last executing test programs: 26.698491101s ago: executing program 1 (id=218): ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000340)={0x40, 0x5, 0x4, 0xfff, 0x6, 0xff}) ioctl$USBDEVFS_FORBID_SUSPEND(r0, 0x5521) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000002400)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000002440)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000002480)=0x0) sendmsg$NFC_CMD_DEP_LINK_DOWN(r1, &(0x7f0000002540)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)={0x3c, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1000}, 0x4040) syz_genetlink_get_family_id$nl802154(&(0x7f00000025c0), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000002600)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000002640)={'wpan4\x00'}) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000002b00)={&(0x7f0000002a00)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000002ac0)={&(0x7f0000002a40)={0x50, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000010}, 0x840) 24.502391078s ago: executing program 1 (id=224): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@remote, @broadcast}, &(0x7f0000000040)=0x8) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000001f00), r2) 23.999806388s ago: executing program 1 (id=226): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x2000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x2, &(0x7f00001da000/0x4000)=nil) process_mrelease(0xffffffffffffffff, 0x0) 22.351443314s ago: executing program 0 (id=228): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x10}) ioctl$UFFDIO_CONTINUE(r0, 0xc020aa08, &(0x7f0000000080)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}}) 21.838655894s ago: executing program 0 (id=229): openat$ttyS3(0xffffffffffffff9c, 0x0, 0x274500, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x44890) accept4$inet(r0, 0x0, 0x0, 0x80800) 21.130733412s ago: executing program 0 (id=230): socket(0x11, 0x3, 0xff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x7, 0x4, 0x80}, 0x48) r5 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000400)={0x80000001}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, 0x0, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000001c00070cfffffffffddbdf2507000000", @ANYRES32=r8, @ANYBLOB="0200640b0a000200aaaaaaaaaabb00000c000e800500"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[], 0x50}}, 0x40008014) sendmmsg(r9, &(0x7f0000000000), 0x4000000000001f2, 0x0) 12.703314736s ago: executing program 1 (id=231): r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000900)={0xa, 0x4e21, 0x1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000}, 0x1c) 10.896037888s ago: executing program 1 (id=232): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0x404c534a, &(0x7f0000000400)={0x0, 0x1f000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r6, 0x107, 0x16, 0x0, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r7}, 0x18) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r8 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r8}, 0x4) 5.996000132s ago: executing program 0 (id=233): r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) write$binfmt_register(r0, &(0x7f00000003c0)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x2, 0x3a, 'trusted.overlay.upper\x00', 0x3a, '', 0x3a, './file1/../file0', 0x3a, [0x46, 0x50]}, 0x48) 3.470171472s ago: executing program 0 (id=234): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYRES8, @ANYRES32=r2, @ANYBLOB="0a0006000802"], 0x34}, 0x1, 0x0, 0x0, 0x818}, 0x4000) 62.363807ms ago: executing program 0 (id=235): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000140000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket(0x11, 0x3, 0xff) set_robust_list(&(0x7f0000000140)={0x0, 0x4}, 0x18) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0x9800, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x1, 0x8470bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x74614, 0x36a01}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_STATE={0x5, 0x1, 0x23}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2400c081}, 0x8002) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 0s ago: executing program 1 (id=236): epoll_create1(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000531000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x8, 0x800c1}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:42910' (ED25519) to the list of known hosts. [ 207.914981][ T30] audit: type=1400 audit(207.480:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 208.551975][ T30] audit: type=1400 audit(208.120:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 208.564396][ T30] audit: type=1400 audit(208.130:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 215.592359][ T30] audit: type=1400 audit(215.160:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 215.614076][ T30] audit: type=1400 audit(215.180:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 215.645247][ T3312] cgroup: Unknown subsys name 'net' [ 215.669656][ T30] audit: type=1400 audit(215.240:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 216.012488][ T3312] cgroup: Unknown subsys name 'cpuset' [ 216.090765][ T3312] cgroup: Unknown subsys name 'rlimit' [ 216.451507][ T30] audit: type=1400 audit(216.020:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 216.468290][ T30] audit: type=1400 audit(216.020:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 216.472443][ T30] audit: type=1400 audit(216.030:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 217.189718][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 