last executing test programs: 6.186303688s ago: executing program 0 (id=277): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) close(r0) 5.865436367s ago: executing program 0 (id=279): r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f0000000280)="b100050400000400000000000101000000000000cea10500fef96ec0c72fd3357ae30200004e3039d2d236acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b1257aea8c500002002fbfe0c2300008abfba0900000008e371a3f8343732051eeab71d89e0000405f8ffffff13000000", 0xb1, 0x0, 0x0, 0x0) 5.635837927s ago: executing program 0 (id=281): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0xa3) 4.536151516s ago: executing program 0 (id=284): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b706000014000000b7030000000d000085000000bb000000bca90000000000003509010000000000950000fb58028f3a22c20000000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.211732954s ago: executing program 1 (id=285): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 4.013317392s ago: executing program 0 (id=286): socket$unix(0x1, 0x1, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x2) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x2, {0x2, 0x0, 0xff, 0x401, 0x3fd, 0x1}}) shmctl$SHM_LOCK(0x0, 0xb) r0 = msgget$private(0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pread64(r1, &(0x7f0000000140)=""/17, 0x11, 0x0) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 3.824394339s ago: executing program 1 (id=287): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KDGKBTYPE(r1, 0x8901, 0x0) 3.705286609s ago: executing program 0 (id=288): mlockall(0x1) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) mlockall(0x5) getpeername$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlockall(0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8904, &(0x7f0000000080)) 3.395889857s ago: executing program 1 (id=289): mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8946, &(0x7f0000000100)={'veth1_virt_wifi\x00'}) 2.835431137s ago: executing program 1 (id=290): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000002c0)='\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_link_settings={0x2}}) 2.035812058s ago: executing program 1 (id=291): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 0s ago: executing program 1 (id=292): r0 = semget(0x0, 0x0, 0x2f9) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/79) kernel console output (not intermixed with test programs): [ 50.390510][ T31] audit: type=1400 audit(50.280:68): avc: denied { read write } for pid=3002 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.408421][ T31] audit: type=1400 audit(50.310:69): avc: denied { open } for pid=3002 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:18536' (ED25519) to the list of known hosts. [ 60.794051][ T31] audit: type=1400 audit(60.700:70): avc: denied { name_bind } for pid=3004 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.754825][ T31] audit: type=1400 audit(62.660:71): avc: denied { execute } for pid=3006 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.790753][ T31] audit: type=1400 audit(62.700:72): avc: denied { execute_no_trans } for pid=3006 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.663067][ T31] audit: type=1400 audit(65.570:73): avc: denied { mounton } for pid=3006 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.665369][ T31] audit: type=1400 audit(65.570:74): avc: denied { mount } for pid=3006 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.675012][ T3006] cgroup: Unknown subsys name 'net' [ 65.680050][ T31] audit: type=1400 audit(65.590:75): avc: denied { unmount } for pid=3006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.918905][ T3006] cgroup: Unknown subsys name 'hugetlb' [ 65.919982][ T3006] cgroup: Unknown subsys name 'rlimit' [ 66.163951][ T31] audit: type=1400 audit(66.070:76): avc: denied { setattr } for pid=3006 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.170539][ T31] audit: type=1400 audit(66.080:77): avc: denied { mounton } for pid=3006 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.171064][ T31] audit: type=1400 audit(66.080:78): avc: denied { mount } for pid=3006 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.312491][ T3008] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.313897][ T31] audit: type=1400 audit(66.220:79): avc: denied { relabelto } for pid=3008 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.320931][ T31] audit: type=1400 audit(66.230:80): avc: denied { write } for pid=3008 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.354971][ T31] audit: type=1400 audit(66.260:81): avc: denied { read } for pid=3006 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.359443][ T31] audit: type=1400 audit(66.260:82): avc: denied { open } for pid=3006 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.026894][ T3006] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.181022][ T31] audit: type=1400 audit(74.090:83): avc: denied { execmem } for pid=3009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.224155][ T31] audit: type=1400 audit(74.130:84): avc: denied { mounton } for pid=3011 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.229007][ T31] audit: type=1400 audit(74.130:85): avc: denied { mount } for pid=3011 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 74.237889][ T31] audit: type=1400 audit(74.140:86): avc: denied { read } for pid=3011 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.238732][ T31] audit: type=1400 audit(74.140:87): avc: denied { open } for pid=3011 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.243623][ T31] audit: type=1400 audit(74.150:88): avc: denied { mounton } for pid=3012 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.263364][ T31] audit: type=1400 audit(74.170:89): avc: denied { module_request } for pid=3012 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.264202][ T31] audit: type=1400 audit(74.170:90): avc: denied { module_request } for pid=3011 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.348039][ T31] audit: type=1400 audit(74.250:91): avc: denied { sys_module } for pid=3012 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 74.976464][ T31] audit: type=1400 audit(74.880:92): avc: denied { ioctl } for pid=3012 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.371138][ T3012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.401960][ T3012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.450854][ T3011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.471294][ T3011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.335864][ T3012] hsr_slave_0: entered promiscuous mode [ 77.345778][ T3012] hsr_slave_1: entered promiscuous mode [ 77.638862][ T3011] hsr_slave_0: entered promiscuous mode [ 77.641479][ T3011] hsr_slave_1: entered promiscuous mode [ 77.643234][ T3011] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.643633][ T3011] Cannot create hsr debugfs directory [ 77.893671][ T3012] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 77.911051][ T3012] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 77.942266][ T3012] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 77.962994][ T3012] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.086375][ T3011] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.100538][ T3011] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.110059][ T3011] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.121287][ T3011] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.814790][ T3012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.968541][ T3011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.149395][ T3012] veth0_vlan: entered promiscuous mode [ 82.173408][ T3012] veth1_vlan: entered promiscuous mode [ 82.235697][ T3012] veth0_macvtap: entered promiscuous mode [ 82.248819][ T3012] veth1_macvtap: entered promiscuous mode [ 82.307315][ T3011] veth0_vlan: entered promiscuous mode [ 82.329528][ T3011] veth1_vlan: entered promiscuous mode [ 82.341515][ T3012] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.342721][ T3012] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.343519][ T3012] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.343971][ T3012] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.504044][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 82.504128][ T31] audit: type=1400 audit(82.410:96): avc: denied { mount } for pid=3012 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.504983][ T3011] veth0_macvtap: entered promiscuous mode [ 82.509649][ T31] audit: type=1400 audit(82.420:97): avc: denied { mounton } for pid=3012 comm="syz-executor" path="/syzkaller.UD2n7R/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.522446][ T3011] veth1_macvtap: entered promiscuous mode [ 82.528084][ T31] audit: type=1400 audit(82.430:98): avc: denied { mount } for pid=3012 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.533657][ T31] audit: type=1400 audit(82.440:99): avc: denied { unmount } for pid=3012 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.541560][ T31] audit: type=1400 audit(82.450:100): avc: denied { mounton } for pid=3012 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.545154][ T31] audit: type=1400 audit(82.450:101): avc: denied { mount } for pid=3012 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.640373][ T3011] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.641035][ T3011] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.641432][ T3011] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.641781][ T3011] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.697389][ T31] audit: type=1400 audit(82.600:102): avc: denied { read write } for pid=3012 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.697948][ T31] audit: type=1400 audit(82.600:103): avc: denied { open } for pid=3012 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.698449][ T31] audit: type=1400 audit(82.600:104): avc: denied { ioctl } for pid=3012 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.784687][ T31] audit: type=1400 audit(82.690:105): avc: denied { map_create } for pid=3690 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.158861][ T3697] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4'. [ 85.842460][ T2862] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.935701][ T2862] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.040599][ T2862] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.174238][ T2862] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.745982][ T2862] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 86.759058][ T2862] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 86.811100][ T2862] bond0 (unregistering): Released all slaves [ 86.849997][ T3735] syz.0.13[3735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.850682][ T3735] syz.0.13[3735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.069352][ T2862] hsr_slave_0: left promiscuous mode [ 87.080784][ T2862] hsr_slave_1: left promiscuous mode [ 87.118948][ T2862] veth1_macvtap: left promiscuous mode [ 87.119645][ T2862] veth0_macvtap: left promiscuous mode [ 87.124396][ T2862] veth1_vlan: left promiscuous mode [ 87.138172][ T2862] veth0_vlan: left promiscuous mode [ 88.703073][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 88.703136][ T31] audit: type=1400 audit(88.610:120): avc: denied { ioctl } for pid=3742 comm="syz.0.15" path="socket:[2507]" dev="sockfs" ino=2507 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 88.730262][ T31] audit: type=1400 audit(88.640:121): avc: denied { name_bind } for pid=3742 comm="syz.0.15" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 88.730974][ T31] audit: type=1400 audit(88.640:122): avc: denied { node_bind } for pid=3742 comm="syz.0.15" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 88.745425][ T3743] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 90.471115][ T2862] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.680054][ T2862] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.800299][ T2862] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.959540][ T2862] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.719966][ T2862] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.925827][ T2862] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.951913][ T2862] bond0 (unregistering): Released all slaves [ 92.385321][ T2862] hsr_slave_0: left promiscuous mode [ 92.388484][ T2862] hsr_slave_1: left promiscuous mode [ 92.419065][ T2862] veth1_macvtap: left promiscuous mode [ 92.419569][ T2862] veth0_macvtap: left promiscuous mode [ 92.420012][ T2862] veth1_vlan: left promiscuous mode [ 92.420376][ T2862] veth0_vlan: left promiscuous mode [ 96.160495][ T3717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.214464][ T3717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.311466][ T3787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.331289][ T3787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.271609][ T3717] hsr_slave_0: entered promiscuous mode [ 99.293849][ T3717] hsr_slave_1: entered promiscuous mode [ 101.057581][ T3717] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 101.061942][ T3717] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 101.070581][ T3717] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 101.074207][ T3717] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 101.388720][ T3787] hsr_slave_0: entered promiscuous mode [ 101.398491][ T3787] hsr_slave_1: entered promiscuous mode [ 101.399727][ T3787] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 101.400133][ T3787] Cannot create hsr debugfs directory [ 102.802480][ T3787] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 102.821715][ T3787] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 102.853713][ T3787] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 102.863378][ T3787] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 103.176186][ T3717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.001428][ T3787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.065933][ T3717] veth0_vlan: entered promiscuous mode [ 109.085373][ T3717] veth1_vlan: entered promiscuous mode [ 109.166272][ T3717] veth0_macvtap: entered promiscuous mode [ 109.181350][ T3717] veth1_macvtap: entered promiscuous mode [ 109.272766][ T3717] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.273375][ T3717] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.273892][ T3717] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.274218][ T3717] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.683002][ T4519] syz.1.12[4519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.708473][ T4519] syz.1.12[4519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.330456][ T3787] veth0_vlan: entered promiscuous mode [ 110.400198][ T3787] veth1_vlan: entered promiscuous mode [ 110.660057][ T3787] veth0_macvtap: entered promiscuous mode [ 110.741637][ T3787] veth1_macvtap: entered promiscuous mode [ 110.988603][ T3787] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.989364][ T3787] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.989714][ T3787] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.990046][ T3787] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.330994][ T4607] syz.1.46 uses obsolete (PF_INET,SOCK_PACKET) [ 124.228450][ T4665] netlink: 8 bytes leftover after parsing attributes in process `syz.1.58'. [ 124.254263][ T4665] netlink: 16 bytes leftover after parsing attributes in process `syz.1.58'. [ 124.427828][ T31] audit: type=1400 audit(124.320:123): avc: denied { name_bind } for pid=4666 comm="syz.1.59" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 124.450799][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 125.949058][ T31] audit: type=1400 audit(125.860:124): avc: denied { unmount } for pid=3717 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 126.720579][ T31] audit: type=1400 audit(126.630:125): avc: denied { write } for pid=4677 comm="syz.1.62" name="route" dev="proc" ino=4026532675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 126.741533][ T31] audit: type=1400 audit(126.630:126): avc: denied { create } for pid=4677 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.776208][ T31] audit: type=1404 audit(126.680:127): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 126.855796][ T31] audit: type=1404 audit(126.760:128): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 126.856538][ T31] audit: type=1400 audit(126.760:129): avc: denied { read write } for pid=3787 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 126.888257][ T31] audit: type=1400 audit(126.760:130): avc: denied { open } for pid=3787 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 126.889380][ T31] audit: type=1400 audit(126.780:131): avc: denied { ioctl } for pid=3787 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 126.931534][ T31] audit: type=1400 audit(126.840:132): avc: denied { map_create } for pid=4677 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 127.133370][ T4682] netlink: 8 bytes leftover after parsing attributes in process `syz.1.64'. [ 130.105371][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 130.105456][ T31] audit: type=1400 audit(130.010:158): avc: denied { create } for pid=4694 comm="syz.0.68" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 130.170806][ T31] audit: type=1400 audit(130.080:159): avc: denied { write } for pid=4694 comm="syz.0.68" name="file0" dev="tmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 130.186352][ T31] audit: type=1400 audit(130.090:160): avc: denied { open } for pid=4694 comm="syz.0.68" path="/17/file0" dev="tmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 130.322406][ T31] audit: type=1400 audit(130.230:161): avc: denied { unlink } for pid=3787 comm="syz-executor" name="file0" dev="tmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 130.499029][ T31] audit: type=1400 audit(130.410:162): avc: denied { ioctl } for pid=4697 comm="syz.0.69" path="socket:[4203]" dev="sockfs" ino=4203 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.518201][ T31] audit: type=1400 audit(130.420:163): avc: denied { create } for pid=4697 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 130.534338][ T31] audit: type=1400 audit(130.440:164): avc: denied { execute } for pid=4697 comm="syz.0.69" path="/18/cpuacct.usage_percpu_user" dev="tmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 131.380883][ T31] audit: type=1400 audit(131.290:165): avc: denied { read } for pid=4701 comm="syz.1.71" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 131.381578][ T31] audit: type=1400 audit(131.290:166): avc: denied { open } for pid=4701 comm="syz.1.71" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 131.468294][ T4703] netlink: 8 bytes leftover after parsing attributes in process `syz.1.71'. [ 131.686559][ T31] audit: type=1400 audit(131.590:167): avc: denied { write } for pid=4706 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 133.952998][ T4729] capability: warning: `syz.0.81' uses deprecated v2 capabilities in a way that may be insecure [ 134.737415][ T4621] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 134.751835][ C0] hrtimer: interrupt took 4120064 ns [ 134.973737][ T4621] usb 1-1: Using ep0 maxpacket: 8 [ 135.051416][ T4621] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 