last executing test programs: 1h53m54.33804069s ago: executing program 1 (id=816): mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x5421, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/fdt', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) write$9p(r1, 0x0, 0x0) mq_open(&(0x7f0000000080)='!\xceFz\"\x15;\xbc', 0x40, 0x83, 0x0) 1h53m54.236696048s ago: executing program 1 (id=817): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$FUSE_LSEEK(r0, 0x0, 0x0) 1h53m54.147478386s ago: executing program 1 (id=818): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8, 0x191840) close_range(r1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r2) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}, 0x1, 0x0, 0x0, 0xc0c4}, 0x4) 1h53m54.045171815s ago: executing program 1 (id=819): mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x226) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1) 1h53m53.939063634s ago: executing program 1 (id=820): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa1042, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r1, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) 1h53m53.50068325s ago: executing program 1 (id=821): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000013c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000880) 1h53m53.50046142s ago: executing program 32 (id=821): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) close(r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000013c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000880) 11m47.409607159s ago: executing program 0 (id=14127): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="0000000000010000660800000000000018000000000000000000000000000000950000000000000036"], 0x0, 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003130000002cbd7000fbdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af05000600000000000a004e2400000004ff010000000000000000000000000001000000000000000002000100000000000000070c0100000005000500000000000a004e2400000009000000000000000000000000000000000600000000000000020013"], 0x98}, 0x1, 0x7}, 0x8890) 11m44.60754572s ago: executing program 0 (id=14131): socket$nl_xfrm(0x10, 0x3, 0x6) unshare(0x400) io_uring_setup(0x1098, &(0x7f0000000040)={0x0, 0xd3a8, 0x40, 0xffffffff, 0x7}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) clock_settime(0xfffffffffffffffd, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xe, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r3}, 0x18) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x110, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) 11m44.181862724s ago: executing program 0 (id=14133): sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000004c0)={0x5c, 0x12, 0x0, 0x70bd26, 0x25dfdbfc, {0x8, 0x6, 0xa, 0x1, {0x4e24, 0x4e23, [0xfffffff8, 0x3, 0x6], [0x400, 0x9, 0x8, 0x9], 0x0, [0x1, 0x3]}, 0x4, 0xb}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "f102dcf29effae15cd"}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x27, &(0x7f0000000000)=""/114}, 0xa8) 11m44.070172241s ago: executing program 0 (id=14134): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x1000, 0x0, 0x3, 0x0, "0040001e1d113c81bb0f00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/3\x00') r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000500)={0x1ff, 0x2006, 0x2, 0x1, 0x38, "01b1c6c2108f0804"}) 11m41.367287847s ago: executing program 0 (id=14138): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) 11m40.799568523s ago: executing program 0 (id=14140): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000240)={0x8, 'pim6reg1\x00', {'syzkaller0\x00'}, 0x3}) 10m55.390001503s ago: executing program 33 (id=14140): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000240)={0x8, 'pim6reg1\x00', {'syzkaller0\x00'}, 0x3}) 6m50.942554054s ago: executing program 3 (id=14659): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0xfffffe75, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0xffd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001d80)=@broute={'broute\x00', 0x20, 0x11, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000c0], 0x11, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0xe0) 6m50.218490663s ago: executing program 3 (id=14660): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0xf5, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x3a00, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000aa0c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x4000894) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080406037c09e8fe55a10a0015400200142603600e122f00160006000500a800060020000640164433fb0700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdfb8951f215ce3bbce81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92782f9ffcdb020e6f3baf26d57a0000", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r1], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x63}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x4}, 0x18) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000180)={'wpan1\x00'}) socket$inet(0xa, 0x1, 0x0) r5 = gettid() r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xfffffffffffffffb]}, 0x8, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r8, 0x0, 0x5}, 0x18) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) signalfd4(0xffffffffffffffff, &(0x7f0000002140)={[0xfffffffffffffff5]}, 0x8, 0x0) fcntl$setlease(r6, 0x400, 0x0) r9 = add_key$keyring(&(0x7f0000000540), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x48) r10 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r9) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r10}) readv(r6, &(0x7f0000000140)=[{&(0x7f0000000080)=""/152, 0x98}], 0x1) rt_sigqueueinfo(r5, 0x21, &(0x7f0000000180)={0x33, 0x40000020, 0xfffffffb}) 6m47.298513002s ago: executing program 3 (id=14668): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0xfffffffffffffde8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) io_uring_setup(0x1828, &(0x7f0000000040)={0x0, 0x20c8a1, 0x1c881, 0x8, 0xd1}) 6m46.637857031s ago: executing program 3 (id=14670): ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan1\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x8000) 6m46.331891997s ago: executing program 3 (id=14671): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000011008188e6b62aa73f72cc9f0ba1f8483d0000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) 6m46.070481707s ago: executing program 3 (id=14673): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x9effffff, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) 6m0.795404067s ago: executing program 34 (id=14673): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x9effffff, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) 7.869883817s ago: executing program 4 (id=15387): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 5.108093979s ago: executing program 2 (id=15392): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349a0f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "b39625e03be22ead", "8da0640c9e8f6b81143f1a1a6d81ee2b", "3b0e7088", "19a4216dfdbf6602"}, 0x28) recvfrom(r2, &(0x7f0000001300)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "f64e40992f79ecf0", "53c272d8b763f690b35605dff8a4a8d2", "3da2d199", "72392a24199b5903"}, 0x28) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) setsockopt$sock_int(r2, 0x1, 0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, 0x0, 0x30) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00'}, 0x10) 3.043321475s ago: executing program 4 (id=15393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x14, r4, 0x1, 0x0, 0x25dfdbfd, {0x54}}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x8000) 2.397100807s ago: executing program 4 (id=15394): unshare(0x2c020400) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) 2.293166945s ago: executing program 2 (id=15395): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x24, 0x11, 0x839, 0x70bd25, 0x100003, {0x0, 0x0, 0x0, r2, {0xb, 0xfff3}, {0x3, 0xfff9}, {0xd}}}, 0x24}}, 0x0) 2.10610246s ago: executing program 4 (id=15396): fchdir(0xffffffffffffffff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="997425bd7000fbdbdf251500000060000180140001"], 0x74}, 0x1, 0x0, 0x0, 0x4000080}, 0x2400c000) 1.930292594s ago: executing program 2 (id=15397): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0)="bc", 0x1, 0x4, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @loopback, 0x1}, 0x1c) close(r1) 1.534740786s ago: executing program 4 (id=15398): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a808682b7fc4c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000020000380100000800c00018006000100d10300000c00008008000340000000023f0000000e0a01020000000000000000"], 0xdc}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1.249693039s ago: executing program 4 (id=15399): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349a0f2}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "b39625e03be22ead", "8da0640c9e8f6b81143f1a1a6d81ee2b", "3b0e7088", "19a4216dfdbf6602"}, 0x28) recvfrom(r2, &(0x7f0000001300)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "f64e40992f79ecf0", "53c272d8b763f690b35605dff8a4a8d2", "3da2d199", "72392a24199b5903"}, 0x28) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) setsockopt$sock_int(r2, 0x1, 0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, 0x0, 0x30) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00'}, 0x10) 877.415709ms ago: executing program 2 (id=15400): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) msgget$private(0x0, 0x3ac) 338.559922ms ago: executing program 2 (id=15401): sendmsg$key(0xffffffffffffffff, 0x0, 0x4044040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x9, 0x7ffc0000}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[], 0x48) ptrace(0x10, 0x0) writev(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000340)="46682758f0d6d40481b15714f4790c9ad6c6db974e0fb495fb3013a6b3db2539d0e903cae58d7131925b7c08c2ba636b4fff7f8e3abfbc47dea4a1e2ca70b89b507e8d87c277ef440210dcc6dee0c083e401866a7b91f401f9b7d672cec736c7a07734a2b61de1fafd68d9303f4ac933b0a8f0aef34b71a69a3b66af31626e1cf96a65025cca2a9ecc94a7c30b50b947df945283065150f70ca8ba1d2adfb08cd08d62809be6c6a0f1d4877c98fa0e29273295984ed3c49f5b0549db88a9f37a16396aa38cd2b1d1d178b1aecd4fc5c8bb11b8d077252d60f0cf91cb01caa869f44552b325121dea5642e6505bfe1ee56d", 