last executing test programs: 4.212702831s ago: executing program 1 (id=1851): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r0, r1) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, 0x0, &(0x7f0000001180)) 3.699998618s ago: executing program 1 (id=1853): pipe(&(0x7f0000000300)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{}, "8deeb1f83c182034", "0a34538c1d528da1f4d7de05fc6e6877", "adbf907d", "b4667900640e017e"}, 0x28) 3.356198556s ago: executing program 0 (id=1854): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, 0x0) 3.06418296s ago: executing program 1 (id=1855): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000003c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$P9_RWSTAT(r2, 0x0, 0x0) 2.729799078s ago: executing program 0 (id=1856): r0 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0xfffa, @empty}, 0x10) sendmmsg$sock(r0, 0x0, 0x0, 0x40c0) 2.438918423s ago: executing program 1 (id=1857): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) dup2(r0, r1) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 1.997387506s ago: executing program 0 (id=1858): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) dup2(r1, r0) fsync(r0) 1.910600961s ago: executing program 1 (id=1859): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 1.33609827s ago: executing program 0 (id=1860): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f0000000140)) 750.039701ms ago: executing program 0 (id=1861): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000000c0)={0xffffffffffffffff}) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x14, 0x0, &(0x7f0000000080)) 392.059µs ago: executing program 0 (id=1862): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 0s ago: executing program 1 (id=1863): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r3, 0x5452, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46753' (ED25519) to the list of known hosts. [ 305.872161][ T30] audit: type=1400 audit(304.730:46): avc: denied { name_bind } for pid=3313 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 307.061275][ T30] audit: type=1400 audit(305.920:47): avc: denied { execute } for pid=3314 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 307.067093][ T30] audit: type=1400 audit(305.930:48): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 317.912876][ T30] audit: type=1400 audit(316.760:49): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 317.936334][ T30] audit: type=1400 audit(316.780:50): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 318.009334][ T3314] cgroup: Unknown subsys name 'net' [ 318.064426][ T30] audit: type=1400 audit(316.930:51): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 318.547138][ T3314] cgroup: Unknown subsys name 'cpuset' [ 318.642377][ T3314] cgroup: Unknown subsys name 'rlimit' [ 319.161482][ T30] audit: type=1400 audit(318.020:52): avc: denied { setattr } for pid=3314 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 319.177253][ T30] audit: type=1400 audit(318.030:53): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 319.178249][ T30] audit: type=1400 audit(318.040:54): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 320.467265][ T3317] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 320.491448][ T30] audit: type=1400 audit(319.350:55): avc: denied { relabelto } for pid=3317 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.513687][ T30] audit: type=1400 audit(319.380:56): avc: denied { write } for pid=3317 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 320.713210][ T30] audit: type=1400 audit(319.560:57): avc: denied { read } for pid=3314 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.728201][ T30] audit: type=1400 audit(319.560:58): avc: denied { open } for pid=3314 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 320.753156][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 360.549302][ T30] audit: type=1400 audit(359.410:59): avc: denied { execmem } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 360.771485][ T30] audit: type=1400 audit(359.630:60): avc: denied { read } for pid=3320 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 360.794438][ T30] audit: type=1400 audit(359.650:61): avc: denied { open } for pid=3320 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 360.838453][ T30] audit: type=1400 audit(359.700:62): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 360.932915][ T30] audit: type=1400 audit(359.790:63): avc: denied { module_request } for pid=3321 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 361.506717][ T30] audit: type=1400 audit(360.360:64): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 374.548451][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.588067][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.644337][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.675754][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 379.633895][ T3320] hsr_slave_0: entered promiscuous mode [ 379.678617][ T3320] hsr_slave_1: entered promiscuous mode [ 380.571280][ T3321] hsr_slave_0: entered promiscuous mode [ 380.592221][ T3321] hsr_slave_1: entered promiscuous mode [ 380.622158][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 380.624214][ T3321] Cannot create hsr debugfs directory [ 384.152407][ T30] audit: type=1400 audit(383.010:65): avc: denied { create } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 384.191903][ T30] audit: type=1400 audit(383.030:66): avc: denied { write } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 384.192961][ T30] audit: type=1400 audit(383.040:67): avc: denied { read } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 384.205266][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 384.327403][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 384.484489][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 384.582258][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 385.597238][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 385.675466][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 385.738259][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 385.823343][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 390.194937][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.398367][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 407.774607][ T3320] veth0_vlan: entered promiscuous mode [ 407.853901][ T3320] veth1_vlan: entered promiscuous mode [ 408.572961][ T3320] veth0_macvtap: entered promiscuous mode [ 408.628998][ T3320] veth1_macvtap: entered promiscuous mode [ 409.275398][ T1094] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.336297][ T1094] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.337248][ T1094] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.338989][ T1094] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 410.258128][ T3321] veth0_vlan: entered promiscuous mode [ 410.686390][ T30] audit: type=1400 audit(409.550:68): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 410.726887][ T30] audit: type=1400 audit(409.590:69): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.iAyrky/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 410.882395][ T30] audit: type=1400 audit(409.740:70): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 410.952541][ T30] audit: type=1400 audit(409.810:71): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.iAyrky/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 410.957572][ T3321] veth1_vlan: entered promiscuous mode [ 410.978459][ T30] audit: type=1400 audit(409.840:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.iAyrky/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 411.123891][ T30] audit: type=1400 audit(409.990:73): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 411.187119][ T30] audit: type=1400 audit(410.050:74): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 411.236039][ T30] audit: type=1400 audit(410.090:75): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=4006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 411.384151][ T30] audit: type=1400 audit(410.250:76): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 411.431698][ T30] audit: type=1400 audit(410.290:77): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 412.008462][ T3321] veth0_macvtap: entered promiscuous mode [ 412.063009][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 412.244554][ T3321] veth1_macvtap: entered promiscuous mode [ 413.684386][ T111] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.688032][ T1094] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.756121][ T1094] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.757314][ T1094] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.812685][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 418.815217][ T30] audit: type=1400 audit(417.670:82): avc: denied { read write } for pid=3474 comm="syz.1.2" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 418.855408][ T30] audit: type=1400 audit(417.720:83): avc: denied { open } for pid=3474 comm="syz.1.2" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 434.713388][ T30] audit: type=1400 audit(433.550:84): avc: denied { ioctl } for pid=3530 comm="syz.0.27" path="socket:[5132]" dev="sockfs" ino=5132 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 436.472780][ T3542] capability: warning: `syz.1.32' uses 32-bit capabilities (legacy support in use) [ 447.554760][ T30] audit: type=1400 audit(446.420:85): avc: denied { write } for pid=3595 comm="syz.1.59" name="arp" dev="proc" ino=4026532682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 452.284241][ T30] audit: type=1400 audit(451.150:86): avc: denied { create } for pid=3616 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 452.374082][ T30] audit: type=1400 audit(451.230:87): avc: denied { write } for pid=3616 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 452.388310][ T3618] Zero length message leads to an empty skb [ 455.517507][ T3634] binfmt_misc: register: failed to install interpreter file ./file0 [ 456.955378][ T30] audit: type=1400 audit(455.820:88): avc: denied { append } for pid=3637 comm="syz.0.80" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 456.981623][ T30] audit: type=1400 audit(455.820:89): avc: denied { open } for pid=3637 comm="syz.0.80" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 462.587914][ T30] audit: type=1400 audit(461.450:90): avc: denied { read write } for pid=3661 comm="syz.1.92" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 462.622933][ T30] audit: type=1400 audit(461.480:91): avc: denied { open } for pid=3661 comm="syz.1.92" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 462.666598][ T30] audit: type=1400 audit(461.530:92): avc: denied { ioctl } for pid=3661 comm="syz.1.92" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 467.788724][ T30] audit: type=1400 audit(466.650:93): avc: denied { read } for pid=3690 comm="syz.1.106" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 467.808757][ T30] audit: type=1400 audit(466.650:94): avc: denied { open } for pid=3690 comm="syz.1.106" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 472.732451][ T30] audit: type=1400 audit(471.590:95): avc: denied { prog_load } for pid=3713 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 472.767896][ T30] audit: type=1400 audit(471.630:96): avc: denied { bpf } for pid=3713 comm="syz.1.117" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 472.863233][ T30] audit: type=1400 audit(471.720:97): avc: denied { read write } for pid=3713 comm="syz.1.117" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 472.864381][ T30] audit: type=1400 audit(471.720:98): avc: denied { open } for pid=3713 comm="syz.1.117" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 472.888706][ T30] audit: type=1400 audit(471.730:99): avc: denied { ioctl } for pid=3713 comm="syz.1.117" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 472.921623][ T3716] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 472.937369][ T3716] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 478.363605][ T30] audit: type=1400 audit(477.220:100): avc: denied { allowed } for pid=3746 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 478.518451][ T30] audit: type=1400 audit(477.380:101): avc: denied { create } for pid=3746 comm="syz.1.133" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 482.530767][ T30] audit: type=1400 audit(481.350:102): avc: denied { create } for pid=3765 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 482.556579][ T30] audit: type=1400 audit(481.420:103): avc: denied { ioctl } for pid=3765 comm="syz.0.142" path="socket:[4475]" dev="sockfs" ino=4475 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 482.608898][ T30] audit: type=1400 audit(481.470:104): avc: denied { write } for pid=3765 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 487.350790][ T30] audit: type=1400 audit(486.210:105): avc: denied { create } for pid=3786 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 487.463606][ T3788] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 501.966268][ T30] audit: type=1400 audit(500.830:106): avc: denied { execute } for pid=3849 comm="syz.0.182" name="file0" dev="tmpfs" ino=493 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 502.700872][ T30] audit: type=1400 audit(501.560:107): avc: denied { create } for pid=3852 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 506.217540][ T30] audit: type=1400 audit(505.080:108): avc: denied { create } for pid=3871 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 507.573260][ T3878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3878 comm=syz.0.196 [ 513.955591][ T30] audit: type=1400 audit(512.810:109): avc: denied { create } for pid=3910 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 514.016263][ T30] audit: type=1400 audit(512.870:110): avc: denied { bind } for pid=3910 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 514.037525][ T30] audit: type=1400 audit(512.900:111): avc: denied { listen } for pid=3910 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 522.447407][ T30] audit: type=1400 audit(521.310:112): avc: denied { create } for pid=3955 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 522.497037][ T30] audit: type=1400 audit(521.360:113): avc: denied { ioctl } for pid=3955 