217.195904][ T30] audit: type=1400 audit(216.760:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 217.201229][ T30] audit: type=1400 audit(216.770:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 217.275584][ T30] audit: type=1400 audit(216.840:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 217.281591][ T30] audit: type=1400 audit(216.850:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 217.295715][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 233.193738][ T30] audit: type=1400 audit(232.760:59): avc: denied { execmem } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 233.279453][ T30] audit: type=1400 audit(232.840:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 233.288544][ T30] audit: type=1400 audit(232.850:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 233.292232][ T30] audit: type=1400 audit(232.860:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 233.336999][ T30] audit: type=1400 audit(232.900:63): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 233.653437][ T30] audit: type=1400 audit(233.220:64): avc: denied { sys_module } for pid=3317 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 240.307671][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.331231][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.835662][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.858235][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.423688][ T3318] hsr_slave_0: entered promiscuous mode [ 243.435301][ T3318] hsr_slave_1: entered promiscuous mode [ 243.956984][ T3317] hsr_slave_0: entered promiscuous mode [ 243.964119][ T3317] hsr_slave_1: entered promiscuous mode [ 243.971122][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 243.973092][ T3317] Cannot create hsr debugfs directory [ 245.772516][ T30] audit: type=1400 audit(245.340:65): avc: denied { create } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.785128][ T30] audit: type=1400 audit(245.350:66): avc: denied { write } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.805525][ T30] audit: type=1400 audit(245.370:67): avc: denied { read } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.989283][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 246.040473][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 246.162916][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 246.224894][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 246.481347][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 246.571530][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 246.613362][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 246.672592][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 250.149967][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.245312][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.452545][ T3317] veth0_vlan: entered promiscuous mode [ 261.557887][ T3317] veth1_vlan: entered promiscuous mode [ 261.942203][ T3317] veth0_macvtap: entered promiscuous mode [ 262.053501][ T3317] veth1_macvtap: entered promiscuous mode [ 262.450151][ T3318] veth0_vlan: entered promiscuous mode [ 262.463766][ T1149] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.530798][ T1149] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.531716][ T1149] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.532003][ T1149] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.894792][ T3318] veth1_vlan: entered promiscuous mode [ 263.158017][ T30] audit: type=1400 audit(262.720:68): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 263.181126][ T30] audit: type=1400 audit(262.750:69): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.ekRPP3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 263.197498][ T30] audit: type=1400 audit(262.760:70): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 263.220111][ T30] audit: type=1400 audit(262.790:71): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.ekRPP3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 263.233445][ T30] audit: type=1400 audit(262.800:72): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.ekRPP3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2993 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 263.285673][ T30] audit: type=1400 audit(262.850:73): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 263.379433][ T30] audit: type=1400 audit(262.930:74): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 263.400530][ T30] audit: type=1400 audit(262.970:75): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=2994 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 263.464856][ T30] audit: type=1400 audit(263.030:76): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 263.480867][ T30] audit: type=1400 audit(263.050:77): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 263.931949][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 264.001574][ T3318] veth0_macvtap: entered promiscuous mode [ 264.074780][ T3318] veth1_macvtap: entered promiscuous mode [ 264.490613][ T1149] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.502689][ T1149] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.503124][ T1149] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.503321][ T1149] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.818873][ T3466] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 266.822114][ T3466] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 268.571970][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 268.572782][ T30] audit: type=1400 audit(268.140:92): avc: denied { create } for