Warning: Permanently added '10.128.1.247' (ED25519) to the list of known hosts.
2025/09/05 12:09:39 parsed 1 programs
[ 61.934582][ T30] audit: type=1400 audit(1757074179.479:62): avc: denied { write } for pid=5840 comm="syz-execprog" path="pipe:[4786]" dev="pipefs" ino=4786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 61.957687][ T30] audit: type=1400 audit(1757074179.479:63): avc: denied { node_bind } for pid=5840 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 63.900047][ T30] audit: type=1400 audit(1757074181.439:64): avc: denied { mounton } for pid=5848 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 63.904772][ T5848] cgroup: Unknown subsys name 'net'
[ 63.928536][ T30] audit: type=1400 audit(1757074181.439:65): avc: denied { mount } for pid=5848 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 63.950749][ T30] audit: type=1400 audit(1757074181.469:66): avc: denied { unmount } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 64.095060][ T5848] cgroup: Unknown subsys name 'cpuset'
[ 64.102361][ T5848] cgroup: Unknown subsys name 'rlimit'
[ 64.226629][ T30] audit: type=1400 audit(1757074181.769:67): avc: denied { setattr } for pid=5848 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 64.260159][ T30] audit: type=1400 audit(1757074181.769:68): avc: denied { create } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 64.282494][ T30] audit: type=1400 audit(1757074181.769:69): avc: denied { write } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 64.304512][ T30] audit: type=1400 audit(1757074181.769:70): avc: denied { read } for pid=5848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 64.326688][ T30] audit: type=1400 audit(1757074181.769:71): avc: denied { mounton } for pid=5848 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 64.328072][ T5850] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 65.321902][ T5848] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 66.984291][ T30] kauditd_printk_skb: 10 callbacks suppressed
[ 66.984304][ T30] audit: type=1400 audit(1757074184.529:82): avc: denied { mounton } for pid=5855 comm="syz-executor" path="/root/syzkaller.xGRKmM/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 67.014574][ T30] audit: type=1400 audit(1757074184.529:83): avc: denied { mount } for pid=5855 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 67.037005][ T30] audit: type=1400 audit(1757074184.529:84): avc: denied { mounton } for pid=5855 comm="syz-executor" path="/root/syzkaller.xGRKmM/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 67.062213][ T30] audit: type=1400 audit(1757074184.529:85): avc: denied { mount } for pid=5855 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[ 67.084608][ T30] audit: type=1400 audit(1757074184.529:86): avc: denied { mounton } for pid=5855 comm="syz-executor" path="/root/syzkaller.xGRKmM/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[ 67.088221][ T5855] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 67.111129][ T30] audit: type=1400 audit(1757074184.529:87): avc: denied { mounton } for pid=5855 comm="syz-executor" path="/root/syzkaller.xGRKmM/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4082 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[ 67.152921][ T30] audit: type=1400 audit(1757074184.539:88): avc: denied { unmount } for pid=5855 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 67.172452][ T30] audit: type=1400 audit(1757074184.559:89): avc: denied { mounton } for pid=5855 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=2783 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 67.212841][ T30] audit: type=1400 audit(1757074184.559:90): avc: denied { mount } for pid=5855 comm="syz-executor" name="/" dev="gadgetfs" ino=4083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1
