last executing test programs: 12.748933012s ago: executing program 0 (id=363): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f00000000c0)) kexec_load(0x9, 0x0, 0x0, 0x0) 12.356576088s ago: executing program 0 (id=365): ftruncate(0xffffffffffffffff, 0x51a9497) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8000f28, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/200, 0xc8, 0x0) lseek(r0, 0x4, 0x1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x80) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, 0x0) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) 9.725617232s ago: executing program 0 (id=369): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000004000018007000600666f00000800080000000000060001000200000008000500000000"], 0x54}}, 0x0) 8.973597069s ago: executing program 0 (id=371): r0 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x1, 0x36, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bind$can_j1939(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x203, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}]}]}]}], {0x14}}, 0x80}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@dellink={0x20, 0x11, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 7.985317752s ago: executing program 0 (id=373): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000006c0)={0x114, r1, 0xe701ac47a3d23ecd, 0x0, 0x2, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xce, 0x1, 'C\xec\xf8\xa0w\x15|\xd8\xbcs\xe1\xb93\x14\xcd\xcb\xb6\xb9\xbb\x84\xe5\xbc\xdb\x7f\x9a\xf2\xea\xcc\x91:v@\xe83-\x1d\xaagQl\x7f\tKt\fc\x1f\x17]\xd5\xd0\xf0\xa8\xeb\xd2g\x92\x04\x02\v\x00od\xe6,\xd3@I\x17\xf3\xbees0\xad\xc6\xbf/*\xb6(o\x91t\x12\x93UK\xf4@n\xdc\xdc\x8a7y\x81FY\xbe\xbbc\xd2\xc3\x01\xa5\xe2V\x8c\xb3im~\xd2V\xdaG\xbdbF\xc8n\x86\xac\x9c\xfb\xda\xe2&\"\xb4:\x13\xe9\tc\x85\xb4\xcb\x17\xbfm\x846\xe7\x7fp\x9eCdb\xad;\xa2\x8fs\xbf6\xe8\xe3Xg3&\xe2 \xd6\n\x9d=~=\xe5\xdc\x90\a\xe7M\x9c<\x93/\xaf\x89\x06+\x96]\xb5+\xee\xff8^D*\xdb\xb8\xd8t\x80\xd4'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x114}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c80)={0x34, r1, 0x1, 0x70bd25, 0x0, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010101}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, 0x0, 0x20040880) 7.606601026s ago: executing program 0 (id=374): writev(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="9f01000083667d1040206402d14e0102030109021b000100000000090400000190f19c000905f3ed"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000840)={0x44, &(0x7f0000000340)=ANY=[@ANYBLOB="400f43"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000780)={0x2c, &(0x7f0000000580)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) 5.546494568s ago: executing program 1 (id=375): bpf$MAP_CREATE(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x7ffffcb9}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) 2.659273851s ago: executing program 1 (id=376): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', r0, &(0x7f0000000300)='./file0\x00', 0x260) 2.259702649s ago: executing program 1 (id=377): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000004fc0)={0x2c, r0, 0x10ada85e65c25349, 0x0, 0x0, {{0x67}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x4, 0x142}]}, 0x2c}}, 0x0) 1.196486637s ago: executing program 1 (id=378): r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x3}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000bb9b301f00"/28, 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x80000000000004e, 0x2, &(0x7f00000001c0)={0x0, 0x3938700}) 454.407841ms ago: executing program 1 (id=379): r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000000)) 0s ago: executing program 1 (id=380): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[], 0x58}}, 0x0) syz_io_uring_setup(0x102c0c, &(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000000)={&(0x7f00001c4000/0x3000)=nil, &(0x7f0000000000/0xc00000)=nil, 0x3000, 0x0, 0x2}) kernel console output (not intermixed with test programs): [ 48.651973][ T31] audit: type=1400 audit(48.550:68): avc: denied { read write } for pid=3105 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.704022][ T31] audit: type=1400 audit(48.610:69): avc: denied { open } for pid=3105 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:27892' (ED25519) to the list of known hosts. [ 59.806943][ T31] audit: type=1400 audit(59.700:70): avc: denied { name_bind } for pid=3106 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.410287][ T31] audit: type=1400 audit(61.310:71): avc: denied { execute } for pid=3108 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.471611][ T31] audit: type=1400 audit(61.370:72): avc: denied { execute_no_trans } for pid=3108 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.841470][ T31] audit: type=1400 audit(65.740:73): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.843790][ T31] audit: type=1400 audit(65.750:74): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.863131][ T3108] cgroup: Unknown subsys name 'net' [ 65.873758][ T31] audit: type=1400 audit(65.770:75): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.142876][ T3108] cgroup: Unknown subsys name 'cpuset' [ 66.149709][ T3108] cgroup: Unknown subsys name 'hugetlb' [ 66.151713][ T3108] cgroup: Unknown subsys name 'rlimit' [ 66.406023][ T31] audit: type=1400 audit(66.310:76): avc: denied { setattr } for pid=3108 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.407114][ T31] audit: type=1400 audit(66.310:77): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.408013][ T31] audit: type=1400 audit(66.310:78): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.673529][ T3111] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.674997][ T31] audit: type=1400 audit(66.580:79): avc: denied { relabelto } for pid=3111 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.679742][ T31] audit: type=1400 audit(66.580:80): avc: denied { write } for pid=3111 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.714442][ T31] audit: type=1400 audit(66.620:81): avc: denied { read } for pid=3108 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.715480][ T31] audit: type=1400 audit(66.620:82): avc: denied { open } for pid=3108 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.930216][ T3108] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.938226][ T31] audit: type=1400 audit(74.840:83): avc: denied { execmem } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.987768][ T31] audit: type=1400 audit(74.890:84): avc: denied { read } for pid=3114 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.988383][ T31] audit: type=1400 audit(74.890:85): avc: denied { open } for pid=3114 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.996538][ T31] audit: type=1400 audit(74.900:86): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.010399][ T31] audit: type=1400 audit(74.910:87): avc: denied { module_request } for pid=3115 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.010895][ T31] audit: type=1400 audit(74.910:88): avc: denied { module_request } for pid=3114 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.081704][ T31] audit: type=1400 audit(74.980:89): avc: denied { sys_module } for pid=3115 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.715672][ T31] audit: type=1400 audit(75.620:90): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.741942][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.746716][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.898122][ T3115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.904799][ T3115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.750150][ T3114] hsr_slave_0: entered promiscuous mode [ 77.759566][ T3114] hsr_slave_1: entered promiscuous mode [ 77.877281][ T3115] hsr_slave_0: entered promiscuous mode [ 77.878750][ T3115] hsr_slave_1: entered promiscuous mode [ 77.879525][ T3115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.879910][ T3115] Cannot create hsr debugfs directory [ 78.275846][ T31] audit: type=1400 audit(78.170:91): avc: denied { create } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.282233][ T3114] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.300252][ T31] audit: type=1400 audit(78.180:92): avc: denied { write } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.319002][ T3114] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.366464][ T3114] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.382015][ T3114] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.415721][ T3115] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.427467][ T3115] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.437933][ T3115] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.448762][ T3115] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.242824][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.285129][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.011621][ T3115] veth0_vlan: entered promiscuous mode [ 82.023305][ T3115] veth1_vlan: entered promiscuous mode [ 82.092170][ T3115] veth0_macvtap: entered promiscuous mode [ 82.102763][ T3115] veth1_macvtap: entered promiscuous mode [ 82.130320][ T3114] veth0_vlan: entered promiscuous mode [ 82.158055][ T3114] veth1_vlan: entered promiscuous mode [ 82.186004][ T3115] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.188535][ T3115] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.188925][ T3115] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.189232][ T3115] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.248744][ T3114] veth0_macvtap: entered promiscuous mode [ 82.263116][ T3114] veth1_macvtap: entered promiscuous mode [ 82.310338][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 82.310441][ T31] audit: type=1400 audit(82.210:94): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.312302][ T31] audit: type=1400 