comm="syz.0.235" path="socket:[5910]" dev="sockfs" ino=5910 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 523.431381][ T30] audit: type=1400 audit(522.290:114): avc: denied { read } for pid=3960 comm="syz.1.238" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 523.432145][ T30] audit: type=1400 audit(522.290:115): avc: denied { open } for pid=3960 comm="syz.1.238" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 523.512830][ T30] audit: type=1400 audit(522.340:116): avc: denied { ioctl } for pid=3960 comm="syz.1.238" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x70cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 523.873242][ T30] audit: type=1400 audit(522.740:117): avc: denied { create } for pid=3963 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 523.984427][ T30] audit: type=1400 audit(522.840:118): avc: denied { write } for pid=3963 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 527.961451][ T30] audit: type=1400 audit(526.820:119): avc: denied { read } for pid=3982 comm="syz.0.249" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 528.023758][ T30] audit: type=1400 audit(526.890:120): avc: denied { open } for pid=3982 comm="syz.0.249" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 528.163378][ T30] audit: type=1400 audit(526.990:121): avc: denied { ioctl } for pid=3982 comm="syz.0.249" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 536.752717][ T30] audit: type=1400 audit(535.610:122): avc: denied { bind } for pid=4002 comm="syz.1.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 545.418162][ T30] audit: type=1400 audit(544.280:123): avc: denied { perfmon } for pid=4046 comm="syz.1.279" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 545.513907][ T30] audit: type=1400 audit(544.380:124): avc: denied { prog_run } for pid=4046 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 556.945682][ C0] hrtimer: interrupt took 65252432 ns [ 558.797786][ T30] audit: type=1400 audit(557.650:125): avc: denied { map_create } for pid=4106 comm="syz.0.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 559.433757][ T30] audit: type=1400 audit(558.300:126): avc: denied { open } for pid=4110 comm="syz.1.311" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 574.532870][ T30] audit: type=1400 audit(573.390:127): avc: denied { connect } for pid=4180 comm="syz.0.343" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 577.007758][ T30] audit: type=1400 audit(575.870:128): avc: denied { setopt } for pid=4190 comm="syz.0.348" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 589.947503][ T4246] capability: warning: `syz.1.374' uses deprecated v2 capabilities in a way that may be insecure [ 603.091307][ T30] audit: type=1400 audit(601.950:129): avc: denied { ioctl } for pid=4320 comm="syz.1.412" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 604.952544][ T30] audit: type=1400 audit(603.810:130): avc: denied { setopt } for pid=4331 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 608.163472][ T30] audit: type=1400 audit(607.000:131): avc: denied { map_read map_write } for pid=4347 comm="syz.1.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 626.087546][ T30] audit: type=1400 audit(624.950:132): avc: denied { create } for pid=4429 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 626.131462][ T30] audit: type=1400 audit(624.990:133): avc: denied { read write } for pid=4430 comm="syz.1.465" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 626.136179][ T30] audit: type=1400 audit(625.000:134): avc: denied { open } for pid=4430 comm="syz.1.465" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 626.236283][ T30] audit: type=1400 audit(625.100:135): avc: denied { ioctl } for pid=4430 comm="syz.1.465" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 631.155432][ T30] audit: type=1400 audit(630.020:136): avc: denied { create } for pid=4455 comm="syz.0.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 631.268125][ T30] audit: type=1400 audit(630.130:137): avc: denied { write } for pid=4455 comm="syz.0.480" path="socket:[6854]" dev="sockfs" ino=6854 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 637.169260][ T30] audit: type=1400 audit(636.030:138): avc: denied { create } for pid=4488 comm="syz.0.494" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 637.241499][ T30] audit: type=1400 audit(636.100:139): avc: denied { write } for pid=4488 comm="syz.0.494" name="file0" dev="tmpfs" ino=1296 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 637.270633][ T30] audit: type=1400 audit(636.130:140): avc: denied { open } for pid=4488 comm="syz.0.494" path="/250/file0" dev="tmpfs" ino=1296 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 637.308510][ T30] audit: type=1400 audit(636.170:141): avc: denied { ioctl } for pid=4488 comm="syz.0.494" path="/250/file0" dev="tmpfs" ino=1296 ioctlcmd=0x4c09 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 637.517589][ T30] audit: type=1400 audit(636.360:142): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=1296 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 638.023907][ T4494] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 643.493435][ T3469] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 643.761355][ T3469] usb 1-1: Using ep0 maxpacket: 8 [ 643.842331][ T3469] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 643.843044][ T3469] usb 1-1: config 179 has no interface number 0 [ 643.844129][ T3469] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 643.844540][ T3469] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 643.845172][ T3469] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 643.845459][ T3469] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 643.846203][ T3469] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 643.846444][ T3469] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 644.036923][ T4520] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 644.703462][ T3469] usb 1-1: USB disconnect, device number 2 [ 644.704925][ C0] xpad 1-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 644.705233][ C0] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 650.316810][ T30] audit: type=1400 audit(649.180:143): avc: denied { create } for pid=4556 comm="syz.1.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 650.397356][ T30] audit: type=1400 audit(649.260:144): avc: denied { write } for pid=4556 comm="syz.1.