syz.0.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 615.728686][ T8156] ------------[ cut here ]------------ [ 615.729025][ T8156] WARNING: CPU: 0 PID: 8156 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 615.729766][ T8156] Modules linked in: [ 615.731484][ T8156] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 615.732082][ T8156] CPU: 0 UID: 0 PID: 8156 Comm: syz.0.1308 Not tainted 6.11.0-rc5-syzkaller #0 [ 615.732581][ T8156] Hardware name: ARM-Versatile Express [ 615.732882][ T8156] Call trace: [ 615.733615][ T8156] [<81955560>] (dump_backtrace) from [<8195565c>] (show_stack+0x18/0x1c) [ 615.734571][ T8156] r7:00000000 r6:826228c4 r5:00000000 r4:8200be6c [ 615.735041][ T8156] [<81955644>] (show_stack) from [<81973340>] (dump_stack_lvl+0x54/0x7c) [ 615.735468][ T8156] [<819732ec>] (dump_stack_lvl) from [<81973380>] (dump_stack+0x18/0x1c) [ 615.735929][ T8156] r5:00000000 r4:8286bd18 [ 615.736142][ T8156] [<81973368>] (dump_stack) from [<81956104>] (panic+0x120/0x368) [ 615.736531][ T8156] [<81955fe4>] (panic) from [<80242204>] (get_taint+0x0/0x1c) [ 615.736877][ T8156] r3:8260c5c4 r2:00000001 r1:81ff4690 r0:81ffc468 [ 615.737036][ T8156] r7:804817b8 [ 615.737136][ T8156] [<80242190>] (check_panic_on_warn) from [<80242358>] (__warn+0x7c/0x180) [ 615.737317][ T8156] [<802422dc>] (__warn) from [<802425d4>] (warn_slowpath_fmt+0x178/0x1f4) [ 615.737770][ T8156] r8:00000009 r7:820239a0 r6:dfa39d14 r5:8420c800 r4:00000000 [ 615.738131][ T8156] [<80242460>] (warn_slowpath_fmt) from [<804817b8>] (kunmap_local_indexed+0x20c/0x224) [ 615.738482][ T8156] r10:ffefd0a8 r9:84996100 r8:20508000 r7:fffffffe r6:00000003 r5:8420c800 [ 615.738827][ T8156] r4:ffefd000 [ 615.738966][ T8156] [<804815ac>] (kunmap_local_indexed) from [<804f1598>] (move_pages+0x7e8/0x14a0) [ 615.739240][ T8156] r7:fffffffe r6:00000000 r5:84e92810 r4:ffefb840 [ 615.739406][ T8156] [<804f0db0>] (move_pages) from [<8056c574>] (userfaultfd_ioctl+0x1260/0x2314) [ 615.739648][ T8156] r10:20c16000 r9:dfa39e98 r8:20000080 r7:84996100 r6:00000001 r5:00000000 [ 615.739900][ T8156] r4:855d0000 [ 615.740001][ T8156] [<8056b314>] (userfaultfd_ioctl) from [<8051a47c>] (sys_ioctl+0x134/0xda4) [ 615.740303][ T8156] r10:8420c800 r9:00000003 r8:84a13b40 r7:20000080 r6:84a13b41 r5:00000000 [ 615.740613][ T8156] r4:c028aa05 [ 615.740745][ T8156] [<8051a348>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 615.741062][ T8156] Exception stack(0xdfa39fa8 to 0xdfa39ff0) [ 615.741312][ T8156] 9fa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 615.741562][ T8156] 9fc0: 00000000 00000000 002762f0 00000036 00000000 00006364 003d0f00 76b190bc [ 615.741795][ T8156] 9fe0: 76b18ec0 76b18eb0 000189a0 00132d80 [ 615.742032][ T8156] r10:00000036 r9:8420c800 r8:8020029c r7:00000036 r6:002762f0 r5:00000000 [ 615.742227][ T8156] r4:00000000 [ 615.743568][ T8156] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:10:26 Registers: info registers vcpu 0 CPU#0 R00=84228840 R01=00000033 R02=ebadb000 R03=ebadb018 R04=8286e460 R05=84228840 R06=809b38d8 R07=8286e47b R08=8286e458 R09=00000024 R10=60000093 R11=dfa39a8c R12=00000002 R13=dfa39a80 R14=8275265c R15=809b38e8 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=ddde78c0 R02=00035aae R03=00000001 R04=fc1770dd R05=00000008 R06=fc14162f R07=00000008 R08=ddddb300 R09=5a946d00 R10=ddddb300 R11=df869e6c R12=df869e70 R13=df869e50 R14=8030e9b0 R15=8120192c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000