last executing test programs: 1m41.27363322s ago: executing program 0 (id=1223): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)=':\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000440)}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$SNDCTL_DSP_NONBLOCK(r2, 0x500e, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r2) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x58, 0x80, 0xfffffc40, 0x24, @private1, @empty, 0x8, 0x7, 0x1, 0xf37}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x7800, 0x8, 0xb4, 0x7510, {{0x2b, 0x4, 0x2, 0x2a, 0xac, 0x64, 0x0, 0xdc, 0x4, 0x0, @private=0xb24, @dev={0xac, 0x14, 0x14, 0x23}, {[@end, @timestamp_addr={0x44, 0x44, 0xf, 0x1, 0xd, [{@loopback, 0x8c}, {@multicast2, 0x2}, {@broadcast}, {@remote, 0x6}, {@multicast2, 0x1ff}, {@rand_addr=0x64010100, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x56f}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}, @generic={0x0, 0x12, "d5d1f6cb1ab10a8cc5d4d5a42e58c420"}, @generic={0x89, 0xb, "0824c68cee465d718b"}, @lsrr={0x83, 0x23, 0x64, [@rand_addr=0x64010102, @remote, @private=0xa010100, @broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0x37}, @local, @local]}, @end, @generic={0x88, 0xc, "31d047702a29d1bfbf37"}]}}}}}) getsockopt$inet_mreqn(r2, 0x0, 0x2fadc68e76bcc412, &(0x7f0000000300)={@remote, @empty, 0x0}, &(0x7f0000000340)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x4, 0x77, 0x4, 0xfdc, 0x69, @private1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8000, 0x7800, 0x1ff, 0xf4f0}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r2, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f00000005c0)=ANY=[@ANYBLOB="20010000", @ANYRES16=r3, @ANYBLOB="000128bd7000fedbdf250700000038000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067726574617030000000000000000000080003000200000008000100", @ANYRES32=r4, @ANYBLOB="44000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002007866726d3000000000000000000000001400020073797a6b616c6c65723000000000000008000300000000003000018008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="14090000000000000065d6f707ba00eb9ad5e0101926df57c1c270a36ce6c96292f9a99bd170", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3000018008000100", @ANYRES32=0x0, @ANYBLOB="140002006c6f0000000000000000000000000000080003000200000008000300030000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x200040c4) bind$xdp(r2, &(0x7f0000000500)={0x2c, 0x8, r7, 0x8}, 0x10) 1m39.911225713s ago: executing program 0 (id=1231): openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x169802, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000000)=0x4) 1m39.698918214s ago: executing program 0 (id=1233): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000100)={0xc}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000200)={0xc}) ioctl$IOMMU_VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000240)={0x70, 0x0, 0x0, 0x0, {}, {{}, 0x0, 0x0, [{}]}}) 1m39.422145251s ago: executing program 0 (id=1234): ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, &(0x7f0000000080)={0xc}) ioctl$IOMMU_VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x9) 1m39.082536763s ago: executing program 0 (id=1237): openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x169802, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000000)=0x4) 1m38.829667548s ago: executing program 0 (id=1239): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@unspec, &(0x7f0000000340)=0x80) socketpair(0x11, 0xa, 0x9, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000008c0)) quotactl_fd$Q_GETINFO(r0, 0xffffffff80000501, 0x0, &(0x7f0000000900)) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x24000010) bind(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x808) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000090) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000001000)=0x900, 0x4) 53.06248385s ago: executing program 32 (id=1239): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@unspec, &(0x7f0000000340)=0x80) socketpair(0x11, 0xa, 0x9, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000008c0)) quotactl_fd$Q_GETINFO(r0, 0xffffffff80000501, 0x0, &(0x7f0000000900)) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x24000010) bind(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x808) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000090) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000001000)=0x900, 0x4) 46.429572045s ago: executing program 1 (id=1298): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, 0x0) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000200)={0xc, r1}) ioctl$IOMMU_VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000240)={0x70, 0x0, 0x0, 0x0, {}, {{}, 0x0, 0x0, [{}]}}) 46.256398661s ago: executing program 1 (id=1299): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x4, &(0x7f0000000100)={@multicast2, @broadcast}, &(0x7f0000000140)=0xc) r1 = socket$packet(0x11, 0x2, 0x300) syz_open_dev$sndpcmc(&(0x7f0000000180), 0x7, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r0) close(r1) accept4$inet6(r3, 0x0, 0x0, 0x41000) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000740), &(0x7f0000000780)=0x4) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000800)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), r2) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r4, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x54}, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20002801}, 0x40008c0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@private1}, 0x0, @in=@remote}}, &(0x7f0000000c00)=0xe8) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000c40)={0x6, 0x10000, {0x0, 0x5, 0x0, {0x3, 0x76}, {0x7, 0x3}, @rumble}, {0x52, 0xfff9, 0x2, {0x4, 0x8}, {0xfc00, 0x27a2}, @ramp={0x3, 0xfffc, {0xaec2, 0x101, 0xb2b, 0x5e4}}}}) write$P9_RSTAT(r3, &(0x7f0000000d00)={0x49, 0x7d, 0x1, {0x0, 0x42, 0x4, 0x8, {0x4, 0x3, 0x2}, 0x80000, 0x5, 0x6, 0x8, 0x6, 'veth0\x00', 0x0, '', 0x8, 'geneve0\x00', 0x1, '%'}}, 0x49) open_tree(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0x9000) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000f80)={0x0, 'macvtap0\x00', {0x2}, 0xb68c}) 45.859383s ago: executing program 1 (id=1300): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x4, &(0x7f0000000100)={@multicast2, @broadcast}, &(0x7f0000000140)=0xc) socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x54}, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20002801}, 0x40008c0) 45.65964779s ago: executing program 1 (id=1301): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, 0x0) ioctl$IOMMU_VFIO_SET_IOMMU(r0, 0x3b66, 0x3) 45.419633213s ago: executing program 1 (id=1302): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc}) ioctl$IOMMU_VFIO_IOAS$GET(r0, 0x3b88, &(0x7f0000000100)={0xc}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, 0x0) ioctl$IOMMU_VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000240)={0x70, 0x0, 0x0, 0x0, {}, {{}, 0x0, 0x0, [{}]}}) 45.219956352s ago: executing program 1 (id=1303): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x4, &(0x7f0000000100)={@multicast2, @broadcast}, &(0x7f0000000140)=0xc) r1 = socket$packet(0x11, 0x2, 0x300) syz_open_dev$sndpcmc(&(0x7f0000000180), 0x7, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r0) close(r1) accept4$inet6(r3, 0x0, 0x0, 0x41000) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000740), &(0x7f0000000780)=0x4) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000800)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), r2) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r4, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x54}, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20002801}, 0x40008c0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@private1}, 0x0, @in=@remote}}, &(0x7f0000000c00)=0xe8) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000c40)={0x6, 0x10000, {0x0, 0x5, 0x0, {0x3, 0x76}, {0x7, 0x3}, @rumble}, {0x52, 0xfff9, 0x2, {0x4, 0x8}, {0xfc00, 0x27a2}, @ramp={0x3, 0xfffc, {0xaec2, 0x101, 0xb2b, 0x5e4}}}}) write$P9_RSTAT(r3, &(0x7f0000000d00)={0x49, 0x7d, 0x1, {0x0, 0x42, 0x4, 0x8, {0x4, 0x3, 0x2}, 0x80000, 0x5, 0x6, 0x8, 0x6, 'veth0\x00', 0x0, '', 0x8, 'geneve0\x00', 0x1, '%'}}, 