last executing test programs: 23m23.192738544s ago: executing program 1 (id=117): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x801, 0x0, 0x0, {0x6, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x20004804) 23m22.569014141s ago: executing program 1 (id=119): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 23m22.200390402s ago: executing program 1 (id=120): r0 = syz_io_uring_setup(0x6711, &(0x7f000000a9c0)={0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f000000aa40), &(0x7f000000aa80)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x2, 0x0, 0x0) 23m21.860113051s ago: executing program 1 (id=121): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c80)={{0x14}, [@NFT_MSG_DELSET={0x20, 0xb, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 23m21.601712278s ago: executing program 1 (id=122): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a4c000000060a09040000000000000000020000000900010073797a30000000000900020073797a3200000000200004801c0001800a00010072656469720000000c000280080001"], 0x74}}, 0x4) 23m21.420671403s ago: executing program 1 (id=123): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 22m35.997780362s ago: executing program 32 (id=123): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 19m49.325556502s ago: executing program 2 (id=462): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 19m46.658276866s ago: executing program 2 (id=463): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) eventfd(0x0) 19m45.837763269s ago: executing program 2 (id=464): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setresgid(0x0, 0x0, 0x0) 19m45.277770794s ago: executing program 2 (id=465): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xffb, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', 0x0) 19m44.68152852s ago: executing program 2 (id=466): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xca}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r0, &(0x7f0000003c40)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x3}, 0x8) 19m44.006894259s ago: executing program 2 (id=467): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xffe0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 18m58.438179782s ago: executing program 33 (id=467): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xffe0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 13m59.551127542s ago: executing program 3 (id=737): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) ioctl$TIOCL_SETVESABLANK(r3, 0x560e, &(0x7f0000000140)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000008c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 13m59.221461621s ago: executing program 3 (id=738): r0 = fsopen(&(0x7f0000000040)='configfs\x00', 0x0) capset(&(0x7f00000020c0)={0x19980330}, &(0x7f00000001c0)) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) 13m58.822060192s ago: executing program 3 (id=739): pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) ioctl$int_in(r0, 0x5452, 0x0) dup3(r1, r0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000206010300000600000000000000"], 0x14}}, 0x0) 13m57.79933167s ago: executing program 3 (id=740): pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) open_tree(0xffffffffffffffff, 0x0, 0x81000) shutdown(r1, 0x1) splice(r1, 0x0, r0, 0x0, 0x406f413, 0x0) 13m57.480611668s ago: executing program 3 (id=742): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) unlink(0x0) 13m57.021416091s ago: executing program 3 (id=743): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000706dbc23928f39dcddff006f42", @ANYRES8, @ANYBLOB], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)='R', 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) getpeername$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x40046207, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000000)={0x4c, 0x0, &(0x7f00000009c0)=[@acquire, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) r6 = dup3(r5, r4, 0x0) ppoll(&(0x7f0000000280)=[{r6, 0x1224}], 0x1, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000fd0f000003"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = dup(r8) fsetxattr$security_selinux(r9, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 13m11.58949729s ago: executing program 34 (id=743): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000706dbc23928f39dcddff006f42", @ANYRES8, @ANYBLOB], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)='R', 0x1}], 0x1) r3 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) getpeername$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x40046207, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000000)={0x4c, 0x0, &(0x7f00000009c0)=[@acquire, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) r6 = dup3(r5, r4, 0x0) ppoll(&(0x7f0000000280)=[{r6, 0x1224}], 0x1, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000fd0f000003"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = dup(r8) fsetxattr$security_selinux(r9, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 3m57.987808769s ago: executing program 0 (id=1554): sched_setaffinity(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r3}, 0x10) r4 = socket(0x10, 0x80002, 0x4) sendmsg$nl_route_sched(r4, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r5, 0x400455c8, 0x0) 3m34.531245339s ago: executing program 0 (id=1555): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) umount2(&(0x7f0000000180)='./file0/file0/file0/file0/file0\x00', 0x0) write$FUSE_INIT(r1, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f0000008b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x90, 0x0, 0x0, {0x3, 0x0, 0xc, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000}}}, 0x0, 0x0, 0x0, 0x0}) close_range(r1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3m33.689563632s ago: executing program 0 (id=1557): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) 3m33.229864884s ago: executing program 0 (id=1558): mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000680)={[{@subsystem='blkio'}]}) 3m32.960229072s ago: executing program 0 (id=1559): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 3m32.491569915s ago: executing program 0 (id=1560): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6(0xa, 0x80002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000018010000202075250000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c}}, 0x0) recvmmsg$unix(r4, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) ftruncate(r3, 0x12081ff) open(&(0x7f0000000200)='./bus\x00', 0x14507e, 0x0) 2m47.18648425s ago: executing program 35 (id=1560): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6(0xa, 0x80002, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000018010000202075250000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c}}, 0x0) recvmmsg$unix(r4, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)}}], 0x1, 0x34000, 0x0) ftruncate(r3, 0x12081ff) open(&(0x7f0000000200)='./bus\x00', 0x14507e, 0x0) 1m8.56761744s ago: executing program 5 (id=1656): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000001c0)=0x7ff, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x406f413, 0x0) 36.67814581s ago: executing program 4 (id=1658): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="5c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800e00010069703665727370616e0000002000028006000200300000001400060000000000000000000000ffff7f00000108000a00", @ANYRES32], 0x5c}}, 0x0) 36.231420862s ago: executing program 4 (id=1659): r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) ptrace$getenv(0x4201, r1, 0x42, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="4c00000010004b0422000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800b00010062726964676500001c00028008000400000000000800150000000000050016"], 0x4c}}, 0x0) 30.692361623s ago: executing program 5 (id=1660): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x100000000000000, &(0x7f00000006c0)='U'}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000480)={0x4c, 0x0, &(0x7f0000000580)=[@acquire, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 29.849634826s ago: executing program 5 (id=1661): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r0, 0x0, 0x0) futex(0x0, 0x18d, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a0008000000cb4f0500"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e21, @rand_addr=0x64010102}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e24, @empty}, 0x12, 0x0, 0x0, 0x0, 0x800, 0x0, 0xb8c, 0x7fff, 0x6}) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r6, 0x4b3a, 0x1) r7 = socket$inet(0x2, 0x2, 0x1) bind$inet(r7, &(0x7f0000002680)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="08001efbb07d586e", 0x4788}], 0x1}, 0x0) 6.469906403s ago: executing program 4 (id=1662): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @remote}, 0x225, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x6}) 6.418105675s ago: executing program 4 (id=1663): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) syz_emit_ethernet(0x7e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "156909", 0x1b, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88a8, 0x8dff, 0x0, [0x0, 0x0]}, {}, {}, {0xa888, 0x88be, 0x81000000}}}}}}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r6, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000014001080800418e00000004fcff", 0x58}], 0x1) 2.251166409s ago: executing program 4 (id=1664): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000002c0)='rpm_return_int\x00', r1}, 0x10) syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x0) 1.951182077s ago: executing program 4 (id=1665): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000001c0)=0x7ff, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/212, 0xd4, 0x1, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x406f413, 0x0) 1.742231673s ago: executing program 5 (id=1666): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000340)={r0, &(0x7f0000000080), &(0x7f0000000580)=""/156}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.649334385s ago: executing program 5 (id=1667): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0xc, 0x0) 0s ago: executing program 5 (id=1668): r0 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000340)=r1, 0x12) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x181000, 0x12) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000300)=0x1000, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000100), 0x10) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x488, 0x30, 0x12f, 0xffffffff, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x2107, 0xfffffffc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x6, 0x0, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0xffffc3fd}, {}, 0x0, 0x0, 0x1000}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x1}}}}]}]}, 0x488}}, 0x0) kernel console output (not intermixed with test programs): ="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 321.487025][ T31] audit: type=1400 audit(321.390:1229): avc: denied { search } for pid=5402 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 321.567313][ T31] audit: type=1400 audit(321.480:1230): avc: denied { read } for pid=5403 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 321.570955][ T31] audit: type=1400 audit(321.480:1231): avc: denied { open } for pid=5403 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 321.572126][ T31] audit: type=1400 audit(321.480:1232): avc: denied { getattr } for pid=5403 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 321.688134][ T31] audit: type=1400 audit(321.600:1233): avc: denied { write } for pid=5402 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.260909][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 326.261071][ T31] audit: type=1326 audit(326.180:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.0.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 326.262996][ T31] audit: type=1326 audit(326.180:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.0.322" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x133450 code=0x7ffc0000 [ 326.264402][ T31] audit: type=1326 audit(326.180:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.0.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 326.268079][ T31] audit: type=1326 audit(326.180:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.0.322" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.070231][ T31] audit: type=1400 audit(326.990:1246): avc: denied { watch watch_reads } for pid=5419 comm="syz.0.324" path="/proc/478" dev="proc" ino=4742 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 327.381872][ T31] audit: type=1326 audit(327.300:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5422 comm="syz.0.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.407108][ T31] audit: type=1326 audit(327.310:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5422 comm="syz.0.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.418123][ T31] audit: type=1326 audit(327.340:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5422 comm="syz.0.325" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.419020][ T31] audit: type=1326 audit(327.340:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5422 comm="syz.0.325" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.425133][ T31] audit: type=1326 audit(327.340:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5422 comm="syz.0.325" exe="/syz-executor" sig=0 arch=40000028 syscall=143 compat=0 ip=0x133450 code=0x7ffc0000 [ 328.917564][ T5432] syz.0.328[5432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.917936][ T5432] syz.0.328[5432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.918748][ T5432] syz.0.328[5432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.291797][ T5435] netlink: 8 bytes leftover after parsing attributes in process `syz.0.329'. [ 329.716656][ T5437] wireguard0: entered promiscuous mode [ 329.717372][ T5437] wireguard0: entered allmulticast mode [ 330.264981][ T5446] serio: Serial port pts0 [ 334.922361][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 334.922508][ T31] audit: type=1400 audit(334.840:1255): avc: denied { sys_chroot } for pid=5459 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 334.958269][ T31] audit: type=1400 audit(334.840:1256): avc: denied { setgid } for pid=5459 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 334.959035][ T31] audit: type=1400 audit(334.850:1257): avc: denied { setrlimit } for pid=5459 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 337.300183][ T31] audit: type=1400 audit(337.220:1258): avc: denied { create } for pid=5467 comm="syz.2.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 338.875323][ T31] audit: type=1400 audit(338.790:1259): avc: denied { mount } for pid=5475 comm="syz.2.335" name="/" dev="ramfs" ino=4812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 339.254998][ T31] audit: type=1400 audit(339.170:1260): avc: denied { write } for pid=5477 comm="syz.2.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 339.597694][ T5480] SELinux: Context system_u:object_r:event_device_t:s0 is not valid (left unmapped). [ 339.601316][ T31] audit: type=1400 audit(339.510:1261): avc: denied { relabelfrom } for pid=5479 comm="syz.2.337" name="UDPv6" dev="sockfs" ino=4819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 339.603171][ T31] audit: type=1400 audit(339.520:1262): avc: denied { mac_admin } for pid=5479 comm="syz.2.337" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 339.603862][ T31] audit: type=1400 audit(339.520:1263): avc: denied { relabelto } for pid=5479 comm="syz.2.337" name="UDPv6" dev="sockfs" ino=4819 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=udp_socket permissive=1 trawcon="system_u:object_r:event_device_t:s0" [ 340.946409][ T31] audit: type=1400 audit(340.860:1264): avc: denied { create } for pid=5489 comm="syz.2.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 341.194664][ T5493] pim6reg1: entered promiscuous mode [ 341.195300][ T5493] pim6reg1: entered allmulticast mode [ 342.170384][ T31] audit: type=1400 audit(342.090:1265): avc: denied { create } for pid=5520 comm="syz.2.