0xf1}, {&(0x7f0000000f40)="ce05a89b6499d3801d7cb912ababbf2f18fb22a5c5eb5e5407d69ccba55d7f804e304865d04ce1f7336ff499ea67639bcfd76ec25bea6ab2d329fe7955497653cdd8469bab5ab28baa05a4c91dcc114ea2a9d0ddbbfd836eab96066be1ac60f36162d1c20a37aa3a334e5148398650f440eaffe169d65e537bc3829e42a6355c3847a547764b730a2323e7add41e2b1bdd8a3c1170f4aefe43538326fcf6aa6e6637f3223293f9bfd109c820475d6fcc5400eb0a4454df4aa74f15d387e764096cd1e55eaf35f652abe8e4f96818f1a4fde0614cfa0282cbde755eb0dffa18709d5e21e656af5924ec03f7fb68e726b2188c0c994308532e851eee862b8d8c466247610a4b9feab506490b116181a1ccfe4a070758f4cafa16f1cef5069e4668903027c883f8b595acd389a5a2bf8e8db0e52ab1effd9b5ebd81b28618c5fe8a07c52efca9ce973b0268eba84de125a5a585110cf5890bfda1910012828eac33f706b9f94f5dfa0e4e9d874cd3090550c936675374614b9eb33fe8270e151d9f04f47ffa117d7d112ea1fd538746701beaaa7937a2f35336c5878e36ac53ad66da99d21bb512d7796ffbefd3a58a7d6de5567cf6320e59d7a0928cad21cec7eb5e4801e5c21ac7ad12dd16b64abb8a1a264ecbe3c78865359c741b94a259c6e5ef6f87fb8760b1b32e4c91581a44fc753ac8fced7afd736574a64ad690bb6a2c0469831842fe267e0e35aabe148d0e282d29e852dfd31b82af15733244f71aef9fc3e9620ca1cf52a30a6ce52f7041d23b4101f94134a683e5729b44b65a9005b3de451a8080c89d2866eba6cb6b78239d24b0853e901ef23a214d589b6c79f4ab4d2175a6c809287a5aa4acbe42bec42f19ab7ee5aeb201e5eb692ca9538a5381129b37a055587f0da8d8d38e72b1ec7772b6dae57c2f503b2c1a539cfe993ef430452592547ffd3c6950ac03bea24f0faa778d193880820f7567d07f057eded0b719862ddc498d26f1dac63372c207d55d2a6abc206e4371947c595d8018c262cb95422e3b9389598421f0b2cd74a36f2c80f8f0365ff406b1738d4ec5b262ac2eea2f8073bd446e3dc69234ff88bf2cf074c86c2248cdcd230932a678977af912889887d525c66a930fdc4b369b17d00010e3648e6daec702ba4bdf47e1df305c2757a99a599386dd6d042bdd0da992bf778923d3af4ebb16ec163357b2db6afe2ffc242845253b4533aeda3c38783eb2557a6a71c21f1a4850aa4a04aa4ef456e12f779a445ed56e900bec38e13a38abc48a343bb31600c02ef1988dfdb8b2a56f5fa97cb832b927d56834c2a43ec4053d3aae9e51208f3c7cd23baff19956c8a4c7eb1346cf2096c13bda85554714370a8de7797bfccc0f19e8dc5011c7fc55583ce839329ce46fe7039fce9c026cdb03373581715810e8bbce4460334f3d4247350ac7afcef0f5841818cc3398b828251d3eda4b5dd6fbeae760fbebe6082ed636e334cf5aabe4d954ee3093bdc9c4f54f20ed0bc23b8628b135111b8b8758fb974415429bfa595ad48fdbbd1ba72d49a1551cffce39d1b4febf960a121216d7ba874951bd8466d500a4427fdf0453500ecf40abf43baf7877a5f42cd83c2815611b3ac4652a862d801a8cd7e58ff65022641e1d29d170b347667c3e94197ec6440bfdd8dc7ceb66fa5d10b09adc622aaeefc86ef253067f70d5aeb64f8ce57be402b7c7cc7b33e93b15fa7420b3024789759d152bba89c26b8f64d8d65ab06fabe340f889a5a5e2a85a8d3d883ab22f3db8178a6dc9ffc28401380c9032b101968cb47fadc26095be8ce6b043fab4cf616e8b4abe4357c6041d96aa034fd1ae52fa8767714eb1c11e592302c04332999256517741ef273d37d406f2f5885f07238ab47765465d76db7faab58bb70850eccea30a484d6ee7a89a423e694a915dca1512616e0c0064e8fe4756370286de44dcd0161fe18d987b793bbd79f28debd8e4f40715884a8bc3ae410cfdd84c0b79f089e88b67e4d20dc7fb6b0842b74df9bdbeb1a4073f74df257425d0549007e917bb4c94f369019a520feb1b980b5e4fd735edaa3786b55aad0d26f502e15fe655c5d7e215ccde343fc04869779532be23b9fcea9a4b95afa4709f11821e3ba3e69656f849d4977b365745ef2da912d9b9704a43959f67f646a577d09670ecaf34ddd50fea3e33d16e7e80060b9e7bbb75b45a6a540592a18973debf3b5a5f95cc75843481689a9d6e6bebfe169b6e81cc88ee5bb0d62bdd0571085ed18c963da5fc0c874d012bba3bb3f9f2cdff3d5bb37d72fa3ed286ff74cddaf7926faf9ba5606f3869f6e7c4e3e92d5e65d8bdc178ac2bc104bbe286ab0cf8863de7dc0cc6efb7429bb0fbc1d5c9cc9455d4e4508f3225e3e5c2b962e8851713358c59a316bd8deb76bb3d3375308638e62b4b8e336978d0fac86aa5dcd2eef06ee81a2e8f82292859b0fe5a4edae5631d17437b20192a0169424cf8c017a6d85fc7b897dc41e3ce5b4d93fb2ce205b88f486347a1bf73d3e4b0cff48be6f22252585702a128639d4a14103ca5fdf504b61254ef67fbaa5143d37948cbe29f34095327f1598ae015f417712205624a3970aa0542d6c5fe2ada6411f52aacf325b145d9269957f6b85a735a2c1611013b10d22222f124a9cfe7e3c0b7a1ebf6f3a79d61abe6fe3bb55205d6a4951fd12ac941c2a9230cd2beea2b1441e8e6aa7090fe6b1312efed1ae941f2b78d9e0281e5450b67c03d55fda0128c7b6c8a55849ca6c0b2f4997b7251cc6a53a427ef61a492566eb5772b99ebdaa33b7bcb6788bfc46f275f4a895a5e9344e4e19a4be07d5ac0fe229698b273e573ac9b5bd7beaf2991340409a592e63b5014f42c1fe890adc075558ee5ea0dcf2cb96f51b2594996327b02ed53663de54a210477028a2eb1a72e378fd29b24ff6fbd4accf3f8e615f8aab43fdebf1e2107b909144c16c93b114aab56757b6189c61592a474cd57ac4eecd92dbd48fe71df474d6f9c21cec31e9297e39b8b57c269a1d28ee198abfc825600c734940e1ab42e3622f202922359d66041698fbbe5a6601874df0c8428d68e1ea841532784c883acd3e5c00cff80379c014a9ef0141ff72895fdd40d7c82b063cdc4a2ffcbccc72e657d2283d902742f6694ba44d7cbdf217e1e81d1542efbce24b09490d39e8724a82acd607c86e8d48a0b8d154019f0f1d92089c85a6687eed9d934636ea7497668ef2d929479206729ec8a559f9d38990b3f5574e950d732e2795ca64a03a2e9f58a9885942566e47bbe4e2fa88b27f3f268717248df37b161b72c4b225abd98302f1110299119c4df4047026a19c8d1afedacde81d2ed8c8f24d0c9f485f2f7985c0415bbf3f0ac4c00a1f8cd666b2e3f92ef7926c6c0bbfa81e5a067fe0f9ec89298aa00ece952ab19776887637f11d556fb55b914b26041565da62c07acc262ad4fb78a6bad531dd21bb83879f330a0f89706e526198f92b9a5114b4135082ad10da6309f74d50d9cab85bf836db2245925c0e485e8726a1be7c01b7c61fff2a9e7c293fd5208a1e29abfa515876dcf19bacccb9098d7c1a4f5ce07f7a78ef35b06ced4c126c443d77946efea13d4cbec8bd452466dbae29c3e57bff34260886de4e8cb58064e5e7c653649857e6e517e495df5bc84b06dd51ce1738c6cc13fd3e5cb334602cd49132a11bfcff61970eedf3aa15d952269712782527f0ef4f0977d5a9ff6287b727a319ff5aef444a9f2a69b4836f6deffb33e8743ef6ae331c9c0a02155fd4f8d95a6e50f2549db92c178ada3aba028316b379870416c935deb1f366604c008d5bcb7e76c429a50362f05fc067745da1165d18d977fc663cdc1c75b2578bdfd2a1e10677bec14c3eac27c0a2987a03b0aa1aac63aeeb990a527eb4819bbe629dbfad7cd677b94d5deff2d1099221cfb4af40a1f8829c25a538f25ba4d032c9a22609509eefe1f3c8bc76982508524f388e6d74513b7187951ee7065d6c675d44f9de115229f15c07e0a3e3816c6272afff30c39d5d0aa27981fdfc6e3dd900fbcfaea5dfa647d46e2c89c3f31bb34dca67d7799b808455e089d8073b4c2c5bf0ff4c7c7208b191934450c67aa76290af5ce207ba39897eace42773ac0ae1b719c4de3e6136ae35d4ba23c088058065e07b9e0c93fcdbd790ba3d1a23fbc6f7f69786da2b238121c800ac9a00954904f2ca685ac6c5f3933ad3b45c0f0f62392dbb35e9ff403ae05f5bc3aed21e533b87e10be77668a8bdc55826d7df612d94b558109322ab9ff8ee6a07ca55dcb1b288039a004d5133ef7822eb7b87c46763acd65ad42987b596253ea950be06692bf53c871e04a2307490d996e9922c45b3290346b96c8816a3dd276ae55ebbf39e0f0365dfc92839e076a66cdd23569cfc80d9ab3b14e5c3e794053ebab567cb551b4b1c9f254a1f271a1e8977001587f77b320c36784cbdc104a9472d3b9227ca85c4d4b86ba62eba286182ed7bfb1c587865a0469012106e869189f6df6455e8947b92e5773802c2231306e704f82254f7232cba09836e62d68eadd7300d5dfd8f190fbc021c02d03b4fe64699731cf02c95d457b5a61a3e32553d68ef6e6d42345193ba18e5ee6dfcfb55c5b421e34c14e25f6cd9caf661d9dce301028963b0bb68c1a7974974d5d7a05d6e3a91dd4f1e537200d466f647526872abd2fc12088a09ff345c25edf26231a45ba839e64bddd6330eccd5fe6f10c8aa39720c20065d43bfba68582110f64bebfc810d2e914dac703c57826597c07977766f4526419bd17b93bda10b79109660d38ae8216d8b249bab8f174de7e380a6be8f6254b085d8b65d61e9c452efebafa489a2ff6cb453d636e26cf236aacc551449ee6dbc47b9393d93aac499f0848de824b86541a84321629bbf0c60eebce70a02b835ecccde9cb84a8dd94efcbe95d9235c594efcdb8571b4c3bda6249c0650fdfc03cc5d0e9d9e914f24b72259d8e963d1258717028004e0c71bc31820bbddcb4487c3b7a2eee369b5a2971c06f706fcd9716a583242fcdb287b3cd6744a6df37396d00976be48d6c7fa212b06c481ab35253fb3bfe3ee7487064d4e35d0866a0b756e3ce9cdb9677583b3c7479089aaafa0d55e6dd6d265f8411f7afe0641c932cfa694d7bcbd8d8b61ddcabbe4ff3ad6b8c327f6a5a51b734720a7c9e71ee9f414269a1232a05dbf8beec17a7a38dad5158dc3cc9212e5788d917a4ad0fe507d310e602a33af5f2c4d78dd1799787ae6daee95f2e44e136792589f3f3f334ff01d808cc4e246bcbae6168f7823f71f8aafb12ed90514f4f85eedf843dbc17b4b16df13c183f127e37dd617b779824c0a448c31fd453db0b1bdbb48ac50a85dc9c9b9f2a9f8073ce3894ed62f07b0c5fd998ee6d46cf866c8187915c9de27044ad7007367ee4518de08b68cbcbad3d11073c365edde63eee1063c86686fa3f0187759815779fcd462e4f33893fb94a84d478a408c46a7846dd75d90aa48a3031e605c4e20157e2bdace28cfc86c30d39681ddfa06e8811483d2b4464d67b7fb4cef32cd172af1cb0965b9625c159f58c04ff1fcdd110f765c1eaca77bb3ec450adb62c173870a7b168973dd6637520b7f0e7ebae0668b31c4b41de2548e08cd912876b01186a1ff2ed0b2eef002c", 0xfc0}, {&(0x7f0000000440)="b61fd141c93b6495477fbbd390a790bea665d839ca77640171527ab92f1735d99c3dbf8e9a308c6842d42831da8dfe4dcc", 0x31}, {&(0x7f0000000480)="c6fb3039828965f41d385159f9e6c115c5ab3f0260d23f471c6d930110f3d3f6fa05d26f4f35487b1458c8478b88e811ce", 0x31}], 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/24, 0x18}, {0x0, 0x63}], 0x2, 0x0, 0x20) 0s ago: executing program 2 (id=15402): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000008c0), &(0x7f0000000880)=r1}, 0x20) r2 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2fffffffd}, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000009060102000000000000000000ff00000900020073797a31000000000500010007f2ff001c0007800c00018008000140fffffffe0c0002800800014004a20d"], 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000050) kernel console output (not intermixed with test programs): e="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6768.125608][ T29] audit: type=1326 audit(134224496.016:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13806 comm="syz.2.14557" exe="/syz-executor" sig=0 arch=40000028 syscall=275 compat=0 ip=0x132970 code=0x7ffc0000 [ 6768.129031][ T29] audit: type=1326 audit(134224496.016:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13806 comm="syz.2.14557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6768.141027][ T29] audit: type=1326 audit(134224496.036:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13806 comm="syz.2.14557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6768.305008][T13809] SELinux: Context system_u:object_r:netutils_exec_t:s0 is not valid (left unmapped). [ 6768.306602][ T29] audit: type=1400 audit(134224496.196:1237): avc: denied { relabelto } for pid=13808 comm="syz.2.14558" name="cgroup.procs" dev="cgroup" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 6768.311857][ T29] audit: type=1400 audit(134224496.206:1238): avc: denied { associate } for pid=13808 comm="syz.2.14558" name="cgroup.procs" dev="cgroup" ino=160 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:netutils_exec_t:s0" [ 6775.235308][T13838] netlink: 44 bytes leftover after parsing attributes in process `syz.2.14571'. [ 6778.648508][T13849] netlink: 44 bytes leftover after parsing attributes in process `syz.2.14576'. [ 6781.638307][T13857] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14579'. [ 6782.454331][T13864] C: renamed from batadv_slave_0 (while UP) [ 6782.865415][T13867] netlink: 44 bytes leftover after parsing attributes in process `syz.2.14581'. [ 6783.186315][T13867] netlink: 44 bytes leftover after parsing attributes in process `syz.2.14581'. [ 6783.720394][T13867] netlink: 44 bytes leftover after parsing attributes in process `syz.2.14581'. [ 6785.344872][ T29] audit: type=1326 audit(134224513.236:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.348595][ T29] audit: type=1326 audit(134224513.236:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.355901][ T29] audit: type=1326 audit(134224513.246:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.357193][ T29] audit: type=1326 audit(134224513.246:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.407900][ T29] audit: type=1326 audit(134224513.246:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.450465][ T29] audit: type=1326 audit(134224513.316:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.570592][ T29] audit: type=1326 audit(134224513.446:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.571025][ T29] audit: type=1326 audit(134224513.446:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=178 