last executing test programs: 7m3.908125738s ago: executing program 1 (id=50): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) lsm_set_self_attr(0x69, 0x0, 0x0, 0x20) 7m3.432569381s ago: executing program 1 (id=52): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) open_tree(0xffffffffffffffff, 0x0, 0x0) 7m3.0798761s ago: executing program 1 (id=54): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'hsr0\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r3, 0x0, 0x0, 0x40000, &(0x7f00000001c0)={0x11, 0x1c, r2, 0x1, 0x70, 0x6, @local}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 7m2.561337524s ago: executing program 1 (id=55): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) 7m2.199795144s ago: executing program 1 (id=56): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'gretap0\x00', 0x0}) 7m1.931363482s ago: executing program 1 (id=57): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x1) 6m16.662096274s ago: executing program 32 (id=57): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e841cca555077e3a159110193dd2ff1fa7c3205bfedbe9d8f3bd23cd78a07e32fe0231368b2264f9c504b2f1f65515b2e1a38d522be18bd10a48b043ccc42673d06d7535f7866925d86751dfced1fd8accae669e173a659c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbcbfb42c30d294a55e1c46680bee88956f2b3599f455c7a3a49a01010000009f2f0517e4ca0e1803a20000000013d4e21b3336f1ae0796f23526ec0fd97f7325eac34c4dfafe7cc03b0864009d2e7d7ff6ff72ba8972b122b09789d99b3d0524f39d5ae913b2d22eb2c09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e2865cd81f2b77fdd76c677f812d249c8130b018d4300000020000000db3947c85c3a9027ce9e856fa8b7fb05000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefc74305b2bea2000600000051fcf5d62205561b6efaad206335a309f7b9e01446a6285f4665a7fe3cda2349f8bf400100000000000000f435f28fbeda75cf971f54a9698cf3270f420ee83f2d9babe7b922401639ce3c4ff0850a8e078374909413f3fbd3ced3285252dc81a46ef7ce29484dc6b6adfd7a4db730fc594609654d97836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be71b0417d33d3ab25493418ba0fbacf768e07c1a939d31f606085b9e3efc93b0f58d5ec37494d9d10d76e603129e9a726579ac7d672cacd581b7ca77b3610b7403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66da2254a6f911b1469c62a6e1e3f9c1715c009a58e6eadac8f61b45853673df72dc813f7454ae22d79ac48034282f03040889500000000179dcf66d93907cedd49e0c5752f755849953957143a0335d2f62acbf18b251ce63b29fe177745448ccc925770fac12cf9e291200df6bb669d5a57dd74df817ef2f8698f710c359afe73947afebdf5536e4db8b0231d0cbc798766ec60586f14b44775bc9d250e4515cb83275d3b495fa90000e69a68b47ac4595463e1442d88e0606a060000cc914fae896ab129ccdf8792a8435972c8391d132a2fcbd40e865d62cc7c4200000000000000000000000000000800002a77fbbccfdb1ab3d8434905f09726b8145ea99c7640faab578dc98a6134df0a10a54ce7e7ddbb709a27d977d1f91ab9ee940700009594c9a50961b7fcc56d82584dc8254df7c411fa61353a6897c4f3b9f6f2ab47adb29aefecce96c94f360e129c9f2af569c794b68b2ead404bcdd4aa9cb6a128e1ad45fd4030e1e69adf4986b7860f3122d59c079f0f9a1732f691590f45512aec4ed2413f66cac7dd022301741c576dea82005b166d6c3b9ed0c297ac197a92188a618745e78dca0b3c62f1601243089d9c687563382b0b88a7d80fd7bf7fae8a690f52db1464d29b1b926414cd35705c89662c585e32c881d917b74f027674dbc017499ba15a2e2900000000000000000000000000007b593ecbdd162fee9f239a3c615b3e9a3fb0af254bdd247a5a5abdbc0123c950eec0f1800b295be71418dd65de15e11beef9630499c70fce74135a7c7c8e818b79b85ff65d59d89492d7a663d3f25651e252ab49d358eac853ffe182ee37a5db085a072647719cb8604ba2e0b80af3f1867bd8fb6afca671437e0a5a9d5a088436739262d894986882ec0fb419a377ef47f4920a5de6d8de0d3090b4cb6b773e825442d351f980eed0d997a4d98a51220c41b145e2186546c646128a3e69f52fcad83a026def90b9eb55f4a0a2251bbae428c6c017b5a47f1580831a7ce232857e6aa9e777e99da1a3ad03fdc93fa7ed96228deac5e3bce983971041297a6ba18783a2edc7e3901cc891035872c61e7ea375b0902be0c5cc7fdef968ba1ca17ce5e11f2f384cd28c1194f56d3cf074e8ba4e60e84dc2f352c3cd170581aee0c93ca8ceff84cda40325d340759e79e5c4bcec227e37f7ec2193c78877fb319ec1f2d4dcf1d46a15cde1d6cecce6ecdb0c0a3413394d51341a7b3606ad8c29b6dbf6be3265b528c3208de35161bfe19678df43a45b314e5a0f8754cfaf4f9d3fdf9c8f7b7c296bf2e632d25ba8ee6369b362a8e4c9dff176d482d32249c93680a04f6464f184acfd0376662fee9e1031e569248db9bc724cdd97976a4d7c5c5172d1383fa1e442f68a14b747a9f2597bf115dd0111fe8ba3584a43176f33bd39a408f8648b19839bba9cc47624ea19e46dbbdf0faf591bcdc8613828a0c5a40c04ae34bbf4a0e27828b0c7cb9d7a7455db030425a4bd69cf6dcb4b1d066f8ef4ea1c710e05819df82d5cc94ace6b41c2de37a2eaf24f24b3d9a7dd4d197d51407be3e90000000000000000dbc0b0d6e11ccb71437ebea7ad01d5b93a7a0561e4a1b3fa1aa9c75f3aaec4ace1b6201a3e007b657be62df59133b4d8f0f145d9fc954cc7792077268bf0977e2a699722ce3dbb97248b8a8a771dd0f7d9c97e6587524a44fd6d49330ccbc39ca277b84f7f0a39759ef0b42388bd69fe341a925e8cdc5d7b2d6ddb7331a081bd0672bf4d02255de095a179e51bf5492d4e89c3cbad59db725c0dd7e35cbd9887175286a37d7621a361eb830cc5b842b11b5d040ccceb254d6a0c9c43718d0816bb2465928e236101b8cd46b5ef9cb930378a9249cbb41bcde9bb78d71c512153d2f1d765b56d2e5ef3e3d34975787646630051074c9706747fda873ccfdb394fc269c8cfadc0a52c3402f392a38052f859ab5600000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x1) 5m35.748535118s ago: executing program 0 (id=136): syz_emit_ethernet(0x66, &(0x7f0000000340)={@multicast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x3a, 0x0, @loopback, @loopback}}}}}}}, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 5m35.294616841s ago: executing program 0 (id=137): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) rmdir(0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000000)={'vlan0\x00', @random="0133014010ff"}) 5m34.817022524s ago: executing program 0 (id=138): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000000f8c0000000c0a01080000000000000000010000000900020073797a3200000000600003805c000080080003400000000250000b80200001800a00010071756f7461000000100002800c0001400000000000000000140001800c000100636f756e74657200000000000000058011e70000666c6f775f6f66666c6f6164000000000900010073797a30"], 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 5m34.20226892s ago: executing program 0 (id=139): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 5m33.677173085s ago: executing program 0 (id=140): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13) lseek(0xffffffffffffffff, 0x101, 0x0) 5m32.929565345s ago: executing program 0 (id=141): munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 4m47.113607413s ago: executing program 33 (id=141): munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 4m43.491220231s ago: executing program 2 (id=187): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) 4m42.973019965s ago: executing program 2 (id=188): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x111, 0x8}}, 0x20) 4m42.570722526s ago: executing program 2 (id=189): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000002c0)={0x40, 0x12, 0x7, 0x6, 0x0, 0x8, 0x0}) 4m42.280813584s ago: executing program 2 (id=190): unshare(0x2a020480) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, 0x0) 4m41.981376292s ago: executing program 2 (id=191): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) readlink(0x0, &(0x7f0000003740)=""/4080, 0xff0) 4m41.68047778s ago: executing program 2 (id=192): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='net/raw6\x00') 3m56.602096138s ago: executing program 34 (id=192): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='net/raw6\x00') 3m29.017259849s ago: executing program 3 (id=274): socket$inet(0x2, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000cc0)=@newtaction={0x84, 0x30, 0x12f, 0x0, 0x0, {0x0, 0x0, 0x1be}, [{0x70, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x5c, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x4}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x84}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0xb, 0x0, 0x0, {}, [{0x8, 0x1, 0x1}]}, 0x20}}, 0x0) 3m27.211886108s ago: executing program 3 (id=279): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) syz_emit_ethernet(0x12, &(0x7f0000000280)={@remote, @remote, @val={@void, {0x8100, 0x2, 0x0, 0x1}}, {@mpls_mc}}, 0x0) 3m26.904060897s ago: executing program 3 (id=281): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nicvf0\x00', 0x2}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) 3m26.611857874s ago: executing program 3 (id=283): chdir(&(0x7f0000000140)='./file0\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000017009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0207a20802"], 0x10}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x5, "00000080000000000000000000800055"}}}]}, 0x48}}, 0x0) setsockopt$MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) lchown(0x0, 0xee00, 0x0) 3m23.782424871s ago: executing program 3 (id=287): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000500)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) socket$kcm(0x10, 0x2, 0x0) 3m22.214039394s ago: executing program 3 (id=288): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 2m37.224981629s ago: executing program 35 (id=288): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad1f50ad32d3fd25dfd73a015e0ca6a0f68a7d007f15451dfb265a0e3ccae669e173a64bc1cfd5587d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661ca3dbe74bd09de8793dbcceef76b2e5feecf9c66c54c3b3ffe1b4ce25d7c983c044c06cd0a48dfe3e26e7a23129d6606fd28a69989d552af6d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae82f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba73c31b05c00fba8a4aee676d7c45bb29671a68ee2e60da7b01a2e5785a238afa4aba70c07fcd95bf8b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf334178b04963d67dd5a5707e618a1ef9057fec00f9e930219fa8d30e716de8cde9c60f0000000c3b64d10f0939b42b788daa7075fa542242b00f6bf9b64ad460e386b6f388351fbdacb3ad074574ee9d450f9dcfaef1be95ff3c449e6482e4403174618c20e887d6f320616d31d78a0e5421d5742cc52509fd90cf2df6d1404f6b8f810d7b94d421971b77a3270153a0d57cccfe27872f3e8e44480f93c33421986a7737842627301fb2fee8cabab074adaa2024ff57e609ba2f4d83b3bbf52309484532416f48f43b31395c6f45fee8f1682a4e8d5e3b9ae634ed24fb0e8b5fadaf5cb7eea62b7bb4264e72950c9dc791d771acc24c08cdb6ef24c813d082a86d9b879bdf5aefdfd905a2bd4ea36b0b54915a68fe149db154a8340017e1855511e9c0fe62d0cf55"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 2m26.90829841s ago: executing program 4 (id=360): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@mask_fadd={0x58, 0x114, 0x8, {{0xf, 0x1}, &(0x7f0000000080)=0x6, 0x0, 0x5, 0xfffffffffffffffc, 0x7, 0x3, 0x0, 0x2}}], 0x58}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 2m24.287201781s ago: executing program 4 (id=361): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xa8}, 0x18) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c0000003b00090000000000cd00000001000000180003"], 0x2c}}, 0x0) 2m23.893145672s ago: executing program 4 (id=362): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@delnexthop={0x18, 0x69, 0xb}, 0x18}}, 0x4000000) 2m23.640842099s ago: executing program 4 (id=363): r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000741000/0x4000)=nil, 0x4000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x114, &(0x7f0000000140), 0x0, 0x4) 2m23.519492023s ago: executing program 4 (id=364): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x2, [{0x3, 0x0, 0xb}], 'Iw'}, @datasec={0xf, 0x0, 0x0, 0xf, 0x2, [], "1760"}]}, {0x0, [0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x61, 0x61]}}, &(0x7f0000000600)=""/4, 0x4a, 0x4, 0x1, 0x0, 0x0, @void, @value}, 0x28) 2m23.25979836s ago: executing program 4 (id=365): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) stat(&(0x7f00000004c0)='./file0\x00', 0x0) 1m50.218699649s ago: executing program 5 (id=429): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r3 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f000001a000/0x3000)=nil, 0x3000, 0xf, 0x11012, r3, 0x0) pread64(r2, &(0x7f000001a240)=""/102400, 0x19000, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1m49.680795333s ago: executing program 5 (id=430): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="6c000000100001040000000000000000009be500", @ANYRES32=0x0, @ANYBLOB="00000000000000004400128009000100766c616e00000000340002800600010080000000280003800c00010000000000070000000cff0000c0050000000000000c000100000000000700000008000500", @ANYRES32=r1], 0x6c}}, 0x0) 1m49.389787531s ago: executing program 5 (id=431): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = dup2(r1, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) timer_create(0x3, 0x0, &(0x7f0000044000)=0x0) timer_gettime(r3, &(0x7f0000000380)) 1m48.829544287s ago: executing program 5 (id=432): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffd, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) 1m48.729146189s ago: executing program 5 (id=433): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@keyring) 1m48.559998904s ago: executing program 5 (id=434): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) mknodat$null(0xffffffffffffff9c, 0x0, 0x0, 0x103) 1m37.470369346s ago: executing program 36 (id=365): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) stat(&(0x7f00000004c0)='./file0\x00', 0x0) 1m3.410461363s ago: executing program 37 (id=434): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e841cca555077e3a159110193dd2ff1fa7c3205bfedbe9d8f3bd23cd78a07e32fe0231368b2264f9c504b2f1f65515b2e1a38d522be18bd10a48b043ccc42673d06d7535f7866925d86751dfced1fd8accae669e173a659c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbcbfb42c30d294a55e1c46680bee88956f2b3599f455c7a3a49a01010000009f2f0517e4ca0e1803a20000000013d4e21b3336f1ae0796f23526ec0fd97f7325eac34c4dfafe7cc03b0864009d2e7d7ff6ff72ba8972b122b09789d99b3d0524f39d5ae913b2d22eb2c09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e2865cd81f2b77fdd76c677f812d249c8130b018d4300000020000000db3947c85c3a9027ce9e856fa8b7fb05000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefc74305b2bea2000600000051fcf5d62205561b6efaad206335a309f7b9e01446a6285f4665a7fe3cda2349f8bf400100000000000000f435f28fbeda75cf971f54a9698cf3270f420ee83f2d9babe7b922401639ce3c4ff0850a8e078374909413f3fbd3ced3285252dc81a46ef7ce29484dc6b6adfd7a4db730fc594609654d97836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be71b0417d33d3ab25493418ba0fbacf768e07c1a939d31f606085b9e3efc93b0f58d5ec37494d9d10d76e603129e9a726579ac7d672cacd581b7ca77b3610b7403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66da2254a6f911b1469c62a6e1e3f9c1715c009a58e6eadac8f61b45853673df72dc813f7454ae22d79ac48034282f03040889500000000179dcf66d93907cedd49e0c5752f755849953957143a0335d2f62acbf18b251ce63b29fe177745448ccc925770fac12cf9e291200df6bb669d5a57dd74df817ef2f8698f710c359afe73947afebdf5536e4db8b0231d0cbc798766ec60586f14b44775bc9d250e4515cb83275d3b495fa90000e69a68b47ac4595463e1442d88e0606a060000cc914fae896ab129ccdf8792a8435972c8391d132a2fcbd40e865d62cc7c4200000000000000000000000000000800002a77fbbccfdb1ab3d8434905f09726b8145ea99c7640faab578dc98a6134df0a10a54ce7e7ddbb709a27d977d1f91ab9ee940700009594c9a50961b7fcc56d82584dc8254df7c411fa61353a6897c4f3b9f6f2ab47adb29aefecce96c94f360e129c9f2af569c794b68b2ead404bcdd4aa9cb6a128e1ad45fd4030e1e69adf4986b7860f3122d59c079f0f9a1732f691590f45512aec4ed2413f66cac7dd022301741c576dea82005b166d6c3b9ed0c297ac197a92188a618745e78dca0b3c62f1601243089d9c687563382b0b88a7d80fd7bf7fae8a690f52db1464d29b1b926414cd35705c89662c585e32c881d917b74f027674dbc017499ba15a2e2900000000000000000000000000007b593ecbdd162fee9f239a3c615b3e9a3fb0af254bdd247a5a5abdbc0123c950eec0f1800b295be71418dd65de15e11beef9630499c70fce74135a7c7c8e818b79b85ff65d59d89492d7a663d3f25651e252ab49d358eac853ffe182ee37a5db085a072647719cb8604ba2e0b80af3f1867bd8fb6afca671437e0a5a9d5a088436739262d894986882ec0fb419a377ef47f4920a5de6d8de0d3090b4cb6b773e825442d351f980eed0d997a4d98a51220c41b145e2186546c646128a3e69f52fcad83a026def90b9eb55f4a0a2251bbae428c6c017b5a47f1580831a7ce232857e6aa9e777e99da1a3ad03fdc93fa7ed96228deac5e3bce983971041297a6ba18783a2edc7e3901cc891035872c61e7ea375b0902be0c5cc7fdef968ba1ca17ce5e11f2f384cd28c1194f56d3cf074e8ba4e60e84dc2f352c3cd170581aee0c93ca8ceff84cda40325d340759e79e5c4bcec227e37f7ec2193c78877fb319ec1f2d4dcf1d46a15cde1d6cecce6ecdb0c0a3413394d51341a7b3606ad8c29b6dbf6be3265b528c3208de35161bfe19678df43a45b314e5a0f8754cfaf4f9d3fdf9c8f7b7c296bf2e632d25ba8ee6369b362a8e4c9dff176d482d32249c93680a04f6464f184acfd0376662fee9e1031e569248db9bc724cdd97976a4d7c5c5172d1383fa1e442f68a14b747a9f2597bf115dd0111fe8ba3584a43176f33bd39a408f8648b19839bba9cc47624ea19e46dbbdf0faf591bcdc8613828a0c5a40c04ae34bbf4a0e27828b0c7cb9d7a7455db030425a4bd69cf6dcb4b1d066f8ef4ea1c710e05819df82d5cc94ace6b41c2de37a2eaf24f24b3d9a7dd4d197d51407be3e90000000000000000dbc0b0d6e11ccb71437ebea7ad01d5b93a7a0561e4a1b3fa1aa9c75f3aaec4ace1b6201a3e007b657be62df59133b4d8f0f145d9fc954cc7792077268bf0977e2a699722ce3dbb97248b8a8a771dd0f7d9c97e6587524a44fd6d49330ccbc39ca277b84f7f0a39759ef0b42388bd69fe341a925e8cdc5d7b2d6ddb7331a081bd0672bf4d02255de095a179e51bf5492d4e89c3cbad59db725c0dd7e35cbd9887175286a37d7621a361eb830cc5b842b11b5d040ccceb254d6a0c9c43718d0816bb2465928e236101b8cd46b5ef9cb930378a9249cbb41bcde9bb78d71c512153d2f1d765b56d2e5ef3e3d34975787646630051074c9706747fda873ccfdb394fc269c8cfadc0a52c3402f392a38052f859ab5600000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) mknodat$null(0xffffffffffffff9c, 