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 342.455249][ T5528] serio: Serial port pts0 [ 347.089162][ T31] audit: type=1400 audit(347.010:1266): avc: denied { execute } for pid=5557 comm="syz.2.356" path="/72/cpuacct.usage_percpu_user" dev="tmpfs" ino=379 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 348.194560][ T31] audit: type=1326 audit(348.110:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.206733][ T31] audit: type=1326 audit(348.120:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.248051][ T31] audit: type=1326 audit(348.160:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.249798][ T31] audit: type=1326 audit(348.170:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.257381][ T31] audit: type=1326 audit(348.170:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.258556][ T31] audit: type=1326 audit(348.170:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.279306][ T31] audit: type=1326 audit(348.200:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.308184][ T31] audit: type=1326 audit(348.200:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.309178][ T31] audit: type=1326 audit(348.230:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5562 comm="syz.2.358" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.845735][ T5565] syz.2.359[5565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.851616][ T5565] syz.2.359[5565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.855278][ T5565] syz.2.359[5565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.085049][ T5610] serio: Serial port pts0 [ 354.520488][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 354.520608][ T31] audit: type=1400 audit(354.440:1287): avc: denied { mounton } for pid=5612 comm="syz.0.377" path="/proc/507/task" dev="proc" ino=4989 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 355.967785][ T31] audit: type=1400 audit(355.880:1288): avc: denied { bind } for pid=5619 comm="syz.0.379" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 355.980865][ T31] audit: type=1400 audit(355.900:1289): avc: denied { node_bind } for pid=5619 comm="syz.0.379" saddr=fe80::bb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 355.998138][ T31] audit: type=1400 audit(355.920:1290): avc: denied { connect } for pid=5619 comm="syz.0.379" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 356.080062][ T31] audit: type=1400 audit(356.000:1291): avc: denied { write } for pid=5619 comm="syz.0.379" path="socket:[5615]" dev="sockfs" ino=5615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 356.514629][ T31] audit: type=1400 audit(356.430:1292): avc: denied { setcheckreqprot } for pid=5621 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 361.293026][ T31] audit: type=1326 audit(361.210:1293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.322911][ T31] audit: type=1326 audit(361.230:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.327631][ T31] audit: type=1326 audit(361.230:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.332163][ T31] audit: type=1326 audit(361.250:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.362066][ T31] audit: type=1326 audit(361.270:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.369644][ T31] audit: type=1326 audit(361.290:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.378638][ T31] audit: type=1326 audit(361.290:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.408400][ T31] audit: type=1326 audit(361.320:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.426443][ T31] audit: type=1326 audit(361.340:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 361.428614][ T31] audit: type=1326 audit(361.350:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.0.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 365.901592][ T5668] serio: Serial port pts0 [ 373.158406][ T5709] netlink: 256 bytes leftover after parsing attributes in process `syz.0.402'. [ 375.299386][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 375.299501][ T31] audit: type=1326 audit(375.220:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.0.405" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 376.033040][ T5719] netlink: 'syz.0.406': attribute type 10 has an invalid length. [ 376.080669][ T5719] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 376.818178][ T31] audit: type=1326 audit(376.740:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.819340][ T31] audit: type=1326 audit(376.740:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.834083][ T31] audit: type=1326 audit(376.740:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.835058][ T31] audit: type=1326 audit(376.750:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.840645][ T31] audit: type=1326 audit(376.750:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.841541][ T31] audit: type=1326 audit(376.760:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.854913][ T31] audit: type=1326 audit(376.770:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.865291][ T31] audit: type=1326 audit(376.770:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 376.867262][ T31] audit: type=1326 audit(376.780:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5722 comm="syz.0.409" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 379.526314][ C0] hrtimer: interrupt took 6482624 ns [ 380.486418][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 380.486526][ T31] audit: type=1326 audit(380.400:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.489838][ T31] audit: type=1326 audit(380.410:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.494408][ T31] audit: type=1326 audit(380.410:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.495469][ T31] audit: type=1326 audit(380.410:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.507626][ T31] audit: type=1326 audit(380.410:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.508686][ T31] audit: type=1326 audit(380.420:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.509304][ T31] audit: type=1326 audit(380.420:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=51 compat=0 ip=0x133450 code=0x7ffc0000 [ 380.509851][ T31] audit: type=1326 audit(380.420:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 385.736465][ T31] audit: type=1400 audit(385.650:1355): avc: denied { watch watch_reads } for pid=5757 comm="syz.0.423" path="/266" dev="tmpfs" ino=1375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 386.818673][ T5758] netlink: 256 bytes leftover after parsing attributes in process `syz.0.423'. [ 389.608360][ T31] audit: type=1400 audit(389.520:1356): avc: denied { ioctl } for pid=5781 comm="syz.0.432" path="socket:[5854]" dev="sockfs" ino=5854 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 389.914194][ T31] audit: type=1326 audit(389.830:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.923957][ T31] audit: type=1326 audit(389.840:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.934555][ T31] audit: type=1326 audit(389.840:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.936177][ T31] audit: type=1326 audit(389.840:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.941341][ T31] audit: type=1326 audit(389.840:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.943215][ T31] audit: type=1326 audit(389.850:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.944132][ T31] audit: type=1326 audit(389.850:1363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5783 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.768963][ T5789] netlink: 4 bytes leftover after parsing attributes in process `syz.2.435'. [ 392.092350][ T31] audit: type=1400 audit(392.010:1364): avc: denied { shutdown } for pid=5798 comm="syz.0.437" lport=41450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 393.121003][ T5808] netlink: 'syz.2.441': attribute type 4 has an invalid length. [ 393.782982][ T31] audit: type=1326 audit(393.700:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.784853][ T31] audit: type=1326 audit(393.700:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.813193][ T31] audit: type=1326 audit(393.730:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.818455][ T31] audit: type=1326 audit(393.740:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.820326][ T31] audit: type=1326 audit(393.740:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.843097][ T31] audit: type=1326 audit(393.760:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.854365][ T31] audit: type=1326 audit(393.770:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.866276][ T31] audit: type=1326 audit(393.780:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 393.886135][ T31] audit: type=1326 audit(393.800:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5811 comm="syz.0.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 397.486825][ T4576] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 397.498393][ T5841] netlink: 16 bytes leftover after parsing attributes in process `syz.2.455'. [ 397.636230][ T4576] usb 1-1: device descriptor read/64, error -71 [ 397.876574][ T4576] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 398.027068][ T4576] usb 1-1: device descriptor read/64, error -71 [ 398.138108][ T4576] usb usb1-port1: attempt power cycle [ 398.414484][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 398.415368][ T31] audit: type=1400 audit(398.310:1429): avc: denied { map } for pid=5844 comm="syz.2.457" path="/dev/usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 398.487369][ T4576] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 398.510530][ T4576] usb 1-1: device descriptor read/8, error -71 [ 398.746766][ T4576] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 398.770758][ T4576] usb 1-1: device descriptor read/8, error -71 [ 398.876971][ T4576] usb usb1-port1: unable to enumerate USB device [ 398.878518][ T31] audit: type=1326 audit(398.800:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 398.888060][ T31] audit: type=1326 audit(398.810:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=92 compat=0 ip=0x133450 code=0x7ffc0000 [ 398.893168][ T31] audit: type=1326 audit(398.810:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 399.781886][ T5851] syz.2.460[5851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.782345][ T5851] syz.2.460[5851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.788348][ T5851] syz.2.460[5851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.886959][ T5851] netlink: 8 bytes leftover after parsing attributes in process `syz.2.460'. [ 403.733787][ T31] audit: type=1326 audit(403.650:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.746252][ T31] audit: type=1326 audit(403.660:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.748356][ T31] audit: type=1326 audit(403.670:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.760258][ T31] audit: type=1326 audit(403.670:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.770853][ T31] audit: type=1326 audit(403.680:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.807508][ T31] audit: type=1326 audit(403.730:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.828581][ T31] audit: type=1326 audit(403.740:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.836354][ T31] audit: type=1326 audit(403.740:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.856513][ T31] audit: type=1326 audit(403.770:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 403.864869][ T31] audit: type=1326 audit(403.770:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5856 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 409.517239][ T5899] netlink: 8 bytes leftover after parsing attributes in process `syz.0.470'. [ 415.562994][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 415.564537][ T31] audit: type=1326 audit(415.470:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.608611][ T31] audit: type=1326 audit(415.530:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.614514][ T31] audit: type=1326 audit(415.530:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.619818][ T31] audit: type=1326 audit(415.540:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.627337][ T31] audit: type=1326 audit(415.540:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.629663][ T31] audit: type=1326 audit(415.540:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.633610][ T31] audit: type=1326 audit(415.540:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.645021][ T31] audit: type=1326 audit(415.550:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.649804][ T31] audit: type=1326 audit(415.560:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=284 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.650725][ T31] audit: type=1326 audit(415.560:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5908 comm="syz.0.474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 420.895783][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 420.898463][ T31] audit: type=1326 audit(420.800:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.0.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 420.899522][ T31] audit: type=1326 audit(420.820:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.0.480" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x133450 code=0x7ffc0000 [ 420.901143][ T31] audit: type=1326 audit(420.820:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5923 comm="syz.0.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.634476][ T31] audit: type=1326 audit(424.540:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.688968][ T31] audit: type=1326 audit(424.590:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.711441][ T31] audit: type=1326 audit(424.630:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.728134][ T31] audit: type=1326 audit(424.630:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.734307][ T31] audit: type=1326 audit(424.640:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x135b0c code=0x7ffc0000 [ 424.764686][ T31] audit: type=1326 audit(424.640:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 424.776592][ T31] audit: type=1326 audit(424.640:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.0.484" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.067589][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 438.067827][ T31] audit: type=1400 audit(437.990:1487): avc: denied { create } for pid=6009 comm="syz.0.501" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=llc_socket permissive=1 [ 438.578414][ T31] audit: type=1326 audit(438.490:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.579910][ T31] audit: type=1326 audit(438.490:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.580858][ T31] audit: type=1326 audit(438.500:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.581741][ T31] audit: type=1326 audit(438.500:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.582547][ T31] audit: type=1326 audit(438.500:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.593459][ T31] audit: type=1326 audit(438.510:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.594488][ T31] audit: type=1326 audit(438.510:1494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 438.595242][ T31] audit: type=1326 audit(438.510:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6011 comm="syz.0.502" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 448.226291][ T6017] serio: Serial port pts0 [ 451.307144][ T6026] netlink: 16 bytes leftover after parsing attributes in process `syz.0.507'. [ 453.069668][ T6039] netlink: 4 bytes leftover after parsing attributes in process `syz.0.511'. [ 455.333482][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.471601][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.553421][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.750036][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.532790][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 456.554552][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 456.569855][ T11] bond0 (unregistering): Released all slaves [ 456.786900][ T11] hsr_slave_0: left promiscuous mode [ 456.818594][ T11] veth1_macvtap: left promiscuous mode [ 456.819705][ T11] veth0_macvtap: left promiscuous mode [ 456.820126][ T11] veth1_vlan: left promiscuous mode [ 456.820461][ T11] veth0_vlan: left promiscuous mode [ 457.479463][ T31] audit: type=1326 audit(457.400:1496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.480601][ T31] audit: type=1326 audit(457.400:1497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.490699][ T31] audit: type=1326 audit(457.410:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.497443][ T31] audit: type=1326 audit(457.410:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.498383][ T31] audit: type=1326 audit(457.410:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.532051][ T31] audit: type=1326 audit(457.450:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=429 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.533340][ T31] audit: type=1326 audit(457.450:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6129 comm="syz.0.515" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 460.597441][ T6028] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 460.610369][ T6028] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 463.799566][ T6028] hsr_slave_0: entered promiscuous mode [ 463.808257][ T6028] hsr_slave_1: entered promiscuous mode [ 463.832442][ T6028] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 463.833170][ T6028] Cannot create hsr debugfs directory [ 465.038199][ T6028] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 465.139594][ T6028] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 465.158496][ T6028] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 465.206730][ T6028] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 467.449995][ T6028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 477.288979][ T6028] veth0_vlan: entered promiscuous mode [ 477.330622][ T6028] veth1_vlan: entered promiscuous mode [ 477.637220][ T6028] veth0_macvtap: entered promiscuous mode [ 477.663512][ T6028] veth1_macvtap: entered promiscuous mode [ 477.794322][ T6028] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.794884][ T6028] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.795222][ T6028] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.796893][ T6028] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 478.443223][ T6442] serio: Serial port pts0 [ 479.799114][ T31] audit: type=1326 audit(479.720:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.800344][ T31] audit: type=1326 audit(479.720:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.801542][ T31] audit: type=1326 audit(479.720:1505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.808688][ T31] audit: type=1326 audit(479.730:1506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.810381][ T31] audit: type=1326 audit(479.730:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.831261][ T31] audit: type=1326 audit(479.730:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.857674][ T31] audit: type=1326 audit(479.730:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.858695][ T31] audit: type=1326 audit(479.740:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=340 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.859477][ T31] audit: type=1326 audit(479.740:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 479.860299][ T31] audit: type=1326 audit(479.740:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.3.518" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.400404][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 488.400520][ T31] audit: type=1326 audit(488.320:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.403024][ T31] audit: type=1326 audit(488.320:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.425476][ T31] audit: type=1326 audit(488.340:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.441506][ T31] audit: type=1326 audit(488.360:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.442616][ T31] audit: type=1326 audit(488.360:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.443713][ T31] audit: type=1326 audit(488.360:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.444738][ T31] audit: type=1326 audit(488.360:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.476452][ T31] audit: type=1326 audit(488.380:1541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.477678][ T31] audit: type=1326 audit(488.380:1542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 488.499700][ T31] audit: type=1326 audit(488.420:1543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6508 comm="syz.3.531" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 489.486774][ T6517] netlink: 3 bytes leftover after parsing attributes in process `syz.0.534'. [ 489.487334][ T6517] 1ªX¹¦À: renamed from 60ªX¹¦À (while UP) [ 489.502774][ T6517] A link change request failed with some changes committed already. Interface 61ªX¹¦À may have been left with an inconsistent configuration, please check. [ 490.899843][ T6539] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.019304][ T6539] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.130651][ T6539] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.278937][ T6539] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.478791][ T6539] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.540554][ T6539] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.579914][ T6539] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.631279][ T6539] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 493.521480][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 493.521606][ T31] audit: type=1326 audit(493.440:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6587 comm="syz.0.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 493.527720][ T31] audit: type=1326 audit(493.450:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6587 comm="syz.0.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 493.530817][ T31] audit: type=1326 audit(493.450:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6587 comm="syz.0.555" exe="/syz-executor" sig=0 arch=40000028 syscall=153 compat=0 ip=0x133450 code=0x7ffc0000 [ 493.538636][ T31] audit: type=1326 audit(493.460:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6587 comm="syz.0.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 493.541118][ T31] audit: type=1326 audit(493.460:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6587 comm="syz.0.555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 493.809318][ T6590] netlink: 172 bytes leftover after parsing attributes in process `syz.0.556'. [ 493.810096][ T6590] netlink: 16 bytes leftover after parsing attributes in process `syz.0.556'. [ 495.127282][ T31] audit: type=1400 audit(495.050:1648): avc: denied { read } for pid=6598 comm="syz.3.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 498.220879][ T6618] netlink: 4 bytes leftover after parsing attributes in process `syz.3.567'. [ 498.221642][ T6618] netlink: 4 bytes leftover after parsing attributes in process `syz.3.567'. [ 498.222302][ T6618] netlink: 4 bytes leftover after parsing attributes in process `syz.3.567'. [ 498.516581][ T31] audit: type=1400 audit(498.430:1649): avc: denied { mounton } for pid=6619 comm="syz.0.568" path="/362/bus" dev="tmpfs" ino=1865 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 498.521995][ T31] audit: type=1400 audit(498.440:1650): avc: denied { lock } for pid=6619 comm="syz.0.568" path="/362/bus" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 498.585619][ T31] audit: type=1400 audit(498.500:1651): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 502.483289][ T31] audit: type=1400 audit(502.400:1652): avc: denied { create } for pid=6643 comm="syz.0.579" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 502.497664][ T31] audit: type=1400 audit(502.420:1653): avc: denied { write } for pid=6643 comm="syz.0.579" name="file0" dev="tmpfs" ino=1902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 502.498800][ T31] audit: type=1400 audit(502.420:1654): avc: denied { open } for pid=6643 comm="syz.0.579" path="/369/file0" dev="tmpfs" ino=1902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 502.503667][ T31] audit: type=1400 audit(502.420:1655): avc: denied { ioctl } for pid=6643 comm="syz.0.579" path="/369/file0" dev="tmpfs" ino=1902 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 502.659600][ T31] audit: type=1400 audit(502.580:1656): avc: denied { unlink } for pid=3092 comm="syz-executor" name="file0" dev="tmpfs" ino=1902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 504.016126][ T31] audit: type=1326 audit(503.930:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6657 comm="syz.0.586" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 504.017165][ T31] audit: type=1326 audit(503.930:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6657 comm="syz.0.586" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 504.021125][ T31] audit: type=1326 audit(503.940:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6657 comm="syz.0.586" exe="/syz-executor" sig=0 arch=40000028 syscall=141 compat=0 ip=0x133450 code=0x7ffc0000 [ 504.028660][ T31] audit: type=1326 audit(503.940:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6657 comm="syz.0.586" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 504.031927][ T31] audit: type=1326 audit(503.940:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6657 comm="syz.0.586" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 508.219827][ T6677] pimreg: entered allmulticast mode [ 508.227790][ T6677] pimreg: left allmulticast mode [ 513.269505][ T6710] SELinux: Context system_u:object_r:su_exec_t:s0 is not valid (left unmapped). [ 513.271909][ T31] audit: type=1400 audit(513.190:1662): avc: denied { relabelfrom } for pid=6709 comm="syz.0.604" name="TCPv6" dev="sockfs" ino=8008 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 513.272901][ T31] audit: type=1400 audit(513.190:1663): avc: denied { relabelto } for pid=6709 comm="syz.0.604" name="TCPv6" dev="sockfs" ino=8008 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=tcp_socket permissive=1 trawcon="system_u:object_r:su_exec_t:s0" [ 516.461122][ T6717] netlink: 16 bytes leftover after parsing attributes in process `syz.0.607'. [ 516.837140][ T31] audit: type=1326 audit(516.740:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 516.844612][ T31] audit: type=1326 audit(516.750:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 516.868557][ T31] audit: type=1326 audit(516.760:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=336 compat=0 ip=0x133450 code=0x7ffc0000 [ 518.260233][ T31] audit: type=1326 audit(518.180:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xefd98 code=0x7ffc0000 [ 518.268502][ T31] audit: type=1326 audit(518.190:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 518.326343][ T31] audit: type=1326 audit(518.190:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6718 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.516447][ T31] audit: type=1400 audit(520.430:1670): avc: denied { write } for pid=6730 comm="syz.0.613" name="fib_trie" dev="proc" ino=4026532761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 525.487343][ T6738] netlink: 68 bytes leftover after parsing attributes in process `syz.3.615'. [ 526.703598][ T31] audit: type=1400 audit(526.620:1671): avc: denied { read } for pid=6741 comm="syz.0.617" path="socket:[7130]" dev="sockfs" ino=7130 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 544.594285][ T31] audit: type=1326 audit(544.510:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.602606][ T31] audit: type=1326 audit(544.520:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.612074][ T31] audit: type=1326 audit(544.530:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.619622][ T31] audit: type=1326 audit(544.530:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.620741][ T31] audit: type=1326 audit(544.530:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.626845][ T31] audit: type=1326 audit(544.540:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.631570][ T31] audit: type=1326 audit(544.550:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.632556][ T31] audit: type=1326 audit(544.550:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.639523][ T31] audit: type=1326 audit(544.560:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 544.640782][ T31] audit: type=1326 audit(544.560:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6767 comm="syz.3.623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.565040][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 652.565157][ T31] audit: type=1326 audit(652.480:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.573864][ T31] audit: type=1326 audit(652.490:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.574914][ T31] audit: type=1326 audit(652.490:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.588111][ T31] audit: type=1326 audit(652.510:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.598130][ T31] audit: type=1326 audit(652.510:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.601397][ T31] audit: type=1326 audit(652.520:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.607244][ T31] audit: type=1326 audit(652.530:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.641634][ T31] audit: type=1326 audit(652.560:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.643871][ T31] audit: type=1326 audit(652.560:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 652.645116][ T31] audit: type=1326 audit(652.560:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6853 comm="syz.3.648" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.065640][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 677.066888][ T31] audit: type=1326 audit(676.980:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.067857][ T31] audit: type=1326 audit(676.980:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.075071][ T31] audit: type=1326 audit(676.990:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.077109][ T31] audit: type=1326 audit(676.990:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.078761][ T31] audit: type=1326 audit(677.000:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.079332][ T31] audit: type=1326 audit(677.000:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.081593][ T31] audit: type=1326 audit(677.000:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.083210][ T31] audit: type=1326 audit(677.000:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.094831][ T31] audit: type=1326 audit(677.000:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.102383][ T31] audit: type=1326 audit(677.000:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6865 comm="syz.3.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 677.929862][ T6868] syz.3.653[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.930296][ T6868] syz.3.653[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.931205][ T6868] syz.3.653[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.912170][ T6875] pim6reg1: entered promiscuous mode [ 679.913265][ T6875] pim6reg1: entered allmulticast mode [ 682.314792][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 682.314897][ T31] audit: type=1326 audit(682.230:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.320199][ T31] audit: type=1326 audit(682.230:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.363648][ T31] audit: type=1326 audit(682.280:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.383189][ T31] audit: type=1326 audit(682.300:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.387786][ T31] audit: type=1326 audit(682.300:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.388569][ T31] audit: type=1326 audit(682.300:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.399469][ T31] audit: type=1326 audit(682.320:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.400466][ T31] audit: type=1326 audit(682.320:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.401296][ T31] audit: type=1326 audit(682.320:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 682.412716][ T31] audit: type=1326 audit(682.320:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6891 comm="syz.0.660" exe="/syz-executor" sig=0 arch=40000028 syscall=440 compat=0 ip=0x133450 code=0x7ffc0000 [ 690.048847][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 690.049039][ T31] audit: type=1400 audit(689.970:1788): avc: denied { write } for pid=6932 comm="syz.0.676" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 694.661612][ T31] audit: type=1400 audit(694.580:1789): avc: denied { relabelfrom } for pid=6953 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 694.663868][ T31] audit: type=1400 audit(694.580:1790): avc: denied { relabelto } for pid=6953 comm="syz.0.