last executing test programs: 23.610221165s ago: executing program 0 (id=764): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCETHTOOL(r2, 0x8954, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000dc0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x11}, @remote, @val={@val={0x88a8, 0x1, 0x0, 0x3}, {0x8100, 0x7, 0x0, 0x2}}, {@x25={0x805, {0x0, 0x6, 0x9, "b29153634069f7b4d786cb8b3b519cbde00a25938d3199cfad25d26e478d75d297"}}}}, 0x0) 23.455873554s ago: executing program 0 (id=765): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x20, 0x22, 0x0, 0x1, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}]}, 0x3c}}, 0x0) 22.852518449s ago: executing program 0 (id=766): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r0, &(0x7f0000000f40)={0xa, 0x0, 0x0, @empty}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000000c0)=0x46, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x8, @remote}, 0x1c) 22.538970588s ago: executing program 0 (id=767): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000040000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000850000005000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) sigaltstack(0x0, 0x0) 22.050687332s ago: executing program 0 (id=768): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) 21.576321571s ago: executing program 0 (id=769): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018000000000000004f00000008020000000d00000000000001000000004c0065010700000001000085050000000b000000010000001d0e0000070000000100000f03000000020000000700000000010000d88b3c0000305f5f000000"], &(0x7f00000004c0), 0x6d, 0x0, 0x1, 0x0, 0x10000, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000540)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x17, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x64000600) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b3312d03009bcc3861f67f44a87942195f48fdf65313ddd7bab1f7dbe320cb6c9f15da99147ef1bde1a8c350f905d8ad42f6d53ba4976fd2d4faf62737a91e8c8fd648254ee3d281f1d5c7679b88c6417d7fc05fa4659865", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000000bb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) 3.901768859s ago: executing program 1 (id=783): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x12, 0x4, 0x4, 0xa4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000300), &(0x7f00000002c0)=@tcp6=r1}, 0x47) recvmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 1.322129209s ago: executing program 1 (id=784): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) fcntl$notify(r2, 0x402, 0x8000002d) 988.792152ms ago: executing program 1 (id=785): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000001000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 571.134582ms ago: executing program 1 (id=786): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @loopback}, 0x10) 389.992036ms ago: executing program 1 (id=787): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='nr_ino']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x6a1c2, 0x50) 0s ago: executing program 1 (id=788): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syslog(0x1, 0x0, 0x0) kernel console output (not intermixed with test programs): tag 0x0 [ 151.632435][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.632804][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.633149][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.633502][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.633857][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.634192][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.634597][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.634917][ T4447] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 151.658807][ T4447] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 153.322543][ T4201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.168041][ T31] audit: type=1400 audit(158.080:122): avc: denied { create } for pid=4628 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 158.365578][ T31] audit: type=1400 audit(158.270:123): avc: denied { ioctl } for pid=4628 comm="syz.1.104" path="socket:[3648]" dev="sockfs" ino=3648 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.619204][ T31] audit: type=1326 audit(159.530:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.635846][ T31] audit: type=1326 audit(159.540:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.636690][ T31] audit: type=1326 audit(159.540:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.648746][ T31] audit: type=1326 audit(159.560:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.655663][ T31] audit: type=1326 audit(159.560:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.668960][ T31] audit: type=1326 audit(159.580:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.681428][ T31] audit: type=1326 audit(159.590:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 159.684517][ T31] audit: type=1326 audit(159.590:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4638 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 163.316928][ T4201] veth0_vlan: entered promiscuous mode [ 163.347484][ T4201] veth1_vlan: entered promiscuous mode [ 163.500886][ T4201] veth0_macvtap: entered promiscuous mode [ 163.523106][ T4201] veth1_macvtap: entered promiscuous mode [ 163.618897][ T4201] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 163.619214][ T4201] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 163.619372][ T4201] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 163.619670][ T4201] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.844639][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 164.844704][ T31] audit: type=1400 audit(164.750:178): avc: denied { read } for pid=4684 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 168.116505][ T4696] netlink: 8 bytes leftover after parsing attributes in process `syz.0.116'. [ 168.144230][ T31] audit: type=1400 audit(168.050:179): avc: denied { getopt } for pid=4695 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 169.808299][ T31] audit: type=1400 audit(169.720:180): avc: denied { setopt } for pid=4694 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 169.900770][ T31] audit: type=1400 audit(169.810:181): avc: denied { write } for pid=4718 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 170.612773][ T4724] netlink: 36 bytes leftover after parsing attributes in process `syz.1.122'. [ 170.614824][ T4724] netlink: 16 bytes leftover after parsing attributes in process `syz.1.122'. [ 170.626242][ T4724] netlink: 36 bytes leftover after parsing attributes in process `syz.1.122'. [ 170.627166][ T4724] netlink: 36 bytes leftover after parsing attributes in process `syz.1.122'. [ 170.681202][ T4712] Zero length message leads to an empty skb [ 171.073052][ T31] audit: type=1400 audit(170.980:182): avc: denied { name_bind } for pid=4728 comm="syz.1.123" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 171.163824][ T4731] netlink: 256 bytes leftover after parsing attributes in process `syz.0.124'. [ 171.682509][ T4736] netlink: 16 bytes leftover after parsing attributes in process `syz.1.125'. [ 172.044907][ T31] audit: type=1400 audit(171.950:183): avc: denied { create } for pid=4742 comm="syz.1.129" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 172.205847][ T31] audit: type=1400 audit(172.110:184): avc: denied { name_bind } for pid=4742 comm="syz.1.129" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 172.796279][ T31] audit: type=1326 audit(172.700:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.130" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 172.798375][ T31] audit: type=1326 audit(172.700:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.130" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 172.817124][ T31] audit: type=1326 audit(172.730:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.130" exe="/syz-executor" sig=0 arch=40000028 syscall=357 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 172.818312][ T31] audit: type=1326 audit(172.730:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.130" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 172.822601][ T31] audit: type=1326 audit(172.730:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.130" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 173.359140][ T31] audit: type=1326 audit(173.270:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4754 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 176.462093][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 176.462414][ T31] audit: type=1400 audit(176.370:223): avc: denied { audit_write } for pid=4785 comm="syz.0.141" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 176.472232][ T31] audit: type=1107 audit(176.370:224): pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 176.857894][ T31] audit: type=1400 audit(176.770:225): avc: denied { setopt } for pid=4789 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 177.362649][ T31] audit: type=1400 audit(177.270:226): avc: denied { ioctl } for pid=4798 comm="syz.0.145" path="socket:[3002]" dev="sockfs" ino=3002 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.912596][ T4805] kernel profiling enabled (shift: 17) [ 178.170755][ T31] audit: type=1400 audit(178.080:227): avc: denied { map } for pid=4807 comm="syz.0.147" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 178.171748][ T31] audit: type=1400 audit(178.080:228): avc: denied { read write } for pid=4807 comm="syz.0.147" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 179.540766][ T31] audit: type=1400 audit(179.450:229): avc: denied { watch } for pid=4824 comm="syz.1.152" path="/104" dev="tmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 179.726383][ T4827] batadv_slave_0: entered promiscuous mode [ 179.893243][ T4830] capability: warning: `syz.1.153' uses 32-bit capabilities (legacy support in use) [ 180.796671][ T3808] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 181.011393][ T3808] usb 2-1: config index 0 descriptor too short (expected 45, got 36) [ 181.011973][ T3808] usb 2-1: config 0 has an invalid descriptor of length 255, skipping remainder of the config [ 181.012502][ T3808] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 21 [ 181.013139][ T3808] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 181.013525][ T3808] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 181.061059][ T3808] usb 2-1: config 0 descriptor?? [ 181.138976][ T3808] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 184.153393][ T4861] netlink: 20 bytes leftover after parsing attributes in process `syz.0.162'. [ 184.909286][ T4867] netlink: 20 bytes leftover after parsing attributes in process `syz.0.164'. [ 188.650188][ T31] audit: type=1400 audit(188.550:230): avc: denied { create } for pid=4866 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 188.682624][ T31] audit: type=1400 audit(188.590:231): avc: denied { write } for pid=4866 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 188.683625][ T31] audit: type=1400 audit(188.590:232): avc: denied { nlmsg_write } for pid=4866 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 190.882044][ T31] audit: type=1400 audit(190.790:233): avc: denied { create } for pid=4875 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 191.535791][ T4883] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 191.859112][ T4885] syz.0.169[4885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.859573][ T4885] syz.0.169[4885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.880493][ T4885] syz.0.169[4885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.449965][ T4888] netlink: 'syz.0.170': attribute type 4 has an invalid length. [ 192.450964][ T4888] netlink: 152 bytes leftover after parsing attributes in process `syz.0.170'. [ 193.743437][ T31] audit: type=1400 audit(193.650:234): avc: denied { read } for pid=4901 comm="syz.0.176" path="socket:[4164]" dev="sockfs" ino=4164 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 193.775807][ T31] audit: type=1326 audit(193.680:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4901 comm="syz.0.176" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 195.173324][ T4881] usb 2-1: USB disconnect, device number 2 [ 195.626586][ T31] audit: type=1326 audit(195.540:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.668757][ T31] audit: type=1326 audit(195.560:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.686766][ T31] audit: type=1326 audit(195.600:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.722285][ T31] audit: type=1326 audit(195.630:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.723938][ T31] audit: type=1326 audit(195.630:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.735577][ T31] audit: type=1326 audit(195.630:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.736357][ T31] audit: type=1326 audit(195.630:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 195.757767][ T31] audit: type=1326 audit(195.650:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4910 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.759075][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 198.759228][ T31] audit: type=1326 audit(198.670:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4936 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.762305][ T31] audit: type=1326 audit(198.670:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4936 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.763974][ T31] audit: type=1326 audit(198.670:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4936 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.798104][ T31] audit: type=1326 audit(198.690:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4936 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=97 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.834021][ T31] audit: type=1326 audit(198.690:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4936 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 198.852590][ T31] audit: type=1400 audit(198.760:269): avc: denied { mounton } for pid=4933 comm="syz.1.184" path="/proc/245/task" dev="proc" ino=4197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 199.020817][ T4934] EXT4-fs (vda): resizing filesystem from 262144 to 262144 blocks [ 199.160865][ T4942] mmap: syz.0.186 (4942) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 200.059926][ T4954] netlink: 7 bytes leftover after parsing attributes in process `syz.0.189'. [ 200.540841][ T4959] syz.1.191 uses obsolete (PF_INET,SOCK_PACKET) [ 200.606305][ T4960] netlink: 12 bytes leftover after parsing attributes in process `syz.0.190'. [ 202.401033][ T4984] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 202.415618][ T31] audit: type=1400 audit(202.310:270): avc: denied { create } for pid=4983 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 202.416779][ T31] audit: type=1400 audit(202.310:271): avc: denied { ioctl } for pid=4983 comm="syz.1.196" path="socket:[3963]" dev="sockfs" ino=3963 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 202.566138][ T31] audit: type=1400 audit(202.470:272): avc: denied { create } for pid=4985 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 202.586032][ T31] audit: type=1400 audit(202.490:273): avc: denied { connect } for pid=4985 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 204.957870][ T5012] process 'syz.0.206' launched './file0' with NULL argv: empty string added [ 204.965610][ T31] audit: type=1400 audit(204.860:274): avc: denied { execute } for pid=5011 comm="syz.0.206" name="file0" dev="tmpfs" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 204.967093][ T31] audit: type=1400 audit(204.870:275): avc: denied { execute_no_trans } for pid=5011 comm="syz.0.206" path="/63/file0" dev="tmpfs" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 205.230250][ T31] audit: type=1400 audit(205.140:276): avc: denied { create } for pid=5013 comm="syz.0.