last executing test programs: 2m22.664129943s ago: executing program 0 (id=508): bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x5, 0x0, 0x4000000f, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x400, 0x0, 0x0, @void, @value, @void, @value}, 0xac) 2m20.149247101s ago: executing program 0 (id=510): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xffc, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x18, 0xe000}, 0x5}], 0x1, 0x0) 2m11.681062389s ago: executing program 0 (id=512): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f00000000c0)={0xfffffffc, 0x0, 0x0, 0x1, 0x4, "f996ff109a04000000008000"}) 2m5.296838418s ago: executing program 0 (id=514): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffef83}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x40}}, 0x0) 1m45.744996971s ago: executing program 0 (id=518): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) getgid() r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 1m40.542221891s ago: executing program 0 (id=520): syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 41.297097809s ago: executing program 1 (id=530): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syslog(0x0, 0x0, 0x0) 30.652577056s ago: executing program 1 (id=531): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000005000000ff0f000004"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd6d, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) futex_waitv(&(0x7f00000039c0)=[{0x9, 0x0, 0x82}], 0x1, 0x0, &(0x7f0000002500), 0x1) 22.65790295s ago: executing program 1 (id=532): r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, 0x20048004) 17.501184472s ago: executing program 1 (id=533): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) execveat$binfmt(0xffffffffffffff9c, r0, 0x0, 0x0, 0x0) 10.314012815s ago: executing program 1 (id=534): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=535): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000200)={@val={0xa}, @void, @eth={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @multicast1}, {0x0, 0x4305, 0x18, 0x0, @wg=@data}}}}}}, 0x3e) kernel console output (not intermixed with test programs): [ 51.155385][ T31] audit: type=1400 audit(51.050:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.156730][ T31] audit: type=1400 audit(51.050:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:58399' (ED25519) to the list of known hosts. [ 61.773962][ T31] audit: type=1400 audit(61.660:70): avc: denied { name_bind } for pid=3105 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.235647][ T31] audit: type=1400 audit(64.130:71): avc: denied { execute } for pid=3107 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.248886][ T31] audit: type=1400 audit(64.140:72): avc: denied { execute_no_trans } for pid=3107 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.954104][ T31] audit: type=1400 audit(66.850:73): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.956895][ T31] audit: type=1400 audit(66.850:74): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.971680][ T3107] cgroup: Unknown subsys name 'net' [ 66.981816][ T31] audit: type=1400 audit(66.880:75): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.122771][ T3107] cgroup: Unknown subsys name 'cpuset' [ 67.129830][ T3107] cgroup: Unknown subsys name 'hugetlb' [ 67.130853][ T3107] cgroup: Unknown subsys name 'rlimit' [ 67.407400][ T31] audit: type=1400 audit(67.300:76): avc: denied { setattr } for pid=3107 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.411262][ T31] audit: type=1400 audit(67.310:77): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.413340][ T31] audit: type=1400 audit(67.310:78): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.661569][ T3109] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.662972][ T31] audit: type=1400 audit(67.560:79): avc: denied { relabelto } for pid=3109 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.667399][ T31] audit: type=1400 audit(67.560:80): avc: denied { write } for pid=3109 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.705723][ T31] audit: type=1400 audit(67.600:81): avc: denied { read } for pid=3107 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.707084][ T31] audit: type=1400 audit(67.600:82): avc: denied { open } for pid=3107 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.717941][ T3107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.734691][ T31] audit: type=1400 audit(75.630:83): avc: denied { execmem } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.793422][ T31] audit: type=1400 audit(75.690:84): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.794707][ T31] audit: type=1400 audit(75.690:85): avc: denied { open } for pid=3112 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.808521][ T31] audit: type=1400 audit(75.700:86): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.824820][ T31] audit: type=1400 audit(75.720:87): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.930703][ T31] audit: type=1400 audit(75.830:88): avc: denied { sys_module } for pid=3113 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.717816][ T31] audit: type=1400 audit(76.610:89): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.810990][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.815244][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.153520][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.163055][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.435227][ T3112] hsr_slave_0: entered promiscuous mode [ 78.441581][ T3112] hsr_slave_1: entered promiscuous mode [ 78.795026][ T31] audit: type=1400 audit(78.690:90): avc: denied { create } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.797300][ T31] audit: type=1400 audit(78.690:91): avc: denied { write } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.806577][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.810148][ T31] audit: type=1400 audit(78.700:92): avc: denied { read } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.816369][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.823929][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.831348][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.140558][ T3113] hsr_slave_0: entered promiscuous mode [ 79.143874][ T3113] hsr_slave_1: entered promiscuous mode [ 79.145114][ T3113] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 79.145537][ T3113] Cannot create hsr debugfs directory [ 79.467680][ T3113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.476782][ T3113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.485081][ T3113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.494068][ T3113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.784176][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.221668][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.884866][ T3112] veth0_vlan: entered promiscuous mode [ 82.894357][ T3112] veth1_vlan: entered promiscuous mode [ 82.942347][ T3112] veth0_macvtap: entered promiscuous mode [ 82.951724][ T3112] veth1_macvtap: entered promiscuous mode [ 83.022159][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.022737][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.022942][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.023142][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.131401][ T31] audit: type=1400 audit(83.030:93): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.136026][ T3113] veth0_vlan: entered promiscuous mode [ 83.139250][ T31] audit: type=1400 audit(83.030:94): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.e5U9OY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.141253][ T31] audit: type=1400 audit(83.040:95): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.150213][ T31] audit: type=1400 audit(83.050:96): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.e5U9OY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 83.153748][ T31] audit: type=1400 audit(83.050:97): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/syzkaller.e5U9OY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 83.157119][ T3113] veth1_vlan: entered promiscuous mode [ 83.167677][ T31] audit: type=1400 audit(83.060:98): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.173901][ T31] audit: type=1400 audit(83.070:99): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.179524][ T31] audit: type=1400 audit(83.070:100): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.182354][ T31] audit: type=1400 audit(83.080:101): avc: denied { mounton } for pid=3112 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 83.183757][ T31] audit: type=1400 audit(83.080:102): avc: denied { mount } for pid=3112 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 83.209836][ T3113] veth0_macvtap: entered promiscuous mode [ 83.244894][ T3113] veth1_macvtap: entered promiscuous mode [ 83.251206][ T3112] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.306337][ T3113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.306872][ T3113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.307228][ T3113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.307583][ T3113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.692650][ T3799] Driver unsupported XDP return value 0 on prog (id 2) dev N/A, expect packet loss! [ 86.491852][ T3809] netlink: 104 bytes leftover after parsing attributes in process `syz.1.6'. [ 86.843177][ T3813] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5'. [ 88.282726][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 88.282794][ T31] audit: type=1400 audit(88.180:116): avc: denied { create } for pid=3825 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 88.299609][ T31] audit: type=1400 audit(88.200:117): avc: denied { name_bind } for pid=3825 comm="syz.0.10" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 88.302432][ T31] audit: type=1400 audit(88.200:118): avc: denied { node_bind } for pid=3825 comm="syz.0.10" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 89.098157][ C1] hrtimer: interrupt took 8980592 ns [ 100.508534][ T3834] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13'. [ 111.068783][ T31] audit: type=1400 audit(110.960:119): avc: denied { mounton } for pid=3848 comm="syz.1.17" path="/10/file0" dev="tmpfs" ino=70 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 112.125286][ T3851] process 'syz.1.17' launched './file0' with NULL argv: empty string added [ 113.557451][ T31] audit: type=1400 audit(113.450:120): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 113.683482][ T3854] netlink: 4 bytes leftover after parsing attributes in process `syz.1.18'. [ 114.369249][ T3750] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 114.537516][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 114.539579][ T3750] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 114.540047][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 0 [ 114.556482][ T3750] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 114.557032][ T3750] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 114.557333][ T3750] usb 2-1: Product: syz [ 114.557513][ T3750] usb 2-1: Manufacturer: syz [ 114.557707][ T3750] usb 2-1: SerialNumber: syz [ 114.570840][ T3750] usb 2-1: config 0 descriptor?? [ 114.578008][ T3862] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 114.594836][ T3750] dm9601 2-1:0.0: probe with driver dm9601 failed with error -22 [ 121.419153][ T3871] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 121.422642][ T3871] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 122.147750][ T3871] hsr_slave_0: entered promiscuous mode [ 122.154184][ T3871] hsr_slave_1: entered promiscuous mode [ 122.155848][ T3871] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 122.156193][ T3871] Cannot create hsr debugfs directory [ 122.430917][ T3871] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.485977][ T3871] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.551920][ T3871] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.599773][ T3871] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.703219][ T3871] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 122.711763][ T3871] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 122.721086][ T3871] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 122.726859][ T3871] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 123.661492][ T3871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 124.825239][ T24] usb 2-1: USB disconnect, device number 2 [ 125.091065][ T4215] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23'. [ 126.806566][ T3871] veth0_vlan: entered promiscuous mode [ 126.853837][ T3871] veth1_vlan: entered promiscuous mode [ 126.917513][ T3871] veth0_macvtap: entered promiscuous mode [ 126.932909][ T3871] veth1_macvtap: entered promiscuous mode [ 127.004991][ T3871] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.006346][ T3871] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.006675][ T3871] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.007005][ T3871] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.660329][ T31] audit: type=1400 audit(127.560:121): avc: denied { create } for pid=4237 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.666658][ T31] audit: type=1400 audit(127.560:122): avc: denied { setopt } for pid=4237 comm="syz.0.26" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.045059][ T4241] netlink: 4 bytes leftover after parsing attributes in process `syz.1.27'. [ 130.301252][ T31] audit: type=1400 audit(130.200:123): avc: denied { connect } for pid=4237 comm="syz.0.26" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.639950][ T4255] fuse: Bad value for 'fd' [ 131.247104][ T4259] netlink: 4 bytes leftover after parsing attributes in process `syz.1.32'. [ 131.888723][ T31] audit: type=1400 audit(131.780:124): avc: denied { watch watch_reads } for pid=4262 comm="syz.1.33" path="/24" dev="tmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 136.193238][ T4268] fuse: Bad value for 'fd' [ 149.091287][ T4274] netlink: 4 bytes leftover after parsing attributes in process `syz.0.37'. [ 153.110256][ T31] audit: type=1400 audit(153.010:125): avc: denied { create } for pid=4282 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 153.149701][ T31] audit: type=1400 audit(153.050:126): avc: denied { write } for pid=4282 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 168.135508][ T4290] fuse: Bad value for 'fd' [ 168.234040][ T3166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 168.261698][ T3166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 168.274893][ T3166] bond0 (unregistering): Released all slaves [ 168.340490][ T3166] hsr_slave_0: left promiscuous mode [ 168.343636][ T3166] hsr_slave_1: left promiscuous mode [ 168.351760][ T3166] veth1_macvtap: left promiscuous mode [ 168.352343][ T3166] veth0_macvtap: left promiscuous mode [ 168.352834][ T3166] veth1_vlan: left promiscuous mode [ 168.353421][ T3166] veth0_vlan: left promiscuous mode [ 168.766943][ T4295] netlink: 4 bytes leftover after parsing attributes in process `syz.1.42'. [ 169.411697][ T4303] fuse: Bad value for 'fd' [ 169.824079][ T4307] netlink: 4 bytes leftover after parsing attributes in process `syz.1.47'. [ 171.760039][ T4317] fuse: Bad value for 'fd' [ 172.040531][ T31] audit: type=1400 audit(171.930:127): avc: denied { setopt } for pid=4318 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.019967][ T4324] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 174.022260][ T31] audit: type=1400 audit(173.920:128): avc: denied { map } for pid=4323 comm="syz.0.53" path="socket:[3510]" dev="sockfs" ino=3510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 174.023296][ T31] audit: type=1400 audit(173.920:129): avc: denied { read } for pid=4323 comm="syz.0.53" path="socket:[3510]" dev="sockfs" ino=3510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 174.030930][ T31] audit: type=1400 audit(173.920:130): avc: denied { read } for pid=4323 comm="syz.0.53" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 174.032073][ T31] audit: type=1400 audit(173.920:131): avc: denied { open } for pid=4323 comm="syz.0.53" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 174.040298][ T31] audit: type=1400 audit(173.930:132): avc: denied { ioctl } for pid=4323 comm="syz.0.53" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 174.041170][ T31] audit: type=1400 audit(173.930:133): avc: denied { set_context_mgr } for pid=4323 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 176.862388][ T31] audit: type=1400 audit(176.760:134): avc: denied { create } for pid=4318 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 176.869755][ T31] audit: type=1400 audit(176.760:135): avc: denied { write } for pid=4318 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 176.877813][ T31] audit: type=1400 audit(176.760:136): avc: denied { nlmsg_read } for pid=4318 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 184.106376][ T4333] fuse: Bad value for 'fd' [ 185.382927][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 185.383052][ T31] audit: type=1400 audit(185.280:139): avc: denied { ioctl } for pid=4345 comm="syz.0.59" path="socket:[2692]" dev="sockfs" ino=2692 ioctlcmd=0x8934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 185.855908][ T4352] fuse: Invalid rootmode [ 186.732537][ T31] audit: type=1400 audit(186.630:140): avc: denied { create } for pid=4353 comm="syz.1.62" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 186.741564][ T31] audit: type=1400 audit(186.640:141): avc: denied { ioctl } for pid=4353 comm="syz.1.62" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3565 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 192.718859][ T31] audit: type=1400 audit(192.610:142): avc: denied { write } for pid=4361 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 196.232704][ T31] audit: type=1400 audit(196.130:143): avc: denied { create } for pid=4376 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 196.402188][ T4378] trusted_key: encrypted_key: insufficient parameters specified [ 211.090057][ T4384] fuse: Invalid rootmode [ 213.518970][ T3750] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 213.674687][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 213.676490][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 213.688497][ T3750] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 213.688861][ T3750] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 213.689027][ T3750] usb 2-1: Product: syz [ 213.689149][ T3750] usb 2-1: Manufacturer: syz [ 213.689262][ T3750] usb 2-1: SerialNumber: syz [ 213.692836][ T3750] usb 2-1: config 0 descriptor?? [ 213.695498][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 213.696944][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 213.829302][ T31] audit: type=1326 audit(213.720:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4397 comm="syz.0.74" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 213.992003][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 213.993665][ T4390] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 214.842281][ T3750] dm9601 2-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 224.869847][ T1804] usb 2-1: USB disconnect, device number 3 [ 225.507754][ T31] audit: type=1804 audit(225.400:145): pid=4412 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.76" name="/newroot/51/file1" dev="fuse" ino=1 res=1 errno=0 [ 225.879026][ T50] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 226.041817][ T50] usb 2-1: config 9 has an invalid interface number: 141 but max is 0 [ 226.046380][ T50] usb 2-1: config 9 has no interface number 0 [ 226.046838][ T50] usb 2-1: config 9 interface 141 altsetting 127 endpoint 0xA has invalid maxpacket 512, setting to 64 [ 226.047280][ T50] usb 2-1: config 9 interface 141 has no altsetting 0 [ 226.080107][ T50] usb 2-1: New USB device found, idVendor=0fe6, idProduct=8101, bcdDevice=c5.fa [ 226.080606][ T50] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 226.080946][ T50] usb 2-1: Product: syz [ 226.081166][ T50] usb 2-1: Manufacturer: syz [ 226.081375][ T50] usb 2-1: SerialNumber: syz [ 226.346515][ T50] dm9601 2-1:9.141: probe with driver dm9601 failed with error -22 [ 226.370379][ T50] usb 2-1: USB disconnect, device number 4 [ 230.319734][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 230.491126][ T10] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 230.491554][ T10] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 230.529929][ T10] usb 1-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 230.530226][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 230.530404][ T10] usb 1-1: Product: syz [ 230.530556][ T10] usb 1-1: Manufacturer: syz [ 230.530674][ T10] usb 1-1: SerialNumber: syz [ 230.536313][ T10] usb 1-1: config 0 descriptor?? [ 230.540902][ T4438] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 230.541791][ T4438] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 230.770718][ T4438] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 230.777684][ T4438] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 231.450973][ T10] dm9601 1-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 240.769048][ T31] audit: type=1804 audit(240.660:146): pid=4450 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.81" name="/newroot/55/file1" dev="fuse" ino=1 res=1 errno=0 [ 240.850296][ T31] audit: type=1400 audit(240.740:147): avc: denied { create } for pid=4452 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 240.854835][ T31] audit: type=1400 audit(240.750:148): avc: denied { write } for pid=4452 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 241.472821][ T1804] usb 1-1: USB disconnect, device number 2 [ 242.217027][ T31] audit: type=1400 audit(242.110:149): avc: denied { write } for pid=4469 comm="syz.0.86" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 244.841386][ T3750] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 245.047135][ T3750] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 245.058343][ T3750] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 245.088139][ T3750] usb 1-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 245.088484][ T3750] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 245.088636][ T3750] usb 1-1: Product: syz [ 245.089010][ T3750] usb 1-1: Manufacturer: syz [ 245.090377][ T3750] usb 1-1: SerialNumber: syz [ 245.111422][ T3750] usb 1-1: config 0 descriptor?? [ 245.266409][ T4476] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 245.267660][ T4476] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 245.553665][ T4476] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 245.554438][ T4476] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 246.202645][ T3750] dm9601 1-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 254.602583][ T4488] capability: warning: `syz.1.89' uses deprecated v2 capabilities in a way that may be insecure [ 254.901442][ T4490] fuse: Bad value for 'fd' [ 256.271678][ T10] usb 1-1: USB disconnect, device number 3 [ 257.739222][ T4508] fuse: Bad value for 'fd' [ 258.179041][ T31] audit: type=1400 audit(258.070:150): avc: denied { create } for pid=4510 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=rawip_socket permissive=1 [ 259.219074][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 259.425139][ T10] usb 1-1: Using ep0 maxpacket: 8 [ 259.471204][ T10] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 259.474772][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 259.520483][ T10] usb 1-1: config 0 descriptor?? [ 260.837784][ T10] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 260.839794][ T10] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to send software reset: ffffffb9 [ 260.840691][ T10] asix 1-1:0.0: probe with driver asix failed with error -71 [ 260.860051][ T10] usb 1-1: USB disconnect, device number 4 [ 260.972336][ T31] audit: type=1400 audit(260.870:151): avc: denied { create } for pid=4512 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 260.975160][ T31] audit: type=1400 audit(260.870:152): avc: denied { bind } for pid=4512 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.978602][ T31] audit: type=1400 audit(260.870:153): avc: denied { accept } for pid=4512 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.984573][ T31] audit: type=1400 audit(260.880:154): avc: denied { read } for pid=4512 comm="syz.1.96" path="socket:[2913]" dev="sockfs" ino=2913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 269.789617][ T31] audit: type=1400 audit(269.680:155): avc: denied { ioctl } for pid=4556 comm="syz.0.107" path="socket:[3728]" dev="sockfs" ino=3728 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 270.753332][ T4562] netlink: 4 bytes leftover after parsing attributes in process `syz.0.107'. [ 273.288298][ T31] audit: type=1400 audit(273.170:156): avc: denied { name_bind } for pid=4567 comm="syz.0.109" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 282.624411][ T10] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 282.812846][ T10] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 282.813491][ T10] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 282.838321][ T10] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 282.838638][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 282.838800][ T10] usb 2-1: Product: syz [ 282.838919][ T10] usb 2-1: Manufacturer: syz [ 282.840111][ T10] usb 2-1: SerialNumber: syz [ 282.850222][ T10] usb 2-1: config 0 descriptor?? [ 282.852577][ T4579] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 282.854218][ T4579] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 283.111000][ T4579] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 283.111708][ T4579] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 283.741114][ T10] dm9601 2-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 293.976774][ T31] audit: type=1400 audit(293.870:157): avc: denied { ioctl } for pid=4599 comm="syz.0.118" path="socket:[3774]" dev="sockfs" ino=3774 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 294.021483][ T3750] usb 2-1: USB disconnect, device number 5 [ 298.158677][ T8] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 298.325663][ T8] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 298.326016][ T8] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 298.333681][ T8] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 298.334473][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 298.334691][ T8] usb 2-1: Product: syz [ 298.334794][ T8] usb 2-1: Manufacturer: syz [ 298.334906][ T8] usb 2-1: SerialNumber: syz [ 298.336824][ T8] usb 2-1: config 0 descriptor?? [ 298.339352][ T4622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 298.340589][ T4622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 298.574900][ T4622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 298.576865][ T4622] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 299.213732][ T8] dm9601 2-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 309.473276][ T8] usb 2-1: USB disconnect, device number 6 [ 312.399241][ T3750] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 312.555988][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 312.556727][ T3750] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 312.568870][ T3750] usb 2-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 312.569186][ T3750] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 312.569357][ T3750] usb 2-1: Product: syz [ 312.569462][ T3750] usb 2-1: Manufacturer: syz [ 312.569569][ T3750] usb 2-1: SerialNumber: syz [ 312.572549][ T3750] usb 2-1: config 0 descriptor?? [ 312.580548][ T4686] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 312.583273][ T4686] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 312.792802][ T4686] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 312.794459][ T4686] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 313.411481][ T3750] dm9601 2-1:0.0 (unnamed net_device) (uninitialized): Error reading chip ID [ 323.634899][ T50] usb 2-1: USB disconnect, device number 7 [ 327.439648][ T31] audit: type=1400 audit(327.320:158): avc: denied { view } for pid=4736 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 328.222295][ T31] audit: type=1400 audit(328.110:159): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 329.662462][ T31] audit: type=1400 audit(329.560:160): avc: denied { create } for pid=4749 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 329.835233][ T4754] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 330.003342][ T4756] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 333.235436][ T4765] netlink: 4 bytes leftover after parsing attributes in process `syz.1.161'. [ 338.710872][ T31] audit: type=1400 audit(338.610:161): avc: denied { bind } for pid=4783 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 341.730047][ T31] audit: type=1400 audit(341.630:162): avc: denied { create } for pid=4779 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 341.736302][ T31] audit: type=1400 audit(341.630:163): avc: denied { bind } for pid=4779 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 353.682670][ T31] audit: type=1400 audit(353.580:164): avc: denied { append } for pid=4809 comm="syz.0.176" name="vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 353.958640][ T31] audit: type=1400 audit(353.850:165): avc: denied { mount } for pid=4811 comm="syz.0.177" name="/" dev="pstore" ino=787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 358.150453][ T4814] netlink: 8 bytes leftover after parsing attributes in process `syz.0.177'. [ 364.585477][ T31] audit: type=1326 audit(364.480:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.591292][ T31] audit: type=1326 audit(364.490:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 364.595897][ T31] audit: type=1326 audit(364.490:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 379.857696][ T31] audit: type=1400 audit(379.750:169): avc: denied { bind } for pid=4848 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 382.169330][ T31] audit: type=1400 audit(382.070:170): avc: denied { map } for pid=4857 comm="syz.0.191" path="socket:[5151]" dev="sockfs" ino=5151 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 394.641405][ T31] audit: type=1400 audit(394.540:171): avc: denied { setcheckreqprot } for pid=4884 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 394.645755][ T4885] SELinux: syz.0.197 (4885) set checkreqprot to 1. This is no longer supported. [ 399.822155][ T4912] binder: BINDER_SET_CONTEXT_MGR already set [ 399.822659][ T4912] binder: 4897:4912 ioctl 4018620d 20000a80 returned -16 [ 401.168478][ T31] audit: type=1400 audit(401.060:172): avc: denied { write } for pid=4909 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 407.077774][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.079752][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.080174][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.080521][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.080903][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.082005][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.082402][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.082737][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.083107][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.083487][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.083834][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.084174][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.084516][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.084913][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.085242][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.085584][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.086986][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.089527][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.089963][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.090324][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.090668][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.091077][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.091513][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.098968][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.099458][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.099813][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.100274][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.100629][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.101015][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.101351][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.101694][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.102054][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.102388][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.108548][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.108999][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.109460][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.109876][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.110226][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.110579][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.110997][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.111375][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.111698][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.112019][ T3750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 407.128676][ T3750] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 407.844050][ T4925] virtio-fs: tag <(null)> not found [ 408.728931][ T3810] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 408.879140][ T3810] usb 1-1: Using ep0 maxpacket: 16 [ 408.886798][ T3810] usb 1-1: config 0 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 408.887714][ T3810] usb 1-1: config 0 interface 0 altsetting 1 endpoint 0x81 has invalid wMaxPacketSize 0 [ 408.891009][ T3810] usb 1-1: config 0 interface 0 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 408.891603][ T3810] usb 1-1: config 0 interface 0 has no altsetting 0 [ 408.891920][ T3810] usb 1-1: New USB device found, idVendor=045e, idProduct=05da, bcdDevice= 0.00 [ 408.892502][ T3810] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 408.899965][ T3810] usb 1-1: config 0 descriptor?? [ 409.336439][ T3810] hid (null): unknown global tag 0xe [ 409.347069][ T3810] hid-generic 0003:045E:05DA.0002: ignoring exceeding usage max [ 409.352085][ T3810] hid-generic 0003:045E:05DA.0002: item 0 1 0 11 parsing failed [ 409.353015][ T3810] hid-generic 0003:045E:05DA.0002: probe with driver hid-generic failed with error -22 [ 409.544129][ T10] usb 1-1: USB disconnect, device number 5 [ 410.920218][ T31] audit: type=1400 audit(410.820:173): avc: denied { write } for pid=4953 comm="syz.0.217" name="snmp" dev="proc" ino=4026532998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 412.593050][ T4959] input: syz0 as /devices/virtual/input/input3 [ 420.564130][ T4971] netlink: 300 bytes leftover after parsing attributes in process `syz.1.220'. [ 420.634235][ T31] audit: type=1400 audit(420.530:174): avc: denied { name_bind } for pid=4972 comm="syz.1.221" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 422.004006][ T31] audit: type=1400 audit(421.900:175): avc: denied { create } for pid=4982 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 425.633598][ T5037] fuse: Unknown parameter '0x0000000000000004' [ 427.504175][ T5057] fuse: Unknown parameter '0x0000000000000004' [ 428.975182][ T31] audit: type=1400 audit(428.870:176): avc: denied { create } for pid=5068 comm="syz.0.255" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 428.975919][ T31] audit: type=1400 audit(428.870:177): avc: denied { read write } for pid=5068 comm="syz.0.255" name="bus" dev="tmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 428.976517][ T31] audit: type=1400 audit(428.870:178): avc: denied { open } for pid=5068 comm="syz.0.255" path="/116/file0/bus" dev="tmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 429.048913][ T31] audit: type=1400 audit(428.940:179): avc: denied { unlink } for pid=3871 comm="syz-executor" name="bus" dev="tmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 429.451154][ T5076] fuse: Unknown parameter '0x0000000000000004' [ 429.485825][ T5074] ip_vti0: entered promiscuous mode [ 429.507463][ T5074] vlan2: entered promiscuous mode [ 429.559001][ T5074] ip_vti0: left promiscuous mode [ 429.824944][ T31] audit: type=1326 audit(429.720:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 429.842548][ T31] audit: type=1326 audit(429.740:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 429.845771][ T31] audit: type=1326 audit(429.740:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 429.846717][ T31] audit: type=1326 audit(429.740:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 429.861111][ T31] audit: type=1326 audit(429.760:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 429.862037][ T31] audit: type=1326 audit(429.760:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5081 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 431.630928][ T5095] fuse: Unknown parameter '0x0000000000000004' [ 432.478866][ T5097] netlink: 'syz.0.264': attribute type 4 has an invalid length. [ 432.509706][ T5097] netlink: 'syz.0.264': attribute type 4 has an invalid length. [ 433.134949][ T5107] fuse: Unknown parameter '0x0000000000000004' [ 434.128599][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 434.128700][ T31] audit: type=1400 audit(434.010:199): avc: denied { map } for pid=5122 comm="syz.1.275" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 434.129756][ T31] audit: type=1400 audit(434.010:200): avc: denied { read write } for pid=5122 comm="syz.1.275" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 434.137263][ T5121] wireguard0: entered promiscuous mode [ 434.142299][ T5121] wireguard0: entered allmulticast mode [ 434.559009][ T31] audit: type=1326 audit(434.450:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5133 comm="syz.1.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 434.560327][ T31] audit: type=1326 audit(434.450:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5133 comm="syz.1.276" exe="/syz-executor" sig=0 arch=40000028 syscall=459 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 434.560972][ T31] audit: type=1326 audit(434.450:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5133 comm="syz.1.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 435.815567][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. [ 437.788781][ T31] audit: type=1400 audit(437.680:204): avc: denied { execute } for pid=5144 comm="syz.1.279" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 437.790143][ T31] audit: type=1400 audit(437.680:205): avc: denied { execute_no_trans } for pid=5144 comm="syz.1.279" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 438.366616][ T31] audit: type=1326 audit(438.260:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.1.281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.368640][ T31] audit: type=1326 audit(438.260:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.1.281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.372227][ T31] audit: type=1326 audit(438.270:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5148 comm="syz.1.281" exe="/syz-executor" sig=0 arch=40000028 syscall=180 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 439.189288][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 439.189395][ T31] audit: type=1400 audit(439.080:210): avc: denied { create } for pid=5157 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 439.590199][ T5158] Zero length message leads to an empty skb [ 440.530470][ T5164] netlink: 4 bytes leftover after parsing attributes in process `syz.0.285'. [ 440.575574][ T5164] hsr_slave_1 (unregistering): left promiscuous mode [ 441.787637][ T31] audit: type=1326 audit(441.680:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 441.806697][ T31] audit: type=1326 audit(441.700:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 441.812918][ T31] audit: type=1326 audit(441.700:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130cb8 code=0x7ffc0000 [ 441.813787][ T31] audit: type=1326 audit(441.700:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=375 compat=0 ip=0x134a4c code=0x7ffc0000 [ 441.814515][ T31] audit: type=1326 audit(441.700:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 441.815124][ T31] audit: type=1326 audit(441.700:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=375 compat=0 ip=0x134a4c code=0x7ffc0000 [ 441.815830][ T31] audit: type=1326 audit(441.700:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x1313dc code=0x7ffc0000 [ 441.816518][ T31] audit: type=1326 audit(441.700:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 441.817295][ T31] audit: type=1326 audit(441.700:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5177 comm="syz.1.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.579824][ T5200] netlink: 'syz.1.295': attribute type 10 has an invalid length. [ 444.280570][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 444.280675][ T31] audit: type=1400 audit(444.180:272): avc: denied { mount } for pid=5209 comm="syz.0.298" name="/" dev="ramfs" ino=4729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 444.285969][ T31] audit: type=1400 audit(444.180:273): avc: denied { getopt } for pid=5210 comm="syz.1.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 444.570929][ T31] audit: type=1326 audit(444.470:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.0.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.571948][ T31] audit: type=1326 audit(444.470:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.0.301" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.572569][ T31] audit: type=1326 audit(444.470:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.0.