pid=3470 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 268.643496][ T30] audit: type=1400 audit(268.210:93): avc: denied { read } for pid=3470 comm="syz.1.4" path="socket:[3999]" dev="sockfs" ino=3999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 269.341527][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 269.568925][ T23] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 269.574904][ T23] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 269.602410][ T23] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 269.642091][ T23] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 269.644375][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 269.647819][ T23] usb 1-1: Product: Ⱘ [ 269.649403][ T23] usb 1-1: Manufacturer: Ⰺ [ 269.650991][ T23] usb 1-1: SerialNumber: 鼓颒靘鵙궇淧쉁ꈒ䀢澢ᐴ↏븓둃૽࿡ꝲ蒶霿㌗鉾節퐃㓷凩​鰴衋蕂ꁺ㪒ꦞ별톒ᣊ슍悞蚒ᄂⰫ臾꽗Ⲍ差繌ᙵ꯯聚훱ꈴ蝔옾ഝ語敏㕾闝苿䴋愼㙋㔮팗₎燻㏓襲プ耿傃∱蹿谍욅㻇꺶璘ᯓ틾䇓支១欄 [ 269.733899][ T30] audit: type=1400 audit(269.300:94): avc: denied { write } for pid=3470 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 269.991009][ T30] audit: type=1400 audit(269.560:95): avc: denied { create } for pid=3467 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 270.043100][ T30] audit: type=1400 audit(269.610:96): avc: denied { ioctl } for pid=3467 comm="syz.0.1" path="socket:[4001]" dev="sockfs" ino=4001 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 270.133462][ T3472] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 270.168205][ T3472] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 270.191649][ T30] audit: type=1400 audit(269.760:97): avc: denied { read } for pid=3467 comm="syz.0.1" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 270.222966][ T30] audit: type=1400 audit(269.780:98): avc: denied { open } for pid=3467 comm="syz.0.1" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 270.264670][ T30] audit: type=1400 audit(269.830:99): avc: denied { read write } for pid=3467 comm="syz.0.1" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 270.292676][ T30] audit: type=1400 audit(269.860:100): avc: denied { open } for pid=3467 comm="syz.0.1" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 270.310796][ T30] audit: type=1400 audit(269.880:101): avc: denied { ioctl } for pid=3467 comm="syz.0.1" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 270.678845][ T23] usb 1-1: 0:2 : does not exist [ 270.849279][ T23] usb 1-1: USB disconnect, device number 2 [ 273.589704][ T3481] udevd[3481]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 274.047517][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 274.048523][ T30] audit: type=1400 audit(273.600:122): avc: denied { ioctl } for pid=3497 comm="syz.0.10" path="socket:[4113]" dev="sockfs" ino=4113 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 274.337212][ T30] audit: type=1400 audit(273.900:123): avc: denied { write } for pid=3497 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 274.565436][ T30] audit: type=1400 audit(274.130:124): avc: denied { block_suspend } for pid=3497 comm="syz.0.10" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 274.595148][ T3499] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 274.631200][ T30] audit: type=1400 audit(274.180:125): avc: denied { ioctl } for pid=3497 comm="syz.0.10" path="socket:[4117]" dev="sockfs" ino=4117 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 274.632092][ T30] audit: type=1400 audit(274.200:126): avc: denied { setopt } for pid=3497 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 274.662759][ T30] audit: type=1400 audit(274.230:127): avc: denied { create } for pid=3497 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 275.127353][ T30] audit: type=1400 audit(274.690:128): avc: denied { create } for pid=3490 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 275.174988][ T30] audit: type=1400 audit(274.740:129): avc: denied { write } for pid=3490 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 278.594736][ T30] audit: type=1400 audit(278.160:130): avc: denied { create } for pid=3514 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.607434][ T30] audit: type=1400 audit(278.170:131): avc: denied { bind } for pid=3514 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 280.103456][ T30] audit: type=1400 audit(279.660:132): avc: denied { mounton } for pid=3520 comm="syz.1.14" path="/7/file0" dev="tmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 282.243468][ T30] audit: type=1400 audit(281.810:133): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 283.382458][ T30] audit: type=1400 audit(282.950:134): avc: denied { create } for pid=3535 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.395451][ T30] audit: type=1400 audit(282.960:135): avc: denied { ioctl } for pid=3535 comm="syz.1.17" path="socket:[4181]" dev="sockfs" ino=4181 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.407799][ T30] audit: type=1400 audit(282.960:136): avc: denied { bind } for pid=3535 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.666951][ T30] audit: type=1400 audit(283.230:137): avc: denied { ioctl } for pid=3526 comm="syz.0.15" path="socket:[4182]" dev="sockfs" ino=4182 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 285.026921][ T30] audit: type=1400 audit(284.590:138): avc: denied { write } for pid=3535 comm="syz.1.17" path="socket:[4181]" dev="sockfs" ino=4181 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.983010][ T30] audit: type=1400 audit(285.550:139): avc: denied { execute } for pid=3543 comm="syz.0.18" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 286.653189][ T30] audit: type=1400 