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 205.619617][ T31] audit: type=1400 audit(205.530:277): avc: denied { setopt } for pid=5016 comm="syz.0.208" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 205.631516][ T31] audit: type=1400 audit(205.540:278): avc: denied { write } for pid=5016 comm="syz.0.208" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 206.136067][ T31] audit: type=1400 audit(206.030:279): avc: denied { prog_load } for pid=5019 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 206.136919][ T31] audit: type=1400 audit(206.030:280): avc: denied { bpf } for pid=5019 comm="syz.0.209" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 206.137958][ T31] audit: type=1400 audit(206.030:281): avc: denied { perfmon } for pid=5019 comm="syz.0.209" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 206.141231][ T31] audit: type=1400 audit(206.050:282): avc: denied { read } for pid=5022 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 206.186659][ T31] audit: type=1400 audit(206.090:283): avc: denied { create } for pid=5022 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 208.742678][ T5036] netlink: 24 bytes leftover after parsing attributes in process `syz.0.213'. [ 208.948412][ T5039] netlink: 4 bytes leftover after parsing attributes in process `syz.0.214'. [ 209.969079][ T5047] netlink: 'syz.0.217': attribute type 27 has an invalid length. [ 210.313624][ T5047] batadv_slave_0: left promiscuous mode [ 210.587933][ T5047] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.588575][ T5047] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.588966][ T5047] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.589351][ T5047] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.704087][ T5049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.777181][ T5049] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.777531][ T5049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.789484][ T5049] veth1_vlan: left promiscuous mode [ 210.790385][ T5049] veth0_vlan: left promiscuous mode [ 210.791095][ T5049] veth0_vlan: entered promiscuous mode [ 210.792725][ T5049] veth1_vlan: entered promiscuous mode [ 210.797282][ T5049] veth1_macvtap: left promiscuous mode [ 210.798122][ T5049] veth0_macvtap: left promiscuous mode [ 210.798972][ T5049] veth0_macvtap: entered promiscuous mode [ 210.799725][ T5049] veth1_macvtap: entered promiscuous mode [ 210.800858][ T5049] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.801122][ T5049] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.801351][ T5049] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.801540][ T5049] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.045887][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 211.045994][ T31] audit: type=1400 audit(210.950:311): avc: denied { ioctl } for pid=5051 comm="syz.0.218" path="socket:[4303]" dev="sockfs" ino=4303 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 211.350844][ T31] audit: type=1400 audit(211.260:312): avc: denied { create } for pid=5053 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 212.822154][ T31] audit: type=1400 audit(212.730:313): avc: denied { create } for pid=5063 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 213.120477][ T31] audit: type=1326 audit(213.030:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.137409][ T31] audit: type=1326 audit(213.050:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.138853][ T31] audit: type=1326 audit(213.050:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.145899][ T31] audit: type=1326 audit(213.050:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.147041][ T31] audit: type=1326 audit(213.050:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.147671][ T31] audit: type=1326 audit(213.050:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.148244][ T31] audit: type=1326 audit(213.050:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5065 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 213.837545][ T5072] Driver unsupported XDP return value 0 on prog (id 205) dev N/A, expect packet loss! [ 214.634162][ T5081] fuse: Unknown parameter 'grou00000000000000000000' [ 218.511849][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 218.511912][ T31] audit: type=1400 audit(218.420:337): avc: denied { ioctl } for pid=5087 comm="syz.0.229" path="/dev/snd/seq" dev="devtmpfs" ino=727 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.950767][ T31] audit: type=1400 audit(220.860:338): avc: denied { sys_module } for pid=5105 comm="syz.0.237" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 221.842059][ T31] audit: type=1400 audit(221.750:339): avc: denied { audit_write } for pid=5111 comm="syz.0.238" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 221.846945][ T31] audit: type=1107 audit(221.760:340): pid=5111 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 222.288202][ T31] audit: type=1400 audit(222.200:341): avc: denied { execmem } for pid=5114 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 225.007852][ T5116] block device autoloading is deprecated and will be removed. [ 225.009100][ T5116] syz.0.239: attempt to access beyond end of device [ 225.009100][ T5116] loop128: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 229.432779][ T5131] syz.0.244[5131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.433135][ T5131] syz.0.244[5131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.433814][ T5131] syz.0.244[5131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.459304][ T31] audit: type=1400 audit(229.370:342): avc: denied { module_load } for pid=5130 comm="syz.0.244" path="/sys/kernel/notes" dev="sysfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 229.460809][ T5131] Invalid ELF header magic: != ELF [ 229.659079][ T31] audit: type=1400 audit(229.570:343): avc: denied { create } for pid=5132 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 230.431123][ T31] audit: type=1400 audit(230.340:344): avc: denied { watch watch_reads } for pid=5135 comm="syz.0.246" path="/proc/214" dev="proc" ino=4391 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 231.445806][ T31] audit: type=1400 audit(231.350:345): avc: denied { execute } for pid=5143 comm="syz.0.249" name="file1" dev="tmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 231.510751][ T31] audit: type=1400 audit(231.420:346): avc: denied { execute_no_trans } for pid=5143 comm="syz.0.249" path="/103/file1" dev="tmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 232.019894][ T31] audit: type=1326 audit(231.920:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 232.021555][ T31] audit: type=1326 audit(231.930:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 232.039915][ T31] audit: type=1326 audit(231.940:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 232.040870][ T31] audit: type=1326 audit(231.950:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 232.041577][ T31] audit: type=1326 audit(231.950:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 236.848505][ T5188] netlink: 'syz.0.263': attribute type 27 has an invalid length. [ 237.827437][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 237.827557][ T31] audit: type=1400 audit(237.740:363): avc: denied { execute } for pid=5191 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 237.857890][ T31] audit: type=1400 audit(237.740:364): avc: denied { execute_no_trans } for pid=5191 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 237.941982][ T31] audit: type=1400 audit(237.850:365): avc: denied { read } for pid=5192 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 237.943270][ T31] audit: type=1400 audit(237.850:366): avc: denied { open } for pid=5192 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 237.953468][ T31] audit: type=1400 audit(237.860:367): avc: denied { mounton } for pid=5192 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 238.131895][ T5188] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 238.132511][ T5188] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 238.133341][ T5188] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 238.133745][ T5188] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 238.763644][ T31] audit: type=1400 audit(238.670:368): avc: denied { mount } for pid=5198 comm="syz.0.265" name="/" dev="ramfs" ino=5302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 238.912861][ T31] audit: type=1400 audit(238.820:369): avc: denied { unmount } for pid=4201 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 239.042040][ T5204] fuse: Unknown parameter 'group_i00000000000000000000' [ 240.446468][ T5221] netlink: 'syz.0.268': attribute type 27 has an invalid length. [ 241.266994][ T5280] fuse: Unknown parameter 'group_id00000000000000000000' [ 242.111129][ T5290] netlink: 'syz.0.272': attribute type 27 has an invalid length. [ 242.782040][ T5303] fuse: Unknown parameter 'group_id00000000000000000000' [ 243.282616][ T31] audit: type=1400 audit(243.190:370): avc: denied { bind } for pid=5330 comm="syz.0.275" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.283930][ T31] audit: type=1400 audit(243.190:371): avc: denied { node_bind } for pid=5330 comm="syz.0.275" saddr=172.20.20.15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 243.320838][ T31] audit: type=1400 audit(243.220:372): avc: denied { connect } for pid=5330 comm="syz.0.275" laddr=172.20.20.15 lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.340702][ T31] audit: type=1400 audit(243.250:373): avc: denied { write } for pid=5330 comm="syz.0.275" laddr=172.20.20.15 lport=1 faddr=224.0.0.2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.730057][ T5350] netlink: 'syz.0.276': attribute type 27 has an invalid length. [ 243.932404][ T5350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.180856][ T5350] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 244.191103][ T5350] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.222042][ T5350] veth1_vlan: left promiscuous mode [ 244.225896][ T5350] veth0_vlan: left promiscuous mode [ 244.226939][ T5350] veth0_vlan: entered promiscuous mode [ 244.274139][ T5350] veth1_vlan: entered promiscuous mode [ 244.291779][ T5350] veth1_macvtap: left promiscuous mode [ 244.323783][ T5350] veth0_macvtap: left promiscuous mode [ 244.339700][ T5350] veth0_macvtap: entered promiscuous mode [ 244.358598][ T5350] veth1_macvtap: entered promiscuous mode [ 244.363658][ T5350] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.390487][ T5350] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.396869][ T5350] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.397187][ T5350] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.156250][ T5358] fuse: Unknown parameter 'group_id00000000000000000000' [ 245.499477][ T5192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.551395][ T5192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.087876][ T31] audit: type=1400 audit(246.000:374): avc: denied { ioctl } for pid=5375 comm="syz.0.279" path="socket:[5374]" dev="sockfs" ino=5374 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 247.094768][ T5420] netlink: 'syz.0.280': attribute type 27 has an invalid length. [ 248.541669][ T5420] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.542367][ T5420] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.542774][ T5420] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.543152][ T5420] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 248.750704][ T5421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.009672][ T5421] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 249.010529][ T5421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.014539][ T5421] veth1_vlan: left promiscuous mode [ 249.040382][ T5421] veth0_vlan: left promiscuous mode [ 249.041723][ T5421] veth0_vlan: entered promiscuous mode [ 249.044372][ T5421] veth1_vlan: entered promiscuous mode [ 249.048338][ T5421] veth1_macvtap: left promiscuous mode [ 249.049626][ T5421] veth0_macvtap: left promiscuous mode [ 249.109035][ T5421] veth0_macvtap: entered promiscuous mode [ 249.110972][ T5421] veth1_macvtap: entered promiscuous mode [ 249.112803][ T5421] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.113243][ T5421] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.113626][ T5421] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.113995][ T5421] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.439457][ T31] audit: type=1400 audit(249.350:375): avc: denied { write } for pid=5450 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 249.653920][ T5454] fuse: Bad value for 'user_id' [ 249.654265][ T5454] fuse: Bad value for 'user_id' [ 249.847408][ T31] audit: type=1326 audit(249.750:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.858351][ T31] audit: type=1326 audit(249.770:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.861025][ T31] audit: type=1326 audit(249.770:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.861711][ T5457] syz.0.283[5457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.863306][ T5457] syz.0.283[5457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.889836][ T5457] syz.0.283[5457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.898189][ T31] audit: type=1326 audit(249.810:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.903579][ T31] audit: type=1326 audit(249.810:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.904319][ T31] audit: type=1326 audit(249.810:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.921662][ T31] audit: type=1326 audit(249.810:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=107 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 249.922464][ T31] audit: type=1326 audit(249.810:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5455 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 250.359346][ T31] audit: type=1400 audit(250.270:384): avc: denied { create } for pid=5461 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 250.508229][ T5192] hsr_slave_0: entered promiscuous mode [ 250.509951][ T5192] hsr_slave_1: entered promiscuous mode [ 250.512547][ T5192] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 250.512805][ T5192] Cannot create hsr debugfs directory [ 251.588414][ T5192] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.722946][ T5192] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.897290][ T5192] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 252.066519][ T5192] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 252.414146][ T5192] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 252.429434][ T5192] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 252.447088][ T5192] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 252.452843][ T5192] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 255.191382][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 255.191498][ T31] audit: type=1400 audit(255.100:392): avc: denied { create } for pid=5594 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 255.234061][ T31] audit: type=1326 audit(255.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.250788][ T31] audit: type=1326 audit(255.160:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.251710][ T31] audit: type=1326 audit(255.160:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.266782][ T31] audit: type=1326 audit(255.160:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.267651][ T31] audit: type=1326 audit(255.160:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.285694][ T31] audit: type=1326 audit(255.180:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.292543][ T31] audit: type=1326 audit(255.200:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.311581][ T31] audit: type=1326 audit(255.220:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.312640][ T31] audit: type=1326 audit(255.