0x0, 0x0, 0x103) 27.942566149s ago: executing program 6 (id=537): connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00002304000000040000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x50) setxattr$security_selinux(&(0x7f0000000040)='./cgroup/pids.max\x00', &(0x7f0000000440), &(0x7f0000000480)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x1) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) 27.641584287s ago: executing program 6 (id=538): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000400)=0x9, 0x4) r3 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6, 0xe, 0x40}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040) 27.349200245s ago: executing program 6 (id=539): r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0) 24.487553953s ago: executing program 6 (id=543): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000188500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) 23.628024176s ago: executing program 6 (id=545): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 23.49887317s ago: executing program 6 (id=546): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(0x0, 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) io_setup(0x5ff, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) 3.581126402s ago: executing program 7 (id=572): r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, 0x0, 0x0) sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0) 970.952693ms ago: executing program 7 (id=573): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 759.740019ms ago: executing program 7 (id=574): connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00002304000000040000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x50) setxattr$security_selinux(&(0x7f0000000040)='./cgroup/pids.max\x00', &(0x7f0000000440), &(0x7f0000000480)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x1) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r3, 0x26, &(0x7f0000000380)={0x0, 0x0, 0x103ff, 0x2000000}) 511.265315ms ago: executing program 7 (id=575): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) 330.128211ms ago: executing program 7 (id=576): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="000000000000848bbea1c0de5d66000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) 0s ago: executing program 7 (id=577): r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, 0x0, 0x0) sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0) kernel console output (not intermixed with test programs): 99): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.977947][ T31] audit: type=1400 audit(87.880:100): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.979517][ T31] audit: type=1400 audit(87.880:101): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 87.980537][ T31] audit: type=1400 audit(87.880:102): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 88.030145][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.046722][ T3092] veth0_macvtap: entered promiscuous mode [ 88.067343][ T3092] veth1_macvtap: entered promiscuous mode [ 88.194749][ T3092] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.196015][ T3092] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.199256][ T3092] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.199726][ T3092] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.726463][ T3779] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1'. [ 91.878966][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.879669][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.895013][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.744922][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 95.745041][ T31] audit: type=1400 audit(95.650:185): avc: denied { open } for pid=3812 comm="syz.1.14" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 95.784070][ T31] audit: type=1400 audit(95.690:186): avc: denied { wake_alarm } for pid=3812 comm="syz.1.14" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 95.873440][ T31] audit: type=1400 audit(95.770:187): avc: denied { ioctl } for pid=3812 comm="syz.1.14" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.450363][ T31] audit: type=1400 audit(96.350:188): avc: denied { write } for pid=3812 comm="syz.1.14" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.787493][ T3811] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 96.972615][ T3811] usb 2-1: device descriptor read/64, error -71 [ 97.268848][ T3811] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 97.424866][ T3811] usb 2-1: device descriptor read/64, error -71 [ 97.544510][ T3811] usb usb2-port1: attempt power cycle [ 97.923206][ T3811] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 97.947745][ T3811] usb 2-1: device descriptor read/8, error -71 [ 98.120072][ T31] audit: type=1400 audit(98.010:189): avc: denied { ioctl } for pid=3828 comm="syz.0.17" path="socket:[3125]" dev="sockfs" ino=3125 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.230003][ T3811] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 98.290002][ T3811] usb 2-1: device descriptor read/8, error -71 [ 98.401705][ T3811] usb usb2-port1: unable to enumerate USB device [ 99.151838][ T31] audit: type=1400 audit(99.040:190): avc: denied { sys_module } for pid=3834 comm="syz.0.18" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 99.152749][ T31] audit: type=1400 audit(99.060:191): avc: denied { module_request } for pid=3834 comm="syz.0.18" kmod="tty-ldisc-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 99.732364][ T31] audit: type=1400 audit(99.630:192): avc: denied { execmem } for pid=3834 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 101.051454][ C1] hrtimer: interrupt took 7931344 ns [ 106.574441][ T31] audit: type=1400 audit(106.480:193): avc: denied { lock } for pid=3847 comm="syz.1.20" path="socket:[3144]" dev="sockfs" ino=3144 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 107.212022][ T31] audit: type=1400 audit(107.100:194): avc: denied { write } for pid=3853 comm="+}[@" path="socket:[3157]" dev="sockfs" ino=3157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 107.416905][ T31] audit: type=1326 audit(107.320:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 107.433456][ T31] audit: type=1326 audit(107.330:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=0 ip=0x133450 code=0x7ffc0000 [ 107.434478][ T31] audit: type=1326 audit(107.330:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 107.731707][ T31] audit: type=1400 audit(107.630:198): avc: denied { read } for pid=3862 comm="syz.1.26" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.732303][ T31] audit: type=1400 audit(107.630:199): avc: denied { open } for pid=3862 comm="syz.1.26" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.889825][ T31] audit: type=1400 audit(107.790:200): avc: denied { mounton } for pid=3865 comm="syz.0.27" path="/9/file0" dev="tmpfs" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 107.890686][ T31] audit: type=1400 audit(107.790:201): avc: denied { mount } for pid=3865 comm="syz.0.27" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 108.023530][ T31] audit: type=1400 audit(107.930:202): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 112.245066][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 112.245260][ T31] audit: type=1400 audit(112.150:216): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 112.568253][ T31] audit: type=1326 audit(112.470:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3909 comm="syz.0.39" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 112.752281][ T31] audit: type=1326 audit(112.640:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.753681][ T31] audit: type=1326 audit(112.640:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.755529][ T31] audit: type=1326 audit(112.640:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.757256][ T31] audit: type=1326 audit(112.640:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.784437][ T31] audit: type=1326 audit(112.690:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.815782][ T31] audit: type=1326 audit(112.720:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.821870][ T31] audit: type=1326 audit(112.720:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 112.832816][ T31] audit: type=1326 audit(112.740:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.762541][ T3941] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 117.276550][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 117.276678][ T31] audit: type=1326 audit(117.180:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.283019][ T31] audit: type=1326 audit(117.190:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.332456][ T31] audit: type=1326 audit(117.240:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.375792][ T31] audit: type=1326 audit(117.280:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.376500][ T31] audit: type=1326 audit(117.280:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.404793][ T31] audit: type=1326 audit(117.310:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.406177][ T31] audit: type=1326 audit(117.310:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.410147][ T31] audit: type=1326 audit(117.310:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.428022][ T31] audit: type=1326 audit(117.320:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 117.429272][ T31] audit: type=1326 audit(117.330:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 118.123391][ T3959] hsr_slave_0: left promiscuous mode [ 118.149084][ T3959] hsr_slave_1: left promiscuous mode [ 122.149471][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.150104][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.151423][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.753943][ T4010] syz.0.69 uses obsolete (PF_INET,SOCK_PACKET) [ 122.786169][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 122.786340][ T31] audit: type=1400 audit(122.690:297): avc: denied { setopt } for pid=4008 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 123.327932][ T31] audit: type=1400 audit(123.230:298): avc: denied { create } for pid=4012 comm="syz.0.70" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 123.345754][ T31] audit: type=1400 audit(123.250:299): avc: denied { map } for pid=4012 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 123.362110][ T31] audit: type=1400 audit(123.250:300): avc: denied { read write } for pid=4012 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 123.948228][ T31] audit: type=1326 audit(123.850:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 123.958222][ T31] audit: type=1326 audit(123.860:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000 [ 123.971032][ T31] audit: type=1326 audit(123.870:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 123.974773][ T31] audit: type=1326 audit(123.880:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 126.409060][ T31] audit: type=1326 audit(126.310:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 126.432219][ T31] audit: type=1326 audit(126.310:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 130.504462][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 130.504630][ T31] audit: type=1326 audit(130.410:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.509995][ T31] audit: type=1326 audit(130.410:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x133450 code=0x7fc00000 [ 130.546200][ T31] audit: type=1326 audit(130.430:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.581835][ T31] audit: type=1326 audit(130.430:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.585000][ T31] audit: type=1326 audit(130.430:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.595415][ T31] audit: type=1326 audit(130.430:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.597195][ T31] audit: type=1326 audit(130.430:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.617907][ T31] audit: type=1326 audit(130.430:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.619758][ T31] audit: type=1326 audit(130.430:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 130.622841][ T31] audit: type=1326 audit(130.430:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 135.812021][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 135.812088][ T31] audit: type=1400 audit(135.700:414): avc: denied { mount } for pid=4051 comm="syz.0.82" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 135.879060][ T31] audit: type=1400 audit(135.730:415): avc: denied { unmount } for pid=4051 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 136.656973][ T31] audit: type=1326 audit(136.560:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.673879][ T31] audit: type=1326 audit(136.560:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.693383][ T31] audit: type=1326 audit(136.570:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1313ec code=0x7ffc0000 [ 136.696173][ T31] audit: type=1326 audit(136.570:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.698668][ T31] audit: type=1326 audit(136.580:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.700186][ T31] audit: type=1326 audit(136.580:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.718435][ T31] audit: type=1326 audit(136.580:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.733378][ T31] audit: type=1326 audit(136.580:423): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 143.408856][ T4076] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.89' sets config #0 [ 154.115355][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 154.115459][ T31] audit: type=1400 audit(154.020:446): avc: denied { create } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 154.131615][ T31] audit: type=1400 audit(154.030:447): avc: denied { connect } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 154.133776][ T31] audit: type=1400 audit(154.040:448): avc: denied { name_connect } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 154.155030][ T31] audit: type=1400 audit(154.060:449): avc: denied { listen } for pid=4080 comm="syz.0.91" lport=60717 faddr=::ffff:10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 154.463648][ T31] audit: type=1400 audit(154.370:450): avc: denied { create } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 154.468253][ T31] audit: type=1400 