last executing test programs: 1m57.245491421s ago: executing program 1 (id=1752): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x103041, 0x0) dup3(r1, r2, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r3, 0x5450, 0x0) 1m57.04327733s ago: executing program 1 (id=1753): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x11, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0x541b, &(0x7f0000000040)={0xffffffffffffffff}) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f0000000340), 0xffffff46) write$P9_RAUTH(r2, &(0x7f0000000100)={0x14}, 0x14) 1m56.713133773s ago: executing program 1 (id=1754): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x40140, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$packet(r0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x5421, &(0x7f0000000540)) 1m56.545223959s ago: executing program 1 (id=1755): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000005ffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) r2 = dup(r1) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, 0x0) 1m41.314882241s ago: executing program 1 (id=1763): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r2, r1, 0x0) r4 = accept$inet6(r3, 0x0, 0x0) ioctl$FICLONE(r0, 0x5450, r4) 1m41.154879257s ago: executing program 1 (id=1764): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7f, 0x1802c1) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) read$snddsp(r0, &(0x7f0000000200)=""/30, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a40), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000ac0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 55.485128831s ago: executing program 32 (id=1764): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7f, 0x1802c1) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) read$snddsp(r0, &(0x7f0000000200)=""/30, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a40), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000ac0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 49.931206781s ago: executing program 0 (id=1788): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$packet(r0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0x5451, 0x0) 49.681910615s ago: executing program 0 (id=1789): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept(r1, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) fcntl$getflags(r3, 0x0) 49.337964329s ago: executing program 0 (id=1790): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x33fe0}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 48.075059792s ago: executing program 0 (id=1791): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = getpgid(0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r5) sendmsg$netlink(r2, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000100)=ANY=[], 0x10}], 0x1, &(0x7f00000027c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) 47.865625642s ago: executing program 0 (id=1792): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) dup3(r3, r2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 45.181718853s ago: executing program 0 (id=1793): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x541b, 0x200000000000) 0s ago: executing program 33 (id=1793): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x541b, 0x200000000000) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:20125' (ED25519) to the list of known hosts. [ 133.952873][ T30] audit: type=1400 audit(133.650:58): avc: denied { name_bind } for pid=3292 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 134.244625][ T30] audit: type=1400 audit(133.950:59): avc: denied { execute } for pid=3294 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 134.250495][ T30] audit: type=1400 audit(133.950:60): avc: denied { execute_no_trans } for pid=3294 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 137.930077][ T30] audit: type=1400 audit(137.630:61): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 137.940625][ T30] audit: type=1400 audit(137.640:62): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 137.972466][ T3294] cgroup: Unknown subsys name 'net' [ 137.992408][ T30] audit: type=1400 audit(137.690:63): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 138.315704][ T3294] cgroup: Unknown subsys name 'cpuset' [ 138.354874][ T3294] cgroup: Unknown subsys name 'rlimit' [ 138.781020][ T30] audit: type=1400 audit(138.480:64): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.785790][ T30] audit: type=1400 audit(138.490:65): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 138.787609][ T30] audit: type=1400 audit(138.490:66): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 139.096407][ T3296] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 139.103279][ T30] audit: type=1400 audit(138.800:67): avc: denied { relabelto } for pid=3296 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.105909][ T30] audit: type=1400 audit(138.810:68): avc: denied { write } for pid=3296 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 139.158727][ T30] audit: type=1400 audit(138.860:69): avc: denied { read } for pid=3294 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.161055][ T30] audit: type=1400 audit(138.860:70): avc: denied { open } for pid=3294 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.174258][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 150.563937][ T30] audit: type=1400 audit(150.270:71): avc: denied { execmem } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 150.623513][ T30] audit: type=1400 audit(150.330:72): avc: denied { read } for pid=3299 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 150.625378][ T30] audit: type=1400 audit(150.330:73): avc: denied { open } for pid=3299 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 150.641993][ T30] audit: type=1400 audit(150.340:74): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 150.686658][ T30] audit: type=1400 audit(150.390:75): avc: denied { module_request } for pid=3299 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 150.838254][ T30] audit: type=1400 audit(150.540:76): avc: denied { sys_module } for pid=3299 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 155.180973][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.203582][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.599751][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.619393][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.236832][ T3299] hsr_slave_0: entered promiscuous mode [ 157.248331][ T3299] hsr_slave_1: entered promiscuous mode [ 157.544496][ T3301] hsr_slave_0: entered promiscuous mode [ 157.559329][ T3301] hsr_slave_1: entered promiscuous mode [ 157.580774][ T3301] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 157.584296][ T3301] Cannot create hsr debugfs directory [ 159.246169][ T30] audit: type=1400 audit(158.950:77): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.249332][ T30] audit: type=1400 audit(158.950:78): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.262959][ T30] audit: type=1400 audit(158.960:79): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.278629][ T3299] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 159.328702][ T3299] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 159.395719][ T3299] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 159.454375][ T3299] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 159.746225][ T3301] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 159.775201][ T3301] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 159.797008][ T3301] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 159.816480][ T3301] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 161.180354][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.445258][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.998050][ T3299] veth0_vlan: entered promiscuous mode [ 167.105430][ T3299] veth1_vlan: entered promiscuous mode [ 167.150043][ T3301] veth0_vlan: entered promiscuous mode [ 167.231664][ T3301] veth1_vlan: entered promiscuous mode [ 167.378764][ T3299] veth0_macvtap: entered promiscuous mode [ 167.404146][ T3299] veth1_macvtap: entered promiscuous mode [ 167.540946][ T3301] veth0_macvtap: entered promiscuous mode [ 167.585816][ T3301] veth1_macvtap: entered promiscuous mode [ 167.690643][ T3299] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.692037][ T3299] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.692239][ T3299] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.692397][ T3299] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.916799][ T3301] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.919787][ T3301] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.924443][ T3301] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.926992][ T3301] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.076974][ T30] audit: type=1400 audit(167.780:80): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 168.089326][ T30] audit: type=1400 audit(167.790:81): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzkaller.UXojty/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 168.122033][ T30] audit: type=1400 audit(167.820:82): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 168.149140][ T30] audit: type=1400 audit(167.850:83): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzkaller.UXojty/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 168.173141][ T30] audit: type=1400 audit(167.860:84): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzkaller.UXojty/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3051 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 168.234597][ T30] audit: type=1400 audit(167.930:85): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 168.266924][ T30] audit: type=1400 audit(167.970:86): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 168.277399][ T30] audit: type=1400 audit(167.980:87): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="gadgetfs" ino=3450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 168.576261][ T30] audit: type=1400 audit(168.280:88): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 168.581223][ T30] audit: type=1400 audit(168.280:89): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 168.928613][ T3299] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 170.057094][ T3446] serio: Serial port pts0 [ 171.426566][ T3460] serio: Serial port pts1 [ 177.393017][ T3466] serio: Serial port pts1 [ 184.418122][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 184.427936][ T30] audit: type=1400 audit(184.120:94): avc: denied { create } for pid=3478 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 185.317242][ T3487] serio: Serial port pts0 [ 185.544303][ T30] audit: type=1400 audit(185.250:95): avc: denied { create } for pid=3489 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 185.551015][ T3490] 8021q: VLANs not supported on wg0 [ 185.551101][ T30] audit: type=1400 audit(185.250:96): avc: denied { ioctl } for pid=3489 comm="syz.1.20" path="socket:[4170]" dev="sockfs" ino=4170 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 187.958237][ T30] audit: type=1400 audit(187.660:97): avc: denied { create } for pid=3507 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 187.978063][ T30] audit: type=1400 audit(187.680:98): avc: denied { setopt } for pid=3507 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 187.990909][ T30] audit: type=1400 audit(187.690:99): avc: denied { connect } for pid=3507 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 188.026877][ T30] audit: type=1400 audit(187.730:100): avc: denied { ioctl } for pid=3507 comm="syz.1.27" path="socket:[3605]" dev="sockfs" ino=3605 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 188.030377][ T30] audit: type=1400 audit(187.730:101): avc: denied { write } for pid=3507 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 189.838195][ T3516] serio: Serial port pts1 [ 204.469121][ T3555] serio: Serial port pts0 [ 211.362282][ T30] audit: type=1400 audit(211.060:102): avc: denied { read } for pid=3567 comm="syz.1.48" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 211.362926][ T30] audit: type=1400 audit(211.060:103): avc: denied { open } for pid=3567 comm="syz.1.48" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 211.373282][ T30] audit: type=1400 audit(211.070:104): avc: denied { ioctl } for pid=3567 comm="syz.1.48" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 211.920136][ T30] audit: type=1400 audit(211.620:105): avc: denied { load_policy } for pid=3570 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 213.982375][ T3584] serio: Serial port pts0 [ 221.747510][ T3631] Zero length message leads to an empty skb [ 222.552319][ T3641] serio: Serial port pts0 [ 223.090632][ T30] audit: type=1400 audit(222.790:106): avc: denied { map_create } for pid=3643 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.095916][ T30] audit: type=1400 audit(222.800:107): avc: denied { bpf } for pid=3643 comm="syz.0.80" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 223.112034][ T30] audit: type=1400 audit(222.810:108): avc: denied { map_read map_write } for pid=3643 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.115214][ T30] audit: type=1400 audit(222.820:109): avc: denied { prog_load } for pid=3643 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.119835][ T30] audit: type=1400 audit(222.820:110): avc: denied { perfmon } for pid=3643 comm="syz.0.80" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 226.028011][ T3651] serio: Serial port pts1 [ 230.625819][ T3659] mmap: syz.1.84 (3659) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 233.176974][ T3667] serio: Serial port pts0 [ 239.496979][ T3679] serio: Serial port pts0 [ 240.032365][ T3684] serio: Serial port pts1 [ 247.770613][ T30] audit: type=1400 audit(247.470:111): avc: denied { create } for pid=3698 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.780788][ T3699] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 247.789644][ T30] audit: type=1400 audit(247.490:112): avc: denied { ioctl } for pid=3698 comm="syz.1.97" path="socket:[3901]" dev="sockfs" ino=3901 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.824322][ T3699] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3699 comm=syz.1.97 [ 247.845819][ T30] audit: type=1400 audit(247.550:113): avc: denied { audit_write } for pid=3698 comm="syz.1.97" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 248.252683][ T3701] serio: Serial port pts1 [ 254.881897][ T3715] serio: Serial port pts0 [ 258.880743][ T30] audit: type=1400 audit(258.580:114): avc: denied { read write } for pid=3739 comm="syz.0.111" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 258.886014][ T30] audit: type=1400 audit(258.590:115): avc: denied { open } for pid=3739 comm="syz.0.111" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 260.090274][ T30] audit: type=1400 audit(259.790:116): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 265.626137][ T3781] serio: Serial port pts1 [ 272.038895][ T3804] cgroup: fork rejected by pids controller in /syz0 [ 272.572524][ T3809] serio: Serial port pts0 [ 273.182524][ T56] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.371199][ T56] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.619903][ T56] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.880116][ T56] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 274.441039][ T30] audit: type=1400 audit(274.140:117): avc: denied { read } for pid=3150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 277.174451][ T56] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 277.243164][ T56] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 277.302320][ T56] bond0 (unregistering): Released all slaves [ 277.555708][ T56] hsr_slave_0: left promiscuous mode [ 277.560837][ T56] hsr_slave_1: left promiscuous mode [ 277.628743][ T56] veth1_macvtap: left promiscuous mode [ 277.629995][ T56] veth0_macvtap: left promiscuous mode [ 277.632203][ T56] veth1_vlan: left promiscuous mode [ 277.633454][ T56] veth0_vlan: left promiscuous mode [ 281.445401][ T3855] serio: Serial port pts0 [ 288.345366][ T3811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.400410][ T3811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.102683][ T30] audit: type=1400 audit(288.790:118): avc: denied { name_bind } for pid=3896 comm="syz.1.163" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 289.113901][ T30] audit: type=1400 audit(288.820:119): avc: denied { node_bind } for pid=3896 comm="syz.1.163" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 289.599112][ T30] audit: type=1400 audit(289.300:120): avc: denied { read } for pid=3105 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 289.612018][ T30] audit: type=1400 audit(289.310:121): avc: denied { append } for pid=3105 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 289.615683][ T30] audit: type=1400 audit(289.320:122): avc: denied { open } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 289.619304][ T30] audit: type=1400 audit(289.320:123): avc: denied { getattr } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 291.429493][ T3811] hsr_slave_0: entered promiscuous mode [ 291.447263][ T3811] hsr_slave_1: entered promiscuous mode [ 294.532877][ T3811] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 294.561687][ T3811] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 294.603739][ T3811] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 294.670877][ T3811] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 296.198521][ T3811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.558382][ T3811] veth0_vlan: entered promiscuous mode [ 303.643577][ T3811] veth1_vlan: entered promiscuous mode [ 303.930502][ T3811] veth0_macvtap: entered promiscuous mode [ 303.985576][ T3811] veth1_macvtap: entered promiscuous mode [ 304.228755][ T3811] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.243005][ T3811] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.246230][ T3811] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.249975][ T3811] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.632846][ T30] audit: type=1400 audit(304.310:124): avc: denied { mounton } for pid=3811 comm="syz-executor" path="/syzkaller.GzIett/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 304.633410][ T30] audit: type=1400 audit(304.330:125): avc: denied { mounton } for pid=3811 comm="syz-executor" path="/syzkaller.GzIett/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 304.673185][ T30] audit: type=1400 audit(304.370:126): avc: denied { mount } for pid=3811 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 304.890759][ T30] audit: type=1400 audit(304.590:127): avc: denied { mounton } for pid=3811 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 305.691841][ T4010] serio: Serial port pts0 [ 312.115980][ T4036] serio: Serial port pts0 [ 313.317717][ T4048] serio: Serial port pts1 [ 319.246023][ T30] audit: type=1400 audit(318.950:128): avc: denied { allowed } for pid=4060 comm="syz.1.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 319.291077][ T30] audit: type=1400 audit(318.990:129): avc: denied { create } for pid=4060 comm="syz.1.186" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 323.865808][ T30] audit: type=1400 audit(323.570:130): avc: denied { execute } for pid=4095 comm="syz.1.202" name="file1" dev="tmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 323.868083][ T4096] process 'syz.1.202' launched './file1' with NULL argv: empty string added [ 323.880259][ T30] audit: type=1400 audit(323.570:131): avc: denied { execute_no_trans } for pid=4095 comm="syz.1.202" path="/127/file1" dev="tmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 324.747182][ T4104] serio: Serial port pts0 [ 330.668586][ T4111] serio: Serial port pts0 [ 334.256658][ T4117] serio: Serial port pts1 [ 343.110370][ T4151] serio: Serial port pts0 [ 349.649218][ T4163] serio: Serial port pts1 [ 358.446070][ T4169] serio: Serial port pts0 [ 366.866200][ T30] audit: type=1400 audit(366.570:132): avc: denied { prog_run } for pid=4192 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 368.723191][ T4202] serio: Serial port pts0 [ 369.673851][ T30] audit: type=1400 audit(369.380:133): avc: denied { create } for pid=4206 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 369.683468][ T30] audit: type=1400 audit(369.390:134): avc: denied { setopt } for pid=4206 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 369.899189][ T30] audit: type=1400 audit(369.600:135): avc: denied { bind } for pid=4206 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 372.786107][ T4234] serio: Serial port pts1 [ 374.699442][ T4238] serio: Serial port pts0 [ 379.099397][ T4247] serio: Serial port pts1 [ 384.281087][ T4275] serio: Serial port pts0 [ 385.686776][ T30] audit: type=1400 audit(385.390:136): avc: denied { create } for pid=4286 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 386.300574][ T4291] serio: Serial port pts1 [ 391.978374][ T4312] serio: Serial port pts0 [ 401.629110][ T4352] serio: Serial port pts0 [ 408.658051][ T4386] serio: Serial port pts0 [ 413.517349][ T4401] serio: Serial port pts1 [ 414.790792][ T4409] serio: Serial port pts0 [ 420.840829][ T4427] serio: Serial port pts0 [ 422.691759][ T4442] serio: Serial port pts1 [ 438.827749][ T4465] serio: Serial port pts0 [ 442.421146][ T30] audit: type=1400 audit(442.120:137): avc: denied { mounton } for pid=4477 comm="syz.0.346" path="/84/file0" dev="tmpfs" ino=503 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 446.285197][ T4505] serio: Serial port pts0 [ 451.433481][ T4522] serio: Serial port pts1 [ 454.678312][ T4546] serio: Serial port pts0 [ 459.284224][ T4570] serio: Serial port pts1 [ 460.511050][ T4574] serio: Serial port pts0 [ 466.328947][ T4593] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4593 comm=syz.1.393 [ 475.439110][ T4657] serio: Serial port pts0 [ 478.937728][ T4675] serio: Serial port pts1 [ 491.126927][ T4685] serio: Serial port pts0 [ 498.434820][ T4719] serio: Serial port pts0 [ 499.359669][ T4725] serio: Serial port pts1 [ 508.248509][ T4771] serio: Serial port pts0 [ 510.438390][ T4787] serio: Serial port pts1 [ 523.969062][ T4801] serio: Serial port pts0 [ 527.392227][ T4806] serio: Serial port pts1 [ 530.148542][ T4814] serio: Serial port pts0 [ 533.830880][ T4824] serio: Serial port pts1 [ 545.034025][ T4896] serio: Serial port pts0 [ 550.718932][ T4926] serio: Serial port pts1 [ 557.236411][ T4934] block nbd0: NBD_DISCONNECT [ 557.240121][ T4934] block nbd0: Send disconnect failed -89 [ 557.246740][ T4934] block nbd0: Disconnected due to user request. [ 557.250469][ T4934] block nbd0: shutting down sockets [ 558.576496][ T4943] serio: Serial port pts1 [ 564.840054][ T4967] serio: Serial port pts0 [ 571.166175][ T5022] serio: Serial port pts1 [ 577.642886][ T5032] serio: Serial port pts1 [ 580.939323][ T30] audit: type=1400 audit(580.640:138): avc: denied { create } for pid=5043 comm="syz.1.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 583.742840][ T30] audit: type=1400 audit(583.450:139): avc: denied { create } for pid=5065 comm="syz.1.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 583.750983][ T30] audit: type=1400 audit(583.450:140): avc: denied { ioctl } for pid=5065 comm="syz.1.583" path="socket:[8821]" dev="sockfs" ino=8821 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 583.764233][ T30] audit: type=1400 audit(583.470:141): avc: denied { bind } for pid=5065 comm="syz.1.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 583.792615][ T30] audit: type=1400 audit(583.490:142): avc: denied { write } for pid=5065 comm="syz.1.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 585.345973][ T5079] serio: Serial port pts0 [ 585.765960][ T5084] serio: Serial port pts1 [ 592.076767][ T5100] serio: Serial port pts0 [ 593.563988][ T5113] serio: Serial port pts1 [ 610.752015][ T5150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5150 comm=syz.1.616 [ 611.552261][ T5156] serio: Serial port pts0 [ 613.034358][ T5167] serio: Serial port pts1 [ 627.937403][ T30] audit: type=1400 audit(627.640:143): avc: denied { create } for pid=5180 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 627.946653][ T30] audit: type=1400 audit(627.640:144): avc: denied { ioctl } for pid=5180 comm="syz.1.628" path="socket:[9843]" dev="sockfs" ino=9843 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 628.982914][ T5193] serio: Serial port pts0 [ 629.150597][ T5195] serio: Serial port pts1 [ 636.082187][ T5217] serio: Serial port pts0 [ 636.216214][ T5219] serio: Serial port pts1 [ 642.790623][ T5235] serio: Serial port pts0 [ 647.792107][ T30] audit: type=1400 audit(647.490:145): avc: denied { create } for pid=5275 comm="syz.1.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 649.050433][ T5285] serio: Serial port pts0 [ 652.971145][ T5309] serio: Serial port pts1 [ 655.279889][ T5318] serio: Serial port pts0 [ 657.229961][ C1] hrtimer: interrupt took 1156320 ns [ 671.184789][ T30] audit: type=1400 audit(670.880:146): avc: denied { create } for pid=5414 comm="syz.1.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 671.818030][ T5422] serio: Serial port pts0 [ 674.608350][ T5432] serio: Serial port pts1 [ 679.755116][ T30] audit: type=1400 audit(679.460:147): avc: denied { write } for pid=5450 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.916544][ T30] audit: type=1400 audit(679.620:148): avc: denied { read } for pid=5450 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 679.926080][ T30] audit: type=1400 audit(679.630:149): avc: denied { ioctl } for pid=5450 comm="syz.1.743" path="socket:[11417]" dev="sockfs" ino=11417 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 680.233385][ T5451] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 682.516133][ T5470] serio: Serial port pts0 [ 690.957335][ T5499] serio: Serial port pts0 [ 696.868272][ T5505] serio: Serial port pts0 [ 703.352900][ T30] audit: type=1400 audit(703.050:150): avc: denied { getopt } for pid=5529 comm="syz.0.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 704.282253][ T5543] serio: Serial port pts0 [ 707.352354][ T5554] serio: Serial port pts1 [ 719.656660][ T5560] serio: Serial port pts0 [ 722.920186][ T5569] serio: Serial port pts1 [ 725.783314][ T5575] serio: Serial port pts0 [ 729.382370][ T5586] serio: Serial port pts1 [ 731.800001][ T5592] serio: Serial port pts0 [ 735.292466][ T5597] serio: Serial port pts1 [ 745.624029][ T5638] serio: Serial port pts1 [ 747.692550][ T5651] serio: Serial port pts0 [ 753.724653][ T30] audit: type=1400 audit(753.430:151): avc: denied { bind } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 753.739156][ T30] audit: type=1400 audit(753.440:152): avc: denied { listen } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 753.746841][ T30] audit: type=1400 audit(753.450:153): avc: denied { connect } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 753.775539][ T30] audit: type=1400 audit(753.480:154): avc: denied { accept } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 753.784177][ T30] audit: type=1400 audit(753.480:155): avc: denied { write } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 753.790862][ T30] audit: type=1400 audit(753.490:156): avc: denied { read } for pid=5657 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 758.272679][ T5677] serio: Serial port pts0 [ 761.582814][ T5690] serio: Serial port pts1 [ 768.003169][ T5701] serio: Serial port pts1 [ 773.691047][ T5709] serio: Serial port pts0 [ 783.282779][ T30] audit: type=1400 audit(782.980:157): avc: denied { read } for pid=5731 comm="syz.0.846" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 783.289600][ T30] audit: type=1400 audit(782.990:158): avc: denied { open } for pid=5731 comm="syz.0.846" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 783.325508][ T30] audit: type=1400 audit(783.030:159): avc: denied { ioctl } for pid=5731 comm="syz.0.846" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 786.098501][ T5745] serio: Serial port pts0 [ 793.974732][ T30] audit: type=1400 audit(793.680:160): avc: denied { ioctl } for pid=5787 comm="syz.0.869" path="socket:[11003]" dev="sockfs" ino=11003 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 797.126723][ T5826] serio: Serial port pts0 [ 798.405121][ T5842] serio: Serial port pts1 [ 808.806347][ T30] audit: type=1400 audit(808.510:161): avc: denied { read write } for pid=5875 comm="syz.1.906" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 808.808476][ T30] audit: type=1400 audit(808.510:162): avc: denied { open } for pid=5875 comm="syz.1.906" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 808.815549][ T30] audit: type=1400 audit(808.520:163): avc: denied { ioctl } for pid=5875 comm="syz.1.906" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 808.833417][ T5876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 808.836013][ T5876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 812.687316][ T30] audit: type=1400 audit(812.390:164): avc: denied { create } for pid=5895 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 812.690586][ T30] audit: type=1400 audit(812.390:165): avc: denied { bind } for pid=5895 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 812.700663][ T30] audit: type=1400 audit(812.400:166): avc: denied { accept } for pid=5895 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 812.703622][ T30] audit: type=1400 audit(812.400:167): avc: denied { read } for pid=5895 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 813.138967][ T30] audit: type=1400 audit(812.840:168): avc: denied { write } for pid=5895 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 814.553614][ T5915] serio: Serial port pts0 [ 817.276490][ T30] audit: type=1400 audit(816.980:169): avc: denied { append } for pid=5923 comm="syz.1.926" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 820.064739][ T5928] serio: Serial port pts1 [ 822.289876][ T5940] serio: Serial port pts0 [ 831.899514][ T30] audit: type=1400 audit(831.600:170): avc: denied { read } for pid=5976 comm="syz.1.946" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 831.900168][ T30] audit: type=1400 audit(831.600:171): avc: denied { open } for pid=5976 comm="syz.1.946" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 831.916321][ T30] audit: type=1400 audit(831.620:172): avc: denied { ioctl } for pid=5976 comm="syz.1.946" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 832.609008][ T6008] serio: Serial port pts0 [ 833.991151][ T6012] serio: Serial port pts1 [ 838.702423][ T6021] serio: Serial port pts0 [ 844.607639][ T6026] serio: Serial port pts0 [ 849.220203][ T6031] serio: Serial port pts1 [ 852.446687][ T6050] serio: Serial port pts0 [ 856.620626][ T6068] serio: Serial port pts1 [ 867.951902][ T6075] serio: Serial port pts0 [ 874.619245][ T6104] serio: Serial port pts0 [ 875.898702][ T6116] serio: Serial port pts1 [ 880.821746][ T6128] serio: Serial port pts0 [ 881.708693][ T6131] serio: Serial port pts1 [ 888.712893][ T6146] serio: Serial port pts1 [ 894.596354][ T6153] serio: Serial port pts1 [ 901.726398][ T30] audit: type=1400 audit(901.430:173): avc: denied { watch watch_reads } for pid=6167 comm="syz.0.1013" path=2F6D656D66643A2D888C47F3BDBDE2D0401E8BF487E5490884A26D202864656C6574656429 dev="tmpfs" ino=1037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 902.740664][ T6177] serio: Serial port pts0 [ 910.315973][ T6187] serio: Serial port pts1 [ 916.192434][ T6193] serio: Serial port pts1 [ 918.746461][ T30] audit: type=1400 audit(918.450:174): avc: denied { ioctl } for pid=6207 comm="syz.0.1026" path="socket:[12748]" dev="sockfs" ino=12748 ioctlcmd=0x556a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 927.270793][ T6256] serio: Serial port pts0 [ 931.702479][ T6265] serio: Serial port pts1 [ 933.217134][ T6272] serio: Serial port pts0 [ 938.982415][ T6287] serio: Serial port pts0 [ 944.971931][ T6305] serio: Serial port pts0 [ 950.505030][ T6310] serio: Serial port pts1 [ 956.340687][ T6321] serio: Serial port pts0 [ 964.369805][ T6334] serio: Serial port pts1 [ 972.318627][ T6360] serio: Serial port pts0 [ 977.671115][ T6379] serio: Serial port pts1 [ 984.438516][ T30] audit: type=1400 audit(984.140:175): avc: denied { write } for pid=6431 comm="syz.0.1112" path="socket:[14051]" dev="sockfs" ino=14051 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 985.039043][ T6440] serio: Serial port pts0 [ 991.029578][ T6446] syzkaller0: entered promiscuous mode [ 991.030266][ T6446] syzkaller0: entered allmulticast mode [ 998.673826][ T6476] serio: Serial port pts0 [ 1005.805018][ T6495] ======================================================= [ 1005.805018][ T6495] WARNING: The mand mount option has been deprecated and [ 1005.805018][ T6495] and is ignored by this kernel. Remove the mand [ 1005.805018][ T6495] option from the mount to silence this warning. [ 1005.805018][ T6495] ======================================================= [ 1005.890581][ T30] audit: type=1400 audit(1005.590:176): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1008.176262][ T6510] serio: Serial port pts0 [ 1008.610702][ T6513] serio: Serial port pts1 [ 1015.755780][ T6531] serio: Serial port pts0 [ 1020.004872][ T6549] serio: Serial port pts1 [ 1021.627701][ T30] audit: type=1400 audit(1021.330:177): avc: denied { map } for pid=6552 comm="syz.0.1157" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14456 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1021.628373][ T30] audit: type=1400 audit(1021.330:178): avc: denied { read write } for pid=6552 comm="syz.0.1157" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14456 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1023.713270][ T6564] serio: Serial port pts0 [ 1027.970999][ T6581] serio: Serial port pts1 [ 1031.050245][ T30] audit: type=1400 audit(1030.750:179): avc: denied { bind } for pid=6599 comm="syz.0.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1031.054558][ T30] audit: type=1400 audit(1030.760:180): avc: denied { name_bind } for pid=6599 comm="syz.0.1177" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1031.059095][ T30] audit: type=1400 audit(1030.760:181): avc: denied { node_bind } for pid=6599 comm="syz.0.1177" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1031.073233][ T30] audit: type=1400 audit(1030.770:182): avc: denied { connect } for pid=6599 comm="syz.0.1177" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1031.076368][ T30] audit: type=1400 audit(1030.780:183): avc: denied { name_connect } for pid=6599 comm="syz.0.1177" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1031.719517][ T30] audit: type=1400 audit(1031.420:184): avc: denied { create } for pid=6599 comm="syz.0.