[ 30.890140][ T30] audit: type=1400 audit(30.830:68): avc: denied { read write } for pid=2989 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.897073][ T30] audit: type=1400 audit(30.840:69): avc: denied { open } for pid=2989 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:20344' (ED25519) to the list of known hosts. [ 50.309584][ T30] audit: type=1400 audit(50.250:70): avc: denied { name_bind } for pid=2995 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 51.560579][ T30] audit: type=1400 audit(51.500:71): avc: denied { execute } for pid=2997 comm="sh" name="syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 51.581914][ T30] audit: type=1400 audit(51.520:72): avc: denied { execute_no_trans } for pid=2997 comm="sh" path="/syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:00:53 fuzzer started [ 55.953588][ T30] audit: type=1400 audit(55.890:73): avc: denied { node_bind } for pid=2997 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 1970/01/01 00:00:55 dialing manager at localhost:30000 [ 55.976664][ T30] audit: type=1400 audit(55.920:74): avc: denied { name_bind } for pid=2997 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 56.180034][ T30] audit: type=1400 audit(56.120:75): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 56.181892][ T30] audit: type=1400 audit(56.120:76): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 56.190004][ T3004] cgroup: Unknown subsys name 'net' [ 56.197995][ T30] audit: type=1400 audit(56.140:77): avc: denied { unmount } for pid=3004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 56.379219][ T3004] cgroup: Unknown subsys name 'hugetlb' [ 56.380331][ T3004] cgroup: Unknown subsys name 'rlimit' [ 56.602901][ T30] audit: type=1400 audit(56.540:78): avc: denied { mounton } for pid=3004 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 56.603984][ T30] audit: type=1400 audit(56.540:79): avc: denied { mount } for pid=3004 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 56.607523][ T30] audit: type=1400 audit(56.550:80): avc: denied { setattr } for pid=3004 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.708377][ T3005] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 56.713449][ T30] audit: type=1400 audit(56.650:81): avc: denied { relabelto } for pid=3005 comm="mkswap" name="swap-file" dev="vda" ino=685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 56.714627][ T30] audit: type=1400 audit(56.650:82): avc: denied { write } for pid=3005 comm="mkswap" path="/swap-file" dev="vda" ino=685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 60.785575][ T3004] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:01:00 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:01:00 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:01:00 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:01:00 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:01:00 setuid sandbox: enabled 1970/01/01 00:01:00 namespace sandbox: enabled 1970/01/01 00:01:00 Android sandbox: enabled 1970/01/01 00:01:00 fault injection: enabled 1970/01/01 00:01:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:01:00 net packet injection: enabled 1970/01/01 00:01:00 net device setup: enabled 1970/01/01 00:01:00 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:01:00 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:01:00 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:01:00 USB emulation: enabled 1970/01/01 00:01:00 hci packet injection: /dev/vhci does not exist 1970/01/01 00:01:00 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:01:00 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:01:00 swap file: enabled 1970/01/01 00:01:01 starting 2 executor processes [ 61.525630][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 61.525709][ T30] audit: type=1400 audit(61.460:85): avc: denied { execmem } for pid=3007 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 61.555334][ T30] audit: type=1400 audit(61.490:86): avc: denied { mounton } for pid=3009 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 61.575578][ T30] audit: type=1400 audit(61.510:87): avc: denied { mount } for pid=3009 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 61.576676][ T30] audit: type=1400 audit(61.510:88): avc: denied { read } for pid=3009 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.577488][ T30] audit: type=1400 audit(61.510:89): avc: denied { open } for pid=3009 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.578188][ T30] audit: type=1400 