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 695.656782][ T5152] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 695.898064][ T5152] usb 1-1: Using ep0 maxpacket: 32 [ 695.920331][ T5152] usb 1-1: config 0 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 32, changing to 9 [ 695.921042][ T5152] usb 1-1: config 0 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 695.922134][ T5152] usb 1-1: config 0 interface 0 has no altsetting 0 [ 695.924032][ T5152] usb 1-1: New USB device found, idVendor=056a, idProduct=00c4, bcdDevice= 0.00 [ 695.937877][ T5152] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 695.963130][ T5152] usb 1-1: config 0 descriptor?? [ 696.485518][ T5152] wacom 0003:056A:00C4.0004: unknown main item tag 0x0 [ 696.503634][ T5152] wacom 0003:056A:00C4.0004: hidraw0: USB HID v0.00 Device [HID 056a:00c4] on usb-dummy_hcd.0-1/input0 [ 696.673685][ T5014] usb 1-1: USB disconnect, device number 14 [ 698.705450][ T31] audit: type=1326 audit(698.620:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.707685][ T31] audit: type=1326 audit(698.630:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.708720][ T31] audit: type=1326 audit(698.630:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.710455][ T31] audit: type=1326 audit(698.630:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.711742][ T31] audit: type=1326 audit(698.630:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.712671][ T31] audit: type=1326 audit(698.630:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.714821][ T31] audit: type=1326 audit(698.630:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.747223][ T31] audit: type=1326 audit(698.630:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.748187][ T31] audit: type=1326 audit(698.630:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 698.748890][ T31] audit: type=1326 audit(698.640:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.0.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 710.515377][ T7013] pim6reg1: entered promiscuous mode [ 710.535308][ T7013] pim6reg1: entered allmulticast mode [ 711.442350][ T7023] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 711.467773][ T7023] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 721.716544][ T7054] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 721.739315][ T7054] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 722.938633][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 722.938757][ T31] audit: type=1326 audit(722.840:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.966683][ T31] audit: type=1326 audit(722.870:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.967754][ T31] audit: type=1326 audit(722.890:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131248 code=0x7ffc0000 [ 722.968771][ T31] audit: type=1326 audit(722.890:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131248 code=0x7ffc0000 [ 722.976455][ T31] audit: type=1326 audit(722.890:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.977957][ T31] audit: type=1326 audit(722.890:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.981504][ T31] audit: type=1326 audit(722.900:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=385 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.982977][ T31] audit: type=1326 audit(722.900:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 722.984138][ T31] audit: type=1326 audit(722.900:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 723.016330][ T31] audit: type=1326 audit(722.900:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7059 comm="syz.3.712" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x133450 code=0x7ffc0000 [ 723.893681][ T7066] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 723.906996][ T7066] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 725.193163][ T7078] syz.3.720[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.193536][ T7078] syz.3.720[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.194310][ T7078] syz.3.720[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 764.200997][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 764.201235][ T31] audit: type=1400 audit(764.120:1839): avc: denied { read } for pid=7134 comm="syz.3.743" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 764.203274][ T31] audit: type=1400 audit(764.120:1840): avc: denied { open } for pid=7134 comm="syz.3.743" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 764.211725][ T31] audit: type=1400 audit(764.130:1841): avc: denied { ioctl } for pid=7134 comm="syz.3.743" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 764.213123][ T31] audit: type=1400 audit(764.130:1842): avc: denied { set_context_mgr } for pid=7134 comm="syz.3.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 764.997258][ T31] audit: type=1326 audit(764.900:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 765.000626][ T31] audit: type=1326 audit(764.920:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 765.034089][ T31] audit: type=1326 audit(764.930:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 765.038930][ T31] audit: type=1326 audit(764.950:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x133450 code=0x7ffc0000 [ 765.040230][ T31] audit: type=1326 audit(764.960:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 765.042902][ T31] audit: type=1326 audit(764.960:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7134 comm="syz.3.743" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x133450 code=0x7ffc0000 [ 778.947151][ T7149] netlink: 16 bytes leftover after parsing attributes in process `syz.0.747'. [ 778.948210][ T7149] netlink: 4 bytes leftover after parsing attributes in process `syz.0.747'. [ 784.904058][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 784.904128][ T31] audit: type=1400 audit(784.820:1851): avc: denied { create } for pid=7151 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 800.901213][ T7159] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 800.919960][ T7159] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 802.143030][ T7159] hsr_slave_0: entered promiscuous mode [ 802.149072][ T7159] hsr_slave_1: entered promiscuous mode [ 802.152776][ T7159] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 802.153327][ T7159] Cannot create hsr debugfs directory [ 802.709878][ T7159] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 802.723129][ T7159] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 802.733821][ T7159] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 802.750443][ T7159] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 803.579828][ T7159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 808.209022][ T7159] veth0_vlan: entered promiscuous mode [ 808.239610][ T7159] veth1_vlan: entered promiscuous mode [ 808.324094][ T7159] veth0_macvtap: entered promiscuous mode [ 808.339847][ T7159] veth1_macvtap: entered promiscuous mode [ 808.428526][ T7159] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.429156][ T7159] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.429477][ T7159] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.430144][ T7159] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.712389][ T31] audit: type=1326 audit(808.630:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.716333][ T31] audit: type=1326 audit(808.630:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.720833][ T31] audit: type=1326 audit(808.640:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.724044][ T31] audit: type=1326 audit(808.640:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.729756][ T31] audit: type=1326 audit(808.650:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.730795][ T31] audit: type=1326 audit(808.650:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.731758][ T31] audit: type=1326 audit(808.650:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=354 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.753718][ T31] audit: type=1326 audit(808.650:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.754999][ T31] audit: type=1326 audit(808.650:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7507 comm="syz.4.750" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 808.978436][ T31] audit: type=1400 audit(808.890:1861): avc: denied { read } for pid=7509 comm="syz.4.751" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 809.764014][ T7518] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 809.772388][ T7518] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 832.650974][ T7542] pim6reg1: entered promiscuous mode [ 832.652861][ T7542] pim6reg1: entered allmulticast mode [ 835.697889][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 835.698001][ T31] audit: type=1400 audit(835.620:1864): avc: denied { name_bind } for pid=7558 comm="syz.0.765" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 843.558403][ T5114] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 843.787069][ T5114] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 843.789681][ T5114] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 843.819590][ T5114] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 843.836908][ T5114] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 843.837587][ T5114] usb 1-1: SerialNumber: syz [ 843.946974][ T7581] pim6reg1: entered promiscuous mode [ 843.947861][ T7581] pim6reg1: entered allmulticast mode [ 844.167201][ T5114] usb 1-1: 0:2 : does not exist [ 844.196928][ T5114] usb 1-1: USB disconnect, device number 15 [ 845.022764][ T31] audit: type=1400 audit(844.940:1865): avc: denied { append } for pid=7606 comm="syz.0.775" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 845.458853][ T7616] netlink: 20 bytes leftover after parsing attributes in process `syz.0.777'. [ 869.399973][ T7666] netlink: 32 bytes leftover after parsing attributes in process `syz.4.788'. [ 870.032213][ T7669] input: syz1 as /devices/virtual/input/input7 [ 872.143215][ T31] audit: type=1400 audit(872.060:1866): avc: denied { create } for pid=7684 comm="syz.4.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 872.144288][ T31] audit: type=1400 audit(872.060:1867): avc: denied { bind } for pid=7684 comm="syz.4.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 872.166790][ T31] audit: type=1400 audit(872.080:1868): avc: denied { setopt } for pid=7684 comm="syz.4.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 872.167677][ T31] audit: type=1400 audit(872.090:1869): avc: denied { accept } for pid=7684 comm="syz.4.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 872.189437][ T31] audit: type=1400 audit(872.110:1870): avc: denied { write } for pid=7684 comm="syz.4.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 876.479639][ T7702] input: syz0 as /devices/virtual/input/input8 [ 881.842451][ T31] audit: type=1400 audit(881.760:1871): avc: denied { ioctl } for pid=7713 comm="syz.4.802" path="socket:[9070]" dev="sockfs" ino=9070 ioctlcmd=0x8b1b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 887.550338][ T7721] veth1: entered promiscuous mode [ 891.706556][ T31] audit: type=1400 audit(891.620:1872): avc: denied { setopt } for pid=7732 comm="syz.0.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 892.449140][ T31] audit: type=1400 audit(892.370:1873): avc: denied { bind } for pid=7732 comm="syz.0.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 892.783541][ T7743] netlink: 4 bytes leftover after parsing attributes in process `syz.0.810'. [ 892.991223][ T11] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.063396][ T11] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.162640][ T11] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.259780][ T11] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.744074][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 893.773097][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 893.781954][ T11] bond0 (unregistering): Released all slaves [ 893.907095][ T11] hsr_slave_0: left promiscuous mode [ 893.913417][ T11] hsr_slave_1: left promiscuous mode [ 893.947798][ T11] veth1_macvtap: left promiscuous mode [ 893.948839][ T11] veth0_macvtap: left promiscuous mode [ 893.949394][ T11] veth1_vlan: left promiscuous mode [ 893.949755][ T11] veth0_vlan: left promiscuous mode [ 900.042683][ T7800] netlink: 12 bytes leftover after parsing attributes in process `syz.4.821'. [ 901.933605][ T7822] netlink: 8 bytes leftover after parsing attributes in process `syz.4.826'. [ 901.934392][ T7822] netlink: 8 bytes leftover after parsing attributes in process `syz.4.826'. [ 932.236237][ T31] audit: type=1400 audit(932.150:1874): avc: denied { mount } for pid=7935 comm="syz.0.843" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 932.347904][ T31] audit: type=1400 audit(932.260:1875): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 944.989275][ T31] audit: type=1400 audit(944.910:1876): avc: denied { nlmsg_read } for pid=7963 comm="syz.4.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 944.991325][ T7964] netlink: 8 bytes leftover after parsing attributes in process `syz.4.850'. [ 944.994938][ T31] audit: type=1400 audit(944.910:1877): avc: denied { create } for pid=7963 comm="syz.4.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 945.005529][ T31] audit: type=1400 audit(944.920:1878): avc: denied { bind } for pid=7963 comm="syz.4.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 945.151432][ T7968] netlink: 732 bytes leftover after parsing attributes in process `syz.4.851'. [ 947.673167][ C1] vkms_vblank_simulate: vblank timer overrun [ 947.746869][ C1] vkms_vblank_simulate: vblank timer overrun [ 953.998754][ T7987] input: syz0 as /devices/virtual/input/input9 [ 968.057109][ T8044] syzkaller0: entered promiscuous mode [ 968.057803][ T8044] syzkaller0: entered allmulticast mode [ 968.279734][ T31] audit: type=1400 audit(968.200:1879): avc: denied { write } for pid=8053 comm="syz.0.871" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 973.244486][ T31] audit: type=1400 audit(973.160:1880): avc: denied { getopt } for pid=8084 comm="syz.0.883" laddr=::1 lport=7 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 982.262946][ T8123] IPv6: Can't replace route, no match found [ 1004.965188][ T8186] Driver unsupported XDP return value 0 on prog (id 490) dev N/A, expect packet loss! [ 1022.373191][ T31] audit: type=1326 audit(1022.290:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.381827][ T31] audit: type=1326 audit(1022.300:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.387595][ T31] audit: type=1326 audit(1022.300:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.397102][ T31] audit: type=1326 audit(1022.310:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.402275][ T31] audit: type=1326 audit(1022.320:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.413644][ T31] audit: type=1326 audit(1022.330:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.414525][ T31] audit: type=1326 audit(1022.330:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.421052][ T31] audit: type=1326 audit(1022.340:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.425018][ T31] audit: type=1326 audit(1022.340:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1022.433315][ T31] audit: type=1326 audit(1022.350:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.945" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1026.220439][ T8328] syz.0.951[8328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.225143][ T8328] syz.0.951[8328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.237403][ T8328] syz.0.951[8328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.274498][ T8328] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. [ 1032.325291][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1032.325405][ T31] audit: type=1400 audit(1032.240:1894): avc: denied { execute_no_trans } for pid=8384 comm="syz.4.968" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1063 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1040.757960][ T31] audit: type=1326 audit(1040.680:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.764034][ T31] audit: type=1326 audit(1040.680:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.776545][ T31] audit: type=1326 audit(1040.690:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.783259][ T31] audit: type=1326 audit(1040.700:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.791511][ T31] audit: type=1326 audit(1040.710:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.792444][ T31] audit: type=1326 audit(1040.710:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.803100][ T31] audit: type=1326 audit(1040.720:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.812201][ T31] audit: type=1326 audit(1040.730:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.814598][ T31] audit: type=1326 audit(1040.730:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1040.826990][ T31] audit: type=1326 audit(1040.740:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8473 comm="syz.4.