last executing test programs: 5.074199417s ago: executing program 1 (id=1776): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) dup3(r1, r0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 4.421033691s ago: executing program 1 (id=1778): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = dup2(r0, r1) write$UHID_CREATE(r2, &(0x7f0000000c40)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0xb64, 0x1, 0x3, 0x10, 0x40}}, 0x11c) 3.853501471s ago: executing program 1 (id=1780): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000400), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) getpeername$unix(r0, 0x0, &(0x7f0000000140)) 3.598607204s ago: executing program 0 (id=1781): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x208000, 0x0) close_range(r0, r0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000017c0)) 3.393674304s ago: executing program 1 (id=1782): pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') write$P9_RGETATTR(r1, 0x0, 0x0) 2.89366633s ago: executing program 0 (id=1783): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f00000008c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0086401, &(0x7f0000000140)={0x0, 0x0}) 2.465990702s ago: executing program 0 (id=1784): r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) 1.917318911s ago: executing program 0 (id=1785): unshare(0x22020600) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 1.261814055s ago: executing program 0 (id=1786): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x6, 0xb, 0x0, &(0x7f0000000300)) 918.644002ms ago: executing program 0 (id=1787): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 381.36002ms ago: executing program 1 (id=1788): r0 = timerfd_create(0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='security.capability\x00', 0x0) dup2(r0, r1) timerfd_gettime(r1, &(0x7f0000000140)) 0s ago: executing program 1 (id=1789): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000003c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:16502' (ED25519) to the list of known hosts. [ 305.815644][ T30] audit: type=1400 audit(304.760:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 306.630535][ T30] audit: type=1400 audit(305.580:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 306.647559][ T30] audit: type=1400 audit(305.590:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 317.277887][ T30] audit: type=1400 audit(316.200:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 317.358197][ T30] audit: type=1400 audit(316.230:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 317.411886][ T3312] cgroup: Unknown subsys name 'net' [ 317.447477][ T30] audit: type=1400 audit(316.400:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 317.988359][ T3312] cgroup: Unknown subsys name 'cpuset' [ 318.201888][ T3312] cgroup: Unknown subsys name 'rlimit' [ 318.727701][ T30] audit: type=1400 audit(317.640:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.728653][ T30] audit: type=1400 audit(317.670:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 318.754156][ T30] audit: type=1400 audit(317.670:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 320.052959][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 320.097384][ T30] audit: type=1400 audit(319.030:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.098173][ T30] audit: type=1400 audit(319.040:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 320.416534][ T30] audit: type=1400 audit(319.350:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.417515][ T30] audit: type=1400 audit(319.360:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.464514][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 358.156995][ T30] audit: type=1400 audit(357.100:59): avc: denied { execmem } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 358.377364][ T30] audit: type=1400 audit(357.320:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 358.400742][ T30] audit: type=1400 audit(357.340:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 358.454075][ T30] audit: type=1400 audit(357.390:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 358.579762][ T30] audit: type=1400 audit(357.530:63): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 358.992627][ T30] audit: type=1400 audit(357.930:64): avc: denied { sys_module } for pid=3318 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 369.559691][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 369.611739][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 370.634067][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 370.683921][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.563909][ T3317] hsr_slave_0: entered promiscuous mode [ 374.603512][ T3317] hsr_slave_1: entered promiscuous mode [ 375.656976][ T3318] hsr_slave_0: entered promiscuous mode [ 375.671099][ T3318] hsr_slave_1: entered promiscuous mode [ 375.682602][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 375.691841][ T3318] Cannot create hsr debugfs directory [ 379.664410][ T30] audit: type=1400 audit(378.610:65): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 379.686660][ T30] audit: type=1400 audit(378.620:66): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 379.689614][ T30] audit: type=1400 audit(378.620:67): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 379.751387][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 379.853839][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 379.914630][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 379.980737][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 381.153744][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 381.252826][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 381.321989][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 381.392828][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 385.316952][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 386.650148][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.392822][ T3317] veth0_vlan: entered promiscuous mode [ 401.569958][ T3317] veth1_vlan: entered promiscuous mode [ 402.075750][ T3317] veth0_macvtap: entered promiscuous mode [ 402.163948][ T3317] veth1_macvtap: entered promiscuous mode [ 402.747179][ T26] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 402.760117][ T26] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 402.764370][ T26] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 402.773700][ T26] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.262141][ T3318] veth0_vlan: entered promiscuous mode [ 403.718487][ T3318] veth1_vlan: entered promiscuous mode [ 403.764573][ T30] audit: type=1400 audit(402.700:68): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 403.790199][ T30] audit: type=1400 audit(402.740:69): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.eEbP1j/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 