last executing test programs: 13m21.969733783s ago: executing program 1 (id=894): mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 13m21.579146664s ago: executing program 1 (id=896): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x11, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000800000000000000000000000850000007b000000b7080000000000007b8af8ff00000000b7080000161300027b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000009e00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) 13m20.979229554s ago: executing program 1 (id=898): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd89, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)='`', 0x1, 0x0, 0x80000000}, 0x50) 13m20.543250507s ago: executing program 1 (id=899): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$cgroup2(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x800010, 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000000)='binfmt_misc\x00', 0xc00, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) pivot_root(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') 13m20.134634238s ago: executing program 1 (id=900): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x58}}, 0x10) 13m19.502784811s ago: executing program 1 (id=902): r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x989680}}, 0x0) read(r0, &(0x7f00000002c0)=""/31, 0x1f) 13m19.458291043s ago: executing program 32 (id=902): r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x989680}}, 0x0) read(r0, &(0x7f00000002c0)=""/31, 0x1f) 32.352325629s ago: executing program 2 (id=2115): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x4, @remote, 0x20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x5, 0x4) sendmmsg$inet6(r0, &(0x7f0000000080)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x9}, 0x1c, 0x0}}], 0x1, 0x8d0) 31.968193439s ago: executing program 2 (id=2116): unshare(0x48030800) 31.308670853s ago: executing program 2 (id=2117): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1e, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xfffffd67, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfff}, 0x30) 30.886622305s ago: executing program 2 (id=2119): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x16, 0x0) symlinkat(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00') 29.364784685s ago: executing program 2 (id=2121): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, 0x0) 28.67976417s ago: executing program 2 (id=2123): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x8, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x31}, 0x4000) 5.053046628s ago: executing program 0 (id=2138): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x10, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7fffffff}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x8a, &(0x7f00000001c0)=""/138, 0x0, 0x2e}, 0x94) 4.693400556s ago: executing program 0 (id=2139): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000090825bd7000fbdbdf2500000000", @ANYRES32, @ANYBLOB="10080400092300001c0031"], 0x3c}}, 0x4008880) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044064}, 0x40000) 4.079998348s ago: executing program 0 (id=2140): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x4, 0x110b62) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x50042, 0x140) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f0000000b80)={r2, 0x0, {0x0, 0x0, 0x0, 0x6, 0x4000000000000ffd, 0x0, 0x1, 0xd, 0x15, "faf98317e5a1149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a7beda9d69098c8b534464c516bdd8a0f35", "32d8cc26f7061a74df2cfc06c8bef409ff214bd3ffe70c7fbf800b2f7b6aa54cc50a1fcaed1e831fa79a00", "67523760fd40f78d2cfc03d81a8ca55ba139c01802c4dae4162e43ac61b7ad33", [0x2, 0x7]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 3.217774423s ago: executing program 0 (id=2141): r0 = socket$inet_icmp(0x2, 0x2, 0x1) sendmmsg$inet(r0, &(0x7f0000000c40)=[{{&(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000080)=[{0x0}], 0x1}}], 0x1, 0x4800) recvfrom$packet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 2.392606116s ago: executing program 0 (id=2142): r0 = socket(0xa, 0x5, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='kmem_cache_free\x00', r1}, 0x18) r2 = mq_open(&(0x7f0000000340)=':\x00', 0x40, 0x1a, 0x0) fcntl$setlease(r2, 0x400, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 0 (id=2143): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000240), 0x7, 0x180862) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/fdt', 0x40000, 0x2d) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000080)={r1, 0x0, {0x0, 0x0, 0x0, 0xffff, 0x4000000000000ffd, 0x0, 0x0, 0x1e, 0xc, "faf98317e5a1149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a7beda9d69098c8b534464c516bdd8a0f35", "32d8cc26f7061a74df2cfc06c89f3d9e234b30c50997d3bed109ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fa79a", "67523760fd40f78d2cfc03d81a8ca55ba139c01802c4dae4162e43ac61b7ad33", [0x2, 0x400000000007]}}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:28038' (ED25519) to the list of known hosts. [ 241.981752][ T30] audit: type=1400 audit(241.330:46): avc: denied { name_bind } for pid=3300 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 242.607317][ T30] audit: type=1400 audit(241.950:47): avc: denied { execute } for pid=3301 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 242.619885][ T30] audit: type=1400 audit(241.970:48): avc: denied { execute_no_trans } for pid=3301 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 249.307464][ T30] audit: type=1400 audit(248.660:49): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 249.332854][ T30] audit: type=1400 audit(248.680:50): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 249.397679][ T3301] cgroup: Unknown subsys name 'net' [ 249.430101][ T30] audit: type=1400 audit(248.770:51): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 249.796617][ T3301] cgroup: Unknown subsys name 'cpuset' [ 249.864628][ T3301] cgroup: Unknown subsys name 'rlimit' [ 250.146759][ T30] audit: type=1400 audit(249.490:52): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 250.151984][ T30] audit: type=1400 audit(249.500:53): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 250.165790][ T30] audit: type=1400 audit(249.510:54): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 250.748874][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 250.761965][ T30] audit: type=1400 audit(250.110:55): avc: denied { relabelto } for pid=3303 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 250.776124][ T30] audit: type=1400 audit(250.120:56): avc: denied { write } for pid=3303 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 250.987422][ T30] audit: type=1400 audit(250.340:57): avc: denied { read } for pid=3301 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 250.996927][ T30] audit: type=1400 audit(250.350:58): avc: denied { open } for pid=3301 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 251.048038][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 288.678666][ T30] audit: type=1400 audit(288.030:59): avc: denied { execmem } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 288.837665][ T30] audit: type=1400 audit(288.190:60): avc: denied { read } for pid=3306 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.849031][ T30] audit: type=1400 audit(288.190:61): avc: denied { open } for pid=3306 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.870346][ T30] audit: type=1400 audit(288.220:62): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 288.927287][ T30] audit: type=1400 audit(288.280:63): avc: denied { module_request } for pid=3307 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 289.114043][ T30] audit: type=1400 audit(288.460:64): avc: denied { sys_module } for pid=3307 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 297.275402][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.307136][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.437535][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.479997][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.107752][ T3306] hsr_slave_0: entered promiscuous mode [ 301.129496][ T3306] hsr_slave_1: entered promiscuous mode [ 302.702246][ T3307] hsr_slave_0: entered promiscuous mode [ 302.710666][ T3307] hsr_slave_1: entered promiscuous mode [ 302.719624][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 302.721488][ T3307] Cannot create hsr debugfs directory [ 304.528608][ T30] audit: type=1400 audit(303.870:65): avc: denied { create } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.545917][ T30] audit: type=1400 audit(303.890:66): avc: denied { write } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.559407][ T30] audit: type=1400 audit(303.910:67): avc: denied { read } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.609674][ T3306] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 305.007293][ T3306] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 305.249823][ T3306] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 