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1042.110027][ T8498] pim6reg1: entered allmulticast mode [ 1042.372528][ T8508] input: syz0 as /devices/virtual/input/input10 [ 1049.554532][ T8564] syzkaller0: entered promiscuous mode [ 1049.556508][ T8564] syzkaller0: entered allmulticast mode [ 1050.439849][ T7466] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1050.551214][ T7466] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1050.665010][ T7466] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1050.769378][ T7466] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1051.667904][ T7466] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1051.688132][ T7466] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1051.721259][ T7466] bond0 (unregistering): Released all slaves [ 1051.891855][ T7466] hsr_slave_0: left promiscuous mode [ 1051.918807][ T7466] hsr_slave_1: left promiscuous mode [ 1051.941439][ T7466] veth1_macvtap: left promiscuous mode [ 1051.941951][ T7466] veth0_macvtap: left promiscuous mode [ 1051.942372][ T7466] veth1_vlan: left promiscuous mode [ 1051.942660][ T7466] veth0_vlan: left promiscuous mode [ 1054.633953][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1054.634067][ T31] audit: type=1400 audit(1054.550:1911): avc: denied { map } for pid=8704 comm="syz.4.1026" path="socket:[12818]" dev="sockfs" ino=12818 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1057.338038][ T8583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1057.378804][ T8583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1060.887859][ T8583] hsr_slave_0: entered promiscuous mode [ 1060.897445][ T8583] hsr_slave_1: entered promiscuous mode [ 1062.632866][ T8583] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1062.684586][ T8583] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1062.730572][ T8583] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1062.760125][ T8583] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1064.855206][ T8583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1065.468196][ T9004] fuse: Bad value for 'fd' [ 1067.428878][ T9023] fuse: Bad value for 'fd' [ 1074.539647][ T8583] veth0_vlan: entered promiscuous mode [ 1074.611425][ T8583] veth1_vlan: entered promiscuous mode [ 1074.740449][ T8583] veth0_macvtap: entered promiscuous mode [ 1074.762615][ T8583] veth1_macvtap: entered promiscuous mode [ 1074.909691][ T8583] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.910865][ T8583] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.911378][ T8583] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.911851][ T8583] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1076.181520][ T9099] syz.0.1045[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1076.181880][ T9099] syz.0.1045[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1076.182607][ T9099] syz.0.1045[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1078.946680][ T31] audit: type=1326 audit(1078.860:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.965290][ T31] audit: type=1326 audit(1078.880:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.973918][ T31] audit: type=1326 audit(1078.880:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.974743][ T31] audit: type=1326 audit(1078.890:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=93 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.975438][ T31] audit: type=1326 audit(1078.890:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.989341][ T31] audit: type=1326 audit(1078.890:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.990223][ T31] audit: type=1326 audit(1078.910:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.990876][ T31] audit: type=1326 audit(1078.910:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1078.991566][ T31] audit: type=1326 audit(1078.910:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1079.016193][ T31] audit: type=1326 audit(1078.920:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9123 comm="syz.0.1051" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x133450 code=0x7ffc0000 [ 1084.485283][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1084.485410][ T31] audit: type=1400 audit(1084.400:1933): avc: denied { mount } for pid=9159 comm="syz.4.1063" name="/" dev="configfs" ino=1126 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1084.524099][ T31] audit: type=1400 audit(1084.440:1934): avc: denied { read } for pid=9159 comm="syz.4.1063" name="/" dev="configfs" ino=1126 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1084.533019][ T31] audit: type=1400 audit(1084.450:1935): avc: denied { open } for pid=9159 comm="syz.4.1063" path="/165/file0" dev="configfs" ino=1126 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1084.595522][ T31] audit: type=1400 audit(1084.510:1936): avc: denied { unmount } for pid=7159 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1087.032736][ T9202] syz.0.1079[9202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1087.033061][ T9202] syz.0.1079[9202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1087.033532][ T9202] syz.0.1079[9202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1090.114298][ T9213] fuse: Bad value for 'fd' [ 1099.309311][ T9228] fuse: Bad value for 'fd' [ 1101.524678][ T9244] netdevsim netdevsim0 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 1101.525334][ T9244] netdevsim netdevsim0 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 1101.537418][ T9244] netdevsim netdevsim0 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 1101.537980][ T9244] netdevsim netdevsim0 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 1101.538515][ T9244] geneve2: entered promiscuous mode [ 1101.538763][ T9244] geneve2: entered allmulticast mode [ 1101.797740][ T9249] fuse: Bad value for 'fd' [ 1107.067348][ T9294] fuse: Bad value for 'fd' [ 1107.929197][ T9305] fuse: Bad value for 'fd' [ 1108.525424][ T9318] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9318 comm=syz.4.1117 [ 1108.654998][ T9321] fuse: Bad value for 'fd' [ 1110.962626][ T9337] syz.0.1124[9337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1110.963025][ T9337] syz.0.1124[9337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1110.964119][ T9337] syz.0.1124[9337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1111.796639][ T9354] IPv4: Oversized IP packet from 172.20.20.24 [ 1111.799029][ C1] IPv4: Oversized IP packet from 172.20.20.24 [ 1111.799468][ C1] IPv4: Oversized IP packet from 172.20.20.24 [ 1113.389232][ T31] audit: type=1400 audit(1113.310:1937): avc: denied { create } for pid=9365 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1113.393835][ T31] audit: type=1400 audit(1113.310:1938): avc: denied { write } for pid=9365 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1122.428550][ T9431] syz.0.1143[9431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.428759][ T9431] syz.0.1143[9431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.429410][ T9431] syz.0.1143[9431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1122.464121][ T9431] fuse: Unknown parameter 'ÿ' [ 1123.178315][ T9450] fuse: Bad value for 'fd' [ 1125.812018][ T31] audit: type=1400 audit(1125.730:1939): avc: denied { mount } for pid=9460 comm="syz.4.1154" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1126.261750][ T9467] netem: change failed [ 1126.605436][ T9469] syzkaller0: entered promiscuous mode [ 1126.627797][ T9469] syzkaller0: entered allmulticast mode [ 1128.092830][ T31] audit: type=1400 audit(1128.010:1940): avc: denied { sqpoll } for pid=9506 comm="syz.4.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1128.378345][ T9514] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1169'. [ 1132.902443][ T31] audit: type=1400 audit(1132.820:1941): avc: denied { remount } for pid=9553 comm="syz.4.1182" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1135.778365][ T31] audit: type=1400 audit(1135.690:1942): avc: denied { name_bind } for pid=9599 comm="syz.4.1196" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1145.893352][ T31] audit: type=1326 audit(1145.810:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.948574][ T31] audit: type=1326 audit(1145.870:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.950082][ T31] audit: type=1326 audit(1145.870:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.979419][ T31] audit: type=1326 audit(1145.880:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.980324][ T31] audit: type=1326 audit(1145.890:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.981075][ T31] audit: type=1326 audit(1145.900:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1145.981774][ T31] audit: type=1326 audit(1145.900:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 1146.006301][ T31] audit: type=1326 audit(1145.900:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1146.007591][ T31] audit: type=1326 audit(1145.920:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1146.012697][ T31] audit: type=1326 audit(1145.930:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9667 comm="syz.4.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 1147.541656][ T9690] fuse: Bad value for 'group_id' [ 1147.542209][ T9690] fuse: Bad value for 'group_id' [ 1148.400552][ T9704] fuse: Bad value for 'group_id' [ 1148.401104][ T9704] fuse: Bad value for 'group_id' [ 1149.560438][ T9728] fuse: Bad value for 'group_id' [ 1149.561076][ T9728] fuse: Bad value for 'group_id' [ 1149.730175][ T9730] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1149.731138][ T9730] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1149.990869][ T9738] fuse: Bad value for 'group_id' [ 1149.991346][ T9738] fuse: Bad value for 'group_id' [ 1150.599806][ T9747] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1150.607061][ T9747] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1151.410247][ T9758] fuse: Bad value for 'group_id' [ 1151.411679][ T9758] fuse: Bad value for 'group_id' [ 1151.662919][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 1151.663050][ T31] audit: type=1326 audit(1151.580:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1151.676863][ T31] audit: type=1326 audit(1151.590:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=359 compat=0 ip=0x133450 code=0x7ffc0000 [ 1151.683319][ T31] audit: type=1326 audit(1151.590:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1151.689128][ T31] audit: type=1326 audit(1151.600:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=342 compat=0 ip=0x133450 code=0x7ffc0000 [ 1151.690147][ T31] audit: type=1326 audit(1151.600:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1151.707463][ T31] audit: type=1326 audit(1151.630:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9760 comm="syz.0.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1155.962479][ T31] audit: type=1326 audit(1155.790:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9808 comm="syz.4.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1155.963508][ T31] audit: type=1326 audit(1155.810:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9808 comm="syz.4.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x133450 code=0x7ffc0000 [ 1155.964238][ T31] audit: type=1326 audit(1155.810:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9808 comm="syz.4.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1155.965324][ T31] audit: type=1326 audit(1155.810:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9808 comm="syz.4.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=388 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.163534][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1157.163607][ T31] audit: type=1326 audit(1157.080:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.173752][ T31] audit: type=1326 audit(1157.090:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.196164][ T31] audit: type=1326 audit(1157.100:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.197188][ T31] audit: type=1326 audit(1157.110:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.218795][ T31] audit: type=1326 audit(1157.120:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.219749][ T31] audit: type=1326 audit(1157.130:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.224967][ T31] audit: type=1326 audit(1157.140:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=231 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.256441][ T31] audit: type=1326 audit(1157.150:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9828 comm="syz.4.1276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1157.451370][ T9833] fuse: Unknown parameter 'grou00000000000000000000' [ 1157.768608][ T9838] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1157.773453][ T9838] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1167.610637][ T9853] fuse: Unknown parameter 'grou00000000000000000000' [ 1167.871130][ T9857] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1167.875040][ T9857] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1168.717730][ T9872] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1168.720564][ T9872] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1168.850171][ T9876] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1168.852850][ T9876] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1184.739990][ T9912] binder: 9909:9912 ioctl c0306201 20000080 returned -22 [ 1185.193643][ T31] audit: type=1400 audit(1185.110:1995): avc: denied { map } for pid=9920 comm="syz.4.1305" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1185.229168][ T31] audit: type=1400 audit(1185.150:1996): avc: denied { call } for pid=9920 comm="syz.4.