last executing test programs: 12m5.338123527s ago: executing program 0 (id=261): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r1}, 0x10) shmat(0x0, &(0x7f0000ff9000/0x1000)=nil, 0x5000) 12m4.9191274s ago: executing program 0 (id=262): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x18) socket$can_raw(0x1d, 0x3, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000240)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffa}, 0x18) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x11, 0xc, r2, 0x1, 0x0, 0x6, @random='\x00\x00\t\x00'}, 0x14) 12m3.580955608s ago: executing program 0 (id=263): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d010110000000090400"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 11m52.238101718s ago: executing program 0 (id=278): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r1}, 0x18) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x4) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r5, 0xffffffffffffffff, 0x200000000000000) 11m51.679249259s ago: executing program 0 (id=279): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x80000001}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000300)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0'}, 0xb) close_range(r0, r1, 0x0) 11m51.077994535s ago: executing program 0 (id=281): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000080)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323452536005ad94a461cdbfee9bdb942352359a351d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 11m5.949703585s ago: executing program 32 (id=281): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) r1 = socket$inet6(0x10, 0x2, 0x4) sendto$inet6(r1, &(0x7f0000000080)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323452536005ad94a461cdbfee9bdb942352359a351d1ec0cffc8792cd8000080", 0x4c, 0x0, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 10m22.249076534s ago: executing program 1 (id=445): readahead(0xffffffffffffffff, 0x4, 0x800) 10m21.96745314s ago: executing program 1 (id=446): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x49, 0x0, &(0x7f0000000340)="9c94875bf3960923437b87d404838e170b18b4c3306938de73b7ea4fc8f5635c4ca943dca6abcf35302a7c4ac852604a9bb98dd3e0c7914c2a403f1d0ef77e587a722e43531990c1aa", 0x0}, 0x50) 10m21.4870364s ago: executing program 1 (id=447): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000240)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900", 0x24, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x2, {[@mptcp=@mp_fclose={0x1e, 0xc, 0xf6c, 0x0, 0x8000000000000}, @fastopen={0x22, 0x2}]}}}}}}}}, 0x0) 10m21.208508715s ago: executing program 1 (id=448): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x8000f28, 0x8) splice(r3, 0x0, r1, 0x0, 0x6, 0xb) write$binfmt_elf64(r4, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x80, 0xd, 0x1, 0x0, 0x2, 0x3e, 0xf, 0x1de, 0x40, 0x29b, 0x5, 0x6, 0x38, 0x1, 0x8, 0x4bc, 0xd9d}, [{0x6, 0xb, 0x8, 0x9f, 0x101, 0x5, 0x2, 0x4}], "", ['\x00', '\x00']}, 0x278) close_range(r1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000003040)) 10m18.415862927s ago: executing program 1 (id=449): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x9c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x6c, 0x2, {{}, [@TCA_NETEM_LOSS={0x30, 0x2, 0x0, 0x1, [@NETEM_LOSS_GE={0x18}, @NETEM_LOSS_GI={0x18}]}, @TCA_NETEM_RATE={0x4, 0xd}, @TCA_NETEM_CORRUPT={0xc, 0x2}]}}}]}, 0x9c}}, 0x0) 10m18.068564631s ago: executing program 1 (id=450): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001"], 0xfc}}, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) 9m32.976172296s ago: executing program 33 (id=450): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001"], 0xfc}}, 0x0) fspick(0xffffffffffffff9c, 0x0, 0x0) 6m1.599263635s ago: executing program 3 (id=890): r0 = open(&(0x7f0000000400)='./file0\x00', 0x64842, 0x2) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x1cb041, 0x8) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x8000fffffffc) socket$key(0xf, 0x3, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) 6m0.92156966s ago: executing program 3 (id=891): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) uname(&(0x7f0000000340)=""/4096) 6m0.374922749s ago: executing program 3 (id=892): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0xf}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) 5m59.960265121s ago: executing program 3 (id=893): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)={{0x14}, [@NFT_MSG_NEWSET={0x30, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x58}}, 0x0) 5m59.80920014s ago: executing program 3 (id=894): r0 = syz_io_uring_setup(0x4b6, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x1, 0x20e}, &(0x7f0000ff0000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 5m57.484330752s ago: executing program 3 (id=895): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x2, 0x8, 0x0, 0x3}, 0x0) ioprio_get$uid(0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x160, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x0, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x5, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x61, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xa8, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207"}}, @offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0x1a0, 0x1e8, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0xc9, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x29, 0x1, 0x1, 'syz0\x00'}}, @inet=@rpfilter={{0x28}, {0x1c}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r5, 0x0, 0xfffffffffffffffe}, 0x18) write$P9_RVERSION(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff"], 0xfffffd97) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe3d}, [@call={0x85, 0x0, 0x0, 0xb5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = getpid() r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x24020000) umount2(&(0x7f0000000540)='.\x00', 0xb) 5m11.735328972s ago: executing program 34 (id=895): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x2, 0x8, 0x0, 0x3}, 0x0) ioprio_get$uid(0x3, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x160, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x0, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x5, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x61, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xa8, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207"}}, @offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0x1a0, 0x1e8, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0xc9, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x29, 0x1, 0x1, 'syz0\x00'}}, @inet=@rpfilter={{0x28}, {0x1c}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r5, 0x0, 0xfffffffffffffffe}, 0x18) write$P9_RVERSION(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff"], 0xfffffd97) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe3d}, [@call={0x85, 0x0, 0x0, 0xb5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = getpid() r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x24020000) umount2(&(0x7f0000000540)='.\x00', 0xb) 3m13.307409286s ago: executing program 2 (id=1183): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a01010000000000000000010000000900010073797a300000000068000000090a010400000000000000000100000008000a4000000000200011800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30000000000900020073797a3200000000080005400000001f0c000980080001400037"], 0xb0}}, 0x0) 3m10.427810577s ago: executing program 2 (id=1184): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000e00)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) writev(r1, &(0x7f00000025c0)=[{&(0x7f0000001100)="34f1ed78aaf7fcecca907477076de07898b35977e85f97cf4a760ade4d6adbeea620ff23000000000000004b6fffabc9c0980e9c9227c01e701cdc1f9c8ad59c05af9fbc847d6e21921de8358a0758a2fb3c3360c7462c7670d6e42cf673f9c45142f9eea449da6aa46d15e216cf28778cbb1e9a8670e65d66abdc109f45881f2e0849733a73ab2e50c720c3ca4f3b867848b7bda728ba3c1d0fbd55d16c4547bd3577f690feac6bc712a740733563984b1ff505ed965cd8e650f0640672853bbee67460bd440b81558c1126efec72fe0537f1", 0xd3}], 0x1) 3m10.266477838s ago: executing program 2 (id=1185): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x8, &(0x7f0000000940)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) 3m5.428259026s ago: executing program 2 (id=1190): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYBLOB="6ded830630dfcd4adfc487d0dc6403b3f606c6c894c9f19285e601514ad2e6cac3e181d702bd16f18426193804e8f1b94e000b830827818d"], 0x50) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(0x0, 0xc402, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1000, 0xffffff81) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) 2m52.488770012s ago: executing program 2 (id=1211): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x3000000000000) 2m52.26889375s ago: executing program 2 (id=1213): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=0x0, @ANYRES16=r0, @ANYRES16=r0, @ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000400)='kvm_halt_poll_ns\x00', r1, 0x0, 0xd20}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000200)=0x1000000, 0x4) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000000c0)=0x10089, 0x4) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f00007ff000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000580000/0x4000)=nil) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x81) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x3, &(0x7f0000006680)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x6}}}, 0xffffffffffffff48}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) 2m6.823813351s ago: executing program 35 (id=1213): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=0x0, @ANYRES16=r0, @ANYRES16=r0, @ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000400)='kvm_halt_poll_ns\x00', r1, 0x0, 0xd20}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000200)=0x1000000, 0x4) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000000c0)=0x10089, 0x4) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f00007ff000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000580000/0x4000)=nil) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x81) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x3, &(0x7f0000006680)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x6}}}, 0xffffffffffffff48}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) 2.618874321s ago: executing program 5 (id=1409): socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xfffffffc}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket$packet(0x11, 0x2, 0x300) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffb}]}) getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) statfs(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_io_uring_setup(0x121d, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000001c0)) 2.168986937s ago: executing program 4 (id=1411): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) writev(r0, 0x0, 0x0) 1.610697358s ago: executing program 4 (id=1412): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0xc}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000018010000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='kfree\x00', r3}, 0x62) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.450372168s ago: executing program 5 (id=1413): r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r0, 0x4b4b, &(0x7f0000000080)={0x0, 0xfffffffc, 0x13, 0x1b, 0x11e, 0x0}) 1.239849744s ago: executing program 4 (id=1414): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x4, 0x0, 0x28) 1.239562754s ago: executing program 5 (id=1415): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0x79) 888.338619ms ago: executing program 4 (id=1416): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 888.022879ms ago: executing program 5 (id=1417): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_io_uring_setup(0x1108, &(0x7f0000000300)={0x0, 0x995a, 0x400, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r2, 0x47fa, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x28, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) clock_gettime(0x1, 0x0) 427.244516ms ago: executing program 4 (id=1418): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='kfree\x00', r0}, 0x18) r1 = socket(0x10, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffdfe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r2, &(0x7f0000000500)={'#! ', './file0'}, 0xb) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd87}, &(0x7f0000000240)=0x40) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) close_range(r1, r2, 0x0) 426.947026ms ago: executing program 5 (id=1419): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) 398.21µs ago: executing program 5 (id=1420): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1, 0x0, 0xc4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) timer_create(0x0, 0x0, &(0x7f0000bbdffc)=0x0) timer_getoverrun(r2) 0s ago: executing program 4 (id=1421): syz_open_procfs(0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000000080)={0x0, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000003c0), 0x20075, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) kernel console output (not intermixed with test programs): yz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 360.972823][ T29] audit: type=1326 audit(616.872:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 360.972927][ T29] audit: type=1326 audit(616.872:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 361.098754][ T29] audit: type=1326 audit(616.982:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 361.100292][ T29] audit: type=1326 audit(616.982:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 361.100386][ T29] audit: type=1326 audit(617.002:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 361.100439][ T29] audit: type=1326 audit(617.002:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5539 comm="syz.2.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 361.441639][ T5543] fuse: Unknown parameter 'use00000000000000000000' [ 361.643344][ T5545] fuse: Unknown parameter 'grou00000000000000000000' [ 362.084952][ T5548] netlink: 'syz.2.457': attribute type 21 has an invalid length. [ 362.086309][ T5548] netlink: 132 bytes leftover after parsing attributes in process `syz.2.457'. [ 362.962530][ T5557] fuse: Unknown parameter 'use00000000000000000000' [ 363.269246][ T5560] fuse: Unknown parameter 'grou00000000000000000000' [ 363.614965][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.625708][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.626980][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.627927][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.640756][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.641907][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.643889][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.644990][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.645930][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.646967][ T4291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 363.711862][ T4291] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 364.946369][ T5577] fuse: Unknown parameter 'use00000000000000000000' [ 367.141688][ T5594] fuse: Unknown parameter 'user_i00000000000000000000' [ 369.043679][ T5610] fuse: Unknown parameter 'group_id00000000000000000000' [ 369.274453][ T5612] fuse: Unknown parameter 'user_i00000000000000000000' [ 369.727648][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 369.781574][ T29] audit: type=1326 audit(625.562:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.782363][ T29] audit: type=1326 audit(625.642:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.782492][ T29] audit: type=1326 audit(625.642:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.782546][ T29] audit: type=1326 audit(625.642:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.782585][ T29] audit: type=1326 audit(625.642:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.795610][ T29] audit: type=1326 audit(625.702:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.804693][ T29] audit: type=1326 audit(625.702:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.806587][ T29] audit: type=1326 audit(625.712:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.821839][ T29] audit: type=1326 audit(625.732:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.828452][ T29] audit: type=1326 audit(625.732:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5613 comm="syz.2.