0x49) open_tree(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0x9000) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000f80)={0x0, 'macvtap0\x00', {0x2}, 0xb68c}) 0s ago: executing program 33 (id=1303): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x4, &(0x7f0000000100)={@multicast2, @broadcast}, &(0x7f0000000140)=0xc) r1 = socket$packet(0x11, 0x2, 0x300) syz_open_dev$sndpcmc(&(0x7f0000000180), 0x7, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r0) close(r1) accept4$inet6(r3, 0x0, 0x0, 0x41000) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000740), &(0x7f0000000780)=0x4) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000800)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc010}, 0x20040000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), r2) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r4, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x54}, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20002801}, 0x40008c0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@private1}, 0x0, @in=@remote}}, &(0x7f0000000c00)=0xe8) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000c40)={0x6, 0x10000, {0x0, 0x5, 0x0, {0x3, 0x76}, {0x7, 0x3}, @rumble}, {0x52, 0xfff9, 0x2, {0x4, 0x8}, {0xfc00, 0x27a2}, @ramp={0x3, 0xfffc, {0xaec2, 0x101, 0xb2b, 0x5e4}}}}) write$P9_RSTAT(r3, &(0x7f0000000d00)={0x49, 0x7d, 0x1, {0x0, 0x42, 0x4, 0x8, {0x4, 0x3, 0x2}, 0x80000, 0x5, 0x6, 0x8, 0x6, 'veth0\x00', 0x0, '', 0x8, 'geneve0\x00', 0x1, '%'}}, 0x49) open_tree(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0x9000) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000f80)={0x0, 'macvtap0\x00', {0x2}, 0xb68c}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:23692' (ED25519) to the list of known hosts. [ 125.653199][ T30] audit: type=1400 audit(125.450:58): avc: denied { name_bind } for pid=3295 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 126.031533][ T30] audit: type=1400 audit(125.830:59): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 126.042851][ T30] audit: type=1400 audit(125.840:60): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 129.783247][ T30] audit: type=1400 audit(129.580:61): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 129.789149][ T30] audit: type=1400 audit(129.590:62): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 129.828568][ T3297] cgroup: Unknown subsys name 'net' [ 129.850545][ T30] audit: type=1400 audit(129.650:63): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 130.240007][ T3297] cgroup: Unknown subsys name 'cpuset' [ 130.277770][ T3297] cgroup: Unknown subsys name 'rlimit' [ 130.704991][ T30] audit: type=1400 audit(130.500:64): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 130.710029][ T30] audit: type=1400 audit(130.510:65): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 130.712307][ T30] audit: type=1400 audit(130.510:66): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 131.037187][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 131.042803][ T30] audit: type=1400 audit(130.840:67): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.049505][ T30] audit: type=1400 audit(130.850:68): avc: denied { write } for pid=3299 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 131.110969][ T30] audit: type=1400 audit(130.910:69): avc: denied { read } for pid=3297 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.119914][ T30] audit: type=1400 audit(130.910:70): avc: denied { open } for pid=3297 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.148049][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 139.455517][ T30] audit: type=1400 audit(139.250:71): avc: denied { execmem } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 139.494514][ T30] audit: type=1400 audit(139.290:72): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.497376][ T30] audit: type=1400 audit(139.300:73): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.511272][ T30] audit: type=1400 audit(139.310:74): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 139.568570][ T30] audit: type=1400 audit(139.370:75): avc: denied { module_request } for pid=3303 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 139.694625][ T30] audit: type=1400 audit(139.490:76): avc: denied { sys_module } for pid=3302 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 143.778048][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 143.795413][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 144.159544][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 144.194241][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.632609][ T3303] hsr_slave_0: entered promiscuous mode [ 145.642925][ T3303] hsr_slave_1: entered promiscuous mode [ 146.260886][ T3302] hsr_slave_0: entered promiscuous mode [ 146.267464][ T3302] hsr_slave_1: entered promiscuous mode [ 146.270016][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 146.270692][ T3302] Cannot create hsr debugfs directory [ 147.718588][ T30] audit: type=1400 audit(147.520:77): avc: denied { create } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.739093][ T30] audit: type=1400 audit(147.540:78): avc: denied { write } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.739705][ T30] audit: type=1400 audit(147.540:79): avc: denied { read } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.757826][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 147.848974][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 147.912610][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 147.943164][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 148.262779][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 148.301297][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 148.321545][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 148.340519][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 149.497535][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.819454][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.972221][ T3303] veth0_vlan: entered promiscuous mode [ 155.037242][ T3303] veth1_vlan: entered promiscuous mode [ 155.232696][ T3303] veth0_macvtap: entered promiscuous mode [ 155.256368][ T3303] veth1_macvtap: entered promiscuous mode [ 155.429099][ T3302] veth0_vlan: entered promiscuous mode [ 155.526865][ T3302] veth1_vlan: entered promiscuous mode [ 155.559382][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.560286][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.560625][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.560934][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.895588][ T30] audit: type=1400 audit(155.690:80): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 155.923057][ T30] audit: type=1400 audit(155.720:81): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.9bzpSY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 155.928677][ T3302] veth0_macvtap: entered promiscuous mode [ 155.945940][ T30] audit: type=1400 audit(155.740:82): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 155.977203][ T30] audit: type=1400 audit(155.780:83): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.9bzpSY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 155.986680][ T30] audit: type=1400 audit(155.790:84): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.9bzpSY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3468 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 156.013325][ T3302] veth1_macvtap: entered promiscuous mode [ 156.021738][ T30] audit: type=1400 audit(155.820:85): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 156.041027][ T30] audit: type=1400 audit(155.840:86): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 156.054882][ T30] audit: type=1400 audit(155.850:87): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="gadgetfs" ino=3470 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 156.193107][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.193618][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.211611][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.216482][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.308035][ T30] audit: type=1400 audit(156.100:88): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 156.309919][ T30] audit: type=1400 audit(156.110:89): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 