403.828170][ T30] audit: type=1400 audit(402.770:70): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 403.874450][ T30] audit: type=1400 audit(402.820:71): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.eEbP1j/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 403.900788][ T30] audit: type=1400 audit(402.850:72): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.eEbP1j/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 404.004368][ T30] audit: type=1400 audit(402.950:73): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 404.046907][ T30] audit: type=1400 audit(402.990:74): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 404.059108][ T30] audit: type=1400 audit(403.010:75): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=2939 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 404.149008][ T30] audit: type=1400 audit(403.080:76): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 404.149980][ T30] audit: type=1400 audit(403.100:77): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 404.709228][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 404.714134][ T3318] veth0_macvtap: entered promiscuous mode [ 404.822717][ T3318] veth1_macvtap: entered promiscuous mode [ 405.790139][ T3397] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.790956][ T3397] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.791658][ T3397] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.791992][ T3397] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 414.199471][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 414.208284][ T30] audit: type=1400 audit(413.150:82): avc: denied { create } for pid=3485 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 414.249781][ T30] audit: type=1400 audit(413.190:83): avc: denied { ioctl } for pid=3485 comm="syz.0.9" path="socket:[3012]" dev="sockfs" ino=3012 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 414.259127][ T30] audit: type=1400 audit(413.210:84): avc: denied { prog_load } for pid=3485 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 414.281183][ T30] audit: type=1400 audit(413.230:85): avc: denied { bpf } for pid=3485 comm="syz.0.9" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.729462][ T3494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=3494 comm=syz.0.13 [ 426.671511][ T30] audit: type=1400 audit(425.610:86): avc: denied { map_create } for pid=3547 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 426.722226][ T30] audit: type=1400 audit(425.670:87): avc: denied { map_read map_write } for pid=3547 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.258844][ T30] audit: type=1400 audit(427.200:88): avc: denied { read } for pid=3551 comm="syz.1.41" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 428.259804][ T30] audit: type=1400 audit(427.200:89): avc: denied { open } for pid=3551 comm="syz.1.41" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 428.306420][ T30] audit: type=1400 audit(427.250:90): avc: denied { read } for pid=3551 comm="syz.1.41" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 428.320616][ T30] audit: type=1400 audit(427.270:91): avc: denied { open } for pid=3551 comm="syz.1.41" path="/dev/dma_heap/system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 428.483145][ T3554] capability: warning: `syz.0.42' uses 32-bit capabilities (legacy support in use) [ 429.852749][ T30] audit: type=1400 audit(428.800:92): avc: denied { create } for pid=3559 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 429.950033][ T30] audit: type=1400 audit(428.890:93): avc: denied { write } for pid=3559 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 442.350547][ T30] audit: type=1400 audit(441.300:94): avc: denied { ioctl } for pid=3619 comm="syz.1.74" path="socket:[4282]" dev="sockfs" ino=4282 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 445.661448][ T30] audit: type=1400 audit(444.610:95): avc: denied { create } for pid=3633 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 445.792804][ T30] audit: type=1400 audit(444.730:96): avc: denied { write } for pid=3633 comm="syz.0.81" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 446.566361][ T30] audit: type=1400 audit(445.510:97): avc: denied { read write } for pid=3639 comm="syz.1.84" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 446.573765][ T30] audit: type=1400 audit(445.520:98): avc: denied { open } for pid=3639 comm="syz.1.84" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 446.598143][ T30] audit: type=1400 audit(445.550:99): avc: denied { ioctl } for pid=3639 comm="syz.1.84" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 448.457117][ T30] audit: type=1400 audit(447.400:100): avc: denied { read write } for pid=3648 comm="syz.1.88" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 448.464518][ T30] audit: type=1400 audit(447.410:101): avc: denied { open } for pid=3648 comm="syz.1.88" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 452.188705][ T30] audit: type=1400 audit(451.120:102): avc: denied { create } for pid=3665 comm="syz.0.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 452.253588][ T30] audit: type=1400 audit(451.200:103): avc: denied { write } for pid=3665 comm="syz.0.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 467.029034][ T3725] capability: warning: `syz.1.125' uses deprecated v2 capabilities in a way that may be insecure [ 468.880819][ T30] audit: type=1400 audit(467.830:104): avc: denied { create } for pid=3733 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 468.974418][ T30] audit: type=1400 audit(467.920:105): avc: denied { write } for pid=3733 comm="syz.0.130" path="socket:[4449]" dev="sockfs" ino=4449 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 472.152998][ T30] audit: type=1400 audit(471.100:106): avc: denied { create } for pid=3751 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 472.219936][ T30] audit: type=1400 audit(471.170:107): avc: denied { write } for pid=3751 comm="syz.1.139" path="socket:[5529]" dev="sockfs" ino=5529 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 474.628663][ T30] audit: type=1400 audit(473.570:108): avc: denied { read } for pid=3764 comm="syz.1.145" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 474.643847][ T30] audit: type=1400 audit(473.590:109): avc: denied { open } for pid=3764 comm="syz.1.145" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 474.879602][ T30] audit: type=1400 audit(473.820:110): avc: denied { ioctl } for pid=3764 comm="syz.1.145" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 475.765525][ C1] vkms_vblank_simulate: vblank timer overrun [ 478.403345][ C1] vkms_vblank_simulate: vblank timer overrun [ 493.640260][ T3833] binfmt_misc: register: failed to install interpreter file ./bus [ 502.280741][ T30] audit: type=1400 audit(501.230:111): avc: denied { connect } for pid=3864 