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 370.956356][ T5622] fuse: Unknown parameter 'group_id00000000000000000000' [ 372.416106][ T5632] fuse: Unknown parameter 'group_id00000000000000000000' [ 372.816523][ T5636] fuse: Unknown parameter 'group_id00000000000000000000' [ 373.525203][ T4222] hid_parser_main: 22 callbacks suppressed [ 373.528694][ T4222] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 373.550655][ T4222] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 374.200556][ T5650] fuse: Bad value for 'user_id' [ 374.205366][ T5650] fuse: Bad value for 'user_id' [ 376.616699][ T5657] fuse: Unknown parameter 'group_id00000000000000000000' [ 377.370354][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 377.372916][ T29] audit: type=1400 audit(633.272:740): avc: denied { connect } for pid=5660 comm="syz.2.494" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 377.824654][ T5667] fuse: Bad value for 'user_id' [ 377.825099][ T5667] fuse: Bad value for 'user_id' [ 378.060349][ T29] audit: type=1400 audit(633.962:741): avc: denied { mount } for pid=5668 comm="syz.2.496" name="/" dev="ramfs" ino=6882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 379.721656][ T5685] fuse: Bad value for 'user_id' [ 379.722164][ T5685] fuse: Bad value for 'user_id' [ 380.177829][ T5690] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 381.626389][ T5704] fuse: Bad value for 'fd' [ 382.014280][ T5708] fuse: Bad value for 'user_id' [ 382.040279][ T5708] fuse: Bad value for 'user_id' [ 383.199006][ T5723] fuse: Bad value for 'fd' [ 383.642102][ T5728] fuse: Bad value for 'user_id' [ 383.643385][ T5728] fuse: Bad value for 'user_id' [ 385.061895][ T5768] fuse: Bad value for 'fd' [ 387.683118][ T5853] fuse: Bad value for 'fd' [ 387.918990][ T5709] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.951893][ T5709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 390.389418][ T5709] hsr_slave_0: entered promiscuous mode [ 390.428492][ T5709] hsr_slave_1: entered promiscuous mode [ 390.431725][ T5709] debugfs: 'hsr0' already exists in 'hsr' [ 390.432704][ T5709] Cannot create hsr debugfs directory [ 391.227570][ T5709] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 391.256005][ T5709] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 391.294090][ T5709] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 391.313266][ T5709] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 392.917573][ T6034] fuse: Unknown parameter 'fd0x0000000000000003' [ 392.982194][ T5709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.541720][ T6045] fuse: Invalid rootmode [ 395.136460][ T6051] fuse: Unknown parameter 'fd0x0000000000000003' [ 396.040943][ T6063] fuse: Bad value for 'rootmode' [ 397.095146][ T6070] fuse: Unknown parameter 'fd0x0000000000000003' [ 397.564331][ T29] audit: type=1326 audit(653.472:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.567345][ T29] audit: type=1326 audit(653.472:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.641710][ T29] audit: type=1326 audit(653.522:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.644999][ T29] audit: type=1326 audit(653.552:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.648873][ T29] audit: type=1326 audit(653.552:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.653331][ T29] audit: type=1326 audit(653.562:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.670380][ T29] audit: type=1326 audit(653.572:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.673536][ T29] audit: type=1326 audit(653.582:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.681416][ T29] audit: type=1326 audit(653.592:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.684943][ T29] audit: type=1326 audit(653.592:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6073 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x132320 code=0x7ffc0000 [ 398.045588][ T6078] fuse: Bad value for 'rootmode' [ 400.106523][ T5709] veth0_vlan: entered promiscuous mode [ 400.158237][ T5709] veth1_vlan: entered promiscuous mode [ 400.321069][ T5709] veth0_macvtap: entered promiscuous mode [ 400.368576][ T5709] veth1_macvtap: entered promiscuous mode [ 400.602220][ T1290] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.602894][ T1290] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.603012][ T1290] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.603088][ T1290] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.498884][ T6097] fuse: Bad value for 'rootmode' [ 404.337277][ T6112] fuse: Unknown parameter 'use00000000000000000000' [ 404.831360][ T6115] fuse: Unknown parameter 'use00000000000000000000' [ 405.311500][ T6123] fuse: Unknown parameter 'user_i00000000000000000000' [ 408.631713][ T6138] fuse: Unknown parameter 'use00000000000000000000' [ 408.834739][ T6140] fuse: Unknown parameter 'user_i00000000000000000000' [ 409.200668][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 409.201990][ T29] audit: type=1400 audit(665.102:755): avc: denied { create } for pid=6143 comm="syz.3.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 412.348378][ T6156] fuse: Unknown parameter 'use00000000000000000000' [ 412.652102][ T6159] fuse: Unknown parameter 'user_i00000000000000000000' [ 412.775356][ T29] audit: type=1400 audit(668.682:756): avc: denied { bind } for pid=6160 comm="syz.3.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 417.314955][ T29] audit: type=1400 audit(673.222:757): avc: denied { create } for pid=6183 comm="syz.3.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 417.326698][ T29] audit: type=1400 audit(673.232:758): avc: denied { write } for pid=6183 comm="syz.3.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 420.740098][ T29] audit: type=1400 audit(676.642:759): avc: denied { kexec_image_load } for pid=6205 comm="syz.3.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 424.516932][ T6206] kexec: Could not allocate control_code_buffer [ 426.261637][ T6217] fuse: Unknown parameter 'user_id00000000000000000000' [ 427.698308][ T6227] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.588'. [ 429.170438][ T29] audit: type=1326 audit(685.072:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.174596][ T29] audit: type=1326 audit(685.082:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.177489][ T29] audit: type=1326 audit(685.082:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.184661][ T29] audit: type=1326 audit(685.092:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.195779][ T29] audit: type=1326 audit(685.102:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.197872][ T29] audit: type=1326 audit(685.102:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.211220][ T29] audit: type=1326 audit(685.112:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.213882][ T29] audit: type=1326 audit(685.112:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.215709][ T29] audit: type=1326 audit(685.112:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.217728][ T29] audit: type=1326 audit(685.112:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6243 comm="syz.2.593" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132320 code=0x7ffc0000 [ 430.362224][ T6250] fuse: Unknown parameter '0x0000000000000003' [ 431.255089][ T6259] fuse: Bad value for 'fd' [ 431.880764][ T6264] raw_sendmsg: syz.2.602 forgot to set AF_INET. Fix it! [ 432.964002][ T6272] fuse: Unknown parameter '0x0000000000000003' [ 437.848510][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 437.850170][ T29] audit: type=1400 audit(693.752:777): avc: denied { write } for pid=6296 comm="syz.2.613" name="ptype" dev="proc" ino=4026532965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 438.355073][ T29] audit: type=1326 audit(694.262:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.357332][ T29] audit: type=1326 audit(694.262:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.374211][ T29] audit: type=1326 audit(694.282:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.376995][ T29] audit: type=1326 audit(694.282:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.379335][ T29] audit: type=1326 audit(694.282:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.471759][ T29] audit: type=1326 audit(694.362:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.474620][ T29] audit: type=1326 audit(694.382:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.478919][ T29] audit: type=1326 audit(694.382:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 438.486276][ T29] audit: type=1326 audit(694.392:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6304 comm="syz.2.615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.423893][ T6330] fuse: Unknown parameter 'fd0x0000000000000003' [ 447.963796][ T4233] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 447.994908][ T4233] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 448.325326][ T6352] fuse: Unknown parameter 'fd0x0000000000000003' [ 468.289117][ T6427] sch_fq: defrate 0 ignored. [ 472.985164][ T6450] netlink: 24 bytes leftover after parsing attributes in process `syz.2.659'. [ 478.335226][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 478.336347][ T29] audit: type=1400 audit(734.242:795): avc: denied { unmount } for pid=4876 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 490.063354][ T29] audit: type=1400 audit(745.972:796): avc: denied { create } for pid=6506 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 490.078750][ T29] audit: type=1400 audit(745.982:797): avc: denied { setopt } for pid=6506 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 490.337132][ T29] audit: type=1400 audit(746.242:798): avc: denied { bind } for pid=6506 comm="syz.3.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 490.872462][ T54] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 490.915594][ T54] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 490.975498][ T54] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.076476][ T54] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.346540][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 492.430483][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 492.452304][ T54] bond0 (unregistering): Released all slaves [ 492.644667][ T54] hsr_slave_0: left promiscuous mode [ 492.648019][ T54] hsr_slave_1: left promiscuous mode [ 492.660784][ T54] veth1_macvtap: left promiscuous mode [ 492.670636][ T54] veth0_macvtap: left promiscuous mode [ 492.691978][ T54] veth1_vlan: left promiscuous mode [ 492.693109][ T54] veth0_vlan: left promiscuous mode [ 496.162627][ T29] audit: type=1400 audit(752.072:799): avc: denied { create } for pid=6551 comm="syz.3.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 496.212335][ T29] audit: type=1400 audit(752.122:800): avc: denied { sys_admin } for pid=6551 comm="syz.3.686" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 496.271161][ T29] audit: type=1400 audit(752.182:801): avc: denied { remount } for pid=6551 comm="syz.3.686" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 496.777528][ T1290] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.863400][ T1290] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.941338][ T1290] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 497.797656][ T1290] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.572548][ T1290] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 498.603007][ T1290] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 498.613753][ T1290] bond0 (unregistering): Released all slaves [ 498.735422][ T1290] hsr_slave_0: left promiscuous mode [ 498.750487][ T1290] hsr_slave_1: left promiscuous mode [ 498.798150][ T1290] veth1_macvtap: left promiscuous mode [ 498.798723][ T1290] veth0_macvtap: left promiscuous mode [ 498.799776][ T1290] veth1_vlan: left promiscuous mode [ 498.810571][ T1290] veth0_vlan: left promiscuous mode [ 499.783586][ T29] audit: type=1326 audit(755.692:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.788332][ T29] audit: type=1326 audit(755.692:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.803900][ T29] audit: type=1326 audit(755.702:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.808754][ T29] audit: type=1326 audit(755.712:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.823305][ T29] audit: type=1326 audit(755.732:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.828096][ T29] audit: type=1326 audit(755.732:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 499.834108][ T29] audit: type=1326 audit(755.742:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6584 comm="syz.2.690" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.155575][ T6657] netlink: 8 bytes leftover after parsing attributes in process `syz.2.695'. [ 504.625865][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 504.627277][ T29] audit: type=1326 audit(760.532:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.630366][ T29] audit: type=1326 audit(760.532:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.634926][ T29] audit: type=1326 audit(760.542:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.652500][ T29] audit: type=1326 audit(760.562:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.654452][ T29] audit: type=1326 audit(760.562:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.661108][ T29] audit: type=1326 audit(760.572:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.680358][ T29] audit: type=1326 audit(760.582:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.682322][ T29] audit: type=1326 audit(760.592:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.684261][ T29] audit: type=1326 audit(760.592:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 504.687471][ T29] audit: type=1326 audit(760.592:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6659 comm="syz.2.696" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 506.707044][ T6563] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 506.753003][ T6563] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 508.922877][ T6563] hsr_slave_0: entered promiscuous mode [ 508.925029][ T6563] hsr_slave_1: entered promiscuous mode [ 510.573571][ T6563] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 510.602117][ T6563] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 510.625313][ T6563] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 510.645842][ T6563] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 512.572449][ T6563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 514.290525][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 514.291012][ T29] audit: type=1326 audit(770.172:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6940 comm="syz.2.702" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 519.473175][ T29] audit: type=1400 audit(775.382:846): avc: denied { create } for pid=6976 comm="syz.2.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 521.475708][ T6563] veth0_vlan: entered promiscuous mode [ 521.550482][ T6563] veth1_vlan: entered promiscuous mode [ 521.788068][ T6563] veth0_macvtap: entered promiscuous mode [ 521.827270][ T6563] veth1_macvtap: entered promiscuous mode [ 522.115410][ T5398] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 522.132308][ T5398] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 522.154648][ T5398] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 522.155332][ T5398] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.567553][ T29] audit: type=1400 audit(788.472:847): avc: denied { setcheckreqprot } for pid=7083 comm="syz.2.735" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 533.004879][ T29] audit: type=1326 audit(788.912:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.005604][ T29] audit: type=1326 audit(788.912:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.005854][ T29] audit: type=1326 audit(788.912:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.013534][ T29] audit: type=1326 audit(788.912:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=92 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.024452][ T29] audit: type=1326 audit(788.932:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.024923][ T29] audit: type=1326 audit(788.932:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.027278][ T29] audit: type=1326 audit(788.932:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 533.031357][ T29] audit: type=1326 audit(788.932:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7087 comm="syz.3.737" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 534.240278][ T29] audit: type=1400 audit(790.142:856): avc: denied { name_bind } for pid=7106 comm="syz.3.743" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 536.534415][ T7130] netlink: 256 bytes leftover after parsing attributes in process `syz.2.749'. [ 540.024313][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 540.024626][ T29] audit: type=1326 audit(795.932:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7139 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 540.027666][ T29] audit: type=1326 audit(795.932:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7139 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132320 code=0x7ffc0000 [ 540.053238][ T29] audit: type=1326 audit(795.962:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7139 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 540.056590][ T29] audit: type=1326 audit(795.962:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7139 comm="syz.2.753" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 540.255732][ T29] audit: type=1400 audit(796.162:872): avc: denied { create } for pid=7141 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 540.272150][ T29] audit: type=1400 audit(796.182:873): avc: denied { connect } for pid=7141 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 540.275515][ T29] audit: type=1400 audit(796.182:874): avc: denied { setopt } for pid=7141 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 540.293920][ T29] audit: type=1400 audit(796.202:875): avc: denied { bind } for pid=7141 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 540.298185][ T29] audit: type=1400 audit(796.202:876): avc: denied { write } for pid=7141 comm="syz.2.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 541.434702][ T29] audit: type=1400 audit(797.342:877): avc: denied { write } for pid=7156 comm="syz.3.759" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 545.703259][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 545.710188][ T29] audit: type=1400 audit(801.612:891): avc: denied { allowed } for pid=7180 comm="syz.3.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 545.720345][ T29] audit: type=1400 audit(801.622:892): avc: denied { create } for pid=7180 comm="syz.3.768" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 548.191788][ T7189] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 548.425287][ T29] audit: type=1326 audit(804.332:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.427430][ T29] audit: type=1326 audit(804.332:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.502880][ T29] audit: type=1326 audit(804.412:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.506919][ T29] audit: type=1326 audit(804.412:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.528722][ T29] audit: type=1326 audit(804.432:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.569559][ T29] audit: type=1326 audit(804.472:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.606673][ T29] audit: type=1326 audit(804.512:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 548.630757][ T29] audit: type=1326 audit(804.522:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7190 comm="syz.3.