156.621155][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 159.407389][ T3457] serio: Serial port pts0 [ 161.441647][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 161.443231][ T30] audit: type=1400 audit(161.240:104): avc: denied { mounton } for pid=3476 comm="syz.1.15" path="/4/file0" dev="tmpfs" ino=42 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 171.121299][ T3509] ======================================================= [ 171.121299][ T3509] WARNING: The mand mount option has been deprecated and [ 171.121299][ T3509] and is ignored by this kernel. Remove the mand [ 171.121299][ T3509] option from the mount to silence this warning. [ 171.121299][ T3509] ======================================================= [ 171.138643][ T30] audit: type=1400 audit(170.940:105): avc: denied { name_bind } for pid=3508 comm="syz.0.27" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 171.140628][ T30] audit: type=1400 audit(170.940:106): avc: denied { node_bind } for pid=3508 comm="syz.0.27" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 171.197559][ T30] audit: type=1400 audit(171.000:107): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 171.816418][ T30] audit: type=1400 audit(171.600:108): avc: denied { write } for pid=3514 comm="syz.0.30" name="psched" dev="proc" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 175.863206][ T30] audit: type=1400 audit(175.660:109): avc: denied { allowed } for pid=3531 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 175.882010][ T30] audit: type=1400 audit(175.680:110): avc: denied { create } for pid=3531 comm="syz.0.37" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 176.469136][ T3532] Zero length message leads to an empty skb [ 179.741970][ T30] audit: type=1400 audit(179.540:111): avc: denied { watch watch_reads } for pid=3560 comm="syz.0.48" path="/proc/88" dev="proc" ino=4261 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 181.148607][ T30] audit: type=1400 audit(180.950:112): avc: denied { create } for pid=3569 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 181.152253][ T30] audit: type=1400 audit(180.950:113): avc: denied { setopt } for pid=3569 comm="syz.0.52" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 184.426083][ T3601] serio: Serial port pts0 [ 184.972561][ T3604] serio: Serial port pts1 [ 200.267411][ T3615] serio: Serial port pts0 [ 200.325789][ T30] audit: type=1400 audit(200.120:114): avc: denied { map } for pid=3614 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3846 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 200.326396][ T30] audit: type=1400 audit(200.120:115): avc: denied { read write } for pid=3614 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3846 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 201.695061][ T3622] serio: Serial port pts1 [ 216.976750][ T3651] serio: Serial port pts0 [ 228.328421][ T3661] serio: Serial port pts1 [ 233.194693][ T3676] serio: Serial port pts0 [ 244.639444][ T30] audit: type=1400 audit(244.440:116): avc: denied { write } for pid=3685 comm="syz.1.91" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 255.172532][ T3706] serio: Serial port pts0 [ 256.868512][ T3716] serio: Serial port pts1 [ 271.491813][ T3726] serio: Serial port pts0 [ 272.012412][ T3729] serio: Serial port pts1 [ 287.489702][ T3745] serio: Serial port pts0 [ 287.649577][ T3747] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 287.665131][ T30] audit: type=1400 audit(287.460:117): avc: denied { accept } for pid=3746 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.984441][ T30] audit: type=1400 audit(292.780:118): avc: denied { name_bind } for pid=3766 comm="syz.0.119" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 293.705182][ T3774] serio: Serial port pts0 [ 294.829719][ T30] audit: type=1400 audit(294.630:119): avc: denied { map_create } for pid=3785 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.840496][ T30] audit: type=1400 audit(294.640:120): avc: denied { map_read map_write } for pid=3785 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.846610][ T30] audit: type=1400 audit(294.650:121): avc: denied { ioctl } for pid=3785 comm="syz.1.127" path="socket:[5154]" dev="sockfs" ino=5154 ioctlcmd=0x8b24 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 298.802597][ T3823] netlink: 'syz.1.143': attribute type 12 has an invalid length. [ 299.353508][ T3823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3823 comm=syz.1.143 [ 299.591574][ T30] audit: type=1400 audit(299.390:122): avc: denied { mounton } for pid=3831 comm="syz.1.146" path="/59/file0" dev="tmpfs" ino=353 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 303.796263][ T3858] serio: Serial port pts0 [ 304.330887][ T30] audit: type=1400 audit(304.130:123): avc: denied { create } for pid=3857 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 304.346186][ T30] audit: type=1400 audit(304.150:124): avc: denied { write } for pid=3857 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 304.725445][ T3863] serio: Serial port pts1 [ 318.971672][ T3869] serio: Serial port pts0 [ 325.592622][ T3900] serio: Serial port pts0 [ 328.898254][ T3928] serio: Serial port pts1 [ 340.420073][ T30] audit: type=1326 audit(340.220:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3969 comm="syz.0.197" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb715bce8 code=0x0 [ 350.378958][ T30] audit: type=1400 audit(350.180:126): avc: denied { create } for pid=4009 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 350.395452][ T30] audit: type=1400 audit(350.190:127): avc: denied { setopt } for pid=4009 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 350.525856][ T30] audit: type=1400 audit(350.330:128): avc: denied { create } for pid=4010 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 350.545876][ T30] audit: type=1400 audit(350.350:129): avc: denied { ioctl } for pid=4010 comm="syz.1.214" path="socket:[5541]" dev="sockfs" ino=5541 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 350.815645][ T4015] syz.0.215 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 350.824537][ T30] audit: type=1400 audit(350.620:130): avc: denied { read } for pid=4014 comm="syz.0.215" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 350.825015][ T30] audit: type=1400 audit(350.620:131): avc: denied { open } for pid=4014 comm="syz.0.215" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 350.833287][ T30] audit: type=1400 audit(350.630:132): avc: denied { ioctl } for pid=4014 comm="syz.0.215" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 354.872887][ T4048] serio: Serial port pts0 [ 359.220159][ T4075] serio: Serial port pts1 [ 361.074683][ T4083] serio: Serial port pts0 [ 365.026582][ T4088] serio: Serial port pts1 [ 366.910686][ T4093] serio: Serial port pts0 [ 380.990126][ T30] audit: type=1326 audit(380.790:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4098 comm="syz.1.244" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5bce8 code=0x0 [ 382.314831][ T30] audit: type=1400 audit(382.110:134): avc: denied { create } for pid=4104 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 382.335157][ T30] audit: type=1400 audit(382.140:135): avc: denied { getopt } for pid=4104 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 382.798030][ T30] audit: type=1400 audit(382.600:136): avc: denied { setopt } for pid=4104 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 382.811565][ T30] audit: type=1400 audit(382.610:137): avc: denied { write } for pid=4104 comm="syz.0.246" path="socket:[5686]" dev="sockfs" ino=5686 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 384.350917][ T30] audit: type=1400 audit(384.150:138): avc: denied { read } for pid=4106 comm="syz.0.247" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 384.351553][ T30] audit: type=1400 audit(384.150:139): avc: denied { open } for pid=4106 comm="syz.0.247" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 384.357834][ T30] audit: type=1400 audit(384.160:140): avc: denied { read } for pid=3108 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 384.363006][ T30] audit: type=1400 audit(384.160:141): avc: denied { append } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 384.363496][ T30] audit: type=1400 audit(384.160:142): avc: denied { open } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 387.426496][ T4128] serio: Serial port pts0 [ 388.039818][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 388.044947][ T30] audit: type=1400 audit(387.840:144): avc: denied { block_suspend } for pid=4135 comm="syz.0.257" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 393.925055][ T4155] serio: Serial port pts1 [ 402.771902][ T30] audit: type=1400 audit(402.570:145): avc: denied { create } for pid=4162 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 405.725914][ T30] audit: type=1400 audit(405.530:146): avc: denied { create } for pid=4180 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 405.739706][ T30] audit: type=1400 audit(405.540:147): avc: denied { ioctl } for pid=4180 comm="syz.1.274" path="socket:[6325]" dev="sockfs" ino=6325 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 405.740322][ T30] audit: type=1400 audit(405.540:148): avc: denied { bind } for pid=4180 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 405.761556][ T30] audit: type=1400 audit(405.560:149): avc: denied { connect } for pid=4180 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 405.763467][ T30] audit: type=1400 audit(405.560:150): avc: denied { write } for pid=4180 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 405.788848][ T30] audit: type=1400 audit(405.590:151): avc: denied { read } for pid=4180 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 411.885923][ T4221] netlink: 4 bytes leftover after parsing attributes in process `syz.0.291'. [ 412.067684][ T4221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4221 comm=syz.0.291 [ 412.392226][ T4226] serio: Serial port pts0 [ 412.899635][ T4228] serio: Serial port pts1 [ 414.166752][ T4235] serio: Serial port pts0 [ 428.410361][ T4243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4243 comm=syz.1.297 [ 429.585817][ T4254] serio: Serial port pts0 [ 433.042595][ T4263] serio: Serial port pts1 [ 445.045197][ T4271] serio: Serial port pts0 [ 447.501552][ T4281] serio: Serial port pts0 [ 448.486960][ T4286] serio: Serial port pts1 [ 450.601662][ T30] audit: type=1400 audit(450.400:152): avc: denied { nlmsg_write } for pid=4303 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 452.849134][ T4318] serio: Serial port pts0 [ 466.786332][ T4329] serio: Serial port pts1 [ 468.023215][ T30] audit: type=1400 audit(467.820:153): avc: denied { sqpoll } for pid=4332 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 468.444602][ T4338] serio: Serial port pts0 [ 470.325668][ T4344] serio: Serial port pts0 [ 482.278290][ T4351] serio: Serial port pts1 [ 491.018735][ T4368] serio: Serial port pts0 [ 501.709771][ T4383] netlink: 4 bytes leftover after parsing attributes in process `syz.1.343'. [ 502.233556][ T4386] serio: Serial port pts1 [ 517.124842][ T4411] xt_bpf: check failed: parse error [ 520.777915][ T30] audit: type=1400 audit(520.580:154): avc: denied { read } for pid=4434 comm="syz.0.362" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 520.788453][ T30] audit: type=1400 audit(520.580:155): avc: denied { open } for pid=4434 comm="syz.0.362" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 521.321583][ T30] audit: type=1400 audit(521.120:156): avc: denied { ioctl } for pid=4434 comm="syz.0.362" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 522.335756][ T30] audit: type=1400 audit(522.130:157): avc: denied { create } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.366840][ T30] audit: type=1400 audit(522.170:158): avc: denied { bind } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.377902][ T30] audit: type=1400 audit(522.180:159): avc: denied { listen } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.387144][ T30] audit: type=1400 audit(522.190:160): avc: denied { connect } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.428835][ T30] audit: type=1400 audit(522.230:161): avc: denied { write } for pid=4440 comm="syz.1.364" path="socket:[7265]" dev="sockfs" ino=7265 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.471624][ T30] audit: type=1400 audit(522.270:162): avc: denied { accept } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.508331][ T30] audit: type=1400 audit(522.300:163): avc: denied { read } for pid=4440 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 523.454812][ T4453] serio: Serial port pts0 [ 529.078030][ T30] audit: type=1400 audit(528.880:164): avc: denied { write } for pid=4471 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 529.896266][ T30] audit: type=1400 audit(529.690:165): avc: denied { watch watch_reads } for pid=4474 comm="syz.0.377" path="/proc/555/net/udplite6" dev="proc" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 538.082488][ T4487] serio: Serial port pts1 [ 538.945020][ T4495] serio: Serial port pts0 [ 560.428445][ T30] audit: type=1400 audit(560.230:166): avc: denied { accept } for pid=4563 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 561.225739][ T4574] serio: Serial port pts0 [ 563.228233][ T4579] serio: Serial port pts0 [ 569.981208][ T4603] serio: Serial port pts1 [ 581.386959][ T30] audit: type=1400 audit(581.190:167): avc: denied { ioctl } for pid=4617 comm="syz.0.426" path="net:[4026532664]" dev="nsfs" ino=4026532664 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 584.494769][ T4632] serio: Serial port pts0 [ 588.502831][ T4643] serio: Serial port pts1 [ 603.678796][ T30] audit: type=1400 audit(603.480:168): avc: denied { execute } for pid=4660 comm="syz.0.439" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 604.209054][ T30] audit: type=1400 audit(604.010:169): avc: denied { ioctl } for pid=4660 comm="syz.0.439" path="socket:[7604]" dev="sockfs" ino=7604 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 606.851178][ T4678] serio: Serial port pts0 [ 608.247535][ T4688] serio: Serial port pts1 [ 612.753930][ C1] hrtimer: interrupt took 1000912 ns [ 623.551751][ T4703] serio: Serial port pts0 [ 638.767713][ T30] audit: type=1400 audit(638.570:170): avc: denied { mount } for pid=4736 comm="syz.1.462" name="/" dev="ramfs" ino=7743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 638.941008][ T30] audit: type=1400 audit(638.740:171): avc: denied { execute } for pid=4736 comm="syz.1.462" path="/file1" dev="ramfs" ino=7744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 641.880483][ T30] audit: type=1400 audit(641.680:172): avc: denied { write } for pid=4744 comm="syz.1.465" path="socket:[8259]" dev="sockfs" ino=8259 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 644.329582][ T30] audit: type=1400 audit(644.130:173): avc: denied { connect } for pid=4755 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 644.606757][ T4758] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 645.267732][ T4762] serio: Serial port pts0 [ 650.080264][ T30] audit: type=1400 audit(649.880:174): avc: denied { mounton } for pid=4787 comm="syz.0.481" path="/269/file0" dev="tmpfs" ino=1556 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 652.935714][ T30] audit: type=1400 audit(652.730:175): avc: denied { connect } for pid=4808 comm="syz.1.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 653.331171][ T4815] netlink: 4 bytes leftover after parsing attributes in process `syz.0.493'. [ 653.446484][ T30] audit: type=1400 audit(653.250:176): avc: denied { write } for pid=4808 comm="syz.1.491" path="socket:[8338]" dev="sockfs" ino=8338 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 654.922131][ T30] audit: type=1400 audit(654.720:177): avc: denied { ioctl } for pid=4825 comm="syz.0.496" path="socket:[8360]" dev="sockfs" ino=8360 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 655.005815][ T30] audit: type=1400 audit(654.810:178): avc: denied { ioctl } for pid=4808 comm="syz.1.491" path="socket:[8338]" dev="sockfs" ino=8338 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 657.835023][ T30] audit: type=1400 audit(657.630:179): avc: denied { create } for pid=4843 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 657.835599][ T30] audit: type=1400 audit(657.630:180): avc: denied { setopt } for pid=4843 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 657.991702][ T4846] serio: Serial port pts0 [ 659.944605][ T4861] serio: Serial port pts0 [ 662.412929][ T4875] serio: Serial port pts0 [ 669.778859][ T30] audit: type=1400 audit(669.580:181): avc: denied { write } for pid=4903 comm="syz.1.520" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 673.377749][ T4920] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 679.286827][ T30] audit: type=1400 audit(679.090:182): avc: denied { open } for pid=4937 comm="syz.0.532" path="/dev/ttyq5" dev="devtmpfs" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 680.402744][ T4943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=4943 comm=syz.1.534 [ 680.711600][ T30] audit: type=1400 audit(680.510:183): avc: denied { setopt } for pid=4947 comm="syz.0.