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.571268][ T29] audit: type=1326 audit(134224513.446:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6785.571482][ T29] audit: type=1326 audit(134224513.456:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13878 comm="syz.2.14584" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6786.344776][T13884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14586'. [ 6786.693740][T13884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14586'. [ 6789.923220][T13903] IPv6: NLM_F_CREATE should be specified when creating new route [ 6791.790839][T13917] netlink: 60 bytes leftover after parsing attributes in process `syz.2.14599'. [ 6794.400157][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 6794.400487][ T29] audit: type=1400 audit(134224522.286:1254): avc: denied { write } for pid=13928 comm="syz.2.14604" name="file0" dev="tmpfs" ino=2193 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6794.460279][ T29] audit: type=1400 audit(134224522.326:1255): avc: denied { open } for pid=13928 comm="syz.2.14604" path="/429/file0" dev="tmpfs" ino=2193 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 6798.356399][ T29] audit: type=1326 audit(134224526.246:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.359045][ T29] audit: type=1326 audit(134224526.246:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.365245][ T29] audit: type=1326 audit(134224526.256:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.368522][ T29] audit: type=1326 audit(134224526.256:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.372201][ T29] audit: type=1326 audit(134224526.256:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.422923][ T29] audit: type=1326 audit(134224526.316:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.425149][ T29] audit: type=1326 audit(134224526.316:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6798.425326][ T29] audit: type=1326 audit(134224526.316:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13951 comm="syz.2.14611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.567843][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 6799.568266][ T29] audit: type=1326 audit(134224527.456:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.582526][ T29] audit: type=1326 audit(134224527.466:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.590265][ T29] audit: type=1326 audit(134224527.476:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.594044][ T29] audit: type=1326 audit(134224527.486:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.603844][ T29] audit: type=1326 audit(134224527.486:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.610839][ T29] audit: type=1326 audit(134224527.506:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.614617][ T29] audit: type=1326 audit(134224527.506:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=75 compat=0 ip=0x132970 code=0x7ffc0000 [ 6799.616462][ T29] audit: type=1326 audit(134224527.506:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13967 comm="syz.2.14617" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6800.032624][T13971] SELinux: policydb version 0 does not match my version range 15-35 [ 6800.034981][T13971] SELinux: failed to load policy [ 6801.542920][ T29] audit: type=1326 audit(134224529.436:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13986 comm="syz.2.14623" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6801.547204][ T29] audit: type=1326 audit(134224529.436:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13986 comm="syz.2.14623" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 6804.513608][T14023] netlink: 64 bytes leftover after parsing attributes in process `syz.2.14637'. [ 6805.166105][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 6805.166713][ T29] audit: type=1326 audit(134224533.056:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.168958][ T29] audit: type=1326 audit(134224533.056:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.194188][ T29] audit: type=1326 audit(134224533.086:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.196554][ T29] audit: type=1326 audit(134224533.086:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.198849][ T29] audit: type=1326 audit(134224533.086:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.205067][ T29] audit: type=1326 audit(134224533.086:1310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.208050][ T29] audit: type=1326 audit(134224533.086:1311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.212668][ T29] audit: type=1326 audit(134224533.086:1312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.215603][ T29] audit: type=1326 audit(134224533.096:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=95 compat=0 ip=0x132970 code=0x7ffc0000 [ 6805.220353][ T29] audit: type=1326 audit(134224533.096:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14028 comm="syz.3.14640" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6806.871011][T14045] netlink: 'syz.2.14648': attribute type 10 has an invalid length. [ 6806.880475][T14045] netlink: 'syz.2.14648': attribute type 10 has an invalid length. [ 6807.793409][T14051] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6807.798948][T14051] netdevsim netdevsim2 eth3 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6807.891234][T14051] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6807.900110][T14051] netdevsim netdevsim2 eth2 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6808.037415][T14051] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6808.037892][T14051] netdevsim netdevsim2 eth1 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6808.124801][T14051] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6808.125814][T14051] netdevsim netdevsim2 eth0 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6808.343077][T10782] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20004 - 0 [ 6808.343426][T10782] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 6808.343880][T10782] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20004 - 0 [ 6808.344102][T10782] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 6808.344345][T10782] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20004 - 0 [ 6808.344534][T10782] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 6808.384351][ T1029] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20004 - 0 [ 6808.384753][ T1029] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 6811.270621][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 6811.270993][ T29] audit: type=1400 audit(134224539.166:1352): avc: denied { create } for pid=14087 comm="syz.3.14660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6811.334241][ T29] audit: type=1400 audit(134224539.226:1353): avc: denied { write } for pid=14087 comm="syz.3.14660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6811.430643][T14088] netlink: 'syz.3.14660': attribute type 21 has an invalid length. [ 6811.441675][T14088] netlink: 128 bytes leftover after parsing attributes in process `syz.3.14660'. [ 6811.450425][T14088] netlink: 'syz.3.14660': attribute type 5 has an invalid length. [ 6811.453163][T14088] netlink: 'syz.3.14660': attribute type 6 has an invalid length. [ 6811.454473][T14088] netlink: 3 bytes leftover after parsing attributes in process `syz.3.14660'. [ 6811.490546][ T29] audit: type=1400 audit(134224539.376:1354): avc: denied { read } for pid=14087 comm="syz.3.14660" dev="nsfs" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6811.490938][ T29] audit: type=1400 audit(134224539.386:1355): avc: denied { open } for pid=14087 comm="syz.3.14660" path="net:[4026532755]" dev="nsfs" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6811.857993][ T29] audit: type=1400 audit(134224539.746:1356): avc: denied { ioctl } for pid=14087 comm="syz.3.14660" path="socket:[139209]" dev="sockfs" ino=139209 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6811.990044][ T29] audit: type=1400 audit(134224539.876:1357): avc: denied { name_bind } for pid=14093 comm="syz.2.14662" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6811.990590][ T29] audit: type=1400 audit(134224539.876:1358): avc: denied { node_bind } for pid=14093 comm="syz.2.14662" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6812.140221][ T29] audit: type=1400 audit(134224540.036:1359): avc: denied { sys_module } for pid=14087 comm="syz.3.14660" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6812.157708][T14096] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14663'. [ 6812.900325][ T29] audit: type=1400 audit(134224540.786:1360): avc: denied { create } for pid=14103 comm="syz.2.14666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6813.462597][ T29] audit: type=1400 audit(134224541.356:1361): avc: denied { create } for pid=14103 comm="syz.2.14666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6814.993257][T14119] netlink: 'syz.3.14671': attribute type 10 has an invalid length. [ 6817.363095][T14131] macvtap0: refused to change device tx_queue_len [ 6818.478883][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 6818.480490][ T29] audit: type=1400 audit(134224546.366:1376): avc: denied { create } for pid=14134 comm="syz.2.14677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 6818.528640][ T29] audit: type=1400 audit(134224546.416:1377): avc: denied { sys_admin } for pid=14134 comm="syz.2.14677" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 6818.570086][ T29] audit: type=1400 audit(134224546.456:1378): avc: denied { mounton } for pid=14134 comm="syz.2.14677" path="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6818.731456][ T29] audit: type=1400 audit(134224546.626:1379): avc: denied { create } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.737060][ T29] audit: type=1400 audit(134224546.626:1380): avc: denied { ioctl } for pid=14137 comm="syz.2.14678" path="socket:[140340]" dev="sockfs" ino=140340 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.763841][ T29] audit: type=1400 audit(134224546.656:1381): avc: denied { bind } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.767868][ T29] audit: type=1400 audit(134224546.656:1382): avc: denied { setopt } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.793145][ T29] audit: type=1400 audit(134224546.686:1383): avc: denied { write } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.832103][ T29] audit: type=1400 audit(134224546.726:1384): avc: denied { connect } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6818.876083][ T29] audit: type=1400 audit(134224546.766:1385): avc: denied { create } for pid=14137 comm="syz.2.14678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6818.898839][T14138] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14678'. [ 6821.004361][T14151] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14683'. [ 6823.840210][T14166] netlink: 'syz.2.14688': attribute type 12 has an invalid length. [ 6824.431524][T14168] binfmt_misc: register: failed to install