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 255.386662][ T5192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.199593][ T5607] netlink: 'syz.0.296': attribute type 27 has an invalid length. [ 257.831127][ T5607] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.849567][ T5607] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.850107][ T5607] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.850475][ T5607] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.174267][ T5609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.389870][ T5609] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 258.390666][ T5609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.406751][ T5609] veth1_vlan: left promiscuous mode [ 258.409307][ T5609] veth0_vlan: left promiscuous mode [ 258.410646][ T5609] veth0_vlan: entered promiscuous mode [ 258.437981][ T5609] veth1_vlan: entered promiscuous mode [ 258.467057][ T5609] veth1_macvtap: left promiscuous mode [ 258.470134][ T5609] veth0_macvtap: left promiscuous mode [ 258.481414][ T5609] veth0_macvtap: entered promiscuous mode [ 258.497540][ T5609] veth1_macvtap: entered promiscuous mode [ 258.500058][ T5609] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.500569][ T5609] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.500973][ T5609] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.501389][ T5609] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.792869][ T5192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 261.099733][ T5634] netlink: 'syz.0.301': attribute type 27 has an invalid length. [ 262.433089][ T5634] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.433788][ T5634] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.434211][ T5634] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.439361][ T5634] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.656951][ T5636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.961043][ T5636] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 262.961601][ T5636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 262.981829][ T5636] veth1_vlan: left promiscuous mode [ 262.988464][ T5636] veth0_vlan: left promiscuous mode [ 262.997970][ T5636] veth0_vlan: entered promiscuous mode [ 263.000871][ T5636] veth1_vlan: entered promiscuous mode [ 263.017702][ T5636] veth1_macvtap: left promiscuous mode [ 263.021016][ T5636] veth0_macvtap: left promiscuous mode [ 263.029501][ T5636] veth0_macvtap: entered promiscuous mode [ 263.038382][ T5636] veth1_macvtap: entered promiscuous mode [ 263.049303][ T5636] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.050920][ T5636] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.051560][ T5636] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.051946][ T5636] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.070974][ T5656] fuse: Bad value for 'user_id' [ 265.073090][ T5656] fuse: Bad value for 'user_id' [ 265.917196][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 265.917288][ T31] audit: type=1400 audit(265.800:407): avc: denied { bind } for pid=5665 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.971656][ T31] audit: type=1400 audit(265.880:408): avc: denied { setopt } for pid=5665 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 266.423311][ T31] audit: type=1400 audit(266.330:409): avc: denied { ioctl } for pid=5665 comm="syz.0.310" path="socket:[5563]" dev="sockfs" ino=5563 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 266.778658][ T5671] fuse: Bad value for 'fd' [ 267.698802][ T31] audit: type=1400 audit(267.610:410): avc: denied { mount } for pid=5680 comm="syz.0.314" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 268.066670][ T5192] veth0_vlan: entered promiscuous mode [ 268.140821][ T5192] veth1_vlan: entered promiscuous mode [ 268.468872][ T5192] veth0_macvtap: entered promiscuous mode [ 268.521109][ T5192] veth1_macvtap: entered promiscuous mode [ 268.796251][ T5192] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.797682][ T5192] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.798263][ T5192] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.799286][ T5192] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.967221][ T31] audit: type=1400 audit(268.870:411): avc: denied { mounton } for pid=5192 comm="syz-executor" path="/syzkaller.o8BG4Z/syz-tmp" dev="vda" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 268.969028][ T31] audit: type=1400 audit(268.880:412): avc: denied { mount } for pid=5192 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 268.982101][ T31] audit: type=1400 audit(268.880:413): avc: denied { mount } for pid=5192 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 268.983125][ T31] audit: type=1400 audit(268.890:414): avc: denied { mounton } for pid=5192 comm="syz-executor" path="/syzkaller.o8BG4Z/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 268.996764][ T31] audit: type=1400 audit(268.890:415): avc: denied { mounton } for pid=5192 comm="syz-executor" path="/syzkaller.o8BG4Z/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4969 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 269.074138][ T31] audit: type=1400 audit(268.980:416): avc: denied { unmount } for pid=5192 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 269.671013][ C0] hrtimer: interrupt took 5375648 ns [ 269.810657][ T5686] netlink: 24 bytes leftover after parsing attributes in process `syz.1.264'. [ 273.917713][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 273.917785][ T31] audit: type=1400 audit(273.830:421): avc: denied { create } for pid=5718 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 273.921800][ T31] audit: type=1326 audit(273.830:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 273.937111][ T31] audit: type=1326 audit(273.850:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130cb8 code=0x7ffc0000 [ 273.951470][ T31] audit: type=1326 audit(273.860:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130cb8 code=0x7ffc0000 [ 273.952029][ T31] audit: type=1326 audit(273.860:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 273.961024][ T31] audit: type=1326 audit(273.860:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=133 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 273.990130][ T31] audit: type=1326 audit(273.870:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 273.991170][ T31] audit: type=1326 audit(273.890:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 273.996128][ T31] audit: type=1400 audit(273.900:429): avc: denied { mounton } for pid=5718 comm="syz.1.325" path="/proc/16/task" dev="proc" ino=5626 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 274.000783][ T31] audit: type=1326 audit(273.910:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5718 comm="syz.1.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 278.960855][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 278.960984][ T31] audit: type=1400 audit(278.870:445): avc: denied { ioctl } for pid=5750 comm="syz.0.337" path="socket:[5071]" dev="sockfs" ino=5071 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 279.473833][ T5753] netlink: 4 bytes leftover after parsing attributes in process `syz.0.337'. [ 282.132068][ T5771] sock: sock_timestamping_bind_phc: sock not bind to device [ 282.132204][ T31] audit: type=1400 audit(282.040:446): avc: denied { setopt } for pid=5769 comm="syz.0.342" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 282.530015][ T31] audit: type=1400 audit(282.440:447): avc: denied { create } for pid=5772 comm="syz.0.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 283.175574][ T31] audit: type=1326 audit(283.070:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.187773][ T31] audit: type=1326 audit(283.100:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.192513][ T31] audit: type=1326 audit(283.100:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.193976][ T31] audit: type=1326 audit(283.100:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.197697][ T31] audit: type=1326 audit(283.100:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.206735][ T31] audit: type=1326 audit(283.120:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 283.228167][ T31] audit: type=1326 audit(283.130:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5779 comm="syz.0.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 285.018649][ T5791] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 300.300500][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 300.300647][ T31] audit: type=1400 audit(300.210:468): avc: denied { create } for pid=5807 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 300.336717][ T31] audit: type=1400 audit(300.240:469): avc: denied { setopt } for pid=5807 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 300.711537][ T5810] netlink: 8 bytes leftover after parsing attributes in process `syz.1.353'. [ 303.572913][ T31] audit: type=1400 audit(303.480:470): avc: denied { connect } for pid=5823 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 306.386006][ T31] audit: type=1326 audit(306.290:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.420529][ T31] audit: type=1326 audit(306.330:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.430739][ T31] audit: type=1326 audit(306.340:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.432135][ T31] audit: type=1326 audit(306.340:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.433075][ T31] audit: type=1326 audit(306.340:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.457654][ T31] audit: type=1326 audit(306.360:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.459805][ T31] audit: type=1326 audit(306.360:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.460782][ T31] audit: type=1326 audit(306.370:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.467925][ T31] audit: type=1326 audit(306.370:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 306.476185][ T31] audit: type=1326 audit(306.380:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5842 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=77 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 307.509011][ T5851] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 308.197454][ T5854] €: renamed from bond0 (while UP) [ 309.407012][ T5861] fuse: Unknown parameter 'user_00000000000000000000' [ 309.843655][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 309.844583][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 310.181004][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 310.182123][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 311.004025][ T5878] fuse: Unknown parameter 'user_id00000000000000000000' [ 311.220785][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 311.224207][ T5865] netlink: 60 bytes leftover after parsing attributes in process `syz.1.370'. [ 311.537910][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 311.538006][ T31] audit: type=1326 audit(311.450:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.540289][ T31] audit: type=1326 audit(311.450:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.541155][ T31] audit: type=1326 audit(311.450:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.557566][ T31] audit: type=1326 audit(311.460:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.558509][ T31] audit: type=1326 audit(311.470:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.560829][ T31] audit: type=1326 audit(311.470:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.565797][ T31] audit: type=1326 audit(311.470:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.566734][ T31] audit: type=1326 audit(311.470:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.582071][ T31] audit: type=1326 audit(311.480:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.583024][ T31] audit: type=1326 audit(311.490:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5882 comm="syz.1.376" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 312.158804][ T5896] fuse: Unknown parameter 'user_id00000000000000000000' [ 313.707818][ T5911] fuse: Unknown parameter 'user_id00000000000000000000' [ 315.778876][ T5922] netlink: 48 bytes leftover after parsing attributes in process `syz.0.388'. [ 315.971995][ T5924] fuse: Bad value for 'fd' [ 318.131648][ T5937] fuse: Bad value for 'fd' [ 318.459289][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 318.459382][ T31] audit: type=1400 audit(318.370:568): avc: denied { connect } for pid=5938 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 319.011902][ T31] audit: type=1400 audit(318.920:569): avc: denied { create } for pid=5941 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 319.042712][ T5942] netlink: 4 bytes leftover after parsing attributes in process `syz.0.396'. [ 319.137473][ T5942] hsr_slave_1 (unregistering): left promiscuous mode [ 322.031821][ T5954] fuse: Bad value for 'fd' [ 322.824155][ T31] audit: type=1326 audit(322.730:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.832546][ T31] audit: type=1326 audit(322.730:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.853212][ T31] audit: type=1326 audit(322.750:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.854361][ T31] audit: type=1326 audit(322.750:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.858134][ T31] audit: type=1326 audit(322.750:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.858701][ T31] audit: type=1326 audit(322.760:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.859151][ T31] audit: type=1326 audit(322.760:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 322.859598][ T31] audit: type=1326 audit(322.760:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 323.459881][ T5974] fuse: Unknown parameter '0x0000000000000003' [ 323.935750][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 323.935819][ T31] audit: type=1400 audit(323.840:584): avc: denied { write } for pid=5978 comm="syz.1.406" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 323.974448][ T5981] netlink: 'syz.0.407': attribute type 10 has an invalid length. [ 323.979393][ T5981] netlink: 'syz.0.407': attribute type 10 has an invalid length. [ 324.025491][ T31] audit: type=1400 audit(323.930:585): avc: denied { shutdown } for pid=5978 comm="syz.1.406" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 324.177988][ T31] audit: type=1400 audit(324.090:586): avc: denied { create } for pid=5983 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 324.224713][ T31] audit: type=1400 audit(324.130:587): avc: denied { ioctl } for pid=5983 comm="syz.0.408" path="socket:[6352]" dev="sockfs" ino=6352 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 324.454573][ T5990] fuse: Unknown parameter '0x0000000000000003' [ 324.694483][ T31] audit: type=1400 audit(324.600:588): avc: denied { unmount } for pid=5192 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 324.838635][ T31] audit: type=1326 audit(324.750:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5997 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 324.846327][ T31] audit: type=1326 audit(324.750:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5997 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 324.847432][ T31] audit: type=1326 audit(324.750:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5997 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 324.866449][ T31] audit: type=1326 audit(324.760:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5997 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 324.867952][ T31] audit: type=1326 audit(324.770:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5997 comm="syz.1.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 326.501553][ T6012] fuse: Unknown parameter '0x0000000000000003' [ 327.155011][ T6020] netlink: 340 bytes leftover after parsing attributes in process `syz.1.419'. [ 327.421467][ T6026] fuse: Unknown parameter '0x0000000000000003' [ 328.350608][ T6037] pim6reg1: entered promiscuous mode [ 328.351082][ T6037] pim6reg1: entered allmulticast mode [ 329.132197][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 329.132319][ T31] audit: type=1400 audit(329.040:612): avc: denied { write } for pid=6047 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 329.156833][ T31] audit: type=1400 audit(329.060:613): avc: denied { read } for pid=6047 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 329.204800][ T31] audit: type=1400 audit(329.110:614): avc: denied { watch watch_reads } for pid=6048 comm="syz.1.429" path="/48" dev="tmpfs" ino=261 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 329.720997][ T6052] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 329.983376][ T31] audit: type=1400 audit(329.890:615): avc: denied { create } for pid=6055 comm="syz.0.