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1198.620738][ T31] audit: type=1326 audit(1198.540:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9942 comm="syz.4.1311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1198.629169][ T31] audit: type=1326 audit(1198.550:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9942 comm="syz.4.1311" exe="/syz-executor" sig=0 arch=40000028 syscall=359 compat=0 ip=0x133450 code=0x7ffc0000 [ 1198.629753][ T31] audit: type=1326 audit(1198.550:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9942 comm="syz.4.1311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1216.163710][T10021] cgroup: Unknown subsys name 'cpuset' [ 1222.744337][T10067] input: syz1 as /devices/virtual/input/input13 [ 1230.817341][T10127] fuse: Bad value for 'fd' [ 1243.253938][T10170] fuse: Unknown parameter 'grou00000000000000000000' [ 1244.013087][T10181] tmpfs: Cannot enable swap on remount if it was disabled on first mount [ 1244.018784][T10181] netlink: 36 bytes leftover after parsing attributes in process `+}[@'. [ 1244.115313][ T31] audit: type=1400 audit(1243.930:2000): avc: denied { remount } for pid=10180 comm="syz.0.1387" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1246.448646][ T31] audit: type=1400 audit(1246.370:2001): avc: denied { audit_write } for pid=10196 comm="syz.4.1392" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1256.452330][ T31] audit: type=1400 audit(1256.370:2002): avc: denied { name_bind } for pid=10237 comm="syz.0.1398" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1256.473667][T10240] fuse: Unknown parameter 'user00000000000000000000' [ 1256.754615][ T31] audit: type=1400 audit(1256.670:2003): avc: denied { mount } for pid=10241 comm="syz.4.1400" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1257.133218][ T31] audit: type=1400 audit(1257.050:2004): avc: denied { read } for pid=10249 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1259.091045][T10253] fuse: Unknown parameter 'user_i00000000000000000000' [ 1260.933763][T10276] fuse: Unknown parameter 'user_i00000000000000000000' [ 1262.141474][T10289] fuse: Unknown parameter 'user_id00000000000000000000' [ 1274.198060][T10325] binder: 10324:10325 ioctl c018620c 20000000 returned -1 [ 1275.637609][T10333] fuse: Invalid rootmode [ 1275.817875][T10335] fuse: Unknown parameter '0x0000000000000004' [ 1276.234295][T10339] fuse: Bad value for 'fd' [ 1276.739413][T10343] fuse: Invalid rootmode [ 1278.150089][T10350] fuse: Bad value for 'fd' [ 1294.691395][T10358] fuse: Bad value for 'rootmode' [ 1294.909063][T10360] binfmt_misc: register: failed to install interpreter file ./file0 [ 1295.747209][ T31] audit: type=1400 audit(1295.670:2005): avc: denied { create } for pid=10365 comm="syz.0.1447" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=udp_socket permissive=1 [ 1295.930772][T10371] fuse: Bad value for 'rootmode' [ 1297.979893][T10403] fuse: Bad value for 'rootmode' [ 1307.528331][T10420] fuse: Unknown parameter 'use00000000000000000000' [ 1309.149587][ T31] audit: type=1107 audit(1309.070:2006): pid=10434 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='„r' [ 1313.748493][ T31] audit: type=1400 audit(1313.660:2007): avc: denied { view } for pid=10458 comm="syz.0.1472" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1313.947095][ T31] audit: type=1400 audit(1313.870:2008): avc: denied { load_policy } for pid=10462 comm="syz.0.1473" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1313.950154][T10463] SELinux: policydb string does not match my string SE Linux [ 1313.950707][T10463] SELinux: failed to load policy [ 1322.055003][ T31] audit: type=1400 audit(1321.970:2009): avc: denied { setattr } for pid=10479 comm="syz.4.1480" name="protocols" dev="proc" ino=4026532987 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1322.483856][T10486] syz.4.1483[10486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.484243][T10486] syz.4.1483[10486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.485023][T10486] syz.4.1483[10486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.210763][T10506] syz.4.1491[10506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.211828][T10506] syz.4.1491[10506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.242485][T10506] syz.4.1491[10506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1326.224996][T10533] fuse: Unknown parameter 'group_i00000000000000000000' [ 1327.138510][T10556] fuse: Unknown parameter 'group_id00000000000000000000' [ 1330.345490][T10602] veth0_vlan: entered allmulticast mode [ 1332.140559][T10615] pim6reg1: entered promiscuous mode [ 1332.140896][T10615] pim6reg1: entered allmulticast mode [ 1338.159942][T10662] fuse: Bad value for 'rootmode' [ 1341.128696][ T31] audit: type=1400 audit(1341.040:2010): avc: denied { ioctl } for pid=10679 comm="syz.0.1533" path="socket:[16659]" dev="sockfs" ino=16659 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1343.073072][T10695] fuse: Unknown parameter 'use00000000000000000000' [ 1343.299178][T10697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10697 comm=syz.0.1540 [ 1343.310546][T10697] netlink: 'syz.0.1540': attribute type 1 has an invalid length. [ 1343.490895][T10697] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1343.534719][T10697] bond1: (slave ip6gretap1): making interface the new active one [ 1343.560160][T10697] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 1343.577087][T10697] bond1: entered allmulticast mode [ 1343.578593][T10697] ip6gretap1: entered allmulticast mode [ 1349.047684][T10756] syz.0.1548[10756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1349.048082][T10756] syz.0.1548[10756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1349.048745][T10756] syz.0.1548[10756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1386.829833][T10831] pim6reg1: entered promiscuous mode [ 1386.830648][T10831] pim6reg1: entered allmulticast mode [ 1387.433797][ T31] audit: type=1400 audit(1387.300:2011): avc: denied { connect } for pid=10838 comm="syz.4.1572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1399.472629][T10859] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1577'. [ 1402.595116][T10873] mmap: syz.4.1582 (10873) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1415.090480][ T31] audit: type=1400 audit(1415.010:2012): avc: denied { setopt } for pid=10880 comm="syz.4.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1415.654876][ T31] audit: type=1326 audit(1415.570:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.659354][ T31] audit: type=1326 audit(1415.580:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.660166][ T31] audit: type=1326 audit(1415.580:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.663154][ T31] audit: type=1326 audit(1415.580:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.666396][ T31] audit: type=1326 audit(1415.580:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.675109][ T31] audit: type=1326 audit(1415.590:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.678676][ T31] audit: type=1326 audit(1415.600:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.681450][ T31] audit: type=1326 audit(1415.600:2020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1415.682851][ T31] audit: type=1326 audit(1415.600:2021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.4.1588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1425.138896][T10895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1425.153780][T10895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1426.909180][T10895] hsr_slave_0: entered promiscuous mode [ 1426.912658][T10895] hsr_slave_1: entered promiscuous mode [ 1426.914731][T10895] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1426.915546][T10895] Cannot create hsr debugfs directory [ 1427.613194][T10895] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1427.637314][T10895] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1427.649266][T10895] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1427.684551][T10895] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1429.271962][T10895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1430.723370][T11225] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1591'. [ 1433.330627][T10895] veth0_vlan: entered promiscuous mode [ 1433.359669][T10895] veth1_vlan: entered promiscuous mode [ 1433.427098][T10895] veth0_macvtap: entered promiscuous mode [ 1433.439340][T10895] veth1_macvtap: entered promiscuous mode [ 1433.509194][T10895] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1433.509687][T10895] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1433.509989][T10895] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1433.510275][T10895] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1434.043264][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1434.043374][ T31] audit: type=1326 audit(1433.960:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11251 comm="syz.5.1589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1434.050406][ T31] audit: type=1326 audit(1433.970:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11251 comm="syz.5.1589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1434.056898][ T31] audit: type=1326 audit(1433.970:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11251 comm="syz.5.1589" exe="/syz-executor" sig=0 arch=40000028 syscall=94 compat=0 ip=0x133450 code=0x7ffc0000 [ 1434.057923][ T31] audit: type=1326 audit(1433.970:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11251 comm="syz.5.1589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1434.065544][ T31] audit: type=1326 audit(1433.980:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11251 comm="syz.5.1589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 1434.474555][T11257] binder_alloc: 11256: binder_alloc_buf size 4 failed, no address space [ 1434.475244][T11257] binder_alloc: allocated: 4096 (num: 1 largest: 4096), free: 0 (num: 0 largest: 0) [ 1457.079746][ T31] audit: type=1400 audit(1456.990:2040): avc: denied { bind } for pid=11294 comm="syz.4.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1457.080543][ T31] audit: type=1400 audit(1456.990:2041): avc: denied { name_bind } for pid=11294 comm="syz.4.1604" src=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1457.081138][ T31] audit: type=1400 audit(1456.990:2042): avc: denied { node_bind } for pid=11294 comm="syz.4.1604" saddr=127.0.0.1 src=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1458.847769][T11304] wireguard0: entered promiscuous mode [ 1458.848296][T11304] wireguard0: entered allmulticast mode [ 1506.150378][T11430] syz.4.1637[11430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1506.151470][T11430] syz.4.1637[11430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1506.152094][T11430] syz.4.1637[11430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1507.000523][T11445] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1644'. [ 1507.001657][T11445] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1644'. [ 1507.002247][T11445] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1644'. [ 1507.002700][T11445] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1644'. [ 1534.328889][ T2942] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1534.329608][ T2942] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1534.441543][ T2942] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1534.442166][ T2942] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1534.572387][ T2942] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1534.573168][ T2942] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1534.703051][ T2942] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1534.703704][ T2942] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1535.407800][ T2942] bond1 (unregistering): (slave ip6gretap1): Releasing active interface [ 1535.408532][ T2942] ip6gretap1 (unregistering): left allmulticast mode [ 1535.779803][ T2942] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1535.803899][ T2942] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1535.828217][ T2942] bond0 (unregistering): Released all slaves [ 1535.883547][ T2942] bond1 (unregistering): Released all slaves [ 1536.058551][ T2942] hsr_slave_0: left promiscuous mode [ 1536.067825][ T2942] hsr_slave_1: left promiscuous mode [ 1536.093693][ T2942] veth1_macvtap: left promiscuous mode [ 1536.094320][ T2942] veth0_macvtap: left promiscuous mode [ 1536.094699][ T2942] veth1_vlan: left promiscuous mode [ 1552.922870][T11524] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1552.924907][T11524] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1590.964592][ T32] INFO: task kworker/0:48:5097 blocked for more than 430 seconds. [ 1590.965294][ T32] Not tainted 6.12.0-syzkaller #0 [ 1590.965425][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1590.979671][ T32] task:kworker/0:48 state:D stack:0 pid:5097 tgid:5097 ppid:2 flags:0x00000000 [ 1590.980531][ T32] Workqueue: events bpf_prog_free_deferred [ 1590.981615][ T32] Call trace: [ 1590.981992][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1590.982588][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e0039da4 r5:850dc800 [ 1590.982935][ T32] r4:850dc800 [ 1590.983206][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1590.983678][ T32] r5:850dc800 r4:82717e44 [ 1590.983844][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1590.984615][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1590.985170][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e20 [ 1590.985501][ T32] r4:00000000 [ 1590.987172][ T31] audit: type=1400 audit(1590.891:2043): avc: denied { write } for pid=3087 comm="syz-executor" path="pipe:[707]" dev="pipefs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1591.022420][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.023142][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.033106][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.033761][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37100 [ 1591.034085][ T32] r4:00000000 [ 1591.034386][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.034753][ T32] r9:850dc800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2d2000 [ 1591.035089][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.067582][ T32] r5:00001000 r4:eaad9000 [ 1591.068029][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.068498][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.069138][ T32] r5:843b1754 r4:843b1400 [ 1591.069379][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.069833][ T32] r7:dddd0000 r6:82c18000 r5:843b1754 r4:85392d00 [ 1591.070201][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.070917][ T32] r10:850dc800 r9:85392d2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 1591.071266][ T32] r4:85392d00 [ 1591.071474][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.112020][ T32] r10:00000000 r9:dfc91e78 r8:853a0440 r7:85392d00 r6:80267888 r5:850dc800 [ 1591.112453][ T32] r4:853a0900 [ 1591.113207][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.115470][ T32] Exception stack(0xe0039fb0 to 0xe0039ff8) [ 1591.128047][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1591.128301][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.128515][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.128875][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:853a0900 [ 1591.129824][ T32] INFO: task kworker/1:135:9626 blocked for more than 430 seconds. [ 1591.130273][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.130413][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.130709][ T32] task:kworker/1:135 state:D stack:0 pid:9626 tgid:9626 ppid:2 flags:0x00000000 [ 1591.131043][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.131218][ T32] Call trace: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1591.131337][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.133238][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:ee4ddda4 r5:8549c800 [ 1591.133559][ T32] r4:8549c800 [ 1591.133809][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.134383][ T32] r5:8549c800 r4:82717e44 [ 1591.134517][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.147122][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.147772][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4dde20 [ 1591.148107][ T32] r4:00000000 [ 1591.148319][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.148778][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.149312][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.149689][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6f1c0 [ 1591.149957][ T32] r4:00000000 [ 1591.150118][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.150435][ T32] r9:8549c800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2c8000 [ 1591.150690][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.168665][ T32] r5:00001000 r4:e4873000 [ 1591.169242][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.169757][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.170114][ T32] r5:8490f354 r4:8490f000 [ 1591.170657][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.171431][ T32] r7:ddde4000 r6:82c18200 r5:8490f354 r4:84b4db80 [ 1591.171643][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.171951][ T32] r10:8549c800 r9:84b4dbac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.172368][ T32] r4:84b4db80 [ 1591.172526][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.173029][ T32] r10:00000000 r9:edfa9e78 r8:84ac4300 r7:84b4db80 r6:80267888 r5:8549c800 [ 1591.173346][ T32] r4:84ac4a00 [ 1591.173503][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.173776][ T32] Exception stack(0xee4ddfb0 to 0xee4ddff8) [ 1591.174008][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1591.177936][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.178266][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.179333][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:84ac4a00 [ 1591.183007][ T32] INFO: task kworker/0:0:9648 blocked for more than 430 seconds. [ 1591.198069][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.198411][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.198718][ T32] task:kworker/0:0 state:D stack:0 pid:9648 tgid:9648 ppid:2 flags:0x00000000 [ 1591.199092][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.199495][ T32] Call trace: [ 