interpreter file ./file2 [ 6824.920341][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 6824.920646][ T29] audit: type=1400 audit(134224552.806:1416): avc: denied { create } for pid=14169 comm="syz.2.14690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6825.039014][ T29] audit: type=1400 audit(134224552.916:1417): avc: denied { write } for pid=14169 comm="syz.2.14690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6825.992384][T14174] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 6826.428072][ T29] audit: type=1400 audit(134224554.316:1418): avc: denied { bind } for pid=14175 comm="syz.2.14693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6826.432422][ T29] audit: type=1400 audit(134224554.316:1419): avc: denied { setopt } for pid=14175 comm="syz.2.14693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6826.500902][T14176] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6826.503024][T14176] netdevsim netdevsim2 eth3 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6826.727873][T14176] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6826.769948][T14176] netdevsim netdevsim2 eth2 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6826.942778][T14176] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6826.944409][T14176] netdevsim netdevsim2 eth1 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6827.033963][T14176] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6827.053164][T14176] netdevsim netdevsim2 eth0 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6827.299745][ T1029] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20004 - 0 [ 6827.300141][ T1029] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 6827.402998][T11997] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20004 - 0 [ 6827.403397][T11997] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 6827.403543][T11997] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20004 - 0 [ 6827.403592][T11997] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 6827.457784][T11997] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20004 - 0 [ 6827.461189][T11997] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 6831.800604][ T29] audit: type=1400 audit(134224559.676:1420): avc: denied { create } for pid=14205 comm="syz.2.14697" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6836.107752][ T29] audit: type=1400 audit(134224563.996:1421): avc: denied { create } for pid=14215 comm="syz.2.14700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6836.120396][ T29] audit: type=1400 audit(134224564.006:1422): avc: denied { bind } for pid=14215 comm="syz.2.14700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6836.122307][ T29] audit: type=1400 audit(134224564.016:1423): avc: denied { name_bind } for pid=14215 comm="syz.2.14700" src=19997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 6836.123480][ T29] audit: type=1400 audit(134224564.016:1424): avc: denied { node_bind } for pid=14215 comm="syz.2.14700" saddr=ff05::1 src=19997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 6838.874743][ T29] audit: type=1400 audit(134224566.766:1425): avc: denied { ioctl } for pid=14222 comm="syz.2.14703" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6843.286501][ T29] audit: type=1326 audit(134224571.176:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14240 comm="syz.2.14707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6843.289788][ T29] audit: type=1326 audit(134224571.176:1427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14240 comm="syz.2.14707" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x132970 code=0x7ffc0000 [ 6843.290079][ T29] audit: type=1326 audit(134224571.176:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14240 comm="syz.2.14707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6845.201704][T14252] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14709'. [ 6846.250435][ T29] audit: type=1400 audit(134224574.146:1429): avc: denied { mac_admin } for pid=14251 comm="syz.2.14709" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6846.251058][T14252] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 6846.251821][ T29] audit: type=1400 audit(134224574.146:1430): avc: denied { relabelto } for pid=14251 comm="syz.2.14709" name="memfd:" dev="tmpfs" ino=1304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 6846.252366][ T29] audit: type=1400 audit(134224574.146:1431): avc: denied { associate } for pid=14251 comm="syz.2.14709" name="memfd:" dev="tmpfs" ino=1304 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hwdata_t:s0" [ 6846.326956][T14252] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6846.328910][T14252] netdevsim netdevsim2 eth3 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6846.583064][T14252] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6846.584416][T14252] netdevsim netdevsim2 eth2 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6846.661764][T14252] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6846.662011][T14252] netdevsim netdevsim2 eth1 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6846.828459][T14252] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6846.831209][T14252] netdevsim netdevsim2 eth0 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6847.143242][T11999] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20004 - 0 [ 6847.143663][T11999] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 6847.293922][T12003] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20004 - 0 [ 6847.294414][T12003] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 6847.403554][T11999] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20004 - 0 [ 6847.404250][T11999] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 6847.602979][T11999] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20004 - 0 [ 6847.604472][T11999] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 6849.610631][ T29] audit: type=1400 audit(134224577.496:1432): avc: denied { map } for pid=14310 comm="syz.2.14711" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=141425 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6849.613184][ T29] audit: type=1400 audit(134224577.506:1433): avc: denied { read write } for pid=14310 comm="syz.2.14711" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=141425 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6853.183138][ T29] audit: type=1400 audit(134224581.076:1434): avc: denied { watch } for pid=14321 comm="syz.2.14714" path="/509/file0" dev="tmpfs" ino=2604 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6860.675562][ T29] audit: type=1400 audit(134224588.566:1435): avc: denied { execute } for pid=14336 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6860.690398][ T29] audit: type=1400 audit(134224588.566:1436): avc: denied { execute_no_trans } for pid=14336 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6860.737259][ T29] audit: type=1400 audit(134224588.626:1437): avc: denied { execmem } for pid=14336 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6860.831253][ T29] audit: type=1400 audit(134224588.716:1438): avc: denied { mounton } for pid=14337 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6861.103146][ T29] audit: type=1400 audit(134224588.996:1439): avc: denied { append } for pid=14339 comm="syz.2.14720" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6861.143670][T14340] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14720'. [ 6861.164803][T14340] veth0_macvtap: left promiscuous mode [ 6862.932977][ T29] audit: type=1326 audit(134224590.826:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14357 comm="syz.2.14724" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6862.968053][ T29] audit: type=1326 audit(134224590.856:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14357 comm="syz.2.14724" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6862.986758][ T29] audit: type=1326 audit(134224590.876:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14357 comm="syz.2.14724" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6862.987118][ T29] audit: type=1326 audit(134224590.876:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14357 comm="syz.2.14724" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6862.987240][ T29] audit: type=1326 audit(134224590.876:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14357 comm="syz.2.14724" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.662635][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 6866.663682][ T29] audit: type=1326 audit(134224594.556:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.669539][ T29] audit: type=1326 audit(134224594.556:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.682685][ T29] audit: type=1326 audit(134224594.576:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.685327][ T29] audit: type=1326 audit(134224594.576:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.693874][ T29] audit: type=1326 audit(134224594.586:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=261 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.700954][ T29] audit: type=1326 audit(134224594.596:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6866.703923][ T29] audit: type=1326 audit(134224594.596:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14492 comm="syz.2.14729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6867.155237][T14337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6867.174204][T14337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6871.628201][T14337] hsr_slave_0: entered promiscuous mode [ 6871.641282][T14337] hsr_slave_1: entered promiscuous mode [ 6872.659108][ T29] audit: type=1400 audit(134224600.536:1477): avc: denied { create } for pid=14670 comm="syz.2.14734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 6872.890694][T14337] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 6872.906859][T14337] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 6872.931886][T14337] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 6872.941218][T14337] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 6874.837477][T14708] IPv6: NLM_F_CREATE should be specified when creating new route [ 6875.094652][T14712] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14738'. [ 6875.528149][T14337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6875.673880][T14719] netlink: 224 bytes leftover after parsing attributes in process `syz.2.14740'. [ 6878.838991][ T29] audit: type=1400 audit(134224606.726:1478): avc: denied { read write } for pid=14752 comm="syz.2.14748" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6878.843694][ T29] audit: type=1400 audit(134224606.736:1479): avc: denied { open } for pid=14752 comm="syz.2.14748" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6878.864101][ T29] audit: type=1400 audit(134224606.756:1480): avc: denied { ioctl } for pid=14752 comm="syz.2.14748" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6879.888737][ T29] audit: type=1400 