[ 67.236548][ T30] audit: type=1400 audit(1757074184.559:91): avc: denied { mount } for pid=5855 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[ 67.770390][ T5879] chnl_net:caif_netlink_parms(): no params data found
[ 67.857971][ T5879] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.865785][ T5879] bridge0: port 1(bridge_slave_0) entered disabled state
[ 67.872941][ T5879] bridge_slave_0: entered allmulticast mode
[ 67.879540][ T5879] bridge_slave_0: entered promiscuous mode
[ 67.888915][ T5879] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.896648][ T5879] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.904088][ T5879] bridge_slave_1: entered allmulticast mode
[ 67.911164][ T5879] bridge_slave_1: entered promiscuous mode
[ 67.939185][ T5879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 67.953652][ T5879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 67.985991][ T5879] team0: Port device team_slave_0 added
[ 67.994445][ T5879] team0: Port device team_slave_1 added
[ 68.019796][ T5879] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 68.027404][ T5879] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.053955][ T5879] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 68.066038][ T5879] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 68.072984][ T5879] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 68.098891][ T5879] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 68.137197][ T5879] hsr_slave_0: entered promiscuous mode
[ 68.143446][ T5879] hsr_slave_1: entered promiscuous mode
[ 68.236065][ T5879] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 68.245905][ T5879] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 68.254851][ T5879] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 68.264510][ T5879] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 68.284847][ T5879] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.291935][ T5879] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.299502][ T5879] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.306568][ T5879] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.342308][ T5879] 8021q: adding VLAN 0 to HW filter on device bond0
[ 68.357804][ T36] bridge0: port 1(bridge_slave_0) entered disabled state
[ 68.365909][ T36] bridge0: port 2(bridge_slave_1) entered disabled state
[ 68.378234][ T5879] 8021q: adding VLAN 0 to HW filter on device team0
[ 68.389074][ T12] bridge0: port 1(bridge_slave_0) entered blocking state
[ 68.396156][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 68.407690][ T36] bridge0: port 2(bridge_slave_1) entered blocking state
[ 68.414741][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 68.532160][ T5879] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 68.561968][ T5879] veth0_vlan: entered promiscuous mode
[ 68.570856][ T5879] veth1_vlan: entered promiscuous mode
[ 68.590766][ T5879] veth0_macvtap: entered promiscuous mode
[ 68.599028][ T5879] veth1_macvtap: entered promiscuous mode
[ 68.612240][ T5879] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 68.625554][ T5879] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 68.637779][ T1148] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.647168][ T1148] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.657800][ T1148] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.666852][ T1148] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.748159][ T75] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 68.812979][ T75] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 68.836221][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 68.845326][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 68.868182][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 68.876839][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 68.894218][ T75] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 68.970437][ T75] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 69.413765][ T5926] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 69.421215][ T5926] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 69.429471][ T5926] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 69.437844][ T5926] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 69.445687][ T5926] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