305.375102][ T3306] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 306.308412][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 306.352769][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 306.406587][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 306.452597][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 309.712545][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.560479][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.447533][ T3306] veth0_vlan: entered promiscuous mode [ 323.685010][ T3306] veth1_vlan: entered promiscuous mode [ 323.731620][ T3307] veth0_vlan: entered promiscuous mode [ 324.004829][ T3307] veth1_vlan: entered promiscuous mode [ 324.407388][ T3306] veth0_macvtap: entered promiscuous mode [ 324.455804][ T3307] veth0_macvtap: entered promiscuous mode [ 324.478084][ T3306] veth1_macvtap: entered promiscuous mode [ 324.541663][ T3307] veth1_macvtap: entered promiscuous mode [ 324.998092][ T3306] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.999980][ T3306] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.000419][ T3306] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.000789][ T3306] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.211539][ T3307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.212686][ T3307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.221549][ T3307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.222215][ T3307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.171050][ T30] audit: type=1400 audit(325.520:68): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 326.250676][ T30] audit: type=1400 audit(325.570:69): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/syzkaller.mqx88p/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 326.332501][ T30] audit: type=1400 audit(325.680:70): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 326.406720][ T30] audit: type=1400 audit(325.750:71): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/syzkaller.mqx88p/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 326.431337][ T30] audit: type=1400 audit(325.780:72): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/syzkaller.mqx88p/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3009 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 326.782495][ T30] audit: type=1400 audit(326.130:73): avc: denied { unmount } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 326.822437][ T30] audit: type=1400 audit(326.170:74): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 326.871619][ T30] audit: type=1400 audit(326.220:75): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="gadgetfs" ino=3010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 326.988131][ T30] audit: type=1400 audit(326.290:76): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 326.989702][ T30] audit: type=1400 audit(326.310:77): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 327.590171][ T3306] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 327.590182][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 328.868961][ T3457] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 331.701987][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 331.706428][ T30] audit: type=1400 audit(331.050:94): avc: denied { create } for pid=3464 comm="syz.1.4" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 331.739103][ T30] audit: type=1400 audit(331.090:95): avc: denied { read write } for pid=3464 comm="syz.1.4" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 331.772444][ T30] audit: type=1400 audit(331.090:96): avc: denied { open } for pid=3464 comm="syz.1.4" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 331.817568][ T30] audit: type=1400 audit(331.160:97): avc: denied { mounton } for pid=3464 comm="syz.1.4" path="/2/file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 332.130464][ T30] audit: type=1400 audit(331.480:98): avc: denied { read write } for pid=3464 comm="syz.1.4" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 332.170484][ T30] audit: type=1400 audit(331.480:99): avc: denied { open } for pid=3464 comm="syz.1.4" path="/2/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 332.721855][ T30] audit: type=1400 audit(332.070:100): avc: denied { unmount } for pid=3464 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 332.936008][ T3468] batadv0: tun_chr_ioctl cmd 2147767521 [ 332.959011][ T3468] batadv0: tun_chr_ioctl cmd 2147767507 [ 334.498353][ T30] audit: type=1400 audit(333.850:101): avc: denied { unlink } for pid=3307 comm="syz-executor" name="file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 334.942429][ T30] audit: type=1400 audit(334.290:102): avc: denied { read } for pid=3473 comm="syz.0.7" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 334.954629][ T30] audit: type=1400 audit(334.300:103): avc: denied { open } for pid=3473 comm="syz.0.7" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 337.792822][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 337.804694][ T30] audit: type=1400 audit(337.140:105): avc: denied { read } for pid=3484 comm="syz.0.12" path="socket:[3068]" dev="sockfs" ino=3068 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 337.832090][ T30] audit: type=1400 audit(337.180:106): avc: denied { setopt } for pid=3484 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.068227][ T30] audit: type=1400 audit(338.370:107): avc: denied { setopt } for pid=3488 comm="syz.0.13" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.097671][ T30] audit: type=1400 audit(338.450:108): avc: denied { write } for pid=3488 comm="syz.0.13" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.145609][ T30] audit: type=1400 audit(338.490:109): avc: denied { read } for pid=3488 comm="syz.0.13" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.767657][ T30] audit: type=1400 audit(339.120:110): avc: denied { read write } for pid=3490 comm="syz.1.14" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 339.770193][ T30] audit: type=1400 audit(339.120:111): avc: denied { open } for pid=3490 comm="syz.1.14" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 340.032273][ T30] audit: type=1400 audit(339.380:112): avc: denied { create } for pid=3492 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 340.102582][ T30] audit: type=1400 audit(339.450:113): avc: denied { accept } for pid=3492 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 342.669670][ T30] audit: type=1326 audit(342.010:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 342.799281][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 342.806538][ T30] audit: type=1326 audit(342.150:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.844427][ T30] audit: type=1326 audit(342.190:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.855387][ T30] audit: type=1326 audit(342.200:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 342.886579][ T30] audit: type=1326 audit(342.230:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 342.887453][ T30] audit: type=1326 audit(342.230:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.900436][ T30] audit: type=1326 audit(342.240:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.925291][ T30] audit: type=1326 audit(342.270:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 342.926720][ T30] audit: type=1326 audit(342.270:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.927490][ T30] audit: type=1326 audit(342.270:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 342.971521][ T30] audit: type=1326 audit(342.310:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3504 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 348.067032][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 348.067685][ T30] audit: type=1400 audit(347.420:153): avc: denied { create } for pid=3525 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 348.086566][ T30] audit: type=1400 audit(347.440:154): avc: denied { write } for pid=3525 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 349.238101][ T30] audit: type=1400 audit(348.570:155): avc: denied { append } for pid=3528 comm="syz.0.31" name="loop7" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.191912][ T30] audit: type=1326 audit(353.540:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3545 comm="syz.0.39" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x0 [ 354.797164][ T3547] capability: warning: `syz.0.39' uses deprecated v2 capabilities in a way that may be insecure [ 355.257061][ T30] audit: type=1400 audit(354.600:157): avc: denied { read write } for pid=3548 comm="syz.1.40" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 355.258468][ T30] audit: type=1400 audit(354.600:158): avc: denied { open } for pid=3548 comm="syz.1.40" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 355.359444][ T30] audit: type=1400 audit(354.670:159): avc: denied { ioctl } for pid=3548 comm="syz.1.40" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 358.111362][ T30] audit: type=1400 audit(357.460:160): avc: denied { mounton } for pid=3560 comm="syz.0.45" path="/27/file0" dev="tmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 362.946298][ T30] audit: type=1400 audit(362.290:161): avc: denied { audit_read } for pid=3581 comm="syz.1.55" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.570393][ T30] audit: type=1400 audit(362.920:162): avc: denied { write } for pid=3585 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 364.252301][ T30] audit: type=1400 audit(363.600:163): avc: denied { write } for pid=3588 comm="syz.0.58" name="fib_triestat" dev="proc" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 370.037716][ T30] audit: type=1400 audit(369.390:164): avc: denied { bind } for pid=3617 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 370.074193][ T30] audit: type=1400 audit(369.410:165): avc: denied { mount } for pid=3618 comm="syz.0.73" name="/" dev="autofs" ino=3767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 370.081175][ T30] audit: type=1400 audit(369.430:166): avc: denied { setopt } for pid=3617 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 370.105881][ T30] audit: type=1400 audit(369.450:167): avc: denied { read write } for pid=3618 comm="syz.0.73" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 370.115289][ T30] audit: type=1400 audit(369.460:168): avc: denied { open } for pid=3618 comm="syz.0.73" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 370.164993][ T30] audit: type=1400 audit(369.510:169): avc: denied { ioctl } for pid=3618 comm="syz.0.73" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 370.455489][ T30] audit: type=1400 audit(369.760:170): avc: denied { unmount } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 381.976623][ T30] audit: type=1400 audit(381.310:171): avc: denied { read } for pid=3674 comm="syz.0.100" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 388.057735][ T3696] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 390.800942][ T30] audit: type=1400 audit(390.150:172): avc: denied { ioctl } for pid=3706 comm="syz.1.111" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 392.455553][ T30] audit: type=1400 audit(391.800:173): avc: denied { setopt } for pid=3712 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 393.854538][ T30] audit: type=1400 audit(393.200:174): avc: denied { name_bind } for pid=3720 comm="syz.0.118" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 398.072843][ T30] audit: type=1400 audit(397.420:175): avc: denied { mounton } for pid=3735 comm="syz.0.125" path="/68/file0" dev="tmpfs" ino=360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 401.090712][ T30] audit: type=1400 audit(400.440:176): avc: denied { map } for pid=3748 comm="syz.0.131" path="socket:[4508]" dev="sockfs" ino=4508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 401.127829][ T3749] sock: sock_timestamping_bind_phc: sock not bind to device [ 402.421034][ T30] audit: type=1400 audit(401.770:177): avc: denied { create } for pid=3758 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 402.443818][ T30] audit: type=1400 audit(401.790:178): avc: denied { write } for pid=3758 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 404.322627][ T30] audit: type=1400 audit(403.670:179): avc: denied { ioctl } for pid=3770 comm="syz.0.141" path="socket:[4032]" dev="sockfs" ino=4032 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 407.611071][ T30] audit: type=1400 audit(406.950:180): avc: denied { mount } for pid=3783 comm="syz.0.148" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 407.869918][ T30] audit: type=1400 audit(407.220:181): avc: denied { unmount } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 407.877593][ T30] audit: type=1400 audit(407.230:182): avc: denied { unmount } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 424.792396][ T30] audit: type=1400 audit(424.140:183): avc: denied { create } for pid=3864 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 424.823438][ T30] audit: type=1400 audit(424.160:184): avc: denied { setopt } for pid=3864 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 430.336846][ T30] audit: type=1400 audit(429.690:185): avc: denied { connect } for pid=3896 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 431.591120][ T30] audit: type=1400 audit(430.940:186): avc: denied { setopt } for pid=3901 comm="syz.0.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 433.635299][ T3913] autofs: Unknown parameter './file0' [ 434.720428][ T3917] netlink: 12 bytes leftover after parsing attributes in process `syz.1.210'. [ 437.098956][ T30] audit: type=1400 audit(436.450:187): avc: denied { read } for pid=3927 comm="syz.0.215" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 437.118051][ T30] audit: type=1400 audit(436.450:188): avc: denied { open } for pid=3927 comm="syz.0.215" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 437.191073][ T30] audit: type=1400 audit(436.540:189): avc: denied { ioctl } for pid=3927 comm="syz.0.215" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 440.597412][ T3944] fuse: Bad value for 'fd' [ 441.472817][ T3947] syz.1.224 uses obsolete (PF_INET,SOCK_PACKET) [ 441.555025][ T30] audit: type=1400 audit(440.890:190): avc: denied { create } for pid=3946 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 441.602150][ T30] audit: type=1400 audit(440.940:191): avc: denied { setopt } for pid=3946 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 444.862579][ T3963] fuse: Bad value for 'fd' [ 453.700859][ T30] audit: type=1400 audit(453.050:192): avc: denied { getopt } for pid=3996 comm="syz.0.247" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 457.097392][ T30] audit: type=1400 audit(456.440:193): avc: denied { watch watch_reads } for pid=4008 comm="syz.1.253" path="/119" dev="tmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 460.420650][ T30] audit: type=1400 audit(459.770:194): avc: denied { create } for pid=4018 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 465.607684][ T30] audit: type=1400 audit(464.960:195): avc: denied { execute } for pid=4037 comm="syz.1.263" name="file1" dev="tmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 465.631907][ T4039] process 'syz.1.263' launched './file1' with NULL argv: empty string added [ 465.655346][ T30] audit: type=1400 audit(465.000:196): avc: denied { execute_no_trans } for pid=4037 comm="syz.1.263" path="/125/file1" dev="tmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 467.600546][ T30] audit: type=1400 audit(466.940:197): avc: denied { connect } for pid=4050 comm="syz.1.269" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 475.097897][ T4083] autofs: Unknown parameter '00000000000000000000' [ 476.368988][ T4089] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4089 comm=syz.0.285 [ 477.100361][ T4093] autofs: Unknown parameter 'fd00000000000000000000' [ 479.105082][ T4105] autofs: Unknown parameter 'fd00000000000000000000' [ 481.917524][ T4117] autofs: Unknown parameter 'fd00000000000000000000' [ 483.730563][ T4125] netlink: 13 bytes leftover after parsing attributes in process `syz.0.302'. [ 490.281855][ T4149] fuse: Bad value for 'group_id' [ 490.295465][ T4149] fuse: Bad value for 'group_id' [ 493.319272][ T30] audit: type=1400 audit(492.670:198): avc: denied { append } for pid=4162 comm="syz.0.320" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 495.112438][ T30] audit: type=1400 audit(494.460:199): avc: denied { mounton } for pid=4172 comm="syz.1.324" path="/156/file0" dev="tmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 501.188300][ T4202] No control pipe specified [ 502.612167][ T4209] Injecting memory failure for pfn 0x5ed51 at process virtual address 0x20001000 [ 502.726671][ T4209] Memory failure: 0x5ed51: keeping poisoned page in swap cache [ 502.730216][ T4209] Memory failure: 0x5ed51: Sending SIGBUS to syz.0.339:4209 due to hardware memory corruption [ 502.751578][ T4209] Memory failure: 0x5ed51: recovery action for dirty swapcache page: Delayed [ 502.768029][ T4209] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20002000 [ 502.786358][ T4209] Memory failure: 0x48e48: recovery action for reserved kernel page: Ignored [ 503.612734][ T4214] No control pipe specified [ 506.106020][ T30] audit: type=1400 audit(505.450:200): avc: denied { bind } for pid=4225 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 508.736202][ T4240] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 510.391558][ T30] audit: type=1400 audit(509.740:201): avc: denied { block_suspend } for pid=4246 comm="syz.1.358" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 517.536676][ T4272] capability: warning: `syz.1.369' uses 32-bit capabilities (legacy support in use) [ 517.584159][ T30] audit: type=1400 audit(516.930:202): avc: denied { bind } for pid=4271 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 530.918753][ T4314] fuse: Unknown parameter 'group_i00000000000000000000' [ 533.066021][ T4322] Zero length message leads to an empty skb [ 535.215098][ T4323] netlink: 36 bytes leftover after parsing attributes in process `syz.1.392'. [ 540.161079][ T30] audit: type=1400 audit(539.500:203): avc: denied { nlmsg_write } for pid=4347 comm="syz.1.