last executing test programs: 4.822654208s ago: executing program 0 (id=124): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000680), &(0x7f00000006c0)='%+9llu \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) open(0x0, 0x46b42, 0xb8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000002240)=@newtaction={0x898, 0x30, 0x12f, 0x0, 0x0, {}, [{0x884, 0x1, [@m_police={0x880, 0x1, 0x0, 0x0, {{0xb}, {0x854, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}}}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xffffffffffffffff}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x898}}, 0x0) 4.722293825s ago: executing program 1 (id=125): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/rpc\x00') fchdir(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) 4.524763481s ago: executing program 0 (id=126): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 3.895783488s ago: executing program 0 (id=127): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x2}, 0x18) 3.353000899s ago: executing program 0 (id=128): r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}}, {{}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}}], 0x8) 2.616219214s ago: executing program 0 (id=129): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de00000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x7) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="3c0000001000370400"/20, @ANYRES32=r4, @ANYBLOB="0b120500000000001c0012800b00010069703667726500000c00028008000100", @ANYRES32=r4], 0x3c}}, 0x0) sendmmsg$inet(r1, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) 2.020516868s ago: executing program 1 (id=130): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0x6}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x4000000000001f2, 0x0) 1.673967994s ago: executing program 0 (id=131): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00v\x00\t'], 0x24}, 0x1, 0x5502000000000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 1.673515874s ago: executing program 1 (id=132): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, r2) 1.239495397s ago: executing program 1 (id=133): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000400)='kmem_cache_free\x00', r0, 0x0, 0x6}, 0x18) rt_sigsuspend(0x0, 0x0) 941.637459ms ago: executing program 1 (id=134): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f00000009c0)={0x14, r1, 0x3d48df9430217b4f, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x40010) 0s ago: executing program 1 (id=135): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18) sendmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="b875a1431a05b9319c", 0x9}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000180)="f102", 0x2}, {&(0x7f0000002640)="f5f2de5f96a1ca", 0x7}], 0x2}}], 0x1, 0x0) kernel console output (not intermixed with test programs): [ 49.769231][ T31] audit: type=1400 audit(49.670:68): avc: denied { read write } for pid=3080 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.795672][ T31] audit: type=1400 audit(49.700:69): avc: denied { open } for pid=3080 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:15272' (ED25519) to the list of known hosts. [ 63.608614][ T31] audit: type=1400 audit(63.520:70): avc: denied { name_bind } for pid=3082 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.232840][ T31] audit: type=1400 audit(65.150:71): avc: denied { execute } for pid=3084 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.250383][ T31] audit: type=1400 audit(65.170:72): avc: denied { execute_no_trans } for pid=3084 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.885234][ T31] audit: type=1400 audit(68.800:73): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.887424][ T31] audit: type=1400 audit(68.800:74): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.901009][ T3084] cgroup: Unknown subsys name 'net' [ 68.908976][ T31] audit: type=1400 audit(68.820:75): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.116258][ T3084] cgroup: Unknown subsys name 'cpuset' [ 69.123401][ T3084] cgroup: Unknown subsys name 'hugetlb' [ 69.124368][ T3084] cgroup: Unknown subsys name 'rlimit' [ 69.373332][ T31] audit: type=1400 audit(69.290:76): avc: denied { setattr } for pid=3084 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.374396][ T31] audit: type=1400 audit(69.290:77): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.375117][ T31] audit: type=1400 audit(69.290:78): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.577434][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.586798][ T31] audit: type=1400 audit(69.500:79): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.588313][ T31] audit: type=1400 audit(69.500:80): avc: denied { write } for pid=3086 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.614291][ T31] audit: type=1400 audit(69.530:81): avc: denied { read } for pid=3084 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.614942][ T31] audit: type=1400 audit(69.530:82): avc: denied { open } for pid=3084 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.346125][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.271944][ T31] audit: type=1400 audit(77.190:83): avc: denied { execmem } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.332361][ T31] audit: type=1400 audit(77.250:84): avc: denied { read } for pid=3089 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.332872][ T31] audit: type=1400 audit(77.250:85): avc: denied { open } for pid=3089 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.341254][ T31] audit: type=1400 audit(77.260:86): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.364676][ T31] audit: type=1400 audit(77.280:87): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.484119][ T31] audit: type=1400 audit(77.400:88): avc: denied { sys_module } for pid=3090 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.271943][ T31] audit: type=1400 audit(78.190:89): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.474773][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.485551][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.610258][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.617679][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.340552][ T3090] hsr_slave_0: entered promiscuous mode [ 80.342861][ T3090] hsr_slave_1: entered promiscuous mode [ 80.430174][ T3089] hsr_slave_0: entered promiscuous mode [ 80.431623][ T3089] hsr_slave_1: entered promiscuous mode [ 80.432939][ T3089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.433416][ T3089] Cannot create hsr debugfs directory [ 80.758410][ T31] audit: type=1400 audit(80.670:90): avc: denied { create } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.768342][ T31] audit: type=1400 audit(80.680:91): avc: denied { write } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.769387][ T31] audit: type=1400 audit(80.680:92): avc: denied { read } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.776521][ T3090] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.795624][ T3090] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.814033][ T3090] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.824482][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.832686][ T3090] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.843060][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.874771][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.887544][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.755487][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.822885][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.521204][ T3090] veth0_vlan: entered promiscuous mode [ 84.546639][ T3090] veth1_vlan: entered promiscuous mode [ 84.617430][ T3090] veth0_macvtap: entered promiscuous mode [ 84.634026][ T3090] veth1_macvtap: entered promiscuous mode [ 84.682619][ T3090] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.683182][ T3090] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.683371][ T3090] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.683733][ T3090] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.768308][ T31] audit: type=1400 audit(84.680:93): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.772943][ T31] audit: type=1400 audit(84.690:94): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.gWNSbP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.779418][ T31] audit: type=1400 audit(84.700:95): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.784444][ T31] audit: type=1400 audit(84.700:96): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.gWNSbP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.786560][ T31] audit: type=1400 audit(84.700:97): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.gWNSbP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1911 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.794879][ T31] audit: type=1400 audit(84.710:98): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.799650][ T31] audit: type=1400 audit(84.720:99): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.802688][ T31] audit: type=1400 audit(84.720:100): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.804501][ T31] audit: type=1400 audit(84.720:101): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.805580][ T31] audit: type=1400 audit(84.720:102): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 84.852245][ T3090] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.991510][ T3089] veth0_vlan: entered promiscuous mode [ 85.011669][ T3089] veth1_vlan: entered promiscuous mode [ 85.040027][ T3769] syz.1.2[3769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.050461][ T3769] syz.1.2[3769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.062137][ T3769] syz.1.2[3769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.086394][ T3089] veth0_macvtap: entered promiscuous mode [ 85.107555][ T3089] veth1_macvtap: entered promiscuous mode [ 85.123706][ T3769] ip6erspan0: entered promiscuous mode [ 85.124291][ T3769] ip6erspan0: entered allmulticast mode [ 85.239361][ T3089] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.239995][ T3089] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.240564][ T3089] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.241063][ T3089] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.502221][ T3811] Zero length message leads to an empty skb [ 90.844452][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 90.844512][ T31] audit: type=1400 audit(90.760:137): avc: granted { setsecparam } for pid=3825 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 90.949690][ T31] audit: type=1400 audit(90.870:138): avc: denied { create } for pid=3827 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 91.122243][ T31] audit: type=1400 audit(91.040:139): avc: denied { create } for pid=3830 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 91.154882][ T31] audit: type=1400 audit(91.070:140): avc: denied { setopt } for pid=3830 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 91.488848][ T31] audit: type=1400 audit(91.410:141): avc: denied { create } for pid=3827 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.494203][ T31] audit: type=1400 audit(91.410:142): avc: denied { ioctl } for pid=3827 comm="syz.1.21" path="socket:[2339]" dev="sockfs" ino=2339 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.499450][ T31] audit: type=1400 audit(91.410:143): avc: denied { create } for pid=3835 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.516224][ T31] audit: type=1400 audit(91.430:144): avc: denied { write } for pid=3835 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 92.287678][ T31] audit: type=1326 audit(92.200:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.1.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 92.320766][ T31] audit: type=1326 audit(92.240:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.1.26" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 93.548735][ T3851] netlink: 36 bytes leftover after parsing attributes in process `syz.1.28'. [ 93.556485][ T3851] netlink: 16 bytes leftover after parsing attributes in process `syz.1.28'. [ 93.578842][ T3851] netlink: 36 bytes leftover after parsing attributes in process `syz.1.28'. [ 93.579754][ T3851] netlink: 36 bytes leftover after parsing attributes in process `syz.1.28'. [ 96.960585][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 96.960708][ T31] audit: type=1400 audit(96.870:174): avc: denied { create } for pid=3886 comm="syz.1.41" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 96.995174][ T31] audit: type=1400 audit(96.900:175): avc: denied { map } for pid=3886 comm="syz.1.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2428 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 97.018802][ T31] audit: type=1400 audit(96.920:176): avc: denied { read write } for pid=3886 comm="syz.1.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2428 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 98.186291][ T31] audit: type=1400 audit(98.100:177): avc: denied { bind } for pid=3889 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.186917][ T31] audit: type=1400 audit(98.100:178): avc: denied { name_bind } for pid=3889 comm="syz.1.42" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 98.187411][ T31] audit: type=1400 audit(98.100:179): avc: denied { node_bind } for pid=3889 comm="syz.1.42" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 98.255161][ T31] audit: type=1400 audit(98.170:180): avc: denied { write } for pid=3889 comm="syz.1.42" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.260284][ T31] audit: type=1400 audit(98.180:181): avc: denied { connect } for pid=3889 comm="syz.1.42" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.264382][ T31] audit: type=1400 audit(98.180:182): avc: denied { name_connect } for pid=3889 comm="syz.1.42" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 108.125999][ T31] audit: type=1400 audit(108.040:183): avc: denied { connect } for pid=3933 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 108.540876][ T31] audit: type=1400 audit(108.460:184): avc: denied { create } for pid=3936 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 108.562046][ T31] audit: type=1400 audit(108.480:185): avc: denied { write } for pid=3936 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 