audit(286.220:140): avc: denied { read } for pid=3543 comm="syz.0.18" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 286.688905][ T30] audit: type=1400 audit(286.250:141): avc: denied { open } for pid=3543 comm="syz.0.18" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 287.138028][ T30] audit: type=1400 audit(286.700:142): avc: denied { create } for pid=3548 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 287.179570][ T30] audit: type=1400 audit(286.750:143): avc: denied { ioctl } for pid=3548 comm="syz.1.19" path="socket:[4085]" dev="sockfs" ino=4085 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 287.311171][ T30] audit: type=1400 audit(286.880:144): avc: denied { ioctl } for pid=3548 comm="syz.1.19" path="socket:[4086]" dev="sockfs" ino=4086 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 287.325968][ T30] audit: type=1400 audit(286.890:145): avc: denied { write } for pid=3548 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 287.801031][ T30] audit: type=1400 audit(287.370:146): avc: denied { ioctl } for pid=3543 comm="syz.0.18" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 288.143479][ T3554] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 288.171513][ T30] audit: type=1400 audit(287.740:147): avc: denied { bind } for pid=3553 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 288.173676][ T30] audit: type=1400 audit(287.740:148): avc: denied { name_bind } for pid=3553 comm="syz.0.21" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 291.238129][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 291.240216][ T30] audit: type=1400 audit(290.780:153): avc: denied { write } for pid=3563 comm="syz.1.24" path="socket:[4214]" dev="sockfs" ino=4214 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 291.291801][ T30] audit: type=1400 audit(290.860:154): avc: denied { accept } for pid=3563 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 291.937354][ T30] audit: type=1400 audit(291.500:155): avc: denied { read } for pid=3563 comm="syz.1.24" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 291.993107][ T30] audit: type=1400 audit(291.560:156): avc: denied { open } for pid=3563 comm="syz.1.24" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 293.428746][ T3567] serio: Serial port pts0 [ 293.779189][ T3564] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3564 comm=syz.1.24 [ 295.360207][ T30] audit: type=1400 audit(294.930:157): avc: denied { write } for pid=3579 comm="syz.1.26" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 295.371195][ T30] audit: type=1400 audit(294.940:158): avc: denied { open } for pid=3579 comm="syz.1.26" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 295.407647][ T30] audit: type=1400 audit(294.970:159): avc: denied { setattr } for pid=3579 comm="syz.1.26" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 295.433490][ T30] audit: type=1400 audit(295.000:160): avc: denied { map_create } for pid=3579 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 297.467730][ T30] audit: type=1400 audit(297.030:161): avc: denied { read } for pid=3581 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 299.476816][ T30] audit: type=1400 audit(299.040:162): avc: denied { read } for pid=3587 comm="syz.0.29" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.479668][ T30] audit: type=1400 audit(299.050:163): avc: denied { open } for pid=3587 comm="syz.0.29" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.505216][ T30] audit: type=1400 audit(299.070:164): avc: denied { ioctl } for pid=3587 comm="syz.0.29" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.708696][ T30] audit: type=1400 audit(299.260:165): avc: denied { name_bind } for pid=3587 comm="syz.0.29" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 299.712159][ T30] audit: type=1400 audit(299.270:166): avc: denied { node_bind } for pid=3587 comm="syz.0.29" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 300.213362][ T30] audit: type=1400 audit(299.780:167): avc: denied { read write } for pid=3591 comm="syz.0.30" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 300.225475][ T30] audit: type=1400 audit(299.790:168): avc: denied { open } for pid=3591 comm="syz.0.30" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 300.242214][ T30] audit: type=1400 audit(299.800:169): avc: denied { ioctl } for pid=3591 comm="syz.0.30" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 300.544842][ T30] audit: type=1400 audit(300.110:170): avc: denied { getopt } for pid=3591 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 303.441487][ T30] audit: type=1400 audit(303.010:171): avc: denied { create } for pid=3611 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 303.801657][ T30] audit: type=1400 audit(303.350:172): avc: denied { create } for pid=3611 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 304.878016][ T30] audit: type=1400 audit(304.440:173): avc: denied { append } for pid=3618 comm="syz.1.35" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 305.176751][ T30] audit: type=1400 audit(304.740:174): avc: denied { getopt } for pid=3619 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 305.180791][ T30] audit: type=1400 audit(304.750:175): avc: denied { write } for pid=3619 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 305.201243][ T3621] netlink: 5436 bytes leftover after parsing attributes in process `syz.0.36'. [ 305.232719][ T30] audit: type=1400 audit(304.800:176): avc: denied { allowed } for pid=3622 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 305.287265][ T30] audit: type=1400 audit(304.850:177): avc: denied { create } for pid=3622 comm="syz.1.37" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 305.321566][ T30] audit: type=1400 audit(304.890:178): avc: denied { map } for pid=3622 comm="syz.1.37" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5216 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 305.360427][ T30] audit: type=1400 audit(304.890:179): avc: denied { read write } for pid=3622 comm="syz.1.37" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5216 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 305.691256][ T30] audit: type=1400 audit(305.260:180): avc: denied { ioctl } for pid=3625 comm="syz.0.38" path="socket:[5223]" dev="sockfs" ino=5223 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 307.763919][ T3635] SELinux: Context system_u:object_r:lastlog_t:s0 is not valid (left unmapped). [ 308.451222][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 308.451934][ T30] audit: type=1400 audit(308.020:190): avc: denied { ioctl } for pid=3638 comm="syz.1.44" path="socket:[4326]" dev="sockfs" ino=4326 ioctlcmd=0x943f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 308.502058][ T30] audit: type=1400 audit(308.070:191): avc: denied { create } for pid=3638 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 308.513180][ T30] audit: type=1400 audit(308.080:192): avc: denied { write } for pid=3638 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 308.785982][ T30] audit: type=1400 audit(308.350:193): avc: denied { create } for pid=3640 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 308.793741][ T30] audit: type=1400 audit(308.360:194): avc: denied { write } for pid=3640 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 308.964621][ T30] audit: type=1400 audit(308.530:195): avc: denied { read } for pid=3638 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 309.824797][ T30] audit: type=1400 audit(309.390:196): avc: denied { create } for pid=3646 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 310.527723][ T30] audit: type=1400 audit(310.090:197): avc: denied { ioctl } for pid=3651 comm="syz.1.48" path="socket:[5255]" dev="sockfs" ino=5255 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 310.787195][ T30] audit: type=1400 audit(310.340:198): avc: denied { ioctl } for pid=3652 comm="syz.0.47" path="socket:[4362]" dev="sockfs" ino=4362 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 310.821198][ T30] audit: type=1400 audit(310.380:199): avc: denied { setopt } for pid=3652 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.162871][ T3665] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 312.189837][ T3665] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 314.420627][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 314.438385][ T30] audit: type=1400 audit(313.970:201): avc: denied { ioctl } for pid=3664 comm="syz.1.51" path="socket:[4391]" dev="sockfs" ino=4391 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 315.154304][ T30] audit: type=1400 audit(314.720:202): avc: denied { lock } for pid=3676 comm="syz.0.54" path="socket:[5282]" dev="sockfs" ino=5282 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 315.213446][ T30] audit: type=1400 audit(314.780:203): avc: denied { getopt } for pid=3677 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 315.287600][ T30] audit: type=1400 audit(314.850:204): avc: denied { checkpoint_restore } for pid=3676 comm="syz.0.54" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 316.388575][ T3684] capability: warning: `syz.0.55' uses 32-bit capabilities (legacy support in use) [ 316.489670][ T30] audit: type=1400 audit(316.060:205): avc: denied { connect } for pid=3681 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 317.081251][ T30] audit: type=1400 audit(316.650:206): avc: denied { append } for pid=3688 comm="syz.1.57" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 317.708926][ T3694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=3694 comm=syz.1.57 [ 317.759596][ T30] audit: type=1107 audit(317.320:207): pid=3688 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='(I%E vYj4(NjAs؁& aoxi E:GQJbR&NCŝl4Wnۅ(Fg%\nҞAd:6V10bVWi>+ɕN+HV&KyR-y]D^͑ЕRqY>] finish_task_switch.isra.0+0x1a8/0x854 [ 423.280729][ T4222] hardirqs last disabled at (396): [] el1_brk64+0x1c/0x48 [ 423.281033][ T4222] softirqs last enabled at (248): [] fpsimd_restore_current_state+0x44/0x6bc [ 423.281425][ T4222] softirqs last disabled at (246): [] fpsimd_restore_current_state+0x14/0x6bc [ 423.281802][ T4222] ---[ end trace 0000000000000000 ]--- [ 423.317737][ T30] audit: type=1400 audit(422.880:246): avc: denied { write } for pid=3312 comm="syz-executor" path="pipe:[2415]" dev="pipefs" ino=2415 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 423.364394][ T30] audit: type=1400 audit(422.930:247): avc: denied { allowed } for pid=4221 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 424.626152][ T119] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 424.888549][ T119] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.072064][ T119] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.290891][ T119] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.912455][ T30] audit: type=1400 audit(425.470:248): avc: denied { read } for pid=3162 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 426.117504][ T30] audit: type=1400 audit(425.680:249): avc: denied { search } for pid=3162 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 426.127993][ T30] audit: type=1400 audit(425.690:250): avc: denied { search } for pid=3162 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 