Warning: Permanently added '[localhost]:38035' (ED25519) to the list of known hosts. [ 163.280246][ T29] audit: type=1400 audit(162.900:58): avc: denied { name_bind } for pid=3176 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 163.573749][ T29] audit: type=1400 audit(163.200:59): avc: denied { execute } for pid=3178 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 163.577456][ T29] audit: type=1400 audit(163.200:60): avc: denied { execute_no_trans } for pid=3178 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:02:44 fuzzer started 1970/01/01 00:02:47 dialing manager at localhost:30002 [ 168.217692][ T29] audit: type=1400 audit(167.830:61): avc: denied { node_bind } for pid=3178 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 168.324590][ T29] audit: type=1400 audit(167.950:62): avc: denied { name_bind } for pid=3178 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 168.653559][ T29] audit: type=1400 audit(168.280:63): avc: denied { mounton } for pid=3187 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 168.663752][ T29] audit: type=1400 audit(168.290:64): avc: denied { mount } for pid=3187 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 168.693763][ T3187] cgroup: Unknown subsys name 'net' [ 168.726946][ T29] audit: type=1400 audit(168.350:65): avc: denied { unmount } for pid=3187 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 169.194827][ T3187] cgroup: Unknown subsys name 'rlimit' [ 169.643301][ T29] audit: type=1400 audit(169.270:66): avc: denied { mounton } for pid=3187 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 169.647105][ T29] audit: type=1400 audit(169.270:67): avc: denied { mount } for pid=3187 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 169.675112][ T29] audit: type=1400 audit(169.300:68): avc: denied { setattr } for pid=3187 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 170.168022][ T3191] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 170.173747][ T29] audit: type=1400 audit(169.800:69): avc: denied { relabelto } for pid=3191 comm="mkswap" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 170.184119][ T29] audit: type=1400 audit(169.800:70): avc: denied { write } for pid=3191 comm="mkswap" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 170.254249][ T29] audit: type=1400 audit(169.880:71): avc: denied { read } for pid=3187 comm="syz-executor" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 170.283212][ T3187] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:02:51 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:02:51 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:02:51 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:02:51 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:02:51 setuid sandbox: enabled 1970/01/01 00:02:51 namespace sandbox: enabled 1970/01/01 00:02:51 Android sandbox: enabled 1970/01/01 00:02:51 fault injection: enabled 1970/01/01 00:02:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:02:51 net packet injection: enabled 1970/01/01 00:02:51 net device setup: enabled 1970/01/01 00:02:51 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:02:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:02:51 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:02:51 USB emulation: enabled 1970/01/01 00:02:51 hci packet injection: /dev/vhci does not exist 1970/01/01 00:02:51 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:02:51 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:02:51 swap file: enabled 1970/01/01 00:02:51 starting 2 executor processes [ 176.337908][ T3194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.371136][ T3194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.697925][ T3195] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.720660][ T3195] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 178.244638][ T3194] hsr_slave_0: entered promiscuous mode [ 178.296106][ T3194] hsr_slave_1: entered promiscuous mode [ 178.964581][ T3195] hsr_slave_0: entered promiscuous mode [ 179.002660][ T3195] hsr_slave_1: entered promiscuous mode [ 179.041148][ T3195] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 179.042623][ T3195] Cannot create hsr debugfs directory [ 180.362012][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 180.362102][ T29] audit: type=1400 audit(179.990:81): avc: denied { create } for pid=3194 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.365616][ T29] audit: type=1400 audit(179.990:82): avc: denied { write } for pid=3194 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.369021][ T29] audit: type=1400 audit(179.990:83): avc: denied { read } for pid=3194 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.391955][ T3194] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 180.454104][ T3194] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 180.487904][ T3194] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 180.518073][ T3194] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 180.748976][ T3195] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 180.794550][ T3195] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 180.824154][ T3195] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 180.875157][ T3195] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 182.408462][ T3194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.655904][ T3195] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.398793][ T3194] veth0_vlan: entered promiscuous mode [ 189.511371][ T3194] veth1_vlan: entered promiscuous mode [ 189.611366][ T3195] veth0_vlan: entered promiscuous mode [ 189.703111][ T3195] veth1_vlan: entered promiscuous mode [ 189.885271][ T3194] veth0_macvtap: entered promiscuous mode [ 189.934262][ T3194] veth1_macvtap: entered promiscuous mode [ 190.145175][ T3195] veth0_macvtap: entered promiscuous mode [ 190.217339][ T3195] veth1_macvtap: entered promiscuous mode [ 190.347761][ T3194] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.348946][ T3194] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.352393][ T3194] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.352974][ T3194] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.675334][ T29] audit: type=1400 audit(190.300:84): avc: denied { mounton } for pid=3194 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 190.721238][ T29] audit: type=1400 audit(190.330:85): avc: denied { mount } for pid=3194 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 190.755987][ T3195] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.756505][ T3195] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.756914][ T3195] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.757287][ T3195] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) getpeername$unix(r0, 0x0, &(0x7f0000001700)) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x5421, &(0x7f0000000040)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = mq_open(&(0x7f0000000580)='.log\x00', 0x40, 0x8, &(0x7f00000005c0)={0x6d, 0x2, 0xffff, 0x100000001}) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0xf3) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000600)={r5, 0x0, 0x7fffffff, 0x8}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x5452, &(0x7f00000017c0)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup2(r6, r2) r9 = open(&(0x7f0000000140)='.\x00', 0x101880, 0x100) openat$cgroup_int(r9, &(0x7f0000000180)='cpu.weight.nice\x00', 0x657, 0xfeffffff) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000001740), &(0x7f0000001780)=0xc) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x5452, &(0x7f0000001bc0)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000080)={r1, 0x8, 0x8000000000000000}) r10 = socket(0x23, 0x6, 0x7fffffff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5452, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) socketpair(0x6, 0xa, 0xfffff845, &(0x7f0000000640)) tee(r10, r11, 0x59a1, 0x4) r12 = dup3(r4, r3, 0x80000) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r8, 0xc400941d, &(0x7f0000000e80)={r7, 0x0, 0x100000000}) read(r12, &(0x7f0000000680)=""/121, 0x79) [ 191.388664][ T29] audit: type=1400 audit(191.010:86): avc: denied { read write } for pid=3194 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.399064][ T29] audit: type=1400 audit(191.020:87): avc: denied { open } for pid=3194 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.404452][ T29] audit: type=1400 audit(191.030:88): avc: denied { ioctl } for pid=3194 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) [ 192.009919][ T29] audit: type=1400 audit(191.630:89): avc: denied { create } for pid=3328 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 