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 330.704748][ T31] audit: type=1400 audit(330.610:616): avc: denied { relabelfrom } for pid=6055 comm="syz.0.431" name="" dev="pipefs" ino=6027 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 330.708631][ T6067] SELinux: Context system_u:object_r:dhcp_state_t:s0 is not valid (left unmapped). [ 330.715913][ T31] audit: type=1400 audit(330.620:617): avc: denied { mac_admin } for pid=6055 comm="syz.0.431" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 330.730541][ T31] audit: type=1400 audit(330.620:618): avc: denied { relabelto } for pid=6055 comm="syz.0.431" name="" dev="pipefs" ino=6027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:dhcp_state_t:s0" [ 333.584007][ T6099] syz.1.444[6099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.587909][ T6099] syz.1.444[6099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.591916][ T6099] syz.1.444[6099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.601653][ T31] audit: type=1400 audit(333.510:619): avc: denied { name_bind } for pid=6096 comm="syz.0.443" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 335.142485][ T31] audit: type=1326 audit(335.050:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.168791][ T31] audit: type=1326 audit(335.070:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.172487][ T31] audit: type=1326 audit(335.070:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.216627][ T31] audit: type=1326 audit(335.070:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.217764][ T31] audit: type=1326 audit(335.110:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.228393][ T31] audit: type=1326 audit(335.140:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.235847][ T31] audit: type=1326 audit(335.140:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.237350][ T31] audit: type=1326 audit(335.140:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.241408][ T31] audit: type=1326 audit(335.150:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.242146][ T31] audit: type=1326 audit(335.150:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6121 comm="syz.1.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 336.277887][ T6142] netlink: 28 bytes leftover after parsing attributes in process `syz.1.456'. [ 340.186978][ T6206] netlink: 132 bytes leftover after parsing attributes in process `syz.0.474'. [ 341.869727][ T6220] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 342.831075][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 342.831198][ T31] audit: type=1400 audit(342.740:643): avc: denied { write } for pid=6229 comm="syz.0.480" path="socket:[7241]" dev="sockfs" ino=7241 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 342.832848][ T31] audit: type=1400 audit(342.740:644): avc: denied { nlmsg_write } for pid=6229 comm="syz.0.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 342.836132][ T6230] netlink: 4 bytes leftover after parsing attributes in process `syz.1.479'. [ 344.188577][ T31] audit: type=1326 audit(344.100:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.192774][ T31] audit: type=1326 audit(344.100:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.220809][ T31] audit: type=1326 audit(344.130:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.222727][ T31] audit: type=1326 audit(344.130:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.241662][ T31] audit: type=1326 audit(344.150:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=437 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.242576][ T31] audit: type=1326 audit(344.150:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.243732][ T31] audit: type=1326 audit(344.150:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6247 comm="syz.0.487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.459541][ T31] audit: type=1326 audit(344.370:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6252 comm="syz.1.488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 344.571848][ T6256] netlink: 8 bytes leftover after parsing attributes in process `syz.0.489'. [ 346.429015][ T6283] fuse: Unknown parameter 'fd0x0000000000000003' [ 348.906895][ T6313] netlink: 12 bytes leftover after parsing attributes in process `syz.0.506'. [ 348.944725][ T6313] netdevsim netdevsim0 netdevsim0: left promiscuous mode [ 349.837845][ T6331] netlink: 12 bytes leftover after parsing attributes in process `syz.0.512'. [ 350.970591][ T6346] netlink: 12 bytes leftover after parsing attributes in process `syz.0.518'. [ 351.579036][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 351.579145][ T31] audit: type=1326 audit(351.490:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.580343][ T31] audit: type=1326 audit(351.490:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.586376][ T31] audit: type=1326 audit(351.490:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.587384][ T31] audit: type=1326 audit(351.490:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.588428][ T31] audit: type=1326 audit(351.490:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.610479][ T31] audit: type=1326 audit(351.520:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.625773][ T31] audit: type=1326 audit(351.520:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.626863][ T31] audit: type=1326 audit(351.520:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6350 comm="syz.0.521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.935803][ T31] audit: type=1326 audit(351.840:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6354 comm="syz.1.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 351.942020][ T31] audit: type=1326 audit(351.850:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6354 comm="syz.1.522" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 352.564905][ T6364] netlink: 40 bytes leftover after parsing attributes in process `syz.1.524'. [ 358.328678][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 358.328783][ T31] audit: type=1326 audit(358.240:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.340152][ T31] audit: type=1326 audit(358.240:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.359798][ T31] audit: type=1326 audit(358.250:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.361115][ T31] audit: type=1326 audit(358.250:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.362637][ T31] audit: type=1326 audit(358.250:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.363532][ T31] audit: type=1326 audit(358.260:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=238 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.364174][ T31] audit: type=1326 audit(358.260:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.364842][ T31] audit: type=1326 audit(358.270:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 358.457770][ T6416] netlink: 12 bytes leftover after parsing attributes in process `syz.1.542'. [ 359.246578][ T6424] vlan2: entered promiscuous mode [ 359.248249][ T6424] ip6gretap0: entered promiscuous mode [ 359.313810][ T6424] ip6gretap0: left promiscuous mode [ 359.729854][ T6437] netlink: 12 bytes leftover after parsing attributes in process `syz.1.548'. [ 360.226254][ T31] audit: type=1326 audit(360.130:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6441 comm="syz.0.550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 360.246661][ T31] audit: type=1326 audit(360.150:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6441 comm="syz.0.550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 363.272539][ T6463] netlink: 8 bytes leftover after parsing attributes in process `syz.1.555'. [ 364.456622][ T6476] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 364.737431][ T6476] usb 2-1: config index 0 descriptor too short (expected 45, got 36) [ 364.741946][ T6476] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 21 [ 364.746262][ T6476] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 364.746650][ T6476] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 364.751415][ T6476] usb 2-1: config 0 descriptor?? [ 364.764027][ T6476] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 368.156087][ T6493] netlink: 12 bytes leftover after parsing attributes in process `syz.0.563'. [ 371.397010][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 371.397125][ T31] audit: type=1326 audit(371.310:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6496 comm="syz.0.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7fc00000 [ 375.548196][ T6511] syz.0.567[6511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.552150][ T6511] syz.0.567[6511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.552836][ T6511] syz.0.567[6511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.075628][ T31] audit: type=1326 audit(375.970:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.0.568" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 376.089603][ T31] audit: type=1326 audit(375.990:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.0.568" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 376.090251][ T31] audit: type=1326 audit(376.000:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.0.568" exe="/syz-executor" sig=0 arch=40000028 syscall=77 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 376.090768][ T31] audit: type=1326 audit(376.000:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.0.568" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.375741][ T31] audit: type=1326 audit(378.280:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6519 comm="syz.0.570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.377013][ T31] audit: type=1326 audit(378.280:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6519 comm="syz.0.570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.377657][ T31] audit: type=1326 audit(378.290:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6519 comm="syz.0.570" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.378810][ T31] audit: type=1326 audit(378.290:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6519 comm="syz.0.570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.380284][ T31] audit: type=1326 audit(378.290:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6519 comm="syz.0.570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 379.109825][ T6524] usb 2-1: USB disconnect, device number 3 [ 381.005710][ T6409] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 381.184206][ T6409] usb 1-1: config index 0 descriptor too short (expected 45, got 36) [ 381.184621][ T6409] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 381.185288][ T6409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 381.187241][ T6409] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 381.187786][ T6409] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 381.188315][ T6409] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 381.188680][ T6409] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 381.216455][ T6409] usb 1-1: config 0 descriptor?? [ 381.221151][ T6545] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 381.685710][ T6409] plantronics 0003:047F:FFFF.0002: unknown main item tag 0xd [ 381.691337][ T6409] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 381.753111][ T6409] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 381.963514][ T3937] usb 1-1: USB disconnect, device number 2 [ 382.540432][ T31] audit: type=1400 audit(382.450:726): avc: denied { write } for pid=6572 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 384.390375][ T3941] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 384.627043][ T3941] usb 1-1: config index 0 descriptor too short (expected 45, got 36) [ 384.630330][ T3941] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 384.631063][ T3941] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 384.631615][ T3941] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 384.632479][ T3941] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 384.633170][ T3941] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 384.633559][ T3941] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.640433][ T3941] usb 1-1: config 0 descriptor?? [ 384.653852][ T6581] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 385.084523][ T3941] plantronics 0003:047F:FFFF.0003: unknown main item tag 0xd [ 385.094851][ T3941] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 385.101682][ T3941] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 385.361909][ T3941] usb 1-1: USB disconnect, device number 3 [ 386.735587][ T6612] netlink: 'syz.0.585': attribute type 10 has an invalid length. [ 386.756646][ T6612] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 387.411391][ T6543] SELinux: Context system_u:object_r:zero_device_t:s0 is not valid (left unmapped). [ 387.413988][ T31] audit: type=1400 audit(387.320:727): avc: denied { relabelfrom } for pid=6542 comm="syz.1.576" name="UNIX" dev="sockfs" ino=6971 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 387.426019][ T31] audit: type=1400 audit(387.320:728): avc: denied { relabelto } for pid=6542 comm="syz.1.576" name="UNIX" dev="sockfs" ino=6971 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=unix_dgram_socket permissive=1 trawcon="system_u:object_r:zero_device_t:s0" [ 390.410139][ T31] audit: type=1326 audit(390.320:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.412827][ T31] audit: type=1326 audit(390.320:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.459531][ T31] audit: type=1326 audit(390.370:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.460297][ T31] audit: type=1326 audit(390.370:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.460892][ T31] audit: type=1326 audit(390.370:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.464624][ T31] audit: type=1326 audit(390.370:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.468167][ T31] audit: type=1326 audit(390.380:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 390.469324][ T31] audit: type=1326 audit(390.380:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6640 comm="syz.0.594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 392.852965][ T6662] netlink: 8 bytes leftover after parsing attributes in process `syz.0.601'. [ 393.159986][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 393.160100][ T31] audit: type=1326 audit(393.070:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6663 comm="syz.0.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 393.161864][ T31] audit: type=1326 audit(393.070:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6663 comm="syz.0.602" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x1313dc code=0x7ffc0000 [ 393.167500][ T31] audit: type=1326 audit(393.070:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6663 comm="syz.0.602" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160204 code=0x7ffc0000 [ 393.387613][ T31] audit: type=1326 audit(393.300:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6663 comm="syz.0.602" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 393.852241][ T6672] netlink: 140 bytes leftover after parsing attributes in process `syz.1.605'. [ 393.987111][ T31] audit: type=1400 audit(393.900:747): avc: denied { read } for pid=6669 comm="syz.0.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 397.260375][ T31] audit: type=1326 audit(397.170:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 397.263491][ T31] audit: type=1326 audit(397.170:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 397.281598][ T31] audit: type=1326 audit(397.190:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 400.322212][ T6708] netlink: 12 bytes leftover after parsing attributes in process `syz.0.618'. [ 400.382470][ T6708] netdevsim netdevsim0 netdevsim3: left promiscuous mode [ 401.090479][ T31] audit: type=1400 audit(401.000:751): avc: denied { nlmsg_write } for pid=6713 comm="syz.0.