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.824011][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 550.824427][ T29] audit: type=1400 audit(806.732:910): avc: denied { map } for pid=7214 comm="syz.3.779" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10786 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 550.825377][ T29] audit: type=1400 audit(806.732:911): avc: denied { read write } for pid=7214 comm="syz.3.779" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10786 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 550.832037][ T29] audit: type=1400 audit(806.732:912): avc: denied { module_request } for pid=7213 comm="syz.2.778" kmod="crypto-digest_null" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 551.363657][ T29] audit: type=1400 audit(807.272:913): avc: denied { watch watch_reads } for pid=7213 comm="syz.2.778" path="/286/file0" dev="tmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 554.462591][ T29] audit: type=1400 audit(810.372:914): avc: denied { execute } for pid=7239 comm="syz.3.782" name="file0" dev="tmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 554.522280][ T29] audit: type=1400 audit(810.432:915): avc: denied { execute_no_trans } for pid=7239 comm="syz.3.782" path="/23/file0" dev="tmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 554.772909][ T29] audit: type=1400 audit(810.682:916): avc: denied { setopt } for pid=7244 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 554.777001][ T29] audit: type=1400 audit(810.682:917): avc: denied { ioctl } for pid=7244 comm="syz.3.783" path="socket:[11486]" dev="sockfs" ino=11486 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 554.783339][ T29] audit: type=1400 audit(810.692:918): avc: denied { bind } for pid=7244 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 554.793756][ T29] audit: type=1400 audit(810.702:919): avc: denied { write } for pid=7244 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 555.976073][ T7256] SELinux: failed to load policy [ 556.225792][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 556.240131][ T29] audit: type=1400 audit(812.122:924): avc: denied { unmount } for pid=6563 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 557.854560][ T29] audit: type=1400 audit(813.762:925): avc: denied { bind } for pid=7282 comm="syz.3.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 557.875027][ T29] audit: type=1400 audit(813.782:926): avc: denied { setopt } for pid=7282 comm="syz.3.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 558.515105][ T7286] netlink: 64 bytes leftover after parsing attributes in process `syz.3.793'. [ 562.965549][ T29] audit: type=1400 audit(818.872:927): avc: denied { mount } for pid=7339 comm="syz.3.796" name="/" dev="ramfs" ino=11532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 563.034674][ T7342] tmpfs: Unsupported parameter 'mpol' [ 563.366371][ T29] audit: type=1400 audit(819.272:928): avc: denied { create } for pid=7344 comm="syz.2.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 564.765468][ T29] audit: type=1400 audit(820.672:929): avc: denied { compute_member } for pid=7362 comm="syz.2.805" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 565.414044][ T29] audit: type=1400 audit(821.322:930): avc: denied { connect } for pid=7371 comm="syz.2.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 565.446943][ T29] audit: type=1400 audit(821.352:931): avc: denied { write } for pid=7371 comm="syz.2.808" laddr=fe80::b faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 566.273950][ T29] audit: type=1326 audit(822.162:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.280051][ T29] audit: type=1326 audit(822.182:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=43 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.281593][ T29] audit: type=1326 audit(822.182:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.282603][ T29] audit: type=1326 audit(822.192:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7375 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 567.455736][ T29] audit: type=1400 audit(823.362:936): avc: denied { create } for pid=7384 comm="syz.3.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 568.710538][ T29] audit: type=1400 audit(824.612:937): avc: denied { name_bind } for pid=7393 comm="syz.3.815" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 569.512807][ T7398] netlink: 8 bytes leftover after parsing attributes in process `syz.3.816'. [ 570.084216][ T29] audit: type=1400 audit(825.992:938): avc: denied { append } for pid=7401 comm="syz.3.817" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.089558][ T29] audit: type=1400 audit(825.992:939): avc: denied { ioctl } for pid=7401 comm="syz.3.817" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.115173][ T7402] syz.3.817 uses obsolete (PF_INET,SOCK_PACKET) [ 571.483347][ T29] audit: type=1400 audit(827.382:940): avc: denied { create } for pid=7413 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.501815][ T29] audit: type=1400 audit(827.412:941): avc: denied { setopt } for pid=7413 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.521271][ T29] audit: type=1400 audit(827.432:942): avc: denied { bind } for pid=7413 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.527524][ T29] audit: type=1400 audit(827.432:943): avc: denied { listen } for pid=7413 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.529251][ T29] audit: type=1400 audit(827.432:944): avc: denied { connect } for pid=7413 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.534678][ T29] audit: type=1400 audit(827.442:945): avc: denied { write } for pid=7413 comm="syz.2.821" path="socket:[11618]" dev="sockfs" ino=11618 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 571.636525][ T29] audit: type=1400 audit(827.542:946): avc: denied { create } for pid=7419 comm="syz.3.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 572.157518][ T7420] ip6gre0: entered promiscuous mode [ 574.893083][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 574.893336][ T29] audit: type=1326 audit(830.802:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7431 comm="syz.3.824" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.897845][ T29] audit: type=1326 audit(830.802:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.3.824" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.900271][ T29] audit: type=1326 audit(830.802:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7428 comm="syz.3.824" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.269190][ T29] audit: type=1400 audit(831.172:970): avc: denied { write } for pid=7437 comm="syz.2.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 575.627233][ T29] audit: type=1400 audit(831.532:971): avc: denied { read } for pid=7437 comm="syz.2.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 576.008204][ T29] audit: type=1326 audit(831.912:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7449 comm="syz.3.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.010577][ T29] audit: type=1326 audit(831.912:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7449 comm="syz.3.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.021304][ T29] audit: type=1326 audit(831.932:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7449 comm="syz.3.830" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.025038][ T29] audit: type=1326 audit(831.932:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7449 comm="syz.3.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.025990][ T29] audit: type=1326 audit(831.932:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7449 comm="syz.3.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.146567][ T7453] netlink: 64 bytes leftover after parsing attributes in process `syz.2.831'. [ 578.344134][ T7481] netlink: 220 bytes leftover after parsing attributes in process `syz.3.841'. [ 580.631986][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 580.632303][ T29] audit: type=1326 audit(836.532:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7509 comm="syz.2.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.633085][ T29] audit: type=1326 audit(836.542:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7509 comm="syz.2.849" exe="/syz-executor" sig=0 arch=40000028 syscall=347 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.634280][ T29] audit: type=1400 audit(836.542:1011): avc: denied { kexec_image_load } for pid=7509 comm="syz.2.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 580.635632][ T29] audit: type=1326 audit(836.542:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7509 comm="syz.2.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.637134][ T29] audit: type=1326 audit(836.542:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7509 comm="syz.2.849" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 581.026639][ T7515] tmpfs: Unsupported parameter 'mpol' [ 582.543333][ T29] audit: type=1400 audit(838.432:1014): avc: denied { watch } for pid=7525 comm="syz.3.855" path="/61" dev="tmpfs" ino=330 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 582.628020][ T29] audit: type=1326 audit(838.532:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7530 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.631869][ T29] audit: type=1326 audit(838.542:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7530 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.690727][ T29] audit: type=1326 audit(838.592:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7530 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 582.693348][ T29] audit: type=1326 audit(838.602:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7530 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.297758][ T7538] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 583.349491][ T7538] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 586.053996][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 586.055005][ T29] audit: type=1326 audit(841.962:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.056782][ T29] audit: type=1326 audit(841.962:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.058441][ T29] audit: type=1326 audit(841.962:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.063308][ T29] audit: type=1326 audit(841.962:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.106512][ T29] audit: type=1326 audit(841.982:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.107146][ T29] audit: type=1326 audit(841.982:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.107262][ T29] audit: type=1326 audit(841.992:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=353 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.107325][ T29] audit: type=1326 audit(841.992:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.108697][ T29] audit: type=1326 audit(842.012:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.130955][ T29] audit: type=1326 audit(842.012:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7577 comm="syz.3.873" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 592.457563][ T7626] SELinux: failed to load policy [ 594.041225][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 594.041570][ T29] audit: type=1326 audit(849.922:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.043210][ T29] audit: type=1326 audit(849.952:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.055165][ T29] audit: type=1326 audit(849.962:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.090733][ T29] audit: type=1326 audit(849.972:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.094023][ T29] audit: type=1326 audit(849.982:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.096725][ T29] audit: type=1326 audit(850.002:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.106295][ T29] audit: type=1326 audit(850.012:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.113034][ T29] audit: type=1326 audit(850.022:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.150133][ T29] audit: type=1326 audit(850.042:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.151705][ T29] audit: type=1326 audit(850.062:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7652 comm="syz.3.891" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 602.192323][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 602.192623][ T29] audit: type=1400 audit(858.092:1080): avc: denied { write } for pid=7682 comm="syz.2.898" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 603.483124][ T29] audit: type=1400 audit(859.392:1081): avc: denied { mount } for pid=7690 comm="syz.2.901" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 603.492772][ T29] audit: type=1326 audit(859.402:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 603.499452][ T29] audit: type=1326 audit(859.402:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132320 code=0x7ffc0000 [ 603.636655][ T29] audit: type=1326 audit(859.542:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 603.674171][ T29] audit: type=1326 audit(859.582:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 603.784966][ T29] audit: type=1326 audit(859.692:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 603.794550][ T29] audit: type=1326 audit(859.692:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x132320 code=0x7ffc0000 [ 603.800168][ T29] audit: type=1326 audit(859.702:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 603.801300][ T29] audit: type=1326 audit(859.702:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7690 comm="syz.2.901" exe="/syz-executor" sig=0 arch=40000028 syscall=441 compat=0 ip=0x132320 code=0x7ffc0000 [ 605.951464][ T7710] netlink: 28 bytes leftover after parsing attributes in process `syz.2.904'. [ 605.951917][ T7710] netlink: 28 bytes leftover after parsing attributes in process `syz.2.904'. [ 611.842242][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 611.842673][ T29] audit: type=1400 audit(867.752:1109): avc: denied { relabelfrom } for pid=7732 comm="syz.2.910" name="NETLINK" dev="sockfs" ino=12018 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 611.845019][ T29] audit: type=1400 audit(867.752:1110): avc: denied { relabelto } for pid=7732 comm="syz.2.910" name="NETLINK" dev="sockfs" ino=12018 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 618.234095][ T29] audit: type=1400 audit(874.142:1111): avc: denied { map } for pid=7750 comm="syz.2.917" path="/dev/usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.525067][ T7785] netlink: 'syz.2.921': attribute type 1 has an invalid length. [ 624.591342][ T7785] 8021q: adding VLAN 0 to HW filter on device bond1 [ 624.603036][ T29] audit: type=1400 audit(880.512:1112): avc: denied { ioctl } for pid=7784 comm="syz.2.921" path="socket:[12097]" dev="sockfs" ino=12097 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 625.134809][ T7821] macvlan2: entered promiscuous mode [ 625.136269][ T7821] macvlan2: entered allmulticast mode [ 630.936680][ T29] audit: type=1326 audit(886.822:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 630.942065][ T29] audit: type=1326 audit(886.852:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 630.970736][ T29] audit: type=1326 audit(886.872:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132320 code=0x7ffc0000 [ 630.986914][ T29] audit: type=1326 audit(886.892:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7836 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 630.998156][ T29] audit: type=1326 audit(886.902:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 631.007032][ T29] audit: type=1326 audit(886.912:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 631.024899][ T29] audit: type=1326 audit(886.922:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=268 compat=0 ip=0x132320 code=0x7ffc0000 [ 631.035861][ T29] audit: type=1326 audit(886.942:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 631.037582][ T29] audit: type=1326 audit(886.942:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7834 comm="syz.2.925" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 639.732342][ T29] audit: type=1400 audit(895.622:1122): avc: denied { mount } for pid=7851 comm="syz.2.932" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 643.103792][ T29] audit: type=1400 audit(899.012:1123): avc: denied { execute } for pid=7867 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 643.110380][ T29] audit: type=1400 audit(899.012:1124): avc: denied { execute_no_trans } for pid=7867 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 643.374277][ T29] audit: type=1400 audit(899.282:1125): avc: denied { mounton } for pid=7868 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 643.863564][ T7872] netlink: 12 bytes leftover after parsing attributes in process `syz.2.938'. [ 648.134458][ T7978] netlink: 'syz.2.940': attribute type 10 has an invalid length. [ 649.110252][ T7868] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 649.115023][ T7868] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 650.793698][ T29] audit: type=1326 audit(906.702:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.795580][ T29] audit: type=1326 audit(906.702:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.833035][ T29] audit: type=1326 audit(906.742:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.850713][ T29] audit: type=1326 audit(906.742:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.852447][ T29] audit: type=1326 audit(906.752:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8055 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 650.881958][ T29] audit: type=1326 audit(906.792:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.884342][ T29] audit: type=1326 audit(906.792:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.958562][ T29] audit: type=1326 audit(906.842:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 650.959167][ T29] audit: type=1326 audit(906.862:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 650.959428][ T29] audit: type=1326 audit(906.862:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8052 comm="syz.2.948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 651.166585][ T7868] hsr_slave_0: entered promiscuous mode [ 651.176331][ T7868] hsr_slave_1: entered promiscuous mode [ 651.178887][ T7868] debugfs: 'hsr0' already exists in 'hsr' [ 651.179097][ T7868] Cannot create hsr debugfs directory [ 653.852322][ T7868] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 653.889268][ T7868] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 653.947052][ T7868] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 653.992188][ T7868] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 654.605335][ T8168] netlink: 4 bytes leftover after parsing attributes in process `syz.2.950'. [ 654.607132][ T8168] hsr_slave_0: left promiscuous mode [ 654.610227][ T8168] hsr_slave_1: left promiscuous mode [ 655.777553][ T7868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 656.010579][ T8191] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 657.721883][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 657.733744][ T29] audit: type=1400 audit(913.632:1191): avc: denied { ioctl } for pid=8204 comm="syz.2.958" path="socket:[13377]" dev="sockfs" ino=13377 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 658.281164][ T8205] netlink: 4 bytes leftover after parsing attributes in process `syz.2.958'. [ 658.664142][ T29] audit: type=1400 audit(914.562:1192): avc: denied { create } for pid=8211 comm="syz.2.