audit(82.210:95): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.sMJmcn/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.320452][ T31] audit: type=1400 audit(82.220:96): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.338637][ T31] audit: type=1400 audit(82.240:97): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.sMJmcn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.339898][ T31] audit: type=1400 audit(82.240:98): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.sMJmcn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.358783][ T31] audit: type=1400 audit(82.260:99): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.363528][ T31] audit: type=1400 audit(82.260:100): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.365823][ T31] audit: type=1400 audit(82.270:101): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.371868][ T31] audit: type=1400 audit(82.270:102): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.372757][ T31] audit: type=1400 audit(82.270:103): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 82.399046][ T3114] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.399599][ T3114] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.399936][ T3114] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.400256][ T3114] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.447571][ T3115] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.210392][ T3801] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 90.056057][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 90.056159][ T31] audit: type=1400 audit(89.960:149): avc: denied { ioctl } for pid=3876 comm="syz.0.33" path="socket:[3082]" dev="sockfs" ino=3082 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.830382][ T31] audit: type=1400 audit(90.730:150): avc: denied { mounton } for pid=3904 comm="syz.1.43" path="/12/file0" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 91.361361][ T31] audit: type=1400 audit(91.260:151): avc: denied { mounton } for pid=3904 comm="syz.1.43" path="/12/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 93.315824][ T31] audit: type=1400 audit(93.220:152): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 93.781165][ T31] audit: type=1400 audit(93.680:153): avc: denied { ioctl } for pid=3925 comm="syz.1.49" path="socket:[3165]" dev="sockfs" ino=3165 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 94.227044][ T31] audit: type=1400 audit(94.130:154): avc: denied { read } for pid=3933 comm="syz.1.52" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 94.229765][ T31] audit: type=1400 audit(94.130:155): avc: denied { open } for pid=3933 comm="syz.1.52" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 96.193392][ T31] audit: type=1400 audit(96.100:156): avc: denied { create } for pid=3967 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 96.322892][ T31] audit: type=1400 audit(96.230:157): avc: denied { create } for pid=3970 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 96.329579][ T31] audit: type=1400 audit(96.230:158): avc: denied { write } for pid=3970 comm="syz.0.66" name="pfkey" dev="proc" ino=4026532728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 97.297025][ T31] audit: type=1400 audit(97.200:159): avc: denied { create } for pid=3985 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 97.839256][ T31] audit: type=1400 audit(97.740:160): avc: denied { ioctl } for pid=3997 comm="syz.1.77" path="socket:[2693]" dev="sockfs" ino=2693 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 98.060415][ T31] audit: type=1400 audit(97.960:161): avc: denied { write } for pid=3997 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 98.065688][ T31] audit: type=1400 audit(97.960:162): avc: denied { read } for pid=3997 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 98.570706][ T31] audit: type=1400 audit(98.470:163): avc: denied { setopt } for pid=3997 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.514569][ T31] audit: type=1400 audit(99.420:164): avc: denied { write } for pid=4018 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 99.535561][ T31] audit: type=1400 audit(99.440:165): avc: denied { getopt } for pid=4018 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.450347][ T4039] syz.1.88 uses obsolete (PF_INET,SOCK_PACKET) [ 101.453774][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 101.453868][ T31] audit: type=1400 audit(101.360:170): avc: denied { create } for pid=4027 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 101.457234][ T31] audit: type=1400 audit(101.360:171): avc: denied { write } for pid=4027 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 105.377883][ T4063] fuse: Unknown parameter '' [ 107.236112][ T4105] random: crng reseeded on system resumption [ 107.263263][ T31] audit: type=1400 audit(107.170:172): avc: denied { prog_load } for pid=4104 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.264453][ T31] audit: type=1400 audit(107.170:173): avc: denied { bpf } for pid=4104 