audit(61.510:90): avc: denied { mounton } for pid=3009 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 61.609816][ T30] audit: type=1400 audit(61.550:91): avc: denied { module_request } for pid=3009 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 61.676420][ T30] audit: type=1400 audit(61.620:92): avc: denied { sys_module } for pid=3009 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 62.088363][ T30] audit: type=1400 audit(62.030:93): avc: denied { ioctl } for pid=3010 comm="syz-executor.1" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.852511][ T3010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.878882][ T3009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.882650][ T3010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.908010][ T3009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.370451][ T3009] hsr_slave_0: entered promiscuous mode [ 63.372716][ T3009] hsr_slave_1: entered promiscuous mode [ 63.534950][ T30] audit: type=1400 audit(63.470:94): avc: denied { create } for pid=3009 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.557718][ T3009] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 63.587993][ T3009] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 63.597571][ T3010] hsr_slave_0: entered promiscuous mode [ 63.601203][ T3010] hsr_slave_1: entered promiscuous mode [ 63.603194][ T3010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.603618][ T3010] Cannot create hsr debugfs directory [ 63.604467][ T3009] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 63.610550][ T3009] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 63.894087][ T3010] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 63.898998][ T3010] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 63.902726][ T3010] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 63.906993][ T3010] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 63.956455][ T3009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.228466][ T3010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.199157][ T3009] veth0_vlan: entered promiscuous mode [ 65.206334][ T3009] veth1_vlan: entered promiscuous mode [ 65.231696][ T3009] veth0_macvtap: entered promiscuous mode [ 65.238772][ T3009] veth1_macvtap: entered promiscuous mode [ 65.266171][ T3009] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.266579][ T3009] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.266779][ T3009] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.266957][ T3009] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000000000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0xffffffffffff8000, 0x0) close(r4) close(r2) socket(0x400000000000010, 0x802, 0x0) splice(r0, 0x0, r2, 0x0, 0x1100000000f336, 0x0) [ 65.598324][ T3010] veth0_vlan: entered promiscuous mode [ 65.611712][ T3010] veth1_vlan: entered promiscuous mode [ 65.633156][ T3010] veth0_macvtap: entered promiscuous mode [ 65.637701][ T3010] veth1_macvtap: entered promiscuous mode [ 65.657451][ T3010] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.657809][ T3010] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.657998][ T3010] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.658221][ T3010] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: capset(0x0, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r1, 0x400000001ffffffd) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[], 0x11c}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000001c00)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000001bc0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) socket$packet(0x11, 0x3, 0x300) write$binfmt_misc(r0, &(0x7f0000001b40)=ANY=[], 0x3a7) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmmsg$inet(r0, &(0x7f0000003c40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)='=', 0x1}], 0x1}}], 0x1, 0x12000881) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x97}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe80, 0xe80, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) executing program 1: r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)="7800000018002505b9409b14ffff00bc02f5f82e625947130e9fd20c5e5148b314be04fe03f2562d1f0000ff670009003f8024031000eb000f0085a10cff395244030000000000000200000000e000e218d1ddf6f773b8a422060c19bdaacc9387f2766ed538f2523250ae6e3353732c18784fe47c32a4b9", 0x78, 0x0, 0x0, 0x0) [ 66.393584][ T3707] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge0\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) [ 