192.040041][ T29] audit: type=1400 audit(191.660:90): avc: denied { ioctl } for pid=3328 comm="syz-executor.1" path="socket:[3614]" dev="sockfs" ino=3614 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 192.244530][ T29] audit: type=1400 audit(191.870:91): avc: denied { create } for pid=3327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 executing program 1: r0 = openat$mice(0xffffff9c, &(0x7f00000014c0), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x0) [ 192.821910][ T29] audit: type=1400 audit(192.440:92): avc: denied { create } for pid=3327 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_SE_IO(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0xffffffffffffffa0}, 0x14}}, 0x4000004) [ 193.396331][ T29] audit: type=1400 audit(193.020:93): avc: denied { read } for pid=3336 comm="syz-executor.1" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003d00000095"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x98, &(0x7f0000000000)=""/152}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r2, r1, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) r3 = fcntl$dupfd(r0, 0x0, r1) sendto$inet6(r3, &(0x7f0000000540)="da", 0x20000541, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00', 0x0, 0x0) executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) getpeername$unix(r0, 0x0, &(0x7f0000001700)) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x5421, &(0x7f0000000040)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = mq_open(&(0x7f0000000580)='.log\x00', 0x40, 0x8, &(0x7f00000005c0)={0x6d, 0x2, 0xffff, 0x100000001}) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0xf3) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000600)={r5, 0x0, 0x7fffffff, 0x8}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x5452, &(0x7f00000017c0)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup2(r6, r2) r9 = open(&(0x7f0000000140)='.\x00', 0x101880, 0x100) openat$cgroup_int(r9, &(0x7f0000000180)='cpu.weight.nice\x00', 0x657, 0xfeffffff) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x481, &(0x7f0000001740), &(0x7f0000001780)=0xc) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x5452, &(0x7f0000001bc0)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000080)={r1, 0x8, 0x8000000000000000}) r10 = socket(0x23, 0x6, 0x7fffffff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x5452, &(0x7f0000000700)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) socketpair(0x6, 0xa, 0xfffff845, &(0x7f0000000640)) tee(r10, r11, 0x59a1, 0x4) r12 = dup3(r4, r3, 0x80000) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r8, 0xc400941d, &(0x7f0000000e80)={r7, 0x0, 0x100000000}) read(r12, &(0x7f0000000680)=""/121, 0x79) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c4c4000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r3, r2, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r3, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r1}, 0x20) sendmmsg$inet6(r1, &(0x7f0000002180)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000740)="03", 0x1}], 0x1}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002440)={{0x14}, [], {0x14}}, 0xc4c3d8}}, 0x0) [ 194.241792][ C1] ------------[ cut here ]------------ [ 194.242686][ C1] WARNING: CPU: 1 PID: 3195 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x508/0x63c [ 194.244064][ C1] Modules linked in: [ 194.244675][ C1] CPU: 1 PID: 3195 Comm: syz-executor.1 Not tainted 6.9.0-rc5-syzkaller-00159-gc942a0cd3603 #0 [ 194.245203][ C1] Hardware name: linux,dummy-virt (DT) [ 194.245934][ C1] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 194.246296][ C1] pc : inet_sock_destruct+0x508/0x63c [ 194.246861][ C1] lr : inet_sock_destruct+0x320/0x63c [ 194.247110][ C1] sp : ffff8000895f7c50 [ 194.247679][ C1] x29: ffff8000895f7c50 x28: ffff00000ef82790 x27: 1fffe00001df057e [ 194.248214][ C1] x26: ffff0000124abc00 x25: ffff00000ef82be8 x24: 1fffe00001df04f2 [ 194.248618][ C1] x23: ffff800084f2b3a0 x22: ffff00000ef82728 x21: 1fffe00001df04e5 [ 194.249029][ C1] x20: ffff00000ef82700 x19: ffff800087cdb2a0 x18: ffff0000124ac670 [ 194.249583][ C1] x17: ffff80008052f4e8 x16: 0000000000000006 x15: 1fffe000024958cd [ 194.250230][ C1] x14: 1fffe000024958e1 x13: 1fffe000024958ca x12: ffff600001df0534 [ 194.250723][ C1] x11: 1fffe00001df0533 x10: ffff600001df0533 x9 : dfff800000000000 [ 