last executing test programs: 3m31.414744402s ago: executing program 0 (id=686): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 3m26.475103142s ago: executing program 0 (id=690): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x129c81, 0x0) ppoll(&(0x7f0000000140)=[{r3}], 0x1, 0x0, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "02341f9b1000007e4f00"}) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) splice(r3, 0x0, r2, 0x0, 0x7ffff000, 0x0) 3m13.52452465s ago: executing program 0 (id=708): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200), 0xfffffd9d) 3m13.192796234s ago: executing program 0 (id=709): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000003000000610200000200000000000000", @ANYRES32, @ANYBLOB="000000000100000000003e3ceb0e3908003143f3", @ANYRES32=r2], 0x48) 3m12.833345834s ago: executing program 0 (id=710): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x11) 3m8.12151659s ago: executing program 0 (id=714): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000001, 0x5d031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r4, &(0x7f00000002c0)=ANY=[], 0x200002e6) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) pipe2$9p(&(0x7f00000013c0), 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socket$inet6(0xa, 0x802, 0x0) 37.045913859s ago: executing program 1 (id=746): setxattr$trusted_overlay_upper(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', &(0x7f0000000180), &(0x7f00000002c0)={0x0, 0xfb, 0xe6, 0x0, 0x90, "6906b39246ea5061e7f66f55c50e128a", "10cd1388c62cdde7935c8724a090293e5011a47dab8002e27aa65e79bc54b23c706894dcbe720d4832259872d8e9b1069530b38286d09ba526f37607a7e06c80dc447fc95a32bd023e7a70e9d32fa773bf31b23ea45162bd0906e9b5aee40d038c19ef22b8c3082df77a1f73b578900b620490131b61b93991d12132873a4cfd14b2ac0c2c376f90d3026f0d3406f594b9ab6a923bb0c8f37d33c8332b80bb5598a34fff272ebf8721c06672a182dbb5c62725a4a900054bec29eaa584353de0e37f37c12cf6c0e28bcb848939835f82a7"}, 0xe6, 0x1) 33.894460421s ago: executing program 1 (id=747): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0xff2e) write$binfmt_script(r0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 23.09595166s ago: executing program 1 (id=748): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000120018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 14.676652307s ago: executing program 1 (id=749): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x11, 0x3, 0x300, &(0x7f0000000000)) 8.484386071s ago: executing program 1 (id=750): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) 0s ago: executing program 1 (id=751): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) kernel console output (not intermixed with test programs): ed from eth3 [ 86.593381][ T3115] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.605759][ T3115] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.614887][ T3115] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.622942][ T3115] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.381963][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.497402][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.808119][ T3116] veth0_vlan: entered promiscuous mode [ 90.846010][ T3116] veth1_vlan: entered promiscuous mode [ 90.919002][ T3115] veth0_vlan: entered promiscuous mode [ 90.949669][ T3116] veth0_macvtap: entered promiscuous mode [ 90.956915][ T3116] veth1_macvtap: entered promiscuous mode [ 90.958868][ T3115] veth1_vlan: entered promiscuous mode [ 91.017933][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.018412][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.018650][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.018872][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.058156][ T3115] veth0_macvtap: entered promiscuous mode [ 91.108966][ T3115] veth1_macvtap: entered promiscuous mode [ 91.200778][ T31] audit: type=1400 audit(91.090:93): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.208597][ T31] audit: type=1400 audit(91.100:94): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.8DwJzE/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.211286][ T31] audit: type=1400 audit(91.100:95): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.236164][ T31] audit: type=1400 audit(91.130:96): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.8DwJzE/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.236557][ T3115] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.237646][ T3115] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.238180][ T3115] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.238553][ T3115] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.241151][ T31] audit: type=1400 audit(91.130:97): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.8DwJzE/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2336 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.262085][ T31] audit: type=1400 audit(91.150:98): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.279886][ T31] audit: type=1400 audit(91.170:99): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.281001][ T31] audit: type=1400 audit(91.170:100): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.281936][ T31] audit: type=1400 audit(91.170:101): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.282737][ T31] audit: type=1400 audit(91.170:102): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 91.392567][ T3116] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.658871][ T3797] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2'. [ 93.592273][ T3813] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 100.273559][ C1] hrtimer: interrupt took 5187264 ns [ 100.296385][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 100.296492][ T31] audit: type=1400 audit(100.190:137): avc: denied { create } for pid=3841 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 100.307154][ T31] audit: type=1400 audit(100.200:138): avc: denied { write } for pid=3841 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 100.310266][ T31] audit: type=1400 audit(100.200:139): avc: denied { nlmsg_write } for pid=3841 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 100.698842][ T31] audit: type=1400 audit(100.590:140): avc: denied { create } for pid=3843 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 100.729514][ T31] audit: type=1400 audit(100.620:141): avc: denied { connect } for pid=3843 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.800980][ T31] audit: type=1400 audit(103.690:142): avc: denied { ioctl } for pid=3851 comm="syz.1.22" path="socket:[2024]" dev="sockfs" ino=2024 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 107.862696][ T31] audit: type=1326 audit(107.750:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.874078][ T31] audit: type=1326 audit(107.750:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.875338][ T31] audit: type=1326 audit(107.770:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.876774][ T31] audit: type=1326 audit(107.770:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.877456][ T31] audit: type=1326 audit(107.770:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.887615][ T31] audit: type=1326 audit(107.770:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.888440][ T31] audit: type=1326 audit(107.780:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 107.889067][ T31] audit: type=1326 audit(107.780:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.1.22" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 108.678899][ T31] audit: type=1400 audit(108.560:151): avc: denied { create } for pid=3856 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.680201][ T31] audit: type=1400 audit(108.560:152): avc: denied { setopt } for pid=3856 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 113.009657][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 113.009821][ T31] audit: type=1400 audit(112.900:154): avc: denied { create } for pid=3869 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 113.066916][ T31] audit: type=1400 audit(112.960:155): avc: denied { ioctl } for pid=3869 comm="syz.1.28" path="socket:[2423]" dev="sockfs" ino=2423 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 119.783005][ T31] audit: type=1400 audit(119.670:156): avc: denied { create } for pid=3886 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 120.074218][ T31] audit: type=1400 audit(119.950:157): avc: denied { bind } for pid=3886 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 120.099604][ T31] audit: type=1400 audit(119.960:158): avc: denied { write } for pid=3886 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 121.698447][ T31] audit: type=1326 audit(121.590:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 121.701373][ T31] audit: type=1326 audit(121.590:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 121.716274][ T31] audit: type=1326 audit(121.610:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 121.747361][ T31] audit: type=1326 audit(121.630:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 121.749344][ T31] audit: type=1326 audit(121.640:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=352 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 121.750977][ T31] audit: type=1326 audit(121.640:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3899 comm="syz.0.39" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 122.208508][ T31] audit: type=1400 audit(122.100:165): avc: denied { load_policy } for pid=3906 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 122.221081][ T3907] SELinux: failed to load policy [ 126.367621][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 126.436471][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 126.517725][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 126.558713][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 127.328818][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 127.378621][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 127.385043][ T11] bond0 (unregistering): Released all slaves [ 127.541001][ T11] hsr_slave_0: left promiscuous mode [ 127.576570][ T11] hsr_slave_1: left promiscuous mode [ 127.619877][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 127.620019][ T31] audit: type=1400 audit(127.510:183): avc: denied { create } for pid=3912 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 127.625237][ T11] veth1_macvtap: left promiscuous mode [ 127.625844][ T11] veth0_macvtap: left promiscuous mode [ 127.626271][ T11] veth1_vlan: left promiscuous mode [ 127.626720][ T11] veth0_vlan: left promiscuous mode [ 127.647266][ T31] audit: type=1400 audit(127.540:184): avc: denied { create } for pid=3912 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 133.561988][ T3951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.615332][ T3951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.572317][ T3951] hsr_slave_0: entered promiscuous mode [ 136.575862][ T3951] hsr_slave_1: entered promiscuous mode [ 136.577463][ T3951] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 136.577667][ T3951] Cannot create hsr debugfs directory [ 137.568588][ T3951] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 137.590147][ T3951] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 137.599794][ T3951] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 137.620516][ T3951] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 139.876751][ T3951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 144.408277][ T4343] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4343 comm=syz.1.58 [ 144.429167][ T31] audit: type=1400 audit(144.320:185): avc: denied { name_bind } for pid=4341 comm="syz.1.58" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 144.430612][ T31] audit: type=1400 audit(144.320:186): avc: denied { node_bind } for pid=4341 comm="syz.1.58" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 144.521086][ T4343] netlink: 60 bytes leftover after parsing attributes in process `syz.1.58'. [ 145.659328][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.769339][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.927852][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.011429][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.529651][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 146.546179][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 146.550563][ T11] bond0 (unregistering): Released all slaves [ 146.731655][ T11] hsr_slave_0: left promiscuous mode [ 146.762343][ T11] hsr_slave_1: left promiscuous mode [ 146.795571][ T11] veth1_macvtap: left promiscuous mode [ 146.798714][ T11] veth0_macvtap: left promiscuous mode [ 146.817476][ T11] veth1_vlan: left promiscuous mode [ 146.824157][ T11] veth0_vlan: left promiscuous mode [ 149.391144][ T3951] veth0_vlan: entered promiscuous mode [ 149.502515][ T3951] veth1_vlan: entered promiscuous mode [ 149.749952][ T3951] veth0_macvtap: entered promiscuous mode [ 149.767348][ T3951] veth1_macvtap: entered promiscuous mode [ 149.846173][ T3951] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.846507][ T3951] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.846721][ T3951] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.846921][ T3951] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 151.588742][ T31] audit: type=1400 audit(151.480:187): avc: denied { create } for pid=4516 comm=F2880C scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 152.676619][ T4362] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.828081][ T4362] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.934979][ T31] audit: type=1326 audit(152.820:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.937688][ T31] audit: type=1326 audit(152.830:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.938556][ T31] audit: type=1326 audit(152.830:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.042530][ T31] audit: type=1326 audit(152.930:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.045663][ T31] audit: type=1326 audit(152.930:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.046452][ T31] audit: type=1326 audit(152.930:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.047206][ T31] audit: type=1326 audit(152.930:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.048235][ T31] audit: type=1326 audit(152.930:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.049035][ T31] audit: type=1326 audit(152.930:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4583 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 155.129000][ T4657] Zero length message leads to an empty skb [ 156.512335][ T4362] hsr_slave_0: entered promiscuous mode [ 156.556135][ T4362] hsr_slave_1: entered promiscuous mode [ 156.659852][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 156.659994][ T31] audit: type=1400 audit(156.550:223): avc: denied { execute } for pid=4687 comm="syz.0.77" name="file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 156.660299][ T4702] process 'syz.0.77' launched './file0' with NULL argv: empty string added [ 156.716033][ T31] audit: type=1400 audit(156.610:224): avc: denied { execute_no_trans } for pid=4687 comm="syz.0.77" path="/13/file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 