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 543.615954][ T30] audit: type=1400 audit(542.970:204): avc: denied { bind } for pid=4364 comm="syz.0.413" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.632227][ T30] audit: type=1400 audit(542.980:205): avc: denied { node_bind } for pid=4364 comm="syz.0.413" saddr=fff5:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 548.407088][ T30] audit: type=1400 audit(547.760:206): avc: denied { getopt } for pid=4390 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 553.921886][ T4416] netlink: 20 bytes leftover after parsing attributes in process `syz.1.438'. [ 557.030397][ T4432] netlink: 24 bytes leftover after parsing attributes in process `syz.0.446'. [ 569.589292][ T4477] netlink: 8 bytes leftover after parsing attributes in process `syz.1.465'. [ 573.241938][ T4486] netlink: 44 bytes leftover after parsing attributes in process `syz.1.469'. [ 573.247986][ T4486] netlink: 4 bytes leftover after parsing attributes in process `syz.1.469'. [ 573.267197][ T4486] netlink: 13 bytes leftover after parsing attributes in process `syz.1.469'. [ 573.270169][ T4486] netlink: 'syz.1.469': attribute type 2 has an invalid length. [ 573.271120][ T4486] netlink: 13 bytes leftover after parsing attributes in process `syz.1.469'. [ 578.537797][ T4503] netlink: 28 bytes leftover after parsing attributes in process `syz.0.476'. [ 588.334574][ T30] audit: type=1400 audit(587.680:207): avc: denied { mount } for pid=4532 comm="syz.1.486" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 594.051805][ T30] audit: type=1400 audit(593.400:208): avc: denied { watch } for pid=4562 comm="syz.1.501" path="/proc/545" dev="proc" ino=6697 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 595.716967][ T30] audit: type=1400 audit(595.050:209): avc: denied { create } for pid=4570 comm="syz.1.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 595.723926][ T30] audit: type=1400 audit(595.070:210): avc: denied { write } for pid=4570 comm="syz.1.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 595.746000][ T30] audit: type=1400 audit(595.100:211): avc: denied { read } for pid=4570 comm="syz.1.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 600.805509][ T30] audit: type=1400 audit(600.150:212): avc: denied { write } for pid=4588 comm="syz.1.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 600.828685][ T30] audit: type=1400 audit(600.170:213): avc: denied { read } for pid=4588 comm="syz.1.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 609.905047][ T30] audit: type=1400 audit(609.250:214): avc: denied { read } for pid=4631 comm="syz.0.530" path="socket:[7490]" dev="sockfs" ino=7490 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 619.691922][ T4673] fuse: Bad value for 'fd' [ 622.024758][ T30] audit: type=1400 audit(621.370:215): avc: denied { write } for pid=4683 comm="syz.1.555" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 622.042850][ T30] audit: type=1400 audit(621.390:216): avc: denied { open } for pid=4683 comm="syz.1.555" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 622.242611][ T4686] fuse: Bad value for 'fd' [ 623.761483][ T30] audit: type=1400 audit(623.110:217): avc: denied { ioctl } for pid=4693 comm="syz.0.559" path="socket:[6895]" dev="sockfs" ino=6895 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 626.602043][ T4705] fuse: Bad value for 'fd' [ 629.530452][ T4712] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 632.442608][ T30] audit: type=1400 audit(631.790:218): avc: denied { connect } for pid=4721 comm="syz.0.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 634.114716][ T30] audit: type=1400 audit(633.460:219): avc: denied { bind } for pid=4725 comm="syz.1.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 637.826257][ T30] audit: type=1400 audit(637.180:220): avc: denied { ioctl } for pid=4740 comm="syz.0.580" path="socket:[7694]" dev="sockfs" ino=7694 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 638.021394][ T4743] Soft offlining pfn 0x5f05c at process virtual address 0x20000000 [ 642.069258][ T4758] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 642.131219][ T4758] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 649.710721][ T4789] fuse: Bad value for 'fd' [ 650.098013][ T4791] netlink: 152 bytes leftover after parsing attributes in process `syz.1.601'. [ 652.405814][ T4801] fuse: Bad value for 'fd' [ 654.484540][ T30] audit: type=1326 audit(653.830:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 654.501345][ T30] audit: type=1326 audit(653.850:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 654.564681][ T30] audit: type=1326 audit(653.910:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 654.566003][ T30] audit: type=1326 audit(653.910:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f40 code=0x7ffc0000 [ 654.566650][ T30] audit: type=1326 audit(653.910:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 654.567263][ T30] audit: type=1326 audit(653.910:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4806 comm="syz.0.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 665.563957][ T30] audit: type=1400 audit(664.910:227): avc: denied { setattr } for pid=4841 comm="syz.0.626" name="PACKET" dev="sockfs" ino=7897 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 666.776843][ T4852] netlink: 8 bytes leftover after parsing attributes in process `syz.1.629'. [ 680.188200][ T4926] ip6erspan0: entered allmulticast mode [ 680.236593][ T4927] netlink: 'syz.0.664': attribute type 4 has an invalid length. [ 684.609849][ T30] audit: type=1400 audit(683.950:228): avc: denied { ioctl } for pid=4942 comm="syz.1.672" path="socket:[8222]" dev="sockfs" ino=8222 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 699.576549][ T4964] fuse: Unknown parameter 'use00000000000000000000' [ 705.080669][ T30] audit: type=1400 audit(704.420:229): avc: denied { write } for pid=4982 comm="syz.1.689" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 706.459766][ T30] audit: type=1400 audit(705.810:230): avc: denied { getopt } for pid=4988 comm="syz.0.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 707.818906][ T4995] bond0: entered promiscuous mode [ 707.831523][ T4995] bond_slave_0: entered promiscuous mode [ 707.858540][ T4995] bond_slave_1: entered promiscuous mode [ 707.938135][ T4995] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 708.051658][ T4995] bond0: left promiscuous mode [ 708.076459][ T4995] bond_slave_0: left promiscuous mode [ 708.079420][ T4995] bond_slave_1: left promiscuous mode [ 714.022777][ T5028] fuse: Unknown parameter 'grou00000000000000000000' [ 718.920827][ T5044] fuse: Unknown parameter 'grou00000000000000000000' [ 720.087995][ T5048] mmap: syz.0.718 (5048) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 727.005874][ T30] audit: type=1400 audit(726.350:231): avc: denied { write } for pid=5070 comm="syz.0.728" laddr=fe80::44c9:5dff:fe48:2029 lport=1 faddr=ff02::1 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 730.942266][ T5087] netlink: 'syz.1.735': attribute type 1 has an invalid length. [ 741.341533][ T5128] fuse: Unknown parameter 'group_id00000000000000000000' [ 744.150936][ T5138] fuse: Unknown parameter 'group_id00000000000000000000' [ 746.054704][ T30] audit: type=1400 audit(745.400:232): avc: denied { ioctl } for pid=5145 comm="syz.1.763" path="socket:[9433]" dev="sockfs" ino=9433 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 746.486985][ T30] audit: type=1400 audit(745.840:233): avc: denied { setopt } for pid=5148 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 746.985602][ T5152] fuse: Bad value for 'user_id' [ 746.990576][ T5152] fuse: Bad value for 'user_id' [ 749.000020][ T30] audit: type=1400 audit(748.350:234): avc: denied { mounton } for pid=5160 comm="syz.1.769" path="/383/file0" dev="tmpfs" ino=1974 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 751.290991][ T30] audit: type=1400 audit(750.630:235): avc: denied { relabelfrom } for pid=5169 comm="syz.0.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 751.299332][ T30] audit: type=1400 audit(750.650:236): avc: denied { relabelto } for pid=5169 comm="syz.0.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 759.537584][ T5204] fuse: Unknown parameter '0x0000000000000003' [ 762.208616][ T30] audit: type=1400 audit(761.560:237): avc: denied { getopt } for pid=5213 comm="syz.0.