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 401.545862][ T6720] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 401.815122][ T6720] usb 1-1: config index 0 descriptor too short (expected 45, got 36) [ 401.830820][ T6720] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 401.831942][ T6720] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 401.834046][ T6720] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 401.845964][ T6720] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 401.846487][ T6720] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 401.846826][ T6720] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 401.851304][ T6720] usb 1-1: config 0 descriptor?? [ 401.853482][ T6716] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 402.303558][ T6720] plantronics 0003:047F:FFFF.0004: unknown main item tag 0xd [ 402.308956][ T6720] plantronics 0003:047F:FFFF.0004: No inputs registered, leaving [ 402.329078][ T6720] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 402.619616][ T6720] usb 1-1: USB disconnect, device number 4 [ 403.768858][ T31] audit: type=1326 audit(403.680:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.773380][ T31] audit: type=1326 audit(403.680:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.776050][ T31] audit: type=1326 audit(403.680:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.780003][ T31] audit: type=1326 audit(403.690:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.783518][ T31] audit: type=1326 audit(403.690:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.787032][ T31] audit: type=1326 audit(403.700:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.788663][ T31] audit: type=1326 audit(403.700:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.841558][ T6749] syz.1.624[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.841965][ T6749] syz.1.624[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.842925][ T6749] syz.1.624[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.846733][ T31] audit: type=1326 audit(403.750:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 403.848791][ T31] audit: type=1326 audit(403.750:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6747 comm="syz.1.624" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 404.190951][ T6756] netlink: 24 bytes leftover after parsing attributes in process `syz.1.627'. [ 408.850519][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 408.850640][ T31] audit: type=1400 audit(408.760:776): avc: denied { ioctl } for pid=6813 comm="syz.1.639" path="socket:[7777]" dev="sockfs" ino=7777 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 409.532867][ T6821] netlink: 268 bytes leftover after parsing attributes in process `syz.1.642'. [ 410.792901][ T6843] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 410.794165][ T6843] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 410.805800][ T6843] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 412.788435][ T6856] capability: warning: `syz.0.653' uses deprecated v2 capabilities in a way that may be insecure [ 413.417149][ T31] audit: type=1400 audit(413.320:777): avc: denied { getattr } for pid=6863 comm="syz.0.656" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 413.508420][ T6864] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.770891][ T6864] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.903295][ T6864] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.980319][ T6874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=6874 comm=syz.1.655 [ 420.275527][ T31] audit: type=1400 audit(420.170:778): avc: denied { mount } for pid=6883 comm="syz.0.660" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 420.305978][ T31] audit: type=1400 audit(420.210:779): avc: denied { unmount } for pid=4201 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 424.137333][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x1 [ 424.140952][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.148170][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.148751][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.149150][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.163677][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.174690][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.176061][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.176472][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.176875][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.177450][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.177890][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.178269][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.178705][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.179097][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.179485][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.179891][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.180380][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.181503][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.200209][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.215777][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.216313][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.217162][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.217609][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.218006][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.218458][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.218877][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.219282][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.220680][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.235797][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.236380][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.255641][ T6876] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 424.289191][ T6876] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 427.858615][ T6918] netlink: 'syz.0.669': attribute type 7 has an invalid length. [ 431.933769][ T6927] netlink: 12 bytes leftover after parsing attributes in process `syz.0.672'. [ 432.529233][ T31] audit: type=1400 audit(432.440:780): avc: denied { create } for pid=6928 comm="syz.0.673" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 432.537194][ T31] audit: type=1400 audit(432.450:781): avc: denied { mounton } for pid=6928 comm="syz.0.673" path="/371/file0" dev="tmpfs" ino=1945 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 432.537963][ T31] audit: type=1400 audit(432.450:782): avc: denied { mount } for pid=6928 comm="syz.0.673" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 432.592334][ T31] audit: type=1400 audit(432.500:783): avc: denied { unlink } for pid=4201 comm="syz-executor" name="file0" dev="tmpfs" ino=1945 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 436.840339][ T6864] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 437.208872][ T6864] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.229403][ T6864] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.249331][ T6864] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.253383][ T6864] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.627100][ T6946] netlink: 16 bytes leftover after parsing attributes in process `syz.1.676'. [ 437.851059][ T6948] netlink: 12 bytes leftover after parsing attributes in process `syz.1.677'. [ 440.489052][ T6961] syz.1.681[6961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.489288][ T6961] syz.1.681[6961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.489699][ T6961] syz.1.681[6961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.203786][ T6964] netlink: 12 bytes leftover after parsing attributes in process `syz.1.682'. [ 443.600627][ T6977] netlink: 12 bytes leftover after parsing attributes in process `syz.1.687'. [ 444.667777][ T31] audit: type=1326 audit(444.580:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.680236][ T31] audit: type=1326 audit(444.590:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.698470][ T31] audit: type=1326 audit(444.610:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.699344][ T31] audit: type=1326 audit(444.610:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.709696][ T31] audit: type=1326 audit(444.610:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.710579][ T31] audit: type=1326 audit(444.610:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.711275][ T31] audit: type=1326 audit(444.610:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.711887][ T31] audit: type=1326 audit(444.610:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.721379][ T31] audit: type=1326 audit(444.620:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.746465][ T31] audit: type=1326 audit(444.660:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6984 comm="syz.1.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 445.409585][ T6990] netlink: 12 bytes leftover after parsing attributes in process `syz.1.692'. [ 449.821827][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 449.822835][ T31] audit: type=1400 audit(449.730:803): avc: denied { create } for pid=7000 comm="syz.1.696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 451.949824][ T7005] netlink: 12 bytes leftover after parsing attributes in process `syz.1.697'. [ 452.484339][ T7007] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 453.182728][ T31] audit: type=1400 audit(453.090:804): avc: denied { bind } for pid=7010 comm="syz.1.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 453.196703][ T7011] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 456.119520][ T7018] netlink: 12 bytes leftover after parsing attributes in process `syz.1.702'. [ 460.887758][ T7038] tmpfs: Unsupported parameter 'mpol' [ 465.151235][ T31] audit: type=1400 audit(465.060:805): avc: denied { create } for pid=7054 comm="syz.1.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 465.258658][ T31] audit: type=1400 audit(465.170:806): avc: denied { sys_admin } for pid=7054 comm="syz.1.715" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 465.260600][ T31] audit: type=1400 audit(465.170:807): avc: denied { checkpoint_restore } for pid=7054 comm="syz.1.715" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 474.897858][ T1036] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.938061][ T7057] netlink: 12 bytes leftover after parsing attributes in process `syz.1.716'. [ 475.177230][ T1036] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.264828][ T1036] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.402947][ T1036] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.093332][ T1036] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 476.156103][ T1036] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 476.208906][ T1036] bond0 (unregistering): Released all slaves [ 476.375661][ T1036] hsr_slave_0: left promiscuous mode [ 476.416786][ T1036] veth1_macvtap: left promiscuous mode [ 476.423836][ T1036] veth0_macvtap: left promiscuous mode [ 476.424574][ T1036] veth1_vlan: left promiscuous mode [ 476.436282][ T1036] veth0_vlan: left promiscuous mode [ 478.345984][ T31] audit: type=1400 audit(478.240:808): avc: denied { write } for pid=7096 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 478.346992][ T31] audit: type=1400 audit(478.240:809): avc: denied { open } for pid=7096 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 478.347731][ T31] audit: type=1400 audit(478.240:810): avc: denied { getattr } for pid=7096 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 478.348450][ T31] audit: type=1400 audit(478.240:811): avc: denied { ioctl } for pid=7096 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 478.447712][ T31] audit: type=1400 audit(478.340:812): avc: denied { name_bind } for pid=7124 comm="syz.1.724" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 478.752927][ T31] audit: type=1400 audit(478.660:813): avc: denied { search } for pid=7125 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.830036][ T31] audit: type=1400 audit(478.740:814): avc: denied { read } for pid=7163 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.831498][ T31] audit: type=1400 audit(478.740:815): avc: denied { open } for pid=7163 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.832531][ T31] audit: type=1400 audit(478.740:816): avc: denied { getattr } for pid=7163 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 479.167711][ T31] audit: type=1400 audit(479.070:817): avc: denied { write } for pid=7125 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 481.346811][ T7048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 481.351600][ T7048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 483.420286][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 483.420398][ T31] audit: type=1400 audit(483.330:872): avc: denied { create } for pid=7361 comm="syz.1.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 483.421795][ T31] audit: type=1400 audit(483.330:873): avc: denied { write } for pid=7361 comm="syz.1.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 483.642009][ T31] audit: type=1400 audit(483.550:874): avc: denied { read } for pid=7361 comm="syz.1.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 484.140303][ T31] audit: type=1400 audit(484.050:875): avc: denied { create } for pid=7370 comm="syz.1.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 484.144042][ T31] audit: type=1400 audit(484.050:876): avc: denied { connect } for pid=7370 comm="syz.1.