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 680.968151][ C1] vcan0: j1939_tp_rxtimer: 0x0000000055e2f259: rx timeout, send abort [ 681.470232][ C1] vcan0: j1939_tp_rxtimer: 0x000000009256d19f: rx timeout, send abort [ 681.474994][ C1] vcan0: j1939_tp_rxtimer: 0x0000000055e2f259: abort rx timeout. Force session deactivation [ 681.971542][ C1] vcan0: j1939_tp_rxtimer: 0x000000009256d19f: abort rx timeout. Force session deactivation [ 683.803418][ T4967] serio: Serial port pts0 [ 684.391287][ T30] audit: type=1400 audit(684.190:184): avc: denied { read write } for pid=4970 comm="syz.0.544" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.399694][ T30] audit: type=1400 audit(684.190:185): avc: denied { open } for pid=4970 comm="syz.0.544" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.408781][ T30] audit: type=1400 audit(684.210:186): avc: denied { ioctl } for pid=4970 comm="syz.0.544" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.466080][ T4645] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 685.645735][ T4645] usb 1-1: Using ep0 maxpacket: 16 [ 685.705030][ T4645] usb 1-1: config 0 has an invalid interface number: 41 but max is 0 [ 685.705807][ T4645] usb 1-1: config 0 has no interface number 0 [ 685.706139][ T4645] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 685.706555][ T4645] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 685.706761][ T4645] usb 1-1: config 0 interface 41 has no altsetting 0 [ 685.748228][ T4645] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 685.748701][ T4645] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 685.749033][ T4645] usb 1-1: Product: syz [ 685.749184][ T4645] usb 1-1: Manufacturer: syz [ 685.749322][ T4645] usb 1-1: SerialNumber: syz [ 685.793261][ T4645] usb 1-1: config 0 descriptor?? [ 685.860361][ T4976] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 685.871228][ T4976] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 686.082220][ T4976] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 686.088238][ T4976] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 686.320439][ T4645] CoreChips 1-1:0.41 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 686.326468][ T4645] CoreChips 1-1:0.41: probe with driver CoreChips failed with error -71 [ 686.372936][ T4645] usb 1-1: USB disconnect, device number 2 [ 688.351726][ T4996] serio: Serial port pts0 [ 689.155680][ T30] audit: type=1400 audit(688.950:187): avc: denied { setopt } for pid=5004 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 690.389205][ T5019] serio: Serial port pts0 [ 696.397463][ T5045] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5045 comm=syz.0.569 [ 696.621787][ T5047] serio: Serial port pts0 [ 697.825360][ T30] audit: type=1400 audit(697.620:188): avc: denied { ioctl } for pid=5050 comm="syz.1.571" path="socket:[9267]" dev="sockfs" ino=9267 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 717.474299][ T30] audit: type=1400 audit(717.270:189): avc: denied { ioctl } for pid=5128 comm="syz.0.595" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=9417 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 718.441648][ T5144] serio: Serial port pts0 [ 721.925669][ T5164] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 721.930157][ T5164] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 725.715121][ T3394] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 725.912024][ T3394] usb 1-1: config 1 interface 0 altsetting 6 endpoint 0x81 has invalid maxpacket 1648, setting to 1024 [ 725.912597][ T3394] usb 1-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 16 [ 725.913043][ T3394] usb 1-1: config 1 interface 0 altsetting 6 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 725.913226][ T3394] usb 1-1: config 1 interface 0 has no altsetting 0 [ 725.949640][ T3394] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 725.950235][ T3394] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 725.950417][ T3394] usb 1-1: Product: Ь [ 725.950563][ T3394] usb 1-1: Manufacturer:  [ 725.950699][ T3394] usb 1-1: SerialNumber: 혅ɽȦੈ捧㐼첈椔䪠ᳩ镜縏뼸춠⯧䔃俨᳹౭黊鸽쵙끈둧폷୒壣掔᾿淉㧺㥯ⁿ윫覺쐜⮓繎㰗皍蔜馌秮皛峻괬媬霠싿擯靱芶頜臒㳓ꢜ剐᝟䚹慊㲯䭃迧⭞ힶ蟎ⵒ㙝Ảං鹚ӧ꫎䤫ⲩ렻躙ⅇ✟淿短疝뢤夶摺︀魒期蔷橰뇕왛殐㛽ꮁ땹 [ 726.016404][ T5175] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 726.040495][ T5175] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 726.061255][ T5175] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 726.370233][ T3394] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 726.456046][ T3394] usb 1-1: USB disconnect, device number 3 [ 726.670836][ T5180] serio: Serial port pts0 [ 741.808625][ T30] audit: type=1400 audit(741.610:190): avc: denied { create } for pid=5209 comm="syz.0.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 741.817149][ T30] audit: type=1400 audit(741.620:191): avc: denied { ioctl } for pid=5209 comm="syz.0.622" path="socket:[9563]" dev="sockfs" ino=9563 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 741.824555][ T30] audit: type=1400 audit(741.620:192): avc: denied { write } for pid=5209 comm="syz.0.622" path="socket:[9563]" dev="sockfs" ino=9563 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 741.867847][ T5210] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5210 comm=syz.0.622 [ 742.791436][ T5212] batadv_slave_1: entered promiscuous mode [ 742.798802][ T30] audit: type=1400 audit(742.600:193): avc: denied { create } for pid=5211 comm="syz.0.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 742.802050][ T30] audit: type=1400 audit(742.600:194): avc: denied { write } for pid=5211 comm="syz.0.623" path="socket:[9568]" dev="sockfs" ino=9568 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 742.808089][ T30] audit: type=1400 audit(742.610:195): avc: denied { nlmsg_read } for pid=5211 comm="syz.0.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 742.857371][ T5211] batadv_slave_1: left promiscuous mode [ 743.302728][ T30] audit: type=1400 audit(743.100:196): avc: denied { write } for pid=5214 comm="syz.0.624" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 743.314332][ T30] audit: type=1400 audit(743.110:197): avc: denied { setattr } for pid=5214 comm="syz.0.624" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 747.609719][ T30] audit: type=1400 audit(747.410:198): avc: denied { create } for pid=5238 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 747.628242][ T5239] 8021q: VLANs not supported on sit0 [ 747.628336][ T30] audit: type=1400 audit(747.430:199): avc: denied { ioctl } for pid=5238 comm="syz.1.633" path="socket:[9025]" dev="sockfs" ino=9025 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 748.584918][ T30] audit: type=1400 audit(748.380:200): avc: denied { accept } for pid=5243 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 748.785119][ T3436] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 748.944650][ T3436] usb 1-1: Using ep0 maxpacket: 16 [ 748.958785][ T3436] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 748.959266][ T3436] usb 1-1: config 1 has 0 interfaces, different from the descriptor's value: 11 [ 748.959644][ T3436] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77 [ 748.959809][ T3436] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 749.189497][ T30] audit: type=1400 audit(748.990:201): avc: denied { create } for pid=5247 comm="syz.0.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 749.196036][ T30] audit: type=1400 audit(749.000:202): avc: denied { bind } for pid=5247 comm="syz.0.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 749.238461][ T3390] usb 1-1: USB disconnect, device number 4 [ 750.362253][ T30] audit: type=1400 audit(750.160:203): avc: denied { create } for pid=5257 comm="syz.0.