1591.199687][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.200044][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:ee4b9da4 r5:83ffbc00 [ 1591.200344][ T32] r4:83ffbc00 [ 1591.200515][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.200817][ T32] r5:83ffbc00 r4:82717e44 [ 1591.201042][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.201371][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.201713][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee4b9e20 [ 1591.202077][ T32] r4:00000000 [ 1591.202229][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.202515][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.202807][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.203198][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84805900 [ 1591.203468][ T32] r4:00000000 [ 1591.203626][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.204176][ T32] r9:83ffbc00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2ca000 [ 1591.204451][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.204786][ T32] r5:00001000 r4:ea919000 [ 1591.205015][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.205380][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.217682][ T32] r5:84489b54 r4:84489800 [ 1591.217977][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.218392][ T32] r7:dddd0000 r6:82c18000 r5:84489b54 r4:84b82680 [ 1591.222199][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.266190][ T32] r10:83ffbc00 r9:84b826ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 1591.267203][ T32] r4:84b82680 [ 1591.268189][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.274826][ T32] r10:00000000 r9:e0039e78 r8:84b8fb00 r7:84b82680 r6:80267888 r5:83ffbc00 [ 1591.286533][ T32] r4:843faac0 [ 1591.286858][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.288664][ T32] Exception stack(0xee4b9fb0 to 0xee4b9ff8) [ 1591.288991][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1591.289330][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.289638][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.289958][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:843faac0 [ 1591.290451][ T32] INFO: task kworker/1:140:9697 blocked for more than 430 seconds. [ 1591.290845][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.291081][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.306161][ T32] task:kworker/1:140 state:D stack:0 pid:9697 tgid:9697 ppid:2 flags:0x00000000 [ 1591.306538][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.306727][ T32] Call trace: [ 1591.306842][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.307107][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e0155da4 r5:84a1d400 [ 1591.307284][ T32] r4:84a1d400 [ 1591.307417][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.307638][ T32] r5:84a1d400 r4:82717e44 [ 1591.307734][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.307980][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.308183][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0155e20 [ 1591.308372][ T32] r4:00000000 [ 1591.308444][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.308695][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.309009][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.309241][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84364400 [ 1591.309515][ T32] r4:00000000 [ 1591.309614][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.310867][ T32] r9:84a1d400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2c0000 [ 1591.315242][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.346684][ T32] r5:00001000 r4:e048b000 [ 1591.346892][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.347269][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.347751][ T32] r5:8496b754 r4:8496b400 [ 1591.348669][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.355045][ T32] r7:ddde4000 r6:82c18200 r5:8496b754 r4:84b4d700 [ 1591.367482][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.368227][ T32] r10:84a1d400 r9:84b4d72c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.368560][ T32] r4:84b4d700 [ 1591.368763][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.369480][ T32] r10:00000000 r9:ee4dde78 r8:847174c0 r7:84b4d700 r6:80267888 r5:84a1d400 [ 1591.369892][ T32] r4:84717100 [ 1591.370083][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.370488][ T32] Exception stack(0xe0155fb0 to 0xe0155ff8) [ 1591.370774][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1591.371322][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.371881][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.372269][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:84717100 [ 1591.373467][ T32] INFO: task kworker/1:141:9700 blocked for more than 430 seconds. [ 1591.406570][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.407020][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.407322][ T32] task:kworker/1:141 state:D stack:0 pid:9700 tgid:9700 ppid:2 flags:0x00000000 [ 1591.407763][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.408092][ T32] Call trace: [ 1591.408298][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.408693][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:e0489da4 r5:84a1e000 [ 1591.409107][ T32] r4:84a1e000 [ 1591.409284][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.416803][ T32] r5:84a1e000 r4:82717e44 [ 1591.417285][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.417783][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.418248][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e20 [ 1591.418640][ T32] r4:00000000 [ 1591.418861][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.419285][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.419708][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.420187][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa4b80 [ 1591.420599][ T32] r4:00000000 [ 1591.420773][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.421162][ T32] r9:84a1e000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2c2000 [ 1591.421417][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.421717][ T32] r5:00001000 r4:e050f000 [ 1591.421920][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.422246][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.422624][ T32] r5:843b3f54 r4:843b3c00 [ 1591.422840][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.423290][ T32] r7:ddde4000 r6:82c18200 r5:843b3f54 r4:84b4d600 [ 1591.423574][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.423999][ T32] r10:84a1e000 r9:84b4d62c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.424350][ T32] r4:84b4d600 [ 1591.424536][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.424933][ T32] r10:00000000 r9:ee4dde78 r8:84364680 r7:84b4d600 r6:80267888 r5:84a1e000 [ 1591.425333][ T32] r4:841a9e80 [ 1591.425530][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.443656][ T31] audit: type=1400 audit(1591.351:2044): avc: denied { unlink } for pid=2906 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1591.446384][ T32] Exception stack(0xe0489fb0 to 0xe0489ff8) [ 1591.446794][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1591.447153][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.447527][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.447868][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:841a9e80 [ 1591.460009][ T32] INFO: task kworker/1:142:9721 blocked for more than 430 seconds. [ 1591.460652][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.461005][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.461351][ T32] task:kworker/1:142 state:D stack:0 pid:9721 tgid:9721 ppid:2 flags:0x00000000 [ 1591.461828][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.462185][ T32] Call trace: [ 1591.462442][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.463055][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e04e9da4 r5:84553c00 [ 1591.464692][ T32] r4:84553c00 [ 1591.465192][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.476434][ T32] r5:84553c00 r4:82717e44 [ 1591.476864][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.477434][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.477807][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e20 [ 1591.478191][ T32] r4:00000000 [ 1591.478361][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.478707][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.479087][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.479475][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a0c0 [ 1591.479915][ T32] r4:00000000 [ 1591.480220][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.480800][ T32] r9:84553c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2c4000 [ 1591.481339][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.481803][ T32] r5:00001000 r4:e0603000 [ 1591.482019][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.482418][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.482855][ T32] r5:845be754 r4:845be400 [ 1591.483089][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.483694][ T32] r7:ddde4000 r6:82c18200 r5:845be754 r4:84831280 [ 1591.484015][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.484481][ T32] r10:84553c00 r9:848312ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.484830][ T32] r4:84831280 [ 1591.485103][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.506688][ T32] r10:00000000 r9:e0489e78 r8:84aa4780 r7:84831280 r6:80267888 r5:84553c00 [ 1591.507130][ T32] r4:84aa4d80 [ 1591.507299][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.507651][ T32] Exception stack(0xe04e9fb0 to 0xe04e9ff8) [ 1591.508105][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1591.508468][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.508832][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.509175][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:84aa4d80 [ 1591.509549][ T32] INFO: task kworker/1:143:9735 blocked for more than 430 seconds. [ 1591.509865][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.510385][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.510875][ T32] task:kworker/1:143 state:D stack:0 pid:9735 tgid:9735 ppid:2 flags:0x00000000 [ 1591.511453][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.511696][ T32] Call trace: [ 1591.511867][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.512292][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e057dda4 r5:84553000 [ 1591.512592][ T32] r4:84553000 [ 1591.512810][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.513403][ T32] r5:84553000 r4:82717e44 [ 1591.513623][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.514053][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.514431][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de20 [ 1591.514805][ T32] r4:00000000 [ 1591.514976][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.515435][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.526674][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.527180][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85163000 [ 1591.527452][ T32] r4:00000000 [ 1591.527584][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.527883][ T32] r9:84553000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2c6000 [ 1591.528151][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.528457][ T32] r5:00001000 r4:e0799000 [ 1591.528620][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.528994][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.529350][ T32] r5:8490cb54 r4:8490c800 [ 1591.529541][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.529886][ T32] r7:ddde4000 r6:82c18200 r5:8490cb54 r4:84831480 [ 1591.530090][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.530364][ T32] r10:84553000 r9:848314ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.530584][ T32] r4:84831480 [ 1591.530709][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.531089][ T32] r10:00000000 r9:ee4dde78 r8:84b6e440 r7:84831480 r6:80267888 r5:84553000 [ 1591.531578][ T32] r4:84b6e940 [ 1591.531758][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.532232][ T32] Exception stack(0xe057dfb0 to 0xe057dff8) [ 1591.532504][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1591.532814][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.533116][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.533403][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:84b6e940 [ 1591.533689][ T32] INFO: task kworker/1:144:9765 blocked for more than 430 seconds. [ 1591.533924][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.534152][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.534460][ T32] task:kworker/1:144 state:D stack:0 pid:9765 tgid:9765 ppid:2 flags:0x00000000 [ 1591.534811][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.535039][ T32] Call trace: [ 1591.535193][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.535490][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e0769da4 r5:84555400 [ 1591.546891][ T32] r4:84555400 [ 1591.547270][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.547754][ T32] r5:84555400 r4:82717e44 [ 1591.547966][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.548396][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.548845][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e20 [ 1591.549351][ T32] r4:00000000 [ 1591.549566][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.550085][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.550528][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.550968][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85182200 [ 1591.551391][ T32] r4:00000000 [ 1591.551572][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.551951][ T32] r9:84555400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2d4000 [ 1591.552387][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.552747][ T32] r5:00001000 r4:eab23000 [ 1591.553029][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.553577][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.553979][ T32] r5:843b0f54 r4:843b0c00 [ 1591.554162][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.554616][ T32] r7:ddde4000 r6:82c18200 r5:843b0f54 r4:84831580 [ 1591.554891][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.555400][ T32] r10:84555400 r9:848315ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.566682][ T32] r4:84831580 [ 1591.567041][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.567426][ T32] r10:00000000 r9:ee4dde78 r8:85141f80 r7:84831580 r6:80267888 r5:84555400 [ 1591.567881][ T32] r4:85141800 [ 1591.568060][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.568440][ T32] Exception stack(0xe0769fb0 to 0xe0769ff8) [ 1591.568696][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1591.569120][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.569541][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.569886][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:85141800 [ 1591.573679][ T32] INFO: task kworker/0:1:9786 blocked for more than 430 seconds. [ 1591.574484][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.574717][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.574988][ T32] task:kworker/0:1 state:D stack:0 pid:9786 tgid:9786 ppid:2 flags:0x00000000 [ 1591.575374][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.575726][ T32] Call trace: [ 1591.576800][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.577137][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e88d1da4 r5:84556c00 [ 1591.577511][ T32] r4:84556c00 [ 1591.577658][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.577998][ T32] r5:84556c00 r4:82717e44 [ 1591.578162][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.579029][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.580006][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d1e20 [ 1591.580319][ T32] r4:00000000 [ 1591.580473][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.580830][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.581182][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.581604][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c8280 [ 1591.582112][ T32] r4:00000000 [ 1591.582275][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.582628][ T32] r9:84556c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2ce000 [ 