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1043.613546][ T6656] serio: Serial port pts0 [ 1045.316835][ T6668] serio: Serial port pts1 [ 1053.706473][ T30] audit: type=1326 audit(1053.410:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6689 comm="syz.0.1211" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb315bce8 code=0x0 [ 1060.063629][ T6723] serio: Serial port pts0 [ 1060.460713][ T6726] serio: Serial port pts1 [ 1064.089173][ T6737] serio: Serial port pts1 [ 1066.743553][ T6746] serio: Serial port pts0 [ 1070.732706][ T6758] serio: Serial port pts1 [ 1072.773758][ T5455] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1073.022624][ T5455] usb 1-1: Using ep0 maxpacket: 8 [ 1073.043255][ T5455] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 11 [ 1073.045834][ T5455] usb 1-1: New USB device found, idVendor=044f, idProduct=b654, bcdDevice= 0.00 [ 1073.046316][ T5455] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1073.078105][ T5455] usb 1-1: config 0 descriptor?? [ 1073.406190][ T5455] usbhid 1-1:0.0: can't add hid device: -71 [ 1073.407826][ T5455] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1073.463360][ T5455] usb 1-1: USB disconnect, device number 2 [ 1079.485915][ T30] audit: type=1400 audit(1079.190:186): avc: denied { ioctl } for pid=6810 comm="syz.1.1259" path="socket:[14984]" dev="sockfs" ino=14984 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1079.490249][ T30] audit: type=1400 audit(1079.190:187): avc: denied { write } for pid=6810 comm="syz.1.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1080.805417][ T30] audit: type=1400 audit(1080.510:188): avc: denied { create } for pid=6823 comm="syz.0.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1080.819213][ T30] audit: type=1400 audit(1080.520:189): avc: denied { ioctl } for pid=6823 comm="syz.0.1265" path="socket:[15621]" dev="sockfs" ino=15621 ioctlcmd=0x8b24 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1081.032510][ T6826] serio: Serial port pts0 [ 1081.969289][ T6839] serio: Serial port pts1 [ 1091.607648][ T6886] serio: Serial port pts0 [ 1092.202060][ T6890] serio: Serial port pts1 [ 1098.234414][ T30] audit: type=1400 audit(1097.940:190): avc: denied { write } for pid=6904 comm="syz.1.1298" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1099.767018][ T30] audit: type=1400 audit(1099.470:191): avc: denied { setopt } for pid=6922 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1104.484343][ T6962] serio: Serial port pts0 [ 1106.702926][ T30] audit: type=1400 audit(1106.400:192): avc: denied { sqpoll } for pid=6967 comm="syz.1.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1107.292140][ T6975] serio: Serial port pts1 [ 1113.432216][ T6990] serio: Serial port pts0 [ 1118.443295][ T7027] serio: Serial port pts1 [ 1135.614167][ T30] audit: type=1326 audit(1135.320:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7053 comm="syz.1.1359" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffa0b5bce8 code=0x0 [ 1138.475141][ T30] audit: type=1400 audit(1138.170:194): avc: denied { getopt } for pid=7075 comm="syz.1.1367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1139.084452][ T30] audit: type=1400 audit(1138.780:195): avc: denied { write } for pid=7075 comm="syz.1.1367" path="socket:[15994]" dev="sockfs" ino=15994 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1148.812822][ T7136] serio: Serial port pts0 [ 1157.499260][ T30] audit: type=1400 audit(1157.200:196): avc: denied { listen } for pid=7156 comm="syz.0.1397" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1157.504588][ T7157] 8021q: VLANs not supported on vcan0 [ 1162.484847][ T30] audit: type=1400 audit(1162.180:197): avc: denied { setattr } for pid=7172 comm="syz.0.1404" name="PACKET" dev="sockfs" ino=16705 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1164.093250][ T7182] serio: Serial port pts0 [ 1164.772699][ T7189] serio: Serial port pts1 [ 1181.048765][ T7208] serio: Serial port pts0 [ 1199.085328][ T30] audit: type=1400 audit(1198.790:198): avc: denied { setopt } for pid=7251 comm="syz.1.1433" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1199.258893][ T30] audit: type=1400 audit(1198.960:199): avc: denied { watch watch_reads } for pid=7254 comm="syz.1.1435" path="/proc/1739" dev="proc" ino=16830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1204.032294][ T7287] serio: Serial port pts0 [ 1205.776890][ T30] audit: type=1400 audit(1205.480:200): avc: denied { write } for pid=7293 comm="syz.1.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1206.578838][ T7302] serio: Serial port pts1 [ 1209.466163][ T7314] serio: Serial port pts1 [ 1224.685113][ T7339] serio: Serial port pts0 [ 1226.097687][ T30] audit: type=1400 audit(1225.800:201): avc: denied { write } for pid=7346 comm="syz.1.1467" name="psched" dev="proc" ino=4026532729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1233.893236][ T7366] serio: Serial port pts1 [ 1243.643520][ T30] audit: type=1400 audit(1243.340:202): avc: denied { setattr } for pid=7379 comm="syz.0.1479" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1259.056792][ T30] audit: type=1400 audit(1258.760:203): avc: denied { setopt } for pid=7413 comm="syz.1.1491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1267.472029][ T7430] serio: Serial port pts0 [ 1272.269823][ T7444] serio: Serial port pts1 [ 1288.144574][ T30] audit: type=1400 audit(1287.850:204): avc: denied { write } for pid=7456 comm="syz.0.1505" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1298.326466][ T30] audit: type=1400 audit(1298.030:205): avc: denied { create } for pid=7501 comm="syz.1.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1298.345436][ T30] audit: type=1400 audit(1298.050:206): avc: denied { write } for pid=7501 comm="syz.1.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1299.081145][ T7515] serio: Serial port pts0 [ 1303.271184][ T7530] serio: Serial port pts1 [ 1314.700286][ T30] audit: type=1400 audit(1314.400:207): avc: denied { accept } for pid=7537 comm="syz.1.