2025/09/05 12:09:48 executed programs: 0
[ 70.814921][ T5926] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 70.822263][ T5926] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 70.830000][ T5926] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 70.838482][ T5926] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 70.846684][ T5926] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 70.887809][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 70.894434][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 70.959625][ T5956] chnl_net:caif_netlink_parms(): no params data found
[ 71.005848][ T5956] bridge0: port 1(bridge_slave_0) entered blocking state
[ 71.013074][ T5956] bridge0: port 1(bridge_slave_0) entered disabled state
[ 71.020191][ T5956] bridge_slave_0: entered allmulticast mode
[ 71.027503][ T5956] bridge_slave_0: entered promiscuous mode
[ 71.035504][ T5956] bridge0: port 2(bridge_slave_1) entered blocking state
[ 71.042537][ T5956] bridge0: port 2(bridge_slave_1) entered disabled state
[ 71.049862][ T5956] bridge_slave_1: entered allmulticast mode
[ 71.057077][ T5956] bridge_slave_1: entered promiscuous mode
[ 71.079009][ T5956] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 71.089536][ T5956] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 71.113117][ T5956] team0: Port device team_slave_0 added
[ 71.119942][ T5956] team0: Port device team_slave_1 added
[ 71.139142][ T5956] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 71.146814][ T5956] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 71.172675][ T5956] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 71.184077][ T5956] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 71.190997][ T5956] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 71.218478][ T5956] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 71.249811][ T5956] hsr_slave_0: entered promiscuous mode
[ 71.256797][ T5956] hsr_slave_1: entered promiscuous mode
[ 71.262624][ T5956] debugfs: 'hsr0' already exists in 'hsr'
[ 71.268399][ T5956] Cannot create hsr debugfs directory
[ 72.087475][ T30] kauditd_printk_skb: 16 callbacks suppressed
[ 72.087489][ T30] audit: type=1400 audit(1757074189.629:108): avc: denied { search } for pid=5514 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.140859][ T30] audit: type=1400 audit(1757074189.629:109): avc: denied { search } for pid=5514 comm="dhcpcd" name="udev" dev="tmpfs" ino=9 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.165697][ T30] audit: type=1400 audit(1757074189.629:110): avc: denied { search } for pid=5514 comm="dhcpcd" name="data" dev="tmpfs" ino=13 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.190016][ T75] bridge_slave_1: left allmulticast mode
[ 72.191604][ T30] audit: type=1400 audit(1757074189.719:111): avc: denied { read open } for pid=5967 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1836 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.202933][ T75] bridge_slave_1: left promiscuous mode
[ 72.226865][ T30] audit: type=1400 audit(1757074189.719:112): avc: denied { getattr } for pid=5967 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1836 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.257443][ T75] bridge0: port 2(bridge_slave_1) entered disabled state
[ 72.285429][ T75] bridge_slave_0: left allmulticast mode
[ 72.291081][ T75] bridge_slave_0: left promiscuous mode
[ 72.298433][ T75] bridge0: port 1(bridge_slave_0) entered disabled state