audit(134224607.776:1481): avc: denied { write } for pid=14760 comm="syz.2.14749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6884.221755][ T29] audit: type=1400 audit(134224612.116:1482): avc: denied { sys_module } for pid=14337 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6884.235726][ T29] audit: type=1400 audit(134224612.116:1483): avc: denied { module_request } for pid=14337 comm="syz-executor" kmod="netdevsim4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6884.427755][ T29] audit: type=1400 audit(134224612.316:1484): avc: denied { read } for pid=14797 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6884.474473][ T29] audit: type=1400 audit(134224612.366:1485): avc: denied { map_create } for pid=14797 comm="syz.2.14756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6884.474974][ T29] audit: type=1400 audit(134224612.366:1486): avc: denied { bpf } for pid=14797 comm="syz.2.14756" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6884.475227][ T29] audit: type=1400 audit(134224612.366:1487): avc: denied { map_read map_write } for pid=14797 comm="syz.2.14756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6884.486315][ T29] audit: type=1400 audit(134224612.376:1488): avc: denied { prog_load } for pid=14797 comm="syz.2.14756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6884.502598][ T29] audit: type=1400 audit(134224612.396:1489): avc: denied { perfmon } for pid=14797 comm="syz.2.14756" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6884.506147][ T29] audit: type=1400 audit(134224612.396:1490): avc: denied { prog_run } for pid=14797 comm="syz.2.14756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6884.738492][ T29] audit: type=1400 audit(134224612.626:1491): avc: denied { allowed } for pid=14801 comm="syz.2.14757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6887.017438][T14337] veth0_vlan: entered promiscuous mode [ 6887.050316][T14337] veth1_vlan: entered promiscuous mode [ 6887.148057][T14337] veth0_macvtap: entered promiscuous mode [ 6887.166549][T14337] veth1_macvtap: entered promiscuous mode [ 6887.292518][T10782] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6887.294897][T10782] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6887.295302][T10782] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6887.295444][T10782] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6889.586722][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 6889.598013][ T29] audit: type=1400 audit(134224617.476:1519): avc: denied { create } for pid=14847 comm="syz.4.14768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6889.627999][ T29] audit: type=1400 audit(134224617.516:1520): avc: denied { write } for pid=14847 comm="syz.4.14768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6890.210037][ T29] audit: type=1400 audit(134224618.096:1521): avc: denied { create } for pid=14849 comm="syz.2.14769" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6890.329988][ T29] audit: type=1326 audit(134224618.216:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.342620][ T29] audit: type=1326 audit(134224618.236:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.346100][ T29] audit: type=1326 audit(134224618.236:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.351350][ T29] audit: type=1326 audit(134224618.246:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.364703][ T29] audit: type=1326 audit(134224618.256:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.369224][ T29] audit: type=1326 audit(134224618.256:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6890.382967][ T29] audit: type=1326 audit(134224618.276:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14851 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6892.963413][T14887] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14783'. [ 6892.992977][T14887] netlink: 32 bytes leftover after parsing attributes in process `syz.2.14783'. [ 6893.033564][T14891] netlink: 'syz.4.14784': attribute type 10 has an invalid length. [ 6893.081853][T14891] netlink: 'syz.4.14784': attribute type 10 has an invalid length. [ 6896.841145][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 6896.841468][ T29] audit: type=1400 audit(134224624.736:1592): avc: denied { ioctl } for pid=14921 comm="syz.4.14794" path="socket:[141267]" dev="sockfs" ino=141267 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6897.265244][ T29] audit: type=1400 audit(134224625.156:1593): avc: denied { ioctl } for pid=14930 comm="syz.4.14796" path="socket:[141278]" dev="sockfs" ino=141278 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6897.623295][T14939] pimreg: entered allmulticast mode [ 6897.705373][ T29] audit: type=1400 audit(134224625.586:1594): avc: denied { watch_reads } for pid=14938 comm="syz.4.14798" path="/19" dev="tmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6898.284079][ T29] audit: type=1400 audit(134224626.176:1595): avc: denied { create } for pid=14945 comm="syz.4.14800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6898.303624][ T29] audit: type=1400 audit(134224626.196:1596): avc: denied { setopt } for pid=14945 comm="syz.4.14800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6898.366721][ T29] audit: type=1400 audit(134224626.256:1597): avc: denied { ioctl } for pid=14945 comm="syz.4.14800" path="socket:[141989]" dev="sockfs" ino=141989 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6899.612049][ T29] audit: type=1400 audit(134224627.506:1598): avc: denied { create } for pid=14955 comm="syz.4.14802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6899.651212][ T29] audit: type=1400 audit(134224627.536:1599): avc: denied { ioctl } for pid=14955 comm="syz.4.14802" path="socket:[141299]" dev="sockfs" ino=141299 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6901.402893][ T29] audit: type=1400 audit(134224629.296:1600): avc: denied { connect } for pid=14994 comm="syz.2.14808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6902.126563][ T29] audit: type=1400 audit(134224630.016:1601): avc: denied { map } for pid=15000 comm="syz.2.14810" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=142029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6902.165750][ T29] audit: type=1400 audit(134224630.036:1602): avc: denied { read write } for pid=15000 comm="syz.2.14810" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=142029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6902.712077][T15007] IPv6: Can't replace route, no match found [ 6902.971623][ T29] audit: type=1400 audit(134224630.866:1603): avc: denied { create } for pid=15008 comm="syz.4.14813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6903.144038][ T29] audit: type=1400 audit(134224631.036:1604): avc: denied { execute } for pid=15008 comm="syz.4.14813" path="/27/cpu.stat" dev="tmpfs" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6903.173125][ T29] audit: type=1400 audit(134224631.066:1605): avc: denied { bind } for pid=15008 comm="syz.4.14813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6904.153055][ T29] audit: type=1400 audit(134224632.046:1606): avc: denied { block_suspend } for pid=15011 comm="syz.4.14814" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6904.902082][ T29] audit: type=1400 audit(134224632.766:1607): avc: denied { name_bind } for pid=15019 comm="syz.2.14816" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6905.505265][T15024] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 6905.564509][T15024] sch_tbf: burst 14 is lower than device lo mtu (65550) ! [ 6905.746677][T15025] netlink: 'syz.4.14817': attribute type 13 has an invalid length. [ 6907.443321][T11997] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6907.443746][T11997] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6907.443971][T11997] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6907.444082][T11997] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6907.575718][ T29] audit: type=1400 audit(134224635.466:1608): avc: denied { name_bind } for pid=15028 comm="syz.2.14818" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 6908.307395][ T29] audit: type=1400 audit(134224636.196:1609): avc: denied { ioctl } for pid=15031 comm="syz.4.14819" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6910.485046][ T29] audit: type=1400 audit(134224638.376:1610): avc: denied { connect } for pid=15038 comm="syz.2.14820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6910.706653][ T29] audit: type=1400 audit(134224638.596:1611): avc: denied { audit_write } for pid=15041 comm="syz.4.14822" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6910.710694][ T29] audit: type=1107 audit(134224638.596:1612): pid=15041 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='ä' [ 6910.907982][T15044] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14823'. [ 6915.252327][ T29] audit: type=1400 audit(134224643.146:1613): avc: denied { create } for pid=15076 comm="syz.4.14834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6915.312147][ T29] audit: type=1400 audit(134224643.196:1614): avc: denied { write } for pid=15076 comm="syz.4.14834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6916.543100][ T29] audit: type=1400 audit(134224644.436:1615): avc: denied { ioctl } for pid=15088 comm="syz.2.14836" path="socket:[142158]" dev="sockfs" ino=142158 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6916.546749][ T29] audit: type=1400 audit(134224644.436:1616): avc: denied { bind } for pid=15088 comm="syz.2.14836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6917.765805][ T29] audit: type=1400 audit(134224645.656:1617): avc: denied { create } for pid=15103 comm="syz.2.14838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6917.802725][ T29] audit: type=1400 audit(134224645.696:1618): avc: denied { write } for pid=15103 comm="syz.2.14838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6918.443077][ T29] audit: type=1400 audit(134224646.326:1619): avc: denied { relabelfrom } for pid=15106 comm="syz.2.14839" name="" dev="pipefs" ino=142502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 6919.534198][T15118] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 6920.526617][ T29] audit: type=1400 audit(134224648.416:1620): avc: denied { create } for pid=15129 comm="syz.4.14848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6921.130813][ T29] audit: type=1400 audit(134224649.016:1621): avc: denied { execute } for pid=15137 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6921.146224][ T29] audit: type=1400 audit(134224649.036:1622): avc: denied { execute_no_trans } for pid=15137 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6921.307796][ T29] audit: type=1400 audit(134224649.196:1623): avc: denied { execmem } for pid=15137 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6921.461727][ T29] audit: type=1400 audit(134224649.356:1624): avc: denied { mounton } for pid=15138 