last executing test programs: 42.441002416s ago: executing program 0 (id=84): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26fe}, 0x80) 42.310100577s ago: executing program 0 (id=85): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000140)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @multicast1}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) capset(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0xfffffffb}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000600)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0, 0x50}, 0x20) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @private, @loopback}, &(0x7f0000000300)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x18, r4, 0x1, 0x0, 0x6, @local}, 0x14) memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\xea7\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xcd\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="12010100000000105801000100000000000109022400010000002009040000010300000009210000000122dc01090589"], 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'sit0\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x0, 0x8, 0x0, 0x0, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote, {[@timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6]}, @generic={0x7, 0xe, "dfcbccd08f40f6484c570557"}, @noop]}}}}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0x0, 0x24}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x9}}}}}}}]}}, 0x0) write$binfmt_script(r5, &(0x7f0000000240), 0x208e24b) socket$igmp6(0xa, 0x3, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x22000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 26.760119187s ago: executing program 0 (id=93): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x5, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6, 0x2, 0x7ff}]}}}]}, 0x3c}}, 0x0) 26.680892844s ago: executing program 0 (id=94): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) open(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000640)=""/4096, 0x1000}], 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000818110000000000", @ANYRES32], 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) 1.051469156s ago: executing program 1 (id=124): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9c) 948.888705ms ago: executing program 1 (id=125): r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000740)={'#! ', './file0'}, 0xb) recvmsg(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000), 0x3a}, 0x2) 848.108414ms ago: executing program 1 (id=126): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 750.470592ms ago: executing program 1 (id=127): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="eb", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000003c0)=ANY=[], 0x9) 659.818131ms ago: executing program 1 (id=128): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}}, 0x40000) 480.843327ms ago: executing program 1 (id=129): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000180)) setsockopt$sock_int(r0, 0x1, 0x2d, 0x0, 0x0) 117.661909ms ago: executing program 0 (id=130): r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000080), 0x282a2, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x20) r1 = syz_io_uring_setup(0x239, 0x0, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, 0x0) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000f, 0x11, r0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0xb) 0s ago: executing program 0 (id=131): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) kernel console output (not intermixed with test programs): [ 50.755884][ T31] audit: type=1400 audit(50.680:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.785203][ T31] audit: type=1400 audit(50.710:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32056' (ED25519) to the list of known hosts. [ 61.400957][ T31] audit: type=1400 audit(61.320:70): avc: denied { name_bind } for pid=3105 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.459957][ T31] audit: type=1400 audit(63.370:71): avc: denied { execute } for pid=3107 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.478794][ T31] audit: type=1400 audit(63.400:72): avc: denied { execute_no_trans } for pid=3107 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.629961][ T31] audit: type=1400 audit(66.560:73): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.632760][ T31] audit: type=1400 audit(66.560:74): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.645888][ T3107] cgroup: Unknown subsys name 'net' [ 66.652760][ T31] audit: type=1400 audit(66.580:75): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.801390][ T3107] cgroup: Unknown subsys name 'hugetlb' [ 66.802437][ T3107] cgroup: Unknown subsys name 'rlimit' [ 67.065178][ T31] audit: type=1400 audit(66.990:76): avc: denied { setattr } for pid=3107 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.066870][ T31] audit: type=1400 audit(66.990:77): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.067740][ T31] audit: type=1400 audit(66.990:78): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.281437][ T3109] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.288663][ T31] audit: type=1400 audit(67.210:79): avc: denied { relabelto } for pid=3109 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.289487][ T31] audit: type=1400 audit(67.210:80): avc: denied { write } for pid=3109 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.316990][ T31] audit: type=1400 audit(67.240:81): avc: denied { read } for pid=3107 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.318667][ T31] audit: type=1400 audit(67.240:82): avc: denied { open } for pid=3107 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 74.944903][ T3107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.044248][ T31] audit: type=1400 audit(76.970:83): avc: denied { execmem } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.123691][ T31] audit: type=1400 audit(77.050:84): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 77.125577][ T31] audit: type=1400 audit(77.050:85): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 77.141882][ T31] audit: type=1400 audit(77.050:86): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.142800][ T31] audit: type=1400 audit(77.060:87): avc: denied { open } for pid=3112 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.143506][ T31] audit: type=1400 audit(77.060:88): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.162214][ T31] audit: type=1400 audit(77.090:89): avc: denied { module_request } for pid=3113 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.266096][ T31] audit: type=1400 audit(77.190:90): avc: denied { sys_module } for pid=3113 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.220934][ T31] audit: type=1400 audit(78.150:91): avc: denied { ioctl } for pid=3112 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.732559][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.737019][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.752593][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.756648][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.702939][ T3112] hsr_slave_0: entered promiscuous mode [ 80.706894][ T3112] hsr_slave_1: entered promiscuous mode [ 80.806459][ T3113] hsr_slave_0: entered promiscuous mode [ 80.812410][ T3113] hsr_slave_1: entered promiscuous mode [ 80.814382][ T3113] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.814796][ T3113] Cannot create hsr debugfs directory [ 81.298822][ T31] audit: type=1400 audit(81.220:92): avc: denied { create } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.303972][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.315120][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.322559][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.343140][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.414928][ T3113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.425813][ T3113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.437336][ T3113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.446119][ T3113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.354514][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.405330][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.717373][ T3113] veth0_vlan: entered promiscuous mode [ 85.750946][ T3113] veth1_vlan: entered promiscuous mode [ 85.821948][ T3113] veth0_macvtap: entered promiscuous mode [ 85.836874][ T3113] veth1_macvtap: entered promiscuous mode [ 85.909791][ T3113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.910509][ T3113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.912807][ T3113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.913144][ T3113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.030510][ T3112] veth0_vlan: entered promiscuous mode [ 86.075331][ T3112] veth1_vlan: entered promiscuous mode [ 86.079967][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 86.080113][ T31] audit: type=1400 audit(86.000:95): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.081222][ T31] audit: type=1400 audit(86.000:96): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.mZDZvy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.082094][ T31] audit: type=1400 audit(86.000:97): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.117794][ T31] audit: type=1400 audit(86.040:98): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.121273][ T31] audit: type=1400 audit(86.050:99): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.126972][ T31] audit: type=1400 audit(86.050:100): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.146510][ T3112] veth0_macvtap: entered promiscuous mode [ 86.156941][ T3112] veth1_macvtap: entered promiscuous mode [ 86.231689][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.232154][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.232360][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.232555][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.317631][ T31] audit: type=1400 audit(86.240:101): avc: denied { read write } for pid=3113 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.323485][ T31] audit: type=1400 audit(86.240:102): avc: denied { open } for pid=3113 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.324217][ T31] audit: type=1400 audit(86.240:103): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.435794][ T31] audit: type=1400 audit(86.350:104): avc: denied { create } for pid=3791 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 86.979400][ T717] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 87.231696][ T717] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 87.257007][ T717] usb 2-1: New USB device found, idVendor=07fd, idProduct=0001, bcdDevice=48.99 [ 87.257543][ T717] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.258554][ T717] usb 2-1: Product: syz [ 87.258802][ T717] usb 2-1: Manufacturer: syz [ 87.258998][ T717] usb 2-1: SerialNumber: syz [ 87.269964][ T717] usb 2-1: config 0 descriptor?? [ 87.322130][ T717] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 87.562873][ T717] snd-usb-audio 2-1:0.0: probe with driver snd-usb-audio failed with error -2 [ 87.733933][ T717] usb 2-1: USB disconnect, device number 2 [ 89.350527][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 89.548879][ T8] usb 1-1: Using ep0 maxpacket: 16 [ 89.587026][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x89 has invalid maxpacket 33032, setting to 1024 [ 89.587665][ T8] usb 1-1: New USB device found, idVendor=0158, idProduct=0100, bcdDevice= 0.00 [ 89.588983][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 89.596971][ T8] usb 1-1: config 0 descriptor?? [ 89.863377][ T3828] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 89.875072][ T3828] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 91.563194][ C0] hrtimer: interrupt took 652480 ns [ 101.789976][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 101.790060][ T31] audit: type=1400 audit(101.720:117): avc: denied { name_bind } for pid=3846 comm="syz.0.11" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 102.519028][ T31] audit: type=1400 audit(102.440:118): avc: denied { prog_run } for pid=3851 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 102.595297][ T31] audit: type=1400 audit(102.520:119): avc: denied { ioctl } for pid=3851 comm="syz.0.13" path="socket:[2194]" dev="sockfs" ino=2194 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.750953][ T8] usbhid 1-1:0.0: can't add hid device: -71 [ 102.751672][ T8] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 102.754474][ T8] usb 1-1: USB disconnect, device number 2 [ 102.799152][ T3852] Zero length message leads to an empty skb [ 105.419342][ T31] audit: type=1400 audit(105.340:120): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 106.290412][ T31] audit: type=1400 audit(106.200:121): avc: denied { mounton } for pid=3873 comm="syz.0.17" path="/6/file0" dev="tmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.421995][ T3891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3891 comm=syz.0.21 [ 109.746887][ T31] audit: type=1400 audit(109.670:122): avc: denied { create } for pid=3896 comm="syz.0.24" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 109.755263][ T31] audit: type=1400 audit(109.680:123): avc: denied { ioctl } for pid=3896 comm="syz.0.24" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2236 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.088780][ T1623] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 111.275611][ T1623] usb 2-1: config 0 has no interfaces? [ 111.277171][ T1623] usb 2-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 111.280828][ T1623] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 111.286721][ T1623] usb 2-1: config 0 descriptor?? [ 111.677361][ T31] audit: type=1400 audit(111.600:124): avc: denied { create } for pid=3920 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 111.684146][ T31] audit: type=1400 audit(111.610:125): avc: denied { write } for pid=3920 comm="syz.1.29" path="socket:[2253]" dev="sockfs" ino=2253 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 111.685632][ T31] audit: type=1400 audit(111.610:126): avc: denied { nlmsg_read } for pid=3920 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 111.804464][ T31] audit: type=1400 audit(111.730:127): avc: denied { map } for pid=3922 comm="syz.1.30" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2256 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.805293][ T31] audit: type=1400 audit(111.730:128): avc: denied { read write } for pid=3922 comm="syz.1.30" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2256 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.812508][ T31] audit: type=1326 audit(111.740:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.30" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132dc0 code=0x0 [ 113.019511][ T1623] usb 2-1: USB disconnect, device number 3 [ 115.024572][ T3940] netlink: 48 bytes leftover after parsing attributes in process `syz.0.31'. [ 119.318422][ T31] audit: type=1400 audit(119.240:130): avc: denied { create } for pid=3954 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.744721][ T31] audit: type=1400 audit(119.670:131): avc: denied { ioctl } for pid=3957 comm="syz.0.38" path="socket:[2308]" dev="sockfs" ino=2308 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.850797][ T31] audit: type=1400 audit(119.780:132): avc: denied { setopt } for pid=3954 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.857343][ T31] audit: type=1400 audit(119.780:133): avc: denied { create } for pid=3954 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 119.884255][ T31] audit: type=1400 audit(119.790:134): avc: denied { write } for pid=3954 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.575321][ T31] audit: type=1400 audit(120.500:135): avc: denied { name_bind } for pid=3973 comm="syz.0.40" src=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 120.743272][ T31] audit: type=1400 audit(120.670:136): avc: denied { ioctl } for pid=3975 comm="syz.0.41" path="socket:[3351]" dev="sockfs" ino=3351 ioctlcmd=0x8b1a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 123.726316][ T3960] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 123.727525][ T31] audit: type=1400 audit(123.650:137): avc: denied { relabelto } for pid=3954 comm="syz.1.37" name="memory.events" dev="tmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 123.749678][ T31] audit: type=1400 audit(123.670:138): avc: denied { associate } for pid=3954 comm="syz.1.37" name="memory.events" dev="tmpfs" ino=112 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="u:r:untrusted_app:s0:c512,c768" [ 138.024976][ T31] audit: type=1400 audit(137.950:139): avc: denied { unlink } for pid=3113 comm="syz-executor" name="memory.events" dev="tmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 138.087094][ T3987] SELinux: Context system_u:object_r:hald_acl_exec_t:s0 is not valid (left unmapped). [ 138.091009][ T31] audit: type=1400 audit(138.020:140): avc: denied { relabelto } for pid=3986 comm="syz.1.44" name="file0" dev="tmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:hald_acl_exec_t:s0" [ 138.091621][ T31] audit: type=1400 audit(138.020:141): avc: denied { associate } for pid=3986 comm="syz.1.44" name="file0" dev="tmpfs" ino=118 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_acl_exec_t:s0" [ 138.110966][ T31] audit: type=1400 audit(138.040:142): avc: denied { rmdir } for pid=3113 comm="syz-executor" name="file0" dev="tmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:hald_acl_exec_t:s0" [ 138.908708][ T3067] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 139.088399][ T3067] usb 2-1: Using ep0 maxpacket: 32 [ 139.093448][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 139.094087][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 139.094453][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 139.094754][ T3067] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 139.095012][ T3067] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 139.095311][ T3067] usb 