[ 72.392563][ T30] audit: type=1400 audit(1757074189.929:113): avc: denied { add_name } for pid=5966 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.487091][ T30] audit: type=1400 audit(1757074190.029:114): avc: denied { remove_name } for pid=5978 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=2024 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 72.569844][ T75] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 72.580695][ T75] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 72.590690][ T75] bond0 (unregistering): Released all slaves
[ 72.689966][ T75] hsr_slave_0: left promiscuous mode
[ 72.696372][ T75] hsr_slave_1: left promiscuous mode
[ 72.702194][ T75] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 72.712595][ T75] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 72.723886][ T75] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 72.731259][ T75] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 72.747728][ T75] veth1_macvtap: left promiscuous mode
[ 72.754464][ T75] veth0_macvtap: left promiscuous mode
[ 72.760084][ T75] veth1_vlan: left promiscuous mode
[ 72.766031][ T75] veth0_vlan: left promiscuous mode
[ 72.885307][ T5170] Bluetooth: hci0: command tx timeout
[ 73.039630][ T75] team0 (unregistering): Port device team_slave_1 removed
[ 73.061457][ T75] team0 (unregistering): Port device team_slave_0 removed
[ 73.443738][ T5956] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 73.454183][ T5956] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 73.469186][ T5956] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 73.478820][ T5956] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 73.794366][ T5956] 8021q: adding VLAN 0 to HW filter on device bond0
[ 73.827290][ T5956] 8021q: adding VLAN 0 to HW filter on device team0
[ 73.859613][ T36] bridge0: port 1(bridge_slave_0) entered blocking state
[ 73.866736][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 73.889176][ T36] bridge0: port 2(bridge_slave_1) entered blocking state
[ 73.896305][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 74.204587][ T5956] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 74.280584][ T5956] veth0_vlan: entered promiscuous mode
[ 74.291106][ T5956] veth1_vlan: entered promiscuous mode
[ 74.321603][ T5956] veth0_macvtap: entered promiscuous mode
[ 74.331074][ T5956] veth1_macvtap: entered promiscuous mode
[ 74.350962][ T5956] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 74.366555][ T5956] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 74.385185][ T36] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 74.397006][ T36] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 74.419627][ T36] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 74.428723][ T36] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 74.473635][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 74.481464][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 74.506598][ T75] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 74.514706][ T75] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 74.555037][ T30] audit: type=1400 audit(1757074192.089:115): avc: denied { prog_load } for pid=6031 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 74.557970][ T6031] ------------[ cut here ]------------
[ 74.579449][ T6031] verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0xfffffffefffff630, 0xffffffff00000000] s64=[0xfffffffefffff630, 0xffffffff00000000] u32=[0x30, 0x8000050] s32=[0x30, 0x0] var_off=(0xfffffffe00000030, 0x10fffffc0)(1)
[ 74.580457][ T30] audit: type=1400 audit(1757074192.089:116): avc: denied { bpf } for pid=6031 comm="syz.0.17" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 74.623936][ T6031] WARNING: CPU: 1 PID: 6031 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x62b/0x1200