157.527495][ T4769] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 158.073185][ T4362] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 158.109273][ T4362] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 158.160047][ T4362] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 158.220518][ T4362] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 159.761982][ T4833] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 160.362346][ T4362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.114346][ T31] audit: type=1400 audit(162.000:225): avc: denied { create } for pid=4850 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 162.166400][ T31] audit: type=1400 audit(162.060:226): avc: denied { getopt } for pid=4850 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 162.178927][ T31] audit: type=1400 audit(162.070:227): avc: denied { setopt } for pid=4850 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 163.387146][ T4866] gretap0: refused to change device tx_queue_len [ 163.388567][ T4866] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 163.722319][ T4872] netlink: 8 bytes leftover after parsing attributes in process `syz.0.92'. [ 163.904515][ T31] audit: type=1400 audit(163.790:228): avc: denied { connect } for pid=4873 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 163.905800][ T31] audit: type=1400 audit(163.790:229): avc: denied { name_connect } for pid=4873 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 176.551511][ T4362] veth0_vlan: entered promiscuous mode [ 176.629946][ T4362] veth1_vlan: entered promiscuous mode [ 177.007648][ T4362] veth0_macvtap: entered promiscuous mode [ 177.104683][ T4362] veth1_macvtap: entered promiscuous mode [ 177.339842][ T4362] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.341791][ T4362] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.347898][ T4362] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.350170][ T4362] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 181.775178][ T4903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=4903 comm=syz.0.97 [ 182.010918][ T4905] netlink: 16 bytes leftover after parsing attributes in process `syz.0.98'. [ 182.636707][ T31] audit: type=1400 audit(182.520:230): avc: denied { create } for pid=4909 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 182.648831][ T31] audit: type=1400 audit(182.540:231): avc: denied { getopt } for pid=4909 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.614073][ T31] audit: type=1326 audit(197.500:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.615168][ T31] audit: type=1326 audit(197.500:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.615946][ T31] audit: type=1326 audit(197.500:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.687370][ T31] audit: type=1326 audit(197.580:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.692159][ T31] audit: type=1326 audit(197.580:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.705283][ T31] audit: type=1326 audit(197.580:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.706420][ T31] audit: type=1326 audit(197.580:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.707335][ T31] audit: type=1326 audit(197.580:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.708296][ T31] audit: type=1326 audit(197.590:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=392 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 197.731220][ T31] audit: type=1326 audit(197.610:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 199.659971][ T4936] mmap: syz.0.109 (4936) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 203.241273][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 203.241391][ T31] audit: type=1400 audit(203.130:250): avc: denied { setopt } for pid=4953 comm="syz.0.115" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 203.389970][ T31] audit: type=1326 audit(203.280:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 203.396048][ T31] audit: type=1326 audit(203.290:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 203.396575][ T31] audit: type=1326 audit(203.290:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 203.396970][ T31] audit: type=1326 audit(203.290:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 206.618526][ T31] audit: type=1400 audit(206.510:255): avc: denied { bind } for pid=4970 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 206.731408][ T31] audit: type=1400 audit(206.620:256): avc: denied { connect } for pid=4970 comm="syz.0.122" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 206.745873][ T31] audit: type=1400 audit(206.640:257): avc: denied { write } for pid=4970 comm="syz.0.122" laddr=fe80::a8aa:aaff:feaa:aa16 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 206.770142][ T31] audit: type=1326 audit(206.660:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 206.771809][ T31] audit: type=1326 audit(206.660:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4970 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 210.635035][ T4975] netlink: 332 bytes leftover after parsing attributes in process `syz.0.124'. [ 210.635843][ T4975] netlink: 'syz.0.124': attribute type 9 has an invalid length. [ 210.636307][ T4975] netlink: 108 bytes leftover after parsing attributes in process `syz.0.124'. [ 210.636695][ T4975] netlink: 32 bytes leftover after parsing attributes in process `syz.0.124'. [ 211.599201][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 211.599269][ T31] audit: type=1400 audit(211.490:272): avc: denied { create } for pid=4995 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 213.094984][ T31] audit: type=1400 audit(212.980:273): avc: denied { write } for pid=4986 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 213.615364][ T31] audit: type=1400 audit(213.510:274): avc: denied { write } for pid=4986 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 213.616307][ T31] audit: type=1400 audit(213.510:275): avc: denied { nlmsg_read } for pid=4986 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 216.794136][ T31] audit: type=1326 audit(216.670:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.794939][ T31] audit: type=1326 audit(216.670:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.795437][ T31] audit: type=1326 audit(216.680:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.795861][ T31] audit: type=1400 audit(216.680:279): avc: denied { create } for pid=5001 comm="+}[@" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 216.796307][ T31] audit: type=1326 audit(216.680:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.797706][ T31] audit: type=1326 audit(216.690:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.805583][ T31] audit: type=1326 audit(216.700:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=92 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.807091][ T31] audit: type=1326 audit(216.700:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.807994][ T31] audit: type=1326 audit(216.700:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 216.858369][ T31] audit: type=1400 audit(216.750:285): avc: denied { unlink } for pid=3951 comm="syz-executor" name="file0" dev="tmpfs" ino=346 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 222.038610][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 222.038675][ T31] audit: type=1400 audit(221.930:288): avc: denied { ioctl } for pid=5024 comm="syz.0.144" path="socket:[4631]" dev="sockfs" ino=4631 ioctlcmd=0x8934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 223.634547][ T31] audit: type=1400 audit(223.510:289): avc: denied { name_bind } for pid=5034 comm="syz.0.148" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 223.635651][ T31] audit: type=1400 audit(223.510:290): avc: denied { node_bind } for pid=5034 comm="syz.0.148" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 224.118159][ T31] audit: type=1326 audit(224.010:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.125129][ T31] audit: type=1326 audit(224.020:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.125799][ T31] audit: type=1326 audit(224.020:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.126317][ T31] audit: type=1326 audit(224.020:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.132537][ T31] audit: type=1326 audit(224.020:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.133125][ T31] audit: type=1326 audit(224.020:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 224.154256][ T31] audit: type=1326 audit(224.020:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5038 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 234.260421][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 234.260536][ T31] audit: type=1400 audit(234.150:325): avc: denied { create } for pid=5079 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 234.287437][ T31] audit: type=1400 audit(234.180:326): avc: denied { setopt } for pid=5079 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 235.935644][ T31] audit: type=1400 audit(235.830:327): avc: granted { setsecparam } for pid=5095 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 236.876223][ T5100] netlink: 4 bytes leftover after parsing attributes in process `syz.1.173'. [ 237.222618][ T31] audit: type=1326 audit(237.110:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5107 comm="syz.1.175" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x0 [ 240.399020][ T31] audit: type=1400 audit(240.290:329): avc: denied { connect } for pid=5114 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 241.884502][ T5120] netlink: 160 bytes leftover after parsing attributes in process `syz.1.179'. [ 241.885507][ T5120] netlink: 84 bytes leftover after parsing attributes in process `syz.1.179'. [ 241.885875][ T5120] netlink: 8 bytes leftover after parsing attributes in process `syz.1.179'. [ 242.714150][ T31] audit: type=1400 audit(242.590:330): avc: denied { create } for pid=5128 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 242.762680][ T31] audit: type=1400 audit(242.650:331): avc: denied { write } for pid=5128 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 242.776331][ T31] audit: type=1400 audit(242.670:332): avc: denied { ioctl } for pid=5128 comm="syz.1.183" path="socket:[4081]" dev="sockfs" ino=4081 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 245.574004][ T5150] serio: Serial port ptm0 [ 250.514854][ T31] audit: type=1400 audit(250.410:333): avc: denied { bind } for pid=5166 comm="syz.0.198" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 250.519560][ T31] audit: type=1400 audit(250.410:334): avc: denied { node_bind } for pid=5166 comm="syz.0.198" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 252.653696][ T31] audit: type=1400 audit(252.540:335): avc: denied { lock } for pid=5172 comm="syz.0.201" path="socket:[5172]" dev="sockfs" ino=5172 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 253.487534][ T5177] netlink: 'syz.0.203': attribute type 10 has an invalid length. [ 253.494098][ T5177] netlink: 'syz.0.203': attribute type 10 has an invalid length. [ 253.987015][ T5179] netlink: 100 bytes leftover after parsing attributes in process `syz.0.204'. [ 254.634042][ T31] audit: type=1400 audit(254.510:336): avc: denied { unmount } for pid=3951 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 258.326639][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.410716][ T5192] syz.1.210[5192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.412980][ T5192] syz.1.210[5192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.416764][ T5192] syz.1.210[5192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.446110][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.575845][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 258.699221][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.285874][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 259.312615][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 259.354833][ T11] bond0 (unregistering): Released all slaves [ 259.480219][ T11] hsr_slave_0: left promiscuous mode [ 259.484959][ T11] hsr_slave_1: left promiscuous mode [ 259.522974][ T11] veth1_macvtap: left promiscuous mode [ 259.545313][ T11] veth0_macvtap: left promiscuous mode [ 259.546160][ T11] veth1_vlan: left promiscuous mode [ 259.546532][ T11] veth0_vlan: left promiscuous mode [ 261.236306][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.317303][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.445305][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.617345][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.113812][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 262.128121][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 262.135442][ T11] bond0 (unregistering): Released all slaves [ 262.337323][ T11] hsr_slave_0: left promiscuous mode [ 262.339640][ T11] hsr_slave_1: left promiscuous mode [ 262.346055][ T11] veth1_macvtap: left promiscuous mode [ 262.346526][ T11] veth0_macvtap: left promiscuous mode [ 262.347208][ T11] veth1_vlan: left promiscuous mode [ 262.347553][ T11] veth0_vlan: left promiscuous mode [ 268.044747][ T5194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.077204][ T5194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.216245][ T5227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.265557][ T5227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.698500][ T5194] hsr_slave_0: entered promiscuous mode [ 271.704419][ T5194] hsr_slave_1: entered promiscuous mode [ 272.600076][ T5194] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 272.617927][ T5194] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 272.638383][ T5194] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 272.649374][ T5194] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 272.723312][ T5227] hsr_slave_0: entered promiscuous mode [ 272.728611][ T5227] hsr_slave_1: entered promiscuous mode [ 272.730415][ T5227] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 272.730935][ T5227] Cannot create hsr debugfs directory [ 273.386206][ T5227] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 273.403220][ T5227] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 273.411995][ T5227] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 273.426497][ T5227] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 273.867837][ T5194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.447415][ T5227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.830742][ T5194] veth0_vlan: entered promiscuous mode [ 278.871490][ T5194] veth1_vlan: entered promiscuous mode [ 278.958607][ T5227] veth0_vlan: entered promiscuous mode [ 278.998176][ T5194] veth0_macvtap: entered promiscuous mode [ 279.003252][ T5227] veth1_vlan: entered promiscuous mode [ 279.021238][ T5194] veth1_macvtap: entered promiscuous mode [ 279.132669][ T5227] veth0_macvtap: entered promiscuous mode [ 279.146450][ T5194] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.146978][ T5194] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.147357][ T5194] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.147723][ T5194] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.169616][ T5227] veth1_macvtap: entered promiscuous mode [ 279.310121][ T5227] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.310776][ T5227] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.311191][ T5227] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.311569][ T5227] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.129265][ T31] audit: type=1326 audit(280.020:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.0.219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 280.166692][ T31] audit: type=1326 audit(280.040:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.0.219" exe="/syz-executor" sig=0 arch=40000028 syscall=47 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 280.168092][ T31] audit: type=1326 audit(280.040:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6002 comm="syz.0.219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.066043][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 281.244477][ T31] audit: type=1326 audit(281.130:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.245520][ T31] audit: type=1326 audit(281.130:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.246603][ T31] audit: type=1326 audit(281.130:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.247357][ T31] audit: type=1326 audit(281.130:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.248342][ T31] audit: type=1326 audit(281.140:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.249031][ T31] audit: type=1326 audit(281.140:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=244 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.344862][ T31] audit: type=1326 audit(281.230:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6013 comm="syz.0.223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 281.558180][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 281.677734][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 281.789898][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 282.586590][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 282.665209][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 282.696553][ T11] bond0 (unregistering): Released all slaves [ 282.853015][ T11] hsr_slave_0: left promiscuous mode [ 282.917854][ T11] hsr_slave_1: left promiscuous mode [ 282.967266][ T11] veth1_macvtap: left promiscuous mode [ 282.967816][ T11] veth0_macvtap: left promiscuous mode [ 282.968400][ T11] veth1_vlan: left promiscuous mode [ 282.968993][ T11] veth0_vlan: left promiscuous mode [ 288.350313][ T6017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.367274][ T6017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.917382][ T6017] hsr_slave_0: entered promiscuous mode [ 290.921106][ T6017] hsr_slave_1: entered promiscuous mode [ 290.924184][ T6017] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.924635][ T6017] Cannot create hsr debugfs directory [ 292.694866][ T6017] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 292.799284][ T6017] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 292.832889][ T6017] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 292.856239][ T6017] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 295.587364][ T6017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.790298][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 295.791738][ T31] audit: type=1326 audit(295.680:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.796138][ T31] audit: type=1326 audit(295.690:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.801522][ T31] audit: type=1326 audit(295.690:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.804360][ T31] audit: type=1326 audit(295.690:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.805417][ T31] audit: type=1326 audit(295.690:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.808497][ T31] audit: type=1326 audit(295.700:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.811240][ T31] audit: type=1326 audit(295.700:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.812252][ T31] audit: type=1326 audit(295.700:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.830005][ T31] audit: type=1326 audit(295.720:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 295.831168][ T31] audit: type=1326 audit(295.720:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6427 comm="syz.0.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 300.050142][ T6458] Illegal XDP return value 4294967274 on prog (id 140) dev N/A, expect packet loss! [ 302.969949][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 302.970063][ T31] audit: type=1400 audit(302.860:377): avc: denied { listen } for pid=6475 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 302.973947][ T31] audit: type=1400 audit(302.860:378): avc: denied { accept } for pid=6475 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 305.926790][ T6017] veth0_vlan: entered promiscuous mode [ 305.955353][ T6017] veth1_vlan: entered promiscuous mode [ 306.162726][ T6017] veth0_macvtap: entered promiscuous mode [ 306.217818][ T6017] veth1_macvtap: entered promiscuous mode [ 306.346894][ T6017] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.351130][ T6017] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.361427][ T6017] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.383841][ T6017] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.881137][ T31] audit: type=1400 audit(307.710:379): avc: denied { connect } for pid=6516 comm="syz.1.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 308.376312][ T31] audit: type=1400 audit(308.270:380): avc: denied { create } for pid=6520 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 308.385583][ T31] audit: type=1400 audit(308.270:381): avc: denied { sys_admin } for pid=6520 comm="syz.1.271" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 308.397370][ T31] audit: type=1400 audit(308.290:382): avc: denied { checkpoint_restore } for pid=6520 comm="syz.1.271" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 310.015572][ T31] audit: type=1400 audit(309.910:383): avc: denied { listen } for pid=6525 comm="syz.1.273" lport=40260 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 310.998112][ T31] audit: type=1400 audit(310.890:384): avc: denied { accept } for pid=6525 comm="syz.1.273" lport=40260 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 311.336842][ T31] audit: type=1400 audit(311.190:385): avc: denied { write } for pid=6525 comm="syz.1.273" lport=40260 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 311.337593][ T31] audit: type=1400 audit(311.190:386): avc: denied { setopt } for pid=6525 comm="syz.1.273" lport=40260 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 311.381075][ T31] audit: type=1326 audit(311.270:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6554 comm="syz.1.274" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.395207][ T31] audit: type=1326 audit(311.290:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6554 comm="syz.1.274" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 311.396828][ T31] audit: type=1326 audit(311.290:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6554 comm="syz.1.274" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 312.358701][ T6571] syz.1.280 uses obsolete (PF_INET,SOCK_PACKET) [ 312.395314][ T6571] €: renamed from bond0 (while UP) [ 313.335900][ T6587] netlink: 12 bytes leftover after parsing attributes in process `syz.1.288'. [ 316.501529][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 316.501652][ T31] audit: type=1326 audit(316.390:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6599 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 316.515908][ T31] audit: type=1326 audit(316.400:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6599 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 316.518303][ T31] audit: type=1326 audit(316.400:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6599 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 316.524970][ T31] audit: type=1326 audit(316.400:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6599 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 316.525843][ T31] audit: type=1326 audit(316.420:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6599 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 317.249658][ T31] audit: type=1326 audit(317.140:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6603 comm="syz.0.295" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 317.251286][ T31] audit: type=1326 audit(317.140:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6603 comm="syz.0.295" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 317.260697][ T31] audit: type=1326 audit(317.150:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6603 comm="syz.0.295" exe="/syz-executor" sig=0 arch=40000028 syscall=382 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 317.269987][ T31] audit: type=1326 audit(317.160:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6603 comm="syz.0.295" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.769005][ T31] audit: type=1326 audit(330.660:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.771886][ T31] audit: type=1326 audit(330.660:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.772782][ T31] audit: type=1326 audit(330.660:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.779396][ T31] audit: type=1326 audit(330.660:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.780266][ T31] audit: type=1326 audit(330.670:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.785902][ T31] audit: type=1326 audit(330.680:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.793895][ T31] audit: type=1326 audit(330.680:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.800614][ T31] audit: type=1326 audit(330.690:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.801466][ T31] audit: type=1326 audit(330.690:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 330.802097][ T31] audit: type=1326 audit(330.690:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.0.315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 335.865269][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 335.865384][ T31] audit: type=1400 audit(335.760:466): avc: denied { mount } for pid=6697 comm="syz.1.334" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 335.934869][ T31] audit: type=1400 audit(335.820:467): avc: denied { unmount } for pid=6017 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 336.562690][ T31] audit: type=1400 audit(336.440:468): avc: denied { mounton } for pid=6705 comm="syz.1.338" path="/proc/76/task" dev="proc" ino=7614 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 336.588299][ T6706] EXT4-fs (vda): resizing filesystem from 262144 to 262144 blocks [ 337.114305][ T31] audit: type=1326 audit(337.000:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6709 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 337.117454][ T31] audit: type=1326 audit(337.010:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6709 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 337.137878][ T31] audit: type=1326 audit(337.020:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6709 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 337.182249][ T31] audit: type=1326 audit(337.040:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6709 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 337.185410][ T31] audit: type=1326 audit(337.070:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6709 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 337.973923][ T31] audit: type=1400 audit(337.810:474): avc: denied { bind } for pid=6716 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 337.976963][ T31] audit: type=1400 audit(337.870:475): avc: denied { setopt } for pid=6716 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.344238][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 345.757133][ T6818] netlink: 8 bytes leftover after parsing attributes in process `syz.1.355'. [ 345.757830][ T6818] netlink: 4 bytes leftover after parsing attributes in process `syz.1.355'. [ 346.155571][ T31] audit: type=1326 audit(346.040:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.174386][ T31] audit: type=1326 audit(346.050:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.175482][ T31] audit: type=1326 audit(346.060:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.177030][ T31] audit: type=1326 audit(346.060:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.195133][ T31] audit: type=1326 audit(346.060:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.196139][ T31] audit: type=1326 audit(346.070:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.197464][ T31] audit: type=1326 audit(346.080:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=93 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.198164][ T31] audit: type=1326 audit(346.080:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.198829][ T31] audit: type=1326 audit(346.080:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.199606][ T31] audit: type=1326 audit(346.080:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6817 comm="syz.1.355" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 346.246734][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 346.310454][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.072528][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.135749][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.925660][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 347.939179][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 347.950387][ T11] bond0 (unregistering): Released all slaves [ 348.090090][ T11] hsr_slave_0: left promiscuous mode [ 348.092433][ T11] hsr_slave_1: left promiscuous mode [ 348.150760][ T11] veth1_macvtap: left promiscuous mode [ 348.151149][ T11] veth0_macvtap: left promiscuous mode [ 348.151458][ T11] veth1_vlan: left promiscuous mode [ 348.151705][ T11] veth0_vlan: left promiscuous mode [ 349.974929][ T6912] netlink: 12 bytes leftover after parsing attributes in process `syz.1.361'. [ 350.166106][ T6912] bond0: entered promiscuous mode [ 350.388361][ T6742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 350.395738][ T6742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.271358][ T7021] syz.1.364[7021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.271829][ T7021] syz.1.364[7021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.272596][ T7021] syz.1.364[7021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.846049][ T6742] hsr_slave_0: entered promiscuous mode [ 352.852606][ T6742] hsr_slave_1: entered promiscuous mode [ 353.119955][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 353.120060][ T31] audit: type=1326 audit(353.010:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.155164][ T31] audit: type=1400 audit(353.040:498): avc: denied { remove_name } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 353.189880][ T31] audit: type=1326 audit(353.040:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.190771][ T31] audit: type=1326 audit(353.040:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.191624][ T31] audit: type=1326 audit(353.040:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.192576][ T31] audit: type=1400 audit(353.040:502): avc: denied { rename } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 353.206105][ T31] audit: type=1326 audit(353.080:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.206980][ T31] audit: type=1326 audit(353.080:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.207710][ T31] audit: type=1326 audit(353.080:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 353.208599][ T31] audit: type=1326 audit(353.100:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7063 comm="syz.1.367" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 354.737796][ T6742] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 354.800900][ T6742] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 354.821450][ T6742] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 354.832097][ T6742] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 356.798854][ T6742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 366.317402][ T6742] veth0_vlan: entered promiscuous mode [ 366.411679][ T6742] veth1_vlan: entered promiscuous mode [ 366.557824][ T6742] veth0_macvtap: entered promiscuous mode [ 366.572645][ T6742] veth1_macvtap: entered promiscuous mode [ 366.705563][ T6742] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.708757][ T6742] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.710978][ T6742] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.718678][ T6742] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 369.079715][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 369.079855][ T31] audit: type=1400 audit(368.970:518): avc: denied { relabelfrom } for pid=7347 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 369.083275][ T31] audit: type=1400 audit(368.970:519): avc: denied { relabelto } for pid=7347 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 369.610784][ T31] audit: type=1400 audit(369.500:520): avc: denied { write } for pid=7358 comm="syz.0.392" name="netstat" dev="proc" ino=4026532993 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 370.397144][ T31] audit: type=1326 audit(370.280:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.398317][ T31] audit: type=1326 audit(370.280:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.399081][ T31] audit: type=1326 audit(370.280:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.399812][ T31] audit: type=1326 audit(370.280:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.401528][ T31] audit: type=1326 audit(370.290:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.402684][ T31] audit: type=1326 audit(370.290:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 370.422303][ T31] audit: type=1326 audit(370.290:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 371.425206][ T7377] netlink: 20 bytes leftover after parsing attributes in process `syz.0.398'. [ 371.434264][ T7377] netlink: 16 bytes leftover after parsing attributes in process `syz.0.398'. [ 374.582936][ T7434] syz.1.412[7434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.586697][ T7434] syz.1.412[7434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.587512][ T7434] syz.1.412[7434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.278588][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 375.278716][ T31] audit: type=1400 audit(375.170:529): avc: denied { ioctl } for pid=7445 comm="syz.0.416" path="socket:[8673]" dev="sockfs" ino=8673 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.281587][ T31] audit: type=1400 audit(375.170:530): avc: denied { write } for pid=7445 comm="syz.0.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.594959][ T7453] netlink: 172 bytes leftover after parsing attributes in process `syz.0.418'. [ 376.210103][ T31] audit: type=1400 audit(376.100:531): avc: denied { read } for pid=7456 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 377.129810][ T31] audit: type=1400 audit(377.020:532): avc: denied { name_bind } for pid=7463 comm="syz.0.423" src=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 378.337313][ T31] audit: type=1326 audit(378.230:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.340691][ T31] audit: type=1326 audit(378.230:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.342503][ T31] audit: type=1326 audit(378.230:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.370617][ T31] audit: type=1326 audit(378.260:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.371810][ T31] audit: type=1326 audit(378.260:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 378.372890][ T31] audit: type=1326 audit(378.260:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7501 comm="syz.1.428" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 379.109214][ T7514] netlink: 16 bytes leftover after parsing attributes in process `syz.0.432'. [ 379.110136][ T7514] netlink: 12 bytes leftover after parsing attributes in process `syz.0.432'. [ 380.966597][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 380.966668][ T31] audit: type=1400 audit(380.860:545): avc: denied { connect } for pid=7525 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 381.552229][ T31] audit: type=1400 audit(381.440:546): avc: denied { read } for pid=7525 comm="syz.0.438" path="socket:[8754]" dev="sockfs" ino=8754 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 382.706101][ T31] audit: type=1400 audit(382.600:547): avc: denied { setopt } for pid=7547 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 383.343029][ T7578] netlink: 12 bytes leftover after parsing attributes in process `syz.0.444'. [ 383.360662][ T31] audit: type=1326 audit(383.250:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7574 comm="syz.1.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 383.361659][ T31] audit: type=1326 audit(383.250:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7574 comm="syz.1.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 383.362384][ T31] audit: type=1326 audit(383.250:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7574 comm="syz.1.443" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 383.363091][ T31] audit: type=1326 audit(383.250:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7574 comm="syz.1.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 383.404830][ T31] audit: type=1326 audit(383.250:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7574 comm="syz.1.443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 383.436122][ T7578] bond1: entered promiscuous mode [ 383.508802][ T7578] netlink: 4 bytes leftover after parsing attributes in process `syz.0.444'. [ 383.634654][ T7628] netlink: 3 bytes leftover after parsing attributes in process `syz.1.445'. [ 384.144330][ T31] audit: type=1400 audit(384.030:553): avc: denied { wake_alarm } for pid=7635 comm="syz.1.449" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 384.155668][ T7636] netem: incorrect ge model size [ 384.156533][ T7636] netem: change failed [ 385.605652][ T31] audit: type=1326 audit(385.480:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7654 comm="syz.0.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 386.764046][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 386.764174][ T31] audit: type=1326 audit(386.630:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7667 comm="syz.1.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 386.768836][ T31] audit: type=1326 audit(386.660:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7667 comm="syz.1.461" exe="/syz-executor" sig=0 arch=40000028 syscall=47 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 386.769682][ T31] audit: type=1326 audit(386.660:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7667 comm="syz.1.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 386.770703][ T31] audit: type=1326 audit(386.660:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7667 comm="syz.1.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.216712][ T31] audit: type=1326 audit(387.110:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.226058][ T31] audit: type=1326 audit(387.120:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.235531][ T31] audit: type=1326 audit(387.130:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.255661][ T31] audit: type=1326 audit(387.130:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.256723][ T31] audit: type=1326 audit(387.150:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 387.277410][ T31] audit: type=1326 audit(387.170:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.0.462" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 388.883812][ T7698] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 388.925334][ T7698] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 388.979641][ T7698] bond0 (unregistering): Released all slaves [ 394.041603][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 394.041723][ T31] audit: type=1326 audit(393.930:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.061796][ T31] audit: type=1326 audit(393.950:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.080267][ T7811] netlink: 48 bytes leftover after parsing attributes in process `syz.1.491'. [ 394.081625][ T31] audit: type=1326 audit(393.970:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.083015][ T31] audit: type=1326 audit(393.970:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.096398][ T31] audit: type=1326 audit(393.970:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.134042][ T31] audit: type=1326 audit(393.970:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.135332][ T31] audit: type=1326 audit(393.970:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.136510][ T31] audit: type=1326 audit(393.970:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.137989][ T31] audit: type=1326 audit(394.000:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.139150][ T31] audit: type=1326 audit(394.000:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7810 comm="syz.1.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 394.765997][ T7817] syz.0.493[7817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.770312][ T7817] syz.0.493[7817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.771072][ T7817] syz.0.493[7817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.593225][ T7821] syz.0.494[7821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.634378][ T7821] syz.0.494[7821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.635785][ T7821] syz.0.494[7821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.474364][ T7827] serio: Serial port ptm0 [ 397.866582][ T7841] netlink: 20 bytes leftover after parsing attributes in process `syz.0.500'. [ 397.867319][ T7841] netlink: 'syz.0.500': attribute type 2 has an invalid length. [ 401.945506][ T7849] pimreg: entered allmulticast mode [ 401.954728][ T7849] pimreg: left allmulticast mode [ 403.988031][ T7873] SELinux: failed to load policy [ 404.015885][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 404.404822][ T7870] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 404.590999][ T7870] usb 1-1: config 0 has no interfaces? [ 404.617801][ T7870] usb 1-1: New USB device found, idVendor=6737, idProduct=0001, bcdDevice=de.66 [ 404.618347][ T7870] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 404.618751][ T7870] usb 1-1: Product: syz [ 404.618977][ T7870] usb 1-1: Manufacturer: syz [ 404.619203][ T7870] usb 1-1: SerialNumber: syz [ 404.634702][ T7870] usb 1-1: config 0 descriptor?? [ 404.916930][ T7856] usb 1-1: USB disconnect, device number 2 [ 405.726332][ T7885] syz.0.509: attempt to access beyond end of device [ 405.726332][ T7885] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 406.207065][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 406.207154][ T31] audit: type=1326 audit(406.100:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7888 comm="syz.1.511" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 406.209211][ T31] audit: type=1326 audit(406.100:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7888 comm="syz.1.511" exe="/syz-executor" sig=0 arch=40000028 syscall=279 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 406.210654][ T31] audit: type=1326 audit(406.100:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7888 comm="syz.1.511" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 406.218451][ T31] audit: type=1326 audit(406.110:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7888 comm="syz.1.511" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 406.511309][ T31] audit: type=1400 audit(406.390:646): avc: denied { setopt } for pid=7894 comm="syz.1.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 406.581517][ T31] audit: type=1400 audit(406.470:647): avc: denied { read write } for pid=6017 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 406.582696][ T31] audit: type=1400 audit(406.470:648): avc: denied { open } for pid=6017 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 406.624675][ T31] audit: type=1400 audit(406.470:649): avc: denied { ioctl } for pid=6017 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 406.625837][ T31] audit: type=1400 audit(406.500:650): avc: denied { append } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 406.729471][ T31] audit: type=1400 audit(406.620:651): avc: denied { read } for pid=7897 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 407.055170][ T7901] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7901 comm=syz.0.515 [ 409.677166][ T7933] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 409.677602][ T7933] SELinux: failed to load policy [ 411.240113][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 411.240231][ T31] audit: type=1400 audit(411.130:727): avc: denied { ioctl } for pid=7942 comm="syz.0.529" path="socket:[9753]" dev="sockfs" ino=9753 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 411.324701][ T31] audit: type=1400 audit(411.220:728): avc: denied { write } for pid=7942 comm="syz.0.529" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 411.329119][ T31] audit: type=1400 audit(411.220:729): avc: denied { read } for pid=7942 comm="syz.0.529" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 413.111617][ T31] audit: type=1400 audit(413.000:730): avc: denied { create } for pid=7948 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 413.126759][ T31] audit: type=1400 audit(413.010:731): avc: denied { write } for pid=7948 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 413.127529][ T31] audit: type=1400 audit(413.010:732): avc: denied { read } for pid=7948 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 413.515454][ T31] audit: type=1326 audit(413.390:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7951 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 413.516160][ T31] audit: type=1326 audit(413.410:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7951 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 413.516670][ T31] audit: type=1326 audit(413.410:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7951 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 