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 658.681200][ T29] audit: type=1400 audit(914.592:1193): avc: denied { write } for pid=8211 comm="syz.2.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 658.944185][ T8213] netlink: 8 bytes leftover after parsing attributes in process `syz.2.959'. [ 658.946721][ T29] audit: type=1400 audit(914.852:1194): avc: denied { write } for pid=8212 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.949080][ T29] audit: type=1400 audit(914.852:1195): avc: denied { open } for pid=8212 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.970844][ T29] audit: type=1400 audit(914.882:1196): avc: denied { search } for pid=8212 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 658.971277][ T29] audit: type=1400 audit(914.882:1197): avc: denied { search } for pid=8212 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 658.971478][ T29] audit: type=1400 audit(914.882:1198): avc: denied { search } for pid=8212 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 658.971618][ T29] audit: type=1400 audit(914.882:1199): avc: denied { search } for pid=8212 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 659.010458][ T29] audit: type=1400 audit(914.902:1200): avc: denied { read open } for pid=8216 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 659.085789][ T8213] netlink: 12 bytes leftover after parsing attributes in process `syz.2.959'. [ 663.469441][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 663.470370][ T29] audit: type=1400 audit(919.372:1212): avc: denied { mounton } for pid=8244 comm="syz.2.964" path="/proc/899/task" dev="proc" ino=13399 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 663.492098][ T29] audit: type=1400 audit(919.402:1213): avc: denied { mount } for pid=8244 comm="syz.2.964" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 664.683372][ T8261] netlink: 'syz.2.968': attribute type 10 has an invalid length. [ 664.684856][ T8261] netlink: 40 bytes leftover after parsing attributes in process `syz.2.968'. [ 666.558644][ T29] audit: type=1326 audit(922.462:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.570550][ T29] audit: type=1326 audit(922.472:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.575256][ T29] audit: type=1326 audit(922.482:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.579173][ T29] audit: type=1326 audit(922.482:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=143 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.586540][ T29] audit: type=1326 audit(922.482:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.588561][ T29] audit: type=1326 audit(922.492:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.591377][ T29] audit: type=1326 audit(922.492:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.593256][ T29] audit: type=1326 audit(922.492:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8281 comm="syz.2.974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 666.921336][ T7868] veth0_vlan: entered promiscuous mode [ 667.088910][ T7868] veth1_vlan: entered promiscuous mode [ 667.361141][ T7868] veth0_macvtap: entered promiscuous mode [ 667.392573][ T7868] veth1_macvtap: entered promiscuous mode [ 667.773622][ T1348] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.774952][ T1348] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.787216][ T1348] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 667.801143][ T1348] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 673.236180][ T8315] netlink: 4 bytes leftover after parsing attributes in process `syz.4.983'. [ 675.944658][ T8341] nr0: tun_chr_ioctl cmd 2147767521 [ 679.535762][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 679.536819][ T29] audit: type=1400 audit(935.442:1233): avc: denied { create } for pid=8359 comm="syz.2.998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 679.538358][ T29] audit: type=1400 audit(935.442:1234): avc: denied { setopt } for pid=8359 comm="syz.2.998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 679.791469][ T8363] netlink: 4 bytes leftover after parsing attributes in process `syz.4.999'. [ 680.028443][ T8368] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1001'. [ 680.319196][ T8374] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1004'. [ 681.089016][ T29] audit: type=1400 audit(936.992:1235): avc: denied { setcheckreqprot } for pid=8384 comm="syz.2.1008" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 682.439384][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 682.451327][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 682.720885][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 682.721387][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 683.312978][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 683.313430][ T8395] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1013'. [ 684.945510][ T29] audit: type=1400 audit(940.822:1236): avc: denied { name_bind } for pid=8424 comm="syz.2.1022" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 687.131069][ T29] audit: type=1400 audit(943.022:1237): avc: denied { create } for pid=8449 comm="syz.2.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 687.885344][ T8462] netlink: 'syz.4.1033': attribute type 1 has an invalid length. [ 688.255164][ T29] audit: type=1400 audit(944.162:1238): avc: denied { ioctl } for pid=8466 comm="syz.2.1035" path="socket:[12932]" dev="sockfs" ino=12932 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 690.526584][ T29] audit: type=1400 audit(946.432:1239): avc: denied { create } for pid=8490 comm="syz.4.1043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 692.896723][ T29] audit: type=1326 audit(948.802:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8502 comm="syz.4.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 692.916090][ T29] audit: type=1326 audit(948.822:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8502 comm="syz.4.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=0 ip=0x132320 code=0x7ffc0000 [ 692.917806][ T29] audit: type=1326 audit(948.822:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8502 comm="syz.4.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 692.922555][ T29] audit: type=1326 audit(948.822:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8502 comm="syz.4.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 694.312875][ T29] audit: type=1400 audit(950.222:1244): avc: denied { ioctl } for pid=8510 comm="syz.2.1049" path="socket:[13888]" dev="sockfs" ino=13888 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 694.875456][ T8513] syzkaller0: entered promiscuous mode [ 694.896444][ T8513] syzkaller0: entered allmulticast mode [ 699.998259][ T8541] netlink: 'syz.2.1057': attribute type 4 has an invalid length. [ 702.279951][ T29] audit: type=1326 audit(958.182:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8555 comm="syz.2.1063" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 702.290308][ T29] audit: type=1326 audit(958.202:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8555 comm="syz.2.1063" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 702.294886][ T29] audit: type=1326 audit(958.202:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8555 comm="syz.2.1063" exe="/syz-executor" sig=0 arch=40000028 syscall=45 compat=0 ip=0x132320 code=0x7ffc0000 [ 702.302767][ T29] audit: type=1326 audit(958.202:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8555 comm="syz.2.1063" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 702.307064][ T29] audit: type=1326 audit(958.212:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8555 comm="syz.2.1063" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 704.334054][ T29] audit: type=1326 audit(960.242:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8569 comm="syz.4.1067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 704.348668][ T29] audit: type=1326 audit(960.252:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8569 comm="syz.4.1067" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 704.363610][ T29] audit: type=1326 audit(960.262:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8569 comm="syz.4.1067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 704.366604][ T29] audit: type=1326 audit(960.272:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8569 comm="syz.4.1067" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 704.368561][ T29] audit: type=1326 audit(960.272:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8569 comm="syz.4.1067" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 708.709066][ T8603] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 712.515278][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 712.516251][ T29] audit: type=1400 audit(968.422:1267): avc: denied { setopt } for pid=8610 comm="syz.2.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 713.703653][ T8612] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 713.710863][ T8612] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 714.106859][ T29] audit: type=1326 audit(970.012:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.114185][ T29] audit: type=1326 audit(970.032:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.117763][ T29] audit: type=1326 audit(970.032:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.124565][ T29] audit: type=1326 audit(970.032:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.129001][ T29] audit: type=1326 audit(970.032:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.133507][ T29] audit: type=1326 audit(970.042:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.136128][ T29] audit: type=1326 audit(970.042:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.140964][ T29] audit: type=1326 audit(970.052:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.143014][ T29] audit: type=1326 audit(970.052:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8633 comm="syz.2.1085" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 715.382769][ T8655] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 719.428020][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 719.434588][ T29] audit: type=1326 audit(975.332:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.450974][ T29] audit: type=1326 audit(975.352:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.453445][ T29] audit: type=1326 audit(975.362:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.464271][ T29] audit: type=1326 audit(975.372:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=256 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.465955][ T29] audit: type=1326 audit(975.372:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.468421][ T29] audit: type=1326 audit(975.372:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.472491][ T29] audit: type=1326 audit(975.382:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.485951][ T29] audit: type=1326 audit(975.392:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 719.487755][ T29] audit: type=1400 audit(975.392:1378): avc: denied { create } for pid=8671 comm="syz.2.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 719.489308][ T29] audit: type=1326 audit(975.392:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8671 comm="syz.2.1093" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 722.594771][ T8697] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1101'. [ 725.820446][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 725.822130][ T29] audit: type=1326 audit(981.642:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.2.1108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 725.823685][ T29] audit: type=1326 audit(981.642:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.2.1108" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x132320 code=0x7ffc0000 [ 725.825140][ T29] audit: type=1326 audit(981.642:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8711 comm="syz.2.1108" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 725.999102][ T29] audit: type=1400 audit(981.902:1401): avc: denied { ioctl } for pid=8717 comm="syz.2.1110" path="socket:[13282]" dev="sockfs" ino=13282 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 726.385579][ T29] audit: type=1400 audit(982.292:1402): avc: denied { create } for pid=8724 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 726.394884][ T29] audit: type=1400 audit(982.302:1403): avc: denied { view } for pid=8724 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 726.518374][ T29] audit: type=1400 audit(982.422:1404): avc: denied { allowed } for pid=8726 comm="syz.2.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 726.530530][ T29] audit: type=1400 audit(982.432:1405): avc: denied { create } for pid=8726 comm="syz.2.1114" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 726.533566][ T29] audit: type=1400 audit(982.442:1406): avc: denied { map } for pid=8726 comm="syz.2.1114" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 726.536146][ T29] audit: type=1400 audit(982.442:1407): avc: denied { read write } for pid=8726 comm="syz.2.1114" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 730.406030][ T8748] SELinux: failed to load policy [ 734.515289][ T8768] SELinux: policydb version 0 does not match my version range 15-35 [ 734.516701][ T8768] SELinux: failed to load policy [ 734.542043][ T8768] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1126'. [ 734.854620][ T8768] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1126'. [ 740.450713][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 740.453687][ T29] audit: type=1400 audit(996.342:1413): avc: denied { prog_load } for pid=8790 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 740.527291][ T29] audit: type=1400 audit(996.362:1414): avc: denied { bpf } for pid=8790 comm="syz.4.1134" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 740.665881][ T29] audit: type=1400 audit(996.572:1415): avc: denied { perfmon } for pid=8790 comm="syz.4.1134" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 740.681618][ T29] audit: type=1400 audit(996.592:1416): avc: denied { map_create } for pid=8790 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 740.744311][ T29] audit: type=1400 audit(996.652:1417): avc: denied { map_read map_write } for pid=8790 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 740.900798][ T29] audit: type=1400 audit(996.802:1418): avc: denied { read } for pid=8793 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 741.084817][ T29] audit: type=1400 audit(996.892:1419): avc: denied { execmem } for pid=8795 comm="syz.4.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 741.960641][ T29] audit: type=1400 audit(997.862:1420): avc: denied { create } for pid=8793 comm="syz.2.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 741.976737][ T29] audit: type=1400 audit(997.882:1421): avc: denied { bind } for pid=8793 comm="syz.2.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 741.980757][ T8794] RDS: rds_bind could not find a transport for fe80::1a, load rds_tcp or rds_rdma? [ 741.993405][ T29] audit: type=1400 audit(997.902:1422): avc: denied { write } for pid=8793 comm="syz.2.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 743.376856][ T8810] netlink: 91 bytes leftover after parsing attributes in process `syz.2.1141'. [ 744.056862][ T8816] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1144'. [ 744.057309][ T8816] netlink: 108 bytes leftover after parsing attributes in process `syz.4.1144'. [ 744.058637][ T8816] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1144'. [ 744.059379][ T8816] netlink: 108 bytes leftover after parsing attributes in process `syz.4.1144'. [ 744.059422][ T8816] netlink: 84 bytes leftover after parsing attributes in process `syz.4.1144'. [ 747.018611][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 747.018869][ T29] audit: type=1400 audit(1002.922:1434): avc: denied { write } for pid=8847 comm="syz.2.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 747.404331][ T29] audit: type=1400 audit(1003.312:1435): avc: denied { mount } for pid=8853 comm="syz.4.1150" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 747.830912][ T29] audit: type=1400 audit(1003.732:1436): avc: denied { create } for pid=8849 comm="syz.2.1149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 748.532770][ T29] audit: type=1400 audit(1004.442:1437): avc: denied { create } for pid=8865 comm="syz.4.1152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 748.771456][ T29] audit: type=1400 audit(1004.662:1438): avc: denied { create } for pid=8871 comm="syz.4.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 748.787592][ T29] audit: type=1400 audit(1004.692:1439): avc: denied { write } for pid=8871 comm="syz.4.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 748.811509][ T29] audit: type=1400 audit(1004.722:1440): avc: denied { create } for pid=8871 comm="syz.4.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 748.836519][ T29] audit: type=1400 audit(1004.742:1441): avc: denied { write } for pid=8871 comm="syz.4.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 748.846532][ T29] audit: type=1400 audit(1004.752:1442): avc: denied { create } for pid=8871 comm="syz.4.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 748.852022][ T29] audit: type=1400 audit(1004.762:1443): avc: denied { ioctl } for pid=8871 comm="syz.4.1155" path="socket:[14322]" dev="sockfs" ino=14322 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 752.713874][ T29] audit: type=1400 audit(1008.622:1444): avc: denied { read } for pid=8898 comm="syz.2.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.744883][ T29] audit: type=1400 audit(1008.632:1445): avc: denied { watch watch_reads } for pid=8899 comm="syz.4.1165" path="/70" dev="tmpfs" ino=380 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 752.751973][ T8900] netlink: 204 bytes leftover after parsing attributes in process `syz.2.1164'. [ 752.803186][ T29] audit: type=1400 audit(1008.702:1446): avc: denied { create } for pid=8899 comm="syz.4.