1591.582904][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.583233][ T32] r5:00001000 r4:ea9e9000 [ 1591.583408][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.583804][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.584363][ T32] r5:85273b54 r4:85273800 [ 1591.584653][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.585143][ T32] r7:dddd0000 r6:82c18000 r5:85273b54 r4:84b82d00 [ 1591.585513][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.596601][ T32] r10:84556c00 r9:84b82d2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 1591.597222][ T32] r4:84b82d00 [ 1591.597382][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.597691][ T32] r10:00000000 r9:e0039e78 r8:845d2e80 r7:84b82d00 r6:80267888 r5:84556c00 [ 1591.598020][ T32] r4:84438980 [ 1591.598188][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.598504][ T32] Exception stack(0xe88d1fb0 to 0xe88d1ff8) [ 1591.598720][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1591.599038][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.599474][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.599895][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:84438980 [ 1591.600205][ T32] INFO: task kworker/1:146:9803 blocked for more than 430 seconds. [ 1591.600548][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.600827][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.601191][ T32] task:kworker/1:146 state:D stack:0 pid:9803 tgid:9803 ppid:2 flags:0x00000000 [ 1591.601639][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.601943][ T32] Call trace: [ 1591.602310][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.602914][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:ea981da4 r5:84551800 [ 1591.603396][ T32] r4:84551800 [ 1591.603699][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.604347][ T32] r5:84551800 r4:82717e44 [ 1591.604650][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.605337][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.626639][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e20 [ 1591.627260][ T32] r4:00000000 [ 1591.627480][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.627871][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.628238][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.628547][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85193780 [ 1591.629078][ T32] r4:00000000 [ 1591.629297][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.629681][ T32] r9:84551800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2cc000 [ 1591.630186][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.630638][ T32] r5:00001000 r4:ea983000 [ 1591.630850][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.631410][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.631860][ T32] r5:84488b54 r4:84488800 [ 1591.632160][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.632971][ T32] r7:ddde4000 r6:82c18200 r5:84488b54 r4:84831180 [ 1591.633352][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.633854][ T32] r10:84551800 r9:848311ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.634502][ T32] r4:84831180 [ 1591.634729][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.635224][ T32] r10:00000000 r9:e4869e78 r8:85193ec0 r7:84831180 r6:80267888 r5:84551800 [ 1591.646492][ T32] r4:85193940 [ 1591.646844][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.647346][ T32] Exception stack(0xea981fb0 to 0xea981ff8) [ 1591.647793][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1591.648102][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.648416][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.648681][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:85193940 [ 1591.649095][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1591.650617][ T32] INFO: task kworker/0:2:9813 blocked for more than 430 seconds. [ 1591.651244][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.651536][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.651837][ T32] task:kworker/0:2 state:D stack:0 pid:9813 tgid:9813 ppid:2 flags:0x00000000 [ 1591.652259][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.652583][ T32] Call trace: [ 1591.652831][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.653242][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:e486dda4 r5:852b6000 [ 1591.653578][ T32] r4:852b6000 [ 1591.653766][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.654168][ T32] r5:852b6000 r4:82717e44 [ 1591.654338][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.654780][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.655125][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e486de20 [ 1591.655386][ T32] r4:00000000 [ 1591.655525][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.669212][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.670066][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.670606][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85041f00 [ 1591.671006][ T32] r4:00000000 [ 1591.671181][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.671525][ T32] r9:852b6000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2d0000 [ 1591.671826][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.672277][ T32] r5:00001000 r4:eaa65000 [ 1591.672481][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.673140][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.673805][ T32] r5:8486ff54 r4:8486fc00 [ 1591.674093][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.674880][ T32] r7:dddd0000 r6:82c18000 r5:8486ff54 r4:84b82200 [ 1591.675163][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.676135][ T32] r10:852b6000 r9:84b8222c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 1591.683744][ T32] r4:84b82200 [ 1591.684025][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.684415][ T32] r10:00000000 r9:e0039e78 r8:83e88600 r7:84b82200 r6:80267888 r5:852b6000 [ 1591.684769][ T32] r4:83e88500 [ 1591.684917][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.685291][ T32] Exception stack(0xe486dfb0 to 0xe486dff8) [ 1591.685535][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1591.696874][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.697359][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.697624][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:83e88500 [ 1591.697898][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1591.701219][ T32] INFO: task kworker/1:147:9835 blocked for more than 430 seconds. [ 1591.701619][ T32] Not tainted 6.12.0-syzkaller #0 [ 1591.701869][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1591.702215][ T32] task:kworker/1:147 state:D stack:0 pid:9835 tgid:9835 ppid:2 flags:0x00000000 [ 1591.702793][ T32] Workqueue: events bpf_prog_free_deferred [ 1591.703739][ T32] Call trace: [ 1591.703975][ T32] [<819cedd0>] (__schedule) from [<819cfa2c>] (schedule+0x2c/0xfc) [ 1591.704375][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:eaad5da4 r5:84550c00 [ 1591.704680][ T32] r4:84550c00 [ 1591.704846][ T32] [<819cfa00>] (schedule) from [<819cfde0>] (schedule_preempt_disabled+0x18/0x24) [ 1591.705219][ T32] r5:84550c00 r4:82717e44 [ 1591.705426][ T32] [<819cfdc8>] (schedule_preempt_disabled) from [<819d2a74>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 1591.716781][ T32] [<819d2748>] (__mutex_lock.constprop.0) from [<819d3354>] (__mutex_lock_slowpath+0x14/0x18) [ 1591.720839][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e20 [ 1591.721873][ T32] r4:00000000 [ 1591.722034][ T32] [<819d3340>] (__mutex_lock_slowpath) from [<819d3394>] (mutex_lock+0x3c/0x40) [ 1591.722377][ T32] [<819d3358>] (mutex_lock) from [<804b0714>] (_vm_unmap_aliases+0x68/0x240) [ 1591.722760][ T32] [<804b06ac>] (_vm_unmap_aliases) from [<804b4470>] (vfree+0x170/0x1e4) [ 1591.723152][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b224c0 [ 1591.723440][ T32] r4:00000000 [ 1591.723601][ T32] [<804b4300>] (vfree) from [<80512eb4>] (execmem_free+0x30/0x64) [ 1591.723916][ T32] r9:84550c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f2d6000 [ 1591.724183][ T32] [<80512e84>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 1591.724508][ T32] r5:00001000 r4:eab77000 [ 1591.725020][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 1591.725312][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 1591.736617][ T32] r5:84488354 r4:84488000 [ 1591.737744][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266e90>] (process_one_work+0x1b4/0x4f4) [ 1591.738376][ T32] r7:ddde4000 r6:82c18200 r5:84488354 r4:84831700 [ 1591.738621][ T32] [<80266cdc>] (process_one_work) from [<80267a74>] (worker_thread+0x1ec/0x3bc) [ 1591.739029][ T32] r10:84550c00 r9:8483172c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 1591.739582][ T32] r4:84831700 [ 1591.739787][ T32] [<80267888>] (worker_thread) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.740321][ T32] r10:00000000 r9:e4869e78 r8:85193580 r7:84831700 r6:80267888 r5:84550c00 [ 1591.740617][ T32] r4:85193100 [ 1591.740804][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.741189][ T32] Exception stack(0xeaad5fb0 to 0xeaad5ff8) [ 1591.741432][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1591.741797][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.742143][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.742458][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:85193100 [ 1591.743045][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1591.757008][ T32] NMI backtrace for cpu 1 [ 1591.757682][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 1591.758201][ T32] Hardware name: ARM-Versatile Express [ 1591.758530][ T32] Call trace: [ 1591.758764][ T32] [<819acd78>] (dump_backtrace) from [<819ace74>] (show_stack+0x18/0x1c) [ 1591.759254][ T32] r7:00000000 r6:00000113 r5:60000193 r4:82040a28 [ 1591.759511][ T32] [<819ace5c>] (show_stack) from [<819caeb8>] (dump_stack_lvl+0x70/0x7c) [ 1591.759963][ T32] [<819cae48>] (dump_stack_lvl) from [<819caedc>] (dump_stack+0x18/0x1c) [ 1591.760466][ T32] r5:00000001 r4:00000001 [ 1591.760678][ T32] [<819caec4>] (dump_stack) from [<8199a030>] (nmi_cpu_backtrace+0x160/0x17c) [ 1591.761308][ T32] [<81999ed0>] (nmi_cpu_backtrace) from [<8199a17c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1591.761734][ T32] r7:00000001 r6:8260c610 r5:8261af4c r4:ffffffff [ 1591.761933][ T32] [<8199a04c>] (nmi_trigger_cpumask_backtrace) from [<80210428>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1591.762400][ T32] r9:0001f88a r8:828b7ca4 r7:8260c770 r6:00007e93 r5:8261b508 r4:84bac21c [ 1591.762791][ T32] [<80210410>] (arch_trigger_cpumask_backtrace) from [<80359a2c>] (watchdog+0x498/0x5b8) [ 1591.763256][ T32] [<80359594>] (watchdog) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.763803][ T32] r10:00000000 r9:df819e58 r8:82f08600 r7:00000000 r6:80359594 r5:82ea3c00 [ 1591.764366][ T32] r4:82f94780 [ 1591.764581][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.765043][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1591.765580][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1591.766545][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.766953][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.767276][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82f94780 [ 1591.768286][ T32] Sending NMI from CPU 1 to CPUs 0: [ 1591.769365][ C0] NMI backtrace for cpu 0 [ 1591.770203][ C0] CPU: 0 UID: 0 PID: 2910 Comm: klogd Not tainted 6.12.0-syzkaller #0 [ 1591.770362][ C0] Hardware name: ARM-Versatile Express [ 1591.770573][ C0] PC is at 0x76db1b58 [ 1591.771340][ C0] LR is at 0x76db25f4 [ 1591.771402][ C0] pc : [<76db1b58>] lr : [<76db25f4>] psr: 80000010 [ 1591.771493][ C0] sp : 7e993a60 ip : 0000006e fp : 7e993c24 [ 1591.771548][ C0] r10: 00000001 r9 : 00000000 r8 : 00000000 [ 1591.771590][ C0] r7 : 00000003 r6 : 00000000 r5 : ffffffff r4 : 01bab655 [ 1591.771637][ C0] r3 : 76e4115a r2 : 76e4115a r1 : 7e993aac r0 : 0000004d [ 1591.771756][ C0] Flags: Nzcv IRQs on FIQs on Mode USER_32 ISA ARM Segment user [ 1591.771861][ C0] Control: 30c5387d Table: 84302d00 DAC: fffffffd [ 1591.771944][ C0] Call trace: invalid frame pointer 0x7e993c24 [ 1591.797192][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1591.798030][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 1591.798449][ T32] Hardware name: ARM-Versatile Express [ 1591.798678][ T32] Call trace: [ 1591.799009][ T32] [<819acd78>] (dump_backtrace) from [<819ace74>] (show_stack+0x18/0x1c) [ 1591.799515][ T32] r7:00000000 r6:82623184 r5:00000000 r4:82040a28 [ 1591.800062][ T32] [<819ace5c>] (show_stack) from [<819cae9c>] (dump_stack_lvl+0x54/0x7c) [ 1591.800407][ T32] [<819cae48>] (dump_stack_lvl) from [<819caedc>] (dump_stack+0x18/0x1c) [ 1591.800739][ T32] r5:00000000 r4:82871d18 [ 1591.800930][ T32] [<819caec4>] (dump_stack) from [<819ad9a0>] (panic+0x120/0x374) [ 1591.801843][ T32] [<819ad880>] (panic) from [<803598ac>] (watchdog+0x318/0x5b8) [ 1591.802173][ T32] r3:00000000 r2:00000000 r1:00000001 r0:82041554 [ 1591.802426][ T32] r7:8260c770 [ 1591.802592][ T32] [<80359594>] (watchdog) from [<80270ae0>] (kthread+0x104/0x134) [ 1591.802956][ T32] r10:00000000 r9:df819e58 r8:82f08600 r7:00000000 r6:80359594 r5:82ea3c00 [ 1591.803565][ T32] r4:82f94780 [ 1591.803734][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1591.804077][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1591.804338][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1591.804700][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1591.805242][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1591.806087][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82f94780 [ 1591.809230][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:41:14 Registers: info registers vcpu 0 CPU#0 R00=00000024 R01=76a0f008 R02=00040000 R03=00000000 R04=00040000 R05=76faac80 R06=7eab1188 R07=00000003 R08=00000000 R09=0187d2c0 R10=7eab126c R11=00000001 R12=00540b48 R13=df955ff8 R14=76b9b2fc R15=76b9b2fc PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005027e9 s17=00000000 d08=00000000005027e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=0008001a s33=041ac003 d16=041ac0030008001a s34=ffffffff s35=1ad00303 d17=1ad00303ffffffff s36=03000800 s37=08001ad8 d18=08001ad803000800 s38=1ae00300 s39=03000800 d19=030008001ae00300 s40=08001ae8 s41=1af00300 d20=1af0030008001ae8 s42=ffffff04 s43=800303ff d21=800303ffffffff04 s44=ffff041b s45=0303ffff d22=0303ffffffff041b s46=08001b90 s47=1b980300 d23=1b98030008001b90 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=8bbb4641 s53=a19812fe d26=a19812fe8bbb4641 s54=8d9ba88e s55=1175bf5b d27=1175bf5b8d9ba88e s56=80cb60ae s57=16cabe2f d28=16cabe2f80cb60ae s58=c1119191 s59=885dc927 d29=885dc927c1119191 s60=bdb6e143 s61=826384f6 d30=826384f6bdb6e143 s62=ad8fb88f s63=fe1d4200 d31=fe1d4200ad8fb88f FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76bc40bc R12=20001490 R13=20001490 R14=00018b8c R15=00018b8c PSR=20000010 --C- A S usr32 s00=1c000000 s01=00000000 d00=000000001c000000 s02=1c000000 s03=000501f9 d01=000501f91c000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fe219d9c s09=0071eaca d04=0071eacafe219d9c s10=ffffffff s11=00000000 d05=00000000ffffffff s12=0035968b s13=ff75289f d06=ff75289f0035968b s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=fe000000 s17=ef384050 d08=ef384050fe000000 s18=04000000 s19=0002eb77 d09=0002eb7704000000 s20=008ad22c s21=ff7528a8 d10=ff7528a8008ad22c s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=1c219d9c s25=00000000 d12=000000001c219d9c s26=1c000000 s27=000501f9 d13=000501f91c000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=01791013 s33=006f5bb2 d16=006f5bb201791013 s34=00000000 s35=00000000 d17=0000000000000000 s36=01c764ab s37=ffb4dc3f d18=ffb4dc3f01c764ab s38=00000000 s39=ffffffff d19=ffffffff00000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=04613286 s43=00000000 d21=0000000004613286 s44=00000007 s45=00000000 d22=0000000000000007 s46=0175bb82 s47=00000000 d23=000000000175bb82 s48=fe3d7402 s49=ef384050 d24=ef384050fe3d7402 s50=1bbceaa6 s51=00000000 d25=000000001bbceaa6 s52=fef5ce39 s53=ff89c48e d26=ff89c48efef5ce39 s54=011f94b1 s55=015f5aaa d27=015f5aaa011f94b1 s56=01cb39ab s57=ffe25876 d28=ffe2587601cb39ab s58=fff12c3b s59=011f94b1 d29=011f94b1fff12c3b s60=1949df9a s61=000501f9 d30=000501f91949df9a s62=9e64b2f6 s63=006edbf7 d31=006edbf79e64b2f6 FPSCR: 00000000