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 768.969917][ T5242] netlink: 8 bytes leftover after parsing attributes in process `syz.1.802'. [ 768.972270][ T5242] IPv6: NLM_F_CREATE should be specified when creating new route [ 773.149414][ T30] audit: type=1400 audit(772.500:238): avc: denied { ioctl } for pid=5258 comm="syz.1.809" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 774.429691][ T30] audit: type=1400 audit(773.780:239): avc: denied { write } for pid=5263 comm="syz.1.811" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 776.246117][ T30] audit: type=1400 audit(775.590:240): avc: denied { kexec_image_load } for pid=5269 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 777.696131][ T30] audit: type=1400 audit(777.040:241): avc: denied { ioctl } for pid=5275 comm="syz.1.816" path="socket:[9612]" dev="sockfs" ino=9612 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 784.490944][ T5304] netlink: 'syz.0.829': attribute type 1 has an invalid length. [ 785.622243][ T5308] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 785.659234][ T5308] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 787.438589][ T30] audit: type=1400 audit(786.790:242): avc: denied { read write } for pid=5314 comm="syz.1.833" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 787.474518][ T30] audit: type=1400 audit(786.820:243): avc: denied { open } for pid=5314 comm="syz.1.833" path="/dev/udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 787.578413][ T30] audit: type=1400 audit(786.930:244): avc: denied { ioctl } for pid=5314 comm="syz.1.833" path="/dev/udmabuf" dev="devtmpfs" ino=676 ioctlcmd=0x7543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.410826][ T30] audit: type=1400 audit(789.760:245): avc: denied { mounton } for pid=5325 comm="syz.0.839" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 790.480724][ T5327] syz.0.839: attempt to access beyond end of device [ 790.480724][ T5327] loop0: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 790.510879][ T5327] EXT4-fs (loop0): unable to read superblock [ 791.329578][ T5330] Invalid logical block size (-2147483648) [ 797.415920][ T30] audit: type=1400 audit(796.760:246): avc: denied { write } for pid=5357 comm="syz.1.852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 820.919088][ T30] audit: type=1400 audit(820.270:247): avc: denied { map } for pid=5460 comm="syz.1.885" path="/proc/960/net/mcfilter6" dev="proc" ino=4026532765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 825.900874][ T30] audit: type=1400 audit(825.250:248): avc: denied { mount } for pid=5490 comm="syz.1.899" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 827.350176][ T1590] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.029499][ T1590] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.295393][ T1590] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.489211][ T1590] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.915269][ T30] audit: type=1400 audit(828.260:249): avc: denied { read } for pid=3151 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 834.382326][ T1590] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 834.467112][ T1590] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 834.545103][ T1590] bond0 (unregistering): Released all slaves [ 835.478144][ T1590] hsr_slave_0: left promiscuous mode [ 835.658187][ T1590] hsr_slave_1: left promiscuous mode [ 836.186145][ T1590] veth1_macvtap: left promiscuous mode [ 836.188302][ T1590] veth0_macvtap: left promiscuous mode [ 860.268493][ T5496] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 860.308844][ T5496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 860.749524][ T5585] autofs: Unknown parameter './file0' [ 865.261432][ T5608] autofs: Unknown parameter './file0' [ 866.789772][ T5496] hsr_slave_0: entered promiscuous mode [ 866.821698][ T5496] hsr_slave_1: entered promiscuous mode [ 866.868308][ T5496] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 866.869464][ T5496] Cannot create hsr debugfs directory [ 868.418008][ T5622] autofs: Unknown parameter './file0' [ 871.960138][ T5496] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 872.117345][ T5496] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 872.178354][ T5496] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 872.220243][ T5635] fuse: Bad value for 'fd' [ 872.292879][ T5496] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 874.706095][ T30] audit: type=1400 audit(874.060:250): avc: denied { remount } for pid=5648 comm="syz.0.935" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 875.496739][ T5657] netlink: 8 bytes leftover after parsing attributes in process `syz.0.937'. [ 878.369337][ T5670] netlink: 16 bytes leftover after parsing attributes in process `syz.0.941'. [ 879.100323][ T5496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 880.512456][ T5678] binfmt_misc: register: failed to install interpreter file ./file0 [ 888.754573][ T30] audit: type=1400 audit(888.100:251): avc: denied { bind } for pid=5706 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 888.755865][ T30] audit: type=1400 audit(888.100:252): avc: denied { node_bind } for pid=5706 comm="syz.0.949" saddr=fff5:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 902.461360][ T30] audit: type=1400 audit(901.810:253): avc: denied { name_bind } for pid=5762 comm="syz.0.959" src=20257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 906.044561][ T5496] veth0_vlan: entered promiscuous mode [ 906.338551][ T5496] veth1_vlan: entered promiscuous mode [ 907.479365][ T5496] veth0_macvtap: entered promiscuous mode [ 907.780875][ T5496] veth1_macvtap: entered promiscuous mode [ 908.922821][ T5496] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.938381][ T5496] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.944712][ T5496] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.946926][ T5496] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 909.902750][ T30] audit: type=1400 audit(909.250:254): avc: denied { mounton } for pid=5496 comm="syz-executor" path="/syzkaller.a8KiN7/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 910.047847][ T30] audit: type=1400 audit(909.400:255): avc: denied { mount } for pid=5496 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 910.285584][ T30] audit: type=1400 audit(909.620:256): avc: denied { mounton } for pid=5496 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 914.448756][ T5812] fuse: Unknown parameter 'use00000000000000000000' [ 915.799754][ T5818] veth3: entered allmulticast mode [ 917.692561][ T5825] fuse: Unknown parameter 'use00000000000000000000' [ 922.816016][ T5845] trusted_key: syz.0.991 sent an empty control message without MSG_MORE. [ 924.735838][ T30] audit: type=1400 audit(924.090:257): avc: denied { create } for pid=5852 comm="syz.2.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 924.750158][ T30] audit: type=1400 audit(924.100:258): avc: denied { write } for pid=5852 comm="syz.2.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 927.735821][ T30] audit: type=1400 audit(927.090:259): avc: denied { map } for pid=5865 comm="syz.0.998" path="socket:[10601]" dev="sockfs" ino=10601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 927.760493][ T30] audit: type=1400 audit(927.110:260): avc: denied { read } for pid=5865 comm="syz.0.998" path="socket:[10601]" dev="sockfs" ino=10601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 929.324485][ T30] audit: type=1400 audit(928.670:261): avc: denied { wake_alarm } for pid=5871 comm="syz.2.1000" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 933.366410][ T5888] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1007'. [ 935.842779][ T30] audit: type=1400 audit(935.190:262): avc: denied { watch_reads } for pid=5898 comm="syz.0.1012" path="/proc/1141/task" dev="proc" ino=10639 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 939.964502][ T30] audit: type=1400 audit(939.300:263): avc: denied { execute } for pid=5920 comm="syz.0.1023" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=11875 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 940.515613][ T30] audit: type=1400 audit(939.850:264): avc: denied { map } for pid=5923 comm="syz.0.1024" path="socket:[10676]" dev="sockfs" ino=10676 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 940.517285][ T30] audit: type=1400 audit(939.860:265): avc: denied { accept } for pid=5923 comm="syz.0.1024" path="socket:[10676]" dev="sockfs" ino=10676 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 944.857835][ T5947] fuseblk: Bad value for 'fd' [ 947.658444][ T5958] fuseblk: Bad value for 'fd' [ 948.279482][ T5960] fuse: Unknown parameter '0x0000000000000003' [ 950.677551][ T5973] fuse: Unknown parameter '0x0000000000000003' [ 954.442835][ T5986] fuse: Unknown parameter '0x0000000000000003' [ 957.016743][ T5998] fuse: Unknown parameter '0x0000000000000003' [ 961.348896][ T6013] fuse: Unknown parameter '0x0000000000000003' [ 967.092632][ T6029] fuse: Unknown parameter 'fd0x0000000000000003' [ 970.388945][ T6042] fuse: Unknown parameter 'fd0x0000000000000003' [ 972.290992][ T6054] fuse: Unknown parameter 'fd0x0000000000000003' [ 972.935030][ T6057] fuseblk: Bad value for 'fd' [ 982.106384][ T30] audit: type=1400 audit(981.450:266): avc: denied { write } for pid=6101 comm="syz.2.1101" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 986.784527][ T6125] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1111'. [ 988.422495][ T6133] tmpfs: Bad value