comm="syz.1.121" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 107.285895][ T31] audit: type=1400 audit(107.190:174): avc: denied { prog_run } for pid=4104 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 109.573315][ T31] audit: type=1400 audit(109.480:175): avc: denied { setopt } for pid=4114 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.242649][ T31] audit: type=1400 audit(116.140:176): avc: denied { ioctl } for pid=4134 comm="syz.1.135" path="socket:[3458]" dev="sockfs" ino=3458 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.905414][ T31] audit: type=1400 audit(117.810:177): avc: denied { getopt } for pid=4139 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 118.684607][ T4165] Zero length message leads to an empty skb [ 118.727331][ T31] audit: type=1400 audit(118.620:178): avc: denied { setattr } for pid=4158 comm="syz.1.144" name="NETLINK" dev="sockfs" ino=3007 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 118.728357][ T31] audit: type=1400 audit(118.620:179): avc: denied { write } for pid=4158 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 118.814191][ T31] audit: type=1400 audit(118.720:180): avc: denied { ioctl } for pid=4166 comm="syz.0.147" path="socket:[3019]" dev="sockfs" ino=3019 ioctlcmd=0x9414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 118.818319][ T31] audit: type=1400 audit(118.720:181): avc: denied { getopt } for pid=4166 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 118.820492][ T31] audit: type=1400 audit(118.720:182): avc: denied { setopt } for pid=4166 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 119.020152][ T31] audit: type=1400 audit(118.920:183): avc: denied { ioctl } for pid=4172 comm="syz.0.150" path="socket:[3521]" dev="sockfs" ino=3521 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 119.472575][ T717] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 119.567445][ T31] audit: type=1400 audit(119.470:184): avc: denied { lock } for pid=4172 comm="syz.0.150" path="socket:[3522]" dev="sockfs" ino=3522 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 119.621852][ T717] usb 2-1: Using ep0 maxpacket: 16 [ 119.628357][ T717] usb 2-1: config 0 has no interfaces? [ 119.629011][ T717] usb 2-1: New USB device found, idVendor=0158, idProduct=0100, bcdDevice= 0.00 [ 119.629678][ T717] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 119.633734][ T717] usb 2-1: config 0 descriptor?? [ 119.876922][ T4177] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 119.882206][ T4177] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 119.889508][ T9] usb 2-1: USB disconnect, device number 2 [ 123.853572][ T31] audit: type=1400 audit(123.760:185): avc: denied { audit_write } for pid=4232 comm="syz.1.171" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 124.144820][ T31] audit: type=1400 audit(124.050:186): avc: denied { read } for pid=4238 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 124.150128][ T31] audit: type=1400 audit(124.050:187): avc: denied { ioctl } for pid=4238 comm="syz.1.174" path="socket:[4133]" dev="sockfs" ino=4133 ioctlcmd=0xaa01 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 124.656031][ T31] audit: type=1400 audit(124.560:188): avc: denied { shutdown } for pid=4248 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 124.673290][ T31] audit: type=1400 audit(124.580:189): avc: denied { map } for pid=4248 comm="syz.1.179" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4166 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.684571][ T31] audit: type=1400 audit(124.580:190): avc: denied { read write } for pid=4248 comm="syz.1.179" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4166 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 127.815428][ T31] audit: type=1400 audit(127.720:191): avc: denied { ioctl } for pid=4276 comm="syz.0.188" path="socket:[3679]" dev="sockfs" ino=3679 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.817590][ T31] audit: type=1400 audit(127.720:192): avc: denied { ioctl } for pid=4276 comm="syz.0.188" path="socket:[3678]" dev="sockfs" ino=3678 ioctlcmd=0x5203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 127.822760][ T4277] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4277 comm=syz.0.188 [ 127.833972][ T4277] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4277 comm=syz.0.188 [ 131.636913][ T31] audit: type=1400 audit(131.540:193): avc: denied { create } for pid=4301 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 132.465931][ T31] audit: type=1400 audit(132.370:194): avc: denied { write } for pid=4304 comm="syz.1.197" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 135.364503][ T31] audit: type=1400 audit(135.270:195): avc: denied { write } for pid=4311 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 135.886940][ T4324] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4324 comm=syz.1.203 [ 136.905526][ T4338] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 136.933349][ T31] audit: type=1400 audit(136.830:196): avc: denied { connect } for pid=4337 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.969012][ T31] audit: type=1400 audit(136.870:197): avc: denied { getopt } for pid=4337 comm="syz.0.208" laddr=::1 lport=57693 faddr=::1 fport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.682820][ T4350] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=515 sclass=netlink_tcpdiag_socket pid=4350 comm=syz.1.213 [ 140.499440][ T31] audit: type=1400 audit(140.400:198): avc: denied { create } for pid=4351 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.957884][ T4400] FAULT_INJECTION: forcing a failure. [ 147.957884][ T4400] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 147.959662][ T4400] CPU: 0 UID: 0 PID: 4400 Comm: syz.0.230 Not tainted 6.12.0-rc2-syzkaller #0 [ 147.960197][ T4400] Hardware name: ARM-Versatile Express [ 147.961065][ T4400] Call trace: [ 147.962326][ T4400] [<819991f8>] (dump_backtrace) from [<819992f4>] (show_stack+0x18/0x1c) [ 147.964236][ T4400] r7:200003c0 r6:e004de30 r5:60000013 r4:8203d408 [ 147.964703][ T4400] [<819992dc>] (show_stack) from [<819b77a0>] (dump_stack_lvl+0x70/0x7c) [ 147.965169][ T4400] [<819b7730>] (dump_stack_lvl) from [<819b77c4>] (dump_stack+0x18/0x1c) [ 147.965593][ T4400] r5:00000000 r4:8274e844 [ 147.965900][ T4400] [<819b77ac>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 147.966434][ T4400] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 147.967001][ T4400] r6:e004de30 r5:00000000 r4:e004df38 [ 147.967349][ T4400] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 147.968549][ T4400] [<808e54f4>] (should_fail_usercopy) from [<81486638>] (copy_msghdr_from_user+0x50/0x130) [ 147.969324][ T4400] [<814865e8>] (copy_msghdr_from_user) from [<81486790>] (___sys_sendmsg+0x78/0xd0) [ 147.969745][ T4400] r8:00000010 r7:00000000 r6:833e1400 r5:e004df38 r4:e004de74 [ 147.970151][ T4400] [<81486718>] (___sys_sendmsg) from [<81486ccc>] (sys_sendmsg+0x78/0xbc) [ 147.970665][ T4400] r10:00000128 r9:84115400 r8:8020029c r7:00000010 r6:200003c0 r5:833e1400 [ 147.971763][ T4400] r4:00000000 [ 147.972283][ T4400] [<81486c54>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 147.974014][ T4400] Exception stack(0xe004dfa8 to 0xe004dff0) [ 147.975370][ T4400] dfa0: 00000000 00000000 00000004 200003c0 00000010 00000000 [ 147.976237][ T4400] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76bcc0bc [ 147.976668][ T4400] dfe0: 76bcbec0 76bcbeb0 00018af8 00132ec0 [ 147.977005][ T4400] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 153.504826][ T31] audit: type=1400 audit(153.410:199): avc: denied { ioctl } for pid=4419 comm="syz.0.238" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4449 ioctlcmd=0xaa07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 153.722191][ T31] audit: type=1400 audit(153.620:200): avc: denied { append } for pid=4423 comm="syz.0.240" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 156.501883][ T31] audit: type=1400 audit(156.400:201): avc: denied { write } for pid=4405 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 157.481423][ T31] audit: type=1400 audit(157.380:202): avc: denied { ioctl } for pid=4456 comm="syz.0.249" path="socket:[3970]" dev="sockfs" ino=3970 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 158.590539][ T31] audit: type=1400 audit(158.490:203): avc: denied { setopt } for pid=4474 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 158.714690][ T31] audit: type=1400 audit(158.620:204): avc: denied { create } for pid=4476 comm="syz.1.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 161.153909][ T31] audit: type=1400 audit(161.060:205): avc: denied { name_bind } for pid=4485 comm="syz.0.259" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 161.155853][ T31] audit: type=1400 audit(161.060:206): avc: denied { node_bind } for pid=4485 comm="syz.0.259" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 161.947668][ T4496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4496 comm=syz.1.262 [ 162.922227][ T9] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 163.071523][ T9] usb 2-1: Invalid ep0 maxpacket: 32 [ 163.212050][ T9] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 163.361692][ T9] usb 2-1: Invalid ep0 maxpacket: 32 [ 163.362853][ T9] usb usb2-port1: attempt power cycle [ 163.701740][ T9] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 163.724402][ T9] usb 2-1: Invalid ep0 maxpacket: 32 [ 163.826670][ T31] audit: type=1400 audit(163.730:207): avc: denied { setopt } for pid=4508 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 163.862367][ T9] usb 2-1: new low-speed USB device number 6 using dummy_hcd [ 163.883984][ T9] usb 2-1: Invalid ep0 maxpacket: 32 [ 163.885475][ T9] usb usb2-port1: unable to enumerate USB device [ 167.902176][ T31] audit: type=1400 audit(167.800:208): avc: denied { create } for pid=4535 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 167.905160][ T31] audit: type=1400 audit(167.810:209): avc: denied { write } for pid=4535 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 168.086675][ T31] audit: type=1400 audit(167.990:210): avc: denied { setattr } for pid=4539 comm="syz.0.275" name="[io_uring]" dev="anon_inodefs" ino=4092 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 168.123055][ T31] audit: type=1400 audit(168.030:211): avc: denied { read } for pid=4539 comm="syz.0.275" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 168.146554][ T4540] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 168.390281][ T31] audit: type=1400 audit(168.290:212): avc: denied { connect } for pid=4543 comm="syz.0.