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6921.622752][T11999] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6921.623238][T11999] netdevsim netdevsim2 eth3 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6921.721097][T11999] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6921.721395][T11999] netdevsim netdevsim2 eth2 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6921.912166][T11999] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6921.912673][T11999] netdevsim netdevsim2 eth1 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6922.094138][T11999] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 6922.094627][T11999] netdevsim netdevsim2 eth0 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 6922.917301][T11999] bond2 (unregistering): (slave geneve2): Releasing backup interface [ 6923.008205][T11999] bond1 (unregistering): (slave macvlan2): Releasing backup interface [ 6923.112907][T11999] bond0 (unregistering): Released all slaves [ 6923.141503][T11999] bond1 (unregistering): Released all slaves [ 6923.165404][T11999] bond2 (unregistering): Released all slaves [ 6923.195275][T11999] bond3 (unregistering): Released all slaves [ 6923.430679][T11999] hsr_slave_0: left promiscuous mode [ 6923.440757][T11999] hsr_slave_1: left promiscuous mode [ 6923.461036][T11999] veth1_macvtap: left promiscuous mode [ 6923.462909][T11999] veth1_vlan: left promiscuous mode [ 6923.470464][T11999] veth0_vlan: left promiscuous mode [ 6924.243774][ T29] audit: type=1400 audit(134224652.136:1625): avc: denied { append } for pid=15179 comm="syz.4.14858" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6924.573177][ T29] audit: type=1326 audit(134224652.466:1626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15181 comm="syz.4.14859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6924.576563][ T29] audit: type=1326 audit(134224652.466:1627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15181 comm="syz.4.14859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6924.580927][ T29] audit: type=1326 audit(134224652.476:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15181 comm="syz.4.14859" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6924.589001][ T29] audit: type=1326 audit(134224652.476:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15181 comm="syz.4.14859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6925.530457][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 6925.530955][ T29] audit: type=1400 audit(134224653.416:1633): avc: denied { open } for pid=15194 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6926.030775][ T29] audit: type=1400 audit(134224653.896:1634): avc: denied { search } for pid=15220 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.033673][ T29] audit: type=1400 audit(134224653.896:1635): avc: denied { search } for pid=15220 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.035608][ T29] audit: type=1400 audit(134224653.896:1636): avc: denied { search } for pid=15220 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.041155][ T29] audit: type=1400 audit(134224653.896:1637): avc: denied { search } for pid=15220 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.081078][ T29] audit: type=1400 audit(134224653.946:1638): avc: denied { read open } for pid=15257 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.085642][ T29] audit: type=1400 audit(134224653.976:1639): avc: denied { getattr } for pid=15257 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.218673][ T29] audit: type=1400 audit(134224654.106:1640): avc: denied { add_name } for pid=15220 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6926.230045][ T29] audit: type=1400 audit(134224654.106:1641): avc: denied { create } for pid=15220 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6926.243512][ T29] audit: type=1400 audit(134224654.136:1642): avc: denied { write open } for pid=15220 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth9.link" dev="tmpfs" ino=94 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6928.552898][T15138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6928.591505][T15138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6932.761843][T15138] hsr_slave_0: entered promiscuous mode [ 6932.802258][T15138] hsr_slave_1: entered promiscuous mode [ 6932.804359][T15138] debugfs: 'hsr0' already exists in 'hsr' [ 6932.805222][T15138] Cannot create hsr debugfs directory [ 6934.256444][T15138] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 6934.277209][T15138] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 6934.324774][T15138] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 6934.371757][T15138] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 6936.266286][T15138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6943.815167][T15138] veth0_vlan: entered promiscuous mode [ 6943.870228][T15138] veth1_vlan: entered promiscuous mode [ 6944.305616][T15138] veth0_macvtap: entered promiscuous mode [ 6944.366308][T15138] veth1_macvtap: entered promiscuous mode [ 6944.552158][ T5546] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6944.552667][ T5546] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6944.552853][ T5546] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6944.552923][ T5546] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6944.857208][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 6944.857657][ T29] audit: type=1400 audit(134224672.746:1650): avc: denied { write } for pid=15138 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 6944.857980][ T29] audit: type=1400 audit(134224672.746:1651): avc: denied { open } for pid=15138 comm="syz-executor" path="/syzcgroup/cpu/syz2/cgroup.procs" dev="cgroup" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 6948.292848][ T29] audit: type=1326 audit(134224676.186:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15623 comm="syz.2.14870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6948.311085][ T29] audit: type=1326 audit(134224676.196:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15623 comm="syz.2.14870" exe="/syz-executor" sig=0 arch=40000028 syscall=391 compat=0 ip=0x132970 code=0x7ffc0000 [ 6948.311544][ T29] audit: type=1326 audit(134224676.196:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15623 comm="syz.2.14870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6948.341141][ T29] audit: type=1326 audit(134224676.216:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15623 comm="syz.2.14870" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6948.831881][ T29] audit: type=1400 audit(134224676.726:1656): avc: denied { create } for pid=15626 comm="syz.2.14871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 6949.620846][ T29] audit: type=1400 audit(134224677.516:1657): avc: denied { create } for pid=15631 comm="syz.2.14872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6949.683666][ T29] audit: type=1400 audit(134224677.576:1658): avc: denied { setopt } for pid=15631 comm="syz.2.14872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6950.290292][ T29] audit: type=1400 audit(134224678.176:1659): avc: denied { execute_no_trans } for pid=15637 comm="syz.2.14874" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=262 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6951.124019][ T29] audit: type=1400 audit(134224679.016:1660): avc: denied { mount } for pid=15642 comm="syz.2.14876" name="/" dev="ramfs" ino=142912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 6955.471851][ T29] audit: type=1326 audit(134224683.366:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.474575][ T29] audit: type=1326 audit(134224683.366:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.496236][ T29] audit: type=1326 audit(134224683.386:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.499064][ T29] audit: type=1326 audit(134224683.386:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.504937][ T29] audit: type=1326 audit(134224683.396:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.522095][ T29] audit: type=1326 audit(134224683.406:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.522498][ T29] audit: type=1326 audit(134224683.416:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.525997][ T29] audit: type=1326 audit(134224683.416:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.842706][ T29] audit: type=1326 audit(134224683.736:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.844055][ T29] audit: type=1326 audit(134224683.736:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15662 comm="syz.4.14883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6955.938470][T15663] netlink: 200 bytes leftover after parsing attributes in process `syz.4.14883'. [ 6957.805274][T15675] netlink: 'syz.4.14887': attribute type 21 has an invalid length. [ 6957.807107][T15675] netlink: 156 bytes leftover after parsing attributes in process `syz.4.14887'. [ 6957.808584][T15675] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14887'. [ 6958.483599][T15686] netlink: 8 bytes leftover after parsing attributes in process `syz.4.14890'. [ 6959.831528][T15699] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 6960.373804][T15712] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14895'. [ 6963.601522][T15741] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14906'. [ 6963.611909][T15741] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14906'. [ 6964.413377][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 6964.413708][ T29] audit: type=1326 audit(134224692.296:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.442143][ T29] audit: type=1326 audit(134224692.336:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.451851][ T29] audit: type=1326 audit(134224692.346:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.461203][ T29] audit: type=1326 audit(134224692.346:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.461455][ T29] audit: type=1326 audit(134224692.356:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.461605][ T29] audit: type=1326 audit(134224692.356:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.461726][ T29] audit: type=1326 audit(134224692.356:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.461827][ T29] audit: type=1326 audit(134224692.356:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 6964.490959][ T29] audit: type=1326 audit(134224692.386:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15745 comm="syz.2.14908" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132970 code=0x7ffc0000 [ 6965.672606][ T29] audit: type=1326 audit(134224693.566:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15761 comm="syz.4.14913" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6966.063355][T15773] netlink: 200 bytes leftover after parsing attributes in process `syz.4.14915'. [ 6966.064015][T15773] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14915'. [ 6966.064395][T15773] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14915'. [ 6966.064604][T15773] netlink: 'syz.4.14915': attribute