[ 74.634636][ T30] audit: type=1400 audit(1757074192.089:117): avc: denied { perfmon } for pid=6031 comm="syz.0.17" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 74.655989][ T6031] Modules linked in:
[ 74.659865][ T6031] CPU: 1 UID: 0 PID: 6031 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
[ 74.669292][ T6031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 74.679564][ T6031] RIP: 0010:reg_bounds_sanity_check+0x62b/0x1200
[ 74.686143][ T6031] Code: 45 ac 50 8b 45 b0 50 8b 45 b4 50 ff 75 b8 4c 8b 4d c0 4c 8b 45 c8 48 8b 95 58 ff ff ff 48 8b b5 60 ff ff ff e8 96 76 aa ff 90 <0f> 0b 90 90 48 8b 95 40 ff ff ff 48 83 c4 38 48 b8 00 00 00 00 00
[ 74.706155][ T6031] RSP: 0018:ffffc900043af2f8 EFLAGS: 00010286
[ 74.712205][ T6031] RAX: 0000000000000000 RBX: fffffffefffff630 RCX: ffffffff817a3388
[ 74.720461][ T6031] RDX: ffff88802ab90000 RSI: ffffffff817a3395 RDI: 0000000000000001
[ 74.728737][ T6031] RBP: ffffc900043af3f0 R08: 0000000000000001 R09: 0000000000000000
[ 74.737101][ T6031] R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880756a0000
[ 74.745293][ T6031] R13: ffff888023fb01bc R14: ffff888023fb01b4 R15: ffff888023fb0168
[ 74.753567][ T6031] FS: 00005555645e7500(0000) GS:ffff8881247b6000(0000) knlGS:0000000000000000
[ 74.762745][ T6031] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 74.769324][ T6031] CR2: 00007f8dcc7c7dac CR3: 00000000753db000 CR4: 00000000003526f0
[ 74.777321][ T6031] Call Trace:
[ 74.780593][ T6031]
[ 74.783560][ T6031] reg_set_min_max+0x1dc/0x2c0
[ 74.788325][ T6031] check_cond_jmp_op+0x19b0/0x72d0
[ 74.793449][ T6031] ? __pfx_check_cond_jmp_op+0x10/0x10
[ 74.798901][ T6031] ? check_alu_op+0x7b3/0x3cc0
[ 74.803845][ T6031] do_check_common+0xa13e/0xb410
[ 74.808785][ T6031] ? __pfx_do_check_common+0x10/0x10
[ 74.814108][ T6031] ? lockdep_hardirqs_on+0x51/0x110
[ 74.819303][ T6031] ? kfree+0x2b4/0x4d0
[ 74.823418][ T6031] ? bpf_check+0x7c34/0xc670
[ 74.828002][ T6031] bpf_check+0x869f/0xc670
[ 74.832485][ T6031] ? __pfx_bpf_check+0x10/0x10
[ 74.837459][ T6031] ? selinux_bpf_prog_load+0x15f/0x1c0
[ 74.842936][ T6031] bpf_prog_load+0xe41/0x2490
[ 74.847591][ T6031] ? __pfx_bpf_prog_load+0x10/0x10
[ 74.852688][ T6031] ? avc_has_perm+0x1c0/0x1f0
[ 74.857378][ T6031] ? avc_has_perm+0x144/0x1f0
[ 74.862035][ T6031] ? selinux_bpf+0xde/0x130
[ 74.866549][ T6031] ? bpf_lsm_bpf+0x9/0x10
[ 74.870874][ T6031] __sys_bpf+0x4a3f/0x4de0
[ 74.875321][ T6031] ? __pfx___sys_bpf+0x10/0x10
[ 74.880077][ T6031] ? css_rstat_updated+0x1c2/0x510
[ 74.885794][ T6031] ? __pfx_css_rstat_updated+0x10/0x10
[ 74.891266][ T6031] ? exc_page_fault+0x5c/0xb0
[ 74.895967][ T6031] ? do_user_addr_fault+0x843/0x1370
[ 74.901253][ T6031] __x64_sys_bpf+0x78/0xc0
[ 74.905742][ T6031] ? lockdep_hardirqs_on+0x7c/0x110
[ 74.910937][ T6031] do_syscall_64+0xcd/0x4c0
[ 74.915461][ T6031] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 74.921346][ T6031] RIP: 0033:0x7f8dcc58ebe9
[ 74.925756][ T6031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 74.945448][ T6031] RSP: 002b:00007ffc501e4a78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 74.953996][ T6031] RAX: ffffffffffffffda RBX: 00007f8dcc7c5fa0 RCX: 00007f8dcc58ebe9
[ 74.961958][ T6031] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005
[ 74.970123][ T6031] RBP: 00007f8dcc611e19 R08: 0000000000000000 R09: 0000000000000000
[ 74.973396][ T5170] Bluetooth: hci0: command tx timeout
[ 74.978139][ T6031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 74.991426][ T6031] R13: 00007f8dcc7c5fa0 R14: 00007f8dcc7c5fa0 R15: 0000000000000003
[ 74.999408][ T6031]
[ 75.002424][ T6031] Kernel panic - not syncing: kernel: panic_on_warn set ...
[ 75.009676][ T6031] CPU: 1 UID: 0 PID: 6031 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
[ 75.018751][ T6031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
[ 75.028778][ T6031] Call Trace:
[ 75.032028][ T6031]
[ 75.034935][ T6031] dump_stack_lvl+0x3d/0x1f0
[ 75.039501][ T6031] vpanic+0x6e8/0x7a0
[ 75.043474][ T6031] ? __pfx_vpanic+0x10/0x10
[ 75.047956][ T6031] ? reg_bounds_sanity_check+0x62b/0x1200
[ 75.053651][ T6031] panic+0xca/0xd0
[ 75.057373][ T6031] ? __pfx_panic+0x10/0x10
[ 75.061785][ T6031] ? check_panic_on_warn+0x1f/0xb0
[ 75.066876][ T6031] check_panic_on_warn+0xab/0xb0
[ 75.071792][ T6031] __warn+0xf6/0x3c0
[ 75.075666][ T6031] ? reg_bounds_sanity_check+0x62b/0x1200
[ 75.081364][ T6031] report_bug+0x3c3/0x580
[ 75.085672][ T6031] ? reg_bounds_sanity_check+0x62b/0x1200
[ 75.091370][ T6031] handle_bug+0x184/0x210
[ 75.095681][ T6031] exc_invalid_op+0x17/0x50
[ 75.100166][ T6031] asm_exc_invalid_op+0x1a/0x20
[ 75.104994][ T6031] RIP: 0010:reg_bounds_sanity_check+0x62b/0x1200
[ 75.111302][ T6031] Code: 45 ac 50 8b 45 b0 50 8b 45 b4 50 ff 75 b8 4c 8b 4d c0 4c 8b 45 c8 48 8b 95 58 ff ff ff 48 8b b5 60 ff ff ff e8 96 76 aa ff 90 <0f> 0b 90 90 48 8b 95 40 ff ff ff 48 83 c4 38 48 b8 00 00 00 00 00
[ 75.130890][ T6031] RSP: 0018:ffffc900043af2f8 EFLAGS: 00010286
[ 75.136937][ T6031] RAX: 0000000000000000 RBX: fffffffefffff630 RCX: ffffffff817a3388
[ 75.144886][ T6031] RDX: ffff88802ab90000 RSI: ffffffff817a3395 RDI: 0000000000000001
[ 75.152836][ T6031] RBP: ffffc900043af3f0 R08: 0000000000000001 R09: 0000000000000000
[ 75.160789][ T6031] R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880756a0000
[ 75.168740][ T6031] R13: ffff888023fb01bc R14: ffff888023fb01b4 R15: ffff888023fb0168
[ 75.176694][ T6031] ? __warn_printk+0x198/0x350
[ 75.181446][ T6031] ? __warn_printk+0x1a5/0x350
[ 75.186200][ T6031] ? reg_bounds_sanity_check+0x62a/0x1200
[ 75.191916][ T6031] reg_set_min_max+0x1dc/0x2c0
[ 75.196669][ T6031] check_cond_jmp_op+0x19b0/0x72d0
[ 75.201769][ T6031] ? __pfx_check_cond_jmp_op+0x10/0x10
[ 75.207208][ T6031] ? check_alu_op+0x7b3/0x3cc0
[ 75.211958][ T6031] do_check_common+0xa13e/0xb410
[ 75.216898][ T6031] ? __pfx_do_check_common+0x10/0x10
[ 75.222161][ T6031] ? lockdep_hardirqs_on+0x51/0x110
[ 75.227340][ T6031] ? kfree+0x2b4/0x4d0
[ 75.231396][ T6031] ? bpf_check+0x7c34/0xc670
[ 75.235967][ T6031] bpf_check+0x869f/0xc670
[ 75.240381][ T6031] ? __pfx_bpf_check+0x10/0x10
[ 75.245142][ T6031] ? selinux_bpf_prog_load+0x15f/0x1c0
[ 75.250585][ T6031] bpf_prog_load+0xe41/0x2490
[ 75.255251][ T6031] ? __pfx_bpf_prog_load+0x10/0x10
[ 75.260346][ T6031] ? avc_has_perm+0x1c0/0x1f0
[ 75.265001][ T6031] ? avc_has_perm+0x144/0x1f0
[ 75.269667][ T6031] ? selinux_bpf+0xde/0x130
[ 75.274151][ T6031] ? bpf_lsm_bpf+0x9/0x10
[ 75.278469][ T6031] __sys_bpf+0x4a3f/0x4de0
[ 75.282873][ T6031] ? __pfx___sys_bpf+0x10/0x10
[ 75.287622][ T6031] ? css_rstat_updated+0x1c2/0x510
[ 75.292721][ T6031] ? __pfx_css_rstat_updated+0x10/0x10
[ 75.298175][ T6031] ? exc_page_fault+0x5c/0xb0
[ 75.302836][ T6031] ? do_user_addr_fault+0x843/0x1370
[ 75.308108][ T6031] __x64_sys_bpf+0x78/0xc0
[ 75.312511][ T6031] ? lockdep_hardirqs_on+0x7c/0x110
[ 75.317688][ T6031] do_syscall_64+0xcd/0x4c0
[ 75.322175][ T6031] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 75.328046][ T6031] RIP: 0033:0x7f8dcc58ebe9
[ 75.332438][ T6031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 75.352029][ T6031] RSP: 002b:00007ffc501e4a78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 75.360431][ T6031] RAX: ffffffffffffffda RBX: 00007f8dcc7c5fa0 RCX: 00007f8dcc58ebe9
[ 75.368390][ T6031] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005
[ 75.376342][ T6031] RBP: 00007f8dcc611e19 R08: 0000000000000000 R09: 0000000000000000
[ 75.384290][ T6031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 75.392242][ T6031] R13: 00007f8dcc7c5fa0 R14: 00007f8dcc7c5fa0 R15: 0000000000000003
[ 75.400201][ T6031]
[ 75.403377][ T6031] Kernel Offset: disabled
[ 75.407673][ T6031] Rebooting in 86400 seconds..