413.517206][ T31] audit: type=1326 audit(413.410:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7951 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.725547][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 416.725614][ T31] audit: type=1326 audit(416.610:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.726622][ T31] audit: type=1326 audit(416.620:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.744515][ T31] audit: type=1326 audit(416.630:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.745770][ T31] audit: type=1326 audit(416.640:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.747871][ T31] audit: type=1326 audit(416.640:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.754185][ T31] audit: type=1326 audit(416.640:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.763858][ T31] audit: type=1326 audit(416.650:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.780726][ T31] audit: type=1326 audit(416.670:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.802173][ T31] audit: type=1326 audit(416.680:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 416.814116][ T31] audit: type=1326 audit(416.700:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.1.540" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 421.765749][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 421.766214][ T31] audit: type=1400 audit(421.660:787): avc: denied { ioctl } for pid=8015 comm="syz.0.545" path="socket:[9142]" dev="sockfs" ino=9142 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.774688][ T31] audit: type=1400 audit(421.670:788): avc: denied { bind } for pid=8015 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.841380][ T31] audit: type=1400 audit(421.720:789): avc: denied { write } for pid=8015 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 422.710304][ T31] audit: type=1400 audit(422.600:790): avc: denied { ioctl } for pid=8001 comm="syz.1.542" path="/dev/loop-control" dev="devtmpfs" ino=634 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 429.067381][ T31] audit: type=1400 audit(428.960:791): avc: denied { execute } for pid=8049 comm="syz.0.553" path="/91/cpu.stat" dev="tmpfs" ino=478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 429.071050][ T31] audit: type=1400 audit(428.960:792): avc: denied { create } for pid=8049 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 429.086059][ T31] audit: type=1400 audit(428.960:793): avc: denied { setopt } for pid=8049 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 429.639776][ T31] audit: type=1400 audit(429.530:794): avc: denied { setopt } for pid=8056 comm="syz.0.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 429.641310][ T31] audit: type=1400 audit(429.530:795): avc: denied { module_request } for pid=8056 comm="syz.0.555" kmod="ip6table_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 436.381833][ T31] audit: type=1400 audit(436.260:796): avc: denied { ioctl } for pid=8090 comm="syz.0.560" path="socket:[9874]" dev="sockfs" ino=9874 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 437.236275][ T31] audit: type=1400 audit(437.130:797): avc: denied { create } for pid=8099 comm="syz.0.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 437.244752][ T31] audit: type=1400 audit(437.140:798): avc: denied { bind } for pid=8099 comm="syz.0.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 438.063868][ T31] audit: type=1326 audit(437.920:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.066280][ T31] audit: type=1326 audit(437.960:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.075207][ T31] audit: type=1326 audit(437.970:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.077664][ T31] audit: type=1326 audit(437.970:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.078464][ T31] audit: type=1326 audit(437.970:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.079537][ T31] audit: type=1326 audit(437.970:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 438.080548][ T31] audit: type=1326 audit(437.970:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8105 comm="syz.0.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.072813][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 443.072926][ T31] audit: type=1326 audit(442.960:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.084818][ T31] audit: type=1326 audit(442.970:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.085652][ T31] audit: type=1326 audit(442.980:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.088240][ T31] audit: type=1326 audit(442.980:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.114079][ T31] audit: type=1326 audit(442.980:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.115601][ T31] audit: type=1326 audit(443.000:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.116355][ T31] audit: type=1326 audit(443.000:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.120490][ T31] audit: type=1326 audit(443.010:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.121300][ T31] audit: type=1326 audit(443.010:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 443.133966][ T31] audit: type=1326 audit(443.010:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8129 comm="syz.0.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 445.008561][ T8157] SELinux: failed to load policy [ 445.294299][ T8156] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 445.511824][ T8156] usb 1-1: config 0 has no interfaces? [ 445.558972][ T8156] usb 1-1: New USB device found, idVendor=6737, idProduct=0001, bcdDevice=de.66 [ 445.559482][ T8156] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 445.559807][ T8156] usb 1-1: Product: syz [ 445.560051][ T8156] usb 1-1: Manufacturer: syz [ 445.560256][ T8156] usb 1-1: SerialNumber: syz [ 445.576656][ T8156] usb 1-1: config 0 descriptor?? [ 445.846151][ T8108] usb 1-1: USB disconnect, device number 3 [ 446.258447][ T8174] netlink: 'syz.0.587': attribute type 15 has an invalid length. [ 449.372171][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 449.372275][ T31] audit: type=1400 audit(454.257:843): avc: denied { relabelfrom } for pid=8191 comm="syz.1.593" name="NETLINK" dev="sockfs" ino=10332 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 449.391463][ T31] audit: type=1400 audit(454.257:844): avc: denied { relabelto } for pid=8191 comm="syz.1.593" name="NETLINK" dev="sockfs" ino=10332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 450.574347][ T31] audit: type=1326 audit(455.467:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8179 comm="syz.0.589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7fc00000 [ 450.599262][ T31] audit: type=1326 audit(455.487:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8179 comm="syz.0.589" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132ec0 code=0x7fc00000 [ 450.615443][ T31] audit: type=1326 audit(455.497:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8179 comm="syz.0.589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7fc00000 [ 450.709566][ T31] audit: type=1400 audit(455.597:848): avc: denied { connect } for pid=8200 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 451.285872][ T31] audit: type=1400 audit(456.177:849): avc: denied { create } for pid=8204 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 453.337062][ T31] audit: type=1326 audit(458.207:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8234 comm="syz.0.601" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 453.338029][ T31] audit: type=1326 audit(458.227:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8234 comm="syz.0.601" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 453.338699][ T31] audit: type=1326 audit(458.227:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8234 comm="syz.0.601" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 454.008493][ T8247] netlink: 48 bytes leftover after parsing attributes in process `syz.1.604'. [ 454.445230][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 454.445346][ T31] audit: type=1326 audit(459.327:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 454.446874][ T31] audit: type=1326 audit(459.337:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=269 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 454.447599][ T31] audit: type=1326 audit(459.337:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 455.285592][ T8261] smc: net device bond0 applied user defined pnetid SYZ0 [ 455.303304][ T8261] smc: net device bond0 erased user defined pnetid SYZ0 [ 458.297539][ T31] audit: type=1400 audit(463.177:876): avc: denied { bind } for pid=8305 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 458.334157][ T31] audit: type=1400 audit(463.217:877): avc: denied { setopt } for pid=8305 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 458.470340][ T31] audit: type=1326 audit(463.357:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 458.471022][ T31] audit: type=1326 audit(463.357:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 458.514546][ T31] audit: type=1326 audit(463.397:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 458.515828][ T31] audit: type=1326 audit(463.397:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 458.516890][ T31] audit: type=1326 audit(463.397:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8309 comm="syz.0.627" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.462265][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 459.462403][ T31] audit: type=1326 audit(464.347:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.475067][ T31] audit: type=1326 audit(464.357:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.476225][ T31] audit: type=1326 audit(464.357:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.488223][ T31] audit: type=1326 audit(464.377:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=135 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.489598][ T31] audit: type=1326 audit(464.377:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.490740][ T31] audit: type=1326 audit(464.377:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8317 comm="syz.0.630" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 459.705311][ T8321] can0: slcan on pts0. [ 459.755632][ T8321] can0 (unregistered): slcan off pts0. [ 460.881356][ T31] audit: type=1326 audit(465.767:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8354 comm="syz.1.638" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 460.897602][ T31] audit: type=1326 audit(465.787:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8354 comm="syz.1.638" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 460.898198][ T31] audit: type=1326 audit(465.787:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8354 comm="syz.1.638" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 460.901867][ T31] audit: type=1326 audit(465.787:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8354 comm="syz.1.638" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 462.360306][ T8377] EXT4-fs warning (device vda): verify_group_input:136: Cannot add at group 63 (only 8 groups) [ 467.005938][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 467.006065][ T31] audit: type=1400 audit(471.887:931): avc: denied { create } for pid=8400 comm="syz.1.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 468.904500][ T8407] syz.1.654[8407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.908107][ T8407] syz.1.654[8407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.938377][ T8407] syz.1.654[8407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.399132][ T31] audit: type=1400 audit(477.287:932): avc: denied { wake_alarm } for pid=8411 comm="syz.1.656" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 472.464384][ T31] audit: type=1400 audit(477.347:933): avc: denied { map } for pid=8411 comm="syz.1.656" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10214 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 472.467111][ T31] audit: type=1400 audit(477.357:934): avc: denied { read write } for pid=8411 comm="syz.1.656" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10214 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 475.871456][ T8425] netlink: 'syz.0.661': attribute type 10 has an invalid length. [ 475.897975][ T8425] netlink: 'syz.0.661': attribute type 10 has an invalid length. [ 476.198487][ T8430] pim6reg: entered allmulticast mode [ 476.698427][ T31] audit: type=1400 audit(2000000000.210:935): avc: denied { getopt } for pid=8438 comm="syz.1.666" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 476.780190][ T31] audit: type=1326 audit(2000000000.300:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 476.780885][ T31] audit: type=1326 audit(2000000000.300:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 476.793133][ T31] audit: type=1326 audit(2000000000.300:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.667" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 476.800122][ T31] audit: type=1400 audit(2000000000.310:939): avc: denied { create } for pid=8441 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 476.800663][ T31] audit: type=1326 audit(2000000000.310:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 476.801182][ T31] audit: type=1326 audit(2000000000.310:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8441 comm="syz.0.667" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.405426][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 477.405540][ T31] audit: type=1326 audit(2000000000.930:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.406972][ T31] audit: type=1326 audit(2000000000.930:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.408176][ T31] audit: type=1326 audit(2000000000.930:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.423095][ T31] audit: type=1326 audit(2000000000.930:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=269 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.424811][ T31] audit: type=1326 audit(2000000000.930:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.425616][ T31] audit: type=1326 audit(2000000000.930:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8452 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 477.840469][ T8460] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 477.948034][ T31] audit: type=1400 audit(2000000001.470:985): avc: denied { write } for pid=8461 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 478.579815][ T31] audit: type=1400 audit(2000000002.100:986): avc: denied { bind } for pid=8466 comm="syz.1.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 478.594153][ T31] audit: type=1400 audit(2000000002.110:987): avc: denied { connect } for pid=8466 comm="syz.1.673" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 479.324545][ T31] audit: type=1400 audit(2000000002.840:988): avc: denied { sys_module } for pid=8479 comm="syz.1.678" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 479.451469][ T8483] netlink: 16 bytes leftover after parsing attributes in process `syz.0.679'. [ 485.654067][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 485.654119][ T31] audit: type=1400 audit(2000000009.170:1001): avc: denied { ioctl } for pid=8529 comm="syz.1.688" path="socket:[10704]" dev="sockfs" ino=10704 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.728091][ T31] audit: type=1400 audit(2000000009.250:1002): avc: denied { setopt } for pid=8529 comm="syz.1.