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 651.353170][ T30] audit: type=1400 audit(650.200:145): avc: denied { remount } for pid=4561 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 651.805115][ T30] audit: type=1400 audit(650.670:146): avc: denied { create } for pid=4563 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 651.846588][ T30] audit: type=1400 audit(650.700:147): avc: denied { write } for pid=4563 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 662.207377][ T4620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 662.216991][ T4620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 666.331629][ T30] audit: type=1400 audit(665.190:148): avc: denied { read } for pid=4635 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 668.459377][ T30] audit: type=1400 audit(667.300:149): avc: denied { append } for pid=4645 comm="syz.1.572" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 668.525750][ T4647] usb usb1: usbfs: process 4647 (syz.1.572) did not claim interface 0 before use [ 672.277720][ T30] audit: type=1400 audit(671.140:150): avc: denied { read } for pid=4665 comm="syz.1.582" name="file2" dev="tmpfs" ino=1511 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 684.906758][ T30] audit: type=1400 audit(683.770:151): avc: denied { write } for pid=4716 comm="syz.1.607" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 688.502026][ T30] audit: type=1400 audit(687.340:152): avc: denied { map } for pid=4734 comm="syz.0.613" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 688.503043][ T30] audit: type=1400 audit(687.350:153): avc: denied { read write } for pid=4734 comm="syz.0.613" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 688.821706][ T30] audit: type=1400 audit(687.650:154): avc: denied { getopt } for pid=4736 comm="syz.1.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 692.199201][ T30] audit: type=1400 audit(691.040:155): avc: denied { create } for pid=4753 comm="syz.1.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 703.808304][ T30] audit: type=1400 audit(702.660:156): avc: denied { write } for pid=4810 comm="syz.0.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 707.856775][ T30] audit: type=1400 audit(706.720:157): avc: denied { write } for pid=4826 comm="syz.0.659" path="socket:[9435]" dev="sockfs" ino=9435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 717.054357][ T4873] binfmt_misc: register: failed to install interpreter file ./file0 [ 720.194153][ T4889] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4889 comm=syz.1.690 [ 722.152806][ T30] audit: type=1400 audit(721.000:158): avc: denied { mounton } for pid=4899 comm="syz.1.696" path="/348/file0" dev="tmpfs" ino=1805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 722.157080][ T30] audit: type=1400 audit(721.020:159): avc: denied { mount } for pid=4899 comm="syz.1.696" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 722.163806][ T30] audit: type=1400 audit(721.030:160): avc: denied { remount } for pid=4899 comm="syz.1.696" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 722.188122][ T4901] ======================================================= [ 722.188122][ T4901] WARNING: The mand mount option has been deprecated and [ 722.188122][ T4901] and is ignored by this kernel. Remove the mand [ 722.188122][ T4901] option from the mount to silence this warning. [ 722.188122][ T4901] ======================================================= [ 722.336595][ T30] audit: type=1400 audit(721.180:161): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 731.604443][ T30] audit: type=1400 audit(730.470:162): avc: denied { setopt } for pid=4965 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 733.758855][ T30] audit: type=1400 audit(732.620:163): avc: denied { setattr } for pid=4975 comm="syz.0.732" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 736.563064][ T4985] block nbd1: shutting down sockets [ 750.477725][ T30] audit: type=1400 audit(749.340:164): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 751.121908][ T30] audit: type=1400 audit(749.980:165): avc: denied { setopt } for pid=5069 comm="syz.1.777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 751.668208][ T30] audit: type=1400 audit(750.510:166): avc: denied { read } for pid=5073 comm="syz.0.780" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 751.676737][ T30] audit: type=1400 audit(750.530:167): avc: denied { open } for pid=5073 comm="syz.0.780" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 751.718213][ T30] audit: type=1400 audit(750.580:168): avc: denied { create } for pid=5074 comm="syz.1.779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 751.754478][ T30] audit: type=1400 audit(750.620:169): avc: denied { write } for pid=5073 comm="syz.0.780" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 751.777906][ T30] audit: type=1400 audit(750.640:170): avc: denied { ioctl } for pid=5074 comm="syz.1.779" path="socket:[9105]" dev="sockfs" ino=9105 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 752.625303][ T30] audit: type=1400 audit(751.480:171): avc: denied { create } for pid=5080 comm="syz.1.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 752.672933][ T30] audit: type=1400 audit(751.530:172): avc: denied { write } for pid=5080 comm="syz.1.783" path="socket:[9841]" dev="sockfs" ino=9841 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 763.057189][ T30] audit: type=1400 audit(761.920:173): avc: denied { create } for pid=5148 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 763.149154][ T30] audit: type=1400 audit(762.010:174): avc: denied { setopt } for pid=5148 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 769.132337][ T30] audit: type=1400 audit(768.000:175): avc: denied { write } for pid=5187 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 769.136187][ T30] audit: type=1400 audit(768.000:176): avc: denied { nlmsg_read } for pid=5187 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 769.176289][ T30] audit: type=1400 audit(768.030:177): avc: denied { read } for pid=5187 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 776.844440][ T30] audit: type=1400 audit(775.700:178): avc: denied { write } for pid=5239 comm="syz.0.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 783.758378][ T30] audit: type=1400 audit(782.620:179): avc: denied { create } for pid=5291 comm="syz.0.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 783.817274][ T30] audit: type=1400 audit(782.680:180): avc: denied { write } for pid=5291 comm="syz.0.886" path="socket:[10150]" dev="sockfs" ino=10150 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 787.801107][ T30] audit: type=1400 audit(786.660:181): avc: denied { read } for pid=5318 comm="syz.0.901" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 787.802015][ T30] audit: type=1400 audit(786.660:182): avc: denied { open } for pid=5318 comm="syz.0.901" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 787.870620][ T30] audit: type=1400 audit(786.730:183): avc: denied { ioctl } for pid=5318 comm="syz.0.901" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 794.576048][ T30] audit: type=1400 audit(793.440:184): avc: denied { bind } for pid=5356 comm="syz.1.