135.052306][ T4621] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 135.063495][ T4621] usb 1-1: config 0 descriptor?? [ 136.104221][ T4621] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 136.104854][ T4621] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write GPIO value 0x00b0: ffffffb9 [ 136.160320][ T4621] asix 1-1:0.0: probe with driver asix failed with error -71 [ 136.205555][ T4621] usb 1-1: USB disconnect, device number 2 [ 139.077769][ T4588] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 139.161346][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 139.161581][ T31] audit: type=1400 audit(139.070:176): avc: denied { ioctl } for pid=4763 comm="syz.0.91" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4280 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 139.277734][ T4588] usb 2-1: Using ep0 maxpacket: 8 [ 139.282673][ T4588] usb 2-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 139.284742][ T4588] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 139.288820][ T4588] usb 2-1: config 0 descriptor?? [ 139.382145][ T31] audit: type=1400 audit(139.290:177): avc: denied { execmem } for pid=4766 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 140.242437][ T4588] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 140.242827][ T4588] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to write GPIO value 0x00b0: ffffffb9 [ 140.272219][ T4588] asix 2-1:0.0: probe with driver asix failed with error -71 [ 140.289668][ T4588] usb 2-1: USB disconnect, device number 2 [ 144.676029][ T31] audit: type=1400 audit(144.580:178): avc: denied { ioctl } for pid=4801 comm="syz.1.101" path="socket:[4335]" dev="sockfs" ino=4335 ioctlcmd=0x54d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.860956][ T31] audit: type=1400 audit(153.770:179): avc: denied { create } for pid=4815 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.929621][ T31] audit: type=1400 audit(153.840:180): avc: denied { write } for pid=4815 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.931048][ T4816] netlink: 140 bytes leftover after parsing attributes in process `syz.1.107'. [ 153.932937][ T31] audit: type=1400 audit(153.840:181): avc: denied { nlmsg_write } for pid=4815 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 154.288235][ T4819] process 'syz.1.108' launched './file0' with NULL argv: empty string added [ 154.290857][ T31] audit: type=1400 audit(154.200:182): avc: denied { execute_no_trans } for pid=4818 comm="syz.1.108" path="/56/file0" dev="tmpfs" ino=301 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 159.349974][ T4596] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 159.576995][ T4596] usb 2-1: Using ep0 maxpacket: 32 [ 159.627678][ T4596] usb 2-1: config 0 has no interfaces? [ 159.670767][ T4596] usb 2-1: New USB device found, idVendor=05ac, idProduct=020f, bcdDevice= 0.22 [ 159.671313][ T4596] usb 2-1: New USB device strings: Mfr=1, Product=130, SerialNumber=131 [ 159.671625][ T4596] usb 2-1: Product: syz [ 159.671820][ T4596] usb 2-1: Manufacturer: syz [ 159.672029][ T4596] usb 2-1: SerialNumber: syz [ 159.681281][ T4596] usb 2-1: config 0 descriptor?? [ 159.897972][ T31] audit: type=1400 audit(159.800:183): avc: denied { mounton } for pid=4836 comm="syz.1.116" path="/proc/144/task" dev="proc" ino=4390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 159.898896][ T31] audit: type=1400 audit(159.800:184): avc: denied { mount } for pid=4836 comm="syz.1.116" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 160.192213][ T4550] usb 2-1: USB disconnect, device number 3 [ 161.248492][ T4858] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 161.288240][ T31] audit: type=1400 audit(161.190:185): avc: denied { getopt } for pid=4857 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 178.623739][ T31] audit: type=1400 audit(178.530:186): avc: denied { watch } for pid=4869 comm="syz.1.122" path="/69" dev="tmpfs" ino=365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 180.263655][ T4877] tmpfs: Unsupported parameter 'huge' [ 180.267848][ T31] audit: type=1400 audit(180.170:187): avc: denied { mounton } for pid=4875 comm="syz.0.125" path="/35/file0" dev="tmpfs" ino=202 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 184.723690][ T31] audit: type=1400 audit(184.630:188): avc: denied { create } for pid=4888 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 184.732220][ T31] audit: type=1400 audit(184.640:189): avc: denied { write } for pid=4888 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 185.403577][ T31] audit: type=1400 audit(185.310:190): avc: denied { unmount } for pid=3787 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 185.732718][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.873296][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.888845][ T31] audit: type=1400 audit(185.790:191): avc: denied { execute } for pid=4898 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 185.890124][ T31] audit: type=1400 audit(185.800:192): avc: denied { execute_no_trans } for pid=4898 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 185.963699][ T31] audit: type=1400 audit(185.870:193): avc: denied { mounton } for pid=4899 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 185.964845][ T31] audit: type=1400 audit(185.870:194): avc: denied { mount } for pid=4899 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 185.966305][ T31] audit: type=1400 audit(185.870:195): avc: denied { mounton } for pid=4899 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 185.980396][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.074815][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.197543][ T31] audit: type=1400 audit(186.100:196): avc: denied { sys_module } for pid=4899 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 186.572865][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 186.593920][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 186.609749][ T11] bond0 (unregistering): Released all slaves [ 186.749234][ T11] hsr_slave_0: left promiscuous mode [ 186.769143][ T11] hsr_slave_1: left promiscuous mode [ 186.776477][ T11] veth1_macvtap: left promiscuous mode [ 186.776982][ T11] veth0_macvtap: left promiscuous mode [ 186.800389][ T11] veth1_vlan: left promiscuous mode [ 186.802870][ T11] veth0_vlan: left promiscuous mode [ 188.317486][ T31] audit: type=1400 audit(188.210:197): avc: denied { write } for pid=4918 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 