audit(154.370:451): avc: denied { write } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 154.470382][ T4081] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4081 comm=syz.0.91 [ 154.476808][ T31] audit: type=1400 audit(154.380:452): avc: denied { read } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 154.480432][ T31] audit: type=1400 audit(154.380:453): avc: denied { nlmsg_read } for pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 154.640294][ T31] audit: type=1326 audit(154.540:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4085 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 154.646099][ T31] audit: type=1326 audit(154.550:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4085 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 164.382979][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 164.383064][ T31] audit: type=1400 audit(164.270:468): avc: denied { execute } for pid=4106 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 164.406638][ T31] audit: type=1400 audit(164.310:469): avc: denied { execute_no_trans } for pid=4106 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 164.507268][ T31] audit: type=1400 audit(164.410:470): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 169.800892][ T4107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.833087][ T4107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.465953][ T31] audit: type=1400 audit(170.370:471): avc: denied { create } for pid=4295 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 170.478922][ T31] audit: type=1400 audit(170.380:472): avc: denied { map } for pid=4295 comm="syz.0.104" path="socket:[3554]" dev="sockfs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 170.480415][ T31] audit: type=1400 audit(170.380:473): avc: denied { read } for pid=4295 comm="syz.0.104" path="socket:[3554]" dev="sockfs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 173.166148][ T4107] hsr_slave_0: entered promiscuous mode [ 173.175983][ T4107] hsr_slave_1: entered promiscuous mode [ 174.030750][ T4107] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 174.064077][ T4107] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 174.082533][ T4107] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 174.123924][ T4107] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 177.050457][ T4107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.295469][ T4107] veth0_vlan: entered promiscuous mode [ 188.348348][ T4107] veth1_vlan: entered promiscuous mode [ 188.772542][ T4107] veth0_macvtap: entered promiscuous mode [ 188.795981][ T4107] veth1_macvtap: entered promiscuous mode [ 188.962629][ T4107] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.963614][ T4107] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.964544][ T4107] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.965229][ T4107] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.873691][ T31] audit: type=1400 audit(189.740:474): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 189.875197][ T31] audit: type=1400 audit(189.740:475): avc: denied { mount } for pid=4107 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 189.881346][ T31] audit: type=1400 audit(189.780:476): avc: denied { mount } for pid=4107 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 189.882422][ T31] audit: type=1400 audit(189.780:477): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 189.910701][ T31] audit: type=1400 audit(189.810:478): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 189.912934][ T31] audit: type=1400 audit(189.810:479): avc: denied { unmount } for pid=4107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 189.944071][ T31] audit: type=1400 audit(189.830:480): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 189.945371][ T31] audit: type=1400 audit(189.830:481): avc: denied { mount } for pid=4107 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 189.946441][ T31] audit: type=1400 audit(189.830:482): avc: denied { mounton } for pid=4107 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 190.823697][ T31] audit: type=1400 audit(190.710:483): avc: denied { create } for pid=4485 comm="syz.2.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 192.993543][ T4503] Zero length message leads to an empty skb [ 195.372870][ T4524] mmap: syz.0.119 (4524) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 197.736294][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 197.736786][ T31] audit: type=1400 audit(197.630:505): avc: denied { create } for pid=4532 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 197.782050][ T31] audit: type=1400 audit(197.680:506): avc: denied { bind } for pid=4532 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 198.132930][ T4537] netlink: 'syz.0.122': attribute type 27 has an invalid length. [ 198.424493][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 199.485444][ T4537] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.486134][ T4537] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.486536][ T4537] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.486884][ T4537] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.734170][ T4538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.929946][ T4538] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 199.930678][ T4538] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.955547][ T4538] veth1_vlan: left promiscuous mode [ 199.957421][ T4538] veth0_vlan: left promiscuous mode [ 199.967060][ T4538] veth0_vlan: entered promiscuous mode [ 199.976774][ T4538] veth1_vlan: entered promiscuous mode [ 200.003086][ T4538] veth1_macvtap: left promiscuous mode [ 200.043608][ T4538] veth0_macvtap: left promiscuous mode [ 200.045639][ T4538] veth0_macvtap: entered promiscuous mode [ 200.047167][ T4538] veth1_macvtap: entered promiscuous mode [ 200.049266][ T4538] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.049859][ T4538] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.050356][ T4538] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.050912][ T4538] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.700903][ T4544] IPv6: NLM_F_CREATE should be specified when creating new route [ 200.936492][ T31] audit: type=1326 audit(200.830:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 200.973938][ T31] audit: type=1326 audit(200.870:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 200.993270][ T31] audit: type=1326 audit(200.870:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 200.995975][ T31] audit: type=1326 audit(200.870:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 200.997453][ T31] audit: type=1326 audit(200.870:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 201.000424][ T31] audit: type=1326 audit(200.890:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 201.062064][ T31] audit: type=1326 audit(200.910:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 201.065537][ T31] audit: type=1326 audit(200.920:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 202.075468][ T4561] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.190060][ T4561] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.271501][ T4561] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.357008][ T4561] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.463791][ T4561] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.496252][ T4561] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.525360][ T4561] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.578894][ T4561] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.592016][ T4580] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 204.798874][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 204.798942][ T31] audit: type=1400 audit(204.700:531): avc: denied { name_bind } for pid=4592 comm="syz.0.135" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 206.042340][ T4599] @ÿ: renamed from vlan0 (while UP) [ 206.596357][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'. [ 206.597723][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'. [ 206.600003][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'. [ 207.759604][ T31] audit: type=1326 audit(207.660:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.773249][ T31] audit: type=1326 audit(207.670:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.814396][ T31] audit: type=1326 audit(207.670:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.832597][ T31] audit: type=1326 audit(207.680:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.852442][ T31] audit: type=1326 audit(207.690:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.882596][ T31] audit: type=1326 audit(207.700:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.884950][ T31] audit: type=1326 audit(207.720:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.887386][ T31] audit: type=1326 audit(207.720:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.889559][ T31] audit: type=1326 audit(207.720:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 219.250846][ T4615] vlan2: entered allmulticast mode [ 219.253909][ T4615] bridge_slave_0: entered allmulticast mode [ 219.277345][ T4615] bridge_slave_0: left allmulticast mode [ 221.346112][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 221.346312][ T31] audit: type=1326 audit(221.250:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.364087][ T31] audit: type=1326 audit(221.260:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.370216][ T31] audit: type=1326 audit(221.270:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.383758][ T31] audit: type=1326 audit(221.290:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.396403][ T31] audit: type=1326 audit(221.300:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.407957][ T31] audit: type=1326 audit(221.300:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.420511][ T31] audit: type=1326 audit(221.310:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.430451][ T31] audit: type=1326 audit(221.320:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.441955][ T31] audit: type=1326 audit(221.320:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 221.444103][ T31] audit: type=1326 audit(221.330:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 238.100430][ T4645] netlink: 12 bytes leftover after parsing attributes in process `syz.2.150'. [ 238.780082][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.780742][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.787794][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.809893][ T4648] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.151'. [ 238.822753][ T4647] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.151'. [ 239.055593][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 239.055691][ T31] audit: type=1400 audit(238.960:561): avc: denied { name_bind } for pid=4649 comm="syz.2.152" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 239.529150][ T4660] netlink: 140 bytes leftover after parsing attributes in process `syz.2.155'. [ 239.665118][ T31] audit: type=1326 audit(239.560:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.677714][ T31] audit: type=1326 audit(239.570:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.688274][ T31] audit: type=1326 audit(239.570:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.698546][ T31] audit: type=1326 audit(239.590:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.706457][ T31] audit: type=1326 audit(239.590:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.709805][ T31] audit: type=1326 audit(239.590:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 239.716531][ T31] audit: type=1326 audit(239.590:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x133450 code=0x7ffc0000 [ 240.213543][ T31] audit: type=1326 audit(240.120:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 240.233555][ T31] audit: type=1326 audit(240.120:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 245.612840][ T4672] netlink: 24 bytes leftover after parsing attributes in process `syz.2.159'. [ 247.055712][ T31] kauditd_printk_skb: 1117 callbacks suppressed [ 247.055831][ T31] audit: type=1326 audit(246.960:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.060329][ T31] audit: type=1326 audit(246.960:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.075956][ T31] audit: type=1326 audit(246.980:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.092083][ T31] audit: type=1326 audit(246.990:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.110016][ T31] audit: type=1326 audit(247.010:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.117424][ T31] audit: type=1326 audit(247.010:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.119430][ T31] audit: type=1326 audit(247.020:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.146878][ T31] audit: type=1326 audit(247.020:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.149302][ T31] audit: type=1326 audit(247.040:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x133450 code=0x7ffc0000 [ 247.175415][ T31] audit: type=1326 audit(247.050:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 249.683400][ T4706] netlink: 12 bytes leftover after parsing attributes in process `syz.2.167'. [ 255.003882][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 255.003979][ T31] audit: type=1326 audit(254.910:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.016910][ T31] audit: type=1326 audit(254.910:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.020065][ T31] audit: type=1326 audit(254.920:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.040182][ T31] audit: type=1326 audit(254.940:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.058559][ T31] audit: type=1326 audit(254.940:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.082222][ T31] audit: type=1326 audit(254.940:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.084919][ T31] audit: type=1326 audit(254.940:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 255.368887][ T31] audit: type=1400 audit(255.270:1761): avc: denied { getopt } for pid=4749 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 256.705478][ T31] audit: type=1400 audit(256.600:1762): avc: denied { create } for pid=4766 comm="syz.2.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 259.844080][ T4739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.877348][ T4739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 261.289311][ T4739] hsr_slave_0: entered promiscuous mode [ 261.297449][ T4739] hsr_slave_1: entered promiscuous mode [ 261.304238][ T4739] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 261.305116][ T4739] Cannot create hsr debugfs directory [ 263.339452][ T4739] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 263.547793][ T4739] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 263.570867][ T4739] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 263.667120][ T4739] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 265.425967][ T4739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.066081][ T4739] veth0_vlan: entered promiscuous mode [ 271.098461][ T4739] veth1_vlan: entered promiscuous mode [ 271.248686][ T4739] veth0_macvtap: entered promiscuous mode [ 271.273980][ T4739] veth1_macvtap: entered promiscuous mode [ 271.385445][ T4739] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.387625][ T4739] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.388504][ T4739] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.389195][ T4739] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.787728][ T31] audit: type=1400 audit(275.690:1763): avc: denied { create } for pid=5127 comm="syz.3.