comm="syz.0.190" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 507.579832][ T30] audit: type=1400 audit(506.520:112): avc: denied { create } for pid=3892 comm="syz.1.205" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 507.621795][ T30] audit: type=1400 audit(506.570:113): avc: denied { ioctl } for pid=3892 comm="syz.1.205" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4751 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 510.829881][ T3910] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 510.949775][ T30] audit: type=1400 audit(509.880:114): avc: denied { ioctl } for pid=3909 comm="syz.1.212" path="socket:[5729]" dev="sockfs" ino=5729 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 522.755193][ C0] vkms_vblank_simulate: vblank timer overrun [ 522.793625][ T30] audit: type=1400 audit(521.730:115): avc: denied { read write } for pid=3958 comm="syz.0.234" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 522.833749][ T30] audit: type=1400 audit(521.760:116): avc: denied { open } for pid=3958 comm="syz.0.234" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 523.905789][ C0] vkms_vblank_simulate: vblank timer overrun [ 525.225542][ C0] vkms_vblank_simulate: vblank timer overrun [ 525.313442][ C0] vkms_vblank_simulate: vblank timer overrun [ 527.493913][ T30] audit: type=1400 audit(526.440:117): avc: denied { execute } for pid=3977 comm="syz.1.243" path="/125/file1" dev="tmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 528.289521][ T30] audit: type=1400 audit(527.230:118): avc: denied { bind } for pid=3981 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 528.412677][ T30] audit: type=1400 audit(527.340:119): avc: denied { validate_trans } for pid=3982 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 533.073241][ T30] audit: type=1400 audit(532.000:120): avc: denied { create } for pid=4001 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 551.412093][ T30] audit: type=1400 audit(550.360:121): avc: denied { read } for pid=4090 comm="syz.1.300" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 551.423626][ T30] audit: type=1400 audit(550.370:122): avc: denied { open } for pid=4090 comm="syz.1.300" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 551.541785][ T30] audit: type=1400 audit(550.490:123): avc: denied { ioctl } for pid=4090 comm="syz.1.300" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x70cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.520833][ T30] audit: type=1400 audit(561.470:124): avc: denied { perfmon } for pid=4144 comm="syz.0.326" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 562.631803][ T30] audit: type=1400 audit(561.580:125): avc: denied { prog_run } for pid=4144 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 566.771316][ T30] audit: type=1400 audit(565.720:126): avc: denied { write } for pid=4162 comm="syz.1.334" name="kcm" dev="proc" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 566.964029][ T30] audit: type=1400 audit(565.910:127): avc: denied { open } for pid=4164 comm="syz.0.335" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 567.926663][ T30] audit: type=1400 audit(566.860:128): avc: denied { allowed } for pid=4168 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 567.994238][ T30] audit: type=1400 audit(566.940:129): avc: denied { map } for pid=4168 comm="syz.0.337" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 568.019445][ T30] audit: type=1400 audit(566.940:130): avc: denied { read write } for pid=4168 comm="syz.0.337" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 592.686057][ T30] audit: type=1400 audit(591.620:131): avc: denied { setopt } for pid=4288 comm="syz.0.395" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 610.959480][ T30] audit: type=1400 audit(609.910:132): avc: denied { create } for pid=4360 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 611.056798][ T30] audit: type=1400 audit(609.960:133): avc: denied { setopt } for pid=4360 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 611.908573][ T30] audit: type=1400 audit(610.860:134): avc: denied { getopt } for pid=4364 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 618.906122][ T30] audit: type=1400 audit(617.850:135): avc: denied { ioctl } for pid=4397 comm="syz.0.448" path="/dev/ptyq5" dev="devtmpfs" ino=116 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 633.622488][ T30] audit: type=1400 audit(632.570:136): avc: denied { create } for pid=4463 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 633.672626][ T30] audit: type=1400 audit(632.620:137): avc: denied { write } for pid=4463 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 635.392293][ T30] audit: type=1400 audit(634.340:138): avc: denied { mounton } for pid=4473 comm="syz.0.486" path="/236/file0" dev="tmpfs" ino=1229 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 635.442345][ T30] audit: type=1400 audit(634.380:139): avc: denied { mount } for pid=4473 comm="syz.0.486" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 635.657530][ T30] audit: type=1400 audit(634.560:140): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 644.367328][ T4522] Zero length message leads to an empty skb [ 661.042314][ T4598] binfmt_misc: register: failed to install interpreter file ./bus [ 680.668235][ T30] audit: type=1400 audit(679.610:141): avc: denied { bind } for pid=4687 comm="syz.0.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 680.872985][ T30] audit: type=1400 audit(679.800:142): avc: denied { accept } for pid=4687 comm="syz.0.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 682.218681][ T30] audit: type=1400 audit(681.170:143): avc: denied { create } for pid=4694 comm="syz.1.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 687.133764][ T30] audit: type=1400 audit(686.080:144): avc: denied { create } for pid=4715 comm="syz.1.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 687.169843][ T30] audit: type=1400 audit(686.110:145): avc: denied { setopt } for pid=4715 comm="syz.1.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 695.554066][ T30] audit: type=1400 audit(694.500:146): avc: denied { setattr } for pid=4753 comm="syz.0.620" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 715.979847][ T30] audit: type=1400 audit(714.910:147): avc: denied { write } for pid=4841 comm="syz.0.662" path="socket:[9398]" dev="sockfs" ino=9398 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 720.190054][ T30] audit: type=1400 audit(719.140:148): avc: denied { write } for pid=4860 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 720.241850][ T30] audit: type=1400 audit(719.170:149): avc: denied { nlmsg_read } for pid=4860 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 720.361941][ T30] audit: type=1400 audit(719.310:150): avc: denied { read } for pid=4860 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 723.033253][ T30] audit: type=1400 audit(721.930:151): avc: denied { map } for pid=4872 comm="syz.0.678" path="socket:[8725]" dev="sockfs" ino=8725 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 729.802477][ T30] audit: type=1400 audit(728.750:152): avc: denied { write } for pid=4906 comm="syz.0.695" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 731.754242][ T4919] binfmt_misc: register: failed to install interpreter file ./file0 [ 738.878476][ T4963] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4963 comm=syz.0.722 [ 740.946326][ T30] audit: type=1400 audit(739.890:153): avc: denied { setopt } for pid=4973 comm="syz.0.