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 484.376904][ T7048] hsr_slave_0: entered promiscuous mode [ 484.387983][ T7048] hsr_slave_1: entered promiscuous mode [ 484.433801][ T7048] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 484.466216][ T7048] Cannot create hsr debugfs directory [ 484.472432][ T7402] netlink: 'syz.1.741': attribute type 27 has an invalid length. [ 485.109759][ T7402] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.110621][ T7402] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.111176][ T7402] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.111515][ T7402] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 514.840155][ T31] audit: type=1400 audit(514.730:877): avc: denied { execute } for pid=7406 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 514.867179][ T31] audit: type=1400 audit(514.780:878): avc: denied { execute_no_trans } for pid=7406 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 515.101649][ T31] audit: type=1400 audit(515.000:879): avc: denied { execmem } for pid=7406 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 515.255857][ T31] audit: type=1400 audit(515.160:880): avc: denied { read } for pid=7407 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 515.257265][ T31] audit: type=1400 audit(515.170:881): avc: denied { open } for pid=7407 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 515.260812][ T31] audit: type=1400 audit(515.170:882): avc: denied { mounton } for pid=7407 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 521.531263][ T7048] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 521.548742][ T7048] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 521.558526][ T7048] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 521.585952][ T7048] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 522.051410][ T31] audit: type=1400 audit(521.940:883): avc: denied { open } for pid=7407 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 522.052343][ T31] audit: type=1400 audit(521.960:884): avc: denied { ioctl } for pid=7407 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 523.948784][ T7048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 525.248073][ T7407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 525.254133][ T7407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.321176][ T7407] hsr_slave_0: entered promiscuous mode [ 528.333336][ T7407] hsr_slave_1: entered promiscuous mode [ 528.337987][ T7407] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 528.338478][ T7407] Cannot create hsr debugfs directory [ 531.807451][ T7048] veth0_vlan: entered promiscuous mode [ 531.831523][ T7048] veth1_vlan: entered promiscuous mode [ 531.922124][ T7048] veth0_macvtap: entered promiscuous mode [ 531.939760][ T7048] veth1_macvtap: entered promiscuous mode [ 532.032026][ T7048] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.034450][ T7048] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.034831][ T7048] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.055922][ T7048] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.225458][ T31] audit: type=1400 audit(532.120:885): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/syzkaller.0zuE6c/syz-tmp" dev="vda" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 532.226235][ T31] audit: type=1400 audit(532.130:886): avc: denied { mount } for pid=7048 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 532.226824][ T31] audit: type=1400 audit(532.130:887): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/syzkaller.0zuE6c/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 532.227384][ T31] audit: type=1400 audit(532.130:888): avc: denied { mount } for pid=7048 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 532.228047][ T31] audit: type=1400 audit(532.130:889): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/syzkaller.0zuE6c/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 532.228741][ T31] audit: type=1400 audit(532.130:890): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/syzkaller.0zuE6c/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=9528 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 532.256327][ T31] audit: type=1400 audit(532.170:891): avc: denied { unmount } for pid=7048 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 532.265614][ T31] audit: type=1400 audit(532.170:892): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 532.281721][ T31] audit: type=1400 audit(532.190:893): avc: denied { mount } for pid=7048 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 532.283161][ T31] audit: type=1400 audit(532.190:894): avc: denied { mounton } for pid=7048 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 535.349729][ T7874] Process accounting resumed [ 537.771137][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 537.771268][ T31] audit: type=1400 audit(537.680:1002): avc: denied { create } for pid=7896 comm="syz.0.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 537.787636][ T31] audit: type=1400 audit(537.700:1003): avc: denied { ioctl } for pid=7896 comm="syz.0.754" path="socket:[9113]" dev="sockfs" ino=9113 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 539.706542][ T1036] € (unregistering): (slave bond_slave_0): Releasing backup interface [ 539.807673][ T1036] € (unregistering): (slave bond_slave_1): Releasing backup interface [ 539.827786][ T1036] € (unregistering): Released all slaves [ 539.942592][ T1036] hsr_slave_0: left promiscuous mode [ 539.944965][ T1036] hsr_slave_1: left promiscuous mode [ 540.764053][ T7407] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 540.797691][ T7407] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 540.868987][ T7407] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 540.908956][ T7407] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 541.436461][ T31] audit: type=1400 audit(541.320:1004): avc: denied { unmount } for pid=7048 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 541.989618][ T31] audit: type=1326 audit(541.900:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7946 comm="syz.0.761" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 541.990489][ T31] audit: type=1326 audit(541.900:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7946 comm="syz.0.761" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 541.991485][ T31] audit: type=1326 audit(541.900:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7946 comm="syz.0.761" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 541.992222][ T31] audit: type=1326 audit(541.900:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7946 comm="syz.0.761" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 541.993042][ T31] audit: type=1326 audit(541.900:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7946 comm="syz.0.761" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 543.266041][ T7407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 543.358221][ T31] audit: type=1400 audit(543.270:1010): avc: denied { create } for pid=7966 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.373031][ T31] audit: type=1400 audit(543.280:1011): avc: denied { bind } for pid=7966 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.374074][ T31] audit: type=1400 audit(543.280:1012): avc: denied { node_bind } for pid=7966 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 543.392424][ T31] audit: type=1400 audit(543.300:1013): avc: denied { connect } for pid=7966 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.393886][ T31] audit: type=1400 audit(543.300:1014): avc: denied { setopt } for pid=7966 comm="syz.0.766" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.415848][ T31] audit: type=1400 audit(543.320:1015): avc: denied { write } for pid=7966 comm="syz.0.766" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.733093][ T31] audit: type=1326 audit(543.640:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7971 comm="syz.0.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 543.734143][ T31] audit: type=1326 audit(543.640:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7971 comm="syz.0.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 543.768717][ T31] audit: type=1326 audit(543.670:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7971 comm="syz.0.767" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 543.790012][ T31] audit: type=1326 audit(543.700:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7971 comm="syz.0.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 552.152892][ T7407] veth0_vlan: entered promiscuous mode [ 552.176296][ T7407] veth1_vlan: entered promiscuous mode [ 552.224427][ T7407] veth0_macvtap: entered promiscuous mode [ 552.240726][ T7407] veth1_macvtap: entered promiscuous mode [ 552.311271][ T7407] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.311539][ T7407] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.311784][ T7407] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.311953][ T7407] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 557.056696][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 557.056758][ T31] audit: type=1400 audit(556.970:1025): avc: denied { create } for pid=8049 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 557.787325][ T31] audit: type=1400 audit(557.700:1026): avc: denied { create } for pid=8049 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 557.792002][ T31] audit: type=1400 audit(557.700:1027): avc: denied { write } for pid=8049 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 557.807756][ T31] audit: type=1400 audit(557.720:1028): avc: denied { write } for pid=8049 comm="syz.1.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 559.548043][ T31] audit: type=1400 audit(559.460:1029): avc: denied { bind } for pid=8068 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 559.551577][ T31] audit: type=1400 audit(559.460:1030): avc: denied { listen } for pid=8068 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 559.581184][ T31] audit: type=1400 audit(559.490:1031): avc: denied { accept } for pid=8068 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 559.630699][ T31] audit: type=1400 audit(559.540:1032): avc: denied { read } for pid=8068 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 561.725521][ T31] audit: type=1326 audit(561.630:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.1.780" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 561.727458][ T31] audit: type=1326 audit(561.640:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8075 comm="syz.1.780" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 562.074498][ T8082] tmpfs: Unknown parameter 'nr_ino' [ 565.005626][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 565.005886][ T31] audit: type=1400 audit(564.910:1038): avc: denied { watch watch_reads } for pid=8088 comm="syz.1.784" path="/15" dev="tmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 565.360372][ T31] audit: type=1400 audit(565.270:1039): avc: denied { mount } for pid=8090 comm="syz.1.785" name="/" dev="configfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 565.375623][ T31] audit: type=1400 audit(565.280:1040): avc: denied { read } for pid=8090 comm="syz.1.785" name="/" dev="configfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 565.376477][ T31] audit: type=1400 audit(565.280:1041): avc: denied { open } for pid=8090 comm="syz.1.785" path="/16/file0" dev="configfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 565.429518][ T31] audit: type=1400 audit(565.320:1042): avc: denied { unmount } for pid=7407 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 565.599961][ T31] audit: type=1400 audit(565.510:1043): avc: denied { create } for pid=8092 comm="syz.1.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 565.612756][ T31] audit: type=1400 audit(565.520:1044): avc: denied { setopt } for pid=8092 comm="syz.1.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 565.625866][ T31] audit: type=1400 audit(565.530:1045): avc: denied { connect } for pid=8092 comm="syz.1.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 566.003134][ T8095] tmpfs: Unknown parameter 'nr_ino' [ 566.327360][ T32] INFO: task kworker/0:1:10 blocked for more than 430 seconds. [ 566.328546][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.328961][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.329586][ T32] task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 flags:0x00000000 [ 566.339812][ T32] Workqueue: events bpf_prog_free_deferred [ 566.340505][ T32] Call trace: [ 566.340943][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.341642][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df841da4 r5:82e36c00 [ 566.342037][ T32] r4:82e36c00 [ 566.342450][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.342930][ T32] r5:82e36c00 r4:827174e0 [ 566.343153][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.343614][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.344057][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e20 [ 566.344405][ T32] r4:00000000 [ 566.344600][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.345822][ T31] audit: type=1400 audit(566.250:1046): avc: denied { write } for pid=3110 comm="syz-executor" path="pipe:[1612]" dev="pipefs" ino=1612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 566.371167][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.371760][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.372173][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009740 [ 566.372516][ T32] r4:00000000 [ 566.375824][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.376289][ T32] r9:82e36c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f03d000 [ 566.376643][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.377083][ T32] r5:00001000 r4:dfa0d000 [ 566.377305][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.377701][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.378127][ T32] r5:85190754 r4:85190400 [ 566.378346][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.378824][ T32] r7:dddd00c0 r6:82c18000 r5:85190754 r4:82cb6080 [ 566.379192][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.379641][ T32] r10:82e36c00 r9:82cb60ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 566.380063][ T32] r4:82cb6080 [ 566.380267][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.380679][ T32] r10:00000000 r9:df839e78 r8:82cb5b40 r7:82cb6080 r6:80266a2c r5:82e36c00 [ 566.381030][ T32] r4:82cb5180 [ 566.381234][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.381796][ T32] Exception stack(0xdf841fb0 to 0xdf841ff8) [ 566.382235][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 566.382675][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.383037][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.383437][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82cb5180 [ 566.383998][ T32] INFO: task kworker/0:2:46 blocked for more than 430 seconds. [ 566.384364][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.384657][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.415911][ T32] task:kworker/0:2 state:D stack:0 pid:46 tgid:46 ppid:2 flags:0x00000000 [ 566.419151][ T32] Workqueue: events bpf_prog_free_deferred [ 566.426107][ T32] Call trace: [ 566.427555][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.428019][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df91dda4 r5:82fe1800 [ 566.428458][ T32] r4:82fe1800 [ 566.428670][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.429193][ T32] r5:82fe1800 r4:827174e0 [ 566.429434][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.429881][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.430347][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df91de20 [ 566.430739][ T32] r4:00000000 [ 566.430940][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.431346][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.432160][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.434073][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f480 [ 566.434475][ T32] r4:00000000 [ 566.434693][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.466177][ T32] r9:82fe1800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f04d000 [ 566.466748][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.467187][ T32] r5:00001000 r4:dfd7f000 [ 566.467626][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.468035][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.468461][ T32] r5:8508b354 r4:8508b000 [ 566.472478][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.472986][ T32] r7:dddd00c0 r6:82c18000 r5:8508b354 r4:82f64180 [ 566.473260][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.473677][ T32] r10:82fe1800 r9:82f641ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 566.473996][ T32] r4:82f64180 [ 566.474163][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.474508][ T32] r10:00000000 r9:df839e78 r8:82f62940 r7:82f64180 r6:80266a2c r5:82fe1800 [ 566.474790][ T32] r4:82f62880 [ 566.474938][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.496391][ T32] Exception stack(0xdf91dfb0 to 0xdf91dff8) [ 566.496940][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 566.497352][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.497716][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.498038][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f62880 [ 566.499266][ T32] INFO: task kworker/0:4:3794 blocked for more than 430 seconds. [ 566.499677][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.499947][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.500266][ T32] task:kworker/0:4 state:D stack:0 pid:3794 tgid:3794 ppid:2 flags:0x00000000 [ 566.500755][ T32] Workqueue: events bpf_prog_free_deferred [ 566.501074][ T32] Call trace: [ 566.501243][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.501660][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfe05da4 r5:844fd400 [ 566.502004][ T32] r4:844fd400 [ 566.502214][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.502679][ T32] r5:844fd400 r4:827174e0 [ 566.502973][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.503442][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.503888][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe05e20 [ 566.504252][ T32] r4:00000000 [ 