last executing test programs: 10.888851174s ago: executing program 0 (id=97): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000300)={@val={0x0, 0x6003}, @void, @eth={@broadcast, @broadcast, @val={@void, {0x8100, 0x5, 0x0, 0x2}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2000, 0xfc, 0x2f, 0x0, @private=0xa010100, @multicast1}, {0x8000, 0x6558, 0xc, 0x0, @gue={{0x1, 0x0, 0x1, 0x10, 0x0, @void}}}}}}}}, 0x36) 10.641690967s ago: executing program 0 (id=98): ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x2, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0xffffffe}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x58, 0x24, 0xc3d, 0x70bd29, 0x0, {0x60, 0x0, 0x0, r3, {}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x4, 0x1, 0x6, 0x431, 0x7, 0x6, 0x40, 0x10001, 0xfff}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x80015}, 0x4000) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x34004000) 10.525936433s ago: executing program 0 (id=99): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32, @ANYBLOB="0a001800030303030303000018005a8014000080050007000b"], 0x40}}, 0x0) 10.448352447s ago: executing program 0 (id=100): r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfc, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = syz_io_uring_setup(0x27f3, &(0x7f0000000240)={0x0, 0x400000, 0x10100, 0x3, 0xfffffffc}, &(0x7f0000000200), &(0x7f00000000c0)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0)={0x0, 0x0, 0x100, 0x0, 0x134}, &(0x7f00000002c0)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r1, 0x8184c, 0x0, 0x9, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) 10.210253139s ago: executing program 0 (id=101): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000140), 0x4) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r6 = accept(r0, 0x0, 0x0) shutdown(r6, 0x1) 802.517168ms ago: executing program 1 (id=105): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="3000000011140100000000000000000008004b0013000000080001000000000008004f000100000008000300"], 0x30}}, 0x40) 732.535991ms ago: executing program 1 (id=106): r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000003540), &(0x7f0000003580)={'syz', 0x2}, 0x0, 0x0, r0) 643.275226ms ago: executing program 1 (id=107): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0), 0x169802, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x13, r1, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mincore(&(0x7f000009c000/0x4000)=nil, 0x4000, &(0x7f0000004100)=""/4096) 91.332065ms ago: executing program 1 (id=108): r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0xe, &(0x7f0000001000)={0x29, 0xe, 0x7}) 89.711805ms ago: executing program 1 (id=109): sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32, @ANYBLOB="0a001800030303030303000018005a8014000080050007000b"], 0x40}}, 0x0) 291.35µs ago: executing program 1 (id=110): setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x206, 0x8401) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f00000002c0)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x6d, &(0x7f0000002280)=""/4090, &(0x7f0000000040)=0xffa) 0s ago: executing program 0 (id=111): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x1}, 0x1c) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) close_range(r2, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 47.484503][ T31] audit: type=1400 audit(47.390:56): avc: denied { read write } for pid=3108 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.489193][ T31] audit: type=1400 audit(47.400:57): avc: denied { open } for pid=3108 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:21194' (ED25519) to the list of known hosts. [ 58.169079][ T31] audit: type=1400 audit(58.070:58): avc: denied { name_bind } for pid=3111 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 59.869690][ T31] audit: type=1400 audit(59.770:59): avc: denied { execute } for pid=3112 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.919378][ T31] audit: type=1400 audit(59.800:60): avc: denied { execute_no_trans } for pid=3112 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.737541][ T31] audit: type=1400 audit(62.640:61): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.740787][ T31] audit: type=1400 audit(62.650:62): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.755338][ T3112] cgroup: Unknown subsys name 'net' [ 62.763680][ T31] audit: type=1400 audit(62.670:63): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.996624][ T3112] cgroup: Unknown subsys name 'cpuset' [ 63.002597][ T3112] cgroup: Unknown subsys name 'hugetlb' [ 63.003198][ T3112] cgroup: Unknown subsys name 'rlimit' [ 63.269526][ T31] audit: type=1400 audit(63.180:64): avc: denied { setattr } for pid=3112 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.276083][ T31] audit: type=1400 audit(63.180:65): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.288104][ T31] audit: type=1400 audit(63.180:66): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.524860][ T3114] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.528973][ T31] audit: type=1400 audit(63.440:67): avc: denied { relabelto } for pid=3114 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.538966][ T31] audit: type=1400 audit(63.440:68): avc: denied { write } for pid=3114 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 63.580225][ T31] audit: type=1400 audit(63.490:69): avc: denied { read } for pid=3112 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.588223][ T31] audit: type=1400 audit(63.490:70): avc: denied { open } for pid=3112 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.203646][ T3112] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.126417][ T31] audit: type=1400 audit(73.030:71): avc: denied { execmem } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 73.188511][ T31] audit: type=1400 audit(73.100:72): avc: denied { read } for pid=3117 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.190314][ T31] audit: type=1400 audit(73.100:73): avc: denied { open } for pid=3117 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.199666][ T31] audit: type=1400 audit(73.110:74): avc: denied { mounton } for pid=3117 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 73.217138][ T31] audit: type=1400 audit(73.120:75): avc: denied { module_request } for pid=3118 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.217365][ T31] audit: type=1400 audit(73.120:76): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.282314][ T31] audit: type=1400 audit(73.190:77): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.804478][ T31] audit: type=1400 audit(73.710:78): avc: denied { ioctl } for pid=3117 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.029586][ T3117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.033786][ T3117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.061881][ T3118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.092136][ T3118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.050067][ T3117] hsr_slave_0: entered promiscuous mode [ 76.053415][ T3117] hsr_slave_1: entered promiscuous mode [ 76.156395][ T3118] hsr_slave_0: entered promiscuous mode [ 76.160128][ T3118] hsr_slave_1: entered promiscuous mode [ 76.161734][ T3118] debugfs: 'hsr0' already exists in 'hsr' [ 76.162581][ T3118] Cannot create hsr debugfs directory [ 76.552320][ T31] audit: type=1400 audit(76.460:79): avc: denied { create } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.557096][ T31] audit: type=1400 audit(76.460:80): avc: denied { write } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.567424][ T3117] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.590831][ T3117] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.607101][ T3117] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.623840][ T3117] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.671543][ T3118] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.685653][ T3118] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.699038][ T3118] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.710927][ T3118] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 77.341885][ T3118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.427536][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.965224][ T3118] veth0_vlan: entered promiscuous mode [ 79.976590][ T3118] veth1_vlan: entered promiscuous mode [ 80.043333][ T3118] veth0_macvtap: entered promiscuous mode [ 80.054346][ T3118] veth1_macvtap: entered promiscuous mode [ 80.126296][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.126991][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.127236][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.127388][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.294753][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 80.298947][ T31] audit: type=1400 audit(80.200:82): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.300981][ T31] audit: type=1400 audit(80.200:83): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.8180iD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.315150][ T31] audit: type=1400 audit(80.220:84): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.321887][ T31] audit: type=1400 audit(80.230:85): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.8180iD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 80.324065][ T31] audit: type=1400 audit(80.230:86): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/syzkaller.8180iD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 80.341463][ T31] audit: type=1400 audit(80.250:87): avc: denied { unmount } for pid=3118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.349616][ T31] audit: type=1400 audit(80.260:88): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.351651][ T31] audit: type=1400 audit(80.260:89): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="gadgetfs" ino=2246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 80.360230][ T31] audit: type=1400 audit(80.270:90): avc: denied { mount } for pid=3118 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.364240][ T31] audit: type=1400 audit(80.270:91): avc: denied { mounton } for pid=3118 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 80.387316][ T3117] veth0_vlan: entered promiscuous mode [ 80.447007][ T3118] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 80.455372][ T3117] veth1_vlan: entered promiscuous mode [ 80.566212][ T3117] veth0_macvtap: entered promiscuous mode [ 80.587108][ T3117] veth1_macvtap: entered promiscuous mode [ 80.654958][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.655842][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.656196][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.656476][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.617982][ C0] hrtimer: interrupt took 655936 ns [ 85.610519][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 85.613838][ T31] audit: type=1400 audit(85.520:101): avc: denied { create } for pid=3847 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 85.615872][ T31] audit: type=1400 audit(85.520:102): avc: denied { ioctl } for pid=3847 comm="syz.0.16" path="socket:[3167]" dev="sockfs" ino=3167 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 85.620509][ T3848] netlink: 24 bytes leftover after parsing attributes in process `syz.0.16'. [ 85.769405][ T31] audit: type=1400 audit(85.670:103): avc: denied { allowed } for pid=3851 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 85.769960][ T31] audit: type=1400 audit(85.670:104): avc: denied { create } for pid=3851 comm="syz.0.18" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 85.770256][ T31] audit: type=1400 audit(85.670:105): avc: denied { map } for pid=3851 comm="syz.0.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2383 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 85.770453][ T31] audit: type=1400 audit(85.670:106): avc: denied { read write } for pid=3851 comm="syz.0.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2383 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 85.961473][ T31] audit: type=1400 audit(85.870:107): avc: denied { ioctl } for pid=3853 comm="syz.0.19" path="socket:[2392]" dev="sockfs" ino=2392 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.578971][ T31] audit: type=1400 audit(86.490:108): avc: denied { mounton } for pid=3868 comm="syz.0.24" path="/15/file0" dev="tmpfs" ino=94 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 89.050854][ T31] audit: type=1400 audit(88.960:109): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 89.182412][ T31] audit: type=1400 audit(89.090:110): avc: denied { perfmon } for pid=3877 comm="syz.0.26" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 90.458600][ T3885] syz.0.29 uses obsolete (PF_INET,SOCK_PACKET) [ 94.144629][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 94.146700][ T31] audit: type=1400 audit(94.050:113): avc: denied { create } for pid=3906 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.161214][ T31] audit: type=1400 audit(94.070:114): avc: denied { ioctl } for pid=3906 comm="syz.0.34" path="socket:[2469]" dev="sockfs" ino=2469 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.394378][ T31] audit: type=1400 audit(96.300:115): avc: denied { bind } for pid=3906 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.400904][ T31] audit: type=1400 audit(96.310:116): avc: denied { write } for pid=3906 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.403049][ T31] audit: type=1400 audit(96.310:117): avc: denied { read } for pid=3906 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.504707][ T31] audit: type=1400 audit(99.410:118): avc: denied { create } for pid=3923 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 99.516439][ T31] audit: type=1400 audit(99.420:119): avc: denied { write } for pid=3923 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 99.672864][ T31] audit: type=1400 audit(99.580:120): avc: denied { setopt } for pid=3926 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.852943][ T31] audit: type=1400 audit(99.760:121): avc: denied { create } for pid=3930 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.856370][ T31] audit: type=1400 audit(99.760:122): avc: denied { ioctl } for pid=3930 comm="syz.1.42" path="socket:[3226]" dev="sockfs" ino=3226 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.344387][ T31] audit: type=1400 audit(101.250:123): avc: denied { map_create } for pid=3935 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.347294][ T31] audit: type=1400 audit(101.250:124): avc: denied { map_read map_write } for pid=3935 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.883838][ T31] audit: type=1400 audit(103.790:125): avc: denied { create } for pid=3947 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 103.888500][ T31] audit: type=1400 audit(103.790:126): avc: denied { write } for pid=3947 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 103.889436][ T31] audit: type=1400 audit(103.800:127): avc: denied { nlmsg_write } for pid=3947 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 103.903632][ T3952] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 105.456679][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 105.456873][ T31] audit: type=1400 audit(105.360:129): avc: denied { write } for pid=3953 comm="syz.0.49" name="vlan0" dev="proc" ino=4026532878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 105.562062][ T31] audit: type=1400 audit(105.470:130): avc: denied { map } for pid=3953 comm="syz.0.49" path="/proc/64/net/vlan/vlan0" dev="proc" ino=4026532878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 105.562360][ T31] audit: type=1400 audit(105.470:131): avc: denied { execute } for pid=3953 comm="syz.0.49" path="/proc/64/net/vlan/vlan0" dev="proc" ino=4026532878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 112.236459][ T31] audit: type=1400 audit(112.140:132): avc: denied { create } for pid=3973 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 112.252428][ T31] audit: type=1400 audit(112.160:133): avc: denied { write } for pid=3973 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 121.278510][ T31] audit: type=1326 audit(121.180:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4001 comm="syz.0.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 121.290747][ T31] audit: type=1326 audit(121.200:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4001 comm="syz.0.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 121.293302][ T31] audit: type=1326 audit(121.200:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4001 comm="syz.0.64" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 121.310867][ T31] audit: type=1326 audit(121.200:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4001 comm="syz.0.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 121.311209][ T31] audit: type=1326 audit(121.220:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4001 comm="syz.0.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 131.806499][ T31] audit: type=1400 audit(131.710:139): avc: denied { connect } for pid=4015 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.591548][ T31] audit: type=1400 audit(134.500:140): avc: denied { write } for pid=4024 comm="syz.1.71" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.129836][ T43] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 136.299090][ T43] usb 2-1: Using ep0 maxpacket: 8 [ 136.320603][ T43] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 136.322298][ T43] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 136.327254][ T43] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 136.330745][ T43] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 136.333260][ T43] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 136.335716][ T43] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 136.338118][ T43] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 136.598291][ T43] usb 2-1: usb_control_msg returned -71 [ 136.599310][ T43] usbtmc 2-1:16.0: can't read capabilities [ 136.632357][ T43] usb 2-1: USB disconnect, device number 2 [ 136.939859][ T31] audit: type=1400 audit(136.840:141): avc: denied { read } for pid=4063 comm="syz.1.80" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 136.972732][ T31] audit: type=1400 audit(136.880:142): avc: denied { open } for pid=4063 comm="syz.1.80" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 136.988572][ T31] audit: type=1400 audit(136.890:143): avc: denied { ioctl } for pid=4063 comm="syz.1.80" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 136.988992][ T31] audit: type=1400 audit(136.890:144): avc: denied { set_context_mgr } for pid=4063 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 137.032304][ T31] audit: type=1400 audit(136.930:145): avc: denied { map } for pid=4063 comm="syz.1.80" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 137.059587][ T31] audit: type=1400 audit(136.960:146): avc: denied { call } for pid=4063 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 146.339912][ T31] audit: type=1400 audit(146.250:147): avc: denied { map } for pid=4079 comm="syz.0.84" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 146.341098][ T31] audit: type=1400 audit(146.250:148): avc: denied { execute } for pid=4079 comm="syz.0.84" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 150.144121][ T31] audit: type=1400 audit(150.050:149): avc: denied { create } for pid=4084 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 150.147206][ T31] audit: type=1400 audit(150.050:150): avc: denied { bind } for pid=4084 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 150.152235][ T31] audit: type=1400 audit(150.060:151): avc: denied { accept } for pid=4084 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 152.160210][ T31] audit: type=1400 audit(152.070:152): avc: denied { write } for pid=4084 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 166.951973][ T31] audit: type=1400 audit(166.860:153): avc: denied { setopt } for pid=4101 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 167.645918][ T31] audit: type=1400 audit(167.550:154): avc: denied { mounton } for pid=4120 comm="syz.1.95" path="/49/file0" dev="tmpfs" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 169.103752][ T4131] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 178.914818][ T31] audit: type=1400 audit(178.820:155): avc: denied { create } for pid=4157 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 178.926940][ T31] audit: type=1400 audit(178.830:156): avc: denied { write } for pid=4157 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 179.759686][ T31] audit: type=1400 audit(179.670:157): avc: denied { ioctl } for pid=4168 comm="syz.0.111" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2848 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 179.775243][ T31] audit: type=1400 audit(179.680:158): avc: denied { create } for pid=4168 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 179.790725][ T31] audit: type=1400 audit(179.700:159): avc: denied { setopt } for pid=4168 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 180.035084][ T4170] ------------[ cut here ]------------ [ 180.035727][ T4170] WARNING: CPU: 1 PID: 4170 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 180.042254][ T4170] Modules linked in: [ 180.043543][ T4170] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 180.045631][ T4170] CPU: 1 UID: 0 PID: 4170 Comm: syz.0.111 Not tainted syzkaller #0 PREEMPT [ 180.046183][ T4170] Hardware name: ARM-Versatile Express [ 180.046670][ T4170] Call trace: [ 180.047194][ T4170] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 180.048255][ T4170] r7:00000000 r6:8281f77c r5:00000000 r4:82260254 [ 180.048610][ T4170] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 180.048977][ T4170] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 180.049402][ T4170] r5:00000000 r4:82a77d18 [ 180.049626][ T4170] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 180.050088][ T4170] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 180.050482][ T4170] r7:804bec80 [ 180.050635][ T4170] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 180.051062][ T4170] r3:8280c684 r2:00000001 r1:82246c70 r0:8224e6ec [ 180.051487][ T4170] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 180.051921][ T4170] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 180.052281][ T4170] r8:00000009 r7:8227aa98 r6:dfa49d14 r5:85518c00 r4:00000000 [ 180.052620][ T4170] [<80254bd0>] (warn_slowpath_fmt) from [<804bec80>] (kunmap_local_indexed+0x20c/0x224) [ 180.053104][ T4170] r10:00000000 r9:ded0b300 r8:decf3818 r7:00a00000 r6:00000003 r5:85518c00 [ 180.053549][ T4170] r4:ffedc000 [ 180.053752][ T4170] [<804bea74>] (kunmap_local_indexed) from [<8053b3d8>] (move_pages+0xb1c/0x1a00) [ 180.054308][ T4170] r7:00a00000 r6:fffffff0 r5:84e0a674 r4:ffeda000 [ 180.054627][ T4170] [<8053a8bc>] (move_pages) from [<805c4a0c>] (userfaultfd_ioctl+0x1254/0x2408) [ 180.055136][ T4170] r10:84b70340 r9:dfa49e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 180.055871][ T4170] r4:8612b000 [ 180.056072][ T4170] [<805c37b8>] (userfaultfd_ioctl) from [<8056ccb8>] (sys_ioctl+0x130/0xba0) [ 180.056596][ T4170] r10:85518c00 r9:00000003 r8:84de8f00 r7:20000040 r6:84de8f01 r5:00000000 [ 180.057333][ T4170] r4:c028aa05 [ 180.057502][ T4170] [<8056cb88>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 180.058161][ T4170] Exception stack(0xdfa49fa8 to 0xdfa49ff0) [ 180.058671][ T4170] 9fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 180.059091][ T4170] 9fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76fa70bc [ 180.059531][ T4170] 9fe0: 76fa6ec0 76fa6eb0 0001948c 001322c0 [ 180.059860][ T4170] r10:00000036 r9:85518c00 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 180.060200][ T4170] r4:00000000 [ 180.062527][ T4170] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:54:19 Registers: info registers vcpu 0 CPU#0 R00=00010000 R01=8240f768 R02=5b70d000 R03=00010000 R04=85563000 R05=00010000 R06=8025e524 R07=dfa51c20 R08=00000001 R09=85563000 R10=82a77528 R11=df801fac R12=df801fb0 R13=df801f88 R14=8025e524 R15=802914c4 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=85518c00 R03=00000001 R04=dfa49b90 R05=80000093 R06=82826ef8 R07=00000000 R08=00000001 R09=00000000 R10=000003c2 R11=dfa49b74 R12=dfa49b60 R13=dfa49b60 R14=802e35a0 R15=802e3670 PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000