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 743.029716][ T4986] netlink: 4083 bytes leftover after parsing attributes in process `syz.0.732'. [ 744.310911][ T4991] block nbd1: shutting down sockets [ 751.511718][ T30] audit: type=1400 audit(750.460:154): avc: denied { create } for pid=5036 comm="syz.1.756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.734049][ T30] audit: type=1400 audit(751.680:155): avc: denied { write } for pid=5046 comm="syz.1.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 759.481963][ T30] audit: type=1400 audit(758.430:156): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 766.603392][ T30] audit: type=1400 audit(765.550:157): avc: denied { create } for pid=5124 comm="syz.0.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 766.628823][ T30] audit: type=1400 audit(765.580:158): avc: denied { ioctl } for pid=5124 comm="syz.0.799" path="socket:[9165]" dev="sockfs" ino=9165 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 767.170031][ T30] audit: type=1400 audit(766.120:159): avc: denied { create } for pid=5127 comm="syz.1.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 767.203417][ T30] audit: type=1400 audit(766.140:160): avc: denied { write } for pid=5127 comm="syz.1.801" path="socket:[9917]" dev="sockfs" ino=9917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 772.953157][ T30] audit: type=1400 audit(771.900:161): avc: denied { create } for pid=5170 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 773.002554][ T30] audit: type=1400 audit(771.950:162): avc: denied { setopt } for pid=5170 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 777.639460][ T30] audit: type=1400 audit(776.590:163): avc: denied { setopt } for pid=5206 comm="syz.1.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 778.147344][ T30] audit: type=1400 audit(777.090:164): avc: denied { read } for pid=5210 comm="syz.0.842" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 778.151249][ T30] audit: type=1400 audit(777.090:165): avc: denied { open } for pid=5210 comm="syz.0.842" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 778.261369][ T30] audit: type=1400 audit(777.210:166): avc: denied { write } for pid=5210 comm="syz.0.842" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 791.915772][ T30] audit: type=1400 audit(790.840:167): avc: denied { create } for pid=5304 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 791.916313][ T30] audit: type=1400 audit(790.850:168): avc: denied { write } for pid=5304 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 792.500743][ T30] audit: type=1400 audit(791.450:169): avc: denied { ioctl } for pid=5306 comm="syz.1.887" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 796.090398][ T30] audit: type=1400 audit(795.040:170): avc: denied { append } for pid=5319 comm="syz.1.893" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 796.106876][ T30] audit: type=1400 audit(795.050:171): avc: denied { open } for pid=5319 comm="syz.1.893" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 799.602861][ T30] audit: type=1400 audit(798.550:172): avc: denied { read } for pid=5334 comm="syz.0.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 814.666501][ T30] audit: type=1400 audit(813.600:173): avc: denied { create } for pid=5443 comm="syz.0.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 814.779953][ T30] audit: type=1400 audit(813.710:174): avc: denied { write } for pid=5443 comm="syz.0.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 819.953830][ T5486] loop7: detected capacity change from 0 to 7 [ 833.070646][ T30] audit: type=1400 audit(832.020:175): avc: denied { create } for pid=5521 comm="syz.1.989" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 833.141580][ T30] audit: type=1400 audit(832.070:176): avc: denied { read } for pid=5521 comm="syz.1.989" name="file2" dev="tmpfs" ino=2576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 833.142480][ T30] audit: type=1400 audit(832.090:177): avc: denied { open } for pid=5521 comm="syz.1.989" path="/501/file2" dev="tmpfs" ino=2576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 833.186260][ T30] audit: type=1400 audit(832.130:178): avc: denied { ioctl } for pid=5521 comm="syz.1.989" path="/501/file2" dev="tmpfs" ino=2576 ioctlcmd=0x4c07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 833.419098][ T30] audit: type=1400 audit(832.340:179): avc: denied { unlink } for pid=3318 comm="syz-executor" name="file2" dev="tmpfs" ino=2576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 842.393487][ T30] audit: type=1400 audit(841.340:180): avc: denied { read write } for pid=5585 comm="syz.1.1025" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 842.420335][ T30] audit: type=1400 audit(841.370:181): avc: denied { open } for pid=5585 comm="syz.1.1025" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 842.481850][ T30] audit: type=1400 audit(841.430:182): avc: denied { setattr } for pid=5585 comm="syz.1.1025" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 842.621537][ T5586] block nbd0: shutting down sockets [ 849.674348][ T30] audit: type=1400 audit(848.620:183): avc: denied { write } for pid=5634 comm="syz.1.1046" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 849.720064][ T30] audit: type=1400 audit(848.670:184): avc: denied { ioctl } for pid=5634 comm="syz.1.1046" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 849.768403][ T5636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 849.790418][ T5636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 850.856253][ T30] audit: type=1400 audit(849.790:185): avc: denied { mount } for pid=5641 comm="syz.0.1049" name="/" dev="hugetlbfs" ino=11844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 850.869684][ T30] audit: type=1400 audit(849.820:186): avc: denied { remount } for pid=5641 comm="syz.0.1049" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 851.071389][ T30] audit: type=1400 audit(850.020:187): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 853.567204][ T30] audit: type=1400 audit(852.460:188): avc: denied { read } for pid=5655 comm="syz.0.1055" path="socket:[11857]" dev="sockfs" ino=11857 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 864.149481][ T30] audit: type=1400 audit(863.100:189): avc: denied { ioctl } for pid=5720 comm="syz.1.1086" path="socket:[11979]" dev="sockfs" ino=11979 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 865.080745][ T30] audit: type=1400 audit(864.030:190): avc: denied { read } for pid=5720 comm="syz.1.