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 277.530554][ T31] audit: type=1400 audit(277.430:1764): avc: denied { bind } for pid=5137 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 277.550668][ T31] audit: type=1400 audit(277.450:1765): avc: denied { write } for pid=5137 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 277.747129][ T31] audit: type=1326 audit(277.650:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.767610][ T31] audit: type=1326 audit(277.660:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.768757][ T31] audit: type=1326 audit(277.660:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.784500][ T31] audit: type=1326 audit(277.660:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.785443][ T31] audit: type=1326 audit(277.660:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.788243][ T31] audit: type=1326 audit(277.670:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 277.939858][ T31] audit: type=1400 audit(277.840:1772): avc: denied { write } for pid=5143 comm="syz.3.199" name="file0" dev="tmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 281.627955][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 281.634069][ T31] audit: type=1326 audit(281.530:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.653367][ T31] audit: type=1326 audit(281.530:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.696554][ T31] audit: type=1326 audit(281.560:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.698494][ T31] audit: type=1326 audit(281.600:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.712634][ T31] audit: type=1326 audit(281.610:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.727329][ T31] audit: type=1326 audit(281.630:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.743557][ T31] audit: type=1326 audit(281.640:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.749826][ T31] audit: type=1326 audit(281.640:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.769492][ T31] audit: type=1326 audit(281.640:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 281.780124][ T31] audit: type=1326 audit(281.660:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.994000][ T5196] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 284.229383][ T5202] pim6reg1: entered promiscuous mode [ 284.230715][ T5202] pim6reg1: entered allmulticast mode [ 289.845156][ T5245] bond1: entered promiscuous mode [ 289.846161][ T5245] bond1: entered allmulticast mode [ 289.848440][ T5245] 8021q: adding VLAN 0 to HW filter on device bond1 [ 289.897728][ T5245] bond1 (unregistering): Released all slaves [ 290.142210][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 290.142332][ T31] audit: type=1400 audit(290.040:1843): avc: denied { ioctl } for pid=5312 comm="syz.3.226" path="socket:[5517]" dev="sockfs" ino=5517 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 291.375321][ T5326] netlink: 16 bytes leftover after parsing attributes in process `syz.3.230'. [ 291.716558][ T31] audit: type=1400 audit(291.620:1844): avc: denied { write } for pid=5331 comm="syz.3.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 291.722486][ T31] audit: type=1400 audit(291.620:1845): avc: denied { nlmsg_write } for pid=5331 comm="syz.3.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 292.192990][ T31] audit: type=1400 audit(292.100:1846): avc: denied { execute } for pid=5336 comm="+}[@" path="/41/memory.events" dev="tmpfs" ino=224 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 292.444795][ T5340] netlink: 'syz.3.234': attribute type 10 has an invalid length. [ 295.032970][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.033360][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.034687][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.742051][ T31] audit: type=1326 audit(296.630:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.744434][ T31] audit: type=1326 audit(296.630:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.773297][ T31] audit: type=1326 audit(296.650:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.778040][ T31] audit: type=1326 audit(296.650:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.812596][ T31] audit: type=1326 audit(296.650:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.815354][ T31] audit: type=1326 audit(296.660:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.818105][ T31] audit: type=1326 audit(296.660:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.872167][ T31] audit: type=1326 audit(296.670:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.874123][ T31] audit: type=1326 audit(296.680:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.876818][ T31] audit: type=1326 audit(296.700:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 299.435162][ T5388] netlink: 8 bytes leftover after parsing attributes in process `syz.3.251'. [ 306.791766][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 306.791825][ T31] audit: type=1400 audit(306.670:1863): avc: denied { bind } for pid=5415 comm="syz.3.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 306.864252][ T31] audit: type=1326 audit(306.760:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.865484][ T31] audit: type=1326 audit(306.770:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.876765][ T31] audit: type=1326 audit(306.770:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.879376][ T31] audit: type=1326 audit(306.780:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.901778][ T31] audit: type=1326 audit(306.780:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.903625][ T31] audit: type=1326 audit(306.780:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.914294][ T31] audit: type=1326 audit(306.800:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.916938][ T31] audit: type=1326 audit(306.800:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 306.927246][ T31] audit: type=1326 audit(306.800:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000 [ 307.476334][ T5453] IPv6: Can't replace route, no match found [ 310.937205][ T5401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.973982][ T5401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.757709][ T5401] hsr_slave_0: entered promiscuous mode [ 313.769068][ T5401] hsr_slave_1: entered promiscuous mode [ 313.789186][ T5401] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 313.790179][ T5401] Cannot create hsr debugfs directory [ 314.710065][ T5401] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 314.748806][ T5401] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 314.777228][ T5401] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 314.800576][ T5401] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 315.174492][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 315.174634][ T31] audit: type=1400 audit(315.080:1880): avc: denied { read } for pid=5498 comm="syz.3.266" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 315.188065][ T31] audit: type=1400 audit(315.080:1881): avc: denied { open } for pid=5498 comm="syz.3.266" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 316.841647][ T5401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.057563][ T5401] veth0_vlan: entered promiscuous mode [ 329.415858][ T5401] veth1_vlan: entered promiscuous mode [ 329.614454][ T5401] veth0_macvtap: entered promiscuous mode [ 329.644877][ T5401] veth1_macvtap: entered promiscuous mode [ 329.790162][ T5401] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.793977][ T5401] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.794819][ T5401] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.796052][ T5401] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.302881][ T31] audit: type=1326 audit(330.200:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 330.341940][ T31] audit: type=1326 audit(330.220:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x133450 code=0x7ffc0000 [ 330.355234][ T31] audit: type=1326 audit(330.260:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 330.356407][ T31] audit: type=1326 audit(330.260:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 330.940910][ T31] audit: type=1400 audit(330.820:1886): avc: denied { getopt } for pid=5790 comm="syz.4.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 331.726051][ T31] audit: type=1326 audit(587.623:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 331.736701][ T31] audit: type=1326 audit(587.633:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 331.773173][ T31] audit: type=1326 audit(587.653:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 331.775162][ T31] audit: type=1326 audit(587.653:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 331.777811][ T31] audit: type=1326 audit(587.653:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 334.184516][ T5823] nicvf0: tun_chr_ioctl cmd 1074025692 [ 339.892429][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 339.892557][ T31] audit: type=1326 audit(595.763:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 340.032625][ T31] audit: type=1326 audit(595.863:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 340.033539][ T31] audit: type=1326 audit(595.923:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=442 compat=0 ip=0x133450 code=0x7ffc0000 [ 340.034192][ T31] audit: type=1326 audit(595.923:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 340.300041][ T31] audit: type=1326 audit(596.073:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 343.601519][ T5958] netlink: 12 bytes leftover after parsing attributes in process `syz.4.289'. [ 346.585487][ T31] audit: type=1400 audit(602.483:1919): avc: denied { create } for pid=5972 comm="syz.4.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 348.127082][ T31] audit: type=1326 audit(604.013:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.267124][ T31] audit: type=1326 audit(604.063:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.294486][ T31] audit: type=1326 audit(604.173:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.380162][ T31] audit: type=1326 audit(604.243:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.390480][ T31] audit: type=1326 audit(604.273:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.443388][ T31] audit: type=1326 audit(604.343:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.450435][ T31] audit: type=1326 audit(604.343:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.465586][ T31] audit: type=1326 audit(604.363:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 348.572416][ T31] audit: type=1326 audit(604.463:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.926126][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 351.926255][ T31] audit: type=1400 audit(607.823:1994): avc: denied { create } for pid=6002 comm="syz.4.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 351.951981][ T31] audit: type=1400 audit(607.843:1995): avc: denied { sys_admin } for pid=6002 comm="syz.4.302" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 353.178435][ T6039] netlink: 'syz.4.308': attribute type 10 has an invalid length. [ 353.179636][ T6039] netlink: 40 bytes leftover after parsing attributes in process `syz.4.308'. [ 353.194563][ T6039] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 353.363030][ T31] audit: type=1326 audit(609.263:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 353.370430][ T31] audit: type=1326 audit(609.263:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=441 compat=0 ip=0x133450 code=0x7ffc0000 [ 353.382052][ T31] audit: type=1326 audit(609.263:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 353.524472][ T6046] bridge_slave_0: default FDB implementation only supports local addresses [ 353.974353][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.974987][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.975862][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.378337][ T31] audit: type=1400 audit(610.273:1999): avc: denied { sqpoll } for pid=6056 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 357.355153][ T31] audit: type=1400 audit(613.253:2000): avc: denied { ioctl } for pid=6064 comm="syz.4.317" path="socket:[5038]" dev="sockfs" ino=5038 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 357.565458][ T31] audit: type=1326 audit(613.453:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.578229][ T31] audit: type=1326 audit(613.473:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.593649][ T31] audit: type=1326 audit(613.473:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.609669][ T31] audit: type=1326 audit(613.483:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.616776][ T31] audit: type=1326 audit(613.503:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.636813][ T31] audit: type=1326 audit(613.523:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.649500][ T31] audit: type=1326 audit(613.543:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.655407][ T31] audit: type=1326 audit(613.543:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.658899][ T31] audit: type=1326 audit(613.553:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 360.143562][ T6083] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 360.145161][ T6083] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 363.996457][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 363.996585][ T31] audit: type=1400 audit(619.893:2020): avc: denied { create } for pid=6115 comm="syz.4.332" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_dgram_socket permissive=1 [ 364.035637][ T6116] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 364.036613][ T6116] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 364.036995][ T6116] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 364.038804][ T6116] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 364.046134][ T6116] vxlan0: entered promiscuous mode [ 364.047178][ T6116] vxlan0: entered allmulticast mode [ 364.068778][ T6116] netdevsim netdevsim4 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 364.070766][ T6116] netdevsim netdevsim4 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 364.072220][ T6116] netdevsim netdevsim4 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 364.073231][ T6116] netdevsim netdevsim4 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 364.158565][ T31] audit: type=1400 audit(620.053:2021): avc: denied { create } for pid=6115 comm="syz.4.332" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=qipcrtr_socket permissive=1 [ 364.526767][ T31] audit: type=1400 audit(620.423:2022): avc: denied { bind } for pid=6122 comm="syz.4.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 365.509597][ T6135] netlink: 36 bytes leftover after parsing attributes in process `syz.4.337'. [ 367.220397][ T31] audit: type=1400 audit(623.113:2023): avc: denied { setopt } for pid=6179 comm="syz.4.