111.446113][ T31] audit: type=1400 audit(111.360:186): avc: denied { ioctl } for pid=3947 comm="syz.1.59" path="socket:[3169]" dev="sockfs" ino=3169 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 116.549648][ T31] audit: type=1400 audit(116.450:187): avc: denied { name_bind } for pid=3962 comm="syz.1.62" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 117.149505][ T31] audit: type=1326 audit(117.070:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.150755][ T31] audit: type=1326 audit(117.070:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.152259][ T31] audit: type=1326 audit(117.070:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.153187][ T31] audit: type=1326 audit(117.070:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.154222][ T31] audit: type=1326 audit(117.070:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.159849][ T31] audit: type=1326 audit(117.080:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=357 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.161439][ T31] audit: type=1326 audit(117.080:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.162192][ T31] audit: type=1326 audit(117.080:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=251 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.180752][ T31] audit: type=1326 audit(117.080:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3966 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 123.329056][ T3989] syz.1.71 uses obsolete (PF_INET,SOCK_PACKET) [ 124.220406][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 124.220462][ T31] audit: type=1400 audit(124.140:206): avc: denied { create } for pid=3995 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.308412][ T31] audit: type=1400 audit(124.230:207): avc: denied { ioctl } for pid=3995 comm="syz.1.72" path="socket:[2515]" dev="sockfs" ino=2515 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.319695][ T31] audit: type=1400 audit(124.240:208): avc: denied { bind } for pid=3995 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.342267][ T31] audit: type=1400 audit(124.260:209): avc: denied { write } for pid=3995 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 125.322602][ T31] audit: type=1326 audit(125.240:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3999 comm="syz.1.74" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 126.089587][ T31] audit: type=1400 audit(126.010:211): avc: denied { name_connect } for pid=4003 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 126.201467][ T31] audit: type=1400 audit(126.120:212): avc: denied { shutdown } for pid=4003 comm="syz.1.76" laddr=fe80::10 lport=59316 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 128.739505][ T31] audit: type=1400 audit(128.660:213): avc: denied { bind } for pid=4013 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.744400][ T31] audit: type=1400 audit(128.660:214): avc: denied { setopt } for pid=4013 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 135.472279][ T4037] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 140.171479][ T4051] netlink: 28 bytes leftover after parsing attributes in process `syz.0.93'. [ 140.968318][ T31] audit: type=1326 audit(140.880:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 140.973647][ T31] audit: type=1326 audit(140.890:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 140.980956][ T31] audit: type=1326 audit(140.900:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 140.991573][ T31] audit: type=1326 audit(140.910:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 140.993015][ T31] audit: type=1326 audit(140.910:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 140.993930][ T31] audit: type=1326 audit(140.910:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 141.012758][ T31] audit: type=1326 audit(140.910:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 141.014483][ T31] audit: type=1326 audit(140.910:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 141.035945][ T31] audit: type=1326 audit(140.950:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 141.041687][ T31] audit: type=1326 audit(140.960:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4057 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 144.636526][ T4082] can0: slcan on ptm0. [ 146.049446][ T4076] can0 (unregistered): slcan off ptm0. [ 146.314450][ T4093] Illegal XDP return value 201111936 on prog (id 58) dev N/A, expect packet loss! [ 147.851679][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 147.851793][ T31] audit: type=1400 audit(147.770:242): avc: denied { bind } for pid=4110 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 148.360491][ T4117] netlink: 16 bytes leftover after parsing attributes in process `syz.0.112'. [ 148.758926][ T31] audit: type=1326 audit(148.660:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.760721][ T31] audit: type=1326 audit(148.670:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.762159][ T31] audit: type=1326 audit(148.670:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.763801][ T31] audit: type=1326 audit(148.670:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.764845][ T31] audit: type=1326 audit(148.670:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.766268][ T31] audit: type=1326 audit(148.670:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.788106][ T31] audit: type=1326 audit(148.670:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.789736][ T31] audit: type=1326 audit(148.670:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x133450 code=0x7ffc0000 [ 148.790589][ T31] audit: type=1326 audit(148.670:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4119 comm="syz.0.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.462229][ T4142] netlink: 20 bytes leftover after parsing attributes in process `syz.0.117'. [ 153.729618][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 153.729731][ T31] audit: type=1400 audit(153.630:274): avc: denied { setopt } for pid=4163 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 154.550728][ T31] audit: type=1400 audit(154.470:275): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 154.582631][ T4167] ip6gre1: entered allmulticast mode [ 155.122477][ T4178] netlink: 12 bytes leftover after parsing attributes in process `syz.0.131'. [ 155.478688][ T31] audit: type=1326 audit(155.390:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.481120][ T31] audit: type=1326 audit(155.400:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.481708][ T31] audit: type=1326 audit(155.400:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.487269][ T31] audit: type=1326 audit(155.400:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.498154][ T31] audit: type=1326 audit(155.400:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.510946][ T31] audit: type=1326 audit(155.420:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.520866][ T31] audit: type=1326 audit(155.430:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 155.525845][ T31] audit: type=1326 audit(155.430:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4181 comm="syz.1.133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 156.945447][ C0] ------------[ cut here ]------------ [ 156.948478][ C0] WARNING: CPU: 0 PID: 4188 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 156.951688][ C0] refcount_t: underflow; use-after-free. [ 156.952261][ C0] Modules linked in: [ 156.957072][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 156.959443][ C0] CPU: 0 UID: 0 PID: 4188 Comm: syz.1.135 Not tainted 6.12.0-syzkaller #0 [ 156.962288][ C0] Hardware name: ARM-Versatile Express [ 156.963124][ C0] Call trace: frame pointer underflow [ 156.963923][ C0] [<819a4c38>] (dump_backtrace) from [<819a4d34>] (show_stack+0x18/0x1c) [ 156.965759][ C0] r7:00000000 r6:82622f84 r5:00000000 r4:8203f4b0 [ 156.968190][ C0] [<819a4d1c>] (show_stack) from [<819c2e28>] (dump_stack_lvl+0x54/0x7c) [ 156.968854][ C0] [<819c2dd4>] (dump_stack_lvl) from [<819c2e68>] (dump_stack+0x18/0x1c) [ 156.969435][ C0] r5:00000000 r4:82871d18 [ 156.971235][ C0] [<819c2e50>] (dump_stack) from [<819a5860>] (panic+0x120/0x374) [ 156.974496][ C0] [<819a5740>] (panic) from [<802420d8>] (get_taint+0x0/0x1c) [ 156.975326][ C0] r3:8260c604 r2:00000001 r1:82027874 r0:8202f328 [ 156.975805][ C0] r7:808452e0 [ 156.976222][ C0] [<80242064>] (check_panic_on_warn) from [<8024223c>] (__warn+0x80/0x188) [ 156.978192][ C0] [<802421bc>] (__warn) from [<8024252c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 156.984868][ C0] r8:00000009 r7:8208e130 r6:df801c74 r5:83496c00 r4:00000000 [ 156.986288][ C0] [<80242348>] (warn_slowpath_fmt) from [<808452e0>] (refcount_warn_saturate+0x13c/0x174) [ 156.988777][ C0] r10:dddd10c8 r9:00000040 r8:837bc490 r7:00000000 r6:81832234 r5:00000002 [ 156.990155][ C0] r4:844e9300 [ 156.990410][ C0] [<808451a4>] (refcount_warn_saturate) from [<814a3ce0>] (sk_skb_reason_drop+0x1d8/0x248) [ 156.995438][ C0] [<814a3b08>] (sk_skb_reason_drop) from [<81832234>] (j1939_session_destroy+0x78/0x200) [ 156.998420][ C0] r9:00000040 r8:837bc490 r7:8491d81c r6:85002450 r5:85002400 r4:844e9300 [ 156.998822][ C0] [<818321bc>] (j1939_session_destroy) from [<81833394>] (j1939_xtp_rx_eoma+0x120/0x234) [ 156.999323][ C0] r6:844e90c0 r5:85002400 r4:85002414 [ 156.999588][ C0] [<81833274>] (j1939_xtp_rx_eoma) from [<818357bc>] (j1939_tp_recv+0x4a8/0x530) [ 157.000014][ C0] r7:8491d000 r6:8491d008 r5:8491d000 r4:844e90c0 [ 157.002596][ C0] [<81835314>] (j1939_tp_recv) from [<8182f1a0>] (j1939_can_recv+0x1e4/0x2dc) [ 157.003254][ C0] r7:8491d000 r6:8491d008 r5:8491d810 r4:844e90c0 [ 157.003543][ C0] [<8182efbc>] (j1939_can_recv) from [<81824f70>] (can_rcv_filter+0x9c/0x218) [ 157.004095][ C0] r9:00000040 r8:844c0680 r7:98ec0000 r6:844e9f00 r5:00000001 r4:847a83c0 [ 157.004501][ C0] [<81824ed4>] (can_rcv_filter) from [<81825914>] (can_receive+0xb4/0xf0) [ 157.005010][ C0] r9:00000040 r8:00000000 r7:844c0000 r6:84331fc0 r5:843b8000 r4:844e9f00 [ 157.005511][ C0] [<81825860>] (can_receive) from [<818259d4>] (can_rcv+0x84/0xac) [ 157.005985][ C0] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:81825950 r4:844e9f00 [ 157.006731][ C0] [<81825950>] (can_rcv) from [<814c4c54>] (__netif_receive_skb_one_core+0x5c/0x80) [ 157.007641][ C0] r5:81825950 r4:844c0000 [ 157.008262][ C0] [<814c4bf8>] (__netif_receive_skb_one_core) from [<814c4cc0>] (__netif_receive_skb+0x18/0x5c) [ 157.009444][ C0] r5:dddd11b0 r4:844e9f00 [ 157.010000][ C0] [<814c4ca8>] (__netif_receive_skb) from [<814c4fc8>] (process_backlog+0xa0/0x17c) [ 157.010498][ C0] r5:dddd11b0 r4:844e9f00 [ 157.010748][ C0] [<814c4f28>] (process_backlog) from [<814c5ed4>] (__napi_poll+0x34/0x240) [ 157.011357][ C0] r10:dddd10c0 r9:dddd1300 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd11b0 [ 157.011751][ C0] r4:00000001 [ 157.012199][ C0] [<814c5ea0>] (__napi_poll) from [<814c6748>] (net_rx_action+0x358/0x440) [ 157.013480][ C0] r9:dddd1300 r8:df801ed0 r7:0000012c r6:ffffc819 r5:dddd11b0 r4:00000000 [ 157.017838][ C0] [<814c63f0>] (net_rx_action) from [<8024b508>] (handle_softirqs+0x158/0x464) [ 157.018659][ C0] r10:00000008 r9:83496c00 r8:00000101 r7:00400040 r6:00000003 r5:00000004 [ 157.019145][ C0] r4:8260408c [ 157.019349][ C0] [<8024b3b0>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 157.019940][ C0] r10:00000000 r9:83496ce0 r8:82871084 r7:83496c00 r6:ecac8b10 r5:00000001 [ 157.020559][ C0] r4:60000013 [ 157.021673][ C0] [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14) [ 157.022442][ C0] [<802087f0>] (____do_softirq) from [<819740c4>] (call_with_stack+0x1c/0x20) [ 157.023969][ C0] [<819740a8>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c) [ 157.024621][ C0] [<80208804>] (do_softirq_own_stack) from [<8024ba20>] (do_softirq+0x5c/0x64) [ 157.027779][ C0] [<8024b9c4>] (do_softirq) from [<8024baf4>] (__local_bh_enable_ip+0xcc/0xd0) [ 157.030508][ C0] r5:00000001 r4:83496c00 [ 157.030955][ C0] [<8024ba28>] (__local_bh_enable_ip) from [<80202d6c>] (vfp_support_entry+0xac/0x2a0) [ 157.032938][ C0] r5:40000000 r4:dff5dfb0 [ 157.033349][ C0] [<80202cc0>] (vfp_support_entry) from [<8020c938>] (do_undefinstr+0xe4/0x1e0) [ 157.034167][ C0] r9:002862c4 r8:80202cc0 r7:ecac8b10 r6:0014d9b0 r5:dff5dfb0 r4:8261d084 [ 157.035370][ C0] [<8020c854>] (do_undefinstr) from [<80200fe4>] (__und_usr+0x84/0xa0) [ 157.037425][ C0] Exception stack(0xdff5dfb0 to 0xdff5dff8) [ 157.038375][ C0] dfa0: 015da550 00000000 0fffb0d6 00db9828 [ 157.039615][ C0] dfc0: 00000000 00000000 002862b8 00000000 00000000 002862c4 00000000 fffffffe [ 157.040313][ C0] dfe0: 015da578 7e836838 00024ff4 0014d9b0 20000010 ffffffff [ 157.040947][ C0] r9:002862c4 r8:824b1044 r7:83496c00 r6:ffffffff r5:20000010 r4:0014d9b4 [ 157.045883][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:43:22 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=fffd48d0 R02=df801a80 R03=3fffe3c3 R04=00000000 R05=3fffe3c3 R06=8262a2a4 R07=df801afc R08=df801af0 R09=00000000 R10=80000000 R11=df801abc R12=7fffe3c3 R13=df801a60 R14=00014b08 R15=802c416c PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=912e6000 R01=e043b000 R02=00000001 R03=80219a18 R04=7f029000 R05=00000001 R06=828c2b28 R07=7f029000 R08=e043b000 R09=8260cb10 R10=828c374c R11=dfdc5dbc R12=dfdc5dc0 R13=dfdc5d90 R14=802109fc R15=80219a30 PSR=80000113 N--- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=c1176c28 s05=ba4fffc1 d02=ba4fffc1c1176c28 s06=00000000 s07=00000000 d03=0000000000000000 s08=0c332980 s09=c29fe026 d04=c29fe0260c332980 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=2fef6a68 s17=3c7fd9b6 d08=3c7fd9b62fef6a68 s18=08382712 s19=00000000 d09=0000000008382712 s20=45028aba s21=02997e62 d10=02997e6245028aba s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=0010004b s41=060101c8 d20=060101c80010004b s42=02220800 s43=08004b80 d21=08004b8002220800 s44=044cc220 s45=00080604 d22=00080604044cc220 s46=00000000 s47=41fe0008 d23=41fe000800000000 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=88134bef s53=c3424ae2 d26=c3424ae288134bef s54=dfed1a0a s55=120f913c d27=120f913cdfed1a0a s56=86f78325 s57=6ea41206 d28=6ea4120686f78325 s58=cef7457e s59=020d1ccd d29=020d1ccdcef7457e s60=f038b9bd s61=36c03881 d30=36c03881f038b9bd s62=393d1770 s63=01a0da11 d31=01a0da11393d1770 FPSCR: 00000000