189.903723][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 189.903827][ T31] audit: type=1400 audit(189.810:212): avc: denied { remove_name } for pid=4989 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 189.906126][ T31] audit: type=1400 audit(189.810:213): avc: denied { unlink } for pid=4989 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 191.365283][ T4899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.385755][ T4899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.915765][ T4899] hsr_slave_0: entered promiscuous mode [ 193.930949][ T4899] hsr_slave_1: entered promiscuous mode [ 193.934478][ T4899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.935011][ T4899] Cannot create hsr debugfs directory [ 194.884743][ T4899] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 194.902898][ T4899] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 194.910446][ T4899] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 194.921455][ T4899] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 196.504192][ T4899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.823952][ T5273] capability: warning: `syz.1.135' uses 32-bit capabilities (legacy support in use) [ 197.832002][ T5273] input: syz1 as /devices/virtual/input/input4 [ 198.911948][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 198.989696][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.096099][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.229441][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.799396][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 199.829725][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 199.836649][ T11] bond0 (unregistering): Released all slaves [ 199.965992][ T11] hsr_slave_0: left promiscuous mode [ 199.990018][ T11] hsr_slave_1: left promiscuous mode [ 199.998964][ T11] veth1_macvtap: left promiscuous mode [ 199.999737][ T11] veth0_macvtap: left promiscuous mode [ 200.000122][ T11] veth1_vlan: left promiscuous mode [ 200.000449][ T11] veth0_vlan: left promiscuous mode [ 204.105041][ T4899] veth0_vlan: entered promiscuous mode [ 204.145159][ T4899] veth1_vlan: entered promiscuous mode [ 204.391916][ T4899] veth0_macvtap: entered promiscuous mode [ 204.411364][ T4899] veth1_macvtap: entered promiscuous mode [ 204.704502][ T4899] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.705130][ T4899] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.705556][ T4899] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.705950][ T4899] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.822965][ T5291] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.842922][ T5291] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.074377][ T31] audit: type=1400 audit(204.980:214): avc: denied { mounton } for pid=4899 comm="syz-executor" path="/syzkaller.81E2As/syz-tmp" dev="vda" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 205.098398][ T31] audit: type=1400 audit(205.000:215): avc: denied { mount } for pid=4899 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 205.120848][ T31] audit: type=1400 audit(205.020:216): avc: denied { unmount } for pid=4899 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 205.158328][ T31] audit: type=1400 audit(205.050:217): avc: denied { mounton } for pid=4899 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 205.169239][ T31] audit: type=1400 audit(205.080:218): avc: denied { mount } for pid=4899 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 205.458230][ T5520] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5520 comm=syz.0.138 [ 205.700048][ T5523] input: syz1 as /devices/virtual/input/input5 [ 207.272910][ T5291] hsr_slave_0: entered promiscuous mode [ 207.275041][ T5291] hsr_slave_1: entered promiscuous mode [ 208.582365][ T5291] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 208.626629][ T5291] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 208.758415][ T5291] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 208.769475][ T5291] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 210.342148][ T5685] veth0_vlan: entered allmulticast mode [ 210.891551][ T5291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.369056][ T5291] veth0_vlan: entered promiscuous mode [ 217.406313][ T5291] veth1_vlan: entered promiscuous mode [ 217.532732][ T5291] veth0_macvtap: entered promiscuous mode [ 217.592373][ T5291] veth1_macvtap: entered promiscuous mode [ 217.705227][ T5291] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 217.705513][ T5291] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 217.705669][ T5291] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 217.705823][ T5291] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.185468][ T5715] syz.1.142[5715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.185818][ T5715] syz.1.142[5715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.129066][ T5721] input: syz1 as /devices/virtual/input/input6 [ 220.082305][ T5733] pim6reg1: entered promiscuous mode [ 220.082927][ T5733] pim6reg1: entered allmulticast mode [ 225.668612][ T31] audit: type=1400 audit(225.570:219): avc: denied { setopt } for pid=5753 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 228.772608][ T5759] netlink: 124 bytes leftover after parsing attributes in process `syz.0.159'. [ 230.868559][ T31] audit: type=1400 audit(230.780:220): avc: denied { setopt } for pid=5794 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 231.178877][ T31] audit: type=1400 audit(231.090:221): avc: denied { bind } for pid=5796 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 231.180306][ T31] audit: type=1400 audit(231.090:222): avc: denied { name_bind } for pid=5796 comm="syz.1.168" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 231.181512][ T31] audit: type=1400 audit(231.090:223): avc: denied { node_bind } for pid=5796 comm="syz.1.168" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 231.190968][ T31] audit: type=1400 audit(231.100:224): avc: denied { write } for pid=5796 comm="syz.1.168" laddr=172.20.20.170 lport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 232.828938][ T31] audit: type=1400 audit(232.740:225): avc: denied { create } for pid=5819 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 232.844183][ T31] audit: type=1400 audit(232.750:226): avc: denied { getopt } for pid=5819 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 239.169444][ T31] audit: type=1400 