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 367.249630][ T31] audit: type=1326 audit(623.143:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 367.255536][ T31] audit: type=1326 audit(623.153:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 367.258798][ T31] audit: type=1326 audit(623.153:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x133450 code=0x7ffc0000 [ 367.272552][ T31] audit: type=1326 audit(623.173:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 367.273696][ T31] audit: type=1326 audit(623.173:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 367.277145][ T31] audit: type=1326 audit(623.173:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=293 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.266789][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 373.266929][ T31] audit: type=1326 audit(629.163:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.281621][ T31] audit: type=1326 audit(629.173:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.288790][ T31] audit: type=1326 audit(629.183:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.299698][ T31] audit: type=1326 audit(629.183:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.306689][ T31] audit: type=1326 audit(629.193:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.309196][ T31] audit: type=1326 audit(629.193:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.339445][ T31] audit: type=1326 audit(629.193:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.356067][ T31] audit: type=1326 audit(629.213:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.357747][ T31] audit: type=1326 audit(629.233:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.359808][ T31] audit: type=1326 audit(629.243:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=233 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.196038][ T6230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 390.249570][ T6230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 390.567699][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 390.592938][ T31] audit: type=1326 audit(646.443:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.624579][ T31] audit: type=1326 audit(646.463:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.626664][ T31] audit: type=1326 audit(646.463:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.628510][ T31] audit: type=1326 audit(646.463:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.630942][ T31] audit: type=1326 audit(646.473:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.694601][ T31] audit: type=1326 audit(646.473:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.733389][ T31] audit: type=1326 audit(646.483:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.735068][ T31] audit: type=1326 audit(646.483:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.736795][ T31] audit: type=1326 audit(646.503:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.738953][ T31] audit: type=1326 audit(646.503:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 392.928216][ T6474] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.957991][ T6230] hsr_slave_0: entered promiscuous mode [ 392.966335][ T6230] hsr_slave_1: entered promiscuous mode [ 392.975579][ T6230] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 392.976435][ T6230] Cannot create hsr debugfs directory [ 393.005771][ T6474] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.080495][ T6474] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.184246][ T6474] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.314129][ T6474] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.377393][ T6474] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.414280][ T6474] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.457670][ T6474] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.647237][ T6230] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 393.657656][ T6230] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 393.668072][ T6230] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 393.678209][ T6230] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 393.703938][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.704705][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.724454][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.938895][ T6230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 405.879146][ T6230] veth0_vlan: entered promiscuous mode [ 405.916220][ T6230] veth1_vlan: entered promiscuous mode [ 406.056505][ T6230] veth0_macvtap: entered promiscuous mode [ 406.074200][ T6230] veth1_macvtap: entered promiscuous mode [ 406.123250][ T6230] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.123983][ T6230] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.124408][ T6230] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.125138][ T6230] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.625541][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 406.625632][ T31] audit: type=1326 audit(662.523:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 406.651715][ T31] audit: type=1326 audit(662.543:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131248 code=0x7ffc0000 [ 406.653737][ T31] audit: type=1326 audit(662.543:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 406.669317][ T31] audit: type=1326 audit(662.563:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x133450 code=0x7ffc0000 [ 406.673696][ T6636] SELinux: Context Ü is not valid (left unmapped). [ 406.679170][ T31] audit: type=1400 audit(662.573:2067): avc: denied { mac_admin } for pid=6635 comm="syz.5.366" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 406.688070][ T31] audit: type=1326 audit(662.573:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 408.176772][ T31] audit: type=1400 audit(664.073:2069): avc: denied { relabelfrom } for pid=6651 comm="syz.5.370" name="" dev="pipefs" ino=7702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 408.370320][ T31] audit: type=1326 audit(664.263:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 408.374224][ T31] audit: type=1326 audit(664.273:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 408.378092][ T31] audit: type=1326 audit(664.273:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=186 compat=0 ip=0x133450 code=0x7ffc0000 [ 408.688573][ T6660] netlink: 140 bytes leftover after parsing attributes in process `syz.5.373'. [ 415.500870][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 415.500975][ T31] audit: type=1326 audit(671.393:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.511440][ T31] audit: type=1326 audit(671.403:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.512274][ T31] audit: type=1326 audit(671.403:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.515324][ T31] audit: type=1326 audit(671.403:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.534194][ T31] audit: type=1326 audit(671.413:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.554166][ T31] audit: type=1326 audit(671.423:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.557025][ T31] audit: type=1326 audit(671.433:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=305 compat=0 ip=0x133450 code=0x7ffc0000 [ 415.557768][ T31] audit: type=1326 audit(671.453:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 416.028503][ T31] audit: type=1326 audit(671.923:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.5.387" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 416.038993][ T31] audit: type=1326 audit(671.933:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.5.387" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 416.477747][ T6707] wireguard0: entered promiscuous mode [ 416.478417][ T6707] wireguard0: entered allmulticast mode [ 417.118354][ T6718] ======================================================= [ 417.118354][ T6718] WARNING: The mand mount option has been deprecated and [ 417.118354][ T6718] and is ignored by this kernel. Remove the mand [ 417.118354][ T6718] option from the mount to silence this warning. [ 417.118354][ T6718] ======================================================= [ 417.753529][ T6727] random: crng reseeded on system resumption [ 418.015454][ T6732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6732 comm=syz.5.395 [ 418.029179][ T6732] netlink: 12 bytes leftover after parsing attributes in process `syz.5.395'. [ 418.040255][ T6732] netlink: 8 bytes leftover after parsing attributes in process `syz.5.395'. [ 419.724137][ T6775] netlink: 132 bytes leftover after parsing attributes in process `syz.5.402'. [ 421.425765][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 421.426230][ T31] audit: type=1400 audit(677.303:2101): avc: denied { read } for pid=6800 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 421.473007][ T31] audit: type=1400 audit(677.353:2102): avc: denied { map_create } for pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.485416][ T31] audit: type=1400 audit(677.353:2103): avc: denied { bpf } for pid=6800 comm="syz.5.411" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.516142][ T31] audit: type=1400 audit(677.353:2104): avc: denied { map_read map_write } for pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.519160][ T31] audit: type=1400 audit(677.353:2105): avc: denied { prog_load } for pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.568783][ T31] audit: type=1400 audit(677.353:2106): avc: denied { perfmon } for pid=6800 comm="syz.5.411" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.575994][ T31] audit: type=1400 audit(677.373:2107): avc: denied { prog_run } for pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.578532][ T31] audit: type=1400 audit(677.423:2108): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 421.605299][ T31] audit: type=1400 audit(677.423:2109): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 421.606857][ T31] audit: type=1400 audit(677.423:2110): avc: denied { append } for pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 425.232414][ T6823] vlan2: entered allmulticast mode [ 425.233340][ T6823] bridge_slave_0: entered allmulticast mode [ 425.248295][ T6823] bridge_slave_0: left allmulticast mode [ 426.713111][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 426.713754][ T31] audit: type=1400 audit(682.613:2204): avc: denied { create } for pid=6851 comm="syz.5.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 427.515486][ T31] audit: type=1326 audit(683.393:2205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 427.520287][ T31] audit: type=1326 audit(683.393:2206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x133450 code=0x7ffc0000 [ 427.531642][ T31] audit: type=1400 audit(683.393:2207): avc: denied { create } for pid=6854 comm="syz.5.427" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 427.535392][ T31] audit: type=1326 audit(683.413:2208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x133488 code=0x7ffc0000 [ 427.560951][ T31] audit: type=1400 audit(683.413:2209): avc: denied { map } for pid=6854 comm="syz.5.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 427.578084][ T31] audit: type=1400 audit(683.413:2210): avc: denied { read write } for pid=6854 comm="syz.5.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 427.578463][ T31] audit: type=1326 audit(683.413:2211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x133488 code=0x7ffc0000 [ 427.579883][ T31] audit: type=1326 audit(683.413:2212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 427.602194][ T31] audit: type=1326 audit(683.413:2213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=426 compat=0 ip=0x133450 code=0x7ffc0000 [ 431.399660][ T6868] netlink: 24 bytes leftover after parsing attributes in process `syz.5.430'. [ 443.549412][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 443.549498][ T31] audit: type=1400 audit(699.443:2220): avc: denied { execute } for pid=6885 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 443.562043][ T31] audit: type=1400 audit(699.453:2221): avc: denied { execute_no_trans } for pid=6885 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 443.592864][ T31] audit: type=1400 audit(699.483:2222): avc: denied { execmem } for pid=6885 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 443.636174][ T31] audit: type=1400 audit(699.523:2223): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 445.418629][ T31] audit: type=1400 audit(701.293:2224): avc: denied { open } for pid=6886 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 445.432060][ T31] audit: type=1400 audit(701.293:2225): avc: denied { ioctl } for pid=6886 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 447.720437][ T6886] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 447.729489][ T6886] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 448.807559][ T6886] hsr_slave_0: entered promiscuous mode [ 448.829025][ T6886] hsr_slave_1: entered promiscuous mode [ 448.883980][ T6886] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 448.884813][ T6886] Cannot create hsr debugfs directory [ 449.220785][ T6886] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 449.248234][ T6886] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 449.267100][ T6886] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 449.280678][ T6886] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 450.334669][ T6886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.326165][ T6886] veth0_vlan: entered promiscuous mode [ 456.360895][ T6886] veth1_vlan: entered promiscuous mode [ 456.446485][ T6886] veth0_macvtap: entered promiscuous mode [ 456.472685][ T6886] veth1_macvtap: entered promiscuous mode [ 456.559099][ T6886] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.560087][ T6886] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.563889][ T6886] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.564986][ T6886] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.707511][ T31] audit: type=1400 audit(712.603:2226): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp" dev="vda" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 456.713594][ T31] audit: type=1400 audit(712.603:2227): avc: denied { mount } for pid=6886 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 456.753724][ T31] audit: type=1400 audit(712.603:2228): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 456.794151][ T31] audit: type=1400 audit(712.603:2229): avc: denied { mount } for pid=6886 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 456.796428][ T31] audit: type=1400 audit(712.613:2230): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 456.799151][ T31] audit: type=1400 audit(712.613:2231): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 456.817271][ T31] audit: type=1400 audit(712.633:2232): avc: denied { unmount } for pid=6886 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 456.818986][ T31] audit: type=1400 audit(712.633:2233): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 456.820589][ T31] audit: type=1400 audit(712.643:2234): avc: denied { mount } for pid=6886 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 456.837976][ T31] audit: type=1400 audit(712.643:2235): avc: denied { mounton } for pid=6886 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 457.017646][ T7232] process 'syz.6.435' launched './file1' with NULL argv: empty string added [ 459.067502][ T7259] netlink: 5 bytes leftover after parsing attributes in process `syz.6.445'. [ 459.069106][ T7259] 0ªX¹¦D: renamed from gretap0 (while UP) [ 459.077669][ T7259] 0ªX¹¦D: entered allmulticast mode [ 459.079151][ T7259] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 459.870461][ T7277] netlink: 8 bytes leftover after parsing attributes in process `syz.6.450'. [ 463.848622][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 463.849052][ T31] audit: type=1326 audit(719.743:2275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.874220][ T31] audit: type=1326 audit(719.743:2276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.896658][ T31] audit: type=1326 audit(719.793:2277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.917519][ T31] audit: type=1326 audit(719.803:2278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.919353][ T31] audit: type=1326 audit(719.813:2279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.940864][ T31] audit: type=1326 audit(719.823:2280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.943576][ T31] audit: type=1326 audit(719.833:2281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.963994][ T31] audit: type=1326 