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 486.143987][ T31] audit: type=1400 audit(2000000009.650:1003): avc: denied { append } for pid=8532 comm="syz.0.690" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 486.338441][ T8536] netlink: 'syz.1.691': attribute type 10 has an invalid length. [ 486.831408][ T31] audit: type=1326 audit(2000000010.350:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.837045][ T31] audit: type=1326 audit(2000000010.360:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.839885][ T31] audit: type=1326 audit(2000000010.360:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.841023][ T31] audit: type=1326 audit(2000000010.360:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.852935][ T31] audit: type=1326 audit(2000000010.360:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.858657][ T31] audit: type=1326 audit(2000000010.380:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 486.860587][ T31] audit: type=1326 audit(2000000010.380:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8542 comm="syz.1.692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 489.647381][ T8557] capability: warning: `syz.1.696' uses 32-bit capabilities (legacy support in use) [ 490.472699][ T8560] netlink: 4 bytes leftover after parsing attributes in process `syz.1.697'. [ 493.902894][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 493.902956][ T31] audit: type=1326 audit(2000000017.400:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.907458][ T31] audit: type=1326 audit(2000000017.400:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.908034][ T31] audit: type=1326 audit(2000000017.400:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.908576][ T31] audit: type=1326 audit(2000000017.400:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.909053][ T31] audit: type=1326 audit(2000000017.400:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.909500][ T31] audit: type=1326 audit(2000000017.410:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.909982][ T31] audit: type=1326 audit(2000000017.410:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.910415][ T31] audit: type=1326 audit(2000000017.410:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.910883][ T31] audit: type=1326 audit(2000000017.410:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 493.911344][ T31] audit: type=1326 audit(2000000017.410:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 499.796462][ T8592] can0: slcan on ttyS3. [ 500.846660][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 500.846725][ T31] audit: type=1400 audit(2000000024.370:1041): avc: denied { create } for pid=8602 comm="syz.1.711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 500.862386][ T31] audit: type=1400 audit(2000000024.380:1042): avc: denied { map } for pid=8602 comm="syz.1.711" path="socket:[11477]" dev="sockfs" ino=11477 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 500.864907][ T31] audit: type=1400 audit(2000000024.390:1043): avc: denied { read } for pid=8602 comm="syz.1.711" path="socket:[11477]" dev="sockfs" ino=11477 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 501.312654][ T8607] syzkaller1: entered promiscuous mode [ 501.322400][ T8607] syzkaller1: entered allmulticast mode [ 504.127793][ T8590] can0 (unregistered): slcan off ttyS3. [ 507.078558][ T8624] syz.1.717[8624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.078797][ T8624] syz.1.717[8624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.079275][ T8624] syz.1.717[8624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.342944][ T8636] netlink: 256 bytes leftover after parsing attributes in process `syz.1.718'. [ 507.551272][ T31] audit: type=1400 audit(2000000031.070:1044): avc: granted { setsecparam } for pid=8651 comm="syz.1.719" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 507.720472][ T31] audit: type=1326 audit(2000000031.240:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8653 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 507.727127][ T31] audit: type=1326 audit(2000000031.250:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8653 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=448 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 507.727693][ T31] audit: type=1326 audit(2000000031.250:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8653 comm="syz.1.720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 507.862052][ T31] audit: type=1400 audit(2000000031.380:1048): avc: denied { create } for pid=8656 comm="syz.1.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 517.966156][ T23] sched: DL replenish lagged too much [ 536.056035][ T31] audit: type=1326 audit(2000000059.030:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.056658][ T31] audit: type=1326 audit(2000000059.060:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.057099][ T31] audit: type=1326 audit(2000000059.080:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.057545][ T31] audit: type=1326 audit(2000000059.090:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.057981][ T31] audit: type=1326 audit(2000000059.090:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.900377][ T31] audit: type=1326 audit(2000000060.350:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.901357][ T31] audit: type=1326 audit(2000000060.350:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.902091][ T31] audit: type=1326 audit(2000000060.350:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.902802][ T31] audit: type=1326 audit(2000000060.400:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 536.915682][ T31] audit: type=1326 audit(2000000060.420:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 548.352599][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 548.352743][ T31] audit: type=1400 audit(2000000071.840:1069): avc: denied { watch watch_reads } for pid=8699 comm="syz.1.734" path="/proc/530" dev="proc" ino=10774 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 605.198471][ T31] audit: type=1400 audit(2000000128.590:1070): avc: denied { write } for pid=8754 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.199561][ T31] audit: type=1400 audit(2000000128.590:1071): avc: denied { open } for pid=8754 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.200386][ T31] audit: type=1400 audit(2000000128.590:1072): avc: denied { getattr } for pid=8754 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.201172][ T31] audit: type=1400 audit(2000000128.590:1073): avc: denied { ioctl } for pid=8754 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 607.045449][ T31] audit: type=1400 audit(2000000130.560:1074): avc: denied { search } for pid=8754 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 608.098394][ T31] audit: type=1400 audit(2000000131.610:1075): avc: denied { read } for pid=8785 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 608.099177][ T31] audit: type=1400 audit(2000000131.610:1076): avc: denied { open } for pid=8785 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 608.099856][ T31] audit: type=1400 audit(2000000131.610:1077): avc: denied { getattr } for pid=8785 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 608.540129][ T31] audit: type=1326 audit(2000000132.060:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8769 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 608.969386][ T31] audit: type=1326 audit(2000000132.420:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8769 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 610.711845][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 610.711993][ T31] audit: type=1326 audit(2000000134.180:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8769 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 611.044961][ T31] audit: type=1326 audit(2000000134.540:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8769 comm="syz.1.741" exe="/syz-executor" sig=0 arch=40000028 syscall=336 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 613.149483][ T31] audit: type=1400 audit(2000000136.660:1095): avc: denied { read } for pid=8804 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 617.031804][ T31] audit: type=1400 audit(2000000140.550:1096): avc: denied { remove_name } for pid=8805 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 617.032506][ T31] audit: type=1400 audit(2000000140.550:1097): avc: denied { unlink } for pid=8805 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 650.424528][ T8693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 651.447045][ T8693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 688.417962][ T8693] hsr_slave_0: entered promiscuous mode [ 688.766095][ T8693] hsr_slave_1: entered promiscuous mode [ 688.959825][ T8693] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 688.960326][ T8693] Cannot create hsr debugfs directory [ 747.484606][ T32] INFO: task kworker/1:0:24 blocked for more than 430 seconds. [ 747.485623][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 747.497436][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 747.497974][ T32] task:kworker/1:0 state:D stack:0 pid:24 tgid:24 ppid:2 flags:0x00400000 [ 747.498725][ T32] Workqueue: events bpf_prog_free_deferred [ 747.499879][ T32] Call trace: [ 747.500333][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 747.500951][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df87dda4 r5:82e43000 [ 747.501345][ T32] r4:82e43000 [ 747.501605][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 747.501980][ T32] r5:82e43000 r4:827174e0 [ 747.502190][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 747.502555][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 747.502949][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df87de20 [ 747.503292][ T32] r4:00000000 [ 747.564326][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 747.564764][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 747.565160][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 747.565532][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050140 [ 747.565881][ T32] r4:00000000 [ 747.566065][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 747.566428][ T32] r9:82e43000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f047000 [ 747.566744][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 747.567125][ T32] r5:00001000 r4:dfae3000 [ 747.567322][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 747.567657][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 747.568125][ T32] r5:848a5f54 r4:848a5c00 [ 747.568323][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 747.568687][ T32] r7:ddde40c0 r6:82c18200 r5:848a5f54 r4:82cb6480 [ 747.568938][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 747.569378][ T32] r10:82e43000 r9:82cb64ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 747.569683][ T32] r4:82cb6480 [ 747.569869][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 747.570243][ T32] r10:00000000 r9:df819d48 r8:82cc8840 r7:82cb6480 r6:80266a2c r5:82e43000 [ 747.570539][ T32] r4:82cc8600 [ 747.570729][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 747.571220][ T32] Exception stack(0xdf87dfb0 to 0xdf87dff8) [ 747.571624][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 747.572009][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 747.572585][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 747.573002][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82cc8600 [ 747.592833][ T32] INFO: task kworker/1:1:48 blocked for more than 430 seconds. [ 747.861022][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 747.861451][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 747.861745][ T32] task:kworker/1:1 state:D stack:0 pid:48 tgid:48 ppid:2 flags:0x00400000 [ 747.862144][ T32] Workqueue: events bpf_prog_free_deferred [ 747.862405][ T32] Call trace: [ 747.862564][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 747.862856][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df925da4 r5:82ebe000 [ 747.863127][ T32] r4:82ebe000 [ 749.559722][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 749.560307][ T32] r5:82ebe000 r4:827174e0 [ 749.560501][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 749.560898][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 749.561306][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df925e20 [ 749.561633][ T32] r4:00000000 [ 749.561814][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 749.562187][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 749.562539][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 749.562882][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b4d00 [ 749.563199][ T32] r4:00000000 [ 749.788686][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 749.789180][ T32] r9:82ebe000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f02f000 [ 749.789456][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 749.789803][ T32] r5:00001000 r4:dfb79000 [ 749.789995][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 749.790306][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 749.790634][ T32] r5:8452b754 r4:8452b400 [ 749.790813][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 749.791166][ T32] r7:ddde40c0 r6:82c18200 r5:8452b754 r4:82fba480 [ 749.791386][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 749.791704][ T32] r10:82ebe000 r9:82fba4ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 749.792009][ T32] r4:82fba480 [ 749.792169][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 749.792470][ T32] r10:00000000 r9:df87de78 r8:82fbd000 r7:82fba480 r6:80266a2c r5:82ebe000 [ 749.792730][ T32] r4:82f90100 [ 749.792886][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 749.793169][ T32] Exception stack(0xdf925fb0 to 0xdf925ff8) [ 749.806641][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 749.806901][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 749.807177][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 749.807443][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:82f90100 [ 750.230632][ T32] INFO: task kworker/0:2:92 blocked for more than 432 seconds. [ 750.231027][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 750.231254][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 750.231513][ T32] task:kworker/0:2 state:D stack:0 pid:92 tgid:92 ppid:2 flags:0x00400000 [ 750.231889][ T32] Workqueue: events bpf_prog_free_deferred [ 750.232189][ T32] Call trace: [ 750.232366][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 750.232670][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:df975da4 r5:834b4800 [ 750.232946][ T32] r4:834b4800 [ 750.233096][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 750.246657][ T32] r5:834b4800 r4:827174e0 [ 750.246940][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 750.247369][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 750.247740][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e20 [ 750.248074][ T32] r4:00000000 [ 750.248245][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 750.248555][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 750.248903][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 750.249254][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5600 [ 750.249547][ T32] r4:00000000 [ 750.249709][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 750.250091][ T32] r9:834b4800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f03d000 [ 750.250415][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 750.250768][ T32] r5:00001000 r4:dfdc9000 [ 750.250969][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 750.251302][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 750.251784][ T32] r5:848a7f54 r4:848a7c00 [ 750.252073][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 750.252443][ T32] r7:dddd00c0 r6:82c18000 r5:848a7f54 r4:834f6c80 [ 750.252663][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 750.253012][ T32] r10:834b4800 r9:834f6cac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 753.320724][ T32] r4:834f6c80 [ 753.321079][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 753.321478][ T32] r10:00000000 r9:df839e78 r8:82ff4380 r7:834f6c80 r6:80266a2c r5:834b4800 [ 753.321794][ T32] r4:834eb7c0 [ 753.321953][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 753.322289][ T32] Exception stack(0xdf975fb0 to 0xdf975ff8) [ 753.339942][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 753.340404][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 753.340746][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 753.341059][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:834eb7c0 [ 753.341772][ T32] INFO: task kworker/1:3:2909 blocked for more than 435 seconds. [ 753.342118][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 753.342363][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 753.342675][ T32] task:kworker/1:3 state:D stack:0 pid:2909 tgid:2909 ppid:2 flags:0x00400000 [ 753.343119][ T32] Workqueue: events bpf_prog_free_deferred [ 754.278017][ T32] Call trace: [ 754.278429][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 754.278806][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:ec5a5da4 r5:8369a400 [ 754.279112][ T32] r4:8369a400 [ 754.279268][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 754.279639][ T32] r5:8369a400 r4:827174e0 [ 754.279832][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 754.280217][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 754.280708][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e20 [ 754.282478][ T32] r4:00000000 [ 754.282651][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 754.283023][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 754.660557][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 754.661154][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853965c0 [ 754.661460][ T32] r4:00000000 [ 754.661635][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 754.661970][ T32] r9:8369a400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f25a000 [ 754.662281][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 754.662673][ T32] r5:00001000 r4:e01b5000 [ 754.662879][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 754.663291][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 755.339310][ T32] r5:853cc354 r4:853cc000 [ 755.339513][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 755.339908][ T32] r7:ddde40c0 r6:82c18200 r5:853cc354 r4:841ef180 [ 755.340171][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 755.340538][ T32] r10:8369a400 r9:841ef1ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 755.340837][ T32] r4:841ef180 [ 755.340985][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 755.341303][ T32] r10:00000000 r9:df925e78 r8:84261040 r7:841ef180 r6:80266a2c r5:8369a400 [ 755.341571][ T32] r4:8419d800 [ 755.341717][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 755.342012][ T32] Exception stack(0xec5a5fb0 to 0xec5a5ff8) [ 755.342254][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 755.342554][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 755.342884][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 755.343168][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8419d800 [ 755.867033][ T32] INFO: task kworker/0:6:3808 blocked for more than 438 seconds. [ 755.868732][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 755.868975][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 755.869266][ T32] task:kworker/0:6 state:D stack:0 pid:3808 tgid:3808 ppid:2 flags:0x00400000 [ 755.869699][ T32] Workqueue: events bpf_prog_free_deferred [ 755.870021][ T32] Call trace: [ 755.870209][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 755.870540][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e0089da4 r5:844a4800 [ 755.870830][ T32] r4:844a4800 [ 755.870989][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 755.871324][ T32] r5:844a4800 r4:827174e0 [ 755.871500][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 755.871862][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 755.872271][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e20 [ 755.872568][ T32] r4:00000000 [ 755.872731][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 755.873083][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 758.746711][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 758.747614][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822f40 [ 758.748008][ T32] r4:00000000 [ 758.748191][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 758.748549][ T32] r9:844a4800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f03f000 [ 758.748874][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 758.749246][ T32] r5:00001000 r4:dfde5000 [ 758.749451][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 758.749860][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 758.750257][ T32] r5:848a6f54 r4:848a6c00 [ 758.750459][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 758.750891][ T32] r7:dddd00c0 r6:82c18000 r5:848a6f54 r4:85194380 [ 758.751161][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 758.751531][ T32] r10:844a4800 r9:851943ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 758.751873][ T32] r4:85194380 [ 758.752078][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 758.752448][ T32] r10:00000000 r9:ec779e78 r8:851efbc0 r7:85194380 r6:80266a2c r5:844a4800 [ 758.752778][ T32] r4:85069e80 [ 758.752977][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 760.267211][ T32] Exception stack(0xe0089fb0 to 0xe0089ff8) [ 760.267521][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 760.267835][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 760.268189][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 760.268445][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85069e80 [ 760.268861][ T32] INFO: task kworker/0:7:3810 blocked for more than 422 seconds. [ 760.269125][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 760.269317][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 760.269615][ T32] task:kworker/0:7 state:D stack:0 pid:3810 tgid:3810 ppid:2 flags:0x00400000 [ 760.270014][ T32] Workqueue: events bpf_prog_free_deferred [ 760.270252][ T32] Call trace: [ 760.270433][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 760.270773][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e0091da4 r5:844a3c00 [ 760.271099][ T32] r4:844a3c00 [ 760.271233][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 760.271591][ T32] r5:844a3c00 r4:827174e0 [ 760.271777][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 760.272161][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 760.272508][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e20 [ 760.272769][ T32] r4:00000000 [ 760.272932][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 761.622544][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 761.622998][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 761.634653][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f6ac0 [ 761.634937][ T32] r4:00000000 [ 761.635109][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 761.635418][ T32] r9:844a3c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f027000 [ 761.635679][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 761.636051][ T32] r5:00001000 r4:df96f000 [ 761.636174][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 761.636384][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 761.636606][ T32] r5:84524754 r4:84524400 [ 761.636711][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 761.637004][ T32] r7:dddd00c0 r6:82c18000 r5:84524754 r4:85194480 [ 761.637153][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 761.637377][ T32] r10:844a3c00 r9:851944ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 761.637551][ T32] r4:85194480 [ 761.637627][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 761.637831][ T32] r10:00000000 r9:e0089e78 r8:851efe40 r7:85194480 r6:80266a2c r5:844a3c00 [ 761.638022][ T32] r4:85069f40 [ 761.638117][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 761.638311][ T32] Exception stack(0xe0091fb0 to 0xe0091ff8) [ 761.638513][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 761.638716][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 761.638909][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 761.639107][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:85069f40 [ 761.639471][ T32] INFO: task kworker/1:6:3824 blocked for more than 444 seconds. [ 761.639767][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 761.640063][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 761.640378][ T32] task:kworker/1:6 state:D stack:0 pid:3824 tgid:3824 ppid:2 flags:0x00400000 [ 761.640819][ T32] Workqueue: events bpf_prog_free_deferred [ 761.641078][ T32] Call trace: [ 761.641206][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 761.641452][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e008dda4 r5:844a5400 [ 761.641641][ T32] r4:844a5400 [ 761.641742][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 761.641967][ T32] r5:844a5400 r4:827174e0 [ 761.642083][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 761.642516][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 761.642794][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de20 [ 761.643194][ T32] r4:00000000 [ 762.259970][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 762.260474][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 762.260883][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 762.261230][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b4b40 [ 762.261540][ T32] r4:00000000 [ 762.261723][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 762.262077][ T32] r9:844a5400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f262000 [ 762.262375][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 762.262817][ T32] r5:00001000 r4:e074f000 [ 762.263005][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 762.276569][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 762.277051][ T32] r5:85333354 r4:85333000 [ 762.277277][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 762.277673][ T32] r7:ddde40c0 r6:82c18200 r5:85333354 r4:851f1180 [ 762.277921][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 762.278300][ T32] r10:844a5400 r9:851f11ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 762.278594][ T32] r4:851f1180 [ 762.278771][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 762.279130][ T32] r10:00000000 r9:dfe89e78 r8:851e4100 r7:851f1180 r6:80266a2c r5:844a5400 [ 762.279413][ T32] r4:851e4080 [ 762.279742][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 762.280080][ T32] Exception stack(0xe008dfb0 to 0xe008dff8) [ 762.280340][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 762.280661][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 762.280973][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 762.281251][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851e4080 [ 762.281597][ T32] INFO: task kworker/1:7:3825 blocked for more than 444 seconds. [ 762.281874][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 762.282107][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 762.282410][ T32] task:kworker/1:7 state:D stack:0 pid:3825 tgid:3825 ppid:2 flags:0x00400000 [ 762.282791][ T32] Workqueue: events bpf_prog_free_deferred [ 762.283084][ T32] Call trace: [ 765.338687][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 765.339115][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e050dda4 r5:844a0000 [ 765.339334][ T32] r4:844a0000 [ 765.339504][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 765.339842][ T32] r5:844a0000 r4:827174e0 [ 765.340072][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 765.340481][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 765.340849][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de20 [ 765.341157][ T32] r4:00000000 [ 765.341329][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 765.341645][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 765.341968][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 765.342280][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6180 [ 765.342580][ T32] r4:00000000 [ 765.342731][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 765.343084][ T32] r9:844a0000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f25e000 [ 767.331828][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 767.332471][ T32] r5:00001000 r4:e0565000 [ 767.332675][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 767.333001][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 767.333355][ T32] r5:85330354 r4:85330000 [ 767.352579][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 767.353317][ T32] r7:ddde40c0 r6:82c18200 r5:85330354 r4:851f1300 [ 768.281377][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 768.281856][ T32] r10:844a0000 r9:851f132c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 768.282224][ T32] r4:851f1300 [ 768.282443][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 769.643942][ T32] r10:00000000 r9:dfe89e78 r8:851e42c0 r7:851f1300 r6:80266a2c r5:844a0000 [ 769.644515][ T32] r4:851e41c0 [ 769.644675][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 769.645817][ T32] Exception stack(0xe050dfb0 to 0xe050dff8) [ 769.646069][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 769.646374][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 769.646658][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 769.646919][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851e41c0 [ 769.647370][ T32] INFO: task kworker/1:8:3828 blocked for more than 452 seconds. [ 769.647672][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 769.647894][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 769.648209][ T32] task:kworker/1:8 state:D stack:0 pid:3828 tgid:3828 ppid:2 flags:0x00400000 [ 769.648595][ T32] Workqueue: events bpf_prog_free_deferred [ 769.648884][ T32] Call trace: [ 769.649082][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 