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 799.937774][ T30] audit: type=1400 audit(798.800:185): avc: denied { mount } for pid=5384 comm="syz.1.934" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 799.965547][ T30] audit: type=1400 audit(798.830:186): avc: denied { remount } for pid=5384 comm="syz.1.934" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 800.087087][ T30] audit: type=1400 audit(798.950:187): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 811.871975][ T30] audit: type=1400 audit(810.710:188): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 824.763150][ T30] audit: type=1400 audit(823.620:189): avc: denied { node_bind } for pid=5551 comm="syz.1.1016" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 838.481549][ T3383] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 838.728087][ T3383] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 838.728433][ T3383] usb 1-1: config 1 has no interface number 0 [ 838.728853][ T3383] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 838.729097][ T3383] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 838.729234][ T3383] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 838.856334][ T3383] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 838.856683][ T3383] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 838.857044][ T3383] usb 1-1: Product: syz [ 838.857106][ T3383] usb 1-1: Manufacturer: syz [ 838.857154][ T3383] usb 1-1: SerialNumber: syz [ 838.977553][ T5640] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 839.314335][ T5640] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 839.728834][ T3383] sierra_net 1-1:1.7 wwan0: register 'sierra_net' at usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem, 00:00:00:00:01:07 [ 839.923114][ T3383] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 839.945416][ T3383] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 839.951565][ T3383] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 839.983583][ T3383] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 840.191533][ T3383] usb 1-1: USB disconnect, device number 3 [ 840.373284][ T3383] sierra_net 1-1:1.7 wwan0: unregister 'sierra_net' usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem [ 840.784540][ T3383] sierra_net 1-1:1.7 wwan0 (unregistered): usb_control_msg failed, status -19 [ 842.617739][ T30] audit: type=1400 audit(841.480:190): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 843.191345][ T30] audit: type=1400 audit(842.050:191): avc: denied { read } for pid=5666 comm="syz.0.1070" path="socket:[11263]" dev="sockfs" ino=11263 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 846.934698][ T30] audit: type=1400 audit(845.780:192): avc: denied { ioctl } for pid=5687 comm="syz.1.1079" path="socket:[12312]" dev="sockfs" ino=12312 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 847.754189][ T30] audit: type=1400 audit(846.620:193): avc: denied { read } for pid=5687 comm="syz.1.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 852.922455][ T30] audit: type=1400 audit(851.790:194): avc: denied { bind } for pid=5729 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 852.952572][ T30] audit: type=1400 audit(851.810:195): avc: denied { accept } for pid=5729 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 855.082607][ T5737] syz.0.1102(5737): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 859.037826][ T5760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5760 comm=syz.0.1113 [ 862.828936][ T30] audit: type=1400 audit(861.690:196): avc: denied { bind } for pid=5784 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 862.834734][ T30] audit: type=1400 audit(861.700:197): avc: denied { node_bind } for pid=5784 comm="syz.0.1125" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 868.825149][ T30] audit: type=1400 audit(867.680:198): avc: denied { read } for pid=5817 comm="syz.0.1140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 875.437505][ T30] audit: type=1400 audit(874.300:199): avc: denied { name_bind } for pid=5860 comm="syz.1.1162" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 882.394290][ T30] audit: type=1400 audit(881.240:200): avc: denied { ioctl } for pid=5899 comm="syz.0.1181" path="socket:[12283]" dev="sockfs" ino=12283 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 883.518629][ T30] audit: type=1400 audit(882.380:201): avc: denied { mount } for pid=5906 comm="syz.1.1183" name="/" dev="hugetlbfs" ino=12724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 885.377647][ T30] audit: type=1400 audit(884.240:202): avc: denied { read } for pid=5919 comm="syz.1.1190" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 891.798162][ T5952] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5952 comm=syz.1.1205 [ 898.470829][ T30] audit: type=1400 audit(897.330:203): avc: denied { connect } for pid=5986 comm="syz.0.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 899.072579][ T30] audit: type=1400 audit(897.920:204): avc: denied { write } for pid=5986 comm="syz.0.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 909.094161][ T6052] loop7: detected capacity change from 0 to 7 [ 909.162770][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 909.164707][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 909.182728][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 909.183532][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 909.206238][ T6052] loop7: unable to read partition table [ 909.209193][ T6052] loop_reread_partitions: partition scan of loop7 (gCj̖P=!MX %`搘ȵ4FLQk݊5) failed (rc=-5) [ 909.299212][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 909.300591][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 909.345736][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 909.346454][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 909.348298][ T6052] loop7: unable to read partition table [ 913.176642][ T30] audit: type=1400 audit(912.040:205): avc: denied { getopt } for pid=6073 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 919.820955][ T30] audit: type=1400 audit(918.670:206): avc: denied { bind } for pid=6106 comm="syz.0.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 919.853744][ T30] audit: type=1400 audit(918.710:207): avc: denied { name_bind } for pid=6106 comm="syz.0.1279" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 919.890823][ T30] audit: type=1400 audit(918.750:208): avc: denied { node_bind } for pid=6106 comm="syz.0.1279" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 920.047967][ T30] audit: type=1400 audit(918.900:209): avc: denied { read } for pid=6106 comm="syz.0.1279" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 927.622869][ T30] audit: type=1400 audit(926.470:210): avc: denied { checkpoint_restore } for pid=6147 comm="syz.0.1299" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 942.042483][ T30] audit: type=1400 audit(940.900:211): avc: denied { block_suspend } for pid=6221 comm="syz.0.1335" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 942.888284][ T30] audit: type=1400 audit(941.740:212): avc: denied { mount } for pid=6225 comm="syz.1.1337" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 945.195218][ T6238] cgroup: Unknown subsys name 'cpuset' [ 951.208382][ T30] audit: type=1400 audit(950.070:213): avc: denied { ioctl } for pid=6273 comm="syz.1.1361" path="socket:[14007]" dev="sockfs" ino=14007 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 957.777226][ T30] audit: type=1400 audit(956.640:214): avc: denied { remount } for pid=6311 comm="syz.1.1379" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 957.918677][ T30] audit: type=1326 audit(956.770:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6313 comm="syz.0.1380" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 968.338775][ T30] audit: type=1400 audit(967.200:216): avc: denied { mounton } for pid=6369 