last executing test programs: 13.69293011s ago: executing program 1 (id=43): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000340)) 12.899287884s ago: executing program 1 (id=44): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000040000000000080000100850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 12.177928866s ago: executing program 1 (id=45): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000d00), &(0x7f00000003c0)='%pS \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) 11.497230006s ago: executing program 1 (id=46): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10.746822719s ago: executing program 1 (id=47): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="4dc07f947163300c", 0x8) r1 = dup(0xffffffffffffffff) accept4(r1, 0x0, 0x0, 0x0) 10.155996376s ago: executing program 1 (id=48): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @local, 0x2}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 7.317034991s ago: executing program 0 (id=50): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000005, 0x2012, r0, 0x33fec000) mount$cgroup(0x0, 0x0, 0x0, 0xa00000, &(0x7f0000000100)) 7.003842011s ago: executing program 0 (id=51): socket$packet(0x11, 0x3, 0x300) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x15, 0x5, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) getsockopt(r1, 0x200000000114, 0x2715, 0x0, &(0x7f0000000000)) 6.142866706s ago: executing program 0 (id=52): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="4dc07f947163300c", 0x8) r1 = dup(0xffffffffffffffff) accept4(r1, 0x0, 0x0, 0x0) 5.376305439s ago: executing program 0 (id=53): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_io_uring_setup(0x112, &(0x7f0000000a00)={0x0, 0x0, 0x400}, &(0x7f0000000580)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x5, 0x0, 0x0}) io_uring_enter(r1, 0x47f6, 0x0, 0x0, 0x0, 0x0) preadv2(r0, &(0x7f0000000100)=[{&(0x7f0000000300)=""/97, 0x61}], 0x1, 0x0, 0x0, 0x0) 2.514069695s ago: executing program 0 (id=54): read(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x84}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x13, &(0x7f00000042c0)=ANY=[@ANYBLOB="180800000000100000000000000000018510"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r1, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r2, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) 0s ago: executing program 0 (id=55): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000440), 0x10) listen(r1, 0xfff) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000180)={0x5, 0xfffffffe}, 0x8) close(r2) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:14570' (ED25519) to the list of known hosts. [ 183.952490][ T30] audit: type=1400 audit(183.440:58): avc: denied { name_bind } for pid=3289 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 184.406004][ T30] audit: type=1400 audit(183.900:59): avc: denied { execute } for pid=3291 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 184.409028][ T30] audit: type=1400 audit(183.900:60): avc: denied { execute_no_trans } for pid=3291 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 189.174401][ T30] audit: type=1400 audit(188.650:61): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 189.194321][ T30] audit: type=1400 audit(188.680:62): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 189.245278][ T3291] cgroup: Unknown subsys name 'net' [ 189.265282][ T30] audit: type=1400 audit(188.760:63): avc: denied { unmount } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 189.758100][ T3291] cgroup: Unknown subsys name 'cpuset' [ 189.817758][ T3291] cgroup: Unknown subsys name 'rlimit' [ 190.328265][ T30] audit: type=1400 audit(189.820:64): avc: denied { setattr } for pid=3291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 190.339354][ T30] audit: type=1400 audit(189.830:65): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 190.348140][ T30] audit: type=1400 audit(189.830:66): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 190.824729][ T3293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 190.829960][ T30] audit: type=1400 audit(190.320:67): avc: denied { relabelto } for pid=3293 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 190.843192][ T30] audit: type=1400 audit(190.330:68): avc: denied { write } for pid=3293 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 190.984560][ T30] audit: type=1400 audit(190.470:69): avc: denied { read } for pid=3291 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 190.987876][ T30] audit: type=1400 audit(190.480:70): avc: denied { open } for pid=3291 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 191.026792][ T3291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 204.872047][ T30] audit: type=1400 audit(204.360:71): avc: denied { execmem } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 204.954947][ T30] audit: type=1400 audit(204.450:72): avc: denied { read } for pid=3296 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 204.959016][ T30] audit: type=1400 audit(204.450:73): avc: denied { open } for pid=3296 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 204.975895][ T30] audit: type=1400 audit(204.470:74): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 205.029438][ T30] audit: type=1400 audit(204.520:75): avc: denied { module_request } for pid=3296 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 205.267530][ T30] audit: type=1400 audit(204.760:76): avc: denied { sys_module } for pid=3296 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 211.239858][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.306306][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.984609][ T3296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.025217][ T3296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 214.197207][ T3297] hsr_slave_0: entered promiscuous mode [ 214.206082][ T3297] hsr_slave_1: entered promiscuous mode [ 214.545764][ T3296] hsr_slave_0: entered promiscuous mode [ 214.555479][ T3296] hsr_slave_1: entered promiscuous mode [ 214.562949][ T3296] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.565191][ T3296] Cannot create hsr debugfs directory [ 216.704362][ T30] audit: type=1400 audit(216.190:77): avc: denied { create } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.739581][ T30] audit: type=1400 audit(216.220:78): avc: denied { write } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.740757][ T30] audit: type=1400 audit(216.220:79): avc: denied { read } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 216.763625][ T3297] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 216.850447][ T3297] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 216.897731][ T3297] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 216.980165][ T3297] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 217.195939][ T3296] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 217.266039][ T3296] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 217.297555][ T3296] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 217.341025][ T3296] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 221.334517][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.110647][ T3296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.999500][ T3297] veth0_vlan: entered promiscuous mode [ 231.095620][ T3297] veth1_vlan: entered promiscuous mode [ 231.537328][ T3297] veth0_macvtap: entered promiscuous mode [ 231.638433][ T3297] veth1_macvtap: entered promiscuous mode [ 232.036816][ T3297] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.038833][ T3297] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.039646][ T3297] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.040459][ T3297] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.922813][ T30] audit: type=1400 audit(232.410:80): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 232.977390][ T30] audit: type=1400 audit(232.470:81): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzkaller.c2jcO4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 233.026182][ T30] audit: type=1400 audit(232.510:82): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 233.031630][ T3296] veth0_vlan: entered promiscuous mode [ 233.092484][ T30] audit: type=1400 audit(232.580:83): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzkaller.c2jcO4/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 233.115123][ T30] audit: type=1400 audit(232.600:84): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzkaller.c2jcO4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 233.136528][ T3296] veth1_vlan: entered promiscuous mode [ 233.297899][ T30] audit: type=1400 audit(232.790:85): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 233.377179][ T30] audit: type=1400 audit(232.870:86): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 233.413022][ T30] audit: type=1400 audit(232.900:87): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="gadgetfs" ino=3620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 233.838981][ T3296] veth0_macvtap: entered promiscuous mode [ 234.028181][ T3296] veth1_macvtap: entered promiscuous mode [ 234.138628][ T30] audit: type=1400 audit(233.630:88): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 234.159406][ T30] audit: type=1400 audit(233.650:89): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 234.618065][ T3296] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.619205][ T3296] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.620022][ T3296] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.620881][ T3296] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.669671][ T3297] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 243.553418][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 243.553626][ T30] audit: type=1400 