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 869.050613][ T5748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5748 comm=syz.1.1099 [ 870.669967][ T30] audit: type=1400 audit(869.620:191): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 874.229600][ T5771] syz.0.1109(5771): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 878.428033][ T30] audit: type=1400 audit(877.380:192): avc: denied { bind } for pid=5802 comm="syz.1.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 878.442464][ T30] audit: type=1400 audit(877.380:193): avc: denied { node_bind } for pid=5802 comm="syz.1.1125" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 882.710896][ T30] audit: type=1400 audit(881.660:194): avc: denied { read } for pid=5826 comm="syz.0.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 885.372697][ T30] audit: type=1400 audit(884.320:195): avc: denied { name_bind } for pid=5841 comm="syz.1.1144" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 900.760801][ T30] audit: type=1400 audit(899.710:196): avc: denied { read } for pid=5943 comm="syz.1.1193" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 902.147590][ T30] audit: type=1400 audit(901.090:197): avc: denied { connect } for pid=5952 comm="syz.0.1197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.672030][ T30] audit: type=1400 audit(901.620:198): avc: denied { write } for pid=5952 comm="syz.0.1197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 906.379562][ T5978] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5978 comm=syz.0.1208 [ 921.272595][ T30] audit: type=1400 audit(920.220:199): avc: denied { getopt } for pid=6059 comm="syz.1.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 927.221744][ T30] audit: type=1400 audit(926.170:200): avc: denied { name_bind } for pid=6093 comm="syz.1.1265" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 927.229867][ T6094] loop7: detected capacity change from 0 to 7 [ 927.252874][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.254672][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 927.284137][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.285592][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 927.297884][ T6094] loop7: unable to read partition table [ 927.328655][ T6094] loop_reread_partitions: partition scan of loop7 (gCj̖P=!MX %`搘ȵ4FLQk݊5) failed (rc=-5) [ 927.387696][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.388383][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 927.413054][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.413770][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 927.417051][ T6094] loop7: unable to read partition table [ 927.931666][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.932403][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 927.955625][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 927.956286][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 928.011726][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 928.012479][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 928.113978][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 928.114619][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 928.279224][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 928.280033][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 939.026744][ T30] audit: type=1400 audit(937.970:201): avc: denied { mount } for pid=6152 comm="syz.0.1293" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 939.054606][ T30] audit: type=1400 audit(938.000:202): avc: denied { unmount } for pid=6152 comm="syz.0.1293" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 941.561509][ T30] audit: type=1400 audit(940.500:203): avc: denied { create } for pid=6162 comm="syz.1.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 941.586629][ T30] audit: type=1400 audit(940.530:204): avc: denied { connect } for pid=6162 comm="syz.1.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 941.710194][ T30] audit: type=1400 audit(940.660:205): avc: denied { shutdown } for pid=6162 comm="syz.1.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 941.729946][ T30] audit: type=1400 audit(940.680:206): avc: denied { write } for pid=6162 comm="syz.1.1298" path="socket:[13742]" dev="sockfs" ino=13742 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 943.631316][ T30] audit: type=1400 audit(942.580:207): avc: denied { mounton } for pid=6178 comm="syz.1.1306" path="/656/file0" dev="tmpfs" ino=3391 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 944.293197][ T30] audit: type=1400 audit(943.240:208): avc: denied { checkpoint_restore } for pid=6182 comm="syz.0.1308" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 948.062553][ T6200] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 948.089006][ T6200] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 953.250744][ T30] audit: type=1400 audit(952.180:209): avc: denied { ioctl } for pid=6223 comm="syz.1.1328" path="socket:[13847]" dev="sockfs" ino=13847 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 957.150471][ T30] audit: type=1400 audit(956.100:210): avc: denied { block_suspend } for pid=6245 comm="syz.0.1338" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 961.642999][ T6272] cgroup: Unknown subsys name 'cpuset' [ 967.379689][ T30] audit: type=1400 audit(966.330:211): avc: denied { write } for pid=6305 comm="syz.0.1368" name="file0" dev="tmpfs" ino=3535 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 974.477820][ T30] audit: type=1326 audit(973.420:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6352 comm="syz.0.1392" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 977.562486][ T30] audit: type=1400 audit(976.510:213): avc: denied { remount } for pid=6369 comm="syz.0.1399" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 988.683705][ T30] audit: type=1400 audit(987.630:214): avc: denied { write } for pid=6438 comm="syz.0.1433" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 991.268638][ T6456] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1441'. [ 991.297110][ T6456] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1441'. [ 998.156379][ T30] audit: type=1400 audit(997.080:215): avc: denied { mount } for pid=6492 comm="syz.1.1459" name="/" dev="ramfs" ino=14301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1019.815520][ T30] audit: type=1400 audit(1018.760:216): avc: denied { execute } for pid=6573 comm="syz.0.1497" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 1020.438848][ T6578] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6578 comm=syz.0.1499 [ 1021.202958][ T30] audit: type=1400 audit(1020.150:217): avc: denied { connect } for pid=6579 comm="syz.0.1500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1025.110287][ T30] audit: type=1400 audit(1024.060:218): avc: denied { wake_alarm } for pid=6597 comm="syz.1.1509" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1049.879869][ T6699] raw_sendmsg: syz.1.1558 forgot to set AF_INET. Fix it! [ 1052.563343][ T30] audit: type=1400 audit(2000000027.340:219): avc: denied { ioctl } for pid=6715 comm="syz.1.1567" path="socket:[15755]" dev="sockfs" ino=15755 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1052.598154][ T30] audit: type=1400 audit(2000000027.370:220): avc: denied { write } for pid=6715 comm="syz.1.