type 6 has an invalid length. [ 6968.030381][T15793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15793 comm=syz.4.14921 [ 6968.030925][T15793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15793 comm=syz.4.14921 [ 6969.883758][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 6969.884113][ T29] audit: type=1326 audit(134224697.776:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6969.884357][ T29] audit: type=1326 audit(134224697.776:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6969.938854][ T29] audit: type=1326 audit(134224697.826:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132970 code=0x7ffc0000 [ 6969.939884][ T29] audit: type=1326 audit(134224697.826:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6969.941774][ T29] audit: type=1326 audit(134224697.836:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 6970.639992][ T29] audit: type=1326 audit(134224698.526:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6970.643570][ T29] audit: type=1326 audit(134224698.526:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6970.786701][T15822] netlink: 16 bytes leftover after parsing attributes in process `syz.2.14930'. [ 6970.787320][T15822] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14930'. [ 6971.033407][ T29] audit: type=1326 audit(134224698.926:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132970 code=0x7ffc0000 [ 6971.038516][ T29] audit: type=1326 audit(134224698.926:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6971.124958][ T29] audit: type=1326 audit(134224699.016:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15812 comm="syz.4.14928" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132970 code=0x7ffc0000 [ 6978.723143][T15878] netlink: 20 bytes leftover after parsing attributes in process `syz.2.14945'. [ 6979.389932][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 6979.391138][ T29] audit: type=1400 audit(134224707.276:1827): avc: denied { create } for pid=15880 comm="syz.2.14946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6981.063192][ T29] audit: type=1326 audit(134224708.956:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.066869][ T29] audit: type=1326 audit(134224708.956:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.074942][ T29] audit: type=1326 audit(134224708.966:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.084228][ T29] audit: type=1326 audit(134224708.976:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.111351][ T29] audit: type=1326 audit(134224708.996:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.179150][ T29] audit: type=1326 audit(134224709.056:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.179474][ T29] audit: type=1326 audit(134224709.056:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.211940][ T29] audit: type=1326 audit(134224709.086:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6981.212375][ T29] audit: type=1326 audit(134224709.086:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15897 comm="syz.2.14951" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6982.921782][T15920] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14956'. [ 6983.676879][T15934] netlink: 'syz.4.14961': attribute type 3 has an invalid length. [ 6986.434036][T15971] netlink: 256 bytes leftover after parsing attributes in process `syz.4.14971'. [ 6988.776495][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 6988.776950][ T29] audit: type=1326 audit(134224716.626:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6988.777224][ T29] audit: type=1326 audit(134224716.626:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6988.777516][ T29] audit: type=1326 audit(134224716.636:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6988.777746][ T29] audit: type=1326 audit(134224716.636:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6988.777983][ T29] audit: type=1326 audit(134224716.646:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=38 compat=0 ip=0x132970 code=0x7ffc0000 [ 6988.778059][ T29] audit: type=1326 audit(134224716.646:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15997 comm="syz.4.14977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6990.081098][ T29] audit: type=1326 audit(134224717.956:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16009 comm="syz.4.14980" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6990.094537][ T29] audit: type=1326 audit(134224717.956:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16009 comm="syz.4.14980" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6990.103012][ T29] audit: type=1326 audit(134224717.976:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16009 comm="syz.4.14980" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6990.160189][ T29] audit: type=1326 audit(134224717.986:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16009 comm="syz.4.14980" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6991.435464][T16015] netlink: 8 bytes leftover after parsing attributes in process `syz.4.14982'. [ 6991.436134][T16015] netlink: 8 bytes leftover after parsing attributes in process `syz.4.14982'. [ 6992.333419][T16029] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 6992.333929][T16029] IPv6: NLM_F_CREATE should be set when creating new route [ 6997.914045][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 6997.914641][ T29] audit: type=1326 audit(134224725.806:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.921485][ T29] audit: type=1326 audit(134224725.816:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.924666][ T29] audit: type=1326 audit(134224725.816:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.950958][ T29] audit: type=1326 audit(134224725.836:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.954555][ T29] audit: type=1326 audit(134224725.836:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.957170][ T29] audit: type=1326 audit(134224725.846:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.965305][ T29] audit: type=1326 audit(134224725.846:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 6997.967958][ T29] audit: type=1326 audit(134224725.846:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.4.14995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7002.812384][ T29] audit: type=1400 audit(134224730.666:1901): avc: denied { read } for pid=16104 comm="syz.2.15013" name="file0" dev="tmpfs" ino=424 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 7002.820205][ T29] audit: type=1400 audit(134224730.666:1902): avc: denied { open } for pid=16104 comm="syz.2.15013" path="/81/file0" dev="tmpfs" ino=424 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 7003.283977][T16114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16114 comm=syz.2.15016 [ 7003.284397][T16114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16114 comm=syz.2.15016 [ 7007.803593][ T29] audit: type=1326 audit(134224735.696:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16165 comm="syz.2.15031" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 7007.923613][T16169] syz_tun: entered allmulticast mode [ 7007.945786][T16169] syz_tun: left allmulticast mode [ 7008.932208][T16174] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15034'. [ 7009.552570][ T29] audit: type=1400 audit(134224737.446:1904): avc: denied { write } for pid=16177 comm="syz.4.15035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7010.550489][ T29] audit: type=1326 audit(134224738.416:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.550781][ T29] audit: type=1326 audit(134224738.416:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.550997][ T29] audit: type=1326 audit(134224738.416:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.551189][ T29] audit: type=1326 audit(134224738.416:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.551357][ T29] audit: type=1326 audit(134224738.416:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.551557][ T29] audit: type=1326 audit(134224738.426:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.551754][ T29] audit: type=1326 audit(134224738.426:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7010.551946][ T29] audit: type=1326 audit(134224738.426:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16191 comm="syz.2.15036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7013.535706][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 7013.538317][ T29] audit: type=1400 audit(134224741.426:1955): avc: denied { write } for pid=16227 comm="syz.4.15043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7013.885851][ T29] audit: type=1400 audit(134224741.776:1956): avc: denied { bind } for pid=16233 comm="syz.4.15044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7017.166684][ T29] audit: type=1400 audit(134224745.056:1957): avc: denied { mount } for pid=16275 comm="syz.4.15051" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 7017.351810][ T29] audit: type=1400 audit(134224745.216:1958): avc: denied { mounton } for pid=16275 comm="syz.4.15051" path="/150/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 7017.385215][ T29] audit: type=1400 audit(134224745.276:1959): avc: denied { unmount } for pid=16275 comm="syz.4.15051" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 7017.536644][ T29] audit: type=1400 audit(134224745.426:1960): avc: denied { unmount } for pid=14337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 7019.087301][ T29] audit: type=1400 audit(134224746.976:1961): avc: denied { create } for pid=16235 comm="syz.2.15045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7021.250443][ T29] audit: type=1326 audit(134224749.136:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.252316][ T29] audit: type=1326 audit(134224749.146:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.260981][ T29] audit: type=1326 audit(134224749.156:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.263593][ T29] audit: type=1326 audit(134224749.156:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=182 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.265175][ T29] audit: type=1326 audit(134224749.156:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.296500][ T29] audit: type=1326 audit(134224749.156:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16304 comm="syz.4.15061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7021.536693][T16312] netlink: 'syz.4.15063': attribute type 1 has an invalid length. [ 7021.618106][T16312] 8021q: adding VLAN 0 to HW filter on device bond1 [ 7021.643375][T16312] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15063'. [ 7021.708712][T16312] bond1 (unregistering): Released all slaves [ 7021.900910][T16382] netlink: 48 bytes leftover after parsing attributes in process `syz.2.15065'. [ 7022.605163][T16393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7022.606803][T16393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7022.668189][ T29] audit: type=1326 audit(134224750.556:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16394 