66.999287][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 66.999490][ T30] audit: type=1400 audit(66.940:108): avc: denied { setopt } for pid=3708 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 67.002747][ T30] audit: type=1400 audit(66.940:109): avc: denied { write } for pid=3708 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a34, 0x802, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x0, "d32052f2"}]}}, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGFEATURE(r1, 0xc040480c, 0x0) [ 67.517673][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 67.908584][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 67.912161][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 67.913755][ T23] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 67.936414][ T23] usb 2-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 67.937060][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 67.949236][ T23] usb 2-1: config 0 descriptor?? executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket(0x10, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=@newqdisc={0x6c, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x200}}, @qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x0, 0x0, 0x0, 0x0, 0xfffffffb}, [@TCA_NETEM_CORRUPT={0xc, 0x4, {0xfff}}]}}}]}, 0x6c}}, 0x0) [ 68.462953][ T23] acrux 0003:1A34:0802.0001: hidraw0: USB HID v0.00 Device [HID 1a34:0802] on usb-dummy_hcd.1-1/input0 [ 68.464034][ T23] acrux 0003:1A34:0802.0001: no inputs found [ 68.464228][ T23] acrux 0003:1A34:0802.0001: Failed to enable force feedback support, error: -19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 68.588518][ T30] audit: type=1400 audit(68.530:110): avc: denied { create } for pid=3723 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 68.593290][ T3727] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 68.623364][ T30] audit: type=1400 audit(68.560:111): avc: denied { getopt } for pid=3723 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 68.649272][ T7] usb 2-1: USB disconnect, device number 2 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x3, &(0x7f0000000500)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001402000008001600c053000018000180140002006e657464657673696d300000000000000800170000000000080015"], 0x44}}, 0x0) executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) socket$inet6(0xa, 0x80002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x2a, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/oops_count', 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x101a02, 0x0) sendfile(r3, r2, 0x0, 0x6) [ 69.517251][ T30] audit: type=1400 audit(69.460:112): avc: denied { map_create } for pid=3740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a34, 0x802, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x0, "d32052f2"}]}}, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGFEATURE(r1, 0xc040480b, 0x0) executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={@cgroup, r0, 0xb, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) executing program 1: r0 = socket(0x11, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1007, 0x0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000100)={@local, @remote, @val, {@ipv4}}, 0x0) [ 70.598259][ T46] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 70.684773][ T30] audit: type=1400 audit(70.620:113): avc: denied { getopt } for pid=3751 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) [ 70.976353][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 70.989464][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 70.989935][ T46] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 70.990328][ T46] usb 1-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 70.990529][ T46] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003040), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000003400)={0x0, 0x0, &(0x7f00000033c0)={&(0x7f0000003080)={0x20, r1, 0x505, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) [ 70.997962][ T46] usb 1-1: config 0 descriptor?? [ 71.565959][ T46] acrux 0003:1A34:0802.0002: hidraw0: USB HID v0.00 Device [HID 1a34:0802] on usb-dummy_hcd.0-1/input0 [ 71.567710][ T46] acrux 0003:1A34:0802.0002: no inputs found [ 71.569292][ T46] acrux 0003:1A34:0802.0002: Failed to enable force feedback support, error: -19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000a80)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x208810, &(0x7f0000000b00), 0x1, 