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 752.817940][ T29] audit: type=1400 audit(1008.722:1447): avc: denied { ioctl } for pid=8899 comm="syz.4.1165" path="socket:[15393]" dev="sockfs" ino=15393 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 753.094006][ T8906] sch_fq: defrate 4294967295 ignored. [ 754.723245][ T29] audit: type=1400 audit(1010.632:1448): avc: denied { open } for pid=8917 comm="syz.4.1170" path="/dev/snd/seq" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.731043][ T29] audit: type=1400 audit(1010.632:1449): avc: denied { ioctl } for pid=8917 comm="syz.4.1170" path="/dev/snd/seq" dev="devtmpfs" ino=722 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 756.149197][ T29] audit: type=1400 audit(1012.052:1450): avc: denied { allowed } for pid=8919 comm="syz.4.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 756.163032][ T29] audit: type=1400 audit(1012.072:1451): avc: denied { create } for pid=8919 comm="syz.4.1171" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 756.166632][ T29] audit: type=1400 audit(1012.072:1452): avc: denied { map } for pid=8919 comm="syz.4.1171" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14533 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 756.170574][ T29] audit: type=1400 audit(1012.072:1453): avc: denied { read write } for pid=8919 comm="syz.4.1171" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14533 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 758.734609][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 758.735381][ T29] audit: type=1326 audit(1014.642:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.745425][ T29] audit: type=1326 audit(1014.652:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.745947][ T29] audit: type=1326 audit(1014.652:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=346 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.746207][ T29] audit: type=1326 audit(1014.652:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.746549][ T29] audit: type=1326 audit(1014.652:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.766406][ T29] audit: type=1326 audit(1014.672:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.767150][ T29] audit: type=1326 audit(1014.672:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.767607][ T29] audit: type=1326 audit(1014.672:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 758.767698][ T29] audit: type=1326 audit(1014.672:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8944 comm="syz.4.1178" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 764.409392][ T8964] SELinux: Context 4xʐtwmxYw_Jv [ 764.409392][ T8964] Mj # is not valid (left unmapped). [ 764.443302][ T29] audit: type=1400 audit(1020.312:1471): avc: denied { mac_admin } for pid=8963 comm="syz.2.1184" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 769.050760][ T29] audit: type=1326 audit(1024.952:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8974 comm="syz.4.1188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 769.054046][ T29] audit: type=1326 audit(1024.952:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8974 comm="syz.4.1188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 769.080853][ T29] audit: type=1326 audit(1024.982:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8974 comm="syz.4.1188" exe="/syz-executor" sig=0 arch=40000028 syscall=43 compat=0 ip=0x132320 code=0x7ffc0000 [ 769.086168][ T29] audit: type=1326 audit(1024.992:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8974 comm="syz.4.1188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 769.107368][ T29] audit: type=1326 audit(1025.012:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8974 comm="syz.4.1188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 769.454366][ T29] audit: type=1400 audit(1025.362:1477): avc: denied { write } for pid=8978 comm="syz.4.1189" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 770.250629][ T29] audit: type=1326 audit(1026.112:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.251570][ T29] audit: type=1326 audit(1026.122:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.251818][ T29] audit: type=1326 audit(1026.122:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.252007][ T29] audit: type=1326 audit(1026.132:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.252203][ T29] audit: type=1326 audit(1026.152:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.254494][ T29] audit: type=1326 audit(1026.152:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.260255][ T29] audit: type=1326 audit(1026.162:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.261415][ T29] audit: type=1326 audit(1026.172:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=0 ip=0x132320 code=0x7ffc0000 [ 770.262762][ T29] audit: type=1326 audit(1026.172:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8986 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 773.806385][ T9009] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1200'. [ 775.601168][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 775.601918][ T29] audit: type=1400 audit(1031.512:1490): avc: denied { name_bind } for pid=9023 comm="syz.4.1205" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 775.614292][ T29] audit: type=1326 audit(1031.522:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9023 comm="syz.4.1205" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 777.687201][ T29] audit: type=1400 audit(1033.592:1492): avc: denied { sys_module } for pid=9028 comm="syz.4.1206" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 783.053718][ T29] audit: type=1400 audit(1038.962:1493): avc: denied { create } for pid=9045 comm="syz.2.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 783.070320][ T29] audit: type=1400 audit(1038.962:1494): avc: denied { setopt } for pid=9045 comm="syz.2.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 795.845448][ T29] audit: type=1400 audit(1051.752:1495): avc: denied { create } for pid=9058 comm="syz.4.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 795.869943][ T29] audit: type=1400 audit(1051.772:1496): avc: denied { setopt } for pid=9058 comm="syz.4.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 795.891710][ T29] audit: type=1400 audit(1051.802:1497): avc: denied { ioctl } for pid=9058 comm="syz.4.1216" path="socket:[15663]" dev="sockfs" ino=15663 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 795.894950][ T29] audit: type=1400 audit(1051.802:1498): avc: denied { write } for pid=9058 comm="syz.4.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 825.672234][ T29] audit: type=1400 audit(1081.582:1499): avc: denied { getopt } for pid=9088 comm="syz.4.1228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 828.198687][ T29] audit: type=1400 audit(1084.102:1500): avc: denied { execute } for pid=9115 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 828.252973][ T29] audit: type=1400 audit(1084.162:1501): avc: denied { execute_no_trans } for pid=9115 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 828.360644][ T29] audit: type=1400 audit(1084.262:1502): avc: denied { read } for pid=9118 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 828.372732][ T29] audit: type=1400 audit(1084.282:1503): avc: denied { open } for pid=9118 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 828.391593][ T29] audit: type=1400 audit(1084.302:1504): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 834.413693][ T9118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 834.443748][ T9118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 837.398058][ T29] audit: type=1400 audit(1093.302:1505): avc: denied { read } for pid=9354 comm="syz.4.1230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 837.424276][ T9118] hsr_slave_0: entered promiscuous mode [ 837.426017][ T9118] hsr_slave_1: entered promiscuous mode [ 837.427550][ T9118] debugfs: 'hsr0' already exists in 'hsr' [ 837.427819][ T9118] Cannot create hsr debugfs directory [ 838.301277][ T9118] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 838.323770][ T9118] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 838.328968][ T9118] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 838.337027][ T9118] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 840.312085][ T9118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 841.350655][ T29] audit: type=1326 audit(1097.252:1506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.371750][ T29] audit: type=1326 audit(1097.282:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.441625][ T29] audit: type=1326 audit(1097.282:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.445929][ T29] audit: type=1326 audit(1097.302:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.449441][ T29] audit: type=1326 audit(1097.302:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.463557][ T29] audit: type=1326 audit(1097.302:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.465528][ T29] audit: type=1326 audit(1097.362:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 841.467637][ T29] audit: type=1326 audit(1097.372:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9470 comm="syz.4.1235" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 842.282175][ T29] audit: type=1400 audit(1098.182:1514): avc: denied { create } for pid=9482 comm="syz.4.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 853.478151][ T29] audit: type=1400 audit(1109.382:1515): avc: denied { name_bind } for pid=9522 comm="syz.4.1243" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 853.916018][ T9118] veth0_vlan: entered promiscuous mode [ 853.985312][ T9118] veth1_vlan: entered promiscuous mode [ 854.176443][ T9118] veth0_macvtap: entered promiscuous mode [ 854.212993][ T9118] veth1_macvtap: entered promiscuous mode [ 854.388305][ T1290] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 854.410716][ T1290] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 854.411179][ T1290] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 854.411276][ T1290] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 854.616903][ T29] audit: type=1400 audit(1110.522:1516): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/syzkaller.iUGSy1/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 854.626131][ T29] audit: type=1400 audit(1110.522:1517): avc: denied { mount } for pid=9118 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 854.637948][ T29] audit: type=1400 audit(1110.522:1518): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/syzkaller.iUGSy1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 854.669040][ T29] audit: type=1400 audit(1110.542:1519): avc: denied { mount } for pid=9118 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 854.672777][ T29] audit: type=1400 audit(1110.582:1520): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/syzkaller.iUGSy1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 854.685704][ T29] audit: type=1400 audit(1110.582:1521): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/syzkaller.iUGSy1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=15147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 854.836695][ T29] audit: type=1400 audit(1110.742:1522): avc: denied { unmount } for pid=9118 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 854.912719][ T29] audit: type=1400 audit(1110.802:1523): avc: denied { mounton } for pid=9118 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 854.913105][ T29] audit: type=1400 audit(1110.802:1524): avc: denied { mount } for pid=9118 comm="syz-executor" name="/" dev="gadgetfs" ino=2260 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 858.607692][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 858.608193][ T29] audit: type=1400 audit(1114.512:1555): avc: denied { create } for pid=9561 comm="syz.4.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 858.624352][ T29] audit: type=1400 audit(1114.532:1556): avc: denied { setopt } for pid=9561 comm="syz.4.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 858.624910][ T29] audit: type=1400 audit(1114.532:1557): avc: denied { connect } for pid=9561 comm="syz.4.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 859.540045][ T29] audit: type=1326 audit(1115.442:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.540841][ T29] audit: type=1326 audit(1115.442:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.542254][ T29] audit: type=1326 audit(1115.452:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.544373][ T29] audit: type=1326 audit(1115.452:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.547089][ T29] audit: type=1326 audit(1115.452:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.573529][ T29] audit: type=1326 audit(1115.482:1563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 859.576580][ T29] audit: type=1326 audit(1115.482:1564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9569 comm="syz.4.1263" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 860.321863][ T9578] netlink: 108 bytes leftover after parsing attributes in process `syz.5.1267'. [ 860.322664][ T9578] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 863.649417][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 863.651277][ T29] audit: type=1400 audit(1119.552:1586): avc: denied { execute } for pid=9583 comm="syz.4.1271" name="file2" dev="tmpfs" ino=812 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 863.653284][ T29] audit: type=1400 audit(1119.562:1587): avc: denied { execute_no_trans } for pid=9583 comm="syz.4.1271" path="/152/file2" dev="tmpfs" ino=812 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 868.779556][ T9628] smc: net device bond0 applied user defined pnetid SYZ0 [ 868.784019][ T9628] smc: net device bond0 erased user defined pnetid SYZ0 [ 869.048907][ T29] audit: type=1400 audit(1124.952:1588): avc: denied { bind } for pid=9630 comm="syz.5.1289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 869.065944][ T29] audit: type=1400 audit(1124.972:1589): avc: denied { listen } for pid=9630 comm="syz.5.1289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 869.210221][ T29] audit: type=1400 audit(1125.112:1590): avc: denied { write } for pid=9630 comm="syz.5.1289" path="socket:[16155]" dev="sockfs" ino=16155 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 869.678097][ T29] audit: type=1400 audit(1125.582:1591): avc: denied { setopt } for pid=9636 comm="syz.4.1292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 870.430587][ T29] audit: type=1326 audit(1126.332:1592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 870.471407][ T29] audit: type=1326 audit(1126.382:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 870.601097][ T29] audit: type=1326 audit(1126.482:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 870.607013][ T29] audit: type=1326 audit(1126.502:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 870.607226][ T29] audit: type=1326 audit(1126.502:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 870.607294][ T29] audit: type=1326 audit(1126.502:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9640 comm="syz.5.1294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 871.771919][ T9651] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 872.532124][ T9656] netlink: 'syz.5.1300': attribute type 21 has an invalid length. [ 872.533789][ T9656] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1300'. [ 874.433592][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 874.435032][ T29] audit: type=1400 audit(1130.332:1605): avc: denied { create } for pid=9663 comm="syz.4.1303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 876.223322][ T29] audit: type=1400 audit(1132.132:1606): avc: denied { append } for pid=9674 comm="syz.4.1308" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 876.227759][ T9675] usb usb1: usbfs: process 9675 (syz.4.1308) did not claim interface 0 before use [ 876.426432][ T29] audit: type=1400 audit(1132.332:1607): avc: denied { read } for pid=9676 comm="syz.4.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 876.443874][ T29] audit: type=1400 audit(1132.352:1608): avc: denied { bind } for pid=9676 comm="syz.4.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 876.916992][ T9681] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1311'. [ 881.278574][ T9710] SELinux: Context is not valid (left unmapped). [ 886.432980][ T29] audit: type=1400 audit(1142.342:1609): avc: denied { wake_alarm } for pid=9728 comm="syz.4.1329" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 889.130251][ T29] audit: type=1326 audit(1145.032:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.132091][ T29] audit: type=1326 audit(1145.032:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.133817][ T29] audit: type=1326 audit(1145.032:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.137189][ T29] audit: type=1326 audit(1145.042:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.140559][ T29] audit: type=1326 audit(1145.042:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.140904][ T29] audit: type=1326 audit(1145.042:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.140973][ T29] audit: type=1326 audit(1145.042:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.141015][ T29] audit: type=1326 audit(1145.042:1617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.141058][ T29] audit: type=1326 audit(1145.042:1618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9734 comm="syz.4.1331" exe="/syz-executor" sig=0 arch=40000028 syscall=298 compat=0 ip=0x132320 code=0x7ffc0000 [ 889.994129][ T9739] syzkaller0: entered promiscuous mode [ 889.994592][ T9739] syzkaller0: entered allmulticast mode [ 928.371798][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 928.372121][ T29] audit: type=1400 audit(1184.272:1629): avc: denied { mount } for pid=9857 comm=FF name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 931.976697][ T9883] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 936.334730][ T29] audit: type=1326 audit(1192.242:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.337002][ T29] audit: type=1326 audit(1192.242:1631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.371481][ T29] audit: type=1326 audit(1192.252:1632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.440666][ T29] audit: type=1326 audit(1192.332:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.441224][ T29] audit: type=1326 audit(1192.342:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.448515][ T29] audit: type=1326 audit(1192.352:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.456150][ T29] audit: type=1326 audit(1192.362:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.503737][ T29] audit: type=1326 audit(1192.392:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.507177][ T29] audit: type=1326 audit(1192.412:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 936.514112][ T29] audit: type=1326 audit(1192.422:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9932 comm="syz.5.1378" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.639113][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 945.640037][ T29] audit: type=1326 audit(1201.542:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.647716][ T29] audit: type=1326 audit(1201.552:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.684345][ T29] audit: type=1326 audit(1201.582:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.684949][ T29] audit: type=1326 audit(1201.582:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.685192][ T29] audit: type=1326 audit(1201.592:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.685276][ T29] audit: type=1326 audit(1201.592:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.687285][ T29] audit: type=1326 audit(1201.592:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=242 compat=0 ip=0x132320 code=0x7ffc0000 [ 945.688655][ T29] audit: type=1326 audit(1201.592:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10006 comm="syz.4.1389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 946.144717][T10011] binfmt_misc: register: failed to install interpreter file ./file0 [ 949.411204][ T29] audit: type=1400 audit(1205.312:1650): avc: denied { create } for pid=10039 comm="syz.4.