for 'mpol' [ 998.460567][ T6178] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1132'. [ 1008.474411][ T30] audit: type=1400 audit(1007.830:267): avc: denied { read } for pid=6229 comm="syz.2.1156" name="file0" dev="tmpfs" ino=534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1008.481772][ T30] audit: type=1400 audit(1007.830:268): avc: denied { open } for pid=6229 comm="syz.2.1156" path="/97/file0" dev="tmpfs" ino=534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1010.602005][ T1590] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1010.978366][ T1590] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.361824][ T1590] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.851430][ T1590] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1018.345045][ T1590] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1018.424493][ T1590] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1018.489254][ T1590] bond0 (unregistering): Released all slaves [ 1018.712330][ T1590] bond1 (unregistering): Released all slaves [ 1019.045201][ T6247] bond0: option all_slaves_active: invalid value (8) [ 1019.804799][ T1590] hsr_slave_0: left promiscuous mode [ 1019.820574][ T1590] hsr_slave_1: left promiscuous mode [ 1020.258606][ T1590] veth1_macvtap: left promiscuous mode [ 1020.260127][ T1590] veth0_macvtap: left promiscuous mode [ 1030.275092][ T11] infiniband syz2: ib_query_port failed (-19) [ 1040.100118][ T6288] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1042.716291][ T6236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1042.742071][ T6236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1049.169211][ T6236] hsr_slave_0: entered promiscuous mode [ 1049.192885][ T6236] hsr_slave_1: entered promiscuous mode [ 1056.826727][ T6236] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1056.908949][ T6236] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1057.039636][ T6236] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1057.260689][ T6236] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1061.718264][ T6364] netlink: 'syz.2.1180': attribute type 15 has an invalid length. [ 1063.859120][ T6236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1066.491733][ T6379] netlink: 'syz.2.1182': attribute type 1 has an invalid length. [ 1066.507128][ T6379] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1182'. [ 1079.339643][ T6422] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1191'. [ 1092.890290][ T6236] veth0_vlan: entered promiscuous mode [ 1093.077057][ T6236] veth1_vlan: entered promiscuous mode [ 1094.170900][ T6236] veth0_macvtap: entered promiscuous mode [ 1094.401984][ T6236] veth1_macvtap: entered promiscuous mode [ 1095.535932][ T6236] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1095.536656][ T6236] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1095.536873][ T6236] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1095.537088][ T6236] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1115.907459][ T6550] No control pipe specified [ 1118.039117][ T6556] netlink: 116 bytes leftover after parsing attributes in process `syz.2.1234'. [ 1119.048607][ T6560] No control pipe specified [ 1122.357406][ T6571] fuse: Bad value for 'fd' [ 1125.328603][ T6585] fuse: Bad value for 'fd' [ 1128.355891][ T6595] fuse: Bad value for 'fd' [ 1137.969460][ T30] audit: type=1400 audit(1137.320:269): avc: denied { map } for pid=6625 comm="syz.2.1264" path="/dev/loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1148.926529][ T6659] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1273'. [ 1148.982000][ T6659] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1273'. [ 1149.026513][ T6660] fuse: Bad value for 'fd' [ 1149.145836][ T6659] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1273'. [ 1149.889295][ T6659] ip6erspan0: entered allmulticast mode [ 1150.018474][ T6662] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1273'. [ 1158.299297][ T30] audit: type=1400 audit(1157.650:270): avc: denied { watch watch_reads } for pid=6695 comm="syz.2.1287" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1159.121453][ T6700] IPv6: NLM_F_CREATE should be specified when creating new route [ 1160.218436][ T6702] fuse: Bad value for 'fd' [ 1164.253275][ C0] hrtimer: interrupt took 1196048 ns [ 1167.611278][ T6726] veth0_to_bridge: entered promiscuous mode [ 1167.655216][ T6725] veth0_to_bridge: left promiscuous mode [ 1189.890146][ T6783] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1323'. [ 1201.695665][ T6824] loop4: detected capacity change from 0 to 7 [ 1201.805908][ C0] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1201.807277][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1201.830479][ C0] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1201.831270][ C0] Buffer I/O error on dev loop4, logical block 0, async page read [ 1201.842527][ T6824] loop4: unable to read partition table [ 1201.846559][ T6824] loop_reread_partitions: partition scan of loop4 (Cj̖P=ý?}X %`ր{֐ȵ4FLQk݊) failed (rc=-5) [ 1212.640031][ T30] audit: type=1400 audit(1211.970:271): avc: denied { connect } for pid=6865 comm="syz.2.1361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1218.617684][ T6889] fuse: Bad value for 'fd' [ 1221.428302][ T6901] fuse: Bad value for 'fd' [ 1226.687740][ T6919] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20001000 [ 1226.688629][ T6919] Memory failure: 0x48e48: already hardware poisoned [ 1226.692222][ T6919] Memory failure: 0x48e48: Sending SIGBUS to syz.2.1387:6919 due to hardware memory corruption [ 1226.698929][ T6919] Memory failure: 0x48e48: recovery action for already poisoned: Failed [ 1227.311373][ T30] audit: type=1400 audit(1226.660:272): avc: denied { mount } for pid=6922 comm="syz.2.1388" name="/" dev="hugetlbfs" ino=14598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1235.931038][ T30] audit: type=1400 audit(1235.280:273): avc: denied { getopt } for pid=6947 comm="syz.0.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1239.124373][ T6956] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1404'. [ 1255.309515][ T7004] fuse: Bad value for 'fd' [ 1265.707364][ T30] audit: type=1326 audit(1265.060:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 1265.712579][ T30] audit: type=1326 audit(1265.060:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 1265.758492][ T30] audit: type=1326 audit(1265.110:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 1265.778464][ T30] audit: type=1326 audit(1265.110:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=375 compat=1 ip=0x131f40 code=0x7ffc0000 [ 1265.786892][ T30] audit: type=1326 audit(1265.110:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258e4 code=0x7ffc0000 [ 1265.791831][ T30] audit: type=1326 audit(1265.110:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7035 comm="syz.0.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f40 code=0x7ffc0000 [ 1269.312550][ T30] audit: type=1400 audit(1268.660:280): avc: denied { name_bind } for pid=7055 comm="syz.0.1444" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1278.817921][ T7087] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20000000 [ 1278.819056][ T7087] Memory failure: 0x48e48: already hardware poisoned [ 1278.820154][ T7087] Memory failure: 0x48e48: Sending SIGBUS to syz.0.1457:7087 due to hardware memory corruption [ 1278.820794][ T7087] Memory failure: 0x48e48: recovery action for already poisoned: Failed [ 1279.950916][ T30] audit: type=1400 audit(1279.300:281): avc: denied { create } for pid=7092 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1279.989412][ T7093] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1460'. [ 1279.995357][ T30] audit: type=1400 audit(1279.340:282): avc: denied { write } for pid=7092 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1293.048827][ T30] audit: type=1400 audit(1292.400:283): avc: denied { create } for pid=7150 comm="syz.2.1484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1299.952177][ T30] audit: type=1400 audit(1299.300:284): avc: denied { ioctl } for pid=7180 comm="syz.0.1497" path="socket:[15849]" dev="sockfs" ino=15849 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1312.148907][ T7219] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1515'. [ 1319.921075][ T7243] bond0: option use_carrier: invalid value (7) [ 1320.356968][ T30] audit: type=1400 audit(1319.690:285): avc: denied { associate } for pid=7244 comm="syz.0.1526" name="01777777777777777777777" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1328.170906][ T30] audit: type=1400 audit(1327.510:286): avc: denied { read } for pid=7276 comm="syz.0.1542" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1328.190581][ T30] audit: type=1400 audit(1327.540:287): avc: denied { open } for pid=7276 comm="syz.0.1542" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1328.257572][ T7278] syz.0.1542(7278): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 1335.288014][ T7281] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.288530][ T7281] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.291683][ T7281] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.291885][ T7281] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.790664][ T7283] : renamed from lo [ 1336.540301][ T30] audit: type=1400 audit(1335.890:288): avc: denied { read } for pid=7289 comm="syz.0.1546" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1336.543842][ T30] audit: type=1400 audit(1335.890:289): avc: denied { open } for pid=7289 comm="syz.0.1546" path="net:[4026532708]" dev="nsfs" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1351.735510][ T7350] tap0: tun_chr_ioctl cmd 1074025677 [ 1351.750056][ T7350] tap0: linktype set to 787 [ 1357.482815][ T7376] (unnamed net_device) (uninitialized): down delay (1) is not a multiple of miimon (4), value rounded to 0 ms [ 1357.504754][ T7376] (unnamed net_device) (uninitialized): option lacp_rate: mode dependency failed, not supported in mode balance-rr(0) [ 1358.148262][ T7381] syz.2.1590 (7381): /proc/7380/oom_adj is deprecated, please use /proc/7380/oom_score_adj instead. [ 1360.900453][ T7395] ip6erspan0: entered allmulticast mode [ 1363.856008][ T30] audit: type=1400 audit(1363.210:290): avc: denied { nlmsg_tty_audit } for pid=7411 comm="syz.2.