audit(243.040:104): avc: denied { ioctl } for pid=3438 comm="syz.0.1" path="socket:[4219]" dev="sockfs" ino=4219 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.863157][ T30] audit: type=1400 audit(243.350:105): avc: denied { name_bind } for pid=3438 comm="syz.0.1" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 243.864806][ T30] audit: type=1400 audit(243.350:106): avc: denied { node_bind } for pid=3438 comm="syz.0.1" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 252.390157][ T30] audit: type=1400 audit(251.880:107): avc: denied { create } for pid=3446 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 252.412237][ T30] audit: type=1400 audit(251.900:108): avc: denied { write } for pid=3446 comm="syz.1.4" path="socket:[3699]" dev="sockfs" ino=3699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 252.445066][ T30] audit: type=1400 audit(251.940:109): avc: denied { nlmsg_read } for pid=3446 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 254.316819][ T30] audit: type=1400 audit(253.810:110): avc: denied { create } for pid=3451 comm="syz.0.5" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 254.347523][ T30] audit: type=1400 audit(253.840:111): avc: denied { map } for pid=3451 comm="syz.0.5" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3708 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 254.365955][ T30] audit: type=1400 audit(253.840:112): avc: denied { read write } for pid=3451 comm="syz.0.5" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3708 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 254.496567][ T30] audit: type=1400 audit(253.990:113): avc: denied { prog_run } for pid=3451 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 254.538977][ T30] audit: type=1400 audit(254.030:114): avc: denied { create } for pid=3451 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 254.548100][ T30] audit: type=1400 audit(254.040:115): avc: denied { bind } for pid=3451 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 254.558390][ T30] audit: type=1400 audit(254.050:116): avc: denied { accept } for pid=3451 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 257.540982][ T3457] netlink: 'syz.0.7': attribute type 4 has an invalid length. [ 257.541826][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 257.541980][ T30] audit: type=1400 audit(257.020:119): avc: denied { write } for pid=3456 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 257.549226][ T3457] netlink: 244 bytes leftover after parsing attributes in process `syz.0.7'. [ 258.387415][ T30] audit: type=1400 audit(257.880:120): avc: denied { read } for pid=3460 comm="syz.0.8" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 258.395521][ T30] audit: type=1400 audit(257.890:121): avc: denied { open } for pid=3460 comm="syz.0.8" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 258.410838][ T30] audit: type=1400 audit(257.900:122): avc: denied { ioctl } for pid=3460 comm="syz.0.8" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 258.953744][ T30] audit: type=1400 audit(258.440:123): avc: denied { write } for pid=3460 comm="syz.0.8" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 269.103719][ T30] audit: type=1400 audit(268.590:124): avc: denied { read } for pid=3476 comm="syz.1.13" name="usbmon1" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 269.104897][ T30] audit: type=1400 audit(268.590:125): avc: denied { open } for pid=3476 comm="syz.1.13" path="/dev/usbmon1" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 279.990902][ T3489] : renamed from ipvlan1 [ 288.414147][ T30] audit: type=1400 audit(287.900:126): avc: denied { read write } for pid=3496 comm="+}[@" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 288.416293][ T30] audit: type=1400 audit(287.900:127): avc: denied { open } for pid=3496 comm="+}[@" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 289.075608][ T3499] netlink: 'syz.1.20': attribute type 10 has an invalid length. [ 293.597961][ T3507] Zero length message leads to an empty skb [ 293.875463][ T30] audit: type=1400 audit(293.360:128): avc: denied { setopt } for pid=3509 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 298.735247][ T30] audit: type=1400 audit(298.230:129): avc: denied { setopt } for pid=3511 comm="syz.1.26" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.744876][ T30] audit: type=1400 audit(298.230:130): avc: denied { write } for pid=3511 comm="syz.1.26" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.859391][ T3521] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 300.154333][ T30] audit: type=1400 audit(299.630:131): avc: denied { read write } for pid=3524 comm="syz.0.31" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.156953][ T30] audit: type=1400 audit(299.650:132): avc: denied { open } for pid=3524 comm="syz.0.31" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.226319][ T30] audit: type=1400 