0x641, &(0x7f0000000b40)="$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") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x113, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xf, 0xff}, [@RTA_NH_ID={0x8, 0x1e, 0x7}]}, 0x24}}, 0x0) [ 71.753399][ T46] usb 1-1: USB disconnect, device number 2 [ 72.095614][ T3777] loop1: detected capacity change from 0 to 1024 [ 72.112336][ T3777] EXT4-fs (loop1): Can't support bigalloc feature without extents feature [ 72.112336][ T3777] [ 72.114430][ T3777] EXT4-fs (loop1): couldn't mount as ext3 due to feature incompatibilities executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffffffffffff, 0x9, 0x10}, 0xc) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xf, 0x3ce, &(0x7f00000007c0)="9f44948721919580684010a40800", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) [ 72.527684][ T30] audit: type=1400 audit(72.470:114): avc: denied { map_read map_write } for pid=3780 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1c, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000001509010000000000b50000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000a36c00850000001700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000dc0)='>', 0x1}], 0x1}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/199, 0xc7}], 0x1}, 0x102) executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) close(r0) [ 73.393654][ T3786] 8<--- cut here --- [ 73.394129][ T3786] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [ 73.394515][ T3786] [00000000] *pgd=8505e003, *pmd=fee5e003 [ 73.396725][ T3786] Internal error: Oops: 207 [#1] PREEMPT SMP ARM [ 73.397568][ T3786] Modules linked in: [ 73.398269][ T3786] CPU: 1 PID: 3786 Comm: syz-executor.1 Not tainted 6.9.0-rc4-syzkaller #0 [ 73.398543][ T3786] Hardware name: ARM-Versatile Express [ 73.398768][ T3786] PC is at __kmap_local_page_prot+0xc/0x74 [ 73.399505][ T3786] LR is at copy_page_to_iter+0xf8/0x184 [ 73.399640][ T3786] pc : [<80479ea8>] lr : [<807e997c>] psr: 60000013 [ 73.399912][ T3786] sp : e0845ca0 ip : e0845cb0 fp : e0845cac [ 73.400173][ T3786] r10: 00000018 r9 : 8285a4e8 r8 : 00000000 [ 73.400489][ T3786] r7 : 00000000 r6 : 00000000 r5 : 00000000 r4 : 84f43000 [ 73.403151][ T3786] r3 : 00c00000 r2 : 0000071f r1 : 00000000 r0 : 00000000 [ 73.405404][ T3786] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 73.405746][ T3786] Control: 30c5387d Table: 85029400 DAC: 00000000 [ 73.405932][ T3786] Register r0 information: NULL pointer [ 73.406400][ T3786] Register r1 information: NULL pointer [ 73.406572][ T3786] Register r2 information: non-paged memory [ 73.406728][ T3786] Register r3 information: non-paged memory [ 73.406938][ T3786] Register r4 information: slab kmalloc-1k start 84f43000 pointer offset 0 size 1024 [ 73.407559][ T3786] Register r5 information: NULL pointer [ 73.407790][ T3786] Register r6 information: NULL pointer [ 73.407957][ T3786] Register r7 information: NULL pointer [ 73.408133][ T3786] Register r8 information: NULL pointer [ 73.408304][ T3786] Register r9 information: non-slab/vmalloc memory [ 73.408532][ T3786] Register r10 information: non-paged memory [ 73.408787][ T3786] Register r11 information: 2-page vmalloc region starting at 0xe0844000 allocated at kernel_clone+0xac/0x3cc [ 73.409395][ T3786] Register r12 information: 2-page vmalloc region starting at 0xe0844000 allocated at kernel_clone+0xac/0x3cc [ 73.409707][ T3786] Process syz-executor.1 (pid: 3786, stack limit = 0xe0844000) [ 73.410130][ T3786] Stack: (0xe0845ca0 to 0xe0846000) [ 73.410443][ T3786] 5ca0: e0845ce4 e0845cb0 807e997c 80479ea8 e0845cd4 e0845f48 8024c880 84f43000 [ 73.410636][ T3786] 5cc0: 84f43000 00000000 00000001 00000000 000000c7 00000018 e0845d34 e0845ce8 [ 73.410956][ T3786] 5ce0: 814333f4 807e9890 84ba6100 84972800 84972800 849728d0 84ba6100 849728d8 [ 73.411176][ T3786] 5d00: e0845f48 00000002 00000000 84ba6100 000000c7 84972800 84bdc800 00000000 [ 73.411339][ T3786] 5d20: 00000102 00000000 e0845da4 e0845d38 816560a8 81433310 00000102 00000000 [ 73.411562][ T3786] 5d40: 00000000 00000000 00000000 00000000 84ba6188 849728ec 84ba6334 e0845f38 [ 73.411728][ T3786] 5d60: 00000000 6c6e633d 818c33d0 821a9848 00000102 6c6e633d e0845f38 81655f58 [ 73.411899][ T3786] 5d80: e0845f38 8441d900 00000102 00000000 00000102 e0845df4 e0845dc4 e0845da8 [ 73.412195][ T3786] 5da0: 81655124 81655f64 00000000 00000102 00000000 816550ec e0845de4 e0845dc8 [ 73.412472][ T3786] 5dc0: 813a29d4 816550f8 e0845f38 8441d900 200004c0 00000000 e0845ea4 