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 750.376214][ T30] audit: type=1400 audit(750.180:204): avc: denied { ioctl } for pid=5257 comm="syz.0.640" path="socket:[9644]" dev="sockfs" ino=9644 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 753.313494][ T30] audit: type=1400 audit(753.110:205): avc: denied { write } for pid=5265 comm="syz.0.644" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 759.161741][ T30] audit: type=1400 audit(758.960:206): avc: denied { read } for pid=5276 comm="syz.0.648" path="socket:[9679]" dev="sockfs" ino=9679 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 760.444938][ T5282] 8021q: VLANs not supported on gre0 [ 760.713482][ T30] audit: type=1400 audit(760.510:207): avc: denied { setattr } for pid=5283 comm="syz.0.650" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 763.604267][ T30] audit: type=1400 audit(763.400:208): avc: denied { create } for pid=5290 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 763.612821][ T30] audit: type=1400 audit(763.410:209): avc: denied { ioctl } for pid=5290 comm="syz.1.652" path="socket:[9689]" dev="sockfs" ino=9689 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 763.993466][ T30] audit: type=1400 audit(763.790:210): avc: denied { write } for pid=5290 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 764.211591][ T30] audit: type=1400 audit(764.010:211): avc: denied { read } for pid=5294 comm="syz.1.653" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 764.213588][ T30] audit: type=1400 audit(764.010:212): avc: denied { open } for pid=5294 comm="syz.1.653" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 764.306205][ T30] audit: type=1400 audit(764.110:213): avc: denied { ioctl } for pid=5294 comm="syz.1.653" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 764.884911][ T30] audit: type=1400 audit(764.690:214): avc: denied { append } for pid=5301 comm="syz.1.656" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 766.849655][ T30] audit: type=1400 audit(766.650:215): avc: denied { bind } for pid=5311 comm="syz.1.660" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 766.854970][ T30] audit: type=1400 audit(766.650:216): avc: denied { node_bind } for pid=5311 comm="syz.1.660" saddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 767.216824][ T5316] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 767.221525][ T5316] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 767.291422][ T30] audit: type=1400 audit(767.090:217): avc: denied { ioctl } for pid=5317 comm="syz.0.663" path="socket:[9164]" dev="sockfs" ino=9164 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 769.407026][ T30] audit: type=1400 audit(769.210:218): avc: denied { ioctl } for pid=5335 comm="syz.0.670" path="socket:[9771]" dev="sockfs" ino=9771 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 774.563191][ T5359] 8021q: VLANs not supported on ip_vti0 [ 774.567568][ T30] audit: type=1400 audit(774.370:219): avc: denied { read write } for pid=5358 comm="syz.1.679" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 774.570517][ T30] audit: type=1400 audit(774.370:220): avc: denied { open } for pid=5358 comm="syz.1.679" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 774.577256][ T30] audit: type=1400 audit(774.380:221): avc: denied { ioctl } for pid=5358 comm="syz.1.679" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 774.845022][ T5361] serio: Serial port pts0 [ 779.547868][ T30] audit: type=1400 audit(779.350:222): avc: denied { ioctl } for pid=5378 comm="syz.0.686" path="socket:[9833]" dev="sockfs" ino=9833 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 779.581656][ T30] audit: type=1400 audit(779.380:223): avc: denied { getopt } for pid=5378 comm="syz.0.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 779.582198][ T5379] 8021q: VLANs not supported on vxcan1 [ 793.939362][ T30] audit: type=1400 audit(793.740:224): avc: denied { listen } for pid=5406 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 794.317572][ T30] audit: type=1400 audit(794.120:225): avc: denied { ioctl } for pid=5406 comm="syz.1.697" path="socket:[9859]" dev="sockfs" ino=9859 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 807.587620][ T30] audit: type=1400 audit(807.390:226): avc: denied { append } for pid=5440 comm="syz.1.709" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 817.358007][ T30] audit: type=1400 audit(817.160:227): avc: denied { bind } for pid=5489 comm="syz.1.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 817.360415][ T30] audit: type=1400 audit(817.160:228): avc: denied { accept } for pid=5489 comm="syz.1.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 817.377611][ T30] audit: type=1400 audit(817.180:229): avc: denied { write } for pid=5489 comm="syz.1.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.531533][ T30] audit: type=1400 audit(820.330:230): avc: denied { read } for pid=5509 comm="syz.1.734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 830.132712][ T5556] 8021q: VLANs not supported on gre0 [ 841.897035][ T30] audit: type=1400 audit(841.700:231): avc: denied { audit_write } for pid=5580 comm="syz.0.757" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 847.960703][ T5598] serio: Serial port pts0 [ 892.965744][ T30] audit: type=1400 audit(892.770:232): avc: denied { setopt } for pid=5713 comm="syz.1.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 899.738224][ T30] audit: type=1400 audit(899.540:233): avc: denied { prog_run } for pid=5739 comm="syz.1.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 910.855261][ T30] audit: type=1400 audit(910.650:234): avc: denied { create } for pid=5773 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 913.372842][ T30] audit: type=1400 audit(913.140:235): avc: denied { create } for pid=5781 comm="syz.1.825" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 917.725809][ T30] audit: type=1400 audit(917.520:236): avc: denied { unlink } for pid=3303 comm="syz-executor" name="file0" dev="tmpfs" ino=2159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 930.211149][ T5852] 8021q: VLANs not supported on wg2 [ 931.065213][ T3436] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 931.250330][ T3436] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 931.251261][ T3436] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 931.303024][ T3436] usb 1-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.40 [ 931.303503][ T3436] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 931.306875][ T3436] usb 1-1: Product: 돏묃ﳟ峙欒뙌孶㆟⮔糏僥☓否曌㱡脥ᴐ艩Ĩ摞⤧᷏䞌䢷㘘ˑꬬ騰熺古撢㱅㯧ᖜ拊㍈ᾰ雙관㥬얓限腳옡瞪菶ꄊ퇁❗︖쪋읹ⓟ醝 [ 931.307215][ T3436] usb 1-1: SerialNumber: 偉幷ﬖ咄胦俿攤ᬮ浡儽喈̩摞ᐯ耵灧禥ﵸ栴餓昹튝ꝱ㙕銚›絘骷錺믕梠섔ﬞ㶪♚ḃ龍ꧻ蝀貀⍅薿㣷쯩旉凿臌絣幚ㅑἌ஭ዪ⫓㍂蹧Ƒ啠๴鱅ឨ釤猫⛟ꩳ䙊↙⢺녨券搟㩰硻䖹籈璶奵宔鉟 [ 931.340786][ T5860] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 932.211737][ T3436] usbhid 1-1:1.0: can't add hid device: -71 [ 932.212988][ T3436] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 932.245236][ T3436] usb 1-1: USB disconnect, device number 5 [ 955.127493][ T30] audit: type=1400 audit(954.930:237): avc: denied { create } for pid=5968 comm="syz.0.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 965.460634][ T30] audit: type=1400 audit(965.260:238): avc: denied { read write } for pid=6004 comm="syz.0.907" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 965.462717][ T30] audit: type=1400 audit(965.260:239): avc: denied { open } for pid=6004 comm="syz.0.907" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 965.476229][ T30] audit: type=1400 audit(965.280:240): avc: denied { ioctl } for pid=6004 comm="syz.0.907" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 965.496038][ T6005] input: syz0 as /devices/virtual/input/input1 [ 965.942415][ T30] audit: type=1400 audit(965.740:241): avc: denied { getopt } for pid=6008 comm="syz.1.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 965.950298][ T30] audit: type=1400 audit(965.750:242): avc: denied { write } for pid=6008 comm="syz.1.