audit(299.700:133): avc: denied { ioctl } for pid=3524 comm="syz.0.31" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.694067][ T3430] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 300.983698][ T3430] usb 1-1: config 0 has an invalid interface number: 69 but max is 0 [ 300.985667][ T3430] usb 1-1: config 0 has no interface number 0 [ 300.986792][ T3430] usb 1-1: config 0 interface 69 altsetting 0 bulk endpoint 0x8 has invalid maxpacket 1023 [ 300.988056][ T3430] usb 1-1: config 0 interface 69 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 301.046430][ T3430] usb 1-1: New USB device found, idVendor=0c4b, idProduct=0100, bcdDevice=d7.ca [ 301.047456][ T3430] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 301.048227][ T3430] usb 1-1: Product: syz [ 301.048904][ T3430] usb 1-1: Manufacturer: syz [ 301.049561][ T3430] usb 1-1: SerialNumber: syz [ 301.125590][ T3430] usb 1-1: config 0 descriptor?? [ 301.167467][ T3525] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 301.227588][ T3430] cyberjack 1-1:0.69: Reiner SCT Cyberjack USB card reader converter detected [ 301.367819][ T3430] usb 1-1: Reiner SCT Cyberjack USB card reader converter now attached to ttyUSB0 [ 301.784317][ T3430] usb 1-1: USB disconnect, device number 2 [ 301.958979][ T3430] cyberjack ttyUSB0: Reiner SCT Cyberjack USB card reader converter now disconnected from ttyUSB0 [ 301.998051][ T3430] cyberjack 1-1:0.69: device disconnected [ 303.544255][ T30] audit: type=1400 audit(303.030:134): avc: denied { read write } for pid=3532 comm="syz.0.34" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 303.546162][ T30] audit: type=1400 audit(303.040:135): avc: denied { open } for pid=3532 comm="syz.0.34" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 303.574431][ T30] audit: type=1400 audit(303.060:136): avc: denied { mounton } for pid=3532 comm="syz.0.34" path="/18/file0" dev="tmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 303.675316][ T30] audit: type=1400 audit(303.170:137): avc: denied { unmount } for pid=3532 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 315.687735][ T3553] netlink: 12 bytes leftover after parsing attributes in process `syz.1.42'. [ 318.093771][ T30] audit: type=1400 audit(317.570:138): avc: denied { ioctl } for pid=3562 comm="syz.1.45" path="socket:[4416]" dev="sockfs" ino=4416 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.612478][ T30] audit: type=1400 audit(322.100:139): avc: denied { execute } for pid=3573 comm="syz.0.50" path="/21/memory.events" dev="tmpfs" ino=125 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 323.098585][ T30] audit: type=1400 audit(322.590:140): avc: denied { create } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 323.128462][ T30] audit: type=1400 audit(322.620:141): avc: denied { create } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.160026][ T30] audit: type=1400 audit(322.650:142): avc: denied { connect } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.168833][ T30] audit: type=1400 audit(322.660:143): avc: denied { bind } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.206836][ T30] audit: type=1400 audit(322.700:144): avc: denied { write } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.333244][ T30] audit: type=1400 audit(322.820:145): avc: denied { getopt } for pid=3575 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 324.569116][ T30] audit: type=1400 audit(324.060:146): avc: denied { read } for pid=3580 comm="syz.0.53" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 324.575806][ T30] audit: type=1400 audit(324.060:147): avc: denied { open } for pid=3580 comm="syz.0.53" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 329.997106][ T30] audit: type=1400 audit(329.490:148): avc: denied { create } for pid=3594 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 330.005957][ T30] audit: type=1400 audit(329.500:149): avc: denied { bind } for pid=3594 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 330.018036][ T30] audit: type=1400 audit(329.500:150): avc: denied { listen } for pid=3594 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 330.043140][ T30] audit: type=1400 audit(329.510:151): avc: denied { connect } for pid=3594 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 330.061037][ T30] audit: type=1400 audit(329.550:152): avc: denied { setopt } for pid=3594 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 330.079616][ T3595] Unable to handle kernel paging request at virtual address dfff800000000003 [ 330.080377][ T3595] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 330.080984][ T3595] Mem abort info: [ 330.081416][ T3595] ESR = 0x0000000096000005 [ 330.081758][ T3595] EC = 0x25: DABT (current EL), IL = 32 bits [ 330.082222][ T3595] SET = 0, FnV = 0 [ 330.082515][ T3595] EA = 0, S1PTW = 0 [ 330.083005][ T3595] FSC = 0x05: level 1 translation fault [ 330.084316][ T3595] Data abort info: [ 330.084546][ T3595] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 330.084786][ T3595] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 330.085384][ T3595] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 330.085836][ T3595] [dfff800000000003] address between user and kernel address ranges [ 330.086731][ T3595] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 330.087321][ T3595] Modules linked in: [ 330.088251][ T3595] CPU: 0 UID: 0 PID: 3595 Comm: syz.0.55 Not tainted 6.13.0-syzkaller-10003-ga86bf2283d2c #0 [ 330.088869][ T3595] Hardware name: linux,dummy-virt (DT) [ 330.089521][ T3595] pstate: 100000c5 (nzcV daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 330.089984][ T3595] pc : __lock_acquire+0xdc/0x6628 [ 330.090984][ T3595] lr : lock_acquire+0x450/0x76c [ 330.091600][ T3595] sp : ffff8000a1997720 [ 330.091914][ T3595] x29: ffff8000a1997720 x28: ffff00001283bc80 x27: 0000000000000001 [ 330.092620][ T3595] x26: 1ffff00014332f2c x25: 0000000000000000 x24: ffff800086f4f000 [ 330.093164][ T3595] x23: 0000000000000000 x22: 0000000000000001 x21: 0000000000000001 [ 330.093627][ T3595] x20: 0000000000000000 x19: ffff800086ee84c8 x18: 000000001776be89 [ 330.094152][ T3595] x17: 0000000000000000 x16: 0000000000000000 x15: 1ffff00014332f0c [ 330.094615][ T3595] x14: 00000000f1f1f1f1 x13: 00000000f3f3f300 x12: 0000000000000018 [ 330.095078][ T3595] x11: 0000000000000000 x10: dfff800000000000 x9 : 0000000000000003 [ 330.095610][ T3595] x8 : 0000000000000000 x7 : ffff8000802d33c8 x6 : 0000000000000000 [ 330.096064][ T3595] x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 [ 330.096623][ T3595] x2 : 0000000000000000 x1 : 0000000000000003 x0 : dfff800000000000 [ 330.097245][ T3595] Call trace: [ 330.097669][ T3595] __lock_acquire+0xdc/0x6628 (P) [ 330.098086][ T3595] lock_acquire+0x450/0x76c [ 330.098432][ T3595] _raw_spin_lock_irqsave+0x58/0x80 [ 330.098754][ T3595] add_wait_queue+0x60/0x208 [ 330.099066][ T3595] virtio_transport_release+0x4c8/0x6fc [ 330.099413][ T3595] __vsock_release+0xdc/0x460 [ 330.099722][ T3595] vsock_release+0x88/0x114 [ 330.100026][ T3595] __sock_release+0x8c/0x1f0 [ 330.100344][ T3595] sock_close+0x18/0x28 [ 330.100691][ T3595] __fput+0x2c8/0x954 [ 330.100988][ T3595] __fput_sync+0xe0/0x11c [ 330.101549][ T3595] __arm64_sys_close+0x6c/0xbc [ 330.101912][ T3595] invoke_syscall+0x6c/0x258 [ 330.102233][ T3595] el0_svc_common.constprop.0+0xac/0x230 [ 330.102566][ T3595] do_el0_svc_compat+0x40/0x68 [ 330.102973][ T3595] el0_svc_compat+0x4c/0x17c [ 330.103294][ T3595] el0t_32_sync_handler+0x98/0x13c [ 330.103619][ T3595] el0t_32_sync+0x19c/0x1a0 [ 330.104235][ T3595] Code: 34006d60 d343fd81 d2d00000 f2fbffe0 (38e06820) [ 330.105312][ T3595] ---[ end trace 0000000000000000 ]--- [ 330.106214][ T3595] Kernel panic - not syncing: Oops: Fatal exception [ 330.107072][ T3595] SMP: stopping secondary CPUs [ 330.108464][ T3595] Kernel Offset: disabled [ 330.108697][ T3595] CPU features: 0x108,00020034,00800000,0200421b [ 330.109004][ T3595] Memory Limit: none [ 330.109483][ T3595] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:02:42 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b17438 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=1fffe00001e53c2f X06=0000000000000030 X07=ffff00001283bc80 X08=ffff700014332dca X09=ffff700014332dca X10=00000000f3f3f3f3 X11=00000000f3000000 X12=dfff800000000000 X13=000000000000f1f1 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=000000001776be89 X19=ffff00000f29e080 X20=ffff80008d25b018 X21=ffff800087906560 X22=000000000000000a X23=dfff800000000000 X24=ffff80008cf15a1f X25=0000000000000006 X26=dfff800000000000 X27=000000000000003f X28=ffff00000f29e080 X29=ffff8000a1996e60 X30=ffff800081b176c4 SP=ffff8000a1996e60 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008536bae4 X00=0000000000000000 X01=0000000000000003 X02=1fffe00001ea0001 X03=1fffe00001ea0001 X04=ffff800080240e20 X05=00000000f1f1f1f1 X06=dfff800000000000 X07=ffff70001432ce86 X08=0000000041b58ab3 X09=000000000000f2f2 X10=000000000000f1f1 X11=00000000f3000000 X12=dfff800000000000 X13=000000000000f1f1 X14=ffff800086ee81cc X15=00000000200d4000 X16=0000000000000000 X17=0000000000000000 X18=00000000ffffffff X19=ffff800088a45600 X20=0000000000000000 X21=ffff7fffe3214000 X22=ffff80008cf16640 X23=0000000000000000 X24=ffff800086f4f000 X25=ffff80008955c100 X26=00000000000004cb X27=00000000ffffffff X28=ffff00000f500000 X29=ffff8000a19671d0 X30=ffff80008536bb04 SP=ffff8000a1967370 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=000000000000ff00:000000000000ff00 Q01=745f656369766564:5f6b636f00000a31 Q02=0000000000000000:00000000000a7420 Q03=000f0000f000000f:00000000000f0000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0f00f00f00000f00:0f00f00f00000f00 Q06=0000000000000300:0000000000000300 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000