e0845de8 [ 73.412637][ T3786] 5de0: 813a2bd4 813a2990 00000000 00000000 00000001 00000000 00000000 00000000 [ 73.412809][ T3786] 5e00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.412970][ T3786] 5e20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.413150][ T3786] 5e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.413349][ T3786] 5e60: 00000000 00000000 00000000 00000000 00000000 6c6e633d 00000000 00000000 [ 73.413554][ T3786] 5e80: e0845f38 200004c0 00000102 8441d900 84bdc800 00000129 e0845f24 e0845ea8 [ 73.413719][ T3786] 5ea0: 813a5b18 813a2b50 00000102 00000000 00000008 00000000 00000000 200002c0 [ 73.413890][ T3786] 5ec0: 000000c7 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.414056][ T3786] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 6c6e633d [ 73.414241][ T3786] 5f00: e0845f24 8441d900 00000000 200004c0 00000102 80200288 e0845fa4 e0845f28 [ 73.414406][ T3786] 5f20: 813a6294 813a5a9c 00000000 e0845f38 00000001 fffffff7 e0845df4 00000000 [ 73.414720][ T3786] 5f40: 00000000 00000000 00000000 00000001 200002c0 000000c6 00000001 00000000 [ 73.415172][ T3786] 5f60: 00000000 00000001 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.415348][ T3786] 5f80: 8020ca6c 6c6e633d 00000000 00000000 0014c2c8 00000129 00000000 e0845fa8 [ 73.415612][ T3786] 5fa0: 80200060 813a622c 00000000 00000000 00000003 200004c0 00000102 00000000 [ 73.415783][ T3786] 5fc0: 00000000 00000000 0014c2c8 00000129 7eb3532e 7eb3532f 003d0f00 76b9e0fc [ 73.416361][ T3786] 5fe0: 76b9df08 76b9def8 00016ab0 00050bf0 60000010 00000003 00000000 00000000 [ 73.416887][ T3786] Call trace: [ 73.420895][ T3786] [<80479e9c>] (__kmap_local_page_prot) from [<807e997c>] (copy_page_to_iter+0xf8/0x184) [ 73.425230][ T3786] [<807e9884>] (copy_page_to_iter) from [<814333f4>] (sk_msg_recvmsg+0xf0/0x3cc) [ 73.425760][ T3786] r10:00000018 r9:000000c7 r8:00000000 r7:00000001 r6:00000000 r5:84f43000 [ 73.425976][ T3786] r4:84f43000 [ 73.426073][ T3786] [<81433304>] (sk_msg_recvmsg) from [<816560a8>] (unix_bpf_recvmsg+0x150/0x444) [ 73.426468][ T3786] r10:00000000 r9:00000102 r8:00000000 r7:84bdc800 r6:84972800 r5:000000c7 [ 73.426708][ T3786] r4:84ba6100 [ 73.426795][ T3786] [<81655f58>] (unix_bpf_recvmsg) from [<81655124>] (unix_dgram_recvmsg+0x38/0x4c) [ 73.427079][ T3786] r10:e0845df4 r9:00000102 r8:00000000 r7:00000102 r6:8441d900 r5:e0845f38 [ 73.427318][ T3786] r4:81655f58 [ 73.427463][ T3786] [<816550ec>] (unix_dgram_recvmsg) from [<813a29d4>] (sock_recvmsg+0x50/0x78) [ 73.428630][ T3786] r4:816550ec [ 73.428743][ T3786] [<813a2984>] (sock_recvmsg) from [<813a2bd4>] (____sys_recvmsg+0x90/0x158) [ 73.431783][ T3786] r7:00000000 r6:200004c0 r5:8441d900 r4:e0845f38 [ 73.434094][ T3786] [<813a2b44>] (____sys_recvmsg) from [<813a5b18>] (___sys_recvmsg+0x88/0xbc) [ 73.435383][ T3786] r10:00000129 r9:84bdc800 r8:8441d900 r7:00000102 r6:200004c0 r5:e0845f38 [ 73.435655][ T3786] r4:00000000 [ 73.435772][ T3786] [<813a5a90>] (___sys_recvmsg) from [<813a6294>] (sys_recvmsg+0x74/0xb8) [ 73.436235][ T3786] r8:80200288 r7:00000102 r6:200004c0 r5:00000000 r4:8441d900 [ 73.437281][ T3786] [<813a6220>] (sys_recvmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 73.437731][ T3786] Exception stack(0xe0845fa8 to 0xe0845ff0) [ 73.438979][ T3786] 5fa0: 00000000 00000000 00000003 200004c0 00000102 00000000 [ 73.439340][ T3786] 5fc0: 00000000 00000000 0014c2c8 00000129 7eb3532e 7eb3532f 003d0f00 76b9e0fc [ 73.440686][ T3786] 5fe0: 76b9df08 76b9def8 00016ab0 00050bf0 [ 73.441066][ T3786] r7:00000129 r6:0014c2c8 r5:00000000 r4:00000000 [ 73.442471][ T3786] Code: eaffffe8 e1a0c00d e92dd800 e24cb004 (e5901000) [ 73.465831][ T3786] ---[ end trace 0000000000000000 ]--- [ 73.466350][ T3786] Kernel panic - not syncing: Fatal exception [ 73.468852][ T3786] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:15:26 Registers: info registers vcpu 0 CPU#0 R00=00000059 R01=01874bf8 R02=00000059 R03=00004000 R04=0186c1a8 R05=76fde5a0 R06=76fde5a0 R07=00000121 R08=00000000 R09=00000013 R10=76eb0e60 R11=01874bfb R12=00000000 R13=ec79dff8 R14=76e3d918 R15=76e3d918 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=76f8a21a s17=00000000 d08=0000000076f8a21a s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=e0845c50 R01=00000000 R02=00000000 R03=84bdc800 R04=e0845c50 R05=81fbbdb8 R06=00000207 R07=60000113 R08=8285a41c R09=8261ca08 R10=84bdc800 R11=e0845bb4 R12=e0845a88 R13=e0845b80 R14=8020c738 R15=80208dac PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000