2-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 139.095526][ T3067] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 139.105378][ T3067] usb 2-1: config 0 descriptor?? [ 139.531402][ T3067] ntrig 0003:1B96:000A.0001: unknown main item tag 0x0 [ 139.532069][ T3067] ntrig 0003:1B96:000A.0001: unknown main item tag 0x0 [ 139.532407][ T3067] ntrig 0003:1B96:000A.0001: unknown main item tag 0x0 [ 139.532737][ T3067] ntrig 0003:1B96:000A.0001: unknown main item tag 0x0 [ 139.533047][ T3067] ntrig 0003:1B96:000A.0001: unknown main item tag 0x0 [ 139.539867][ T3067] ntrig 0003:1B96:000A.0001: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.1-1/input0 [ 141.348303][ C0] sched: RT throttling activated [ 141.354208][ T3067] usb 2-1: USB disconnect, device number 4 [ 145.304019][ T31] audit: type=1400 audit(145.230:143): avc: denied { create } for pid=4044 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.308984][ T31] audit: type=1400 audit(145.230:144): avc: denied { name_bind } for pid=4044 comm="syz.1.55" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 145.312195][ T31] audit: type=1400 audit(145.240:145): avc: denied { node_bind } for pid=4044 comm="syz.1.55" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 145.313887][ T31] audit: type=1400 audit(145.240:146): avc: denied { create } for pid=4044 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 145.451450][ T31] audit: type=1400 audit(145.380:147): avc: denied { getopt } for pid=4044 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.458214][ T31] audit: type=1400 audit(145.380:148): avc: denied { connect } for pid=4044 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.458991][ T31] audit: type=1400 audit(145.380:149): avc: denied { name_connect } for pid=4044 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 145.957445][ T31] audit: type=1400 audit(145.880:150): avc: denied { setopt } for pid=4044 comm="syz.1.55" laddr=fe80::16 lport=40017 faddr=fe80::aa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.967524][ T31] audit: type=1400 audit(145.890:151): avc: denied { write } for pid=4044 comm="syz.1.55" name="udp6" dev="proc" ino=4026532797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 146.116736][ T31] audit: type=1400 audit(146.040:152): avc: denied { create } for pid=4050 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 147.172307][ T4060] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 151.553233][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 151.553339][ T31] audit: type=1400 audit(151.470:155): avc: denied { shutdown } for pid=4083 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 154.249156][ T31] audit: type=1400 audit(154.170:156): avc: denied { bind } for pid=4087 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 154.297045][ T31] audit: type=1400 audit(154.220:157): avc: denied { write } for pid=4087 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 154.955987][ T31] audit: type=1400 audit(154.880:158): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 156.868615][ T31] audit: type=1400 audit(156.800:159): avc: denied { bind } for pid=4081 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.877571][ T31] audit: type=1400 audit(156.800:160): avc: denied { name_bind } for pid=4081 comm="syz.1.63" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 156.882407][ T31] audit: type=1400 audit(156.810:161): avc: denied { node_bind } for pid=4081 comm="syz.1.63" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 156.898292][ T31] audit: type=1400 audit(156.820:162): avc: denied { write } for pid=4081 comm="syz.1.63" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.908981][ T31] audit: type=1400 audit(156.820:163): avc: denied { name_connect } for pid=4081 comm="syz.1.63" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 165.482052][ T4153] SELinux: Context #! ./file0 is not valid (left unmapped). [ 168.273877][ T31] audit: type=1400 audit(168.200:164): avc: denied { write } for pid=4169 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 172.678643][ T4165] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 172.869269][ T4165] usb 1-1: Using ep0 maxpacket: 16 [ 172.901132][ T4165] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x89 has invalid maxpacket 33032, setting to 1024 [ 172.901514][ T4165] usb 1-1: New USB device found, idVendor=0158, idProduct=0100, bcdDevice= 0.00 [ 172.901740][ T4165] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 172.909480][ T4165] usb 1-1: config 0 descriptor?? [ 173.190149][ T4178] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 173.210386][ T4178] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 177.995090][ T4165] usbhid 1-1:0.0: can't add hid device: -32 [ 177.995701][ T4165] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 182.486204][ T31] audit: type=1400 audit(182.410:165): avc: denied { connect } for pid=4200 comm="syz.1.92" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.490101][ T31] audit: type=1400 audit(182.420:166): avc: denied { read } for pid=4200 comm="syz.1.92" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.989799][ T717] usb 1-1: USB disconnect, device number 3 [ 184.128849][ T31] audit: type=1400 audit(184.050:167): avc: denied { ioctl } for pid=4208 comm="syz.0.93" path="socket:[3615]" dev="sockfs" ino=3615 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 185.945895][ T31] audit: type=1400 audit(185.870:168): avc: denied { create } for pid=4219 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 185.991715][ T31] audit: type=1400 audit(185.920:169): avc: denied { create } for pid=4219 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 185.994624][ T31] audit: type=1400 audit(185.920:170): avc: denied { setopt } for pid=4219 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 185.999321][ T31] audit: type=1400 audit(185.930:171): avc: denied { bind } for pid=4219 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 185.999789][ T31] audit: type=1400 audit(185.930:172): avc: denied { name_bind } for pid=4219 comm="syz.1.98" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 186.000456][ T31] audit: type=1400 audit(185.930:173): avc: denied { node_bind } for pid=4219 comm="syz.1.98" saddr=fe80::aa src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 189.984260][ T31] audit: type=1400 audit(189.910:174): avc: denied { getopt } for pid=4235 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 191.485143][ T4243] netlink: 40 bytes leftover after parsing attributes in process `syz.1.105'. [ 209.394781][ T4275] netlink: 32 bytes leftover after parsing attributes in process `syz.1.120'. [ 209.918915][ T31] audit: type=1400 audit(209.830:175): avc: denied { create } for pid=4284 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 209.919797][ T31] audit: type=1400 audit(209.840:176): avc: denied { bind } for pid=4284 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 209.924463][ T31] audit: type=1400 audit(209.850:177): avc: denied { listen } for pid=4284 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 209.933615][ T31] audit: type=1400 audit(209.860:178): avc: denied { connect } for pid=4284 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 209.944979][ T31] audit: type=1400 audit(209.870:179): avc: denied { accept } for pid=4284 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 209.947630][ T31] audit: type=1400 audit(209.870:180): avc: denied { write } for pid=4284 comm="syz.1.125" path="socket:[3742]" dev="sockfs" ino=3742 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 210.041338][ T4287] fuse: Unknown parameter '0x0000000000000003' [ 210.797285][ T31] audit: type=1400 audit(210.720:181): avc: denied { map } for pid=4297 comm="syz.0.130" path="/dev/audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 210.799420][ T31] audit: type=1400 audit(210.730:182): avc: denied { execute } for pid=4297 comm="syz.0.130" path="/dev/audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 210.901039][ T4301] fuse: Unknown parameter '0x0000000000000003' [ 660.399339][ T32] INFO: task syz.1.129:4300 blocked for more than 430 seconds. [ 660.400323][ T32] Not tainted 6.11.0-rc5-syzkaller #0 [ 660.400940][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 660.403590][ T32] task:syz.1.129 state:D stack:0 pid:4300 tgid:4295 ppid:3113 flags:0x00400001 [ 660.406212][ T32] Call trace: [ 660.406644][ T32] [<8197e728>] (__schedule) from [<8197f2c0>] (schedule+0x2c/0xfc) [ 660.448929][ T32] r10:dfabde5c r9:dfabdd88 r8:00000000 r7:8495d540 r6:8495d634 r5:8495d540 [ 660.449439][ T32] r4:83e43000 [ 660.449690][ T32] [<8197f294>] (schedule) from [<81457794>] (__lock_sock+0x68/0xac) [ 660.450070][ T32] r5:8495d540 r4:8495d62c [ 660.450357][ T32] [<8145772c>] (__lock_sock) from [<814578bc>] (sockopt_lock_sock+0x54/0x58) [ 660.450683][ T32] r6:00000000 r5:8495d62c r4:8495d540 [ 660.450957][ T32] [<81457868>] (sockopt_lock_sock) from [<8162ba3c>] (do_ip_getsockopt+0x204/0xbb0) [ 660.451377][ T32] r5:00000000 r4:00000010 [ 660.451556][ T32] [<8162b83c>] (do_ip_getsockopt) from [<8162c44c>] (ip_getsockopt+0x64/0x134) [ 660.452034][ T32] r10:814538b4 r9:20000180 r8:00000000 r7:20000180 r6:00000000 r5:8495d540 [ 660.452329][ T32] r4:00000010 [ 660.452479][ T32] [<8162c3e8>] (ip_getsockopt) from [<8163c878>] (tcp_getsockopt+0x34/0x6c) [ 660.452950][ T32] r9:20000180 r8:832a8280 r7:00000010 r6:00000000 r5:00000000 r4:8162c3e8 [ 660.453239][ T32] [<8163c844>] (tcp_getsockopt) from [<814538dc>] (sock_common_getsockopt+0x28/0x30) [ 660.453690][ T32] r4:8163c844 [ 660.453848][ T32] [<814538b4>] (sock_common_getsockopt) from [<814506d4>] (do_sock_getsockopt+0x124/0x2a0) [ 660.454219][ T32] r4:00000000 [ 660.454371][ T32] [<814505b0>] (do_sock_getsockopt) from [<81452654>] (sys_getsockopt+0x90/0xd4) [ 660.454772][ T32] r10:00000127 r9:83e43000 r8:832a8280 r7:00000000 r6:00000010 r5:00000000 [ 660.457131][ T32] r4:00000000 [ 660.514244][ T32] [<814525c4>] (sys_getsockopt) from [<8020028c>] (__sys_trace_return+0x0/0x10) [ 660.514967][ T32] Exception stack(0xdfabdfa8 to 0xdfabdff0) [ 660.515370][ T32] dfa0: 20000180 00000000 00000003 00000000 00000010 00000000 [ 660.515734][ T32] dfc0: 20000180 00000000 00276388 00000127 00000000 00006364 003d0f00 76b970bc [ 660.516076][ T32] dfe0: 76b96ec0 76b96eb0 000189f0 00132dc0 [ 660.516432][ T32] r8:8020029c r7:00000127 r6:00276388 r5:00000000 r4:20000180 [ 660.517386][ T32] NMI backtrace for cpu 0 [ 660.517798][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller #0 [ 660.518491][ T32] Hardware name: ARM-Versatile Express [ 660.518830][ T32] Call trace: [ 660.519066][ T32] [<8195cb40>] (dump_backtrace) from [<8195cc3c>] (show_stack+0x18/0x1c) [ 660.519430][ T32] r7:00000000 r6:00000013 r5:60000093 r4:8200c924 [ 660.519691][ T32] [<8195cc24>] (show_stack) from [<8197a97c>] (dump_stack_lvl+0x70/0x7c) [ 660.520083][ T32] [<8197a90c>] (dump_stack_lvl) from [<8197a9a0>] (dump_stack+0x18/0x1c) [ 660.520433][ T32] r5:00000000 r4:00000001 [ 660.520628][ T32] [<8197a988>] (dump_stack) from [<81949e30>] (nmi_cpu_backtrace+0x160/0x17c) [ 660.521130][ T32] [<81949cd0>] (nmi_cpu_backtrace) from [<81949f7c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 660.521587][ T32] r7:00000000 r6:8260c5d0 r5:8261a88c r4:ffffffff [ 660.521851][ T32] [<81949e4c>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 660.522288][ T32] r9:00008ccc r8:828b2130 r7:8260c734 r6:00007f55 r5:8261ae48 r4:84ff3f1c [ 660.522632][ T32] [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8) [ 660.523079][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 660.523481][ T32] r10:00000000 r9:df819e58 r8:82ccfb40 r7:00000000 r6:80350998 r5:82e49800 [ 660.523900][ T32] r4:82fa5640 [ 660.524072][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 660.524432][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 660.524690][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 660.525042][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 660.525418][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 660.525751][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82fa5640 [ 660.526930][ T32] Sending NMI from CPU 0 to CPUs 1: [ 660.528017][ C1] NMI backtrace for cpu 1 [ 660.528265][ C1] CPU: 1 UID: 0 PID: 4305 Comm: dhcpcd-run-hook Not tainted 6.11.0-rc5-syzkaller #0 [ 660.528327][ C1] Hardware name: ARM-Versatile Express [ 660.528400][ C1] PC is at preempt_count_sub+0x0/0xfc [ 660.528494][ C1] LR is at _raw_spin_unlock_irq+0x30/0x54 [ 660.528554][ C1] pc : [<8027b560>] lr : [<81987a8c>] psr: 60000013 [ 660.528614][ C1] sp : dfb6ded0 ip : dfb6dee0 fp : dfb6dedc [ 660.528657][ C1] r10: 00000077 r9 : 83693c00 r8 : 00000000 [ 660.528705][ C1] r7 : b5403587 r6 : 7e980370 r5 : 83693c00 r4 : dfb6df64 [ 660.528754][ C1] r3 : 00006653 r2 : 00000000 r1 : 00000000 r0 : 00000001 [ 660.528886][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 660.528960][ C1] Control: 30c5387d Table: 84983080 DAC: 00000000 [ 660.529035][ C1] Call trace: [ 660.529077][ C1] [<81987a5c>] (_raw_spin_unlock_irq) from [<80256ca0>] (__set_current_blocked+0x40/0x58) [ 660.529153][ C1] [<80256c60>] (__set_current_blocked) from [<80256cd8>] (set_current_blocked+0x20/0x24) [ 660.529206][ C1] r5:00000000 r4:dfb6dfb0 [ 660.529221][ C1] [<80256cb8>] (set_current_blocked) from [<8020b6d8>] (restore_sigframe+0x208/0x210) [ 660.529273][ C1] [<8020b4d0>] (restore_sigframe) from [<8020b8e4>] (sys_sigreturn+0x40/0x60) [ 660.529327][ C1] r7:00000077 r6:76f6794c r5:7e980c90 r4:dfb6dfb0 [ 660.529343][ C1] [<8020b8a4>] (sys_sigreturn) from [<8020028c>] (__sys_trace_return+0x0/0x10) [ 