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1367.127270][ T7426] erspan1: entered allmulticast mode [ 1372.648604][ T7458] netlink: 'syz.2.1625': attribute type 21 has an invalid length. [ 1373.589951][ T7463] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20001000 [ 1373.591068][ T7463] Memory failure: 0x48e48: already hardware poisoned [ 1373.591899][ T7463] Memory failure: 0x48e48: Sending SIGBUS to syz.2.1627:7463 due to hardware memory corruption [ 1373.631009][ T7463] Memory failure: 0x48e48: recovery action for already poisoned: Failed [ 1376.588237][ T7477] Injecting memory failure for pfn 0x6189e at process virtual address 0x20001000 [ 1376.617609][ T7477] Memory failure: 0x6189e: Sending SIGBUS to syz.2.1632:7477 due to hardware memory corruption [ 1376.648059][ T7477] Memory failure: 0x6189e: recovery action for dirty LRU page: Recovered [ 1376.649622][ T7477] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20002000 [ 1376.650008][ T7477] Memory failure: 0x48e48: already hardware poisoned [ 1376.650844][ T7477] Memory failure: 0x48e48: Sending SIGBUS to syz.2.1632:7477 due to hardware memory corruption [ 1376.651246][ T7477] Memory failure: 0x48e48: recovery action for already poisoned: Failed [ 1390.785097][ T30] audit: type=1400 audit(1390.130:291): avc: denied { append } for pid=7552 comm="syz.2.1669" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1392.351934][ T30] audit: type=1400 audit(1391.700:292): avc: denied { append } for pid=7561 comm="syz.2.1672" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1398.446563][ T7585] Injecting memory failure for pfn 0x5f664 at process virtual address 0x20000000 [ 1398.479163][ T7585] Memory failure: 0x5f664: Sending SIGBUS to syz.0.1683:7585 due to hardware memory corruption [ 1398.481301][ T7585] Memory failure: 0x5f664: recovery action for dirty LRU page: Recovered [ 1398.482138][ T7585] Injecting memory failure for pfn 0x48e48 at process virtual address 0x20001000 [ 1398.482542][ T7585] Memory failure: 0x48e48: already hardware poisoned [ 1398.541332][ T7585] Memory failure: 0x48e48: Sending SIGBUS to syz.0.1683:7585 due to hardware memory corruption [ 1398.579100][ T7585] Memory failure: 0x48e48: recovery action for already poisoned: Failed [ 1427.116701][ T30] audit: type=1400 audit(1426.460:293): avc: denied { map } for pid=7741 comm="syz.2.1757" path="socket:[16831]" dev="sockfs" ino=16831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1430.180413][ T30] audit: type=1400 audit(1429.530:294): avc: denied { setopt } for pid=7755 comm="syz.0.1762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1434.595307][ T7786] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1777'. [ 1440.817516][ T7821] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1792'. [ 1443.197043][ T7833] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1796'. [ 1444.605203][ T7840] netlink: 'syz.0.1799': attribute type 1 has an invalid length. [ 1444.607101][ T7840] bond0: option mode: unable to set because the bond device has slaves [ 1444.627847][ T7840] netlink: 'syz.0.1799': attribute type 1 has an invalid length. [ 1444.628551][ T7840] bond0: option mode: unable to set because the bond device has slaves [ 1476.948925][ T7978] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 1478.807218][ T7986] netlink: 'syz.0.1861': attribute type 2 has an invalid length. [ 1478.812463][ T7986] netlink: 'syz.0.1861': attribute type 1 has an invalid length. [ 1484.468673][ T8013] support for the xor transformation has been removed. [ 1485.230745][ T8017] netlink: 49 bytes leftover after parsing attributes in process `syz.2.1874'. [ 1491.037320][ T8047] bridge_slave_0: default FDB implementation only supports local addresses [ 1497.289024][ T8079] batadv0: tun_chr_ioctl cmd 2147767521 [ 1503.061174][ T30] audit: type=1400 audit(1502.410:295): avc: denied { append } for pid=8111 comm="syz.2.1919" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1503.067838][ T30] audit: type=1400 audit(1502.420:296): avc: denied { ioctl } for pid=8111 comm="syz.2.1919" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1504.770608][ T8122] netlink: 'syz.2.1924': attribute type 1 has an invalid length. [ 1510.438579][ T30] audit: type=1400 audit(1509.780:297): avc: denied { read } for pid=8145 comm="syz.0.1934" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1512.451376][ T30] audit: type=1400 audit(1511.800:298): avc: denied { unmount } for pid=5496 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1513.698490][ T8159] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1937'. [ 1513.716615][ T8157] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1937'. [ 1519.154390][ T30] audit: type=1400 audit(1518.480:299): avc: denied { mount } for pid=8170 comm="syz.2.1944" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1521.238550][ T8186] tap0: tun_chr_ioctl cmd 1074812118 [ 1521.317171][ T8186] tap0: tun_chr_ioctl cmd 1074025673 [ 1521.948370][ T8189] netlink: 184 bytes leftover after parsing attributes in process `syz.2.1952'. [ 1522.589082][ T8193] netlink: 184 bytes leftover after parsing attributes in process `syz.2.1952'. [ 1530.877325][ T8229] fuse: Bad value for 'source' [ 1535.072074][ T30] audit: type=1400 audit(1534.420:300): avc: denied { mount } for pid=8250 comm="syz.2.1981" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1553.876191][ T30] audit: type=1400 audit(1553.220:301): avc: denied { watch } for pid=8341 comm="syz.2.2019" path="/538/file1" dev="tmpfs" ino=2784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1557.687357][ T8365] fuse: Bad value for 'fd' [ 1560.349415][ T8378] fuse: Bad value for 'fd' [ 1563.112494][ T30] audit: type=1400 audit(1562.460:302): avc: denied { module_load } for pid=8392 comm="syz.2.2044" path="/552/file0" dev="tmpfs" ino=2857 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 1563.148152][ T8393] Invalid ELF header magic: != ELF [ 1569.290281][ T8423] loop7: detected capacity change from 0 to 2047 [ 1569.390756][ T8423] loop7: detected capacity change from 2047 to 2046 [ 1576.467012][ T8460] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2076'. [ 1588.867767][ T8516] cgroup: Unknown subsys name 'obj_type' [ 1598.530621][ T30] audit: type=1400 audit(1597.880:303): avc: denied { mounton } for pid=8573 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1606.279271][ T956] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1606.359001][ T956] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1606.415053][ T956] bond0 (unregistering): Released all slaves [ 1607.234007][ T956] hsr_slave_0: left promiscuous mode [ 1607.385324][ T956] hsr_slave_1: left promiscuous mode [ 1621.924608][ T8627] netlink: 'syz.0.2139': attribute type 49 has an invalid length. [ 1622.687561][ T8631] support for the xor transformation has been removed. [ 1627.107261][ T8649] [ 1627.108271][ T8649] ====================================================== [ 1627.108764][ T8649] WARNING: possible circular locking dependency detected [ 1627.109894][ T8649] 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 Not tainted [ 1627.110543][ T8649] ------------------------------------------------------ [ 1627.111368][ T8649] syz.0.2143/8649 is trying to acquire lock: [ 1627.112381][ T8649] ffff00000e163a20 (&root->kernfs_iattr_rwsem){++++}-{4:4}, at: kernfs_iop_getattr+0x88/0xf0 [ 1627.114867][ T8649] [ 1627.114867][ T8649] but task is already holding lock: [ 1627.115584][ T8649] ffff0000144f6be8 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 1627.116849][ T8649] [ 1627.116849][ T8649] which lock already depends on the new lock. [ 1627.116849][ T8649] [ 1627.117501][ T8649] [ 1627.117501][ T8649] the existing dependency chain (in reverse order) is: [ 1627.118117][ T8649] [ 1627.118117][ T8649] -> #3 (&q->q_usage_counter(io)#24){++++}-{0:0}: [ 1627.119392][ T8649] blk_alloc_queue+0x534/0x640 [ 1627.119908][ T8649] blk_mq_alloc_queue+0x14c/0x22c [ 1627.120411][ T8649] __blk_mq_alloc_disk+0x20/0x1a4 [ 1627.120880][ T8649] loop_add+0x3bc/0x944 [ 1627.121326][ T8649] loop_init+0xd0/0x138 [ 1627.121778][ T8649] do_one_initcall+0x130/0x7f0 [ 1627.122347][ T8649] kernel_init_freeable+0x48c/0x6f4 [ 1627.123029][ T8649] kernel_init+0x24/0x1dc [ 1627.123523][ T8649] ret_from_fork+0x10/0x20 [ 1627.124278][ T8649] [ 1627.124278][ T8649] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 1627.125378][ T8649] fs_reclaim_acquire+0x138/0x160 [ 1627.126180][ T8649] kmem_cache_alloc_noprof+0x5c/0x3b8 [ 1627.127352][ T8649] __kernfs_iattrs+0xb4/0x30c [ 1627.127920][ T8649] __kernfs_setattr+0x4c/0x2a0 [ 1627.128458][ T8649] kernfs_iop_setattr+0xc0/0xf4 [ 1627.129157][ T8649] notify_change+0x3cc/0xba8 [ 1627.129701][ T8649] do_truncate+0x174/0x1bc [ 1627.130163][ T8649] path_openat+0x17c4/0x24b0 [ 1627.130622][ T8649] do_filp_open+0x184/0x360 [ 1627.131128][ T8649] do_sys_openat2+0xe0/0x160 [ 1627.131884][ T8649] __arm64_sys_openat+0x12c/0x1bc [ 1627.132434][ T8649] invoke_syscall+0x6c/0x258 [ 1627.133057][ T8649] el0_svc_common.constprop.0+0xac/0x230 [ 1627.133767][ T8649] do_el0_svc+0x40/0x58 [ 1627.134261][ T8649] el0_svc+0x50/0x198 [ 1627.134749][ T8649] el0t_64_sync_handler+0x10c/0x138 [ 1627.135405][ T8649] el0t_64_sync+0x198/0x19c [ 1627.135962][ T8649] [ 1627.135962][ T8649] -> #1 (iattr_mutex){+.+.}-{4:4}: [ 1627.136959][ T8649] __mutex_lock+0x144/0x9d8 [ 1627.137494][ T8649] mutex_lock_nested+0x24/0x30 [ 1627.137998][ T8649] __kernfs_iattrs+0x38/0x30c [ 1627.138471][ T8649] __kernfs_setattr+0x4c/0x2a0 [ 1627.138958][ T8649] kernfs_iop_setattr+0xc0/0xf4 [ 1627.139712][ T8649] notify_change+0x3cc/0xba8 [ 1627.140315][ T8649] do_truncate+0x174/0x1bc [ 1627.140746][ T8649] path_openat+0x17c4/0x24b0 [ 1627.141343][ T8649] do_filp_open+0x184/0x360 [ 1627.141766][ T8649] do_sys_openat2+0xe0/0x160 [ 1627.142218][ T8649] __arm64_sys_openat+0x12c/0x1bc [ 1627.142750][ T8649] invoke_syscall+0x6c/0x258 [ 1627.143438][ T8649] el0_svc_common.constprop.0+0xac/0x230 [ 1627.144146][ T8649] do_el0_svc+0x40/0x58 [ 1627.144585][ T8649] el0_svc+0x50/0x198 [ 1627.144995][ T8649] el0t_64_sync_handler+0x10c/0x138 [ 1627.145485][ T8649] el0t_64_sync+0x198/0x19c [ 1627.145970][ T8649] [ 1627.145970][ T8649] -> #0 (&root->kernfs_iattr_rwsem){++++}-{4:4}: [ 1627.146970][ T8649] __lock_acquire+0x1638/0x2380 [ 1627.147458][ T8649] lock_acquire+0x310/0x38c [ 1627.147929][ T8649] down_read+0xb4/0x314 [ 1627.148438][ T8649] kernfs_iop_getattr+0x88/0xf0 [ 1627.148877][ T8649] vfs_getattr_nosec+0x1fc/0x374 [ 1627.149354][ T8649] vfs_getattr+0x40/0x54 [ 1627.149764][ T8649] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 1627.150225][ T8649] lo_ioctl+0x13d0/0x1de8 [ 1627.150637][ T8649] lo_compat_ioctl+0x8c/0x1b4 [ 1627.151154][ T8649] compat_blkdev_ioctl+0x1f8/0x860 [ 1627.151851][ T8649] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 1627.152551][ T8649] invoke_syscall+0x6c/0x258 [ 1627.153077][ T8649] el0_svc_common.constprop.0+0xac/0x230 [ 1627.153702][ T8649] do_el0_svc_compat+0x40/0x68 [ 1627.154171][ T8649] el0_svc_compat+0x4c/0x17c [ 1627.154666][ T8649] el0t_32_sync_handler+0x98/0x13c [ 1627.155302][ T8649] el0t_32_sync+0x19c/0x1a0 [ 1627.155789][ T8649] [ 1627.155789][ T8649] other info that might help us debug this: [ 1627.155789][ T8649] [ 1627.156517][ T8649] Chain exists of: [ 1627.156517][ T8649] &root->kernfs_iattr_rwsem --> fs_reclaim --> &q->q_usage_counter(io)#24 [ 1627.156517][ T8649] [ 1627.158219][ T8649] Possible unsafe locking scenario: [ 1627.158219][ T8649] [ 1627.158736][ T8649] CPU0 CPU1 [ 1627.159225][ T8649] ---- ---- [ 1627.159674][ T8649] lock(&q->q_usage_counter(io)#24); [ 1627.160415][ T8649] lock(fs_reclaim); [ 1627.161129][ T8649] lock(&q->q_usage_counter(io)#24); [ 1627.161973][ T8649] rlock(&root->kernfs_iattr_rwsem); [ 1627.162664][ T8649] [ 1627.162664][ T8649] *** DEADLOCK *** [ 1627.162664][ T8649] [ 1627.163693][ T8649] 3 locks held by syz.0.2143/8649: [ 1627.164481][ T8649] #0: ffff000014743400 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_global_lock_killable+0x2c/0xbc [ 1627.165967][ T8649] #1: ffff0000144f6be8 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 1627.167496][ T8649] #2: ffff0000144f6c20 (&q->q_usage_counter(queue)#20){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 1627.168964][ T8649] [ 1627.168964][ T8649] stack backtrace: [ 1627.170145][ T8649] CPU: 0 UID: 0 PID: 8649 Comm: syz.0.2143 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT [ 1627.170929][ T8649] Hardware name: linux,dummy-virt (DT) [ 1627.171861][ T8649] Call trace: [ 1627.172559][ T8649] show_stack+0x18/0x24 (C) [ 1627.173290][ T8649] dump_stack_lvl+0xa4/0xf4 [ 1627.173842][ T8649] dump_stack+0x1c/0x28 [ 1627.174418][ T8649] print_circular_bug+0x28c/0x370 [ 1627.174824][ T8649] check_noncircular+0x168/0x17c [ 1627.175352][ T8649] __lock_acquire+0x1638/0x2380 [ 1627.175736][ T8649] lock_acquire+0x310/0x38c [ 1627.176152][ T8649] down_read+0xb4/0x314 [ 1627.176508][ T8649] kernfs_iop_getattr+0x88/0xf0 [ 1627.176869][ T8649] vfs_getattr_nosec+0x1fc/0x374 [ 1627.177240][ T8649] vfs_getattr+0x40/0x54 [ 1627.177565][ T8649] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 1627.177967][ T8649] lo_ioctl+0x13d0/0x1de8 [ 1627.178315][ T8649] lo_compat_ioctl+0x8c/0x1b4 [ 1627.178764][ T8649] compat_blkdev_ioctl+0x1f8/0x860 [ 1627.179175][ T8649] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 1627.179540][ T8649] invoke_syscall+0x6c/0x258 [ 1627.179907][ T8649] el0_svc_common.constprop.0+0xac/0x230 [ 1627.180285][ T8649] do_el0_svc_compat+0x40/0x68 [ 1627.180610][ T8649] el0_svc_compat+0x4c/0x17c [ 1627.180962][ T8649] el0t_32_sync_handler+0x98/0x13c [ 1627.181326][ T8649] el0t_32_sync+0x19c/0x1a0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1628.560599][ T1518] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1628.760162][ T1518] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1628.982747][ T1518] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1629.216404][ T1518] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1632.761511][ T1518] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1632.828704][ T1518] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1632.881172][ T1518] bond0 (unregistering): Released all slaves [ 1633.072185][ T1518] hsr_slave_0: left promiscuous mode [ 1633.081674][ T1518] hsr_slave_1: left promiscuous mode [ 1633.126362][ T1518] veth1_macvtap: left promiscuous mode [ 1633.128335][ T1518] veth0_macvtap: left promiscuous mode [ 1639.584112][ T1518] bond0 (unregistering): Released all slaves VM DIAGNOSIS: 04:25:29 Registers: info registers vcpu 0 CPU#0 PC=ffff800081ba0f14 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001dbfe2f X04=0000000000000000 X05=ffff800087a64bc0 X06=ffff700010f4c978 X07=0000000000000001 X08=ffff800087a64bc0 X09=dfff800000000000 X10=ffff700010f4c978 X11=1ffff00010f4c978 X12=ffff700010f4c979 X13=205d393436385420 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff8000a1126dcc X19=ffff00000edff080 X20=ffff800087ae02e0 X21=ffff80008d47b000 X22=0000000000000020 X23=dfff800000000000 X24=ffff00000ee44042 X25=0000000000000003 X26=ffff00000edff2d8 X27=ffff00000edff080 X28=dfff800000000000 X29=ffff8000a1926ac0 X30=ffff800081ba0e78 SP=ffff8000a1926ac0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000010 Q00=0000000000000000:0000000000000000 Q01=697665642f366874:652f74656e2f7373 Q02=0000000000000032:726579616c2f6563 Q03=ff00000000000000:0000000000000000 Q04=0000000000000000:f000000000000000 Q05=0000000000000000:0000003000000000 Q06=0000000000000000:0798abc2d034a58c Q07=0000000000000000:016a8682011ea2eb Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffddb272d0:0000ffffddb272d0 Q17=ffffff80ffffffd8:0000ffffddb272a0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080247c24 X00=ffff8000872c06a0 X01=0000000000000003 X02=0000000000000000 X03=0000000000002000 X04=1fffe00002f04001 X05=0000000000000000 X06=ffff80008099dd70 X07=00008fffebddd167 X08=ffff8000a11174d0 X09=0000000000000000 X10=ffff700014222ed9 X11=1ffff00014222ed9 X12=ffff700014222eda X13=0000000000000002 X14=00000000007fffff X15=1ffff00014222f5a X16=ffff80008d480000 X17=ffff7fffe305e000 X18=0000000000000000 X19=ffff8000803f1388 X20=ffff8000a1117450 X21=ffff000017820000 X22=0000000000000007 X23=ffff8000803f1774 X24=0000000000112008 X25=0000000000000000 X26=0000000000000000 X27=d0d0d0d0d0d0d0d0 X28=ffff8000a1117ac0 X29=ffff8000a1117410 X30=ffff800081705910 SP=ffff8000a11173f0 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=766c6f7365726269:6c2f343662696c2f Q01=00322e6f732e766c:6f73657262696c2f Q02=0000000000000000:fffffffffff00000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:000000000c000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000