audit(239.080:227): avc: denied { read } for pid=5842 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 239.410629][ T31] audit: type=1400 audit(239.320:228): avc: denied { bind } for pid=5844 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 239.415684][ T31] audit: type=1400 audit(239.320:229): avc: denied { setopt } for pid=5844 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 240.168854][ T5855] batadv_slave_1: entered promiscuous mode [ 240.173921][ T5854] batadv_slave_1: left promiscuous mode [ 240.284227][ T31] audit: type=1400 audit(240.190:230): avc: denied { map } for pid=5858 comm="syz.1.191" path="pipe:[5044]" dev="pipefs" ino=5044 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 243.701194][ T31] audit: type=1400 audit(243.610:231): avc: denied { write } for pid=5889 comm="syz.1.202" name="arp" dev="proc" ino=4026532671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 259.748096][ T46] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 259.937572][ T46] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 259.938285][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 255, changing to 11 [ 259.938725][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 259.939317][ T46] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 259.939985][ T46] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 259.940355][ T46] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 259.946612][ T46] usb 1-1: config 0 descriptor?? [ 259.952246][ T5895] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 260.408412][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.411721][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.412154][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.412396][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.412601][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.412836][ T46] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 260.414494][ T46] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 260.433671][ T46] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 260.691358][ T46] usb 1-1: USB disconnect, device number 3 [ 260.721578][ T31] audit: type=1400 audit(260.610:232): avc: denied { create } for pid=5909 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.722136][ T31] audit: type=1400 audit(260.610:233): avc: denied { bind } for pid=5909 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.845571][ T31] audit: type=1400 audit(260.750:234): avc: denied { create } for pid=5923 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 260.966350][ T31] audit: type=1400 audit(260.870:235): avc: denied { setopt } for pid=5909 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.972219][ T31] audit: type=1400 audit(260.880:236): avc: denied { accept } for pid=5909 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.981621][ T31] audit: type=1400 audit(260.880:237): avc: denied { write } for pid=5909 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 262.823582][ T31] audit: type=1400 audit(262.730:238): avc: denied { mount } for pid=5950 comm="syz.1.216" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 262.857582][ T31] audit: type=1400 audit(262.760:239): avc: denied { unmount } for pid=5291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 263.501155][ T5958] netlink: 596 bytes leftover after parsing attributes in process `syz.1.218'. [ 263.504830][ T5958] netlink: 8 bytes leftover after parsing attributes in process `syz.1.218'. [ 263.810153][ T31] audit: type=1400 audit(263.720:240): avc: denied { setopt } for pid=5961 comm="syz.1.219" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 263.824258][ T31] audit: type=1400 audit(263.730:241): avc: denied { create } for pid=5961 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 266.162007][ T5991] netlink: 20 bytes leftover after parsing attributes in process `syz.0.231'. [ 266.447758][ T31] audit: type=1400 audit(266.350:242): avc: denied { bind } for pid=5992 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 266.448759][ T31] audit: type=1400 audit(266.350:243): avc: denied { node_bind } for pid=5992 comm="syz.1.232" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 266.603392][ T31] audit: type=1400 audit(266.510:244): avc: denied { create } for pid=5993 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 266.910255][ T5997] netlink: 4 bytes leftover after parsing attributes in process `syz.1.234'. [ 266.943253][ T5997] netlink: 12 bytes leftover after parsing attributes in process `syz.1.234'. [ 267.684847][ T31] audit: type=1400 audit(267.580:245): avc: denied { bind } for pid=6001 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.792487][ T6002] netlink: 8 bytes leftover after parsing attributes in process `syz.0.235'. [ 270.929914][ T31] audit: type=1400 audit(270.840:246): avc: denied { shutdown } for pid=6023 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 271.190000][ T31] audit: type=1400 audit(271.100:247): avc: denied { create } for pid=6025 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 271.498224][ T6026] netlink: 2 bytes leftover after parsing attributes in process `syz.0.244'. [ 271.510215][ T6026] veth1_to_hsr: entered promiscuous mode [ 272.104450][ T6032] ptrace attach of "/syz-executor exec"[6033] was attempted by "/syz-executor exec"[6032] [ 274.422330][ T31] audit: type=1400 audit(274.330:248): avc: denied { create } for pid=6055 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 274.441165][ T31] audit: type=1400 audit(274.350:249): avc: denied { write } for pid=6055 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 274.442094][ T31] audit: type=1400 audit(274.350:250): avc: denied { nlmsg_read } for pid=6055 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 276.179281][ T46] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 276.387597][ T46] usb 1-1: Using ep0 maxpacket: 8 [ 276.412467][ T46] usb 1-1: config 0 has an invalid interface number: 52 but max is 0 [ 276.413789][ T46] usb 1-1: config 0 has an invalid descriptor of length 48, skipping remainder of the config [ 276.416265][ T46] usb 1-1: config 0 has no interface number 0 [ 276.419367][ T46] usb 1-1: config 0 interface 52 altsetting 1 endpoint 0x8A has an invalid bInterval 48, changing to 9 [ 276.432247][ T46] usb 1-1: config 0 interface 52 altsetting 1 endpoint 0x8A has invalid maxpacket 24624, setting to 1024 [ 276.433051][ T46] usb 1-1: config 0 interface 52 