comm="syz.1.1408" path="/proc/1435/cgroup" dev="proc" ino=14662 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 968.598850][ T30] audit: type=1400 audit(967.460:217): avc: denied { write } for pid=6372 comm="syz.0.1409" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 971.186547][ T30] audit: type=1400 audit(970.050:218): avc: denied { ioctl } for pid=6389 comm="syz.1.1416" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=14694 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 978.867522][ T30] audit: type=1400 audit(977.700:219): avc: denied { mount } for pid=6427 comm="syz.1.1436" name="/" dev="ramfs" ino=14768 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 981.457216][ T6442] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1442'. [ 981.624247][ T6442] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1442'. [ 999.960251][ T30] audit: type=1400 audit(998.820:220): avc: denied { write } for pid=6520 comm="syz.1.1478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1004.276896][ T6538] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6538 comm=syz.1.1486 [ 1006.371169][ T30] audit: type=1400 audit(1005.230:221): avc: denied { read } for pid=6547 comm="syz.1.1492" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1006.399190][ T30] audit: type=1400 audit(1005.260:222): avc: denied { open } for pid=6547 comm="syz.1.1492" path="net:[4026532660]" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1007.817480][ T30] audit: type=1400 audit(1006.680:223): avc: denied { wake_alarm } for pid=6554 comm="syz.1.1494" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1009.431119][ T30] audit: type=1400 audit(2000000001.550:224): avc: denied { execute } for pid=6565 comm="syz.0.1500" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 1011.005632][ T30] audit: type=1400 audit(2000000003.130:225): avc: denied { mounton } for pid=6575 comm="syz.1.1505" path="/764/file0" dev="tmpfs" ino=3975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1011.329442][ T30] audit: type=1400 audit(2000000003.450:226): avc: denied { connect } for pid=6578 comm="syz.0.1506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1031.564514][ T6668] raw_sendmsg: syz.1.1548 forgot to set AF_INET. Fix it! [ 1066.311546][ T30] audit: type=1400 audit(2000000058.430:227): avc: denied { name_bind } for pid=6792 comm="syz.1.1603" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1074.668782][ T30] audit: type=1400 audit(2000000066.790:228): avc: denied { connect } for pid=6843 comm="syz.0.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1086.593748][ T30] audit: type=1400 audit(2000000078.710:229): avc: denied { read } for pid=6910 comm="syz.1.1660" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1086.601474][ T30] audit: type=1400 audit(2000000078.720:230): avc: denied { open } for pid=6910 comm="syz.1.1660" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1086.684300][ T30] audit: type=1400 audit(2000000078.760:231): avc: denied { ioctl } for pid=6910 comm="syz.1.1660" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1088.035371][ T30] audit: type=1400 audit(2000000080.160:232): avc: denied { name_bind } for pid=6916 comm="syz.1.1663" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1092.463617][ T6942] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=6942 comm=syz.0.1675 [ 1095.653826][ T6961] ALSA: seq fatal error: cannot create timer (-22) [ 1102.124603][ T30] audit: type=1400 audit(2000000094.250:233): avc: denied { connect } for pid=6994 comm="syz.1.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1102.183840][ T30] audit: type=1400 audit(2000000094.310:234): avc: denied { write } for pid=6994 comm="syz.1.1700" laddr=fe80::e4fb:16ff:fec8:3151 lport=1 faddr=ff02::1 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1105.859231][ T30] audit: type=1400 audit(2000000097.980:235): avc: denied { setopt } for pid=7012 comm="syz.0.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1117.572320][ T30] audit: type=1400 audit(2000000109.690:236): avc: denied { ioctl } for pid=7074 comm="syz.0.1740" path="pid:[4026532893]" dev="nsfs" ino=4026532893 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1146.413542][ T7248] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7248 comm=syz.1.1825 [ 1152.928888][ T30] audit: type=1400 audit(2000000145.050:237): avc: denied { name_bind } for pid=7290 comm="syz.1.1847" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1157.995495][ T7315] nbd0: detected capacity change from 0 to 127 [ 1158.027205][ T49] block nbd0: Receive control failed (result -32) [ 1158.027233][ T7321] block nbd0: Receive control failed (result -32) [ 1158.466873][ T3544] [ 1158.469265][ T3544] ====================================================== [ 1158.469907][ T3544] WARNING: possible circular locking dependency detected [ 1158.470902][ T3544] syzkaller #0 Not tainted [ 1158.471221][ T3544] ------------------------------------------------------ [ 1158.471571][ T3544] udevd/3544 is trying to acquire lock: [ 1158.472669][ T3544] ffff000017673270 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 1158.475849][ T3544] [ 1158.475849][ T3544] but task is already holding lock: [ 1158.476239][ T3544] ffff0000177951f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 1158.476949][ T3544] [ 1158.476949][ T3544] which lock already depends on the new lock. [ 1158.476949][ T3544] [ 1158.477459][ T3544] [ 1158.477459][ T3544] the existing dependency chain (in reverse order) is: [ 1158.477985][ T3544] [ 1158.477985][ T3544] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 1158.478778][ T3544] __mutex_lock+0x144/0xffc [ 1158.479209][ T3544] mutex_lock_nested+0x24/0x30 [ 1158.479784][ T3544] nbd_queue_rq+0xa8/0xb54 [ 1158.480121][ T3544] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1158.480580][ T3544] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1158.480954][ T3544] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1158.481344][ T3544] blk_mq_run_hw_queue+0x1e4/0x500 [ 1158.481705][ T3544] blk_mq_dispatch_list+0x348/0xa50 [ 1158.482264][ T3544] blk_mq_flush_plug_list+0xe8/0x508 [ 1158.482661][ T3544] __blk_flush_plug+0x208/0x3b8 [ 1158.482963][ T3544] __submit_bio+0x3a4/0x4ac [ 1158.483280][ T3544] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1158.483647][ T3544] submit_bio_noacct+0x858/0x18f8 [ 1158.484013][ T3544] submit_bio+0x32c/0x5f0 [ 1158.484337][ T3544] submit_bh_wbc+0x310/0x480 [ 1158.484666][ T3544] block_read_full_folio+0x26c/0x640 [ 1158.485007][ T3544] blkdev_read_folio+0x1c/0x28 [ 1158.485359][ T3544] filemap_read_folio+0xac/0x1fc [ 1158.485692][ T3544] do_read_cache_folio+0x1c4/0x480 [ 1158.486006][ T3544] read_cache_folio+0x44/0x6c [ 1158.486330][ T3544] read_part_sector+0xac/0x5f4 [ 1158.486652][ T3544] read_lba+0x15c/0x2ec [ 1158.487006][ T3544] efi_partition+0x1dc/0x2154 [ 1158.487386][ T3544] bdev_disk_changed+0x508/0xf0c [ 1158.487862][ T3544] blkdev_get_whole+0x144/0x1e4 [ 1158.488203][ T3544] bdev_open+0x1dc/0xa84 [ 1158.488527][ T3544] blkdev_open+0x1d4/0x324 [ 1158.488850][ T3544] do_dentry_open+0x6a4/0x103c [ 1158.489196][ T3544] vfs_open+0x5c/0x2fc [ 1158.489561][ T3544] path_openat+0x1490/0x24b4 [ 1158.489977][ T3544] do_filp_open+0x184/0x360 [ 1158.490471][ T3544] do_sys_openat2+0xe0/0x160 [ 1158.490797][ T3544] __arm64_sys_openat+0x12c/0x1bc [ 1158.491133][ T3544] invoke_syscall+0x6c/0x258 [ 1158.491476][ T3544] el0_svc_common.constprop.0+0xac/0x230 [ 1158.491894][ T3544] do_el0_svc+0x40/0x58 [ 1158.492203][ T3544] el0_svc+0x50/0x1a0 [ 1158.492532][ T3544] el0t_64_sync_handler+0xa0/0xe4 [ 1158.492885][ T3544] el0t_64_sync+0x198/0x19c [ 1158.493467][ T3544] [ 1158.493467][ T3544] -> #5 (set->srcu){.