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 172.361643][ T46] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 172.511578][ T46] usb 1-1: Invalid ep0 maxpacket: 64 [ 172.641724][ T46] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 172.813121][ T46] usb 1-1: Invalid ep0 maxpacket: 64 [ 172.814081][ T46] usb usb1-port1: attempt power cycle [ 173.171758][ T46] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 173.204197][ T46] usb 1-1: Invalid ep0 maxpacket: 64 [ 173.332201][ T46] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 173.356049][ T46] usb 1-1: Invalid ep0 maxpacket: 64 [ 173.358805][ T46] usb usb1-port1: unable to enumerate USB device [ 173.875127][ T31] audit: type=1400 audit(173.780:213): avc: denied { create } for pid=4587 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 173.877631][ T31] audit: type=1400 audit(173.780:214): avc: denied { write } for pid=4587 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 174.632079][ T31] audit: type=1400 audit(174.540:215): avc: denied { getopt } for pid=4599 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 175.660051][ T31] audit: type=1400 audit(175.560:216): avc: denied { listen } for pid=4624 comm="syz.1.303" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 179.806160][ T4639] FAULT_INJECTION: forcing a failure. [ 179.806160][ T4639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.806972][ T4639] CPU: 1 UID: 0 PID: 4639 Comm: syz.1.308 Not tainted 6.12.0-rc2-syzkaller #0 [ 179.807329][ T4639] Hardware name: ARM-Versatile Express [ 179.807577][ T4639] Call trace: [ 179.807802][ T4639] [<819991f8>] (dump_backtrace) from [<819992f4>] (show_stack+0x18/0x1c) [ 179.808220][ T4639] r7:00000000 r6:00000000 r5:60000013 r4:8203d408 [ 179.808486][ T4639] [<819992dc>] (show_stack) from [<819b77a0>] (dump_stack_lvl+0x70/0x7c) [ 179.808766][ T4639] [<819b7730>] (dump_stack_lvl) from [<819b77c4>] (dump_stack+0x18/0x1c) [ 179.808988][ T4639] r5:00000000 r4:8274e844 [ 179.809081][ T4639] [<819b77ac>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 179.809269][ T4639] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 179.809464][ T4639] r6:00000000 r5:e8929f68 r4:00000002 [ 179.809612][ T4639] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 179.809838][ T4639] [<808e54f4>] (should_fail_usercopy) from [<8054e70c>] (simple_read_from_buffer+0x8c/0x134) [ 179.810078][ T4639] [<8054e680>] (simple_read_from_buffer) from [<805c320c>] (proc_fail_nth_read+0xb8/0x100) [ 179.810338][ T4639] r10:00000001 r9:805c3154 r8:00000002 r7:e8929f68 r6:0000000f r5:76b34f30 [ 179.810543][ T4639] r4:846e9800 r3:e8929e9f [ 179.810675][ T4639] [<805c3154>] (proc_fail_nth_read) from [<80515e6c>] (vfs_read+0x98/0x324) [ 179.811117][ T4639] r8:76b34f30 r7:e8929f68 r6:846e9800 r5:0000000f r4:845e5e40 [ 179.811397][ T4639] [<80515dd4>] (vfs_read) from [<80516b1c>] (ksys_read+0x78/0xf8) [ 179.811791][ T4639] r10:00000003 r9:846e9800 r8:8020029c r7:00000000 r6:00000000 r5:845e5e40 [ 179.812100][ T4639] r4:845e5e43 [ 179.812212][ T4639] [<80516aa4>] (ksys_read) from [<80516bac>] (sys_read+0x10/0x14) [ 179.812419][ T4639] r7:00000003 r6:00000004 r5:76b34f30 r4:0000000f [ 179.812644][ T4639] [<80516b9c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 179.812893][ T4639] Exception stack(0xe8929fa8 to 0xe8929ff0) [ 179.813050][ T4639] 9fa0: 0000000f 76b34f30 00000004 76b34f30 0000000f 00000000 [ 179.813263][ T4639] 9fc0: 0000000f 76b34f30 00000004 00000003 00000000 00006364 003d0f00 76b350bc [ 179.813466][ T4639] 9fe0: 00000158 76b34ed0 000d8408 00130d94 [ 181.766844][ T4648] FAULT_INJECTION: forcing a failure. [ 181.766844][ T4648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.767530][ T4648] CPU: 1 UID: 0 PID: 4648 Comm: syz.1.311 Not tainted 6.12.0-rc2-syzkaller #0 [ 181.767873][ T4648] Hardware name: ARM-Versatile Express [ 181.768108][ T4648] Call trace: [ 181.768327][ T4648] [<819991f8>] (dump_backtrace) from [<819992f4>] (show_stack+0x18/0x1c) [ 181.768748][ T4648] r7:200003c0 r6:ea99de30 r5:60000013 r4:8203d408 [ 181.769023][ T4648] [<819992dc>] (show_stack) from [<819b77a0>] (dump_stack_lvl+0x70/0x7c) [ 181.769360][ T4648] [<819b7730>] (dump_stack_lvl) from [<819b77c4>] (dump_stack+0x18/0x1c) [ 181.769700][ T4648] r5:00000000 r4:8274e844 [ 181.769924][ T4648] [<819b77ac>] (dump_stack) from [<808e548c>] (should_fail_ex+0x18c/0x1dc) [ 181.770261][ T4648] [<808e5300>] (should_fail_ex) from [<808e54f0>] (should_fail+0x14/0x18) [ 181.770588][ T4648] r6:ea99de30 r5:00000000 r4:ea99df38 [ 181.770981][ T4648] [<808e54dc>] (should_fail) from [<808e5510>] (should_fail_usercopy+0x1c/0x20) [ 181.771706][ T4648] [<808e54f4>] (should_fail_usercopy) from [<81486638>] (copy_msghdr_from_user+0x50/0x130) [ 181.772431][ T4648] [<814865e8>] (copy_msghdr_from_user) from [<81486790>] (___sys_sendmsg+0x78/0xd0) [ 181.772964][ T4648] r8:00004000 r7:00000000 r6:833e1400 r5:ea99df38 r4:ea99de74 [ 181.773288][ T4648] [<81486718>] (___sys_sendmsg) from [<81486ccc>] (sys_sendmsg+0x78/0xbc) [ 181.773932][ T4648] r10:00000128 r9:84110c00 r8:8020029c r7:00004000 r6:200003c0 r5:833e1400 [ 181.774411][ T4648] r4:00000000 [ 181.774606][ T4648] [<81486c54>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 181.774995][ T4648] Exception stack(0xea99dfa8 to 0xea99dff0) [ 181.775321][ T4648] dfa0: 00000000 00000000 00000003 200003c0 00004000 00000000 [ 181.776220][ T4648] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b140bc [ 181.777032][ T4648] dfe0: 76b13ec0 76b13eb0 00018af8 00132ec0 [ 181.777492][ T4648] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 183.741943][ T31] audit: type=1400 audit(183.640:217): avc: denied { write } for pid=4668 comm="syz.0.319" path="socket:[4817]" dev="sockfs" ino=4817 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 183.875600][ T31] audit: type=1400 audit(183.780:218): avc: denied { ioctl } for pid=4671 comm="syz.1.320" path="socket:[5290]" dev="sockfs" ino=5290 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 183.879751][ T4672] fuse: Unknown parameter 'ÿÿ017777777777777777777770xffffffffffffffff00000000000000000000004ÿÿ' [ 185.716983][ T4695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4695 comm=syz.0.326 [ 186.222152][ T9] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 186.392643][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 186.417485][ T9] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 186.418233][ T9] usb 1-1: New USB device found, idVendor=05ac, idProduct=0244, bcdDevice= 0.00 [ 186.418672][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 186.427474][ T9] usb 1-1: config 0 descriptor?? [ 186.444548][ T9] input: bcm5974 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input3 [ 186.613491][ T4713] netlink: 8 bytes leftover after parsing attributes in process `syz.1.330'. [ 187.012259][ T3091] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 187.182086][ T3091] usb 2-1: Using ep0 maxpacket: 32 [ 187.211467][ T3091] usb 2-1: config index 0 descriptor too short (expected 29220, got 36) [ 187.212826][ T3091] usb 2-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 187.213715][ T3091] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 187.215058][ T3091] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 187.216128][ T3091] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 187.217598][ T3091] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 187.218656][ T3091] usb 2-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 187.219138][ T3091] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 187.230171][ T3091] usb 2-1: config 0 descriptor?? [ 187.479067][ T3091] usblp 2-1:0.0: usblp0: USB Bidirectional printer dev 7 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 187.681495][ T9] usb 2-1: USB disconnect, device number 7 [ 187.688169][ T9] usblp0: removed [ 188.578673][ T31] audit: type=1400 audit(188.480:219): avc: denied { block_suspend } for pid=4743 comm="syz.1.335" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 190.579638][ C0] hrtimer: interrupt took 594352 ns [ 191.693020][ T4701] bcm5974 1-1:0.0: could not read from device [ 191.777370][ T9] usb 1-1: USB disconnect, device number 6 [ 192.781715][ T31] audit: type=1400 audit(192.680:220): avc: denied { mount } for pid=4766 comm="syz.1.339" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 192.933518][ T31] audit: type=1400 audit(192.840:221): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 193.581655][ T31] audit: type=1400 audit(193.480:222): avc: denied { ioctl } for pid=4768 comm="syz.1.340" path="socket:[5380]" dev="sockfs" ino=5380 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 196.921971][ T31] audit: type=1400 audit(196.820:223): avc: denied { connect } for pid=4803 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 196.924805][ T31] audit: type=1400 audit(196.830:224): avc: denied { setopt } for pid=4803 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 196.941836][ T31] audit: type=1400 audit(196.840:225): avc: denied { bind } for pid=4803 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 196.957319][ T31] audit: type=1400 audit(196.860:226): avc: denied { write } for pid=4803 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 197.266013][ T31] audit: type=1400 audit(197.170:227): avc: denied { lock } for pid=4805 comm="syz.0.346" path="socket:[5439]" dev="sockfs" ino=5439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 197.821592][ T31] audit: type=1400 audit(197.720:228): avc: denied { wake_alarm } for pid=4811 comm="syz.0.349" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 198.068993][ T4814] netlink: 'syz.0.350': attribute type 4 has an invalid length. [ 198.117911][ T4814] netlink: 'syz.0.350': attribute type 4 has an invalid length. [ 199.041869][ T31] audit: type=1400 audit(198.930:229): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 199.215228][ T4824] netlink: 'syz.0.355': attribute type 12 has an invalid length. [ 203.243986][ T31] audit: type=1400 audit(203.150:230): avc: denied { getopt } for pid=4836 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 210.972000][ T9] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 211.151512][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 211.179726][ T9] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 211.183508][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 211.218888][ T9] usb 1-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 211.219346][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 211.219606][ T9] usb 1-1: Product: syz [ 211.219773][ T9] usb 1-1: Manufacturer: syz [ 211.219950][ T9] usb 1-1: SerialNumber: syz [ 211.243012][ T9] usb 1-1: config 0 descriptor?? [ 215.373698][ T31] audit: type=1326 audit(215.280:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4894 comm="syz.1.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7fc00000 [ 219.176964][ T4914] ------------[ cut here ]------------ [ 219.178018][ T4914] WARNING: CPU: 1 PID: 4914 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 219.178609][ T4914] Modules linked in: [ 219.179639][ T4914] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 219.180467][ T4914] CPU: 1 UID: 0 PID: 4914 Comm: syz.1.380 Not tainted 6.12.0-rc2-syzkaller #0 [ 219.181345][ T4914] Hardware name: ARM-Versatile Express [ 219.182422][ T4914] Call trace: [ 219.183054][ T4914] [<819991f8>] (dump_backtrace) from [<819992f4>] (show_stack+0x18/0x1c) [ 219.183303][ T4914] r7:00000000 r6:82622f44 r5:00000000 r4:8203d408 [ 219.183459][ T4914] [<819992dc>] (show_stack) from [<819b7784>] (dump_stack_lvl+0x54/0x7c) [ 219.183668][ T4914] [<819b7730>] (dump_stack_lvl) from [<819b77c4>] (dump_stack+0x18/0x1c) [ 219.183890][ T4914] r5:00000000 r4:82870d18 [ 219.184005][ T4914] [<819b77ac>] (dump_stack) from [<81999e20>] (panic+0x120/0x374) [ 219.184198][ T4914] [<81999d00>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 219.184390][ T4914] r3:8260c5c4 r2:00000001 r1:820257e8 r0:8202d250 [ 219.184552][ T4914] r7:8048c6b4 [ 219.184728][ T4914] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 219.185035][ T4914] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 219.185411][ T4914] r8:00000009 r7:82054e4c r6:dfa11d24 r5:846ed400 r4:00000000 [ 219.185595][ T4914] [<80242350>] (warn_slowpath_fmt) from [<8048c6b4>] (kunmap_local_indexed+0x20c/0x224) [ 219.185841][ T4914] r10:ffedce20 r9:83fe8300 r8:20000000 r7:00000000 r6:00000003 r5:846ed400 [ 219.186044][ T4914] r4:ffedc000 [ 219.186138][ T4914] [<8048c4a8>] (kunmap_local_indexed) from [<80505ad8>] (move_pages+0x7e8/0x149c) [ 219.186370][ T4914] r7:00000000 r6:85197180 r5:def92580 r4:ffeda000 [ 219.186523][ T4914] [<805052f0>] (move_pages) from [<80581d18>] (userfaultfd_ioctl+0x114c/0x2080) [ 219.186770][ T4914] r10:83fe8300 r9:dfa11e98 r8:00000001 r7:201c7000 r6:00000000 r5:20000000 [ 219.186975][ T4914] r4:85314000 [ 219.187076][ T4914] [<80580bcc>] (userfaultfd_ioctl) from [<8052f6e4>] (sys_ioctl+0x134/0xda8) [ 219.187566][ T4914] r10:846ed400 r9:85237a80 r8:00000003 r7:20000000 r6:85237a81 r5:00000000 [ 219.188090][ T4914] r4:c028aa05 [ 219.188378][ T4914] [<8052f5b0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 219.188948][ T4914] Exception stack(0xdfa11fa8 to 0xdfa11ff0) [ 219.189323][ T4914] 1fa0: 00000000 00000000 00000003 c028aa05 20000000 00000000 [ 219.190026][ T4914] 1fc0: 00000000 00000000 00286380 00000036 00000000 00006364 003d0f00 76b140bc [ 219.190634][ T4914] 1fe0: 76b13ec0 76b13eb0 00018af8 00132ec0 [ 219.191084][ T4914] r10:00000036 r9:846ed400 r8:8020029c r7:00000036 r6:00286380 r5:00000000 [ 219.191949][ T4914] r4:00000000 [ 219.194921][ T4914] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:32:00 Registers: info registers vcpu 0 CPU#0 R00=827bbd38 R01=821dee90 R02=032a3fa0 R03=819b95f0 R04=828b5200 R05=0000aa78 R06=0000aa78 R07=fd6ace00 R08=dddc7270 R09=dddc72c0 R10=00000033 R11=82601d54 R12=82601d58 R13=82601d48 R14=8123aa94 R15=819b9600 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=00000024 R04=827584d8 R05=00000000 R06=60000093 R07=00000001 R08=00000001 R09=dfa11b60 R10=00000001 R11=dfa11b4c R12=00000020 R13=dfa11ad0 R14=31393454 R15=802bf6c0 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000