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 276.433754][ T46] usb 1-1: config 0 interface 52 has no altsetting 0 [ 276.455567][ T46] usb 1-1: New USB device found, idVendor=06cb, idProduct=0003, bcdDevice=e8.00 [ 276.455904][ T46] usb 1-1: New USB device strings: Mfr=22, Product=149, SerialNumber=35 [ 276.456136][ T46] usb 1-1: Product: syz [ 276.456814][ T46] usb 1-1: Manufacturer: syz [ 276.457563][ T46] usb 1-1: SerialNumber: syz [ 276.470111][ T46] usb 1-1: config 0 descriptor?? [ 276.792873][ T46] input: syz syz as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.52/input/input7 [ 276.977604][ T4581] usb 1-1: USB disconnect, device number 4 [ 276.977869][ C1] synaptics_usb 1-1:0.52: synusb_irq - usb_submit_urb failed with result: -19 [ 278.099014][ T4581] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 278.298014][ T4581] usb 1-1: Using ep0 maxpacket: 8 [ 278.303685][ T4581] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 278.304138][ T4581] usb 1-1: config 0 has no interface number 0 [ 278.304423][ T4581] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 278.304859][ T4581] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 278.305265][ T4581] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 278.309752][ T4581] usb 1-1: config 0 descriptor?? [ 278.341356][ T4581] iowarrior 1-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 278.395570][ T31] audit: type=1400 audit(278.300:251): avc: denied { relabelfrom } for pid=6110 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 278.396957][ T31] audit: type=1400 audit(278.300:252): avc: denied { relabelto } for pid=6110 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 288.798995][ T31] audit: type=1400 audit(288.710:253): avc: denied { getopt } for pid=6129 comm="syz.1.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 288.884094][ T31] audit: type=1400 audit(288.790:254): avc: denied { create } for pid=6131 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 288.886907][ T31] audit: type=1400 audit(288.790:255): avc: denied { bind } for pid=6131 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 288.893742][ T31] audit: type=1400 audit(288.800:256): avc: denied { listen } for pid=6131 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 288.899731][ T31] audit: type=1400 audit(288.810:257): avc: denied { connect } for pid=6131 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 288.910702][ T31] audit: type=1400 audit(288.820:258): avc: denied { write } for pid=6131 comm="syz.1.270" path="socket:[6385]" dev="sockfs" ino=6385 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 289.071830][ T6134] syzkaller0: entered promiscuous mode [ 289.072343][ T6134] syzkaller0: entered allmulticast mode [ 290.077430][ T6142] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 290.081357][ T31] audit: type=1400 audit(289.990:259): avc: denied { name_bind } for pid=6141 comm="syz.1.273" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 290.132456][ T31] audit: type=1400 audit(290.040:260): avc: denied { read } for pid=6141 comm="syz.1.273" lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.614970][ T4582] usb 1-1: USB disconnect, device number 5 [ 292.633573][ T4582] iowarrior 1-1:0.1: I/O-Warror #0 now disconnected [ 292.998045][ T31] audit: type=1400 audit(292.900:261): avc: denied { mounton } for pid=6152 comm="syz.1.274" path="/91/file0" dev="tmpfs" ino=482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 292.999032][ T31] audit: type=1400 audit(292.910:262): avc: denied { mount } for pid=6152 comm="syz.1.274" name="/" dev="ramfs" ino=7303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 293.132293][ T6154] syzkaller0: entered promiscuous mode [ 293.132659][ T6154] syzkaller0: entered allmulticast mode [ 293.920097][ T31] audit: type=1400 audit(293.830:263): avc: denied { write } for pid=6189 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 294.351818][ T6193] pim6reg1: entered promiscuous mode [ 294.352285][ T6193] pim6reg1: entered allmulticast mode [ 295.666767][ T6208] Illegal XDP return value 4294967274 on prog (id 103) dev N/A, expect packet loss! [ 297.507720][ T31] audit: type=1400 audit(297.410:264): avc: denied { ioctl } for pid=6217 comm="syz.1.290" path="socket:[7387]" dev="sockfs" ino=7387 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 298.015333][ T4621] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 298.230193][ T4621] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 298.250591][ T4621] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 298.251117][ T4621] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 298.251446][ T4621] usb 2-1: Product: syz [ 298.251702][ T4621] usb 2-1: Manufacturer: syz [ 298.251974][ T4621] usb 2-1: SerialNumber: syz [ 299.317612][ T4621] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 299.318532][ T4621] cdc_ncm 2-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 299.318931][ T4621] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 299.521728][ T4621] cdc_ncm 2-1:1.0: setting tx_max = 184 [ 299.538921][ T4621] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 299.560217][ T4621] usb 2-1: USB disconnect, device number 4 [ 299.562203][ T4621] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 299.680969][ T4621] ------------[ cut here ]------------ [ 299.681558][ T4621] WARNING: CPU: 0 PID: 4621 at lib/debugobjects.c:515 debug_print_object+0xc4/0xd8 [ 299.682544][ T4621] ODEBUG: free active (active state 0) object: 84a347cc object type: work_struct hint: usbnet_deferred_kevent+0x0/0x388 [ 299.684882][ T4621] Modules linked in: [ 299.685725][ T4621] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 299.688256][ T4621] CPU: 0 UID: 0 PID: 4621 Comm: kworker/0:19 Not tainted 6.10.0-syzkaller #0 [ 299.689031][ T4621] Hardware name: ARM-Versatile Express [ 299.689602][ T4621] Workqueue: usb_hub_wq hub_event [ 299.690154][ T4621] Call trace: [ 299.690709][ T4621] [<818ef00c>] (dump_backtrace) from [<818ef108>] (show_stack+0x18/0x1c) [ 299.691556][ T4621] r7:00000000 r6:82622804 r5:00000000 r4:81feb164 [ 299.692267][ T4621] [<818ef0f0>] (show_stack) from [<8190c7bc>] (dump_stack_lvl+0x54/0x7c) [ 299.692870][ T4621] [<8190c768>] (dump_stack_lvl) from [<8190c7fc>] (dump_stack+0x18/0x1c) [ 299.693320][ T4621] r5:00000000 r4:82863d0c [ 299.693686][ T4621] [<8190c7e4>] (dump_stack) from [<818efbb0>] (panic+0x120/0x358) [ 299.694054][ T4621] [<818efa90>] (panic) from [<80241f4c>] (get_taint+0x0/0x1c) [ 299.694599][ T4621] r3:8260c5c4 r2:00000001 r1:81fd3d8c r0:81fdb7a0 [ 299.695037][ T4621] r7:8082678c [ 299.695326][ T4621] [<80241ed8>] (check_panic_on_warn) from [<802420a0>] (__warn+0x7c/0x180) [ 299.695682][ T4621] [<80242024>] (__warn) from [<8024238c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 299.696078][ T4621] r8:00000009 r7:8203b214 r6:dfe7da8c r5:848dd400 r4:00000000 [ 299.696381][ T4621] [<802421a8>] (warn_slowpath_fmt) from [<8082678c>] (debug_print_object+0xc4/0xd8) [ 299.696881][ T4621] r10:00000005 r9:84a34000 r8:81a01bc0 r7:82064cc4 r6:828c769c r5:dfe7db34 [ 299.697872][ T4621] r4:8260cda4 [ 299.698211][ T4621] [<808266c8>] (debug_print_object) from [<8082802c>] (debug_check_no_obj_freed+0x254/0x2a0) [ 299.698664][ T4621] r8:84a34800 r7:84a347cc r6:00000100 r5:00000003 r4:00000000 [ 299.699131][ T4621] [<80827dd8>] (debug_check_no_obj_freed) from [<804bc654>] (kfree+0x198/0x338) [ 299.699785][ T4621] r10:82777cb8 r9:846f6880 r8:84a34000 r7:80461650 r6:82c023c0 r5:dde9fec0 [ 299.700338][ T4621] r4:84a34000 [ 299.700553][ T4621] [<804bc4bc>] (kfree) from [<80461650>] (kvfree+0x2c/0x30) [ 299.700925][ T4621] r10:82777cb8 r9:846f6880 r8:84a34000 r7:00000000 r6:85045d40 r5:84b0d100 [ 299.701415][ T4621] r4:84a34000 [ 299.701605][ T4621] [<80461624>] (kvfree) from [<814585b4>] (netdev_release+0x2c/0x34) [ 299.702052][ T4621] r5:84b0d100 r4:84a34000 [ 299.702484][ T4621] [<81458588>] (netdev_release) from [<80a63df4>] (device_release+0x38/0xa8) [ 299.703140][ T4621] r5:84b0d100 r4:84a343c0 [ 299.703355][ T4621] [<80a63dbc>] (device_release) from [<818c8e90>] (kobject_put+0xc8/0x1f8) SYZFAIL: failed to recv rpc [ 299.704122][ T4621] r5:81b49224 r4:84a343c0 [ 299.704457][ T4621] [<818c8dc8>] (kobject_put) from [<80a64020>] (put_device+0x18/0x1c) [ 299.704900][ T4621] r7:846f6c00 r6:84a3410c r5:84a34000 r4:00000000 [ 299.705216][ T4621] [<80a64008>] (put_device) from [<8140d59c>] (free_netdev+0x114/0x18c) [ 299.705611][ T4621] [<8140d488>] (free_netdev) from [<80d3ac20>] (usbnet_disconnect+0xac/0xf0) [ 299.705999][ T4621] r6:84a34794 r5:84a34680 r4:00000000 [ 299.706245][ T4621] [<80d3ab74>] (usbnet_disconnect) from [<80d9f3c0>] (usb_unbind_interface+0x84/0x2c4) [ 299.706756][ T4621] r8:00000044 r7:846f6c30 r6:82777cb8 r5:00000000 r4:846f6c00 [ 299.707458][ T4621] [<80d9f33c>] (usb_unbind_interface) from [<80a6befc>] (device_remove+0x64/0x6c) [ 299.708142][ T4621] r10:00000000 r9:846f6880 r8:00000044 r7:846f6c74 r6:82777cb8 r5:00000000 [ 299.708529][ T4621] r4:846f6c30 [ 299.708712][ T4621] [<80a6be98>] (device_remove) from [<80a6d414>] (device_release_driver_internal+0x18c/0x200) [ 299.709252][ T4621] r5:00000000 r4:846f6c30 [ 299.709465][ T4621] [<80a6d288>] (device_release_driver_internal) from [<80a6d4a0>] (device_release_driver+0x18/0x1c) [ 299.709913][ T4621] r9:846f6880 r8:82fb5140 r7:82fb5138 r6:82fb510c r5:846f6c30 r4:82fb5130 [ 299.710249][ T4621] [<80a6d488>] (device_release_driver) from [<80a6b584>] (bus_remove_device+0xcc/0x120) [ 299.710672][ T4621] [<80a6b4b8>] (bus_remove_device) from [<80a6569c>] (device_del+0x148/0x38c) [ 299.711172][ T4621] r9:846f6880 r8:848dd400 r7:04208060 r6:00000000 r5:846f6c30 r4:846f6c74 [ 299.711615][ T4621] [<80a65554>] (device_del) from [<80d9cddc>] (usb_disable_device+0xdc/0x1f0) [ 299.712324][ T4621] r10:00000000 r9:00000000 r8:846f6c00 r7:846f6800 r6:85045888 r5:00000001 [ 299.712730][ T4621] r4:00000038 [ 299.712889][ T4621] [<80d9cd00>] (usb_disable_device) from [<80d91c3c>] (usb_disconnect+0xec/0x29c) [ 299.713405][ T4621] r10:00000001 r9:846da200 r8:846f68c4 r7:83dabc00 r6:846f6880 r5:846f6800 [ 299.713767][ T4621] r4:60000013 [ 299.713938][ T4621] [<80d91b50>] (usb_disconnect) from [<80d948ec>] (hub_event+0xe78/0x194c) [ 299.714381][ T4621] r10:00000001 r9:00000100 r8:83826100 r7:846f6800 r6:83dab400 r5:83dabe10 [ 299.714748][ T4621] r4:00000001 [ 299.714941][ T4621] [<80d93a74>] (hub_event) from [<8026594c>] (process_one_work+0x1b4/0x4f4) [ 299.715370][ T4621] r10:82ea6a05 r9:848dd400 r8:00800000 r7:dddd0000 r6:82ea6a00 r5:83826100 [ 299.715696][ T4621] r4:84924b80 [ 299.715882][ T4621] [<80265798>] (process_one_work) from [<80266530>] (worker_thread+0x1ec/0x3f4) [ 299.716324][ T4621] r10:848dd400 r9:84924bac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 299.716668][ T4621] r4:84924b80 [ 299.716838][ T4621] [<80266344>] (worker_thread) from [<8026f588>] (kthread+0x104/0x134) [ 299.717442][ T4621] r10:00000000 r9:dfe3de78 r8:84926380 r7:84924b80 r6:80266344 r5:848dd400 [ 299.717801][ T4621] r4:849262c0 [ 299.717980][ T4621] [<8026f484>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 299.718468][ T4621] Exception stack(0xdfe7dfb0 to 0xdfe7dff8) [ 299.718876][ T4621] dfa0: 00000000 00000000 00000000 00000000 [ 299.719358][ T4621] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 299.719774][ T4621] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 299.720142][ T4621] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026f484 r4:849262c0 [ 299.722157][ T4621] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:14:35 Registers: info registers vcpu 0 CPU#0 R00=840f2840 R01=00000036 R02=eaff9000 R03=eaff9018 R04=8286642a R05=840f2840 R06=809b2250 R07=82866468 R08=82866418 R09=00000051 R10=60000193 R11=dfe7d85c R12=00000002 R13=dfe7d850 R14=827523d0 R15=809b2260 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000190 R02=006bf510 R03=8190e54c R04=826f5408 R05=826f5400 R06=00000028 R07=00000006 R08=826f5408 R09=00000000 R10=84193c00 R11=df805d94 R12=df805d98 R13=df805d88 R14=8190d1e0 R15=8190e55c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005527e9 s17=0055a335 d08=0055a335005527e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=ffffffff s33=6c6e01ff d16=6c6e01ffffffffff s34=31323038 s35=3d8a0031 d17=3d8a003131323038 s36=80020402 s37=0108000d d18=0108000d80020402 s38=08018003 s39=ffffffdf d19=ffffffdf08018003 s40=ffffffff s41=6c7701ff d20=6c7701ffffffffff s42=00316e61 s43=00000000 d21=0000000000316e61 s44=00000000 s45=228e0000 d22=228e000000000000 s46=08060601 s47=01000000 d23=0100000008060601 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=cf5077e0 s53=d0d0efb5 d26=d0d0efb5cf5077e0 s54=a0fe536d s55=5eab9e52 d27=5eab9e52a0fe536d s56=92130007 s57=a43061c2 d28=a43061c292130007 s58=37bbf618 s59=75a18e4e d29=75a18e4e37bbf618 s60=f2d0a339 s61=24b6e214 d30=24b6e214f2d0a339 s62=d0afb9bf s63=d416be3f d31=d416be3fd0afb9bf FPSCR: 00000000