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 949.843858][ T29] audit: type=1400 audit(1205.752:1651): avc: denied { connect } for pid=10043 comm="syz.4.1402" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 952.373559][T10067] smc: net device bond0 applied user defined pnetid SYZ0 [ 952.432663][T10067] smc: net device bond0 erased user defined pnetid SYZ0 [ 952.599271][ T29] audit: type=1326 audit(1208.472:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.607647][ T29] audit: type=1326 audit(1208.512:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.624347][ T29] audit: type=1326 audit(1208.522:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.666540][ T29] audit: type=1326 audit(1208.532:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.703550][ T29] audit: type=1326 audit(1208.532:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.706840][ T29] audit: type=1326 audit(1208.532:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.710995][ T29] audit: type=1326 audit(1208.562:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.715429][ T29] audit: type=1326 audit(1208.562:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.719547][ T29] audit: type=1326 audit(1208.562:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 952.721001][ T29] audit: type=1326 audit(1208.562:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10062 comm="syz.5.1409" exe="/syz-executor" sig=0 arch=40000028 syscall=99 compat=0 ip=0x132320 code=0x7ffc0000 [ 954.820467][ T30] INFO: task kworker/0:1:10 blocked for more than 430 seconds. [ 954.826168][ T30] Not tainted syzkaller #0 [ 954.827254][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.828743][ T30] task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.831827][ T30] Workqueue: events bpf_prog_free_deferred SYZFAIL: failed to recv rpc [ 954.838105][ T30] Call trace: [ 954.840994][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.858237][ T30] r10:df841d84 r9:829174a8 r8:60070113 r7:829174a8 r6:df841d8c r5:8320ec00 [ 954.858820][ T30] r4:8320ec00 [ 954.859012][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.859149][ T30] r5:8320ec00 r4:829174a4 [ 954.859171][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.859238][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.859352][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 [ 954.859401][ T30] r4:00000000 [ 954.859426][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.859483][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.865757][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.865930][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be5540 [ 954.865973][ T30] r4:00000000 [ 954.865991][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.866096][ T30] r9:83018405 r8:8320ec00 r7:00000000 r6:83018400 r5:00001000 r4:7f274000 [ 954.866121][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.866193][ T30] r5:00001000 r4:dfdc7000 [ 954.866211][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.866268][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.866362][ T30] r5:85306794 r4:830ba880 [ 954.866382][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.866451][ T30] r7:dddcfb40 r6:83018400 r5:85306794 r4:830ba880 [ 954.866468][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.866544][ T30] r10:61c88647 r9:8320ec00 r8:830ba8ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 954.866569][ T30] r4:830ba880 [ 954.866585][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.866653][ T30] r10:00000000 r9:830ba880 r8:802762fc r7:df83de60 r6:830ba980 r5:8320ec00 [ 954.866710][ T30] r4:00000001 [ 954.866733][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.866950][ T30] Exception stack(0xdf841fb0 to 0xdf841ff8) [ 954.867161][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 954.867239][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.867275][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.867358][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.867383][ T30] r4:830b7340 [ 954.868333][ T30] INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.868448][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.868616][ T30] Workqueue: events bpf_prog_free_deferred [ 954.868675][ T30] Call trace: [ 954.868832][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.868927][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.868950][ T30] r4:00000000 [ 954.868969][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.869033][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.869075][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.869158][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.869188][ T30] 5d60: 800f0113 ffffffff [ 954.869211][ T30] r5:800f0113 r4:80239030 [ 954.869226][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.869290][ T30] r4:82ace224 [ 954.869308][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.869380][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.869403][ T30] r4:dfaf5dc0 [ 954.869422][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.877309][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.877669][ T30] r4:00000000 [ 954.877840][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.877994][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.878018][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.878092][ T30] r5:00001000 r4:dfded000 [ 954.878115][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.878173][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.878236][ T30] r5:8526e394 r4:886fed80 [ 954.878253][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.878318][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.878379][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.878453][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.878475][ T30] r4:886fed80 [ 954.878492][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.878575][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.878598][ T30] r4:00000001 [ 954.878618][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.878672][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.878710][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.878747][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.878780][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.878846][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.878870][ T30] r4:84bf6540 [ 954.880027][ T30] INFO: task kworker/0:4:3703 blocked for more than 430 seconds. [ 954.880105][ T30] Not tainted syzkaller #0 [ 954.880128][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.880145][ T30] task:kworker/0:4 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.880222][ T30] Workqueue: events bpf_prog_free_deferred [ 954.880308][ T30] Call trace: [ 954.880341][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.880432][ T30] r10:dfc95d84 r9:829174a8 r8:60000013 r7:829174a8 r6:dfc95d8c r5:83fc9800 [ 954.880454][ T30] r4:83fc9800 [ 954.880487][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.880593][ T30] r5:83fc9800 r4:829174a4 [ 954.880612][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.880669][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.880748][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 [ 954.880776][ T30] r4:00000000 [ 954.880819][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.880871][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.880924][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.880994][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859aff00 [ 954.881015][ T30] r4:00000000 [ 954.881030][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.881103][ T30] r9:83018405 r8:83fc9800 r7:00000000 r6:83018400 r5:00001000 r4:7f27e000 [ 954.881122][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.881186][ T30] r5:00001000 r4:e0329000 [ 954.881202][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.881271][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.881331][ T30] r5:84624394 r4:85bf5780 [ 954.881376][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.881446][ T30] r7:dddcfb40 r6:83018400 r5:84624394 r4:85bf5780 [ 954.881464][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.881562][ T30] r10:61c88647 r9:83fc9800 r8:85bf57ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 954.881599][ T30] r4:85bf5780 [ 954.881617][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.881685][ T30] r10:00000000 r9:85bf5780 r8:802762fc r7:df83de60 r6:85bc2800 r5:83fc9800 [ 954.881704][ T30] r4:00000001 [ 954.881721][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.881779][ T30] Exception stack(0xdfc95fb0 to 0xdfc95ff8) [ 954.881812][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.881847][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.881881][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.881918][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.881938][ T30] r4:84c65c00 [ 954.882523][ T30] INFO: task kworker/0:4:3703 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.882564][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.882656][ T30] Workqueue: events bpf_prog_free_deferred [ 954.882704][ T30] Call trace: [ 954.882730][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.882815][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.882837][ T30] r4:00000000 [ 954.882853][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.882904][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.882943][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.882979][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.883006][ T30] 5d60: 800f0113 ffffffff [ 954.883030][ T30] r5:800f0113 r4:80239030 [ 954.883047][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.883109][ T30] r4:82ace224 [ 954.883144][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.883218][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.883239][ T30] r4:dfaf5dc0 [ 954.883284][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.883356][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.883407][ T30] r4:00000000 [ 954.883435][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.883521][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.883540][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.883602][ T30] r5:00001000 r4:dfded000 [ 954.883619][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.883674][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.883733][ T30] r5:8526e394 r4:886fed80 [ 954.883749][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.883837][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.883857][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.883953][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.883977][ T30] r4:886fed80 [ 954.884004][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.884074][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.884097][ T30] r4:00000001 [ 954.884113][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.884171][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.884206][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.884288][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.884323][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.884360][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.884379][ T30] r4:84bf6540 [ 954.884465][ T30] INFO: task kworker/1:29:4159 blocked for more than 430 seconds. [ 954.884504][ T30] Not tainted syzkaller #0 [ 954.884534][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.884550][ T30] task:kworker/1:29 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.884604][ T30] Workqueue: events bpf_prog_free_deferred [ 954.884645][ T30] Call trace: [ 954.884673][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.884749][ T30] r10:e0205d84 r9:829174a8 r8:60000013 r7:829174a8 r6:e0205d8c r5:85d73000 [ 954.884792][ T30] r4:85d73000 [ 954.884812][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.884879][ T30] r5:85d73000 r4:829174a4 [ 954.884895][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.884950][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.885015][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0205e08 [ 954.885084][ T30] r4:00000000 [ 954.885117][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.885171][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.885225][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.885292][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c16600 [ 954.885326][ T30] r4:00000000 [ 954.885406][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.885492][ T30] r9:83018605 r8:85d73000 r7:00000000 r6:83018600 r5:00001000 r4:7f262000 [ 954.885605][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.885677][ T30] r5:00001000 r4:dfe4d000 [ 954.885698][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.885758][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.885827][ T30] r5:85305394 r4:85bf5080 [ 954.885847][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.885911][ T30] r7:ddde3b40 r6:83018600 r5:85305394 r4:85bf5080 [ 954.885928][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.885997][ T30] r10:61c88647 r9:85d73000 r8:85bf50ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.886018][ T30] r4:85bf5080 [ 954.886034][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.886101][ T30] r10:00000000 r9:85bf5080 r8:802762fc r7:dfbf5e60 r6:85bf5100 r5:85d73000 [ 954.886152][ T30] r4:00000001 [ 954.886172][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.886220][ T30] Exception stack(0xe0205fb0 to 0xe0205ff8) [ 954.886253][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.886294][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.886376][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.886420][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.886442][ T30] r4:85bce800 [ 954.886756][ T30] INFO: task kworker/1:29:4159 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.886803][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 954.886872][ T30] Workqueue: events bpf_prog_free_deferred [ 954.887007][ T30] Call trace: [ 954.887038][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.887127][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.887181][ T30] r4:00000000 [ 954.887200][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.887256][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.887295][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.887397][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.887426][ T30] 5d60: 800f0113 ffffffff [ 954.887452][ T30] r5:800f0113 r4:80239030 [ 954.887467][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.887534][ T30] r4:82ace224 [ 954.887550][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.887619][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.887639][ T30] r4:dfaf5dc0 [ 954.887687][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.887763][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.887787][ T30] r4:00000000 [ 954.887804][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.887878][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.887917][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.887983][ T30] r5:00001000 r4:dfded000 [ 954.888000][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.888057][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.888115][ T30] r5:8526e394 r4:886fed80 [ 954.888131][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.888192][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.888210][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.888306][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.888329][ T30] r4:886fed80 [ 954.888344][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.888412][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.888434][ T30] r4:00000001 [ 954.888451][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.888497][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.888535][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.888570][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.888616][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.888658][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.888679][ T30] r4:84bf6540 [ 954.888704][ T30] INFO: task kworker/0:25:4162 blocked for more than 430 seconds. [ 954.888735][ T30] Not tainted syzkaller #0 [ 954.888756][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.888774][ T30] task:kworker/0:25 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.888828][ T30] Workqueue: events bpf_prog_free_deferred [ 954.888868][ T30] Call trace: [ 954.888893][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.888971][ T30] r10:e021dd84 r9:829174a8 r8:60070113 r7:829174a8 r6:e021dd8c r5:84d6a400 [ 954.889000][ T30] r4:84d6a400 [ 954.889039][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.889107][ T30] r5:84d6a400 r4:829174a4 [ 954.889126][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.889177][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.889239][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e021de08 [ 