566.504444][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.504888][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.526960][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.527571][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009c80 [ 566.527906][ T32] r4:00000000 [ 566.528097][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.528518][ T32] r9:844fd400 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f039000 [ 566.528849][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.529226][ T32] r5:00001000 r4:dfa01000 [ 566.529443][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.529820][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.530220][ T32] r5:84935354 r4:84935000 [ 566.530452][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.530874][ T32] r7:dddd00c0 r6:82c18000 r5:84935354 r4:84b57900 [ 566.531151][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.531550][ T32] r10:844fd400 r9:84b5792c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 566.531889][ T32] r4:84b57900 [ 566.532083][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.532453][ T32] r10:00000000 r9:df841e78 r8:84b19400 r7:84b57900 r6:80266a2c r5:844fd400 [ 566.532793][ T32] r4:84b5c400 [ 566.532982][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.533343][ T32] Exception stack(0xdfe05fb0 to 0xdfe05ff8) [ 566.533624][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 566.533968][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.534306][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.534662][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:84b5c400 [ 566.546166][ T32] INFO: task kworker/0:44:4138 blocked for more than 430 seconds. [ 566.547943][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.549560][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.552040][ T32] task:kworker/0:44 state:D stack:0 pid:4138 tgid:4138 ppid:2 flags:0x00000000 [ 566.576064][ T32] Workqueue: events bpf_prog_free_deferred [ 566.576618][ T32] Call trace: [ 566.576853][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.577304][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfd29da4 r5:84081800 [ 566.577639][ T32] r4:84081800 [ 566.577844][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.578200][ T32] r5:84081800 r4:827174e0 [ 566.578460][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.578899][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.579317][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e20 [ 566.579648][ T32] r4:00000000 [ 566.579832][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.580196][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.580552][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.580921][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85019640 [ 566.581240][ T32] r4:00000000 [ 566.581424][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.581802][ T32] r9:84081800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f003000 [ 566.582109][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.582507][ T32] r5:00001000 r4:df9b9000 [ 566.582755][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.583201][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.583608][ T32] r5:85192f54 r4:85192c00 [ 566.583810][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.584220][ T32] r7:dddd00c0 r6:82c18000 r5:85192f54 r4:85011200 [ 566.584476][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.584872][ T32] r10:84081800 r9:8501122c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 566.596043][ T32] r4:85011200 [ 566.597225][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.600124][ T32] r10:00000000 r9:df841e78 r8:8500a840 r7:85011200 r6:80266a2c r5:84081800 [ 566.603070][ T32] r4:85013240 [ 566.604038][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.616085][ T32] Exception stack(0xdfd29fb0 to 0xdfd29ff8) [ 566.616673][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 566.617069][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.617434][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.617770][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85013240 [ 566.619728][ T32] INFO: task kworker/1:40:4141 blocked for more than 430 seconds. [ 566.620211][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.620523][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.620977][ T32] task:kworker/1:40 state:D stack:0 pid:4141 tgid:4141 ppid:2 flags:0x00000000 [ 566.621496][ T32] Workqueue: events bpf_prog_free_deferred [ 566.621852][ T32] Call trace: [ 566.622098][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.622558][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df989da4 r5:84085400 [ 566.623017][ T32] r4:84085400 [ 566.623262][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.623701][ T32] r5:84085400 r4:827174e0 [ 566.623932][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.624403][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.624893][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e20 [ 566.653342][ T32] r4:00000000 [ 566.653768][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.654248][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.654694][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.656095][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850097c0 [ 566.666892][ T32] r4:00000000 [ 566.667116][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.667548][ T32] r9:84085400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f041000 [ 566.667888][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.668323][ T32] r5:00001000 r4:dfa69000 [ 566.668547][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.668921][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.669288][ T32] r5:85089b54 r4:85089800 [ 566.669471][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.669921][ T32] r7:ddde40c0 r6:82c18200 r5:85089b54 r4:84b6a200 [ 566.670200][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.670813][ T32] r10:84085400 r9:84b6a22c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.671163][ T32] r4:84b6a200 [ 566.671347][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.671745][ T32] r10:00000000 r9:dfd21e78 r8:8500a1c0 r7:84b6a200 r6:80266a2c r5:84085400 [ 566.672072][ T32] r4:8500a380 [ 566.672263][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.672604][ T32] Exception stack(0xdf989fb0 to 0xdf989ff8) [ 566.672878][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 566.673224][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.673562][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.673878][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8500a380 [ 566.674223][ T32] INFO: task kworker/1:41:4142 blocked for more than 430 seconds. [ 566.674596][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.674848][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.691254][ T32] task:kworker/1:41 state:D stack:0 pid:4142 tgid:4142 ppid:2 flags:0x00000000 [ 566.691925][ T32] Workqueue: events bpf_prog_free_deferred [ 566.692247][ T32] Call trace: [ 566.692470][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.692852][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfc45da4 r5:85085400 [ 566.693341][ T32] r4:85085400 [ 566.693528][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.693936][ T32] r5:85085400 r4:827174e0 [ 566.694173][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.694677][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.706330][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e20 [ 566.706890][ T32] r4:00000000 [ 566.707076][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.707485][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.707862][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.708242][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009040 [ 566.708598][ T32] r4:00000000 [ 566.708780][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.709160][ T32] r9:85085400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f043000 [ 566.709474][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.709888][ T32] r5:00001000 r4:dfa6f000 [ 566.710089][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.710525][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.710929][ T32] r5:85088f54 r4:85088c00 [ 566.711140][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.711562][ T32] r7:ddde40c0 r6:82c18200 r5:85088f54 r4:84b6ae80 [ 566.711853][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.712277][ T32] r10:85085400 r9:84b6aeac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.712621][ T32] r4:84b6ae80 [ 566.712818][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.713212][ T32] r10:00000000 r9:df989e78 r8:8500a240 r7:84b6ae80 r6:80266a2c r5:85085400 [ 566.713538][ T32] r4:8500a680 [ 566.713739][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.714086][ T32] Exception stack(0xdfc45fb0 to 0xdfc45ff8) [ 566.714384][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 566.714791][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.726277][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.726825][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8500a680 [ 566.732599][ T32] INFO: task kworker/1:42:4145 blocked for more than 430 seconds. [ 566.733152][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.733440][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.733796][ T32] task:kworker/1:42 state:D stack:0 pid:4145 tgid:4145 ppid:2 flags:0x00000000 [ 566.734311][ T32] Workqueue: events bpf_prog_free_deferred [ 566.734780][ T32] Call trace: [ 566.750614][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.751211][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df9b1da4 r5:85083c00 [ 566.751553][ T32] r4:85083c00 [ 566.751742][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.752110][ T32] r5:85083c00 r4:827174e0 [ 566.752307][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.752730][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.753141][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e20 [ 566.753463][ T32] r4:00000000 [ 566.753668][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.754035][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.754456][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.754861][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850098c0 [ 566.757492][ T32] r4:00000000 [ 566.757783][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.758212][ T32] r9:85083c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03f000 [ 566.758674][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.759119][ T32] r5:00001000 r4:dfa57000 [ 566.759405][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.759842][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.760306][ T32] r5:85088b54 r4:85088800 [ 566.760605][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.761397][ T32] r7:ddde40c0 r6:82c18200 r5:85088b54 r4:850d8380 [ 566.761684][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.762131][ T32] r10:85083c00 r9:850d83ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.762558][ T32] r4:850d8380 [ 566.762754][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.763315][ T32] r10:00000000 r9:dfc45e78 r8:8500a040 r7:850d8380 r6:80266a2c r5:85083c00 [ 566.763821][ T32] r4:8500a680 [ 566.764077][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.764792][ T32] Exception stack(0xdf9b1fb0 to 0xdf9b1ff8) [ 566.775750][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 566.776569][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.777006][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.777366][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8500a680 [ 566.777761][ T32] INFO: task kworker/0:46:4154 blocked for more than 430 seconds. [ 566.778262][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.778596][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.778989][ T32] task:kworker/0:46 state:D stack:0 pid:4154 tgid:4154 ppid:2 flags:0x00000000 [ 566.779640][ T32] Workqueue: events bpf_prog_free_deferred [ 566.780011][ T32] Call trace: [ 566.780252][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.780864][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfa35da4 r5:848a6c00 [ 566.781267][ T32] r4:848a6c00 [ 566.781469][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.781956][ T32] r5:848a6c00 r4:827174e0 [ 566.782161][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.782728][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.783314][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e20 [ 566.783714][ T32] r4:00000000 [ 566.783909][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.784384][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.784871][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.798114][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f640 [ 566.798673][ T32] r4:00000000 [ 566.798874][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.799251][ T32] r9:848a6c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f013000 [ 566.799531][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.799868][ T32] r5:00001000 r4:dfbc7000 [ 566.800052][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.800571][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.801291][ T32] r5:851cb354 r4:851cb000 [ 566.801490][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.801849][ T32] r7:dddd00c0 r6:82c18000 r5:851cb354 r4:85011280 [ 566.802082][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.802477][ T32] r10:848a6c00 r9:850112ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 566.802757][ T32] r4:85011280 [ 566.802906][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.803239][ T32] r10:00000000 r9:df9f1e78 r8:85013980 r7:85011280 r6:80266a2c r5:848a6c00 [ 566.803545][ T32] r4:85013340 [ 566.803699][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.804016][ T32] Exception stack(0xdfa35fb0 to 0xdfa35ff8) [ 566.804283][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 566.804600][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.804878][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.816656][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85013340 [ 566.817146][ T32] INFO: task kworker/1:43:4157 blocked for more than 430 seconds. [ 566.817512][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.817832][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.818146][ T32] task:kworker/1:43 state:D stack:0 pid:4157 tgid:4157 ppid:2 flags:0x00000000 [ 566.818767][ T32] Workqueue: events bpf_prog_free_deferred [ 566.819164][ T32] Call trace: [ 566.819503][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.819867][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfa55da4 r5:848a6000 [ 566.820310][ T32] r4:848a6000 [ 566.820496][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.820892][ T32] r5:848a6000 r4:827174e0 [ 566.821092][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.821772][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.822161][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e20 [ 566.822544][ T32] r4:00000000 [ 566.822698][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.823142][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.823621][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.824013][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500c100 [ 566.824282][ T32] r4:00000000 [ 566.824467][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.824828][ T32] r9:848a6000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f049000 [ 566.835681][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.836266][ T32] r5:00001000 r4:dfb01000 [ 566.836517][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.836909][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.837335][ T32] r5:851c8f54 r4:851c8c00 [ 566.837535][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.837967][ T32] r7:ddde40c0 r6:82c18200 r5:851c8f54 r4:843c6280 [ 566.838241][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.838674][ T32] r10:848a6000 r9:843c62ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.839203][ T32] r4:843c6280 [ 