audit(719.843:2282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.990201][ T31] audit: type=1326 audit(719.883:2283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 463.995713][ T31] audit: type=1326 audit(719.883:2284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 465.547841][ T7306] SELinux: Context system_u:object_r:hald_log_t:s0 is not valid (left unmapped). [ 468.868158][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 468.868229][ T31] audit: type=1326 audit(724.763:2352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 468.900348][ T31] audit: type=1326 audit(724.793:2353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 468.985363][ T31] audit: type=1326 audit(724.883:2354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 468.993047][ T31] audit: type=1326 audit(724.883:2355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 469.013643][ T31] audit: type=1326 audit(724.893:2356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x133450 code=0x7ffc0000 [ 469.015587][ T31] audit: type=1326 audit(724.893:2357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 469.017617][ T31] audit: type=1326 audit(724.903:2358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 481.216217][ T31] audit: type=1326 audit(737.113:2359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 481.219564][ T31] audit: type=1326 audit(737.113:2360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=0 ip=0x133450 code=0x7ffc0000 [ 481.220826][ T31] audit: type=1326 audit(737.113:2361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 483.528250][ T7324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 483.558762][ T7324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 485.160304][ T31] audit: type=1400 audit(741.043:2362): avc: denied { create } for pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 485.199499][ T31] audit: type=1400 audit(741.093:2363): avc: denied { write } for pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 485.204751][ T31] audit: type=1400 audit(741.103:2364): avc: denied { nlmsg_write } for pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 486.157546][ T7324] hsr_slave_0: entered promiscuous mode [ 486.178105][ T7324] hsr_slave_1: entered promiscuous mode [ 486.207077][ T7324] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 486.208175][ T7324] Cannot create hsr debugfs directory [ 488.049794][ T7324] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 488.087813][ T7324] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 488.105889][ T7324] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 488.126956][ T7324] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 488.584968][ T7661] netlink: 4 bytes leftover after parsing attributes in process `syz.6.475'. [ 489.107803][ T7666] netlink: 'syz.6.476': attribute type 1 has an invalid length. [ 489.651519][ T31] audit: type=1400 audit(745.543:2365): avc: denied { create } for pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 490.198386][ T31] audit: type=1400 audit(746.063:2366): avc: denied { create } for pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 490.200521][ T31] audit: type=1400 audit(746.073:2367): avc: denied { write } for pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 490.202484][ T31] audit: type=1400 audit(746.073:2368): avc: denied { nlmsg_read } for pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 491.125432][ T7324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 492.703194][ T31] audit: type=1400 audit(748.603:2369): avc: denied { create } for pid=7721 comm="syz.6.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 492.718306][ T31] audit: type=1400 audit(748.613:2370): avc: denied { setopt } for pid=7721 comm="syz.6.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 500.901422][ T31] audit: type=1326 audit(756.783:2371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 500.907919][ T31] audit: type=1326 audit(756.783:2372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 500.963864][ T31] audit: type=1326 audit(756.833:2373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x133450 code=0x7ffc0000 [ 501.012737][ T31] audit: type=1326 audit(756.833:2374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 501.058118][ T31] audit: type=1326 audit(756.833:2375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 501.759135][ T7324] veth0_vlan: entered promiscuous mode [ 501.808864][ T7324] veth1_vlan: entered promiscuous mode [ 501.970898][ T7324] veth0_macvtap: entered promiscuous mode [ 501.996390][ T7324] veth1_macvtap: entered promiscuous mode [ 502.110979][ T7324] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.115964][ T7324] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.116490][ T7324] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.116890][ T7324] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.408558][ T31] audit: type=1326 audit(758.303:2376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 502.432415][ T31] audit: type=1326 audit(758.323:2377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 502.433588][ T31] audit: type=1326 audit(758.323:2378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 502.441887][ T31] audit: type=1326 audit(758.333:2379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 502.453338][ T31] audit: type=1326 audit(758.333:2380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 503.832632][ T7805] wireguard0: entered promiscuous mode [ 503.835116][ T7805] wireguard0: entered allmulticast mode [ 504.306367][ T7805] netlink: 76 bytes leftover after parsing attributes in process `syz.7.507'. [ 508.164176][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 508.164375][ T31] audit: type=1326 audit(764.063:2397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 508.181659][ T31] audit: type=1326 audit(764.073:2398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000 [ 508.188847][ T31] audit: type=1326 audit(764.073:2399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 508.198405][ T31] audit: type=1326 audit(764.083:2400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 510.414230][ T31] audit: type=1326 audit(766.313:2401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 510.418794][ T31] audit: type=1326 audit(766.313:2402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x133450 code=0x7ffc0000 [ 510.420875][ T31] audit: type=1326 audit(766.313:2403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.131891][ T31] audit: type=1326 audit(769.023:2404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.140425][ T31] audit: type=1326 audit(769.033:2405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.163864][ T31] audit: type=1326 audit(769.063:2406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.177008][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 513.177228][ T31] audit: type=1326 audit(769.063:2408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.195496][ T31] audit: type=1326 audit(769.063:2409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.197992][ T31] audit: type=1326 audit(769.083:2410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.219946][ T31] audit: type=1326 audit(769.083:2411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.230037][ T31] audit: type=1326 audit(769.103:2412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.237476][ T31] audit: type=1326 audit(769.113:2413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.621933][ T31] audit: type=1326 audit(769.513:2414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.629348][ T31] audit: type=1326 audit(769.523:2415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.642110][ T31] audit: type=1326 audit(769.523:2416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 513.643879][ T31] audit: type=1326 audit(769.533:2417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 516.617358][ T7912] netlink: 12 bytes leftover after parsing attributes in process `syz.6.543'. [ 516.647703][ T7912] 8021q: adding VLAN 0 to HW filter on device bond1 [ 516.857045][ T7912] 8021q: adding VLAN 0 to HW filter on device bond1 [ 516.858292][ T7912] bond1: (slave vcan1): The slave device specified does not support setting the MAC address [ 516.860790][ T7912] bond1: (slave vcan1): Error -95 calling set_mac_address [ 520.280814][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 520.280920][ T31] audit: type=1326 audit(776.173:2430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.293943][ T31] audit: type=1326 audit(776.193:2431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.300490][ T31] audit: type=1326 audit(776.193:2432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.336351][ T31] audit: type=1326 audit(776.193:2433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.432996][ T31] audit: type=1326 audit(776.273:2434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.435092][ T31] audit: type=1326 audit(776.323:2435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.436727][ T31] audit: type=1326 audit(776.323:2436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.463869][ T31] audit: type=1326 audit(776.323:2437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.467129][ T31] audit: type=1326 audit(776.343:2438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 520.484619][ T31] audit: type=1326 audit(776.343:2439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.641585][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 526.641891][ T31] audit: type=1326 audit(782.523:2442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.647611][ T31] audit: type=1326 audit(782.523:2443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.663786][ T31] audit: type=1326 audit(782.543:2444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.665514][ T31] audit: type=1326 audit(782.543:2445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.667063][ T31] audit: type=1326 audit(782.543:2446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.668994][ T31] audit: type=1326 audit(782.543:2447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.670447][ T31] audit: type=1326 audit(782.543:2448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.681761][ T31] audit: type=1326 audit(782.543:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.703889][ T31] audit: type=1326 audit(782.603:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x133450 code=0x7ffc0000 [ 526.705806][ T31] audit: type=1326 audit(782.603:2451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.567926][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 532.568760][ T31] audit: type=1326 audit(788.463:2464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.575198][ T31] audit: type=1326 audit(788.473:2465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.581667][ T31] audit: type=1326 audit(788.473:2466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.590553][ T31] audit: type=1326 audit(788.473:2467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.606968][ T31] audit: type=1326 audit(788.473:2468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.781589][ T31] audit: type=1326 audit(788.673:2469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.788584][ T31] audit: type=1326 audit(788.683:2470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.802250][ T31] audit: type=1326 audit(788.693:2471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.804437][ T31] audit: type=1326 audit(788.693:2472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 532.806169][ T31] audit: type=1326 audit(788.693:2473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.006185][ T7999] netlink: 24 bytes leftover after parsing attributes in process `syz.7.565'. [ 537.050597][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.052407][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.053902][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.280999][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 540.289847][ T31] audit: type=1326 audit(796.173:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.297201][ T31] audit: type=1326 audit(796.183:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.299574][ T31] audit: type=1326 audit(796.183:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.317559][ T31] audit: type=1326 audit(796.193:2499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.319505][ T31] audit: type=1326 audit(796.193:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.334512][ T31] audit: type=1326 audit(796.203:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.336846][ T31] audit: type=1326 audit(796.203:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.359366][ T31] audit: type=1326 audit(796.223:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.367803][ T31] audit: type=1326 audit(796.223:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 540.370724][ T31] audit: type=1326 audit(796.223:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 542.016269][ T32] INFO: task kworker/0:3:1776 blocked for more than 430 seconds. [ 542.016891][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.017353][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.018058][ T32] task:kworker/0:3 state:D stack:0 pid:1776 tgid:1776 ppid:2 flags:0x00000000 [ 542.018680][ T32] Workqueue: events bpf_prog_free_deferred [ 542.020263][ T32] Call trace: [ 542.033018][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.034392][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:eafe9da4 r5:83dfbc00 [ 542.035514][ T32] r4:83dfbc00 [ 542.036114][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.036765][ T32] r5:83dfbc00 r4:82717e44 [ 542.037499][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.038801][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.039986][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e20 [ 542.069706][ T32] r4:00000000 [ 542.070016][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.070439][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) SYZFAIL: failed to recv rpc [ 542.080698][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.081448][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84329dc0 [ 542.081724][ T32] r4:00000000 [ 542.081889][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.082225][ T32] r9:83dfbc00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f035000 [ 542.082701][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.083480][ T32] r5:00001000 r4:dfa1b000 [ 542.083759][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.084293][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.084851][ T32] r5:84f33754 r4:84f33400 [ 542.085060][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.085818][ T32] r7:dddd0000 r6:82c18000 r5:84f33754 r4:83c66580 [ 542.086584][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.087161][ T32] r10:83dfbc00 r9:83c665ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 542.087786][ T32] r4:83c66580 [ 542.088086][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.088808][ T32] r10:00000000 r9:df841e78 r8:83d8bd00 r7:83c66580 r6:8026771c r5:83dfbc00 [ 542.089289][ T32] r4:83d77a80 [ 542.089575][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.090096][ T32] Exception stack(0xeafe9fb0 to 0xeafe9ff8) fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 542.147435][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 542.148118][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.148848][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.149752][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:83d77a80 [ 542.171894][ T32] INFO: task kworker/1:9:3833 blocked for more than 430 seconds. [ 542.172630][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.173117][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.173436][ T32] task:kworker/1:9 state:D stack:0 pid:3833 tgid:3833 ppid:2 flags:0x00000000 [ 542.174377][ T32] Workqueue: events bpf_prog_free_deferred [ 542.174879][ T32] Call trace: [ 542.175072][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.175648][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfda5da4 r5:83468000 [ 542.176136][ T32] r4:83468000 [ 542.176313][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.176572][ T32] r5:83468000 r4:82717e44 [ 542.176828][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.177408][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.177969][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e20 [ 542.178511][ T32] r4:00000000 [ 542.178740][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.221510][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.221960][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.222197][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85044c40 [ 542.222389][ T32] r4:00000000 [ 542.222459][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.222668][ T32] r9:83468000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03b000 [ 542.222896][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.223112][ T32] r5:00001000 r4:dfa35000 [ 542.223280][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.223559][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.223929][ T32] r5:84f43b54 r4:84f43800 [ 542.224085][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.224502][ T32] r7:ddde4000 r6:82c18200 r5:84f43b54 r4:85206800 [ 542.224677][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.224943][ T32] r10:83468000 r9:8520682c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.225127][ T32] r4:85206800 [ 542.225288][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.225538][ T32] r10:00000000 r9:dfeede78 r8:84d63680 r7:85206800 r6:8026771c r5:83468000 [ 542.225755][ T32] r4:842f5740 [ 542.225917][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.226164][ T32] Exception stack(0xdfda5fb0 to 0xdfda5ff8) [ 542.226358][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 542.226640][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.226934][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.227128][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:842f5740 [ 542.227695][ T32] INFO: task kworker/0:14:3855 blocked for more than 430 seconds. [ 542.228183][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.228594][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.229104][ T32] task:kworker/0:14 state:D stack:0 pid:3855 tgid:3855 ppid:2 flags:0x00000000 [ 542.229725][ T32] Workqueue: events bpf_prog_free_deferred [ 542.230080][ T32] Call trace: [ 542.230325][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.230721][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfaa1da4 r5:84b29800 [ 542.276185][ T32] r4:84b29800 [ 542.276626][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.277432][ T32] r5:84b29800 r4:82717e44 [ 542.277634][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.278126][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.278788][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e20 [ 542.279335][ T32] r4:00000000 [ 542.279579][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.280273][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.296184][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.296849][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eea600 [ 542.297301][ T32] r4:00000000 [ 542.297524][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.298014][ T32] r9:84b29800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f045000 [ 542.298475][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.299160][ T32] r5:00001000 r4:dfd2d000 [ 542.299630][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.300634][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.315544][ T32] r5:85089f54 r4:85089c00 [ 542.315916][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.316617][ T32] r7:dddd0000 r6:82c18000 r5:85089f54 r4:850ebd00 [ 542.317107][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.317768][ T32] r10:84b29800 r9:850ebd2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 542.318624][ T32] r4:850ebd00 [ 542.319069][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.319655][ T32] r10:00000000 r9:dfa31e78 r8:85079280 r7:850ebd00 r6:8026771c r5:84b29800 [ 542.320073][ T32] r4:8512a700 [ 542.320215][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.320595][ T32] Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) [ 542.340182][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 542.340670][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.341659][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.341858][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:8512a700 [ 542.351694][ T32] INFO: task kworker/1:11:3867 blocked for more than 430 seconds. [ 542.352067][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.352245][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.352727][ T32] task:kworker/1:11 state:D stack:0 pid:3867 tgid:3867 ppid:2 flags:0x00000000 [ 542.353220][ T32] Workqueue: events bpf_prog_free_deferred [ 542.353613][ T32] Call trace: [ 542.353854][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.354323][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:df95dda4 r5:84b28000 [ 542.354756][ T32] r4:84b28000 [ 542.354870][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.355447][ T32] r5:84b28000 r4:82717e44 [ 542.355628][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.356228][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.356798][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de20 [ 542.357254][ T32] r4:00000000 [ 542.357479][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.357997][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.358626][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.359238][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec00 [ 542.359789][ T32] r4:00000000 [ 542.359957][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.360435][ T32] r9:84b28000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f037000 [ 542.360960][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.392195][ T32] r5:00001000 r4:dfa23000 [ 542.392579][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.393209][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.393847][ T32] r5:84f43f54 r4:84f43c00 [ 542.394196][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.394918][ T32] r7:ddde4000 r6:82c18200 r5:84f43f54 r4:85206400 [ 542.395398][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.396138][ T32] r10:84b28000 r9:8520642c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.396925][ T32] r4:85206400 [ 542.397285][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.397899][ T32] r10:00000000 r9:dfda5e78 r8:8423c2c0 r7:85206400 r6:8026771c r5:84b28000 [ 542.398431][ T32] r4:8520ebc0 [ 542.398768][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.399421][ T32] Exception stack(0xdf95dfb0 to 0xdf95dff8) [ 542.399770][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 542.400226][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.400665][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.430880][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:8520ebc0 [ 542.441626][ T32] INFO: task kworker/1:12:3872 blocked for more than 430 seconds. [ 542.442164][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.442470][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.443103][ T32] task:kworker/1:12 state:D stack:0 pid:3872 tgid:3872 ppid:2 flags:0x00000000 [ 542.443723][ T32] Workqueue: events bpf_prog_free_deferred [ 542.444221][ T32] Call trace: [ 542.444500][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.444920][ T32] r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:df9f1da4 r5:83618000 [ 542.445543][ T32] r4:83618000 [ 542.445745][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.446008][ T32] r5:83618000 r4:82717e44 [ 542.446147][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.446433][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.446765][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e20 [ 542.446972][ T32] r4:00000000 [ 542.447117][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.447737][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.448337][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.448964][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ec500 [ 542.449635][ T32] r4:00000000 [ 542.449886][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.450548][ T32] r9:83618000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f043000 [ 542.472947][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.473662][ T32] r5:00001000 r4:dfce3000 [ 542.473948][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.474549][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.475180][ T32] r5:85095f54 r4:85095c00 [ 542.475632][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.476407][ T32] r7:ddde4000 r6:82c18200 r5:85095f54 r4:85206480 [ 542.476751][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.477281][ T32] r10:83618000 r9:852064ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.477902][ T32] r4:85206480 [ 542.478156][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.478808][ T32] r10:00000000 r9:df95de78 r8:850d86c0 r7:85206480 r6:8026771c r5:83618000 [ 542.479500][ T32] r4:83f65340 [ 542.479829][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.480447][ T32] Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) [ 542.480730][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 542.504825][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.505620][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.506098][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:83f65340 [ 542.511664][ T32] INFO: task kworker/1:13:3873 blocked for more than 430 seconds. [ 542.512148][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.512527][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.512796][ T32] task:kworker/1:13 state:D stack:0 pid:3873 tgid:3873 ppid:2 flags:0x00000000 [ 542.513337][ T32] Workqueue: events bpf_prog_free_deferred [ 542.513705][ T32] Call trace: [ 542.513896][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.514288][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:df9a5da4 r5:8361e000 [ 542.514798][ T32] r4:8361e000 [ 542.515069][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.515774][ T32] r5:8361e000 r4:82717e44 [ 542.516085][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.516817][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.517471][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a5e20 [ 542.518060][ T32] r4:00000000 [ 542.518349][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.518852][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.519340][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.519776][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212040 [ 542.520140][ T32] r4:00000000 [ 542.520371][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.545416][ T32] r9:8361e000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03d000 [ 542.546132][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.547329][ T32] r5:00001000 r4:dfa7f000 [ 542.547643][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.548343][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.549161][ T32] r5:84f42f54 r4:84f42c00 [ 542.549609][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.550534][ T32] r7:ddde4000 r6:82c18200 r5:84f42f54 r4:85206500 [ 542.550935][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.568533][ T32] r10:8361e000 r9:8520652c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.569165][ T32] r4:85206500 [ 542.569422][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.570164][ T32] r10:00000000 r9:df9f1e78 r8:850d88c0 r7:85206500 r6:8026771c r5:8361e000 [ 542.570444][ T32] r4:84ed1a40 [ 542.575874][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.576520][ T32] Exception stack(0xdf9a5fb0 to 0xdf9a5ff8) [ 542.576902][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 542.577540][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.578175][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.578622][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84ed1a40 [ 542.579177][ T32] INFO: task kworker/0:17:3874 blocked for more than 430 seconds. [ 542.579738][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.580153][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.580683][ T32] task:kworker/0:17 state:D stack:0 pid:3874 tgid:3874 ppid:2 flags:0x00000000 [ 542.600325][ T32] Workqueue: events bpf_prog_free_deferred [ 542.600834][ T32] Call trace: [ 542.604698][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.605498][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfa05da4 r5:8361c800 [ 542.605944][ T32] r4:8361c800 [ 542.606039][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.606951][ T32] r5:8361c800 r4:82717e44 [ 542.607396][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.608340][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.609140][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e20 [ 542.609911][ T32] r4:00000000 [ 542.610285][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.610936][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.633429][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.634161][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212300 [ 542.634719][ T32] r4:00000000 [ 542.634955][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.635986][ T32] r9:8361c800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f041000 [ 542.637070][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.637714][ T32] r5:00001000 r4:dfc09000 [ 542.638265][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.638954][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.639556][ T32] r5:84f43754 r4:84f43400 [ 542.639780][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.640455][ T32] r7:dddd0000 r6:82c18000 r5:84f43754 r4:850eb180 [ 542.640773][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.660717][ T32] r10:8361c800 r9:850eb1ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 542.661842][ T32] r4:850eb180 [ 542.662039][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.662592][ T32] r10:00000000 r9:dfaa1e78 r8:84ffd940 r7:850eb180 r6:8026771c r5:8361c800 [ 542.663118][ T32] r4:84fcee00 [ 542.663412][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.663910][ T32] Exception stack(0xdfa05fb0 to 0xdfa05ff8) [ 542.664212][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 542.664733][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.665242][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.665754][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84fcee00 [ 542.671379][ T32] INFO: task kworker/1:14:3879 blocked for more than 430 seconds. [ 542.672030][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.672172][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.672370][ T32] task:kworker/1:14 state:D stack:0 pid:3879 tgid:3879 ppid:2 flags:0x00000000 [ 542.681676][ T32] Workqueue: events bpf_prog_free_deferred [ 542.682051][ T32] Call trace: [ 542.682301][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.682856][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfbf5da4 r5:8361ec00 [ 542.683385][ T32] r4:8361ec00 [ 542.683544][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.684037][ T32] r5:8361ec00 r4:82717e44 [ 