769.649409][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e0535da4 r5:844a3000 [ 769.649687][ T32] r4:844a3000 [ 769.649875][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 769.650215][ T32] r5:844a3000 r4:827174e0 [ 769.650400][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 769.650743][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 769.651109][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e20 [ 769.651346][ T32] r4:00000000 [ 769.651482][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 769.651795][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 769.652164][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 769.652531][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd55c0 [ 769.652814][ T32] r4:00000000 [ 769.652988][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 770.295677][ T32] r9:844a3000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f031000 [ 770.296165][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 770.296532][ T32] r5:00001000 r4:dfb83000 [ 770.296717][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 770.297041][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 770.297513][ T32] r5:8453d754 r4:8453d400 [ 770.297705][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 770.298050][ T32] r7:ddde40c0 r6:82c18200 r5:8453d754 r4:851f1380 [ 770.298279][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 770.298598][ T32] r10:844a3000 r9:851f13ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 770.298883][ T32] r4:851f1380 [ 770.299004][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 770.299308][ T32] r10:00000000 r9:dfe89e78 r8:851e48c0 r7:851f1380 r6:80266a2c r5:844a3000 [ 770.299602][ T32] r4:851e4600 [ 770.299719][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 770.300038][ T32] Exception stack(0xe0535fb0 to 0xe0535ff8) [ 770.300281][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 770.300532][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 770.300819][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 770.301074][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851e4600 [ 770.782559][ T32] INFO: task kworker/1:9:3845 blocked for more than 432 seconds. [ 770.782877][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 770.783002][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 770.783160][ T32] task:kworker/1:9 state:D stack:0 pid:3845 tgid:3845 ppid:2 flags:0x00400000 [ 770.797379][ T32] Workqueue: events bpf_prog_free_deferred [ 770.797769][ T32] Call trace: [ 770.797900][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 770.798113][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e0539da4 r5:834b5400 [ 770.798302][ T32] r4:834b5400 [ 770.798468][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 770.798685][ T32] r5:834b5400 r4:827174e0 [ 770.798793][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 770.799044][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 770.799290][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e20 [ 770.799484][ T32] r4:00000000 [ 770.799582][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 770.799791][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 770.800109][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 770.800338][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd5cc0 [ 770.800524][ T32] r4:00000000 [ 770.800623][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 770.800828][ T32] r9:834b5400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03d000 [ 770.801034][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 770.801391][ T32] r5:00001000 r4:dfabb000 [ 770.801574][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 770.801804][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 770.802038][ T32] r5:853cdf54 r4:853cdc00 [ 770.802133][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 770.802371][ T32] r7:ddde40c0 r6:82c18200 r5:853cdf54 r4:851f1700 [ 770.802484][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 770.802701][ T32] r10:834b5400 r9:851f172c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 770.802894][ T32] r4:851f1700 [ 770.803004][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 770.803169][ T32] r10:00000000 r9:e0535e78 r8:851f5a00 r7:851f1700 r6:80266a2c r5:834b5400 [ 770.803296][ T32] r4:8518cd00 [ 771.991893][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 771.992436][ T32] Exception stack(0xe0539fb0 to 0xe0539ff8) [ 771.992680][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 771.992994][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 772.008193][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 772.008597][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:8518cd00 [ 772.008971][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 772.009415][ T32] INFO: task kworker/1:10:3848 blocked for more than 434 seconds. [ 772.009691][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 772.009939][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 772.010233][ T32] task:kworker/1:10 state:D stack:0 pid:3848 tgid:3848 ppid:2 flags:0x00400000 [ 772.010622][ T32] Workqueue: events bpf_prog_free_deferred [ 772.010887][ T32] Call trace: [ 772.011084][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 772.011421][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:e05cdda4 r5:83576000 [ 772.011674][ T32] r4:83576000 [ 772.011776][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 772.012076][ T32] r5:83576000 r4:827174e0 [ 772.012213][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 772.012545][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 772.012787][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde20 [ 772.012985][ T32] r4:00000000 [ 772.013122][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 772.026222][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 772.027544][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 772.027901][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b140 [ 772.028219][ T32] r4:00000000 [ 772.028396][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 772.028704][ T32] r9:83576000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03b000 [ 772.029142][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 772.029405][ T32] r5:00001000 r4:dfa9b000 [ 772.029512][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 772.029702][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 772.029924][ T32] r5:853cfb54 r4:853cf800 [ 772.030029][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 772.030233][ T32] r7:ddde40c0 r6:82c18200 r5:853cfb54 r4:851f1b80 [ 772.030364][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 772.030602][ T32] r10:83576000 r9:851f1bac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 772.030885][ T32] r4:851f1b80 [ 772.031043][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 772.031361][ T32] r10:00000000 r9:e0539e78 r8:85202240 r7:851f1b80 r6:80266a2c r5:83576000 [ 772.031646][ T32] r4:852021c0 [ 772.031847][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 772.032204][ T32] Exception stack(0xe05cdfb0 to 0xe05cdff8) [ 772.032477][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 772.032812][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 772.033224][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 773.349386][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:852021c0 [ 773.349943][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 773.350419][ T32] INFO: task kworker/0:8:3853 blocked for more than 455 seconds. [ 773.350743][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 773.351009][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 773.351323][ T32] task:kworker/0:8 state:D stack:0 pid:3853 tgid:3853 ppid:2 flags:0x00400000 [ 773.366065][ T32] Workqueue: events bpf_prog_free_deferred [ 773.366397][ T32] Call trace: [ 773.366503][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 773.366708][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfa85da4 r5:834b8c00 [ 773.366873][ T32] r4:834b8c00 [ 773.366947][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 773.367172][ T32] r5:834b8c00 r4:827174e0 [ 773.367280][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 773.367505][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 773.367729][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e20 [ 773.367907][ T32] r4:00000000 [ 773.368061][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 773.368341][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 773.368561][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 773.368821][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534bdc0 [ 773.369008][ T32] r4:00000000 [ 773.369089][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 773.369280][ T32] r9:834b8c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f043000 [ 773.369423][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 773.369628][ T32] r5:00001000 r4:dfe11000 [ 773.369738][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 773.369980][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 773.370279][ T32] r5:848a4354 r4:848a4000 [ 773.370460][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 773.370869][ T32] r7:dddd00c0 r6:82c18000 r5:848a4354 r4:85194b00 [ 773.371115][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 773.371497][ T32] r10:834b8c00 r9:85194b2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 773.371832][ T32] r4:85194b00 [ 773.372036][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 773.372378][ T32] r10:00000000 r9:ec779e78 r8:85151880 r7:85194b00 r6:80266a2c r5:834b8c00 [ 773.372665][ T32] r4:851e8140 [ 773.372840][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 773.373141][ T32] Exception stack(0xdfa85fb0 to 0xdfa85ff8) [ 774.657577][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 774.657943][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 774.658161][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 774.658344][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851e8140 [ 774.658599][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 774.658964][ T32] INFO: task kworker/1:11:3855 blocked for more than 436 seconds. [ 774.659288][ T32] Not tainted 6.12.0-rc1-syzkaller #0 [ 774.659532][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 774.659848][ T32] task:kworker/1:11 state:D stack:0 pid:3855 tgid:3855 ppid:2 flags:0x00400000 [ 774.660223][ T32] Workqueue: events bpf_prog_free_deferred [ 774.660402][ T32] Call trace: [ 774.660514][ T32] [<819bb214>] (__schedule) from [<819bbe54>] (schedule+0x2c/0xfc) [ 774.660722][ T32] r10:8260ca7c r9:00000000 r8:827174e4 r7:00000002 r6:dfa55da4 r5:834bb000 [ 774.660901][ T32] r4:834bb000 [ 774.660994][ T32] [<819bbe28>] (schedule) from [<819bc208>] (schedule_preempt_disabled+0x18/0x24) [ 774.661247][ T32] r5:834bb000 r4:827174e0 [ 774.661419][ T32] [<819bc1f0>] (schedule_preempt_disabled) from [<819bece0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 774.661789][ T32] [<819be9f8>] (__mutex_lock.constprop.0) from [<819bf5ac>] (__mutex_lock_slowpath+0x14/0x18) [ 774.662176][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e20 [ 774.662460][ T32] r4:00000000 [ 774.662615][ T32] [<819bf598>] (__mutex_lock_slowpath) from [<819bf5ec>] (mutex_lock+0x3c/0x40) [ 774.662961][ T32] [<819bf5b0>] (mutex_lock) from [<804adb48>] (_vm_unmap_aliases+0x68/0x240) [ 776.746105][ T32] [<804adae0>] (_vm_unmap_aliases) from [<804b18a4>] (vfree+0x170/0x1e4) [ 776.746721][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484eb00 [ 776.747080][ T32] r4:00000000 [ 776.747261][ T32] [<804b1734>] (vfree) from [<8050faf0>] (execmem_free+0x30/0x64) [ 776.747641][ T32] r9:834bb000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f039000 [ 776.748036][ T32] [<8050fac0>] (execmem_free) from [<8039c3bc>] (bpf_jit_free_exec+0x10/0x14) [ 776.748438][ T32] r5:00001000 r4:df9e9000 [ 776.748647][ T32] [<8039c3ac>] (bpf_jit_free_exec) from [<8039c79c>] (bpf_jit_free+0x68/0xe4) [ 776.749048][ T32] [<8039c734>] (bpf_jit_free) from [<8039d8f0>] (bpf_prog_free_deferred+0x14c/0x164) [ 776.749465][ T32] r5:8496db54 r4:8496d800 [ 776.749690][ T32] [<8039d7a4>] (bpf_prog_free_deferred) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 776.750171][ T32] r7:ddde40c0 r6:82c18200 r5:8496db54 r4:851f1880 [ 776.750457][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 776.750890][ T32] r10:834bb000 r9:851f18ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 776.751233][ T32] r4:851f1880 [ 776.751412][ T32] [<80266a2c>] (worker_thread) from [<8026fc84>] (kthread+0x104/0x134) [ 776.751810][ T32] r10:00000000 r9:e0539e78 r8:851ea100 r7:851f1880 r6:80266a2c r5:834bb000 [ 776.752185][ T32] r4:851ea080 [ 776.752379][ T32] [<8026fb80>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 776.753079][ T32] Exception stack(0xdfa55fb0 to 0xdfa55ff8) [ 776.765072][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 776.765495][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 776.765891][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 776.766225][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb80 r4:851ea080 [ 776.766590][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings VM DIAGNOSIS: 16:35:01 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=40000113 R02=00000000 R03=0000024d R04=00000001 R05=83542fac R06=00000000 R07=814c253c R08=60000113 R09=8526afc0 R10=81c63bf8 R11=df801a3c R12=df801a40 R13=df801ab8 R14=017efa38 R15=80855ad4 PSR=20000193 --C- A S svc32 s00=20000000 s01=00000000 d00=0000000020000000 s02=10000000 s03=000b0f1f d01=000b0f1f10000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff6d4172 s09=ffd4dfcb d04=ffd4dfcbff6d4172 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=fe424ef4 s13=009cc22f d06=009cc22ffe424ef4 s14=ffffffff s15=00000000 d07=00000000ffffffff s16=00000000 s17=1252f651 d08=1252f65100000000 s18=66000000 s19=0003707d d09=0003707d66000000 s20=fffd2cb8 s21=009cc22d d10=009cc22dfffd2cb8 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=216d4172 s25=00000000 d12=00000000216d4172 s26=10000000 s27=000b0f1f d13=000b0f1f10000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=01757dec s33=ff921f9e d16=ff921f9e01757dec s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=feda3db3 s37=ff6105e4 d18=ff6105e4feda3db3 s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=0528bc19 s43=00000000 d21=000000000528bc19 s44=00000008 s45=00000000 d22=0000000000000008 s46=01b83eb3 s47=00000000 d23=0000000001b83eb3 s48=003db62d s49=1252f651 d24=1252f651003db62d s50=20aca749 s51=00000000 d25=0000000020aca749 s52=009dc93d s53=ffd252e4 d26=ffd252e4009dc93d s54=ffb8697e s55=00997422 d27=00997422ffb8697e s56=0052c21b s57=00e2c274 d28=00e2c2740052c21b s58=0071613a s59=ffb8697e d29=ffb8697e0071613a s60=1547f5fe s61=000b0f1f d30=000b0f1f1547f5fe s62=b2c09a29 s63=0052ca3f d31=0052ca3fb2c09a29 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=85b6462c R01=00000000 R02=00000000 R03=00000102 R04=ddde4dc0 R05=81638498 R06=df805c74 R07=814943bc R08=82e72fc0 R09=82e72e94 R10=ddde50c8 R11=df805dbc R12=df805e40 R13=df805e40 R14=814b97cc R15=819b87e0 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000