954.889261][ T30] r4:00000000 [ 954.889277][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.889326][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.889379][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.889519][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c16f00 [ 954.922747][ T30] r4:00000000 [ 954.922813][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.922942][ T30] r9:83018405 r8:84d6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f250000 [ 954.922963][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.923031][ T30] r5:00001000 r4:dfe45000 [ 954.923047][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.923140][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.923210][ T30] r5:85305f94 r4:84c53500 [ 954.923227][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.923292][ T30] r7:dddcfb40 r6:83018400 r5:85305f94 r4:84c53500 [ 954.923325][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.923398][ T30] r10:61c88647 r9:84d6a400 r8:84c5352c r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 954.923420][ T30] r4:84c53500 [ 954.923435][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.923501][ T30] r10:00000000 r9:84c53500 r8:802762fc r7:e01f9e60 r6:84c53000 r5:84d6a400 [ 954.923532][ T30] r4:00000001 [ 954.923551][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.923690][ T30] Exception stack(0xe021dfb0 to 0xe021dff8) [ 954.923913][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 954.923961][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.924010][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.924052][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.924073][ T30] r4:85c95880 [ 954.924662][ T30] INFO: task kworker/0:25:4162 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.924872][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.924982][ T30] Workqueue: events bpf_prog_free_deferred [ 954.925037][ T30] Call trace: [ 954.925066][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.925157][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.925208][ T30] r4:00000000 [ 954.925226][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.925278][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.925318][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.925434][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.925453][ T30] 5d60: 800f0113 ffffffff [ 954.925466][ T30] r5:800f0113 r4:80239030 [ 954.925475][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.925524][ T30] r4:82ace224 [ 954.925532][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.925569][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.925631][ T30] r4:dfaf5dc0 [ 954.925641][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.925678][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.925687][ T30] r4:00000000 [ 954.925695][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.925804][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.925846][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.925895][ T30] r5:00001000 r4:dfded000 [ 954.925905][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.925934][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.926014][ T30] r5:8526e394 r4:886fed80 [ 954.926024][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.926107][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.926117][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.926181][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.926193][ T30] r4:886fed80 [ 954.926200][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.926263][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.926305][ T30] r4:00000001 [ 954.926315][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.926448][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.926475][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.926528][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.926546][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.926600][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.926612][ T30] r4:84bf6540 [ 954.926666][ T30] INFO: task kworker/1:31:4167 blocked for more than 430 seconds. [ 954.926725][ T30] Not tainted syzkaller #0 [ 954.926739][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.926792][ T30] task:kworker/1:31 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.926874][ T30] Workqueue: events bpf_prog_free_deferred [ 954.926937][ T30] Call trace: [ 954.926966][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.927039][ T30] r10:e02b9d84 r9:829174a8 r8:60000113 r7:829174a8 r6:e02b9d8c r5:84d6bc00 [ 954.927052][ T30] r4:84d6bc00 [ 954.927080][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.927113][ T30] r5:84d6bc00 r4:829174a4 [ 954.927154][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.927184][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.927252][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02b9e08 [ 954.927264][ T30] r4:00000000 [ 954.927347][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.927408][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.927434][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.927477][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e18000 [ 954.927501][ T30] r4:00000000 [ 954.927559][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.927598][ T30] r9:83018605 r8:84d6bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f236000 [ 954.927606][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.927636][ T30] r5:00001000 r4:df9be000 [ 954.927643][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.927716][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.927750][ T30] r5:85a27394 r4:85bf5f00 [ 954.927780][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.927831][ T30] r7:ddde3b40 r6:83018600 r5:85a27394 r4:85bf5f00 [ 954.927861][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.927897][ T30] r10:61c88647 r9:84d6bc00 r8:85bf5f2c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.927964][ T30] r4:85bf5f00 [ 954.927986][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.928020][ T30] r10:00000000 r9:85bf5f00 r8:802762fc r7:e01d5e60 r6:84e40f00 r5:84d6bc00 [ 954.928079][ T30] r4:00000001 [ 954.928125][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.928149][ T30] Exception stack(0xe02b9fb0 to 0xe02b9ff8) [ 954.928167][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 954.928206][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.928279][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.928301][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.928338][ T30] r4:85d10ac0 [ 954.928545][ T30] INFO: task kworker/1:31:4167 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.928582][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.928620][ T30] Workqueue: events bpf_prog_free_deferred [ 954.928644][ T30] Call trace: [ 954.928693][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.928805][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.928818][ T30] r4:00000000 [ 954.928826][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.928853][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.928886][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.928968][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.929056][ T30] 5d60: 800f0113 ffffffff [ 954.929073][ T30] r5:800f0113 r4:80239030 [ 954.929118][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.929153][ T30] r4:82ace224 [ 954.929160][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.929194][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.929205][ T30] r4:dfaf5dc0 [ 954.929269][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.929375][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.950806][ T30] r4:00000000 [ 954.950872][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.951019][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.951141][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.951220][ T30] r5:00001000 r4:dfded000 [ 954.951306][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.951410][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.951500][ T30] r5:8526e394 r4:886fed80 [ 954.951533][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.951608][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.951626][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.951701][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.951746][ T30] r4:886fed80 [ 954.951804][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.951883][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.951929][ T30] r4:00000001 [ 954.951950][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.952020][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.952099][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.952146][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.952179][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.952229][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.952267][ T30] r4:84bf6540 [ 954.953245][ T30] INFO: task kworker/1:33:4193 blocked for more than 430 seconds. [ 954.953302][ T30] Not tainted syzkaller #0 [ 954.953408][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.953430][ T30] task:kworker/1:33 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.953511][ T30] Workqueue: events bpf_prog_free_deferred [ 954.953581][ T30] Call trace: [ 954.953611][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.953741][ T30] r10:e02d5d84 r9:829174a8 r8:60000113 r7:829174a8 r6:e02d5d8c r5:83fb1800 [ 954.953771][ T30] r4:83fb1800 [ 954.953791][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.953859][ T30] r5:83fb1800 r4:829174a4 [ 954.953891][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.953969][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.954040][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02d5e08 [ 954.954062][ T30] r4:00000000 [ 954.954079][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.954135][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.954230][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.954307][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba3680 [ 954.954493][ T30] r4:00000000 [ 954.954525][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.954611][ T30] r9:83018605 r8:83fb1800 r7:00000000 r6:83018600 r5:00001000 r4:7f240000 [ 954.954634][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.954704][ T30] r5:00001000 r4:dfb7f000 [ 954.954722][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.954805][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.954872][ T30] r5:8526c794 r4:84c42580 [ 954.954890][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.954957][ T30] r7:ddde3b40 r6:83018600 r5:8526c794 r4:84c42580 [ 954.955028][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.955108][ T30] r10:61c88647 r9:83fb1800 r8:84c425ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.955168][ T30] r4:84c42580 [ 954.955251][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.955340][ T30] r10:00000000 r9:84c42580 r8:802762fc r7:e43cde60 r6:84c42b80 r5:83fb1800 [ 954.955402][ T30] r4:00000001 [ 954.955423][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.955477][ T30] Exception stack(0xe02d5fb0 to 0xe02d5ff8) [ 954.955513][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.955571][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.955612][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.955654][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.955675][ T30] r4:85d02200 [ 954.956283][ T30] INFO: task kworker/1:33:4193 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.956325][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.956489][ T30] Workqueue: events bpf_prog_free_deferred [ 954.956554][ T30] Call trace: [ 954.956582][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.956671][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.956694][ T30] r4:00000000 [ 954.956762][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.956826][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.956928][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.956977][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.957038][ T30] 5d60: 800f0113 ffffffff [ 954.957133][ T30] r5:800f0113 r4:80239030 [ 954.957219][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.957292][ T30] r4:82ace224 [ 954.957310][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.957425][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.957451][ T30] r4:dfaf5dc0 [ 954.957467][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.957551][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.957595][ T30] r4:00000000 [ 954.957713][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.957838][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.957861][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.957930][ T30] r5:00001000 r4:dfded000 [ 954.957948][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.958008][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.958073][ T30] r5:8526e394 r4:886fed80 [ 954.958091][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.958160][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.958179][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.958251][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.958275][ T30] r4:886fed80 [ 954.958377][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.958495][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.958566][ T30] r4:00000001 [ 954.958587][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.958760][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.958806][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.958856][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.958894][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.958935][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.958979][ T30] r4:84bf6540 [ 954.959015][ T30] INFO: task kworker/0:29:4203 blocked for more than 430 seconds. [ 954.959054][ T30] Not tainted syzkaller #0 [ 954.959078][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.959094][ T30] task:kworker/0:29 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.959325][ T30] Workqueue: events bpf_prog_free_deferred [ 954.959379][ T30] Call trace: [ 954.959560][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.986080][ T30] r10:e8429d84 r9:829174a8 r8:60000113 r7:829174a8 r6:e8429d8c r5:83fae000 [ 954.986157][ T30] r4:83fae000 [ 954.986179][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.986300][ T30] r5:83fae000 r4:829174a4 [ 954.986373][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.986441][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.986511][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8429e08 [ 954.986534][ T30] r4:00000000 [ 954.986552][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.986600][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.986655][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.986723][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba3100 [ 954.986772][ T30] r4:00000000 [ 954.986794][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.987035][ T30] r9:83018405 r8:83fae000 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [ 954.987061][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.987130][ T30] r5:00001000 r4:dfc49000 [ 954.987151][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.987307][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.987376][ T30] r5:8526e794 r4:853c3980 [ 954.987395][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.987727][ T30] r7:dddcfb40 r6:83018400 r5:8526e794 r4:853c3980 [ 954.987750][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.987831][ T30] r10:61c88647 r9:83fae000 r8:853c39ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 954.987851][ T30] r4:853c3980 [ 954.987868][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.987939][ T30] r10:00000000 r9:853c3980 r8:802762fc r7:e0375e60 r6:85ba6e00 r5:83fae000 [ 954.987962][ T30] r4:00000001 [ 954.987979][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.988165][ T30] Exception stack(0xe8429fb0 to 0xe8429ff8) [ 954.988211][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 954.988248][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.988280][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.988314][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.988360][ T30] r4:85c7df00 [ 954.988938][ T30] INFO: task kworker/0:29:4203 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.989015][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.989124][ T30] Workqueue: events bpf_prog_free_deferred [ 954.989577][ T30] Call trace: [ 954.990738][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 954.990878][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 954.990902][ T30] r4:00000000 [ 954.990919][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 954.990978][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 954.991022][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 954.991060][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 954.991084][ T30] 5d60: 800f0113 ffffffff [ 954.991110][ T30] r5:800f0113 r4:80239030 [ 954.991126][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 954.991214][ T30] r4:82ace224 [ 954.991280][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 954.991363][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 954.991385][ T30] r4:dfaf5dc0 [ 954.991404][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.991478][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 954.991501][ T30] r4:00000000 [ 954.991521][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.991600][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 954.991620][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.991723][ T30] r5:00001000 r4:dfded000 [ 954.991768][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.991832][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.991896][ T30] r5:8526e394 r4:886fed80 [ 954.991932][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.992004][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 954.992023][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.992091][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.992112][ T30] r4:886fed80 [ 954.992128][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.992279][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 954.992308][ T30] r4:00000001 [ 