194.251211][ C1] x8 : ffff00000ef8299f x7 : 0000000000000001 x6 : ffff600001df0533 [ 194.251756][ C1] x5 : ffff00000ef8299c x4 : ffff600001df0534 x3 : 1fffe00001df0530 [ 194.252293][ C1] x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000400 [ 194.253044][ C1] Call trace: [ 194.253355][ C1] inet_sock_destruct+0x508/0x63c [ 194.253767][ C1] inet6_sock_destruct+0x20/0x30 [ 194.254044][ C1] __sk_destruct+0x4c/0x548 [ 194.254339][ C1] rcu_core+0x960/0x1bd0 [ 194.254582][ C1] rcu_core_si+0x10/0x1c [ 194.254808][ C1] __do_softirq+0x2e8/0xde8 [ 194.255104][ C1] ____do_softirq+0x10/0x1c [ 194.255384][ C1] call_on_irq_stack+0x24/0x4c [ 194.255623][ C1] do_softirq_own_stack+0x1c/0x2c [ 194.255863][ C1] __irq_exit_rcu+0x334/0x434 [ 194.256100][ C1] irq_exit_rcu+0x14/0x80 [ 194.256326][ C1] el1_interrupt+0x38/0x54 [ 194.256609][ C1] el1h_64_irq_handler+0x18/0x24 [ 194.256853][ C1] el1h_64_irq+0x64/0x68 [ 194.257131][ C1] _raw_spin_unlock_irqrestore+0x40/0xac [ 194.257444][ C1] debug_check_no_obj_freed+0x27c/0x4f4 [ 194.257751][ C1] kmem_cache_free+0x294/0x450 [ 194.258001][ C1] jbd2_journal_stop+0x568/0xd80 [ 194.258254][ C1] __ext4_journal_stop+0xac/0x1b0 [ 194.258546][ C1] __ext4_unlink+0x430/0x874 [ 194.258822][ C1] ext4_unlink+0x154/0x5e4 [ 194.259098][ C1] vfs_unlink+0x248/0x6f0 [ 194.259504][ C1] do_unlinkat+0x39c/0x4ac [ 194.259762][ C1] __arm64_sys_unlink+0x9c/0x100 [ 194.260132][ C1] invoke_syscall+0x6c/0x25c [ 194.260386][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 194.260636][ C1] do_el0_svc_compat+0x40/0x64 [ 194.260874][ C1] el0_svc_compat+0x4c/0x17c [ 194.261112][ C1] el0t_32_sync_handler+0x98/0x13c [ 194.261373][ C1] el0t_32_sync+0x194/0x198 [ 194.261909][ C1] irq event stamp: 147623 [ 194.262199][ C1] hardirqs last enabled at (147622): [] _raw_spin_unlock_irqrestore+0x80/0xac [ 194.262649][ C1] hardirqs last disabled at (147623): [] el1_dbg+0x24/0x9c [ 194.263026][ C1] softirqs last enabled at (147226): [] fpsimd_restore_current_state+0x44/0xe4 [ 194.263432][ C1] softirqs last disabled at (147561): [] ____do_softirq+0x10/0x1c [ 194.263796][ C1] ---[ end trace 0000000000000000 ]--- [ 196.111932][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 196.112037][ T29] audit: type=1400 audit(195.740:102): avc: denied { create } for pid=3353 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 196.160761][ T29] audit: type=1400 audit(195.780:103): avc: denied { bind } for pid=3353 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 196.216445][ T29] audit: type=1400 audit(195.830:104): avc: denied { write } for pid=3353 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 196.888207][ T29] audit: type=1400 audit(196.510:105): avc: denied { mounton } for pid=3357 comm="syz-executor.0" path="/proc/3357/task" dev="proc" ino=3678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 196.927574][ T29] audit: type=1400 audit(196.550:106): avc: denied { mount } for pid=3357 comm="syz-executor.0" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 197.230669][ T29] audit: type=1400 audit(196.850:107): avc: denied { write } for pid=3361 comm="syz-executor.0" name="task" dev="proc" ino=3678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 197.237918][ T29] audit: type=1400 audit(196.850:108): avc: denied { add_name } for pid=3361 comm="syz-executor.0" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 197.250524][ T29] audit: type=1400 audit(196.870:109): avc: denied { create } for pid=3361 comm="syz-executor.0" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 197.251541][ T29] audit: type=1400 audit(196.870:110): avc: denied { associate } for pid=3361 comm="syz-executor.0" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 197.732267][ T29] audit: type=1400 audit(197.360:111): avc: denied { write } for pid=3363 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 201.326436][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 201.326535][ T29] audit: type=1400 audit(200.950:114): avc: denied { create } for pid=3387 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 201.373356][ T29] audit: type=1400 audit(200.990:115): avc: denied { write } for pid=3387 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.330612][ T29] audit: type=1400 audit(201.950:116): avc: denied { create } for pid=3393 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 