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 966.514629][ T6017] serio: Serial port pts0 [ 966.655610][ T6015] pimreg: entered allmulticast mode [ 969.839538][ T6032] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6032 comm=syz.1.915 [ 970.471512][ T6039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6039 comm=syz.1.917 [ 973.635982][ T6063] capability: warning: `syz.0.927' uses deprecated v2 capabilities in a way that may be insecure [ 974.486146][ T30] audit: type=1400 audit(974.230:243): avc: denied { lock } for pid=6064 comm="syz.1.928" path="socket:[12170]" dev="sockfs" ino=12170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 974.488768][ T30] audit: type=1400 audit(974.250:244): avc: denied { ioctl } for pid=6064 comm="syz.1.928" path="socket:[12171]" dev="sockfs" ino=12171 ioctlcmd=0x4160 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 977.552030][ T30] audit: type=1400 audit(977.350:245): avc: denied { ioctl } for pid=6078 comm="syz.0.933" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 977.833498][ T30] audit: type=1400 audit(977.630:246): avc: denied { append } for pid=6078 comm="syz.0.933" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 978.534833][ T30] audit: type=1400 audit(978.330:247): avc: denied { setattr } for pid=6089 comm="syz.0.938" name="rfkill" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:wireless_device_t tclass=chr_file permissive=1 [ 986.377816][ T30] audit: type=1326 audit(986.180:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6108 comm="syz.1.944" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9ed5bce8 code=0x0 [ 988.646012][ T30] audit: type=1400 audit(988.450:249): avc: denied { write } for pid=6129 comm="syz.1.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 991.688205][ T30] audit: type=1400 audit(991.490:250): avc: denied { nlmsg_write } for pid=6160 comm="syz.0.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1004.435529][ T6217] serio: Serial port pts0 [ 1010.480356][ T6246] serio: Serial port pts0 [ 1039.954241][ T6314] serio: Serial port pts0 [ 1059.122824][ T6331] serio: Serial port pts0 [ 1075.383018][ T30] audit: type=1400 audit(1075.180:251): avc: denied { accept } for pid=6346 comm="syz.1.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1085.555229][ T6401] serio: Serial port pts0 [ 1101.619013][ T6420] serio: Serial port pts0 [ 1108.281487][ T6440] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pid=6440 comm=syz.1.1063 [ 1118.133004][ T30] audit: type=1400 audit(1117.930:252): avc: denied { create } for pid=6474 comm="syz.0.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1118.149823][ T30] audit: type=1400 audit(1117.950:253): avc: denied { write } for pid=6474 comm="syz.0.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1118.156333][ T30] audit: type=1400 audit(1117.960:254): avc: denied { ioctl } for pid=6474 comm="syz.0.1074" path="socket:[12912]" dev="sockfs" ino=12912 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1118.171733][ T30] audit: type=1400 audit(1117.970:255): avc: denied { read } for pid=6474 comm="syz.0.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1121.348795][ T30] audit: type=1400 audit(1121.150:256): avc: denied { read } for pid=6488 comm="syz.0.1079" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1121.350786][ T30] audit: type=1400 audit(1121.150:257): avc: denied { open } for pid=6488 comm="syz.0.1079" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1124.295289][ T30] audit: type=1400 audit(1124.050:258): avc: denied { map } for pid=6504 comm="syz.1.1084" path="socket:[12952]" dev="sockfs" ino=12952 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1129.437828][ T6530] process 'syz.1.1092' launched './file1' with NULL argv: empty string added [ 1129.440353][ T30] audit: type=1400 audit(1129.240:259): avc: denied { execute_no_trans } for pid=6529 comm="syz.1.1092" path="/530/file1" dev="tmpfs" ino=2956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1130.166820][ T30] audit: type=1400 audit(1129.970:260): avc: denied { read write } for pid=6537 comm="syz.0.1096" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.168690][ T30] audit: type=1400 audit(1129.970:261): avc: denied { open } for pid=6537 comm="syz.0.1096" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.189237][ T30] audit: type=1400 audit(1129.990:262): avc: denied { ioctl } for pid=6537 comm="syz.0.1096" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.571620][ T6542] 8021q: VLANs not supported on wg0 [ 1130.575696][ T30] audit: type=1400 audit(1130.380:263): avc: denied { map } for pid=6541 comm="syz.1.1098" path="socket:[12998]" dev="sockfs" ino=12998 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1130.578708][ T30] audit: type=1400 audit(1130.380:264): avc: denied { read } for pid=6541 comm="syz.1.1098" path="socket:[12998]" dev="sockfs" ino=12998 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1130.587617][ T30] audit: type=1400 audit(1130.390:265): avc: denied { getopt } for pid=6541 comm="syz.1.1098" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1139.764355][ T30] audit: type=1400 audit(1139.560:266): avc: denied { getopt } for pid=6592 comm="syz.1.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1139.985588][ T30] audit: type=1400 audit(1139.790:267): avc: denied { write } for pid=6592 comm="syz.1.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1144.979649][ T6632] 8021q: VLANs not supported on wg0 [ 1145.806108][ T6646] 8021q: VLANs not supported on wg0 [ 1146.349994][ T6655] 8021q: VLANs not supported on wg0 [ 1147.394380][ T6666] 8021q: VLANs not supported on wg0 [ 1149.498329][ T6686] lo speed is unknown, defaulting to 1000 [ 1149.502430][ T6686] lo speed is unknown, defaulting to 1000 [ 1149.537244][ T6686] lo speed is unknown, defaulting to 1000 [ 1149.610745][ T6686] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1149.659228][ T6686] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 1149.767944][ T6686] lo speed is unknown, defaulting to 1000 [ 1149.781963][ T6686] lo speed is unknown, defaulting to 1000 [ 1155.384335][ T30] audit: type=1400 audit(1155.180:268): avc: denied { append } for pid=6734 comm="syz.0.1178" name="pfkey" dev="proc" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1155.391258][ T30] audit: type=1400 audit(1155.190:269): avc: denied { append } for pid=6734 comm="syz.0.1178" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1158.127575][ T30] audit: type=1400 audit(1157.920:270): avc: denied { lock } for pid=6756 comm="syz.0.1189" path="socket:[14309]" dev="sockfs" ino=14309 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1159.505773][ T30] audit: type=1400 audit(1159.310:271): avc: denied { read } for pid=6768 comm="syz.0.1195" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1159.509366][ T30] audit: type=1400 audit(1159.310:272): avc: denied { open } for pid=6768 comm="syz.0.1195" path="/625/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1159.644644][ T6778] block device autoloading is deprecated and will be removed. [ 1159.652914][ T30] audit: type=1400 audit(1159.450:273): avc: denied { ioctl } for pid=6768 comm="syz.0.1195" path="/625/file0/file0" dev="fuse" ino=64 ioctlcmd=0x92b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1159.697356][ T6769] md2: using deprecated bitmap file support [ 1162.848670][ T30] audit: type=1400 audit(1162.650:274): avc: denied { getopt } for pid=6811 comm="syz.1.