660.529400][ C1] Exception stack(0xdfb6dfa8 to 0xdfb6dff0) [ 660.529443][ C1] dfa0: 00000000 7e980c90 00000011 00000004 00000000 012281a8 [ 660.529481][ C1] dfc0: 00000000 7e980c90 76f6794c 00000077 00000000 004a05d4 76fa6d00 76fa7010 [ 660.529510][ C1] dfe0: 76f67e6c 7e980370 76d60ca0 76d60ca8 [ 660.529535][ C1] r5:7e980c90 r4:00000000 [ 660.628945][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 660.631025][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller #0 [ 660.631415][ T32] Hardware name: ARM-Versatile Express [ 660.631673][ T32] Call trace: [ 660.631887][ T32] [<8195cb40>] (dump_backtrace) from [<8195cc3c>] (show_stack+0x18/0x1c) [ 660.632221][ T32] r7:00000000 r6:826228c4 r5:00000000 r4:8200c924 [ 660.632429][ T32] [<8195cc24>] (show_stack) from [<8197a960>] (dump_stack_lvl+0x54/0x7c) [ 660.632711][ T32] [<8197a90c>] (dump_stack_lvl) from [<8197a9a0>] (dump_stack+0x18/0x1c) [ 660.633083][ T32] r5:00000000 r4:8286cd18 [ 660.633249][ T32] [<8197a988>] (dump_stack) from [<8195d6e4>] (panic+0x120/0x368) [ 660.633521][ T32] [<8195d5c4>] (panic) from [<80350cb0>] (watchdog+0x318/0x5b8) [ 660.633849][ T32] r3:00400000 r2:00000000 r1:00000001 r0:8200d424 [ 660.634109][ T32] r7:8260c734 [ 660.634250][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 660.634534][ T32] r10:00000000 r9:df819e58 r8:82ccfb40 r7:00000000 r6:80350998 r5:82e49800 [ 660.634788][ T32] r4:82fa5640 [ 660.634993][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 660.635299][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 660.635521][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 660.635787][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 660.636088][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 660.636346][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82fa5640 [ 660.638333][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:04:05 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8200c924 R02=00000000 R03=8197c6f4 R04=826f54c8 R05=826f54c0 R06=00000028 R07=00000006 R08=826f54c8 R09=00000000 R10=81fffeb4 R11=df8e1d84 R12=df8e1d88 R13=df8e1d78 R14=8197b384 R15=8197c704 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005827e9 s17=00000000 d08=00000000005827e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=52893182 s33=545a7913 d16=545a791352893182 s34=b56c8cc9 s35=e44a29e8 d17=e44a29e8b56c8cc9 s36=d5300b5a s37=57c5e592 d18=57c5e592d5300b5a s38=e92b633a s39=ce454a46 d19=ce454a46e92b633a s40=a5f5cade s41=5086fd5a d20=5086fd5aa5f5cade s42=fc980600 s43=f789bf49 d21=f789bf49fc980600 s44=3621b497 s45=3aa80c7a d22=3aa80c7a3621b497 s46=24670d9b s47=220e5c99 d23=220e5c9924670d9b s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00280000 d26=00280000003c0000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ff860000 d29=ff86000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000300 s63=ff960000 d31=ff96000000000300 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000001 R03=00000000 R04=00000000 R05=ffffffff R06=76f30260 R07=00000072 R08=00000000 R09=7e80baf0 R10=005e5914 R11=00000007 R12=00460e34 R13=7e7fb570 R14=76e497f8 R15=76e496a8 PSR=60000010 -ZC- A S usr32 s00=f4000000 s01=ffffffff d00=fffffffff4000000 s02=a0000000 s03=0007230a d01=0007230aa0000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff54133a s09=006e9a7f d04=006e9a7fff54133a s10=ffffffff s11=00000000 d05=00000000ffffffff s12=00d9a0b9 s13=007bc1a8 d06=007bc1a800d9a0b9 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=f97c7f94 d08=f97c7f9400000000 s18=ba000000 s19=fffeb453 d09=fffeb453ba000000 s20=ff9c34c1 s21=007bc1a6 d10=007bc1a6ff9c34c1 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=f554133a s25=ffffffff d12=fffffffff554133a s26=a0000000 s27=0007230a d13=0007230aa0000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=0078bcd9 s33=00f8c7b2 d16=00f8c7b20078bcd9 s34=00000000 s35=00000000 d17=0000000000000000 s36=01137aec s37=ff68cb9f d18=ff68cb9f01137aec s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=fe0e7d97 s43=ffffffff d21=fffffffffe0e7d97 s44=fffffffd s45=ffffffff d22=fffffffffffffffd s46=ff5a29dd s47=ffffffff d23=ffffffffff5a29dd s48=01a6ec67 s49=f97c7f94 d24=f97c7f9401a6ec67 s50=f3b11b67 s51=ffffffff d25=fffffffff3b11b67 s52=013f5f41 s53=fef375aa d26=fef375aa013f5f41 s54=00e772ff s55=00e70bc0 d27=00e70bc000e772ff s56=0061d6d0 s57=01a14542 d28=01a145420061d6d0 s58=00d0a2a1 s59=00e772ff d29=00e772ff00d0a2a1 s60=9d50ec25 s61=0007230a d30=0007230a9d50ec25 s62=1fa2f7d3 s63=0021ce03 d31=0021ce031fa2f7d3 FPSCR: 00000000