+.+}-{0:0}: [ 1158.494256][ T3544] __synchronize_srcu+0xa8/0x268 [ 1158.494617][ T3544] synchronize_srcu+0x12c/0x370 [ 1158.494946][ T3544] blk_mq_quiesce_queue+0xf4/0x15c [ 1158.495270][ T3544] elevator_switch+0x11c/0x414 [ 1158.495788][ T3544] elevator_change+0x294/0x424 [ 1158.496217][ T3544] elevator_set_default+0x22c/0x2ac [ 1158.496604][ T3544] blk_register_queue+0x278/0x3ac [ 1158.496931][ T3544] __add_disk+0x518/0xb80 [ 1158.497241][ T3544] add_disk_fwnode+0x114/0x4c0 [ 1158.497586][ T3544] device_add_disk+0x14/0x20 [ 1158.497909][ T3544] nbd_dev_add+0x5f0/0x9c0 [ 1158.498235][ T3544] nbd_init+0xd4/0x1a8 [ 1158.498565][ T3544] do_one_initcall+0x130/0x7f0 [ 1158.498930][ T3544] kernel_init_freeable+0x48c/0x70c [ 1158.499289][ T3544] kernel_init+0x24/0x1dc [ 1158.499846][ T3544] ret_from_fork+0x10/0x20 [ 1158.500390][ T3544] [ 1158.500390][ T3544] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 1158.501041][ T3544] __mutex_lock+0x144/0xffc [ 1158.501396][ T3544] mutex_lock_nested+0x24/0x30 [ 1158.501743][ T3544] elevator_change+0x130/0x424 [ 1158.502078][ T3544] elevator_set_none+0x90/0xe4 [ 1158.502452][ T3544] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 1158.502828][ T3544] blk_mq_update_nr_hw_queues+0x44/0x68 [ 1158.503189][ T3544] nbd_start_device+0x128/0xa38 [ 1158.503538][ T3544] nbd_genl_connect+0xcb4/0x14c4 [ 1158.503944][ T3544] genl_family_rcv_msg_doit+0x1b8/0x280 [ 1158.504363][ T3544] genl_rcv_msg+0x3ec/0x5bc [ 1158.504690][ T3544] netlink_rcv_skb+0x19c/0x338 [ 1158.505020][ T3544] genl_rcv+0x38/0x50 [ 1158.505343][ T3544] netlink_unicast+0x424/0x700 [ 1158.505687][ T3544] netlink_sendmsg+0x644/0xa54 [ 1158.506014][ T3544] __sock_sendmsg+0xc8/0x168 [ 1158.506368][ T3544] ____sys_sendmsg+0x500/0x764 [ 1158.506682][ T3544] ___sys_sendmsg+0x11c/0x19c [ 1158.507007][ T3544] __sys_sendmsg+0x114/0x19c [ 1158.507388][ T3544] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1158.507777][ T3544] invoke_syscall+0x6c/0x258 [ 1158.508106][ T3544] el0_svc_common.constprop.0+0xac/0x230 [ 1158.508508][ T3544] do_el0_svc_compat+0x40/0x68 [ 1158.508836][ T3544] el0_svc_compat+0x4c/0x184 [ 1158.509162][ T3544] el0t_32_sync_handler+0x88/0xac [ 1158.509642][ T3544] el0t_32_sync+0x19c/0x1a0 [ 1158.510033][ T3544] [ 1158.510033][ T3544] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 1158.510932][ T3544] blk_alloc_queue+0x538/0x644 [ 1158.511284][ T3544] blk_mq_alloc_queue+0x144/0x220 [ 1158.511707][ T3544] __blk_mq_alloc_disk+0x20/0x1a4 [ 1158.512086][ T3544] nbd_dev_add+0x3c0/0x9c0 [ 1158.512426][ T3544] nbd_init+0xd4/0x1a8 [ 1158.512765][ T3544] do_one_initcall+0x130/0x7f0 [ 1158.513102][ T3544] kernel_init_freeable+0x48c/0x70c [ 1158.513473][ T3544] kernel_init+0x24/0x1dc [ 1158.513808][ T3544] ret_from_fork+0x10/0x20 [ 1158.514154][ T3544] [ 1158.514154][ T3544] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 1158.514771][ T3544] fs_reclaim_acquire+0x138/0x160 [ 1158.515110][ T3544] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 1158.515487][ T3544] __alloc_skb+0x208/0x2f0 [ 1158.515808][ T3544] tcp_stream_alloc_skb+0x2c/0x450 [ 1158.516195][ T3544] tcp_sendmsg_locked+0xf34/0x39e8 [ 1158.516544][ T3544] tcp_sendmsg+0x38/0x60 [ 1158.516866][ T3544] inet_sendmsg+0x90/0xd4 [ 1158.517187][ T3544] __sock_sendmsg+0xc8/0x168 [ 1158.517521][ T3544] sock_write_iter+0x1cc/0x300 [ 1158.517842][ T3544] vfs_write+0x7bc/0xb88 [ 1158.518157][ T3544] ksys_write+0x18c/0x1d8 [ 1158.518467][ T3544] __arm64_sys_write+0x6c/0x9c [ 1158.518783][ T3544] invoke_syscall+0x6c/0x258 [ 1158.519104][ T3544] el0_svc_common.constprop.0+0xac/0x230 [ 1158.519512][ T3544] do_el0_svc+0x40/0x58 [ 1158.520187][ T3544] el0_svc+0x50/0x1a0 [ 1158.520616][ T3544] el0t_64_sync_handler+0xa0/0xe4 [ 1158.521025][ T3544] el0t_64_sync+0x198/0x19c [ 1158.521548][ T3544] [ 1158.521548][ T3544] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 1158.522283][ T3544] lock_sock_nested+0x38/0xe8 [ 1158.522682][ T3544] inet_shutdown+0x50/0x348 [ 1158.523021][ T3544] kernel_sock_shutdown+0x54/0x84 [ 1158.523390][ T3544] nbd_mark_nsock_dead+0x100/0x534 [ 1158.523806][ T3544] sock_shutdown+0x134/0x234 [ 1158.524145][ T3544] nbd_config_put+0x154/0x5b0 [ 1158.524486][ T3544] nbd_release+0x7c/0x128 [ 1158.524843][ T3544] blkdev_put_whole+0x98/0xf0 [ 1158.525227][ T3544] bdev_release+0x2a4/0x510 [ 1158.525568][ T3544] blkdev_release+0x14/0x24 [ 1158.525929][ T3544] __fput+0x2c8/0x954 [ 1158.526284][ T3544] ____fput+0x14/0x20 [ 1158.526621][ T3544] task_work_run+0x128/0x210 [ 1158.526976][ T3544] do_notify_resume+0x1d8/0x260 [ 1158.527383][ T3544] el0_svc_compat+0x104/0x184 [ 1158.527739][ T3544] el0t_32_sync_handler+0x88/0xac [ 1158.528074][ T3544] el0t_32_sync+0x19c/0x1a0 [ 1158.528402][ T3544] [ 1158.528402][ T3544] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 1158.529148][ T3544] __lock_acquire+0x1638/0x2380 [ 1158.529656][ T3544] lock_acquire+0x310/0x38c [ 1158.530113][ T3544] __mutex_lock+0x144/0xffc [ 1158.530499][ T3544] mutex_lock_nested+0x24/0x30 [ 1158.530947][ T3544] nbd_queue_rq+0x2cc/0xb54 [ 1158.531297][ T3544] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1158.531753][ T3544] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1158.532247][ T3544] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1158.532958][ T3544] blk_mq_run_hw_queue+0x1e4/0x500 [ 1158.533360][ T3544] blk_mq_dispatch_list+0x348/0xa50 [ 1158.533706][ T3544] blk_mq_flush_plug_list+0xe8/0x508 [ 1158.534150][ T3544] __blk_flush_plug+0x208/0x3b8 [ 1158.534547][ T3544] __submit_bio+0x3a4/0x4ac [ 1158.534868][ T3544] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1158.535273][ T3544] submit_bio_noacct+0x858/0x18f8 [ 1158.535693][ T3544] submit_bio+0x32c/0x5f0 [ 1158.536082][ T3544] submit_bh_wbc+0x310/0x480 [ 1158.536472][ T3544] block_read_full_folio+0x26c/0x640 [ 1158.536866][ T3544] blkdev_read_folio+0x1c/0x28 [ 1158.537292][ T3544] filemap_read_folio+0xac/0x1fc [ 1158.537694][ T3544] do_read_cache_folio+0x1c4/0x480 [ 1158.538091][ T3544] read_cache_folio+0x44/0x6c [ 1158.538418][ T3544] read_part_sector+0xac/0x5f4 [ 1158.538748][ T3544] read_lba+0x15c/0x2ec [ 1158.539069][ T3544] efi_partition+0x1dc/0x2154 [ 1158.539410][ T3544] bdev_disk_changed+0x508/0xf0c [ 1158.540016][ T3544] blkdev_get_whole+0x144/0x1e4 [ 1158.540719][ T3544] bdev_open+0x1dc/0xa84 [ 1158.541044][ T3544] blkdev_open+0x1d4/0x324 [ 1158.541390][ T3544] do_dentry_open+0x6a4/0x103c [ 1158.541714][ T3544] vfs_open+0x5c/0x2fc [ 1158.541999][ T3544] path_openat+0x1490/0x24b4 [ 1158.542541][ T3544] do_filp_open+0x184/0x360 [ 1158.542883][ T3544] do_sys_openat2+0xe0/0x160 [ 1158.543211][ T3544] __arm64_sys_openat+0x12c/0x1bc [ 1158.543614][ T3544] invoke_syscall+0x6c/0x258 [ 1158.543968][ T3544] el0_svc_common.constprop.0+0xac/0x230 [ 1158.544817][ T3544] do_el0_svc+0x40/0x58 [ 1158.545731][ T3544] el0_svc+0x50/0x1a0 [ 1158.546163][ T3544] el0t_64_sync_handler+0xa0/0xe4 [ 1158.546576][ T3544] el0t_64_sync+0x198/0x19c [ 1158.546944][ T3544] [ 1158.546944][ T3544] other info that might help us debug this: [ 1158.546944][ T3544] [ 1158.547592][ T3544] Chain exists of: [ 1158.547592][ T3544] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 1158.547592][ T3544] [ 1158.548592][ T3544] Possible unsafe locking scenario: [ 1158.548592][ T3544] [ 1158.548979][ T3544] CPU0 CPU1 [ 1158.549357][ T3544] ---- ---- [ 1158.550385][ T3544] lock(&cmd->lock); [ 1158.551022][ T3544] lock(set->srcu); [ 1158.551838][ T3544] lock(&cmd->lock); [ 1158.552446][ T3544] lock(&nsock->tx_lock); [ 1158.552902][ T3544] [ 1158.552902][ T3544] *** DEADLOCK *** [ 1158.552902][ T3544] [ 1158.553420][ T3544] 3 locks held by udevd/3544: [ 1158.553801][ T3544] #0: ffff000014844358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1158.554667][ T3544] #1: ffff000014646b90 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 1158.555473][ T3544] #2: ffff0000177951f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 1158.556211][ T3544] [ 1158.556211][ T3544] stack backtrace: [ 1158.557241][ T3544] CPU: 0 UID: 0 PID: 3544 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 1158.557818][ T3544] Hardware name: linux,dummy-virt (DT) [ 1158.558652][ T3544] Call trace: [ 1158.559195][ T3544] show_stack+0x18/0x24 (C) [ 1158.559923][ T3544] dump_stack_lvl+0xa4/0xf4 [ 1158.560459][ T3544] dump_stack+0x1c/0x28 [ 1158.560783][ T3544] print_circular_bug+0x28c/0x370 [ 1158.561111][ T3544] check_noncircular+0x168/0x17c [ 1158.561474][ T3544] __lock_acquire+0x1638/0x2380 [ 1158.561837][ T3544] lock_acquire+0x310/0x38c [ 1158.562249][ T3544] __mutex_lock+0x144/0xffc [ 1158.562586][ T3544] mutex_lock_nested+0x24/0x30 [ 1158.562908][ T3544] nbd_queue_rq+0x2cc/0xb54 [ 1158.563208][ T3544] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 1158.563720][ T3544] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 1158.564174][ T3544] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 1158.564505][ T3544] blk_mq_run_hw_queue+0x1e4/0x500 [ 1158.564798][ T3544] blk_mq_dispatch_list+0x348/0xa50 [ 1158.565097][ T3544] blk_mq_flush_plug_list+0xe8/0x508 [ 1158.565464][ T3544] __blk_flush_plug+0x208/0x3b8 [ 1158.565959][ T3544] __submit_bio+0x3a4/0x4ac [ 1158.566339][ T3544] submit_bio_noacct_nocheck+0x59c/0xa8c [ 1158.566741][ T3544] submit_bio_noacct+0x858/0x18f8 [ 1158.567120][ T3544] submit_bio+0x32c/0x5f0 [ 1158.567509][ T3544] submit_bh_wbc+0x310/0x480 [ 1158.568044][ T3544] block_read_full_folio+0x26c/0x640 [ 1158.568417][ T3544] blkdev_read_folio+0x1c/0x28 [ 1158.568744][ T3544] filemap_read_folio+0xac/0x1fc [ 1158.569108][ T3544] do_read_cache_folio+0x1c4/0x480 [ 1158.569636][ T3544] read_cache_folio+0x44/0x6c [ 1158.569979][ T3544] read_part_sector+0xac/0x5f4 [ 1158.570374][ T3544] read_lba+0x15c/0x2ec [ 1158.570679][ T3544] efi_partition+0x1dc/0x2154 [ 1158.571024][ T3544] bdev_disk_changed+0x508/0xf0c [ 1158.571548][ T3544] blkdev_get_whole+0x144/0x1e4 [ 1158.572140][ T3544] bdev_open+0x1dc/0xa84 [ 1158.572487][ T3544] blkdev_open+0x1d4/0x324 [ 1158.572794][ T3544] do_dentry_open+0x6a4/0x103c [ 1158.573144][ T3544] vfs_open+0x5c/0x2fc [ 1158.573653][ T3544] path_openat+0x1490/0x24b4 [ 1158.573993][ T3544] do_filp_open+0x184/0x360 [ 1158.574336][ T3544] do_sys_openat2+0xe0/0x160 [ 1158.574645][ T3544] __arm64_sys_openat+0x12c/0x1bc [ 1158.575082][ T3544] invoke_syscall+0x6c/0x258 [ 1158.575406][ T3544] el0_svc_common.constprop.0+0xac/0x230 [ 1158.576122][ T3544] do_el0_svc+0x40/0x58 [ 1158.576525][ T3544] el0_svc+0x50/0x1a0 [ 1158.577073][ T3544] el0t_64_sync_handler+0xa0/0xe4 [ 1158.577442][ T3544] el0t_64_sync+0x198/0x19c [ 1158.611566][ T3544] block nbd0: Dead connection, failed to find a fallback [ 1158.617568][ T3544] block nbd0: shutting down sockets [ 1158.619502][ T3544] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.632395][ T3544] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1158.635925][ T3544] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.638011][ T3544] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1158.641104][ T3544] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.642831][ T3544] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1158.645346][ T3544] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.647093][ T3544] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1158.649387][ T3544] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.653575][ T3544] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1158.655528][ T3544] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.660397][ T3544] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1158.662320][ T3544] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.663766][ T3544] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1158.665263][ T3544] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.666949][ T3544] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1158.668203][ T3544] nbd0: unable to read partition table [ 1158.703155][ T3544] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.705009][ T3544] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1158.706799][ T3544] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1158.707971][ T3544] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1158.712261][ T3544] nbd0: unable to read partition table [ 1158.845015][ T3544] nbd0: unable to read partition table [ 1158.928848][ T3544] nbd0: unable to read partition table VM DIAGNOSIS: 10:30:20 Registers: info registers vcpu 0 CPU#0 PC=ffff800080346300 X00=00000000000000c0 X01=0000000000000001 X02=1ffff000143a2bac X03=ffff800080352e44 X04=ffff700010e44198 X05=ffff800087220cb8 X06=ffff700010e44197 X07=0000000000000001 X08=ffff800087220cbf X09=dfff800000000000 X10=ffff700010e44197 X11=1ffff00010e44197 X12=ffff700010e44198 X13=3037323337363731 X14=000000000000000f X15=0000000000000007 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00006a08a5a9 X20=1ffff000143a2b9a X21=ffff800087239ad8 X22=0000000000000008 X23=0000000000000004 X24=0000000000000000 X25=00000000000000c0 X26=0000000000000010 X27=0000000000000013 X28=1fffe0000d4114b5 X29=ffff8000a1d15c30 X30=ffff8000803462bc SP=ffff8000a1d15c30 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008544424c X00=ffff800085444248 X01=ffff800083dfe4d8 X02=0000000000000000 X03=ffff800080412728 X04=ffff700011a3c769 X05=ffff80008d1e3b40 X06=ffff700011a3c768 X07=0000000000000001 X08=ffff80008d1e3b43 X09=dfff800000000000 X10=ffff700011a3c768 X11=1ffff00011a3c768 X12=ffff700011a3c769 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=0000000077359496 X20=ffff80008d1e3b40 X21=ffff8000a22e7d90 X22=dfff800000000000 X23=ffff8000804231a4 X24=1ffff0001445cfb2 X25=0000000000037110 X26=ffff8000804231a4 X27=0000000000000000 X28=ffff00000f795ac0 X29=ffff8000a22e7c00 X30=ffff800083dfe4f0 SP=ffff8000a22e7c00 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000