542.684291][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.684913][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.685487][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e20 [ 542.685921][ T32] r4:00000000 [ 542.686089][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.686606][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.687116][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.687647][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e900 [ 542.688192][ T32] r4:00000000 [ 542.688384][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.688916][ T32] r9:8361ec00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03f000 [ 542.689350][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.689849][ T32] r5:00001000 r4:dfbd5000 [ 542.690093][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.690610][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.701607][ T32] r5:85094754 r4:85094400 [ 542.701946][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.702229][ T32] r7:ddde4000 r6:82c18200 r5:85094754 r4:85206200 [ 542.702370][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.702618][ T32] r10:8361ec00 r9:8520622c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.702906][ T32] r4:85206200 [ 542.703013][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.703689][ T32] r10:00000000 r9:df9f1e78 r8:8510a200 r7:85206200 r6:8026771c r5:8361ec00 [ 542.704161][ T32] r4:85212140 [ 542.704381][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.704868][ T32] Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) [ 542.705226][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 542.705694][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.706098][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.706602][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:85212140 [ 542.707189][ T32] INFO: task kworker/1:16:3892 blocked for more than 430 seconds. [ 542.707776][ T32] Not tainted 6.12.0-syzkaller #0 [ 542.708138][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 542.708675][ T32] task:kworker/1:16 state:D stack:0 pid:3892 tgid:3892 ppid:2 flags:0x00000000 [ 542.709421][ T32] Workqueue: events bpf_prog_free_deferred [ 542.709843][ T32] Call trace: [ 542.710088][ T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc) [ 542.710582][ T32] r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfccdda4 r5:83e04800 [ 542.723502][ T32] r4:83e04800 [ 542.723803][ T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24) [ 542.724333][ T32] r5:83e04800 r4:82717e44 [ 542.724643][ T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38) [ 542.725279][ T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18) [ 542.725913][ T32] r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde20 [ 542.726466][ T32] r4:00000000 [ 542.726702][ T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40) [ 542.727401][ T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240) [ 542.727935][ T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4) [ 542.728375][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d637c0 [ 542.728891][ T32] r4:00000000 [ 542.729204][ T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64) [ 542.729695][ T32] r9:83e04800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f047000 [ 542.730270][ T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14) [ 542.730802][ T32] r5:00001000 r4:dfd73000 [ 542.752385][ T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4) [ 542.752946][ T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164) [ 542.753476][ T32] r5:8508ab54 r4:8508a800 [ 542.753713][ T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.754327][ T32] r7:ddde4000 r6:82c18200 r5:8508ab54 r4:85206a00 [ 542.754830][ T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.755354][ T32] r10:83e04800 r9:85206a2c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 542.755885][ T32] r4:85206a00 [ 542.756083][ T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.756486][ T32] r10:00000000 r9:dfbe1e78 r8:850c6780 r7:85206a00 r6:8026771c r5:83e04800 [ 542.756975][ T32] r4:850c8700 [ 542.757269][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.757840][ T32] Exception stack(0xdfccdfb0 to 0xdfccdff8) [ 542.758160][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 542.758837][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.759155][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.759622][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:850c8700 [ 542.772221][ T32] NMI backtrace for cpu 1 [ 542.772800][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 542.773383][ T32] Hardware name: ARM-Versatile Express [ 542.773675][ T32] Call trace: [ 542.773903][ T32] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 542.774454][ T32] r7:00000000 r6:00000113 r5:60000193 r4:8203f890 [ 542.774848][ T32] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c) [ 542.775136][ T32] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 542.775433][ T32] r5:00000001 r4:00000001 [ 542.775575][ T32] [<819c5de8>] (dump_stack) from [<81994f30>] (nmi_cpu_backtrace+0x160/0x17c) [ 542.775867][ T32] [<81994dd0>] (nmi_cpu_backtrace) from [<8199507c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 542.776451][ T32] r7:00000001 r6:8260c610 r5:8261af4c r4:ffffffff [ 542.776722][ T32] [<81994f4c>] (nmi_trigger_cpumask_backtrace) from [<80210408>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 542.777522][ T32] r9:00005ec2 r8:828b7ca4 r7:8260c770 r6:00007d5f r5:8261b508 r4:86478b1c [ 542.777911][ T32] [<802103f0>] (arch_trigger_cpumask_backtrace) from [<803599e4>] (watchdog+0x498/0x5b8) [ 542.778649][ T32] [<8035954c>] (watchdog) from [<80270974>] (kthread+0x104/0x134) [ 542.779220][ T32] r10:00000000 r9:df819e58 r8:82e9f400 r7:00000000 r6:8035954c r5:82ee8c00 [ 542.779848][ T32] r4:82f45a00 [ 542.780098][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.780692][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 542.781043][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 542.781402][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.781995][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.782457][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:82f45a00 [ 542.783836][ T32] Sending NMI from CPU 1 to CPUs 0: [ 542.784613][ C0] NMI backtrace for cpu 0 [ 542.784791][ C0] CPU: 0 UID: 0 PID: 2446 Comm: kworker/u9:6 Not tainted 6.12.0-syzkaller #0 [ 542.784855][ C0] Hardware name: ARM-Versatile Express [ 542.784885][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 542.785008][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 542.785067][ C0] LR is at hrtimer_start_range_ns+0x170/0x4c0 [ 542.785122][ C0] pc : [<819d3390>] lr : [<80305df8>] psr: 60000113 [ 542.785156][ C0] sp : df801dd0 ip : df801de0 fp : df801ddc [ 542.785189][ C0] r10: dddc7140 r9 : dddc7140 r8 : 00000000 [ 542.785226][ C0] r7 : dddc7180 r6 : dddc7180 r5 : dddc7140 r4 : 849fd968 [ 542.785264][ C0] r3 : 0000df0d r2 : 0000003e r1 : 20000113 r0 : dddc7140 [ 542.785384][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 542.785461][ C0] Control: 30c5387d Table: 84171840 DAC: fffffffd [ 542.785521][ C0] Call trace: frame pointer underflow [ 542.785601][ C0] [<819d3368>] (_raw_spin_unlock_irqrestore) from [<80305df8>] (hrtimer_start_range_ns+0x170/0x4c0) [ 542.785658][ C0] [<80305c88>] (hrtimer_start_range_ns) from [<815431b8>] (qdisc_watchdog_schedule_range_ns+0x8c/0x94) [ 542.785736][ C0] r10:f03b2c27 r9:00000000 r8:00000000 r7:00000000 r6:0000007e r5:5b0b91fe [ 542.785771][ C0] r4:849fd968 [ 542.785786][ C0] [<8154312c>] (qdisc_watchdog_schedule_range_ns) from [<815769cc>] (tbf_dequeue+0x350/0x3e0) [ 542.785853][ C0] r9:00000002 r8:00000088 r7:00000000 r6:849fd900 r5:00008d32 r4:849fd800 [ 542.785867][ C0] [<8157667c>] (tbf_dequeue) from [<8153fb88>] (__qdisc_run+0x90/0x7e8) [ 542.785928][ C0] r10:00000004 r9:8361bc00 r8:849fd898 r7:82e27c00 r6:00000000 r5:dddd1040 [ 542.785958][ C0] r4:849fd800 [ 542.785972][ C0] [<8153faf8>] (__qdisc_run) from [<814beb54>] (net_tx_action+0x22c/0x398) [ 542.786044][ C0] r10:00000004 r9:8361bc00 r8:849fd898 r7:849fd85c r6:00000000 r5:dddd1040 [ 542.786077][ C0] r4:849fd800 [ 542.786091][ C0] [<814be928>] (net_tx_action) from [<8024b928>] (handle_softirqs+0x158/0x464) [ 542.786162][ C0] r10:00000004 r9:8361bc00 r8:00000101 r7:04208060 r6:00000002 r5:00000003 [ 542.786190][ C0] r4:82604088 [ 542.786202][ C0] [<8024b7d0>] (handle_softirqs) from [<8024bd90>] (__irq_exit_rcu+0x110/0x1d0) [ 542.786269][ C0] r10:00000000 r9:8361bc00 r8:00000000 r7:eb7d5d58 r6:821e1a94 r5:822222a0 [ 542.786288][ C0] r4:8361bc00 [ 542.786300][ C0] [<8024bc80>] (__irq_exit_rcu) from [<8024c108>] (irq_exit+0x10/0x18) [ 542.786367][ C0] r5:822222a0 r4:824bbc1c [ 542.786382][ C0] [<8024c0f8>] (irq_exit) from [<819c679c>] (generic_handle_arch_irq+0x7c/0x80) [ 542.786450][ C0] [<819c6720>] (generic_handle_arch_irq) from [<819770fc>] (call_with_stack+0x1c/0x20) [ 542.786530][ C0] r9:8361bc00 r8:80000113 r7:eb7d5d8c r6:ffffffff r5:20000113 r4:809fa5ec [ 542.786544][ C0] [<819770e0>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc) [ 542.786592][ C0] Exception stack(0xeb7d5d58 to 0xeb7d5da0) [ 542.786621][ C0] 5d40: 00000000 8203f890 [ 542.786654][ C0] 5d60: 00000000 00000001 dddce57c 00000006 eb7d5dd4 86980000 80000113 8290dfe0 [ 542.786687][ C0] 5d80: 00000000 eb7d5dcc eb7d5d98 eb7d5da8 819c73d8 809fa5ec 20000113 ffffffff [ 542.786706][ C0] [<809fa57c>] (crng_make_state) from [<809fa740>] (_get_random_bytes+0x94/0x124) [ 542.786776][ C0] r9:86980000 r8:00000006 r7:eb7d5e14 r6:eb7d5dd4 r5:86980000 r4:00000006 [ 542.786791][ C0] [<809fa6ac>] (_get_random_bytes) from [<809fa7e0>] (get_random_bytes+0x10/0x14) [ 542.786850][ C0] r8:00000030 r7:84f06b80 r6:81b90958 r5:84f06c30 r4:851fdb40 [ 542.786864][ C0] [<809fa7d0>] (get_random_bytes) from [<80da9cec>] (nsim_dev_trap_report_work+0x10c/0x33c) [ 542.786912][ C0] [<80da9be0>] (nsim_dev_trap_report_work) from [<80266d24>] (process_one_work+0x1b4/0x4f4) [ 542.786980][ C0] r10:82c1bc05 r9:8361bc00 r8:02400000 r7:82c0f600 r6:82c1bc00 r5:84f06b80 [ 542.787014][ C0] r4:83fe5280 [ 542.787031][ C0] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc) [ 542.787097][ C0] r10:8361bc00 r9:83fe52ac r8:61c88647 r7:82c0f620 r6:82604d40 r5:82c0f600 [ 542.787116][ C0] r4:83fe5280 [ 542.787146][ C0] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134) [ 542.787209][ C0] r10:00000000 r9:eb79de78 r8:84010d40 r7:83fe5280 r6:8026771c r5:8361bc00 [ 542.787236][ C0] r4:84010cc0 [ 542.787251][ C0] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.787340][ C0] Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) [ 542.787370][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 542.787402][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.787429][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.787511][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84010cc0 [ 542.802118][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 542.841927][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 542.843528][ T32] Hardware name: ARM-Versatile Express [ 542.844918][ T32] Call trace: [ 542.846115][ T32] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c) [ 542.847249][ T32] r7:00000000 r6:82623184 r5:00000000 r4:8203f890 [ 542.848933][ T32] [<819a7d5c>] (show_stack) from [<819c5dc0>] (dump_stack_lvl+0x54/0x7c) [ 542.850697][ T32] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c) [ 542.851360][ T32] r5:00000000 r4:82871d18 [ 542.851794][ T32] [<819c5de8>] (dump_stack) from [<819a88a0>] (panic+0x120/0x374) [ 542.852483][ T32] [<819a8780>] (panic) from [<80359864>] (watchdog+0x318/0x5b8) [ 542.852984][ T32] r3:00000000 r2:00000000 r1:00000001 r0:820403bc [ 542.854180][ T32] r7:8260c770 [ 542.854941][ T32] [<8035954c>] (watchdog) from [<80270974>] (kthread+0x104/0x134) [ 542.856695][ T32] r10:00000000 r9:df819e58 r8:82e9f400 r7:00000000 r6:8035954c r5:82ee8c00 [ 542.858007][ T32] r4:82f45a00 [ 542.858710][ T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 542.860394][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 542.861148][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 542.862835][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 542.863978][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 542.865550][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:82f45a00 [ 542.869266][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:30:04 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8203f890 R02=00000001 R03=819c7c30 R04=00000006 R05=826f8c88 R06=00000000 R07=826f8c80 R08=82e3b000 R09=00000028 R10=826f8c88 R11=df801eac R12=df801eb0 R13=df801ea0 R14=8031ada8 R15=819c7c40 PSR=20000193 --C- A S svc32 s00=10000000 s01=00000000 d00=0000000010000000 s02=e0000000 s03=0004290e d01=0004290ee0000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=01c3c78e s09=00db51fc d04=00db51fc01c3c78e s10=00000000 s11=00000000 d05=0000000000000000 s12=01c57567 s13=ffa3905d d06=ffa3905d01c57567 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=00000000 s17=07a2f9f4 d08=07a2f9f400000000 s18=54000000 s19=00020fbd d09=00020fbd54000000 s20=01c1b82e s21=ffa39061 d10=ffa3906101c1b82e s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=13c3c78e s25=00000000 d12=0000000013c3c78e s26=e0000000 s27=0004290e d13=0004290ee0000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=ffa1a718 s33=ff028334 d16=ff028334ffa1a718 s34=ffffffff s35=ffffffff d17=ffffffffffffffff s36=ffefa6ae s37=002cb2c3 d18=002cb2c3ffefa6ae s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=03179bfe s43=00000000 d21=0000000003179bfe s44=00000004 s45=00000000 d22=0000000000000004 s46=0107deaa s47=00000000 d23=000000000107deaa s48=00894fa6 s49=07a2f9f4 d24=07a2f9f400894fa6 s50=1395869e s51=00000000 d25=000000001395869e s52=0043f0f3 s53=ff22134c d26=ff22134c0043f0f3 s54=00531de3 s55=018dfd00 d27=018dfd0000531de3 s56=feb07006 s57=ffa41a5e d28=ffa41a5efeb07006 s58=ffd20d2f s59=00531de3 d29=00531de3ffd20d2f s60=d48d3cac s61=0004290e d30=0004290ed48d3cac s62=be2e40f0 s63=fffb8917 d31=fffb8917be2e40f0 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000008 R01=00000008 R02=df807000 R03=00010003 R04=00000001 R05=8260ce10 R06=81a01a2c R07=82c97b18 R08=20000193 R09=83e0cd94 R10=20000193 R11=df805c6c R12=00000001 R13=df805c48 R14=808f8fc0 R15=808f8fe0 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=18000000 s03=0008e24b d01=0008e24b18000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fee93a28 s09=ffa82199 d04=ffa82199fee93a28 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=fed16eaf s13=ffd1f77d d06=ffd1f77dfed16eaf s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=00000000 s17=03df782d d08=03df782d00000000 s18=2a000000 s19=ffffad7f d09=ffffad7f2a000000 s20=fe350398 s21=ffd1f77e d10=ffd1f77efe350398 s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=00e93a28 s25=00000000 d12=0000000000e93a28 s26=18000000 s27=0008e24b d13=0008e24b18000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=01c9415c s33=0043a5c7 d16=0043a5c701c9415c s34=00000000 s35=00000000 d17=0000000000000000 s36=ff12da24 s37=0081f7f8 d18=0081f7f8ff12da24 s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=ff843ebf s43=ffffffff d21=ffffffffff843ebf s44=00000000 s45=00000000 d22=0000000000000000 s46=ffd6bf95 s47=ffffffff d23=ffffffffffd6bf95 s48=00c6a694 s49=03df782d d24=03df782d00c6a694 s50=fcf0380f s51=ffffffff d25=fffffffffcf0380f s52=feaaec17 s53=fec46342 d26=fec46342feaaec17 s54=fef0f869 s55=008a889e d27=008a889efef0f869 s56=ff68dc4a s57=00fa77e4 d28=00fa77e4ff68dc4a s58=007d3bf2 s59=fef0f869 d29=fef0f869007d3bf2 s60=1ddca255 s61=0008e24b d30=0008e24b1ddca255 s62=4df90219 s63=ffff2a24 d31=ffff2a244df90219 FPSCR: 00000000