202.351696][ T29] audit: type=1400 audit(201.970:117): avc: denied { read } for pid=3393 comm="syz-executor.0" name="ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 202.353534][ T29] audit: type=1400 audit(201.980:118): avc: denied { open } for pid=3393 comm="syz-executor.0" path="/dev/ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 202.380299][ T29] audit: type=1400 audit(202.000:119): avc: denied { write } for pid=3393 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 202.403361][ T29] audit: type=1400 audit(202.030:120): avc: denied { create } for pid=3394 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 202.493703][ T29] audit: type=1400 audit(202.120:121): avc: denied { write } for pid=3394 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 203.598237][ T29] audit: type=1400 audit(203.220:122): avc: denied { getopt } for pid=3403 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 204.962809][ T29] audit: type=1400 audit(204.580:123): avc: denied { setopt } for pid=3411 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 206.533024][ T3427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3427 comm=syz-executor.1 [ 207.005291][ T3430] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3430 comm=syz-executor.1 [ 207.385032][ T29] audit: type=1400 audit(207.010:124): avc: denied { create } for pid=3433 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 207.410011][ T29] audit: type=1400 audit(207.030:125): avc: denied { connect } for pid=3433 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 207.422040][ T29] audit: type=1400 audit(207.050:126): avc: denied { bind } for pid=3433 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 207.441474][ T29] audit: type=1400 audit(207.070:127): avc: denied { write } for pid=3433 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 207.489724][ T29] audit: type=1400 audit(207.110:128): avc: denied { read } for pid=3433 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 207.494238][ T29] audit: type=1400 audit(207.110:129): avc: denied { open } for pid=3433 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 207.517170][ T29] audit: type=1400 audit(207.130:130): avc: denied { map } for pid=3433 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 207.532756][ T29] audit: type=1400 audit(207.160:131): avc: denied { read } for pid=3433 comm="syz-executor.1" path="socket:[4408]" dev="sockfs" ino=4408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 208.909915][ T29] audit: type=1400 audit(208.530:132): avc: denied { nlmsg_write } for pid=3442 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 209.478089][ T29] audit: type=1400 audit(209.100:133): avc: denied { create } for pid=3445 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 210.270416][ T3452] serio: Serial port pts0 [ 212.102425][ T3458] loop1: detected capacity change from 0 to 2048 [ 212.322636][ T3458] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 212.395661][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 212.395750][ T29] audit: type=1400 audit(212.020:139): avc: denied { write } for pid=3449 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 212.415622][ T29] audit: type=1400 audit(212.040:140): avc: denied { add_name } for pid=3449 comm="syz-executor.1" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 212.432056][ T29] audit: type=1400 audit(212.050:141): avc: denied { create } for pid=3449 comm="syz-executor.1" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 212.461364][ T29] audit: type=1400 audit(212.090:142): avc: denied { read write open } for pid=3449 comm="syz-executor.1" path="/syzkaller-testdir3820247569/syzkaller.jHzN45/29/bus/bus" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 213.600353][ T29] audit: type=1400 audit(213.220:143): avc: denied { unmount } for pid=3195 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 213.626125][ T744] EXT4-fs error (device loop1): ext4_validate_block_bitmap:440: comm kworker/u8:6: bg 0: block 234: padding at end of block bitmap is not set [ 213.644946][ T744] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 213.645781][ T744] EXT4-fs (loop1): This should not happen!! Data will be lost [ 213.645781][ T744] [ 213.646671][ T744] EXT4-fs (loop1): Total free blocks count 0 [ 213.647023][ T744] EXT4-fs (loop1): Free/Dirty