954.992327][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.992378][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 954.992535][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 954.992582][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.992622][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.992659][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.992679][ T30] r4:84bf6540 [ 954.992955][ T30] INFO: task kworker/1:68:6423 blocked for more than 430 seconds. [ 954.993005][ T30] Not tainted syzkaller #0 [ 954.993095][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 954.993120][ T30] task:kworker/1:68 state:D stack:0 pid:6423 tgid:6423 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.993195][ T30] Workqueue: events bpf_prog_free_deferred [ 954.993490][ T30] Call trace: [ 954.993525][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 954.993616][ T30] r10:dfd09d84 r9:829174a8 r8:60000113 r7:829174a8 r6:dfd09d8c r5:83959800 [ 954.993636][ T30] r4:83959800 [ 954.993653][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 954.994096][ T30] r5:83959800 r4:829174a4 [ 954.994127][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 954.994349][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 954.994424][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 [ 954.994680][ T30] r4:00000000 [ 954.994705][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 954.994759][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 954.994819][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 954.994885][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85beef40 [ 954.994910][ T30] r4:00000000 [ 954.994927][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 954.995141][ T30] r9:83018605 r8:83959800 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [ 954.995166][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 954.995232][ T30] r5:00001000 r4:dfc9b000 [ 954.995251][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 954.995308][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 954.995647][ T30] r5:85236f94 r4:8849b200 [ 954.995670][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 954.995737][ T30] r7:ddde3b40 r6:83018600 r5:85236f94 r4:8849b200 [ 954.995754][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 954.995827][ T30] r10:61c88647 r9:83959800 r8:8849b22c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 954.996078][ T30] r4:8849b200 [ 954.997483][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 954.997625][ T30] r10:00000000 r9:8849b200 r8:802762fc r7:df9e1e60 r6:8849b280 r5:83959800 [ 954.997649][ T30] r4:00000001 [ 954.997826][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 954.997922][ T30] Exception stack(0xdfd09fb0 to 0xdfd09ff8) [ 954.997966][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 954.998003][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 954.998036][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 954.998074][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 954.998262][ T30] r4:8848eb00 [ 954.998867][ T30] INFO: task kworker/1:68:6423 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 954.998913][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 954.999040][ T30] Workqueue: events bpf_prog_free_deferred [ 954.999336][ T30] Call trace: [ 955.020796][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 955.020932][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 955.020945][ T30] r4:00000000 [ 955.020955][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 955.020988][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 955.021020][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 955.021065][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 955.021080][ T30] 5d60: 800f0113 ffffffff [ 955.021094][ T30] r5:800f0113 r4:80239030 [ 955.021103][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 955.021143][ T30] r4:82ace224 [ 955.021151][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 955.021189][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 955.021200][ T30] r4:dfaf5dc0 [ 955.021207][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 955.021246][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 955.021257][ T30] r4:00000000 [ 955.021265][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 955.021306][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 955.021315][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 955.021404][ T30] r5:00001000 r4:dfded000 [ 955.021454][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 955.021498][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 955.021555][ T30] r5:8526e394 r4:886fed80 [ 955.021566][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 955.021603][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 955.021650][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 955.021690][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 955.021701][ T30] r4:886fed80 [ 955.021710][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 955.021758][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 955.021808][ T30] r4:00000001 [ 955.021819][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 955.021845][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 955.021899][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 955.021921][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 955.021939][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 955.021959][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 955.021970][ T30] r4:84bf6540 [ 955.022062][ T30] INFO: task kworker/1:79:6948 blocked for more than 430 seconds. [ 955.022088][ T30] Not tainted syzkaller #0 [ 955.022101][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 955.022145][ T30] task:kworker/1:79 state:D stack:0 pid:6948 tgid:6948 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 955.022233][ T30] Workqueue: events bpf_prog_free_deferred [ 955.022313][ T30] Call trace: [ 955.022386][ T30] [<81ab1a5c>] (__schedule) from [<81ab2d08>] (schedule+0x2c/0x130) [ 955.022438][ T30] r10:ea611d84 r9:829174a8 r8:60000113 r7:829174a8 r6:ea611d8c r5:851d0000 [ 955.022448][ T30] r4:851d0000 [ 955.022457][ T30] [<81ab2cdc>] (schedule) from [<81ab2e90>] (schedule_preempt_disabled+0x18/0x24) [ 955.022489][ T30] r5:851d0000 r4:829174a4 [ 955.022496][ T30] [<81ab2e78>] (schedule_preempt_disabled) from [<81ab6514>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 955.022524][ T30] [<81ab5ebc>] (__mutex_lock.constprop.0) from [<81ab6f1c>] (__mutex_lock_slowpath+0x14/0x18) [ 955.022622][ T30] r10:8280c9a4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea611e08 [ 955.022634][ T30] r4:00000000 [ 955.022642][ T30] [<81ab6f08>] (__mutex_lock_slowpath) from [<81ab6f5c>] (mutex_lock+0x3c/0x40) [ 955.022666][ T30] [<81ab6f20>] (mutex_lock) from [<804f4350>] (_vm_unmap_aliases+0x68/0x240) [ 955.022692][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 955.022762][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af4fc0 [ 955.022776][ T30] r4:00000000 [ 955.022784][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 955.022821][ T30] r9:83018605 r8:851d0000 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [ 955.022829][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 955.022859][ T30] r5:00001000 r4:e43c5000 [ 955.022867][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 955.022895][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 955.022924][ T30] r5:84625794 r4:85bdd880 [ 955.022931][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 955.022962][ T30] r7:ddde3b40 r6:83018600 r5:84625794 r4:85bdd880 [ 955.022971][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 955.023004][ T30] r10:61c88647 r9:851d0000 r8:85bdd8ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 955.023014][ T30] r4:85bdd880 [ 955.023021][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 955.023054][ T30] r10:00000000 r9:85bdd880 r8:802762fc r7:dfd09e60 r6:85bddc00 r5:851d0000 [ 955.023063][ T30] r4:00000001 [ 955.023071][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 955.023094][ T30] Exception stack(0xea611fb0 to 0xea611ff8) [ 955.023109][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 955.023127][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 955.023142][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 955.023228][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 955.023241][ T30] r4:84c56140 [ 955.023835][ T30] INFO: task kworker/1:79:6948 is blocked on a mutex likely owned by task kworker/1:77:6725. [ 955.023935][ T30] task:kworker/1:77 state:R running task stack:0 pid:6725 tgid:6725 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 955.023998][ T30] Workqueue: events bpf_prog_free_deferred [ 955.024046][ T30] Call trace: [ 955.024061][ T30] [<81ab1a5c>] (__schedule) from [<81ab313c>] (preempt_schedule_irq+0x40/0xa8) [ 955.024162][ T30] r10:8280c9f8 r9:83eeb000 r8:80200c04 r7:dfaf5d54 r6:ffffffff r5:83eeb000 [ 955.024178][ T30] r4:00000000 [ 955.024290][ T30] [<81ab30fc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 955.024327][ T30] Exception stack(0xdfaf5d20 to 0xdfaf5d68) [ 955.024349][ T30] 5d20: d82e0000 f591f000 00000001 80239018 7f236000 00000001 82ace204 82acd5e0 [ 955.024370][ T30] 5d40: 7f236000 f591f000 8280c9f8 dfaf5d9c dfaf5da0 dfaf5d70 8022fe10 80239030 [ 955.024382][ T30] 5d60: 800f0113 ffffffff [ 955.024433][ T30] r5:800f0113 r4:80239030 [ 955.024503][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f4114>] (__purge_vmap_area_lazy+0x284/0x458) [ 955.024550][ T30] r4:82ace224 [ 955.024617][ T30] [<804f3e90>] (__purge_vmap_area_lazy) from [<804f44cc>] (_vm_unmap_aliases+0x1e4/0x240) [ 955.024658][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfaf5dc0 r5:dfaf5e08 [ 955.024668][ T30] r4:dfaf5dc0 [ 955.024677][ T30] [<804f42e8>] (_vm_unmap_aliases) from [<804f8138>] (vfree+0x16c/0x210) [ 955.024750][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc6b00 [ 955.024763][ T30] r4:00000000 [ 955.024771][ T30] [<804f7fcc>] (vfree) from [<80563f44>] (execmem_free+0x30/0x50) [ 955.024812][ T30] r9:83018605 r8:83eeb000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 955.024855][ T30] [<80563f14>] (execmem_free) from [<803cb234>] (bpf_jit_free_exec+0x10/0x14) [ 955.024959][ T30] r5:00001000 r4:dfded000 [ 955.025002][ T30] [<803cb224>] (bpf_jit_free_exec) from [<803cb614>] (bpf_jit_free+0x68/0xe4) [ 955.025035][ T30] [<803cb5ac>] (bpf_jit_free) from [<803cc73c>] (bpf_prog_free_deferred+0x140/0x158) [ 955.025066][ T30] r5:8526e394 r4:886fed80 [ 955.025074][ T30] [<803cc5fc>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 955.025108][ T30] r7:ddde3b40 r6:83018600 r5:8526e394 r4:886fed80 [ 955.025122][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 955.025159][ T30] r10:61c88647 r9:83eeb000 r8:886fedac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 955.025377][ T30] r4:886fed80 [ 955.025424][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 955.025487][ T30] r10:00000000 r9:886fed80 r8:802762fc r7:dfd09e60 r6:886fe680 r5:83eeb000 [ 955.025497][ T30] r4:00000001 [ 955.025508][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 955.025556][ T30] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 955.025637][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 955.025677][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 955.025748][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 955.025877][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 955.025929][ T30] r4:84bf6540 [ 955.042713][ T30] NMI backtrace for cpu 0 [ 955.043236][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 955.043402][ T30] Hardware name: ARM-Versatile Express [ 955.043562][ T30] Call trace: [ 955.043638][ T30] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 955.044105][ T30] r7:00000000 r6:00000013 r5:60000093 r4:822957d8 [ 955.044160][ T30] [<80201b58>] (show_stack) from [<8021edec>] (dump_stack_lvl+0x70/0x7c) [ 955.044222][ T30] [<8021ed7c>] (dump_stack_lvl) from [<8021ee10>] (dump_stack+0x18/0x1c) [ 955.044466][ T30] r5:00000000 r4:00000001 [ 955.044486][ T30] [<8021edf8>] (dump_stack) from [<81a9b540>] (nmi_cpu_backtrace+0x160/0x17c) [ 955.044654][ T30] [<81a9b3e0>] (nmi_cpu_backtrace) from [<81a9b68c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 955.044731][ T30] r7:00000000 r6:8280c6d0 r5:8281af1c r4:ffffffff [ 955.044836][ T30] [<81a9b55c>] (nmi_trigger_cpumask_backtrace) from [<8022f818>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 955.044930][ T30] r9:00007d3d r8:8280c850 r7:0000ffcf r6:00007d3d r5:82ac27e4 r4:00000048 [ 955.044948][ T30] [<8022f800>] (arch_trigger_cpumask_backtrace) from [<81aa319c>] (sys_info+0x68/0xa8) [ 955.045079][ T30] [<81aa3134>] (sys_info) from [<80383780>] (watchdog+0x464/0x8a0) [ 955.045144][ T30] r5:82ac27e4 r4:86105a0c [ 955.045456][ T30] [<8038331c>] (watchdog) from [<8027f6fc>] (kthread+0x12c/0x280) [ 955.045569][ T30] r10:00000000 r9:00000000 r8:8038331c r7:832d4180 r6:832d4180 r5:832e2400 [ 955.045621][ T30] r4:00000001 [ 955.045950][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 955.046106][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 955.046164][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 955.046362][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 955.047614][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 955.047937][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 955.047965][ T30] r4:838c6500 [ 955.051034][ T30] Sending NMI from CPU 0 to CPUs 1: [ 955.052371][ C1] NMI backtrace for cpu 1 [ 955.052649][ C1] CPU: 1 UID: 0 PID: 2818 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 955.052729][ C1] Hardware name: ARM-Versatile Express [ 955.052796][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 955.052901][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 955.052974][ C1] pc : [<81abc6b0>] lr : [<80aa3868>] psr: 60000013 [ 955.053017][ C1] sp : eb339eb0 ip : eb339ec0 fp : eb339ebc [ 955.053056][ C1] r10: 82959bc4 r9 : 00000001 r8 : 00000000 [ 955.053104][ C1] r7 : 00000117 r6 : 82959b28 r5 : 00000000 r4 : 00000001 [ 955.053151][ C1] r3 : 00000f70 r2 : 00000000 r1 : 60000013 r0 : 84698040 [ 955.053277][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 955.053353][ C1] Control: 30c5387d Table: 86006e00 DAC: 00000000 [ 955.053421][ C1] Call trace: [ 955.053469][ C1] [<81abc688>] (_raw_spin_unlock_irqrestore) from [<80aa3868>] (pl011_console_device_unlock+0x20/0x24) [ 955.053555][ C1] [<80aa3848>] (pl011_console_device_unlock) from [<802e5720>] (nbcon_emit_one+0x88/0x100) [ 955.053624][ C1] [<802e5698>] (nbcon_emit_one) from [<802e59a0>] (nbcon_kthread_func+0x208/0x2e4) [ 955.053690][ C1] r6:82abf0fc r5:82959b28 r4:84e78c00 [ 955.053710][ C1] [<802e5798>] (nbcon_kthread_func) from [<8027f6fc>] (kthread+0x12c/0x280) [ 955.053783][ C1] r10:00000000 r9:82959b28 r8:802e5798 r7:84af1500 r6:84af1500 r5:84e78c00 [ 955.053803][ C1] r4:00000001 [ 955.053819][ C1] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 955.053866][ C1] Exception stack(0xeb339fb0 to 0xeb339ff8) [ 955.053905][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 955.053946][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 955.053985][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 955.054026][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 955.054048][ C1] r4:8391e400 [ 955.775201][ T7333] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 955.995760][ T7333] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 956.087409][ T7333] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 956.164389][ T7333] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 958.019474][ T7333] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 958.081711][ T7333] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 958.121998][ T7333] bond0 (unregistering): Released all slaves [ 958.363912][ T7333] hsr_slave_0: left promiscuous mode [ 958.370997][ T7333] hsr_slave_1: left promiscuous mode [ 958.391609][ T7333] veth1_macvtap: left promiscuous mode [ 958.392864][ T7333] veth0_macvtap: left promiscuous mode [ 958.394861][ T7333] veth1_vlan: left promiscuous mode [ 958.400790][ T7333] veth0_vlan: left promiscuous mode [ 960.839522][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 960.860405][ T29] audit: type=1400 audit(1216.742:1678): avc: denied { write } for pid=10118 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 960.862587][ T29] audit: type=1400 audit(1216.742:1679): avc: denied { open } for pid=10118 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 961.101672][ T29] audit: type=1400 audit(1216.992:1680): avc: denied { search } for pid=10119 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.106535][ T29] audit: type=1400 audit(1216.992:1681): avc: denied { search } for pid=10119 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.123547][ T29] audit: type=1400 audit(1216.992:1682): avc: denied { search } for pid=10119 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.125636][ T29] audit: type=1400 audit(1216.992:1683): avc: denied { search } for pid=10119 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.127728][ T29] audit: type=1400 audit(1217.032:1684): avc: denied { read open } for pid=10120 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.131042][ T29] audit: type=1400 audit(1217.032:1685): avc: denied { getattr } for pid=10120 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.239175][ T29] audit: type=1400 audit(1217.142:1686): avc: denied { add_name } for pid=10119 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 961.250703][ T29] audit: type=1400 audit(1217.142:1687): avc: denied { create } for pid=10119 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 979.585602][ T7326] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.812394][ T7326] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.012452][ T7326] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.732619][ T7326] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 982.452317][ T7326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 982.474423][ T7326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 982.485632][ T7326] bond0 (unregistering): Released all slaves [ 982.798360][ T7326] hsr_slave_0: left promiscuous mode [ 982.802821][ T7326] hsr_slave_1: left promiscuous mode [ 982.825845][ T7326] veth1_macvtap: left promiscuous mode [ 982.827293][ T7326] veth0_macvtap: left promiscuous mode [ 982.829280][ T7326] veth1_vlan: left promiscuous mode [ 982.840979][ T7326] veth0_vlan: left promiscuous mode