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1054.873319][ T6733] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1088.482906][ T30] audit: type=1400 audit(2000000063.260:221): avc: denied { connect } for pid=6934 comm="syz.1.1668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1094.506534][ T30] audit: type=1400 audit(2000000069.280:222): avc: denied { name_bind } for pid=6976 comm="syz.1.1688" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1094.507363][ T30] audit: type=1400 audit(2000000069.280:223): avc: denied { node_bind } for pid=6976 comm="syz.1.1688" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1095.631897][ T30] audit: type=1400 audit(2000000070.410:224): avc: denied { read } for pid=6984 comm="syz.1.1692" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1095.652458][ T30] audit: type=1400 audit(2000000070.410:225): avc: denied { open } for pid=6984 comm="syz.1.1692" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1095.694731][ T30] audit: type=1400 audit(2000000070.470:226): avc: denied { ioctl } for pid=6984 comm="syz.1.1692" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1098.421029][ T7005] ALSA: seq fatal error: cannot create timer (-22) [ 1109.873898][ T7064] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=7064 comm=syz.0.1728 [ 1110.611861][ T30] audit: type=1400 audit(2000000085.390:227): avc: denied { connect } for pid=7067 comm="syz.0.1730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1110.661714][ T30] audit: type=1400 audit(2000000085.430:228): avc: denied { write } for pid=7067 comm="syz.0.1730" laddr=fe80::60c8:2fff:fe53:7049 lport=1 faddr=ff02::1 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1111.481108][ T30] audit: type=1400 audit(2000000086.260:229): avc: denied { write } for pid=7073 comm="syz.1.1733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1115.029178][ T30] audit: type=1400 audit(2000000089.810:230): avc: denied { setopt } for pid=7096 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1115.052994][ T30] audit: type=1400 audit(2000000089.830:231): avc: denied { getopt } for pid=7096 comm="syz.1.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1127.461759][ T30] audit: type=1400 audit(2000000102.240:232): avc: denied { read } for pid=7178 comm="syz.0.1785" dev="nsfs" ino=4026532893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1127.491834][ T30] audit: type=1400 audit(2000000102.250:233): avc: denied { open } for pid=7178 comm="syz.0.1785" path="pid:[4026532893]" dev="nsfs" ino=4026532893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1127.539730][ T30] audit: type=1400 audit(2000000102.320:234): avc: denied { ioctl } for pid=7178 comm="syz.0.1785" path="pid:[4026532893]" dev="nsfs" ino=4026532893 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1129.249540][ T7184] nbd0: detected capacity change from 0 to 127 [ 1129.317050][ T49] block nbd0: Receive control failed (result -32) [ 1129.321422][ T893] block nbd0: Receive control failed (result -32) [ 1129.390949][ T6988] [ 1129.393749][ T6988] ====================================================== [ 1129.394168][ T6988] WARNING: possible circular locking dependency detected [ 1129.395391][ T6988] syzkaller #0 Not tainted [ 1129.395842][ T6988] ------------------------------------------------------ [ 1129.396262][ T6988] udevd/6988 is trying to acquire lock: [ 1129.397488][ T6988] ffff00001e68bc70 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 1129.400750][ T6988] [ 1129.400750][ T6988] but task is already holding lock: [ 1129.401150][ T6988] ffff0000148151f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 1129.401906][ T6988] [ 1129.401906][ T6988] which lock already depends on the new lock. [ 1129.401906][ T6988] [ 1129.402325][ T6988] [ 1129.402325][ T6988] the existing dependency chain (in reverse order) is: [ 1129.402749][ T6988] [ 1129.402749][ T6988] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 1129.403514][ T6988] __mutex_lock+0x144/0xffc [ 1129.403868][ T6988] mutex_lock_nested+0x24/0x30 [ 1129.404289][ T6988] nbd_queue_rq+0xa8/0xb54 [ 1129.404617][ T6988] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1129.405207][ T6988] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1129.405640][ T6988] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1129.405979][ T6988] blk_mq_run_hw_queue+0x1e4/0x500 [ 1129.406302][ T6988] blk_mq_dispatch_list+0x348/0xa50 [ 1129.406632][ T6988] blk_mq_flush_plug_list+0xe8/0x508 [ 1129.406987][ T6988] __blk_flush_plug+0x208/0x3b8 [ 1129.408136][ T6988] __submit_bio+0x3a4/0x4ac [ 1129.409241][ T6988] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1129.410738][ T6988] submit_bio_noacct+0x858/0x18f8 [ 1129.412304][ T6988] submit_bio+0x32c/0x5f0 [ 1129.412874][ T6988] submit_bh_wbc+0x310/0x480 [ 1129.414206][ T6988] block_read_full_folio+0x26c/0x640 [ 1129.414695][ T6988] blkdev_read_folio+0x1c/0x28 [ 1129.416211][ T6988] filemap_read_folio+0xac/0x1fc [ 1129.417877][ T6988] do_read_cache_folio+0x1c4/0x480 [ 1129.419619][ T6988] read_cache_folio+0x44/0x6c [ 1129.420923][ T6988] read_part_sector+0xac/0x5f4 [ 1129.422145][ T6988] read_lba+0x15c/0x2ec [ 1129.423228][ T6988] efi_partition+0x1dc/0x2154 [ 1129.424360][ T6988] bdev_disk_changed+0x508/0xf0c [ 1129.425873][ T6988] blkdev_get_whole+0x144/0x1e4 [ 1129.427301][ T6988] bdev_open+0x1dc/0xa84 [ 1129.428676][ T6988] blkdev_open+0x1d4/0x324 [ 1129.429978][ T6988] do_dentry_open+0x6a4/0x103c [ 1129.431230][ T6988] vfs_open+0x5c/0x2fc [ 1129.432375][ T6988] path_openat+0x1490/0x24b4 [ 1129.433542][ T6988] do_filp_open+0x184/0x360 [ 1129.434594][ T6988] do_sys_openat2+0xe0/0x160 [ 1129.436237][ T6988] __arm64_sys_openat+0x12c/0x1bc [ 1129.438167][ T6988] invoke_syscall+0x6c/0x258 [ 1129.439806][ T6988] el0_svc_common.constprop.0+0xac/0x230 [ 1129.441211][ T6988] do_el0_svc+0x40/0x58 [ 1129.441855][ T6988] el0_svc+0x50/0x1a0 [ 1129.442204][ T6988] el0t_64_sync_handler+0xa0/0xe4 [ 1129.442546][ T6988] el0t_64_sync+0x198/0x19c [ 1129.443031][ T6988] [ 1129.443031][ T6988] -> #5 (set->srcu){.+.