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 444.772268][ T31] audit: type=1400 audit(444.670:277): avc: denied { create } for pid=5219 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 444.780905][ T5221] netlink: 8 bytes leftover after parsing attributes in process `syz.1.303'. [ 444.990693][ T5221] bond1: entered promiscuous mode [ 444.991263][ T5221] bond1: entered allmulticast mode [ 444.992593][ T5221] 8021q: adding VLAN 0 to HW filter on device bond1 [ 445.274185][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 445.338793][ T31] audit: type=1400 audit(445.230:278): avc: denied { write } for pid=5219 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 446.498823][ T31] audit: type=1400 audit(446.390:279): avc: denied { sqpoll } for pid=5271 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 446.792569][ T31] audit: type=1400 audit(446.680:280): avc: denied { mount } for pid=5273 comm="syz.1.308" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 446.810349][ T31] audit: type=1400 audit(446.710:281): avc: denied { unmount } for pid=5273 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 447.150232][ T5272] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5272 comm=syz.0.306 [ 447.164912][ T5272] syz.0.306 uses obsolete (PF_INET,SOCK_PACKET) [ 447.903847][ T5291] syz.1.313[5291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.904227][ T5291] syz.1.313[5291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.904985][ T5291] syz.1.313[5291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.553329][ T5314] netlink: 8 bytes leftover after parsing attributes in process `syz.0.318'. [ 449.554475][ T5314] netlink: 12 bytes leftover after parsing attributes in process `syz.0.318'. [ 449.814863][ T5314] bond1: entered promiscuous mode [ 449.815374][ T5314] bond1: entered allmulticast mode [ 449.816990][ T5314] 8021q: adding VLAN 0 to HW filter on device bond1 [ 450.274878][ T31] audit: type=1400 audit(450.170:282): avc: denied { getopt } for pid=5351 comm="syz.0.320" lport=51 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 450.442414][ T31] audit: type=1326 audit(450.340:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.444052][ T31] audit: type=1326 audit(450.340:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.455565][ T31] audit: type=1326 audit(450.350:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.480431][ T31] audit: type=1326 audit(450.360:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.481042][ T31] audit: type=1326 audit(450.360:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.481550][ T31] audit: type=1326 audit(450.360:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.481983][ T31] audit: type=1326 audit(450.360:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.482428][ T31] audit: type=1326 audit(450.360:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 450.482860][ T31] audit: type=1326 audit(450.360:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5353 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 468.399315][ T5410] syz.1.328[5410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.399738][ T5410] syz.1.328[5410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.402373][ T5410] syz.1.328[5410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.703117][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 470.704575][ T31] audit: type=1400 audit(470.600:314): avc: denied { ioctl } for pid=5432 comm="syz.1.329" path="socket:[4870]" dev="sockfs" ino=4870 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 470.730482][ T31] audit: type=1400 audit(470.610:315): avc: denied { create } for pid=5432 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 470.731594][ T31] audit: type=1400 audit(470.610:316): avc: denied { bind } for pid=5432 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 473.157418][ T5439] netlink: 4 bytes leftover after parsing attributes in process `syz.0.332'. [ 473.445024][ T5441] can0: slcan on ttyS3. [ 473.601984][ T5441] can0 (unregistered): slcan off ttyS3. [ 473.603368][ T5441] Falling back ldisc for ttyS3. [ 477.434150][ T31] audit: type=1326 audit(477.330:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5472 comm="syz.0.339" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.435191][ T31] audit: type=1326 audit(477.330:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5472 comm="syz.0.339" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.438661][ T31] audit: type=1326 audit(477.330:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5472 comm="syz.0.339" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.685540][ T31] audit: type=1400 audit(477.580:320): avc: denied { block_suspend } for pid=5475 comm="syz.0.341" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 479.050199][ T5495] netlink: 4 bytes leftover after parsing attributes in process `syz.0.347'. [ 479.491431][ T31] audit: type=1326 audit(479.380:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 479.493114][ T31] audit: type=1326 audit(479.380:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.348" exe="/syz-executor" sig=0 arch=40000028 syscall=448 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 479.494222][ T31] audit: type=1326 audit(479.380:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.348" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 483.810001][ T5517] fuse: Invalid rootmode [ 484.438394][ T31] audit: type=1400 audit(484.310:324): avc: denied { connect } for pid=5521 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 484.465369][ T31] audit: type=1400 audit(484.350:325): avc: denied { read } for pid=5521 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 484.632891][ T31] audit: type=1326 audit(484.520:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.638870][ T31] audit: type=1326 audit(484.530:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.643504][ T31] audit: type=1326 audit(484.530:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.644234][ T31] audit: type=1326 audit(484.530:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.648731][ T31] audit: type=1326 audit(484.530:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.649578][ T31] audit: type=1326 audit(484.540:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.652833][ T31] audit: type=1326 audit(484.540:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 484.653549][ T31] audit: type=1326 audit(484.540:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5525 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.083972][ T5541] *** NOT YET: opcode c3 *** [ 490.859361][ T5673] netlink: 'syz.1.375': attribute type 32 has an invalid length. [ 490.859928][ T5673] netlink: 8 bytes leftover after parsing attributes in process `syz.1.375'. [ 490.861892][ T5673] (unnamed net_device) (uninitialized): option coupled_control: invalid value (115) [ 491.280383][ T5679] netlink: 'syz.1.377': attribute type 10 has an invalid length. [ 491.474532][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 491.474694][ T31] audit: type=1326 audit(491.360:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.506434][ T31] audit: type=1326 audit(491.380:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.507652][ T31] audit: type=1326 audit(491.380:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.516429][ T31] audit: type=1326 audit(491.380:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.517504][ T31] audit: type=1326 audit(491.380:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.532364][ T31] audit: type=1326 audit(491.380:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.538768][ T31] audit: type=1326 audit(491.390:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.539592][ T31] audit: type=1326 audit(491.390:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.540398][ T31] audit: type=1326 audit(491.410:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=156 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 491.541278][ T31] audit: type=1326 audit(491.410:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5680 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.671264][ T5697] ptrace attach of "/syz-executor exec"[3113] was attempted by "/syz-executor exec"[5697] [ 498.134749][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 498.135476][ T31] audit: type=1326 audit(498.020:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.143852][ T31] audit: type=1326 audit(498.030:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.147849][ T31] audit: type=1326 audit(498.030:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.153440][ T31] audit: type=1326 audit(498.030:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.153852][ T31] audit: type=1326 audit(498.030:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.154308][ T31] audit: type=1326 audit(498.030:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.156807][ T31] audit: type=1400 audit(498.030:378): avc: denied { lock } for pid=5704 comm="syz.1.386" path="socket:[5928]" dev="sockfs" ino=5928 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 498.157420][ T31] audit: type=1326 audit(498.030:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 498.157924][ T31] audit: type=1326 audit(498.030:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5704 comm="syz.1.386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 499.291419][ T5709] netlink: 4 bytes leftover after parsing attributes in process `syz.1.387'. [ 503.320335][ T31] audit: type=1326 audit(503.210:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5713 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 503.361308][ T31] audit: type=1326 audit(503.240:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5713 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 503.390213][ T31] audit: type=1326 audit(503.240:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5713 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 503.408979][ T31] audit: type=1326 audit(503.240:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5713 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 504.521929][ T5718] serio: Serial port ptm0 [ 508.911283][ T5727] capability: warning: `syz.1.394' uses 32-bit capabilities (legacy support in use) [ 520.585630][ T31] audit: type=1400 audit(520.460:385): avc: denied { setopt } for pid=5732 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 524.468437][ T4292] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.518419][ T4292] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.613146][ T4292] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.686708][ T4292] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.963728][ T4292] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 524.990209][ T4292] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 524.996502][ T4292] bond0 (unregistering): Released all slaves [ 525.005337][ T4292] bond1 (unregistering): Released all slaves [ 525.082363][ T4292] hsr_slave_0: left promiscuous mode [ 525.089974][ T4292] veth1_macvtap: left promiscuous mode [ 525.090492][ T4292] veth0_macvtap: left promiscuous mode [ 525.090979][ T4292] veth1_vlan: left promiscuous mode [ 525.091398][ T4292] veth0_vlan: left promiscuous mode [ 525.534863][ T5738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 525.545479][ T5738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 526.881366][ T5738] hsr_slave_0: entered promiscuous mode [ 526.882966][ T5738] hsr_slave_1: entered promiscuous mode [ 527.454395][ T5738] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 527.475312][ T5738] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 527.483541][ T5738] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 527.501427][ T5738] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 528.556782][ T5738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 533.374897][ T5738] veth0_vlan: entered promiscuous mode [ 533.445027][ T5738] veth1_vlan: entered promiscuous mode [ 533.475886][ T6174] syz.1.405[6174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.476274][ T6174] syz.1.405[6174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.477764][ T6174] syz.1.405[6174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.723978][ T5738] veth0_macvtap: entered promiscuous mode [ 533.755001][ T5738] veth1_macvtap: entered promiscuous mode [ 533.940379][ T5738] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.940924][ T5738] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.941266][ T5738] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.941601][ T5738] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.971018][ T31] audit: type=1400 audit(533.860:386): avc: denied { remove_name } for pid=2927 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 533.971910][ T31] audit: type=1400 audit(533.860:387): avc: denied { rename } for pid=2927 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 534.143291][ T31] audit: type=1400 audit(534.030:388): avc: denied { read write } for pid=3113 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 534.150450][ T31] audit: type=1400 audit(534.040:389): avc: denied { open } for pid=3113 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 534.169084][ T31] audit: type=1400 audit(534.050:390): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 534.170142][ T31] audit: type=1400 audit(534.050:391): avc: denied { mounton } for pid=5738 comm="syz-executor" path="/syzkaller.AUvEWy/syz-tmp" dev="vda" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 534.170883][ T31] audit: type=1400 audit(534.050:392): avc: denied { mount } for pid=5738 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 534.171765][ T31] audit: type=1400 audit(534.050:393): avc: denied { mounton } for pid=5738 comm="syz-executor" path="/syzkaller.AUvEWy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 534.172899][ T31] audit: type=1400 audit(534.050:394): avc: denied { mount } for pid=5738 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 534.173698][ T31] audit: type=1400 audit(534.060:395): avc: denied { read } for pid=2927 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 534.912660][ T6183] Invalid ELF header magic: != ELF [ 536.329255][ T6194] netlink: 240 bytes leftover after parsing attributes in process `syz.0.413'. [ 536.453085][ T6194] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.601983][ T6194] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.671651][ T6194] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.761256][ T6194] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.980577][ T6194] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 537.057106][ T6194] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 537.111444][ T6194] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 537.141282][ T6194] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 540.592853][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 540.592970][ T31] audit: type=1400 audit(540.480:452): avc: denied { block_suspend } for pid=6233 comm="syz.0.422" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 541.479692][ T31] audit: type=1400 audit(541.360:453): avc: denied { execmem } for pid=6243 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 542.853106][ T31] audit: type=1400 audit(542.740:454): avc: denied { create } for pid=6246 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 542.868433][ T31] audit: type=1400 audit(542.750:455): avc: denied { write } for pid=6246 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 542.869252][ T31] audit: type=1400 audit(542.750:456): avc: denied { nlmsg_write } for pid=6246 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 543.789066][ T31] audit: type=1400 audit(543.650:457): avc: denied { mounton } for pid=6250 comm="syz.0.427" path="/9/file0" dev="tmpfs" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 544.458850][ T31] audit: type=1400 audit(544.330:458): avc: denied { unmount } for pid=5738 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 544.643882][ T31] audit: type=1400 audit(544.530:459): avc: denied { name_bind } for pid=6255 comm="syz.0.428" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 544.645536][ T31] audit: type=1400 audit(544.530:460): avc: denied { node_bind } for pid=6255 comm="syz.0.428" saddr=fc02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 547.512624][ T6276] pim6reg: entered allmulticast mode [ 547.521898][ T6276] pim6reg: left allmulticast mode [ 547.955899][ T6286] netlink: 140 bytes leftover after parsing attributes in process `syz.1.439'. [ 548.931892][ T6291] netlink: 4 bytes leftover after parsing attributes in process `syz.0.441'. [ 549.042564][ T6294] pim6reg: entered allmulticast mode [ 549.059188][ T6294] pim6reg: left allmulticast mode [ 559.348709][ T31] audit: type=1400 audit(559.230:461): avc: denied { ioctl } for pid=6306 comm="syz.1.446" path="socket:[7656]" dev="sockfs" ino=7656 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 562.573871][ T31] audit: type=1400 audit(562.460:462): avc: denied { create } for pid=6311 comm="syz.0.