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1319.154305][ T7557] serio: Serial port pts0 [ 1331.158602][ T7621] serio: Serial port pts0 [ 1346.395921][ T30] audit: type=1400 audit(1346.100:208): avc: denied { name_bind } for pid=7643 comm="syz.1.1582" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1351.552636][ T30] audit: type=1400 audit(1351.250:209): avc: denied { create } for pid=7698 comm="syz.1.1603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1353.160331][ T7703] netlink: 'syz.0.1604': attribute type 12 has an invalid length. [ 1353.646498][ T7703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7703 comm=syz.0.1604 [ 1355.460924][ T7730] serio: Serial port pts0 [ 1369.832458][ T7753] serio: Serial port pts0 [ 1372.918518][ T7764] serio: Serial port pts1 [ 1394.050688][ T30] audit: type=1326 audit(1393.750:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.0.1633" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb315bce8 code=0x0 [ 1399.325749][ T7819] serio: Serial port pts0 [ 1402.896096][ T7843] syz.0.1653 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1407.704264][ T30] audit: type=1400 audit(1407.410:211): avc: denied { create } for pid=7860 comm="syz.0.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1407.712579][ T30] audit: type=1400 audit(1407.410:212): avc: denied { ioctl } for pid=7860 comm="syz.0.1659" path="socket:[18405]" dev="sockfs" ino=18405 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1408.831916][ T7868] serio: Serial port pts1 [ 1416.106491][ T30] audit: type=1400 audit(1415.810:213): avc: denied { read } for pid=7878 comm="syz.1.1665" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1416.107165][ T30] audit: type=1400 audit(1415.810:214): avc: denied { open } for pid=7878 comm="syz.1.1665" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1432.402628][ T30] audit: type=1400 audit(1432.100:215): avc: denied { read } for pid=7919 comm="syz.0.1680" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1432.410754][ T30] audit: type=1400 audit(1432.110:216): avc: denied { open } for pid=7919 comm="syz.0.1680" path="/780/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1432.530255][ T7922] block device autoloading is deprecated and will be removed. [ 1432.555277][ T30] audit: type=1400 audit(1432.260:217): avc: denied { ioctl } for pid=7919 comm="syz.0.1680" path="/780/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1434.280456][ T7941] serio: Serial port pts0 [ 1436.085160][ T30] audit: type=1400 audit(1435.790:218): avc: denied { block_suspend } for pid=7947 comm="syz.1.1690" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1436.806548][ T7954] serio: Serial port pts1 [ 1443.289994][ T30] audit: type=1400 audit(1442.990:219): avc: denied { setattr } for pid=7964 comm="syz.1.1696" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1443.534959][ T7967] serio: Serial port pts1 [ 1457.822188][ T8000] serio: Serial port pts0 [ 1461.953248][ T30] audit: type=1400 audit(1461.660:220): avc: denied { connect } for pid=8017 comm="syz.1.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1461.972853][ T30] audit: type=1400 audit(1461.670:221): avc: denied { read } for pid=8017 comm="syz.1.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1466.448219][ T8037] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1724'. [ 1466.535986][ T8037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8037 comm=syz.1.1724 [ 1467.962786][ T8046] serio: Serial port pts1 [ 1469.869555][ T8051] serio: Serial port pts1 [ 1474.806090][ T8065] serio: Serial port pts0 [ 1476.840833][ T8072] serio: Serial port pts0 [ 1485.017763][ T8077] serio: Serial port pts1 [ 1488.253226][ T8091] serio: Serial port pts1 [ 1492.140361][ T8097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8097 comm=syz.0.1744 [ 1492.558032][ T8101] serio: Serial port pts0 [ 1495.618267][ T3120] udevd[3120]: worker [7923] /devices/virtual/block/md2 is taking a long time [ 1504.189508][ T30] audit: type=1400 audit(1503.890:222): avc: denied { nlmsg_write } for pid=8113 comm="syz.1.1751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1505.632777][ T8123] serio: Serial port pts1 [ 1511.221960][ T8142] serio: Serial port pts0 [ 1534.512248][ T8163] serio: Serial port pts0 [ 1550.236835][ T8173] xt_bpf: check failed: parse error [ 1550.432223][ T8175] serio: Serial port pts0 [ 1552.546855][ T8182] serio: Serial port pts0 [ 1571.134247][ T8192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1571.150775][ T8192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1573.296249][ T8192] hsr_slave_0: entered promiscuous mode [ 1573.301213][ T8192] hsr_slave_1: entered promiscuous mode [ 1573.308197][ T8192] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1573.308928][ T8192] Cannot create hsr debugfs directory [ 1615.340861][ T3120] udevd[3120]: worker [7923] /devices/virtual/block/md2 timeout; kill it [ 1615.357514][ T3120] udevd[3120]: seq 7856 '/devices/virtual/block/md2' killed [ 1878.532850][ T33] INFO: task kworker/1:2:5455 blocked for more than 430 seconds. [ 1878.533824][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 1878.534219][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1878.534656][ T33] task:kworker/1:2 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 1878.535524][ T33] Workqueue: md_misc mddev_delayed_delete [ 1878.536792][ T33] Call trace: [ 1878.537105][ T33] __switch_to+0x204/0x4bc (T) [ 1878.537470][ T33] __schedule+0xd34/0x3188 [ 1878.537718][ T33] schedule+0xd0/0x344 [ 1878.537936][ T33] schedule_timeout+0x1ec/0x224 [ 1878.538140][ T33] __wait_for_common+0x1d0/0x3f8 [ 1878.538342][ T33] wait_for_completion+0x20/0x2c [ 1878.538544][ T33] devtmpfs_submit_req+0xac/0x114 [ 1878.538764][ T33] devtmpfs_delete_node+0xd8/0x128 [ 1878.538972][ T33] device_del+0x59c/0x7b4 [ 1878.539181][ T33] del_gendisk+0x3fc/0x87c [ 1878.539392][ T33] md_kobj_release+0x84/0xd8 [ 1878.539601][ T33] kobject_put+0x17c/0x430 [ 1878.539817][ T33] mddev_delayed_delete+0x14/0x20 [ 1878.540046][ T33] process_one_work+0x7cc/0x18d4 [ 1878.540268][ T33] worker_thread+0x734/0xb84 [ 1878.540482][ T33] kthread+0x348/0x5fc [ 1878.540689][ T33] ret_from_fork+0x10/0x20 [ 1878.541130][ T33] INFO: task udevd:7923 blocked for more than 430 seconds. [ 1878.546633][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 1878.547116][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1878.547323][ T33] task:udevd state:D stack:0 pid:7923 tgid:7923 ppid:3120 task_flags:0x400040 flags:0x00000005 [ 1878.547624][ T33] Call trace: [ 1878.547766][ T33] __switch_to+0x204/0x4bc (T) [ 1878.548002][ T33] __schedule+0xd34/0x3188 [ 1878.548177][ T33] schedule+0xd0/0x344 [ 1878.548348][ T33] schedule_preempt_disabled+0x18/0x2c [ 1878.548519][ T33] __mutex_lock+0x5d8/0x9d8 [ 1878.548660][ T33] mutex_lock_nested+0x24/0x30 [ 1878.548801][ T33] blk_probe_dev+0x30/0x168 [ 1878.548944][ T33] blk_request_module+0x18/0xa4 [ 1878.549088][ T33] blkdev_get_no_open+0x74/0xbc [ 1878.549236][ T33] bdev_statx+0x8c/0x498 [ 1878.549393][ T33] vfs_getattr_nosec+0x290/0x374 [ 1878.549542][ T33] vfs_statx+0x104/0x2c4 [ 1878.549683][ T33] vfs_fstatat+0x64/0xd8 [ 1878.549824][ T33] __do_sys_newfstatat+0xa8/0x108 [ 1878.549966][ T33] __arm64_sys_newfstatat+0x88/0xc8 [ 1878.550110][ T33] invoke_syscall+0x6c/0x258 [ 1878.550254][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1878.550408][ T33] do_el0_svc+0x40/0x58 [ 