+}-{0:0}: [ 1129.443831][ T6988] __synchronize_srcu+0xa8/0x268 [ 1129.444258][ T6988] synchronize_srcu+0x12c/0x370 [ 1129.444592][ T6988] blk_mq_quiesce_queue+0xf4/0x15c [ 1129.444917][ T6988] elevator_switch+0x11c/0x414 [ 1129.445277][ T6988] elevator_change+0x294/0x424 [ 1129.446587][ T6988] elevator_set_default+0x22c/0x2ac [ 1129.446944][ T6988] blk_register_queue+0x278/0x3ac [ 1129.447346][ T6988] __add_disk+0x518/0xb80 [ 1129.447696][ T6988] add_disk_fwnode+0x114/0x4c0 [ 1129.448046][ T6988] device_add_disk+0x14/0x20 [ 1129.448373][ T6988] nbd_dev_add+0x5f0/0x9c0 [ 1129.448844][ T6988] nbd_init+0xd4/0x1a8 [ 1129.449207][ T6988] do_one_initcall+0x130/0x7f0 [ 1129.449582][ T6988] kernel_init_freeable+0x48c/0x70c [ 1129.450047][ T6988] kernel_init+0x24/0x1dc [ 1129.450480][ T6988] ret_from_fork+0x10/0x20 [ 1129.450876][ T6988] [ 1129.450876][ T6988] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 1129.452110][ T6988] __mutex_lock+0x144/0xffc [ 1129.452537][ T6988] mutex_lock_nested+0x24/0x30 [ 1129.452856][ T6988] elevator_change+0x130/0x424 [ 1129.453178][ T6988] elevator_set_none+0x90/0xe4 [ 1129.453536][ T6988] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 1129.453966][ T6988] blk_mq_update_nr_hw_queues+0x44/0x68 [ 1129.454311][ T6988] nbd_start_device+0x128/0xa38 [ 1129.454631][ T6988] nbd_genl_connect+0xcb4/0x14c4 [ 1129.455191][ T6988] genl_family_rcv_msg_doit+0x1b8/0x280 [ 1129.455570][ T6988] genl_rcv_msg+0x3ec/0x5bc [ 1129.456093][ T6988] netlink_rcv_skb+0x19c/0x338 [ 1129.456419][ T6988] genl_rcv+0x38/0x50 [ 1129.456716][ T6988] netlink_unicast+0x424/0x700 [ 1129.457109][ T6988] netlink_sendmsg+0x644/0xa54 [ 1129.457439][ T6988] __sock_sendmsg+0xc8/0x168 [ 1129.457795][ T6988] ____sys_sendmsg+0x500/0x764 [ 1129.458246][ T6988] ___sys_sendmsg+0x11c/0x19c [ 1129.458575][ T6988] __sys_sendmsg+0x114/0x19c [ 1129.458911][ T6988] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1129.459489][ T6988] invoke_syscall+0x6c/0x258 [ 1129.459857][ T6988] el0_svc_common.constprop.0+0xac/0x230 [ 1129.460351][ T6988] do_el0_svc_compat+0x40/0x68 [ 1129.460711][ T6988] el0_svc_compat+0x4c/0x184 [ 1129.461069][ T6988] el0t_32_sync_handler+0x88/0xac [ 1129.461533][ T6988] el0t_32_sync+0x19c/0x1a0 [ 1129.461977][ T6988] [ 1129.461977][ T6988] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 1129.462942][ T6988] blk_alloc_queue+0x538/0x644 [ 1129.463268][ T6988] blk_mq_alloc_queue+0x144/0x220 [ 1129.463582][ T6988] __blk_mq_alloc_disk+0x20/0x1a4 [ 1129.464021][ T6988] nbd_dev_add+0x3c0/0x9c0 [ 1129.464462][ T6988] nbd_init+0xd4/0x1a8 [ 1129.464933][ T6988] do_one_initcall+0x130/0x7f0 [ 1129.465283][ T6988] kernel_init_freeable+0x48c/0x70c [ 1129.465672][ T6988] kernel_init+0x24/0x1dc [ 1129.466013][ T6988] ret_from_fork+0x10/0x20 [ 1129.466320][ T6988] [ 1129.466320][ T6988] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 1129.466946][ T6988] fs_reclaim_acquire+0x138/0x160 [ 1129.467287][ T6988] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 1129.467651][ T6988] __alloc_skb+0x208/0x2f0 [ 1129.467958][ T6988] tcp_stream_alloc_skb+0x2c/0x450 [ 1129.468303][ T6988] tcp_sendmsg_locked+0xf34/0x39e8 [ 1129.468650][ T6988] tcp_sendmsg+0x38/0x60 [ 1129.469075][ T6988] inet_sendmsg+0x90/0xd4 [ 1129.469541][ T6988] __sock_sendmsg+0xc8/0x168 [ 1129.469866][ T6988] sock_write_iter+0x1cc/0x300 [ 1129.470192][ T6988] vfs_write+0x7bc/0xb88 [ 1129.470526][ T6988] ksys_write+0x18c/0x1d8 [ 1129.470897][ T6988] __arm64_sys_write+0x6c/0x9c [ 1129.471461][ T6988] invoke_syscall+0x6c/0x258 [ 1129.471792][ T6988] el0_svc_common.constprop.0+0xac/0x230 [ 1129.472207][ T6988] do_el0_svc+0x40/0x58 [ 1129.472519][ T6988] el0_svc+0x50/0x1a0 [ 1129.472873][ T6988] el0t_64_sync_handler+0xa0/0xe4 [ 1129.473207][ T6988] el0t_64_sync+0x198/0x19c [ 1129.473519][ T6988] [ 1129.473519][ T6988] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 1129.474324][ T6988] lock_sock_nested+0x38/0xe8 [ 1129.475127][ T6988] inet_shutdown+0x50/0x348 [ 1129.475466][ T6988] kernel_sock_shutdown+0x54/0x84 [ 1129.475806][ T6988] nbd_mark_nsock_dead+0x100/0x534 [ 1129.476154][ T6988] sock_shutdown+0x134/0x234 [ 1129.476490][ T6988] nbd_config_put+0x154/0x5b0 [ 1129.476795][ T6988] nbd_release+0x7c/0x128 [ 1129.477115][ T6988] blkdev_put_whole+0x98/0xf0 [ 1129.477476][ T6988] bdev_release+0x2a4/0x510 [ 1129.477799][ T6988] blkdev_release+0x14/0x24 [ 1129.478112][ T6988] __fput+0x2c8/0x954 [ 1129.478431][ T6988] ____fput+0x14/0x20 [ 1129.478735][ T6988] task_work_run+0x128/0x210 [ 1129.479079][ T6988] do_notify_resume+0x1d8/0x260 [ 1129.479412][ T6988] el0_svc_compat+0x104/0x184 [ 1129.479706][ T6988] el0t_32_sync_handler+0x88/0xac [ 1129.480028][ T6988] el0t_32_sync+0x19c/0x1a0 [ 1129.480344][ T6988] [ 1129.480344][ T6988] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 1129.480969][ T6988] __lock_acquire+0x1638/0x2380 [ 1129.481295][ T6988] lock_acquire+0x310/0x38c [ 1129.481602][ T6988] __mutex_lock+0x144/0xffc [ 1129.481919][ T6988] mutex_lock_nested+0x24/0x30 [ 1129.482230][ T6988] nbd_queue_rq+0x2cc/0xb54 [ 1129.482556][ T6988] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1129.482934][ T6988] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1129.483295][ T6988] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1129.483645][ T6988] blk_mq_run_hw_queue+0x1e4/0x500 [ 1129.484034][ T6988] blk_mq_dispatch_list+0x348/0xa50 [ 1129.484353][ T6988] blk_mq_flush_plug_list+0xe8/0x508 [ 1129.484851][ T6988] __blk_flush_plug+0x208/0x3b8 [ 1129.485348][ T6988] __submit_bio+0x3a4/0x4ac [ 1129.485685][ T6988] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1129.486173][ T6988] submit_bio_noacct+0x858/0x18f8 [ 1129.486522][ T6988] submit_bio+0x32c/0x5f0 [ 1129.486928][ T6988] submit_bh_wbc+0x310/0x480 [ 1129.487252][ T6988] block_read_full_folio+0x26c/0x640 [ 1129.487698][ T6988] blkdev_read_folio+0x1c/0x28 [ 1129.488010][ T6988] filemap_read_folio+0xac/0x1fc [ 1129.488348][ T6988] do_read_cache_folio+0x1c4/0x480 [ 1129.488679][ T6988] read_cache_folio+0x44/0x6c [ 1129.488988][ T6988] read_part_sector+0xac/0x5f4 [ 1129.489305][ T6988] read_lba+0x15c/0x2ec [ 1129.489615][ T6988] efi_partition+0x1dc/0x2154 [ 1129.489931][ T6988] bdev_disk_changed+0x508/0xf0c [ 1129.490252][ T6988] blkdev_get_whole+0x144/0x1e4 [ 1129.490590][ T6988] bdev_open+0x1dc/0xa84 [ 1129.490931][ T6988] blkdev_open+0x1d4/0x324 [ 1129.491228][ T6988] do_dentry_open+0x6a4/0x103c [ 1129.491560][ T6988] vfs_open+0x5c/0x2fc [ 1129.491861][ T6988] path_openat+0x1490/0x24b4 [ 1129.492168][ T6988] do_filp_open+0x184/0x360 [ 1129.492480][ T6988] do_sys_openat2+0xe0/0x160 [ 1129.492995][ T6988] __arm64_sys_openat+0x12c/0x1bc [ 1129.493361][ T6988] invoke_syscall+0x6c/0x258 [ 1129.493685][ T6988] el0_svc_common.constprop.0+0xac/0x230 [ 1129.494016][ T6988] do_el0_svc+0x40/0x58 [ 1129.494317][ T6988] el0_svc+0x50/0x1a0 [ 1129.494635][ T6988] el0t_64_sync_handler+0xa0/0xe4 [ 1129.495164][ T6988] el0t_64_sync+0x198/0x19c [ 1129.495568][ T6988] [ 1129.495568][ T6988] other info that might help us debug this: [ 1129.495568][ T6988] [ 1129.496465][ T6988] Chain exists of: [ 1129.496465][ T6988] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 1129.496465][ T6988] [ 1129.497802][ T6988] Possible unsafe locking scenario: [ 1129.497802][ T6988] [ 1129.498581][ T6988] CPU0 CPU1 [ 1129.499009][ T6988] ---- ---- [ 1129.499328][ T6988] lock(&cmd->lock); [ 1129.499776][ T6988] lock(set->srcu); [ 1129.500324][ T6988] lock(&cmd->lock); [ 1129.500825][ T6988] lock(&nsock->tx_lock); [ 1129.501265][ T6988] [ 1129.501265][ T6988] *** DEADLOCK *** [ 1129.501265][ T6988] [ 1129.501749][ T6988] 3 locks held by udevd/6988: [ 1129.502097][ T6988] #0: ffff0000148c5358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1129.502941][ T6988] #1: ffff0000146fd810 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 1129.503684][ T6988] #2: ffff0000148151f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 1129.504516][ T6988] [ 1129.504516][ T6988] stack backtrace: [ 1129.505822][ T6988] CPU: 1 UID: 0 PID: 6988 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 1129.506639][ T6988] Hardware name: linux,dummy-virt (DT) [ 1129.507589][ T6988] Call trace: [ 1129.508139][ T6988] show_stack+0x18/0x24 (C) [ 1129.508767][ T6988] dump_stack_lvl+0xa4/0xf4 [ 1129.509126][ T6988] dump_stack+0x1c/0x28 [ 1129.509560][ T6988] print_circular_bug+0x28c/0x370 [ 1129.509909][ T6988] check_noncircular+0x168/0x17c [ 1129.510334][ T6988] __lock_acquire+0x1638/0x2380 [ 1129.510724][ T6988] lock_acquire+0x310/0x38c [ 1129.511240][ T6988] __mutex_lock+0x144/0xffc [ 1129.511572][ T6988] mutex_lock_nested+0x24/0x30 [ 1129.511915][ T6988] nbd_queue_rq+0x2cc/0xb54 [ 1129.512265][ T6988] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1129.512600][ T6988] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1129.512961][ T6988] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1129.513367][ T6988] blk_mq_run_hw_queue+0x1e4/0x500 [ 1129.513710][ T6988] blk_mq_dispatch_list+0x348/0xa50 [ 1129.514026][ T6988] blk_mq_flush_plug_list+0xe8/0x508 [ 1129.514354][ T6988] __blk_flush_plug+0x208/0x3b8 [ 1129.514691][ T6988] __submit_bio+0x3a4/0x4ac [ 1129.515091][ T6988] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1129.515642][ T6988] submit_bio_noacct+0x858/0x18f8 [ 1129.516048][ T6988] submit_bio+0x32c/0x5f0 [ 1129.516387][ T6988] submit_bh_wbc+0x310/0x480 [ 1129.516737][ T6988] block_read_full_folio+0x26c/0x640 [ 1129.517067][ T6988] blkdev_read_folio+0x1c/0x28 [ 1129.517417][ T6988] filemap_read_folio+0xac/0x1fc [ 1129.517776][ T6988] do_read_cache_folio+0x1c4/0x480 [ 1129.518137][ T6988] read_cache_folio+0x44/0x6c [ 1129.518504][ T6988] read_part_sector+0xac/0x5f4 [ 1129.518855][ T6988] read_lba+0x15c/0x2ec [ 1129.519574][ T6988] efi_partition+0x1dc/0x2154 [ 1129.520150][ T6988] bdev_disk_changed+0x508/0xf0c [ 1129.520645][ T6988] blkdev_get_whole+0x144/0x1e4 [ 1129.521151][ T6988] bdev_open+0x1dc/0xa84 [ 1129.521505][ T6988] blkdev_open+0x1d4/0x324 [ 1129.521829][ T6988] do_dentry_open+0x6a4/0x103c [ 1129.522196][ T6988] vfs_open+0x5c/0x2fc [ 1129.522549][ T6988] path_openat+0x1490/0x24b4 [ 1129.523009][ T6988] do_filp_open+0x184/0x360 [ 1129.523324][ T6988] do_sys_openat2+0xe0/0x160 [ 1129.523634][ T6988] __arm64_sys_openat+0x12c/0x1bc [ 1129.524090][ T6988] invoke_syscall+0x6c/0x258 [ 1129.524468][ T6988] el0_svc_common.constprop.0+0xac/0x230 [ 1129.524961][ T6988] do_el0_svc+0x40/0x58 [ 1129.525344][ T6988] el0_svc+0x50/0x1a0 [ 1129.525704][ T6988] el0t_64_sync_handler+0xa0/0xe4 [ 1129.526036][ T6988] el0t_64_sync+0x198/0x19c [ 1129.556920][ T6988] block nbd0: Dead connection, failed to find a fallback [ 1129.557623][ T6988] block nbd0: shutting down sockets [ 1129.557875][ T6988] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.558038][ T6988] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1129.560414][ T6988] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.560581][ T6988] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1129.571916][ T6988] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.572566][ T6988] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1129.573338][ T6988] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.573576][ T6988] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1129.574812][ T6988] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.617581][ T6988] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1129.618990][ T6988] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.619375][ T6988] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1129.620074][ T6988] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.620296][ T6988] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1129.620901][ T6988] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.621032][ T6988] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1129.621478][ T6988] nbd0: unable to read partition table [ 1129.860425][ T6988] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.861144][ T6988] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1129.862118][ T6988] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1129.862267][ T6988] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1129.888501][ T6988] nbd0: unable to read partition table VM DIAGNOSIS: 10:29:39 Registers: info registers vcpu 0 CPU#0 PC=ffff800080449c94 X00=0000000000000000 X01=0000000000000000 X02=0000000000000008 X03=0000000000000030 X04=0000000000000000 X05=ffff800080007e20 X06=ffff700010000fc4 X07=0000000000000000 X08=ffff800080007e58 X09=dfff800000000000 X10=ffff700010000fca X11=1ffff00010000fca X12=ffff700010000fcb X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff800080000000 X17=ffff7fffe2fe0000 X18=0000000000000000 X19=ffff00006a08ea70 X20=1ffff00010000fc0 X21=ffff800080007e20 X22=0000000000000000 X23=1fffe0000d411d57 X24=ffff00006a08eab8 X25=1ffff00010e1b619 X26=0000000000000001 X27=0000000000000002 X28=ffff8000854e0880 X29=ffff800080007db0 X30=ffff800080449c80 SP=ffff800080007db0 PSTATE=00000005 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080318584 X00=000000000000002e X01=ffff8000a2566083 X02=000000000000002b X03=000000000000002b X04=1fffe00001ec2001 X05=ffff00006a0ad590 X06=ffff60000d415ab2 X07=0000000000000001 X08=ffff00006a0ad593 X09=dfff800000000000 X10=ffff60000d415ab2 X11=1fffe0000d415ab2 X12=ffff60000d415ab3 X13=0000000000000001 X14=000000000000000f X15=0000000000000007 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff800089844bc8 X20=ffff00000f610b08 X21=0000000000000006 X22=ffff800089aa2bc0 X23=ffff00000f610000 X24=0000000000000002 X25=ffff800088b82000 X26=00000000000000c8 X27=0000000000000003 X28=0000000000000003 X29=ffff8000a2566060 X30=ffff800080318584 SP=ffff8000a2566060 PSTATE=400000c5 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000