block details [ 213.647464][ T744] EXT4-fs (loop1): free_blocks=0 [ 213.647848][ T744] EXT4-fs (loop1): dirty_blocks=16 [ 213.648157][ T744] EXT4-fs (loop1): Block reservation details [ 213.648610][ T744] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 213.692793][ T3195] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 215.491571][ T3471] sctp: [Deprecated]: syz-executor.1 (pid 3471) Use of int in max_burst socket option deprecated. [ 215.491571][ T3471] Use struct sctp_assoc_value instead [ 215.754955][ T29] audit: type=1400 audit(215.380:144): avc: denied { write } for pid=3472 comm="syz-executor.1" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 216.447838][ T29] audit: type=1400 audit(216.070:145): avc: denied { read } for pid=3476 comm="syz-executor.0" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 216.467882][ T29] audit: type=1400 audit(216.070:146): avc: denied { open } for pid=3476 comm="syz-executor.0" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 216.474640][ T29] audit: type=1400 audit(216.100:147): avc: denied { ioctl } for pid=3476 comm="syz-executor.0" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.248310][ T29] audit: type=1400 audit(217.870:148): avc: denied { create } for pid=3490 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 218.274678][ T29] audit: type=1400 audit(217.900:149): avc: denied { write } for pid=3489 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 218.288142][ T29] audit: type=1400 audit(217.910:150): avc: denied { setopt } for pid=3490 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 219.722241][ T29] audit: type=1400 audit(219.340:151): avc: denied { ioctl } for pid=3499 comm="syz-executor.0" path="socket:[3904]" dev="sockfs" ino=3904 ioctlcmd=0x9401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 219.752280][ T29] audit: type=1400 audit(219.380:152): avc: denied { create } for pid=3499 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 219.761076][ T3500] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 219.955674][ T29] audit: type=1400 audit(219.580:153): avc: denied { read } for pid=3504 comm="syz-executor.1" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 219.956533][ T29] audit: type=1400 audit(219.580:154): avc: denied { open } for pid=3504 comm="syz-executor.1" path="/dev/dri/card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 219.989894][ T29] audit: type=1400 audit(219.610:155): avc: denied { ioctl } for pid=3504 comm="syz-executor.1" path="/dev/dri/card0" dev="devtmpfs" ino=619 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 220.366110][ T29] audit: type=1400 audit(219.990:156): avc: denied { getopt } for pid=3506 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 220.388055][ T29] audit: type=1400 audit(220.010:157): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 VM DIAGNOSIS: 19:58:33 Registers: info registers vcpu 0 CPU#0 PC=ffff800084e67fe8 X00=0000000000000002 X01=0000000000000003 X02=0000000000000000 X03=0000000000000000 X04=0000000000000001 X05=1ffff0001125d0d0 X06=0000000000000000 X07=ffff8000809c6580 X08=0000000000000003 X09=0000000000000001 X10=ffff700011c20f04 X11=1fffe00002495157 X12=0000000000000007 X13=1fffe0000249514a X14=1fffe0000249515c X15=1fffe0000249514d X16=0000000000000006 X17=0000000000000000 X18=ffff0000124a8a70 X19=ffff800084e843c4 X20=1ffff00011c20f74 X21=ffff8000809c6580 X22=ffff000017f75cb0 X23=0000000000000001 X24=ffff8000866bddc8 X25=ffff800084f154a0 X26=00000000ffffffff X27=1fffe00002fee91a X28=ffff000017f748d0 X29=ffff80008e107ae0 X30=ffff800080ec9b54 SP=ffff80008e107aa0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008192595c X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000030 X05=ffff8000895f72d0 X06=ffff7000112bee5a X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff7000112bee5a X11=1ffff000112bee5a X12=ffff7000112bee5b X13=1fffe000024958ca X14=1fffe000024958f5 X15=1fffe000024958cd X16=0000000000000000 X17=0000000000000000 X18=ffff0000124ac670 X19=ffff00000b518080 X20=ffff8000895eb030 X21=ffff800086ee0680 X22=00000000000003c0 X23=1fffe000016a305a X24=ffff00000b5182d0 X25=ffff00000b5182d8 X26=ffff800086ee07b8 X27=000000000000002d X28=ffff00000b518080 X29=ffff8000895f7300 X30=ffff800081927048 SP=ffff8000895f7300 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000