1878.550550][ T33] el0_svc+0x50/0x180 [ 1878.550725][ T33] el0t_64_sync_handler+0x10c/0x138 [ 1878.551000][ T33] el0t_64_sync+0x198/0x19c [ 1878.552615][ T33] INFO: task udevd:7923 is blocked on a mutex likely owned by task kdevtmpfs:25. [ 1878.552861][ T33] task:kdevtmpfs state:D stack:0 pid:25 tgid:25 ppid:2 task_flags:0x208140 flags:0x00000008 [ 1878.553262][ T33] Call trace: [ 1878.553546][ T33] __switch_to+0x204/0x4bc (T) [ 1878.553835][ T33] __schedule+0xd34/0x3188 [ 1878.554086][ T33] schedule+0xd0/0x344 [ 1878.554379][ T33] schedule_timeout+0x1ec/0x224 [ 1878.554662][ T33] __wait_for_common+0x1d0/0x3f8 [ 1878.555168][ T33] wait_for_completion+0x20/0x2c [ 1878.555668][ T33] __flush_workqueue+0x2d0/0xef8 [ 1878.556013][ T33] md_alloc+0x40/0xca0 [ 1878.556302][ T33] md_probe+0x30/0x54 [ 1878.556593][ T33] blk_probe_dev+0xec/0x168 [ 1878.556878][ T33] blk_request_module+0x18/0xa4 [ 1878.557162][ T33] blkdev_get_no_open+0x74/0xbc [ 1878.557457][ T33] bdev_statx+0x8c/0x498 [ 1878.557751][ T33] vfs_getattr_nosec+0x290/0x374 [ 1878.558053][ T33] vfs_getattr+0x40/0x54 [ 1878.558336][ T33] handle_remove+0xec/0x4f8 [ 1878.558608][ T33] devtmpfs_work_loop+0x264/0x634 [ 1878.558963][ T33] get_nid_for_pfn+0x0/0xd0 [ 1878.559200][ T33] kthread+0x348/0x5fc [ 1878.559560][ T33] ret_from_fork+0x10/0x20 [ 1878.560073][ T33] [ 1878.560073][ T33] Showing all locks held in the system: [ 1878.560561][ T33] 3 locks held by kworker/u8:0/12: [ 1878.560890][ T33] #0: ffff0000133d0148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1878.564046][ T33] #1: ffff80008d507c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1878.565066][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1878.566782][ T33] 2 locks held by kdevtmpfs/25: [ 1878.567223][ T33] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 1878.568458][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1878.569625][ T33] 2 locks held by pr/ttyAMA0/32: [ 1878.569905][ T33] 1 lock held by khungtaskd/33: [ 1878.570219][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1878.580107][ T33] 1 lock held by klogd/3109: [ 1878.580481][ T33] 1 lock held by dhcpcd/3150: [ 1878.580744][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1878.582454][ T33] 2 locks held by getty/3240: [ 1878.582768][ T33] #0: ffff000017f860a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1878.584047][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 1878.585182][ T33] 2 locks held by kworker/1:2/5455: [ 1878.585496][ T33] #0: ffff00000f3e2948 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1878.586552][ T33] #1: ffff8000a0997c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1878.587625][ T33] 1 lock held by udevd/7923: [ 1878.587884][ T33] #0: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1878.588998][ T33] 2 locks held by syz.1.1764/8148: [ 1878.589278][ T33] #0: ffff00000de52420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 1878.590357][ T33] #1: ffff00000de30950 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xcbc/0x25e4 [ 1878.592363][ T33] 3 locks held by kworker/u8:5/8185: [ 1878.592630][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1878.593625][ T33] #1: ffff80008f307c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1878.594626][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1878.595891][ T33] 2 locks held by syz-executor/8192: [ 1878.596177][ T33] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 1878.597706][ T33] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 1878.598991][ T33] 1 lock held by syz.0.1793/8259: [ 1878.599446][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1878.600710][ T33] 1 lock held by syz-executor/8263: [ 1878.600967][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1878.602718][ T33] [ 1878.602960][ T33] ============================================= [ 1878.602960][ T33] [ 1878.603963][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 1878.605209][ T33] CPU: 1 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 1878.605709][ T33] Hardware name: linux,dummy-virt (DT) [ 1878.606077][ T33] Call trace: [ 1878.606403][ T33] show_stack+0x18/0x24 (C) [ 1878.606727][ T33] dump_stack_lvl+0x38/0xf4 [ 1878.607012][ T33] dump_stack+0x1c/0x28 [ 1878.607260][ T33] panic+0x5b0/0x664 [ 1878.607542][ T33] watchdog+0x658/0x1140 [ 1878.607852][ T33] kthread+0x348/0x5fc [ 1878.608171][ T33] ret_from_fork+0x10/0x20 [ 1878.608991][ T33] SMP: stopping secondary CPUs [ 1878.610463][ T33] Kernel Offset: disabled [ 1878.610793][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 1878.611184][ T33] Memory Limit: none [ 1878.612878][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:19:55 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544667c X00=ffff800085446678 X01=ffff800083d66950 X02=0000000000000000 X03=ffff800080402058 X04=ffff700011a1f559 X05=ffff80008d0faac0 X06=ffff700011a1f558 X07=0000000000000001 X08=ffff80008d0faac3 X09=dfff800000000000 X10=ffff700011a1f558 X11=1ffff00011a1f558 X12=ffff700011a1f559 X13=0000000000000000 X14=1fffe0000d418836 X15=18505f2ad85bdaee X16=ca8b00000565ffff X17=191d3120eb325cf0 X18=ffff0000132143d0 X19=ffff80008d0faac0 X20=000001b54185dc00 X21=ffff800084a8fa34 X22=dfff800000000000 X23=000000000005a612 X24=ffff800084a8fa34 X25=ffff80008708de50 X26=0000000000000038 X27=0000000000000000 X28=0000000000000000 X29=ffff800080006d70 X30=ffff800083d66968 SP=ffff800080006d70 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=730073250a0d0a0d:7525203a6874676e Q02=f00ff00ff00ff00f:f00ff00ff00ff00f Q03=000f000f00000000:000f000000000000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0f0f00000f000000:0f0f00000f000000 Q06=cccccccccc00c300:cccccccccc00c300 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085421b10 X00=ffff80008d9275b6 X01=0000000000000800 X02=0000000000000001 X03=1ffff00010cb4fc0 X04=dfff800000000000 X05=ffff80008d9275be X06=000000000000005d X07=0000000000000001 X08=0000000041b58ab3 X09=00000000ffffffd8 X10=ffff80008d927450 X11=ffff80008d927450 X12=ffff700011b24eb8 X13=0000000000000006 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=000000000000415b X19=ffff80008d9275bf X20=ffff80008d9274c4 X21=ffff80008d9275bf X22=ffff80008d9275bf X23=00000000000000c0 X24=ffff80008719e7f0 X25=1ffff00010fb4e37 X26=ffff800087da7160 X27=ffff80008d927910 X28=0000000000000000 X29=ffff80008d9277f0 X30=ffff80008033b3dc SP=ffff80008d927740 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000ff0000:0000000000ff0000 Q01=696b202732646d2f:6b636f6c622f6c61 Q02=69206c6c696b203b:74756f0064656c6c Q03=000000000000f000:0000000f000f0000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=000000f0000f0f00:000000f0000f0f00 Q06=03000000cccccccc:03000000cccccccc Q07=0000aaaae456e790:000002da00000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000002000:0000000000000000 Q17=000000000000000b:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000