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1164.617558][ T6830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6830 comm=syz.0.1223 [ 1212.199891][ T30] audit: type=1400 audit(1212.000:275): avc: denied { read } for pid=6924 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1212.202952][ T30] audit: type=1400 audit(1212.000:276): avc: denied { open } for pid=6924 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1213.661541][ T6924] lo speed is unknown, defaulting to 1000 [ 1216.488385][ T6924] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1216.511874][ T6924] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1218.826562][ T6924] hsr_slave_0: entered promiscuous mode [ 1218.830624][ T6924] hsr_slave_1: entered promiscuous mode [ 1218.842127][ T6924] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1218.847831][ T6924] Cannot create hsr debugfs directory [ 1603.875384][ T32] INFO: task kworker/1:0:23 blocked for more than 430 seconds. [ 1603.876043][ T32] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 1603.876178][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1603.876478][ T32] task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 1603.882879][ T32] Workqueue: md_misc mddev_delayed_delete [ 1603.890240][ T32] Call trace: [ 1603.891196][ T32] __switch_to+0x204/0x4bc (T) [ 1603.892508][ T32] __schedule+0xd34/0x3188 [ 1603.893649][ T32] schedule+0xd0/0x344 [ 1603.897040][ T32] schedule_timeout+0x1ec/0x224 [ 1603.899191][ T32] __wait_for_common+0x1d0/0x3f8 [ 1603.900677][ T32] wait_for_completion+0x20/0x2c [ 1603.902193][ T32] devtmpfs_submit_req+0xac/0x114 [ 1603.905016][ T32] devtmpfs_delete_node+0xd8/0x128 [ 1603.907039][ T32] device_del+0x59c/0x7b4 [ 1603.908826][ T32] del_gendisk+0x3fc/0x87c [ 1603.910699][ T32] md_kobj_release+0x84/0xd8 [ 1603.912565][ T32] kobject_put+0x17c/0x430 [ 1603.915216][ T32] mddev_delayed_delete+0x14/0x20 [ 1603.917297][ T32] process_one_work+0x7cc/0x18d4 [ 1603.919238][ T32] worker_thread+0x734/0xb84 [ 1603.921109][ T32] kthread+0x348/0x5fc [ 1603.922951][ T32] ret_from_fork+0x10/0x20 [ 1603.935546][ T32] INFO: task syz.0.1239:6867 blocked for more than 430 seconds. [ 1603.937716][ T32] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 1603.939663][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1603.941478][ T32] task:syz.0.1239 state:D stack:0 pid:6867 tgid:6865 ppid:3302 task_flags:0x400040 flags:0x00000009 [ 1603.945475][ T32] Call trace: [ 1603.946796][ T32] __switch_to+0x204/0x4bc (T) [ 1603.948292][ T32] __schedule+0xd34/0x3188 [ 1603.949703][ T32] schedule+0xd0/0x344 [ 1603.951068][ T32] schedule_timeout+0x1ec/0x224 [ 1603.952498][ T32] __wait_for_common+0x1d0/0x3f8 [ 1603.956116][ T32] wait_for_completion+0x20/0x2c [ 1603.957564][ T32] devtmpfs_submit_req+0xac/0x114 [ 1603.959032][ T32] devtmpfs_create_node+0x120/0x18c [ 1603.960486][ T32] device_add+0xbd0/0x12bc [ 1603.961927][ T32] device_create_groups_vargs+0x19c/0x23c [ 1603.963470][ T32] device_create+0xa8/0xe0 [ 1603.966211][ T32] vcs_make_sysfs+0x44/0x98 [ 1603.967605][ T32] vc_allocate+0x52c/0x700 [ 1603.968985][ T32] con_install+0xac/0x4c4 [ 1603.970565][ T32] tty_init_dev.part.0+0x78/0x4ec SYZFAIL: failed to recv rpc [ 1603.972025][ T32] tty_open+0x70c/0xb04 [ 1603.974551][ T32] chrdev_open+0x1a4/0x4e8 [ 1603.975965][ T32] do_dentry_open+0x6f8/0x153c [ 1603.977411][ T32] vfs_open+0x5c/0x2fc [ 1603.978793][ T32] path_openat+0x14ec/0x25e4 [ 1603.980181][ T32] do_filp_open+0x184/0x360 [ 1603.981547][ T32] do_sys_openat2+0xe0/0x160 [ 1603.982974][ T32] __arm64_sys_openat+0x12c/0x1bc [ 1603.985069][ T32] invoke_syscall+0x6c/0x258 [ 1603.986129][ T32] el0_svc_common.constprop.0+0xac/0x230 [ 1603.986873][ T32] do_el0_svc+0x40/0x58 [ 1603.987537][ T32] el0_svc+0x50/0x180 [ 1603.988190][ T32] el0t_64_sync_handler+0x10c/0x138 [ 1603.988889][ T32] el0t_64_sync+0x198/0x19c [ 1603.989962][ T32] [ 1603.989962][ T32] Showing all locks held in the system: [ 1603.990931][ T32] 2 locks held by kworker/1:0/23: [ 1603.991699][ T32] #0: ffff00000f1fe548 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1603.998974][ T32] #1: ffff80008d5c7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1604.004700][ T32] 2 locks held by kdevtmpfs/25: [ 1604.006088][ T32] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 1604.009329][ T32] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1604.011818][ T32] 1 lock held by khungtaskd/32: [ 1604.012513][ T32] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1604.016357][ T32] 3 locks held by kworker/u8:9/2152: [ 1604.017112][ T32] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1604.019684][ T32] #1: ffff8000a0017c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1604.022488][ T32] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1604.025036][ T32] 1 lock held by klogd/3112: [ 1604.025203][ T32] 1 lock held by dhcpcd/3153: [ 1604.025326][ T32] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1604.026121][ T32] 2 locks held by getty/3243: [ 1604.026253][ T32] #0: ffff0000102de0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1604.026970][ T32] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 1604.027647][ T32] 2 locks held by sshd/3295: [ 1604.027768][ T32] 1 lock held by syz-executor/3297: [ 1604.027922][ T32] 3 locks held by syz.0.1239/6867: [ 1604.028043][ T32] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 1604.028763][ T32] #1: ffff00001cd681c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_lock+0x48/0x90 [ 1604.029432][ T32] #2: ffff80008719e340 (console_lock){+.+.}-{0:0}, at: con_install+0xa4/0x4c4 [ 1604.030238][ T32] 2 locks held by syz-executor/6924: [ 1604.030369][ T32] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 1604.031272][ T32] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 1604.031937][ T32] 2 locks held by syz.1.1303/7030: [ 1604.032066][ T32] #0: ffff8000887baa88 (vlan_ioctl_mutex){+.+.}-{4:4}, at: sock_ioctl+0x418/0x5d4 [ 1604.032721][ T32] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1604.033404][ T32] 3 locks held by kworker/u8:2/7032: [ 1604.033523][ T32] #0: ffff0000137f3148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1604.038742][ T32] #1: ffff80008e5f7c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1604.039799][ T32] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1604.040262][ T32] 1 lock held by syz-executor/7034: [ 1604.040356][ T32] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1604.040927][ T32] [ 1604.041011][ T32] ============================================= [ 1604.041011][ T32] [ 1604.041811][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1604.046021][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 1604.046404][ T32] Hardware name: linux,dummy-virt (DT) [ 1604.046668][ T32] Call trace: [ 1604.046900][ T32] show_stack+0x18/0x24 (C) [ 1604.047115][ T32] dump_stack_lvl+0x38/0xf4 [ 1604.047295][ T32] dump_stack+0x1c/0x28 [ 1604.047463][ T32] panic+0x5b0/0x664 [ 1604.047628][ T32] watchdog+0x658/0x1140 [ 1604.047807][ T32] kthread+0x348/0x5fc [ 1604.047978][ T32] ret_from_fork+0x10/0x20 [ 1604.048691][ T32] SMP: stopping secondary CPUs [ 1604.049718][ T32] Kernel Offset: disabled [ 1604.049939][ T32] CPU features: 0x0410,00040068,01000400,0200421b [ 1604.050216][ T32] Memory Limit: none [ 1604.053248][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:32:59 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544667c X00=ffff800085446678 X01=ffff800083d66950 X02=0000000000000000 X03=ffff800080402b48 X04=ffff700011a1f559 X05=ffff80008d0faac0 X06=ffff700011a1f558 X07=0000000000000001 X08=ffff80008d0faac3 X09=dfff800000000000 X10=ffff700011a1f558 X11=1ffff00011a1f558 X12=ffff700011a1f559 X13=0000000000000000 X14=1fffe0000d418836 X15=185068d57e041e9d X16=32ab00004edcffff X17=79debc94b20b9f59 X18=ffff00003bef4dc0 X19=0000000000000643 X20=ffff80008d0faac0 X21=ffff8000a1627c90 X22=dfff800000000000 X23=ffff800080aa73cc X24=1ffff000142c4f92 X25=000000000004d5b8 X26=ffff800080aa73cc X27=0000000000000000 X28=ffff000013a79e40 X29=ffff8000a1627b80 X30=ffff800083d66968 SP=ffff8000a1627b80 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaacddf3459:0000aaaacddf3360 Q03=0000ffffe7cbae50:0000ffffe7cbabb8 Q04=0000000000000000:0000000000000000 Q05=0000ffffe7cbab10:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe7cbaf20:0000ffffe7cbaf20 Q17=ffffff80ffffffd0:0000ffffe7cbaef0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008098b63c X00=0000000000000001 X01=ffff80008e1a73e8 X02=0000000000000028 X03=ffff80008140bd48 X04=ffff700011c34e7b X05=ffff80008e1a71a0 X06=ffff700011c34e2a X07=0000000000000005 X08=ffff80008e1a736f X09=dfff800000000000 X10=00457fa0f0a3fcf4 X11=1ffff00011c34e77 X12=0004234f8bee16a8 X13=0000000000000004 X14=00041c2b2ad7fa99 X15=000269a78ae7ab49 X16=000760d5c3c45729 X17=653dc0a2b8476016 X18=0007daa151e66f81 X19=0000000000000028 X20=ffff80008140b8dc X21=5f89d6cdd1568638 X22=ffff80008e1a73c0 X23=00000263293c8b35 X24=0005ff5e02078a75 X25=0000006c96485f97 X26=0000000000000000 X27=0003b53f4ba5a94f X28=003ffffffffffff8 X29=ffff80008e1a6f50 X30=ffff80008098cfa0 SP=ffff80008e1a6f80 PSTATE=40000005 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaacddf3459:0000aaaacddf3360 Q03=0000ffffe7cbae50:0000ffffe7cbabb8 Q04=0000000000000000:0000000000000000 Q05=0000ffffe7cbab10:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe7cbaf20:0000ffffe7cbaf20 Q17=ffffff80ffffffd0:0000ffffe7cbaef0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000