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 562.585735][ T31] audit: type=1400 audit(562.470:463): avc: denied { setopt } for pid=6311 comm="syz.0.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 563.271234][ T6334] pim6reg: entered allmulticast mode [ 563.581126][ T31] audit: type=1326 audit(563.470:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6337 comm="syz.0.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 563.592812][ T31] audit: type=1326 audit(563.480:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6337 comm="syz.0.450" exe="/syz-executor" sig=0 arch=40000028 syscall=278 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 563.593473][ T31] audit: type=1326 audit(563.480:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6337 comm="syz.0.450" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.889055][ T31] audit: type=1326 audit(564.770:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.897502][ T31] audit: type=1326 audit(564.780:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130cb8 code=0x7ffc0000 [ 564.909093][ T31] audit: type=1326 audit(564.780:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130cb8 code=0x7ffc0000 [ 564.909955][ T31] audit: type=1326 audit(564.780:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.910541][ T31] audit: type=1326 audit(564.780:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.911154][ T31] audit: type=1326 audit(564.780:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=133 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.911740][ T31] audit: type=1326 audit(564.780:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 564.912351][ T31] audit: type=1326 audit(564.800:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6343 comm="syz.0.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 566.091642][ T31] audit: type=1400 audit(565.980:475): avc: denied { write } for pid=6351 comm="syz.0.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 566.245302][ T31] audit: type=1400 audit(566.130:476): avc: denied { create } for pid=6353 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 577.473395][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 577.473496][ T31] audit: type=1400 audit(577.360:483): avc: denied { bind } for pid=6365 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 577.474961][ T31] audit: type=1400 audit(577.360:484): avc: denied { name_bind } for pid=6365 comm="syz.1.462" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 577.476586][ T31] audit: type=1400 audit(577.360:485): avc: denied { node_bind } for pid=6365 comm="syz.1.462" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 577.480804][ T31] audit: type=1400 audit(577.370:486): avc: denied { getopt } for pid=6365 comm="syz.1.462" laddr=::ffff:0.0.0.0 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 577.481542][ T31] audit: type=1400 audit(577.370:487): avc: denied { connect } for pid=6365 comm="syz.1.462" laddr=::ffff:0.0.0.0 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 577.485022][ T31] audit: type=1400 audit(577.370:488): avc: denied { name_connect } for pid=6365 comm="syz.1.462" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 577.671328][ T6366] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 577.691025][ T31] audit: type=1400 audit(577.580:489): avc: denied { write } for pid=6365 comm="syz.1.462" laddr=::ffff:172.20.20.170 lport=20000 faddr=::ffff:172.20.20.170 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 578.621023][ T6372] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 578.621572][ T6372] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 578.622263][ T6372] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 582.224019][ T31] audit: type=1400 audit(582.110:490): avc: denied { ioctl } for pid=6383 comm="syz.1.470" path="socket:[7746]" dev="sockfs" ino=7746 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 582.225657][ T31] audit: type=1400 audit(582.110:491): avc: denied { setopt } for pid=6383 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 582.226308][ T31] audit: type=1400 audit(582.110:492): avc: denied { write } for pid=6383 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 583.622028][ T31] audit: type=1326 audit(583.500:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 583.629778][ T31] audit: type=1326 audit(583.500:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 583.630532][ T31] audit: type=1326 audit(583.510:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 583.638658][ T31] audit: type=1400 audit(583.520:496): avc: denied { create } for pid=6397 comm="syz.1.477" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 583.639529][ T31] audit: type=1326 audit(583.520:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 583.640209][ T31] audit: type=1400 audit(583.520:498): avc: denied { map } for pid=6397 comm="syz.1.477" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6642 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 583.640980][ T31] audit: type=1400 audit(583.520:499): avc: denied { read write } for pid=6397 comm="syz.1.477" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6642 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 583.668531][ T31] audit: type=1326 audit(583.550:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 583.723021][ T31] audit: type=1326 audit(583.610:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 583.724872][ T31] audit: type=1326 audit(583.610:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6397 comm="syz.1.477" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 597.788447][ C0] sched: DL replenish lagged too much [ 612.915669][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 612.915788][ T31] audit: type=1400 audit(612.750:521): avc: denied { ioctl } for pid=6444 comm="syz.1.496" path="socket:[7817]" dev="sockfs" ino=7817 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 613.369934][ T31] audit: type=1400 audit(613.040:522): avc: denied { bind } for pid=6444 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 613.630901][ T31] audit: type=1400 audit(613.520:523): avc: denied { write } for pid=6444 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 617.542879][ T31] audit: type=1400 audit(617.430:524): avc: denied { create } for pid=6450 comm="syz.1.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 664.777900][ T31] audit: type=1400 audit(664.660:525): avc: denied { create } for pid=6485 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 665.068716][ T31] audit: type=1400 audit(664.950:526): avc: denied { bind } for pid=6485 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 665.541281][ T31] audit: type=1400 audit(665.400:527): avc: denied { listen } for pid=6485 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 665.885526][ T31] audit: type=1400 audit(665.770:528): avc: denied { connect } for pid=6485 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 666.963550][ T31] audit: type=1400 audit(666.830:529): avc: denied { write } for pid=6485 comm="syz.1.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 681.557748][ T6502] wireguard0: entered promiscuous mode [ 682.103430][ T6502] wireguard0: entered allmulticast mode [ 711.427628][ T6522] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.560469][ T6522] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 720.060204][ T31] audit: type=1400 audit(719.940:530): avc: denied { execute } for pid=6533 comm="syz.1.522" name="file1" dev="tmpfs" ino=1473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 720.061143][ T31] audit: type=1400 audit(719.940:531): avc: denied { execute_no_trans } for pid=6533 comm="syz.1.522" path="/281/file1" dev="tmpfs" ino=1473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 722.561053][ T6522] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.177365][ T6522] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.604874][ T6539] sch_tbf: peakrate 6 is lower than or equals to rate 705765376 ! [ 731.132113][ T6522] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 731.650045][ T6522] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 735.724141][ T31] audit: type=1400 audit(735.600:532): avc: denied { execute } for pid=6552 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 735.747323][ T31] audit: type=1400 audit(735.620:533): avc: denied { execute_no_trans } for pid=6552 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 737.777488][ T31] audit: type=1400 audit(737.660:534): avc: denied { append } for pid=6553 comm="syz.1.526" name="001" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 738.931879][ T31] audit: type=1400 audit(738.760:535): avc: denied { mounton } for pid=6555 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 740.076007][ T6522] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 745.722645][ T6522] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.402317][ T31] audit: type=1326 audit(769.280:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6585 comm="syz.1.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 769.403212][ T31] audit: type=1326 audit(769.280:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6585 comm="syz.1.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 770.465445][ T31] audit: type=1326 audit(770.350:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6585 comm="syz.1.530" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 770.466373][ T31] audit: type=1326 audit(770.350:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6585 comm="syz.1.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 770.467031][ T31] audit: type=1326 audit(770.350:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6585 comm="syz.1.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 784.969674][ T31] audit: type=1400 audit(784.850:541): avc: denied { bind } for pid=6590 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 789.964728][ T31] audit: type=1326 audit(789.810:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6593 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 789.965680][ T31] audit: type=1326 audit(789.820:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6593 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 798.413630][ T31] audit: type=1326 audit(798.300:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 798.415251][ T31] audit: type=1326 audit(798.300:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 799.770825][ T31] audit: type=1326 audit(799.650:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 799.773401][ T31] audit: type=1326 audit(799.660:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 799.774181][ T31] audit: type=1326 audit(799.660:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 800.876439][ T31] audit: type=1326 audit(800.740:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 800.877397][ T31] audit: type=1326 audit(800.760:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 800.965116][ T31] audit: type=1326 audit(800.850:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 802.147074][ T31] audit: type=1326 audit(801.990:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 802.147627][ T31] audit: type=1326 audit(801.990:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6597 comm="syz.1.534" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 888.005884][ T3166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 892.032036][ T3166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 896.253225][ T3166] bond0 (unregistering): Released all slaves [ 902.973250][ T3166] hsr_slave_0: left promiscuous mode [ 903.741728][ T3166] hsr_slave_1: left promiscuous mode [ 908.013457][ T3166] veth1_macvtap: left promiscuous mode [ 908.045343][ T3166] veth0_macvtap: left promiscuous mode [ 908.109581][ T3166] veth1_vlan: left promiscuous mode [ 908.173862][ T3166] veth0_vlan: left promiscuous mode [ 1029.081607][ T32] INFO: task kworker/0:0:8 blocked for more than 430 seconds. [ 1029.082587][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1029.092464][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1029.092944][ T32] task:kworker/0:0 state:D stack:0 pid:8 tgid:8 ppid:2 flags:0x00000000 [ 1029.093646][ T32] Workqueue: events bpf_prog_free_deferred [ 1029.094700][ T32] Call trace: [ 1029.095067][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1029.095628][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df839da4 r5:82e35400 [ 1029.095947][ T32] r4:82e35400 [ 1029.096181][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1029.096502][ T32] r5:82e35400 r4:827174e0 [ 1029.096670][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1029.097053][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1029.097387][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df839e20 [ 1029.097652][ T32] r4:00000000 [ 1029.097800][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1029.357121][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1029.357272][ T31] audit: type=1400 audit(1029.230:566): avc: denied { write } for pid=3107 comm="syz-executor" path="pipe:[1440]" dev="pipefs" ino=1440 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1029.526508][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1029.527060][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1029.527417][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85278240 [ 1029.527725][ T32] r4:00000000 [ 1029.527897][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1029.591202][ T32] r9:82e35400 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f23a000 [ 1029.591381][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1029.591597][ T32] r5:00001000 r4:dfd23000 [ 1029.591692][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1029.591884][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1029.592078][ T32] r5:852cdb54 r4:852cd800 [ 1029.592194][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1029.592404][ T32] r7:dddd00c0 r6:82c18000 r5:852cdb54 r4:82c0bf80 [ 1029.592532][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1029.592733][ T32] r10:82e35400 r9:82c0bfac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1029.592962][ T32] r4:82c0bf80 [ 1029.593050][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1029.593240][ T32] r10:00000000 r9:df819e48 r8:82cb58c0 r7:82c0bf80 r6:80266a2c r5:82e35400 [ 1029.593493][ T32] r4:82cb5180 [ 