566.839425][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.839762][ T32] r10:00000000 r9:df9b1e78 r8:85013200 r7:843c6280 r6:80266a2c r5:848a6000 [ 566.840045][ T32] r4:850095c0 [ 566.840210][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.840522][ T32] Exception stack(0xdfa55fb0 to 0xdfa55ff8) [ 566.840781][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 566.841093][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.841403][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.841681][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:850095c0 [ 566.843388][ T32] INFO: task kworker/1:44:4158 blocked for more than 430 seconds. [ 566.843743][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.844049][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.855990][ T32] task:kworker/1:44 state:D stack:0 pid:4158 tgid:4158 ppid:2 flags:0x00000000 [ 566.856787][ T32] Workqueue: events bpf_prog_free_deferred [ 566.857215][ T32] Call trace: [ 566.857492][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.858013][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfa51da4 r5:84a58000 [ 566.858724][ T32] r4:84a58000 [ 566.858932][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.859316][ T32] r5:84a58000 r4:827174e0 [ 566.859513][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.859871][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.860231][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e20 [ 566.860515][ T32] r4:00000000 [ 566.860666][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.860991][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.861315][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.861661][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dcfc0 [ 566.861931][ T32] r4:00000000 [ 566.862095][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.862459][ T32] r9:84a58000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [ 566.862743][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.863184][ T32] r5:00001000 r4:dfa95000 [ 566.863390][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.863709][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.864163][ T32] r5:8508af54 r4:8508ac00 [ 566.864389][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.864840][ T32] r7:ddde40c0 r6:82c18200 r5:8508af54 r4:84911180 [ 566.876100][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.876944][ T32] r10:84a58000 r9:849111ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.877251][ T32] r4:84911180 [ 566.877549][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.877944][ T32] r10:00000000 r9:dfa55e78 r8:850095c0 r7:84911180 r6:80266a2c r5:84a58000 [ 566.878335][ T32] r4:85009cc0 [ 566.878596][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.878901][ T32] Exception stack(0xdfa51fb0 to 0xdfa51ff8) [ 566.879128][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 566.879492][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.879823][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.880134][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85009cc0 [ 566.880472][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 566.881745][ T32] INFO: task kworker/1:45:4162 blocked for more than 430 seconds. [ 566.882056][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.882376][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.882747][ T32] task:kworker/1:45 state:D stack:0 pid:4162 tgid:4162 ppid:2 flags:0x00000000 [ 566.883157][ T32] Workqueue: events bpf_prog_free_deferred [ 566.883513][ T32] Call trace: [ 566.883707][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.884186][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfab9da4 r5:84a5c800 [ 566.884652][ T32] r4:84a5c800 [ 566.884929][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.896775][ T32] r5:84a5c800 r4:827174e0 [ 566.897035][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.897531][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.897948][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e20 [ 566.898499][ T32] r4:00000000 [ 566.898689][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.899143][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.899590][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.899992][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f340 [ 566.900278][ T32] r4:00000000 [ 566.900526][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.900887][ T32] r9:84a5c800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f04b000 [ 566.901187][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.901561][ T32] r5:00001000 r4:dfb75000 [ 566.901749][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.902078][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.902468][ T32] r5:85089f54 r4:85089c00 [ 566.902674][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.903036][ T32] r7:ddde40c0 r6:82c18200 r5:85089f54 r4:850d1780 [ 566.903261][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.903626][ T32] r10:84a5c800 r9:850d17ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.903902][ T32] r4:850d1780 [ 566.904195][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.904550][ T32] r10:00000000 r9:dfa55e78 r8:8500f680 r7:850d1780 r6:80266a2c r5:84a5c800 [ 566.904819][ T32] r4:8500fac0 [ 566.925700][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.926261][ T32] Exception stack(0xdfab9fb0 to 0xdfab9ff8) [ 566.926619][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 566.927005][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.927377][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.927782][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8500fac0 [ 566.928342][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 566.928741][ T32] INFO: task kworker/1:46:4165 blocked for more than 430 seconds. [ 566.929095][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 566.929376][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 566.929742][ T32] task:kworker/1:46 state:D stack:0 pid:4165 tgid:4165 ppid:2 flags:0x00000000 [ 566.930161][ T32] Workqueue: events bpf_prog_free_deferred [ 566.930507][ T32] Call trace: [ 566.930715][ T32] [<819bb314>] (__schedule) from [<819bbf54>] (schedule+0x2c/0xfc) [ 566.931051][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfab5da4 r5:84a5b000 [ 566.931338][ T32] r4:84a5b000 [ 566.931538][ T32] [<819bbf28>] (schedule) from [<819bc308>] (schedule_preempt_disabled+0x18/0x24) [ 566.931912][ T32] r5:84a5b000 r4:827174e0 [ 566.932126][ T32] [<819bc2f0>] (schedule_preempt_disabled) from [<819bede0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 566.932721][ T32] [<819beaf8>] (__mutex_lock.constprop.0) from [<819bf6ac>] (__mutex_lock_slowpath+0x14/0x18) [ 566.933172][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e20 [ 566.933474][ T32] r4:00000000 [ 566.933637][ T32] [<819bf698>] (__mutex_lock_slowpath) from [<819bf6ec>] (mutex_lock+0x3c/0x40) [ 566.933965][ T32] [<819bf6b0>] (mutex_lock) from [<804adbb8>] (_vm_unmap_aliases+0x68/0x240) [ 566.934300][ T32] [<804adb50>] (_vm_unmap_aliases) from [<804b1914>] (vfree+0x170/0x1e4) [ 566.934744][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85006a40 [ 566.949602][ T32] r4:00000000 [ 566.949951][ T32] [<804b17a4>] (vfree) from [<8050fb60>] (execmem_free+0x30/0x64) [ 566.950354][ T32] r9:84a5b000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f047000 [ 566.950692][ T32] [<8050fb30>] (execmem_free) from [<8039c42c>] (bpf_jit_free_exec+0x10/0x14) [ 566.951060][ T32] r5:00001000 r4:dfaeb000 [ 566.951270][ T32] [<8039c41c>] (bpf_jit_free_exec) from [<8039c80c>] (bpf_jit_free+0x68/0xe4) [ 566.951680][ T32] [<8039c7a4>] (bpf_jit_free) from [<8039d960>] (bpf_prog_free_deferred+0x14c/0x164) [ 566.952109][ T32] r5:851cbb54 r4:851cb800 [ 566.952340][ T32] [<8039d814>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 566.952783][ T32] r7:ddde40c0 r6:82c18200 r5:851cbb54 r4:850d1e00 [ 566.953059][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 566.953537][ T32] r10:84a5b000 r9:850d1e2c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 566.953895][ T32] r4:850d1e00 [ 566.954104][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 566.954540][ T32] r10:00000000 r9:dfa55e78 r8:8500fac0 r7:850d1e00 r6:80266a2c r5:84a5b000 [ 566.962150][ T32] r4:8500fd00 [ 566.962637][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.963238][ T32] Exception stack(0xdfab5fb0 to 0xdfab5ff8) [ 566.963623][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 566.964237][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.964729][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.976050][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8500fd00 [ 566.976571][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 566.978735][ T32] NMI backtrace for cpu 1 [ 566.979434][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 566.979892][ T32] Hardware name: ARM-Versatile Express [ 566.980197][ T32] Call trace: [ 566.980437][ T32] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 566.981073][ T32] r7:00000000 r6:00000113 r5:60000193 r4:8203d394 [ 566.981339][ T32] [<81998f3c>] (show_stack) from [<819b7400>] (dump_stack_lvl+0x70/0x7c) [ 566.981711][ T32] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 566.982063][ T32] r5:00000001 r4:00000001 [ 566.982255][ T32] [<819b740c>] (dump_stack) from [<81986118>] (nmi_cpu_backtrace+0x160/0x17c) [ 566.982679][ T32] [<81985fb8>] (nmi_cpu_backtrace) from [<81986264>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 566.983099][ T32] r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [ 566.983365][ T32] [<81986134>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 566.983813][ T32] r9:00006841 r8:828b6cf8 r7:8260c730 r6:00007d49 r5:8261ae48 r4:85459d1c [ 566.984108][ T32] [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80358140>] (watchdog+0x498/0x5b8) [ 566.984488][ T32] [<80357ca8>] (watchdog) from [<8026fc84>] (kthread+0x104/0x134) [ 566.984814][ T32] r10:00000000 r9:df819e58 r8:82e9f440 r7:00000000 r6:80357ca8 r5:82ee1800 [ 566.985552][ T32] r4:82f459c0 [ 566.985781][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 566.986251][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 566.986686][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 566.987070][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 566.987493][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 566.987852][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f459c0 [ 566.989046][ T32] Sending NMI from CPU 1 to CPUs 0: [ 566.989953][ C0] NMI backtrace for cpu 0 [ 566.990146][ C0] CPU: 0 UID: 0 PID: 8002 Comm: syz.0.769 Not tainted 6.12.0-rc2-syzkaller #0 [ 566.990204][ C0] Hardware name: ARM-Versatile Express [ 566.990252][ C0] PC is at do_page_fault+0x34/0x3d8 [ 566.990348][ C0] LR is at do_DataAbort+0x38/0xa8 [ 566.990405][ C0] pc : [<802140fc>] lr : [<80214688>] psr: 40000113 [ 566.990485][ C0] sp : eaeddc70 ip : eaeddcb8 fp : eaeddcb4 [ 566.990526][ C0] r10: eaeddd4c r9 : 83883900 r8 : 802140c8 [ 566.990569][ C0] r7 : 863ad400 r6 : 00000a0f r5 : 201d1018 r4 : eaeddcf0 [ 566.990615][ C0] r3 : 80000113 r2 : eaeddcf0 r1 : 00000a0f r0 : 201d1018 [ 566.990739][ C0] Flags: nZcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 566.990813][ C0] Control: 30c5387d Table: 85386900 DAC: fffffffd [ 566.990881][ C0] Call trace: [ 566.990938][ C0] [<802140c8>] (do_page_fault) from [<80214688>] (do_DataAbort+0x38/0xa8) [ 566.991020][ C0] r10:eaeddd4c r9:863ad400 r8:802140c8 r7:eaeddcf0 r6:201d1018 r5:00000a0f [ 566.991044][ C0] r4:8261cbbc [ 566.991061][ C0] [<80214650>] (do_DataAbort) from [<80200b0c>] (__dabt_svc+0x4c/0x80) [ 566.991116][ C0] Exception stack(0xeaeddcf0 to 0xeaeddd38) [ 566.991153][ C0] dce0: 201d1018 7effffff 00000000 b5403587 [ 566.991191][ C0] dd00: eaeddee0 201d1000 b5003500 00000000 00000000 00000002 eaeddd4c eaedddfc [ 566.991226][ C0] dd20: a11d101b eaeddd40 814835a4 8196aae8 80000113 ffffffff [ 566.991262][ C0] r8:00000000 r7:eaeddd24 r6:ffffffff r5:80000113 r4:8196aae8 [ 566.991279][ C0] [<814834c0>] (____sys_recvmsg) from [<81486730>] (___sys_recvmsg+0x88/0xbc) [ 566.991370][ C0] r10:b5403587 r9:863ad400 r8:83223400 r7:00000002 r6:201d1000 r5:eaeddee0 [ 566.991390][ C0] r4:00000000 [ 566.991406][ C0] [<814866a8>] (___sys_recvmsg) from [<81486864>] (do_recvmmsg+0x100/0x2d0) [ 566.991472][ C0] r8:00000000 r7:00000002 r6:0000e87a r5:201d1000 r4:eaeddec0 [ 566.991489][ C0] [<81486764>] (do_recvmmsg) from [<81487250>] (sys_recvmmsg_time32+0xc4/0xd8) [ 566.991588][ C0] r10:0000016d r9:863ad400 r8:00010106 r7:00000002 r6:00000000 r5:200000c0 [ 566.991609][ C0] r4:00000003 [ 566.991626][ C0] [<8148718c>] (sys_recvmmsg_time32) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 566.991674][ C0] Exception stack(0xeaeddfa8 to 0xeaeddff0) [ 566.991711][ C0] dfa0: 00000000 00000000 00000003 200000c0 00010106 00000002 [ 566.991748][ C0] dfc0: 00000000 00000000 00286388 0000016d 00000000 00006364 003d0f00 76b410bc [ 566.991777][ C0] dfe0: 76b40ec0 76b40eb0 00018af8 00132ec0 [ 566.991814][ C0] r8:8020029c r7:0000016d r6:00286388 r5:00000000 r4:00000000 [ 567.006794][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 567.018546][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 567.018962][ T32] Hardware name: ARM-Versatile Express [ 567.019236][ T32] Call trace: [ 567.019496][ T32] [<81998e58>] (dump_backtrace) from [<81998f54>] (show_stack+0x18/0x1c) [ 567.019921][ T32] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 567.020199][ T32] [<81998f3c>] (show_stack) from [<819b73e4>] (dump_stack_lvl+0x54/0x7c) [ 567.020587][ T32] [<819b7390>] (dump_stack_lvl) from [<819b7424>] (dump_stack+0x18/0x1c) [ 567.020961][ T32] r5:00000000 r4:82870d18 [ 567.021175][ T32] [<819b740c>] (dump_stack) from [<81999a80>] (panic+0x120/0x374) [ 567.021529][ T32] [<81999960>] (panic) from [<80357fc0>] (watchdog+0x318/0x5b8) [ 567.021896][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8203de94 [ 567.022169][ T32] r7:8260c730 [ 567.022368][ T32] [<80357ca8>] (watchdog) from [<8026fc84>] (kthread+0x104/0x134) [ 567.022777][ T32] r10:00000000 r9:df819e58 r8:82e9f440 r7:00000000 r6:80357ca8 r5:82ee1800 [ 567.023111][ T32] r4:82f459c0 [ 567.023297][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 567.023650][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 567.023920][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 567.024247][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 567.024593][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 567.024907][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f459c0 [ 567.027301][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:30:53 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=7effffff R02=00000000 R03=b5003500 R04=eaeddec0 R05=201c2040 R06=0000e0fc R07=00000002 R08=83223400 R09=863ad400 R10=b5403587 R11=eaeddd8c R12=00000000 R13=eaedddb0 R14=863ad400 R15=81486540 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=01ea2f70 R01=00000000 R02=00000000 R03=00000000 R04=01ea2f70 R05=00000004 R06=01ea2f70 R07=00000060 R08=00000350 R09=7ea8d1fc R10=7ea8d27c R11=00000001 R12=00000000 R13=7ea8d110 R14=0054e004 R15=0054dd80 PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005a27e9 s17=00000000 d08=00000000005a27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00020401 s33=03000800 d16=0300080000020401 s34=d5080480 s35=ffffffff d17=ffffffffd5080480 s36=ffffffff s37=65642f01 d18=65642f01ffffffff s38=75622f76 s39=73752f73 d19=73752f7375622f76 s40=30302f62 s41=30302f23 d20=30302f2330302f62 s42=4be20023 s43=80020604 d21=800206044be20023 s44=ec080004 s45=82080001 d22=82080001ec080004 s46=030180cc s47=02180800 d23=02180800030180cc s48=0b298bf4 s49=f8572f02 d24=f8572f020b298bf4 s50=38833130 s51=3e510117 d25=3e51011738833130 s52=9c7eb557 s53=8d4ad503 d26=8d4ad5039c7eb557 s54=c11a7114 s55=d820eff5 d27=d820eff5c11a7114 s56=6b304593 s57=6eb99834 d28=6eb998346b304593 s58=f4629da6 s59=497c3e39 d29=497c3e39f4629da6 s60=a39c34b3 s61=44665810 d30=44665810a39c34b3 s62=cd4d2d30 s63=a0bc4de5 d31=a0bc4de5cd4d2d30 FPSCR: 00000000