426.129084][ T30] audit: type=1400 audit(425.690:251): avc: denied { search } for pid=3162 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 426.129553][ T30] audit: type=1400 audit(425.690:252): avc: denied { read } for pid=3162 comm="dhcpcd" name="n18" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 426.129990][ T30] audit: type=1400 audit(425.690:253): avc: denied { open } for pid=3162 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 426.130477][ T30] audit: type=1400 audit(425.690:254): avc: denied { getattr } for pid=3162 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.577823][ T119] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 427.639133][ T119] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 427.712491][ T119] bond0 (unregistering): Released all slaves [ 428.093801][ T119] hsr_slave_0: left promiscuous mode [ 428.117407][ T119] hsr_slave_1: left promiscuous mode [ 428.216047][ T119] veth1_macvtap: left promiscuous mode [ 428.224413][ T119] veth0_macvtap: left promiscuous mode [ 428.225655][ T119] veth1_vlan: left promiscuous mode [ 428.228706][ T119] veth0_vlan: left promiscuous mode [ 432.809768][ T30] audit: type=1400 audit(432.380:255): avc: denied { read open } for pid=4231 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=816 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 432.813315][ T30] audit: type=1400 audit(432.380:256): avc: denied { getattr } for pid=4231 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=816 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 432.949679][ T30] audit: type=1400 audit(432.500:257): avc: denied { add_name } for pid=4230 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 432.965362][ T30] audit: type=1400 audit(432.510:258): avc: denied { create } for pid=4230 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 432.967754][ T30] audit: type=1400 audit(432.510:259): avc: denied { write } for pid=4230 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1596 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 432.968284][ T30] audit: type=1400 audit(432.510:260): avc: denied { append } for pid=4230 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1596 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 433.359526][ T119] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.619784][ T119] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.831833][ T119] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.988524][ T119] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.035690][ T30] audit: type=1400 audit(433.600:261): avc: denied { remove_name } for pid=4233 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1596 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.043149][ T30] audit: type=1400 audit(433.610:262): avc: denied { unlink } for pid=4233 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1596 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 437.012420][ T119] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 437.106176][ T119] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 437.192839][ T119] bond0 (unregistering): Released all slaves [ 437.588862][ T119] hsr_slave_0: left promiscuous mode [ 437.609328][ T119] hsr_slave_1: left promiscuous mode [ 437.719627][ T119] veth1_macvtap: left promiscuous mode [ 437.720869][ T119] veth0_macvtap: left promiscuous mode [ 437.722314][ T119] veth1_vlan: left promiscuous mode [ 437.728782][ T119] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 10:01:19 Registers: info registers vcpu 0 CPU#0 PC=ffff800085443f54 X00=ffff800085443f50 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002e8f791 X04=ffff8000a2ce6ee0 X05=ffff70001459cda8 X06=ffff00001747bc80 X07=00000000f2f2f2f2 X08=00000000f3f3f300 X09=00000000f2000000 X10=00000000f204f204 X11=1ffff00010e363ac X12=ffff700010e363ad X13=000000000000002d X14=000000000000002d X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000873536b0 X20=ffff00001747bc80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087353680 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873536b0 X28=1fffe0000d4114b5 X29=ffff8000a2ce6c30 X30=ffff800080438d74 SP=ffff8000a2ce6c30 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=7369203231312372:6573755f64616572 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6f6974636e756620:64656e696c6e6920 Q06=636e75662064656e:696c6e6920746f6e Q07=5f65626f72705f66:706220736e6f6974 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe00235f0:0000ffffe00235f0 Q17=ffffff80ffffffd0:0000ffffe00235c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000809cbfbc X00=ffff00006a0bb9f0 X01=0000000100000001 X02=0000000000000004 X03=1fffe000029dd791 X04=ffff600001b8f1e0 X05=00000000f1f1f1f1 X06=ffff600001b8f1df X07=0000000000000001 X08=fffffdffc01c77f3 X09=0000000000000000 X10=ffff7fbff8038efe X11=1fffffbff8038ef3 X12=ffff600003f33b5e X13=0000000000000000 X14=00000000f3000000 X15=ffff000014eebc88 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000870aa548 X20=ffff8000873102a0 X21=ffff8000857f4400 X22=0000000000000001 X23=ffff8000873102a0 X24=0000000000000000 X25=ffff800080a5d56c X26=0000000000000000 X27=0000000000000078 X28=0000000000000003 X29=ffff8000a2ca7430 X30=ffff80008031dad4 SP=ffff8000a2ca7500 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000ffff821d6960:0000ffff821d6370 Q01=0000ffff821a5060:0000ffff821a40c0 Q02=0000ffff81eee6e0:0000ffff81eee0d0 Q03=0000ffff821d5d10:0000ffff821a4600 Q04=0000ffff821a55a0:0000ffff821a4b30 Q05=0000ffff81eee0d0:0000ffff821a5ad0 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000