1029.593579][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1029.593862][ T32] Exception stack(0xdf839fb0 to 0xdf839ff8) [ 1029.594089][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1029.594323][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1029.594565][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1029.594779][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82cb5180 [ 1029.595411][ T32] INFO: task kworker/0:16:5171 blocked for more than 430 seconds. [ 1029.595585][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1029.595760][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1029.595890][ T32] task:kworker/0:16 state:D stack:0 pid:5171 tgid:5171 ppid:2 flags:0x00000000 [ 1029.596141][ T32] Workqueue: events bpf_prog_free_deferred [ 1029.596292][ T32] Call trace: [ 1029.596376][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1029.596571][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfdf5da4 r5:834f0000 [ 1029.596743][ T32] r4:834f0000 [ 1029.596885][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1029.597087][ T32] r5:834f0000 r4:827174e0 [ 1029.597231][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1029.597458][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1029.597670][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf5e20 [ 1029.954072][ T32] r4:00000000 [ 1029.954401][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1029.954876][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1029.955227][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1029.955571][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a3c0 [ 1029.955878][ T32] r4:00000000 [ 1029.956037][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1029.956369][ T32] r9:834f0000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f246000 [ 1029.956644][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1029.957029][ T32] r5:00001000 r4:dfec7000 [ 1029.957224][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1029.957567][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1029.974453][ T32] r5:84a70354 r4:84a70000 [ 1029.974751][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1029.975123][ T32] r7:dddd00c0 r6:82c18000 r5:84a70354 r4:851d2a00 [ 1029.975331][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1029.975669][ T32] r10:834f0000 r9:851d2a2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1029.975988][ T32] r4:851d2a00 [ 1029.976135][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1029.976432][ T32] r10:00000000 r9:e00c9e78 r8:851d1b40 r7:851d2a00 r6:80266a2c r5:834f0000 [ 1029.976704][ T32] r4:851d1300 [ 1029.976905][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1029.977209][ T32] Exception stack(0xdfdf5fb0 to 0xdfdf5ff8) [ 1029.977442][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1029.977759][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1030.014211][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1030.015896][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851d1300 [ 1030.016637][ T32] INFO: task kworker/1:22:5175 blocked for more than 430 seconds. [ 1030.016974][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1030.017189][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1030.017471][ T32] task:kworker/1:22 state:D stack:0 pid:5175 tgid:5175 ppid:2 flags:0x00000000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1030.017870][ T32] Workqueue: events bpf_prog_free_deferred [ 1030.719874][ T32] Call trace: [ 1030.719987][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1030.720164][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfd6dda4 r5:834f6000 [ 1030.720322][ T32] r4:834f6000 [ 1030.720399][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1030.720593][ T32] r5:834f6000 r4:827174e0 [ 1030.720688][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1030.720971][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1030.721189][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd6de20 [ 1030.721407][ T32] r4:00000000 [ 1030.721490][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1030.721717][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1030.721913][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1030.722150][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85170080 [ 1030.722344][ T32] r4:00000000 [ 1030.722427][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1030.722603][ T32] r9:834f6000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f240000 [ 1030.722840][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1030.723114][ T32] r5:00001000 r4:dfe55000 [ 1030.723226][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1030.723485][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1030.723745][ T32] r5:85003354 r4:85003000 [ 1030.723862][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1030.724073][ T32] r7:ddde40c0 r6:82c18200 r5:85003354 r4:84673500 [ 1030.724284][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1030.724531][ T32] r10:834f6000 r9:8467352c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1030.724725][ T32] r4:84673500 [ 1030.724867][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1030.725096][ T32] r10:00000000 r9:dfc9de78 r8:849bc380 r7:84673500 r6:80266a2c r5:834f6000 [ 1030.725267][ T32] r4:845a1a40 [ 1030.725348][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1030.725499][ T32] Exception stack(0xdfd6dfb0 to 0xdfd6dff8) [ 1030.725620][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1030.725777][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1030.725938][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1030.726075][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:845a1a40 [ 1030.726322][ T32] INFO: task kworker/1:23:5180 blocked for more than 431 seconds. [ 1030.726485][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1030.726655][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1030.726801][ T32] task:kworker/1:23 state:D stack:0 pid:5180 tgid:5180 ppid:2 flags:0x00000000 [ 1030.727026][ T32] Workqueue: events bpf_prog_free_deferred [ 1030.727160][ T32] Call trace: [ 1030.727246][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1030.727401][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfe95da4 r5:83645400 [ 1030.727538][ T32] r4:83645400 [ 1030.727611][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1030.727816][ T32] r5:83645400 r4:827174e0 [ 1030.745449][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1030.745827][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1030.746092][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe95e20 [ 1030.746294][ T32] r4:00000000 [ 1030.746428][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1030.746681][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1030.746858][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1030.747073][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66b00 [ 1030.747243][ T32] r4:00000000 [ 1030.747328][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1030.747524][ T32] r9:83645400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f236000 [ 1030.747711][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1030.856409][ T32] r5:00001000 r4:df9e9000 [ 1030.856682][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1030.857092][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1030.857440][ T32] r5:83fd1b54 r4:83fd1800 [ 1030.857622][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1031.412227][ T32] r7:ddde40c0 r6:82c18200 r5:83fd1b54 r4:84673b00 [ 1031.412463][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1031.412683][ T32] r10:83645400 r9:84673b2c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1031.412888][ T32] r4:84673b00 [ 1031.412980][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1031.413172][ T32] r10:00000000 r9:dfd6de78 r8:849f5800 r7:84673b00 r6:80266a2c r5:83645400 [ 1031.413344][ T32] r4:845a1700 [ 1031.413426][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1031.413574][ T32] Exception stack(0xdfe95fb0 to 0xdfe95ff8) [ 1031.413712][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1031.413895][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1031.414048][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1031.414201][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:845a1700 [ 1031.414429][ T32] INFO: task kworker/1:24:5196 blocked for more than 432 seconds. [ 1031.414614][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1031.414783][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1031.414949][ T32] task:kworker/1:24 state:D stack:0 pid:5196 tgid:5196 ppid:2 flags:0x00000000 [ 1031.415187][ T32] Workqueue: events bpf_prog_free_deferred [ 1031.415426][ T32] Call trace: [ 1031.415608][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1031.415942][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dff51da4 r5:83643000 [ 1031.416257][ T32] r4:83643000 [ 1031.416414][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1031.416789][ T32] r5:83643000 r4:827174e0 [ 1031.416992][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1031.417408][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1031.417806][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff51e20 [ 1031.580447][ T32] r4:00000000 [ 1031.580637][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1031.580892][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1031.581069][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1031.581268][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849aef80 [ 1031.581558][ T32] r4:00000000 [ 1031.581737][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1031.582093][ T32] r9:83643000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f232000 [ 1031.582394][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1031.582692][ T32] r5:00001000 r4:dfc4b000 [ 1031.582805][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1031.583002][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1031.583212][ T32] r5:845f1754 r4:845f1400 [ 1031.583318][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1031.583529][ T32] r7:ddde40c0 r6:82c18200 r5:845f1754 r4:84673e80 [ 1031.583657][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1031.583826][ T32] r10:83643000 r9:84673eac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1031.583975][ T32] r4:84673e80 [ 1031.584053][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1031.584207][ T32] r10:00000000 r9:dfc9de78 r8:85189f00 r7:84673e80 r6:80266a2c r5:83643000 [ 1031.584348][ T32] r4:851e5ac0 [ 1031.584424][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1031.584575][ T32] Exception stack(0xdff51fb0 to 0xdff51ff8) [ 1031.584690][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1031.584886][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1031.585034][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1031.585168][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851e5ac0 [ 1031.585369][ T32] INFO: task kworker/1:27:5208 blocked for more than 432 seconds. [ 1031.585563][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1031.585670][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1031.585904][ T32] task:kworker/1:27 state:D stack:0 pid:5208 tgid:5208 ppid:2 flags:0x00000000 [ 1031.586251][ T32] Workqueue: events bpf_prog_free_deferred [ 1031.586491][ T32] Call trace: [ 1031.586662][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1031.586944][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfaf9da4 r5:82ebe000 [ 1031.587207][ T32] r4:82ebe000 [ 1031.587330][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1031.587498][ T32] r5:82ebe000 r4:827174e0 [ 1031.587590][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1031.587772][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1031.671237][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e20 [ 1031.671533][ T32] r4:00000000 [ 1031.671652][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1031.671878][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1031.672096][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1031.672315][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037dc0 [ 1031.672498][ T32] r4:00000000 [ 1031.672622][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1031.672890][ T32] r9:82ebe000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f238000 [ 1031.673070][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1031.673295][ T32] r5:00001000 r4:dfced000 [ 1031.673428][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1031.673643][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1031.673861][ T32] r5:83fd2754 r4:83fd2400 [ 1031.674002][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1031.674257][ T32] r7:ddde40c0 r6:82c18200 r5:83fd2754 r4:84673600 [ 1031.674497][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1031.674820][ T32] r10:82ebe000 r9:8467362c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1031.675096][ T32] r4:84673600 [ 1031.676260][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1031.677831][ T32] r10:00000000 r9:dfafde78 r8:85173640 r7:84673600 r6:80266a2c r5:82ebe000 [ 1031.747552][ T32] r4:851c1740 [ 1031.747753][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1031.760081][ T32] Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) [ 1031.760377][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1031.760673][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1031.760949][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1031.761107][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851c1740 [ 1031.761338][ T32] INFO: task kworker/1:28:5217 blocked for more than 432 seconds. [ 1031.761589][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1031.761780][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1031.762038][ T32] task:kworker/1:28 state:D stack:0 pid:5217 tgid:5217 ppid:2 flags:0x00000000 [ 1031.762353][ T32] Workqueue: events bpf_prog_free_deferred [ 1031.762575][ T32] Call trace: [ 1031.762730][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1031.763029][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfb29da4 r5:82ebd400 [ 1031.763268][ T32] r4:82ebd400 [ 1031.763413][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1031.763691][ T32] r5:82ebd400 r4:827174e0 [ 1031.763850][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1031.764199][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1031.764510][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e20 [ 1031.764766][ T32] r4:00000000 [ 1031.764906][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1031.921584][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1031.921904][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1031.922122][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9080 [ 1031.922297][ T32] r4:00000000 [ 1031.922413][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1031.922626][ T32] r9:82ebd400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f234000 [ 1031.922841][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1031.923092][ T32] r5:00001000 r4:dfcb5000 [ 1031.923226][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1031.923437][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1031.923657][ T32] r5:845f3b54 r4:845f3800 [ 1031.923795][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1031.924038][ T32] r7:ddde40c0 r6:82c18200 r5:845f3b54 r4:84673800 [ 1031.924206][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1031.924441][ T32] r10:82ebd400 r9:8467382c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 1031.924620][ T32] r4:84673800 [ 1031.924744][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1031.924983][ T32] r10:00000000 r9:dfafde78 r8:849cd640 r7:84673800 r6:80266a2c r5:82ebd400 [ 1031.925165][ T32] r4:8518a280 [ 1031.925317][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1031.925517][ T32] Exception stack(0xdfb29fb0 to 0xdfb29ff8) [ 1031.925700][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1031.925938][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1031.926136][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1031.926318][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8518a280 [ 1031.926553][ T32] INFO: task kworker/0:20:5258 blocked for more than 432 seconds. [ 1031.926783][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1031.926961][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1031.927213][ T32] task:kworker/0:20 state:D stack:0 pid:5258 tgid:5258 ppid:2 flags:0x00000000 [ 1031.927563][ T32] Workqueue: events bpf_prog_free_deferred [ 1031.927763][ T32] Call trace: [ 1031.927856][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1031.933249][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfcadda4 r5:84b41800 [ 1031.933425][ T32] r4:84b41800 [ 1031.933534][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1031.933745][ T32] r5:84b41800 r4:827174e0 [ 1031.933871][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1031.934100][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1031.934338][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade20 [ 1031.934515][ T32] r4:00000000 [ 1031.934661][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1031.934866][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1031.935079][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1031.935355][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da140 [ 1031.935537][ T32] r4:00000000 [ 1031.935675][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1031.935901][ T32] r9:84b41800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f23e000 [ 1031.936082][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1031.936301][ T32] r5:00001000 r4:dfe1b000 [ 1031.936435][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1031.936647][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1031.936916][ T32] r5:85002f54 r4:85002c00 [ 1031.937094][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1031.937319][ T32] r7:dddd00c0 r6:82c18000 r5:85002f54 r4:8544b900 [ 1031.937454][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1031.937709][ T32] r10:84b41800 r9:8544b92c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1032.236702][ T32] r4:8544b900 [ 1032.237049][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1032.237426][ T32] r10:00000000 r9:dfec1e78 r8:85183b80 r7:8544b900 r6:80266a2c r5:84b41800 [ 1032.237734][ T32] r4:85183bc0 [ 1032.557471][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1032.575602][ T32] Exception stack(0xdfcadfb0 to 0xdfcadff8) [ 1032.576864][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1032.577330][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1032.577640][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1032.799002][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85183bc0 [ 1032.799753][ T32] INFO: task kworker/0:22:5286 blocked for more than 433 seconds. [ 1032.800037][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1032.800230][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1032.800496][ T32] task:kworker/0:22 state:D stack:0 pid:5286 tgid:5286 ppid:2 flags:0x00000000 [ 1032.800851][ T32] Workqueue: events bpf_prog_free_deferred [ 1032.801082][ T32] Call trace: [ 1032.801253][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1032.801526][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e008dda4 r5:84b40000 [ 1032.801694][ T32] r4:84b40000 [ 1032.801785][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1032.801977][ T32] r5:84b40000 r4:827174e0 [ 1032.802084][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1032.802289][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1032.802543][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de20 [ 1032.802758][ T32] r4:00000000 [ 1032.802865][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1032.803100][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1032.803375][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1032.803657][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3500 [ 1032.803874][ T32] r4:00000000 [ 1032.803975][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1032.804262][ T32] r9:84b40000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f23c000 [ 1032.804515][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1032.804827][ T32] r5:00001000 r4:dfe19000 [ 1032.805009][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1032.805297][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1032.805601][ T32] r5:845e6f54 r4:845e6c00 [ 1032.805768][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1032.806101][ T32] r7:dddd00c0 r6:82c18000 r5:845e6f54 r4:8544bb00 [ 1032.806309][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1032.806610][ T32] r10:84b40000 r9:8544bb2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1032.806860][ T32] r4:8544bb00 [ 1032.807021][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1032.807303][ T32] r10:00000000 r9:dfcd5e78 r8:8425b140 r7:8544bb00 r6:80266a2c r5:84b40000 [ 1032.807552][ T32] r4:8425b980 [ 1032.807693][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1033.255444][ T32] Exception stack(0xe008dfb0 to 0xe008dff8) [ 1033.255887][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1033.256232][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1033.256557][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1033.256878][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8425b980 [ 1033.257287][ T32] INFO: task kworker/0:25:5359 blocked for more than 434 seconds. [ 1033.257744][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1033.604688][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1033.605182][ T32] task:kworker/0:25 state:D stack:0 pid:5359 tgid:5359 ppid:2 flags:0x00000000 [ 1033.605567][ T32] Workqueue: events bpf_prog_free_deferred [ 1033.605852][ T32] Call trace: [ 1033.606039][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1033.606364][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfc95da4 r5:84a33c00 [ 1033.606662][ T32] r4:84a33c00 [ 1033.606836][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1033.607200][ T32] r5:84a33c00 r4:827174e0 [ 1033.607392][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1033.607684][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1034.003847][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e20 [ 1034.004143][ T32] r4:00000000 [ 1034.004236][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1034.004446][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1034.004707][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1034.004950][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5400 [ 1034.005118][ T32] r4:00000000 [ 1034.005207][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1034.005391][ T32] r9:84a33c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f00f000 [ 1034.005594][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1034.005953][ T32] r5:00001000 r4:df9a1000 [ 1034.006138][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1034.006470][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1034.006825][ T32] r5:83fd3754 r4:83fd3400 [ 1034.006983][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1034.007194][ T32] r7:dddd00c0 r6:82c18000 r5:83fd3754 r4:85006400 [ 1034.007376][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1034.007584][ T32] r10:84a33c00 r9:8500642c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1034.007758][ T32] r4:85006400 [ 1034.007880][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1034.018819][ T32] r10:00000000 r9:e05c9e78 r8:85462d80 r7:85006400 r6:80266a2c r5:84a33c00 [ 1034.019128][ T32] r4:85462e80 [ 1034.019288][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1034.019606][ T32] Exception stack(0xdfc95fb0 to 0xdfc95ff8) [ 1034.019830][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1034.020114][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1034.020389][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1034.020641][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85462e80 [ 1034.020988][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1034.021788][ T32] INFO: task kworker/0:26:5386 blocked for more than 434 seconds. [ 1034.022055][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1034.022270][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1034.022569][ T32] task:kworker/0:26 state:D stack:0 pid:5386 tgid:5386 ppid:2 flags:0x00000000 [ 1034.022914][ T32] Workqueue: events bpf_prog_free_deferred [ 1034.023151][ T32] Call trace: [ 1034.023331][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1034.023626][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfd45da4 r5:844f0c00 [ 1034.023895][ T32] r4:844f0c00 [ 1034.024050][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1034.024349][ T32] r5:844f0c00 r4:827174e0 [ 1034.024521][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1034.024888][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1034.025221][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e20 [ 1034.025481][ T32] r4:00000000 [ 1034.025637][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1034.025947][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1034.026243][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1034.026552][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a540 [ 1034.026822][ T32] r4:00000000 [ 1034.026966][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1034.027258][ T32] r9:844f0c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f244000 [ 1034.027510][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1034.027812][ T32] r5:00001000 r4:dfe7d000 [ 1034.373052][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1034.375228][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1034.376537][ T32] r5:84a73754 r4:84a73400 [ 1034.553564][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1034.554054][ T32] r7:dddd00c0 r6:82c18000 r5:84a73754 r4:84aa4980 [ 1034.554273][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1034.554612][ T32] r10:844f0c00 r9:84aa49ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1034.554897][ T32] r4:84aa4980 [ 1034.555056][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1034.555369][ T32] r10:00000000 r9:e0035e78 r8:854afa00 r7:84aa4980 r6:80266a2c r5:844f0c00 [ 1034.555639][ T32] r4:854af740 [ 1034.555808][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1034.556085][ T32] Exception stack(0xdfd45fb0 to 0xdfd45ff8) [ 1034.556311][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1034.556584][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1034.556933][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1034.557188][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:854af740 [ 1034.557460][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1034.557787][ T32] INFO: task kworker/0:28:5391 blocked for more than 435 seconds. [ 1034.795312][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 1034.795765][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1034.796084][ T32] task:kworker/0:28 state:D stack:0 pid:5391 tgid:5391 ppid:2 flags:0x00000000 [ 1034.796525][ T32] Workqueue: events bpf_prog_free_deferred [ 1034.796968][ T32] Call trace: [ 1034.797180][ T32] [<819bb294>] (__schedule) from [<819bbed4>] (schedule+0x2c/0xfc) [ 1034.797545][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e05e1da4 r5:844f4800 [ 1035.313376][ T32] r4:844f4800 [ 1035.314383][ T32] [<819bbea8>] (schedule) from [<819bc288>] (schedule_preempt_disabled+0x18/0x24) [ 1035.315382][ T32] r5:844f4800 r4:827174e0 [ 1035.315591][ T32] [<819bc270>] (schedule_preempt_disabled) from [<819bed60>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 1035.496637][ T32] [<819bea78>] (__mutex_lock.constprop.0) from [<819bf62c>] (__mutex_lock_slowpath+0x14/0x18) [ 1035.515679][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e20 [ 1035.566788][ T32] r4:00000000 [ 1035.567854][ T32] [<819bf618>] (__mutex_lock_slowpath) from [<819bf66c>] (mutex_lock+0x3c/0x40) [ 1035.584878][ T32] [<819bf630>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 1035.585273][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 1035.585627][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ef040 [ 1035.585943][ T32] r4:00000000 [ 1035.586110][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 1035.586442][ T32] r9:844f4800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f242000 [ 1035.586753][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 1035.587140][ T32] r5:00001000 r4:dfe5d000 [ 1035.587329][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 1035.587682][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 1035.599319][ T32] r5:85002754 r4:85002400 [ 1035.600319][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1035.600780][ T32] r7:dddd00c0 r6:82c18000 r5:85002754 r4:84aa4c80 [ 1035.601027][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1035.601384][ T32] r10:844f4800 r9:84aa4cac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 1035.601701][ T32] r4:84aa4c80 [ 1035.601859][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1035.602141][ T32] r10:00000000 r9:e04a9e78 r8:849ae000 r7:84aa4c80 r6:80266a2c r5:844f4800 [ 1035.602424][ T32] r4:849aefc0 [ 1035.602582][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1035.602958][ T32] Exception stack(0xe05e1fb0 to 0xe05e1ff8) [ 1035.603202][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1035.603519][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1035.603848][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1035.604128][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:849aefc0 [ 1035.604430][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1035.605277][ T32] NMI backtrace for cpu 1 [ 1035.605697][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 1035.606119][ T32] Hardware name: ARM-Versatile Express [ 1035.606381][ T32] Call trace: [ 1035.606585][ T32] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 1035.606948][ T32] r7:00000000 r6:00000113 r5:60000193 r4:8203d394 [ 1035.607187][ T32] [<81998ebc>] (show_stack) from [<819b7380>] (dump_stack_lvl+0x70/0x7c) [ 1035.607511][ T32] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 1035.607950][ T32] r5:00000001 r4:00000001 [ 1035.608203][ T32] [<819b738c>] (dump_stack) from [<81986098>] (nmi_cpu_backtrace+0x160/0x17c) [ 1035.608575][ T32] [<81985f38>] (nmi_cpu_backtrace) from [<819861e4>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1035.609062][ T32] r7:00000001 r6:8260c5d0 r5:8261a88c r4:ffffffff [ 1035.609331][ T32] [<819860b4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1035.609885][ T32] r9:00011f4f r8:828b6cf8 r7:8260c730 r6:00007f20 r5:8261ae48 r4:84914b1c [ 1035.610217][ T32] [<802103d0>] (arch_trigger_cpumask_backtrace) from [<803580d0>] (watchdog+0x498/0x5b8) [ 1035.610610][ T32] [<80357c38>] (watchdog) from [<8026fc84>] (kthread+0x104/0x134) [ 1035.610971][ T32] r10:00000000 r9:df819e58 r8:82ce7700 r7:00000000 r6:80357c38 r5:82ea3c00 [ 1035.611299][ T32] r4:82f846c0 [ 1035.611469][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1035.611818][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1035.612138][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1035.612486][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1035.612881][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1035.613188][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f846c0 [ 1035.622792][ T32] Sending NMI from CPU 1 to CPUs 0: [ 1035.623623][ C0] NMI backtrace for cpu 0 [ 1035.623761][ C0] CPU: 0 UID: 0 PID: 3166 Comm: kworker/u8:2 Not tainted 6.12.0-rc2-syzkaller #0 [ 1035.623815][ C0] Hardware name: ARM-Versatile Express [ 1035.623848][ C0] Workqueue: netns cleanup_net [ 1035.623923][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 1035.623962][ C0] LR is at debug_check_no_obj_freed+0x184/0x2a0 [ 1035.623989][ C0] pc : [<819c46e8>] lr : [<80855cd0>] psr: 60000013 [ 1035.624009][ C0] sp : df801a90 ip : df801aa0 fp : df801a9c [ 1035.624026][ C0] r10: 81c63c38 r9 : 85212540 r8 : 85212600 [ 1035.624046][ C0] r7 : 81491f28 r6 : 00000100 r5 : 00000000 r4 : 00000000 [ 1035.624067][ C0] r3 : 000006bf r2 : 00001355 r1 : 00000013 r0 : 828e6b5c [ 1035.624136][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1035.624172][ C0] Control: 30c5387d Table: 843d3c40 DAC: fffffffd [ 1035.624211][ C0] Call trace: frame pointer underflow [ 1035.624247][ C0] [<819c46c0>] (_raw_spin_unlock_irqrestore) from [<80855cd0>] (debug_check_no_obj_freed+0x184/0x2a0) [ 1035.624276][ C0] [<80855b4c>] (debug_check_no_obj_freed) from [<804ca7f4>] (kmem_cache_free+0x2d4/0x494) [ 1035.624314][ C0] r10:81c63c38 r9:84214800 r8:000b8a88 r7:81491f28 r6:ddeb1a88 r5:85212540 [ 1035.624323][ C0] r4:82cac780 [ 1035.624330][ C0] [<804ca520>] (kmem_cache_free) from [<81491f28>] (kfree_skbmem+0x94/0xa8) [ 1035.624362][ C0] r10:81c63c38 r9:8423ee94 r8:83ff42c0 r7:8404dc58 r6:df801c74 r5:81638510 [ 1035.624371][ C0] r4:85212540 [ 1035.624377][ C0] [<81491e94>] (kfree_skbmem) from [<81499ab0>] (consume_skb+0x84/0x130) [ 1035.624398][ C0] [<81499a2c>] (consume_skb) from [<81638510>] (nft_synproxy_do_eval+0x264/0x2b4) [ 1035.624427][ C0] r7:8404dc58 r6:df801c74 r5:844b8000 r4:85212540 [ 1035.624434][ C0] [<816382ac>] (nft_synproxy_do_eval) from [<8163858c>] (nft_synproxy_eval+0x14/0x18) [ 1035.624463][ C0] r9:df801d0c r8:81c63db8 r7:81c63b24 r6:81c63ae0 r5:8404dc60 r4:8404dc50 [ 1035.624471][ C0] [<81638578>] (nft_synproxy_eval) from [<81601d54>] (nft_do_chain+0x12c/0x570) [ 1035.624495][ C0] [<81601c28>] (nft_do_chain) from [<8161a480>] (nft_do_chain_inet+0xac/0x120) [ 1035.624525][ C0] r10:dddd10c8 r9:850deda0 r8:df801d64 r7:85212540 r6:850ded80 r5:00000004 [ 1035.624534][ C0] r4:8514acb0 [ 1035.624541][ C0] [<8161a3d4>] (nft_do_chain_inet) from [<815c9a08>] (nf_hook_slow+0x40/0x104) [ 1035.624569][ C0] r4:00000001 [ 1035.624576][ C0] [<815c99c8>] (nf_hook_slow) from [<8165a090>] (ip_local_deliver+0xf0/0x110) [ 1035.624609][ C0] r9:00000040 r8:00000034 r7:00000000 r6:844b8000 r5:82ff7000 r4:85212540 [ 1035.624617][ C0] [<81659fa0>] (ip_local_deliver) from [<816591ec>] (ip_rcv_finish+0x98/0xb0) [ 1035.624643][ C0] r6:82ff7000 r5:844b8000 r4:85212540 [ 1035.624650][ C0] [<81659154>] (ip_rcv_finish) from [<8165a184>] (ip_rcv+0xd4/0xe0) [ 1035.624676][ C0] r7:00000000 r6:844b8000 r5:85212540 r4:00000001 [ 1035.624683][ C0] [<8165a0b0>] (ip_rcv) from [<814b97d8>] (__netif_receive_skb_one_core+0x5c/0x80) [ 1035.624719][ C0] r6:00000000 r5:8165a0b0 r4:82ff7000 [ 1035.624727][ C0] [<814b977c>] (__netif_receive_skb_one_core) from [<814b9844>] (__netif_receive_skb+0x18/0x5c) [ 1035.624795][ C0] r5:dddd11b0 r4:85212540 [ 1035.624804][ C0] [<814b982c>] (__netif_receive_skb) from [<814b9b4c>] (process_backlog+0xa0/0x17c) [ 1035.624832][ C0] r5:dddd11b0 r4:85212540 [ 1035.624839][ C0] [<814b9aac>] (process_backlog) from [<814baa58>] (__napi_poll+0x34/0x240) [ 1035.624871][ C0] r10:dddd10c0 r9:dddd1300 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd11b0 [ 1035.624879][ C0] r4:00000001 [ 1035.624885][ C0] [<814baa24>] (__napi_poll) from [<814bb2cc>] (net_rx_action+0x358/0x440) [ 1035.624917][ C0] r9:dddd1300 r8:df801ed0 r7:0000012c r6:00011f53 r5:dddd11b0 r4:00000000 [ 1035.624923][ C0] [<814baf74>] (net_rx_action) from [<8024b524>] (handle_softirqs+0x158/0x464) [ 1035.624963][ C0] r10:00000008 r9:84214800 r8:00000101 r7:04208060 r6:00000003 r5:00000004 [ 1035.624972][ C0] r4:8260408c [ 1035.624978][ C0] [<8024b3cc>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 1035.625032][ C0] r10:00000000 r9:84739a00 r8:84740078 r7:00000000 r6:8473a0a0 r5:00000001 [ 1035.625041][ C0] r4:60000013 [ 1035.625047][ C0] [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14) [ 1035.625070][ C0] [<802087f0>] (____do_softirq) from [<81968288>] (call_with_stack+0x1c/0x20) [ 1035.625098][ C0] [<8196826c>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c) [ 1035.625121][ C0] [<80208804>] (do_softirq_own_stack) from [<8024ba3c>] (do_softirq+0x5c/0x64) [ 1035.625145][ C0] [<8024b9e0>] (do_softirq) from [<8024bb10>] (__local_bh_enable_ip+0xcc/0xd0) [ 1035.625170][ C0] r5:00000001 r4:84214800 [ 1035.625176][ C0] [<8024ba44>] (__local_bh_enable_ip) from [<819c459c>] (_raw_spin_unlock_bh+0x34/0x38) [ 1035.625202][ C0] r5:0000007c r4:83fd1400 [ 1035.625208][ C0] [<819c4568>] (_raw_spin_unlock_bh) from [<8175cd34>] (addrconf_ifdown+0x138/0x764) [ 1035.625255][ C0] [<8175cbfc>] (addrconf_ifdown) from [<81762048>] (addrconf_notify+0x98/0x770) [ 1035.625314][ C0] r10:84214800 r9:00000000 r8:ffffffd4 r7:00000002 r6:84739a00 r5:83fd1400 [ 1035.625326][ C0] r4:84204000 [ 1035.625332][ C0] [<81761fb0>] (addrconf_notify) from [<80271474>] (notifier_call_chain+0x74/0x1ac) [ 1035.625366][ C0] r10:84214800 r9:00000000 r8:ffffffd4 r7:00000001 r6:827e46fc r5:827e5528 [ 1035.625375][ C0] r4:81761fb0 [ 1035.625381][ C0] [<80271400>] (notifier_call_chain) from [<80271690>] (raw_notifier_call_chain+0x20/0x28) [ 1035.625412][ C0] r10:821f8558 r9:00000000 r8:84204000 r7:00000001 r6:84739a00 r5:00000002 [ 1035.625421][ C0] r4:df989d34 [ 1035.625427][ C0] [<80271670>] (raw_notifier_call_chain) from [<814b3674>] (call_netdevice_notifiers_info+0x54/0xa0) [ 1035.625451][ C0] [<814b3620>] (call_netdevice_notifiers_info) from [<814b3b10>] (dev_close_many+0xfc/0x150) [ 1035.625480][ C0] r6:df989da0 r5:848f0800 r4:8420411c [ 1035.625487][ C0] [<814b3a14>] (dev_close_many) from [<814beef4>] (unregister_netdevice_many_notify+0x194/0x9c0) [ 1035.625518][ C0] r9:00000001 r8:df989da0 r7:8504c11c r6:df989e20 r5:8477c11c r4:df989d0c [ 1035.625525][ C0] [<814bed60>] (unregister_netdevice_many_notify) from [<814c0398>] (default_device_exit_batch+0x308/0x388) [ 1035.625554][ C0] r10:df989e88 r9:844b8000 r8:df989ea8 r7:82920f00 r6:df989e88 r5:84739ae4 [ 1035.625562][ C0] r4:847399e0 [ 1035.625568][ C0] [<814c0090>] (default_device_exit_batch) from [<814a35d0>] (ops_exit_list+0x64/0x68) [ 1035.625598][ C0] r10:ffffffd8 r9:844b8000 r8:827d21c4 r7:df989ea8 r6:827d287c r5:df989ea8 [ 1035.625606][ C0] r4:827d287c [ 1035.625613][ C0] [<814a356c>] (ops_exit_list) from [<814a4714>] (cleanup_net+0x2a0/0x48c) [ 1035.625641][ C0] r7:df989ea8 r6:827d2180 r5:827d21c4 r4:827d287c [ 1035.625649][ C0] [<814a4474>] (cleanup_net) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 1035.625731][ C0] r10:82c1b615 r9:84214800 r8:02000000 r7:82c0e600 r6:82c1b600 r5:827d2198 [ 1035.625744][ C0] r4:8425e900 [ 1035.625752][ C0] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 1035.625786][ C0] r10:84214800 r9:8425e92c r8:61c88647 r7:82c0e620 r6:82604d40 r5:82c0e600 [ 1035.625794][ C0] r4:8425e900 [ 1035.625800][ C0] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 1035.625829][ C0] r10:00000000 r9:df845e78 r8:8443d500 r7:8425e900 r6:80266a2c r5:84214800 [ 1035.625837][ C0] r4:8443d0c0 [ 1035.625844][ C0] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1035.625864][ C0] Exception stack(0xdf989fb0 to 0xdf989ff8) [ 1035.625879][ C0] 9fa0: 00000000 00000000 00000000 00000000 [ 1035.625895][ C0] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1035.625908][ C0] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1035.625926][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8443d0c0 [ 1035.859635][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1035.860568][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 1035.860985][ T32] Hardware name: ARM-Versatile Express [ 1035.861247][ T32] Call trace: [ 1035.861474][ T32] [<81998dd8>] (dump_backtrace) from [<81998ed4>] (show_stack+0x18/0x1c) [ 1035.861880][ T32] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 1035.862151][ T32] [<81998ebc>] (show_stack) from [<819b7364>] (dump_stack_lvl+0x54/0x7c) [ 1035.862515][ T32] [<819b7310>] (dump_stack_lvl) from [<819b73a4>] (dump_stack+0x18/0x1c) [ 1035.862889][ T32] r5:00000000 r4:82870d18 [ 1035.863332][ T32] [<819b738c>] (dump_stack) from [<81999a00>] (panic+0x120/0x374) [ 1035.863630][ T32] [<819998e0>] (panic) from [<80357f50>] (watchdog+0x318/0x5b8) [ 1035.863965][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8203de94 [ 1035.864210][ T32] r7:8260c730 [ 1035.864369][ T32] [<80357c38>] (watchdog) from [<8026fc84>] (kthread+0x104/0x134) [ 1035.864718][ T32] r10:00000000 r9:df819e58 r8:82ce7700 r7:00000000 r6:80357c38 r5:82ea3c00 [ 1035.865057][ T32] r4:82f846c0 [ 1035.865219][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1035.865539][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1035.865797][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1035.866114][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1035.866405][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1035.866662][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f846c0 [ 1035.868916][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:04:57 Registers: info registers vcpu 0 CPU#0 R00=844b8000 R01=02caa2d0 R02=00000000 R03=00000000 R04=00000014 R05=aa1414ac R06=0000234e R07=aec33e1f R08=8423f780 R09=df8019a8 R10=844b1a00 R11=df801984 R12=00000005 R13=df801918 R14=00000000 R15=816bd688 PSR=60000113 -ZC- A S svc32 s00=08000000 s01=00000000 d00=0000000008000000 s02=f4000000 s03=fffa53ac d01=fffa53acf4000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=019c0a12 s09=ffc2901c d04=ffc2901c019c0a12 s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=01769aa4 s13=005d23ea d06=005d23ea01769aa4 s14=00000000 s15=00000000 d07=0000000000000000 s16=fe000000 s17=ff1f0fc0 d08=ff1f0fc0fe000000 s18=cc000000 s19=0000cec7 d09=0000cec7cc000000 s20=00b25e9a s21=005d23eb d10=005d23eb00b25e9a s22=00000000 s23=00000000 d11=0000000000000000 s24=0b9c0a12 s25=00000000 d12=000000000b9c0a12 s26=f4000000 s27=fffa53ac d13=fffa53acf4000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=ff8252da s33=007a0b35 d16=007a0b35ff8252da s34=ffffffff s35=00000000 d17=00000000ffffffff s36=ff2989f9 s37=ff3b88b4 d18=ff3b88b4ff2989f9 s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=01362bb2 s43=00000000 d21=0000000001362bb2 s44=00000002 s45=00000000 d22=0000000000000002 s46=006763e6 s47=00000000 d23=00000000006763e6 s48=ff5c4406 s49=ff1f0fc0 d24=ff1f0fc0ff5c4406 s50=07ac6a12 s51=00000000 d25=0000000007ac6a12 s52=ffc1b68f s53=01e89db2 d26=01e89db2ffc1b68f s54=ff8d2272 s55=fefc8664 d27=fefc8664ff8d2272 s56=015d18cb s57=00802bde d28=00802bde015d18cb s58=004015ef s59=ff8d2272 d29=ff8d2272004015ef s60=f8977f32 s61=fffa53ac d30=fffa53acf8977f32 s62=d1efa000 s63=fffbeb53 d31=fffbeb53d1efa000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=80000193 R01=8531dec8 R02=00000101 R03=85526000 R04=844b8000 R05=00000000 R06=851ffb40 R07=df8059d0 R08=00000000 R09=aa1414ac R10=83ce3794 R11=df805a8c R12=df8059b0 R13=df8059c0 R14=8024ba94 R15=815d7264 PSR=60000113 -ZC- A S svc32 s00=04000000 s01=00000000 d00=0000000004000000 s02=2c000000 s03=ffe45e32 d01=ffe45e322c000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=00104395 s09=00407cf2 d04=00407cf200104395 s10=00000000 s11=00000000 d05=0000000000000000 s12=ff42bf07 s13=00a21273 d06=00a21273ff42bf07 s14=ffffffff s15=00000000 d07=00000000ffffffff s16=fe000000 s17=f728b0ff d08=f728b0fffe000000 s18=38000000 s19=00008291 d09=0000829138000000 s20=00b8f01c s21=00a21277 d10=00a2127700b8f01c s22=00000000 s23=00000000 d11=0000000000000000 s24=06104395 s25=00000000 d12=0000000006104395 s26=2c000000 s27=ffe45e32 d13=ffe45e322c000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=00a75266 s33=00aea889 d16=00aea88900a75266 s34=00000000 s35=00000000 d17=0000000000000000 s36=ff9e2852 s37=ff8dbb68 d18=ff8dbb68ff9e2852 s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=00c3d9d4 s43=00000000 d21=0000000000c3d9d4 s44=00000001 s45=00000000 d22=0000000000000001 s46=0041489c s47=00000000 d23=000000000041489c s48=fe8d1380 s49=f728b0ff d24=f728b0fffe8d1380 s50=04d86394 s51=00000000 d25=0000000004d86394 s52=fe33417b s53=fe71a8a8 d26=fe71a8a8fe33417b s54=006ea1a2 s55=00bf834a d27=00bf834a006ea1a2 s56=00b3d06a s57=fe69fb72 d28=fe69fb7200b3d06a s58=ff34fdb9 s59=006ea1a2 d29=006ea1a2ff34fdb9 s60=2dfc5c38 s61=ffe45e32 d30=ffe45e322dfc5c38 s62=9f37e001 s63=004624bf d31=004624bf9f37e001 FPSCR: 00000000