comm="syz.2.15070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7022.731676][ T29] audit: type=1326 audit(134224750.556:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16394 comm="syz.2.15070" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7022.735651][ T29] audit: type=1326 audit(134224750.556:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16394 comm="syz.2.15070" exe="/syz-executor" sig=0 arch=40000028 syscall=36 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.189843][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 7026.191085][ T29] audit: type=1326 audit(134224754.076:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.2.15083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.197064][ T29] audit: type=1326 audit(134224754.086:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.2.15083" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.199088][ T29] audit: type=1326 audit(134224754.086:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.2.15083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.203089][ T29] audit: type=1326 audit(134224754.086:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.2.15083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.456972][ T29] audit: type=1326 audit(134224754.346:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.480552][ T29] audit: type=1326 audit(134224754.376:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.512205][ T29] audit: type=1326 audit(134224754.406:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.527832][ T29] audit: type=1326 audit(134224754.416:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.551224][ T29] audit: type=1326 audit(134224754.446:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7026.558604][ T29] audit: type=1326 audit(134224754.446:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16444 comm="syz.2.15084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.226847][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 7031.240991][ T29] audit: type=1326 audit(134224759.106:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.269867][ T29] audit: type=1326 audit(134224759.116:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.280774][ T29] audit: type=1326 audit(134224759.116:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.282688][ T29] audit: type=1326 audit(134224759.116:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.289811][ T29] audit: type=1326 audit(134224759.116:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.300072][ T29] audit: type=1326 audit(134224759.126:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.302183][ T29] audit: type=1326 audit(134224759.136:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.305595][ T29] audit: type=1326 audit(134224759.136:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.319744][ T29] audit: type=1326 audit(134224759.146:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7031.328821][ T29] audit: type=1326 audit(134224759.146:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16470 comm="syz.2.15091" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7036.856363][T16489] netlink: 28 bytes leftover after parsing attributes in process `syz.2.15095'. [ 7036.856916][T16489] netlink: 108 bytes leftover after parsing attributes in process `syz.2.15095'. [ 7036.893074][T16489] netlink: 28 bytes leftover after parsing attributes in process `syz.2.15095'. [ 7036.903627][T16489] netlink: 108 bytes leftover after parsing attributes in process `syz.2.15095'. [ 7036.906182][T16489] netlink: 84 bytes leftover after parsing attributes in process `syz.2.15095'. [ 7037.235731][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 7037.236404][ T29] audit: type=1326 audit(134224765.126:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.238967][ T29] audit: type=1326 audit(134224765.126:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.240870][ T29] audit: type=1326 audit(134224765.136:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.242834][ T29] audit: type=1326 audit(134224765.136:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.243874][ T29] audit: type=1326 audit(134224765.136:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.244885][ T29] audit: type=1326 audit(134224765.136:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.247638][ T29] audit: type=1326 audit(134224765.136:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.250281][ T29] audit: type=1326 audit(134224765.136:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.253915][ T29] audit: type=1326 audit(134224765.146:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7037.272545][ T29] audit: type=1326 audit(134224765.166:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16491 comm="syz.2.15096" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7045.084685][T16528] syzkaller1: entered promiscuous mode [ 7045.086470][T16528] syzkaller1: entered allmulticast mode [ 7047.537425][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 7047.537977][ T29] audit: type=1326 audit(134224775.426:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16549 comm="syz.2.15113" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 7049.352604][T16553] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15113'. [ 7049.371211][T16553] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15113'. [ 7051.112407][ T29] audit: type=1326 audit(134224779.006:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.112801][ T29] audit: type=1326 audit(134224779.006:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.122760][ T29] audit: type=1326 audit(134224779.016:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.125615][ T29] audit: type=1326 audit(134224779.016:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.134245][ T29] audit: type=1326 audit(134224779.026:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.136187][ T29] audit: type=1326 audit(134224779.026:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.148886][ T29] audit: type=1326 audit(134224779.036:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.165949][ T29] audit: type=1326 audit(134224779.056:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7051.166498][ T29] audit: type=1326 audit(134224779.056:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.2.15115" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x132970 code=0x7ffc0000 [ 7052.293775][T16560] SELinux: Context system_u:object_r:hald_keymap_exec_t:s0 is not valid (left unmapped). [ 7060.379654][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 7060.384234][ T29] audit: type=1326 audit(134224788.266:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16596 comm="syz.2.15128" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7060.452785][ T29] audit: type=1326 audit(134224788.316:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16596 comm="syz.2.15128" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7060.455739][ T29] audit: type=1326 audit(134224788.326:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16596 comm="syz.2.15128" exe="/syz-executor" sig=0 arch=40000028 syscall=354 compat=0 ip=0x132970 code=0x7ffc0000 [ 7060.455873][ T29] audit: type=1326 audit(134224788.326:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16596 comm="syz.2.15128" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7060.455982][ T29] audit: type=1326 audit(134224788.326:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16596 comm="syz.2.15128" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.180600][ T29] audit: type=1326 audit(134224801.066:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.195010][ T29] audit: type=1326 audit(134224801.086:2090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.211458][ T29] audit: type=1326 audit(134224801.106:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.215755][ T29] audit: type=1326 audit(134224801.106:2092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.231099][ T29] audit: type=1326 audit(134224801.126:2093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.234796][ T29] audit: type=1326 audit(134224801.126:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.237099][ T29] audit: type=1326 audit(134224801.126:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.243241][ T29] audit: type=1326 audit(134224801.126:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.246740][ T29] audit: type=1326 audit(134224801.126:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x132970 code=0x7ffc0000 [ 7073.252367][ T29] audit: type=1326 audit(134224801.146:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16655 comm="syz.4.15149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7076.136901][T16674] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15156'. [ 7078.750561][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 7078.751119][T16690] netlink: 16 bytes leftover after parsing attributes in process `syz.4.15161'. [ 7078.752070][ T29] audit: type=1400 audit(134224806.636:2134): avc: denied { write } for pid=16689 comm="syz.4.15161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 7078.754701][ T29] audit: type=1400 audit(134224806.646:2135): avc: denied { nlmsg_write } for pid=16689 comm="syz.4.15161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 7079.653866][T16702] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15164'. [ 7079.695757][T16702] netlink: 32 bytes leftover after parsing attributes in process `syz.2.15164'. [ 7080.811932][ T29] audit: type=1400 audit(134224808.706:2136): avc: denied { lock } for pid=16708 comm="syz.2.15168" path="socket:[145831]" dev="sockfs" ino=145831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 7081.144958][T16711] netlink: 24 bytes leftover after parsing attributes in process `syz.2.15169'. [ 7081.785299][ T29] audit: type=1400 audit(134224809.676:2137): avc: denied { setattr } for pid=16728 comm="syz.2.15171" name="cgroup.procs" dev="cgroup" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 7083.315636][ T29] audit: type=1400 audit(134224811.206:2138): avc: denied { connect } for pid=16742 comm="syz.4.15177" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7083.381122][ T29] audit: type=1400 audit(134224811.256:2139): avc: denied { write } for pid=16742 comm="syz.4.15177" path="socket:[145206]" dev="sockfs" ino=145206 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7083.558480][T16745] *** NOT YET: opcode c3 *** [ 7087.273924][T16761] bond0: (slave bond_slave_0): Releasing backup interface [ 7087.424113][T16761] bond0: (slave bond_slave_1): Releasing backup interface [ 7087.500748][T16761] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 7087.519169][T16761] netlink: 'syz.4.15183': attribute type 10 has an invalid length. [ 7087.538209][T16761] netlink: 40 bytes leftover after parsing attributes in process `syz.4.15183'. [ 7087.588585][T16761] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 7089.166854][T16775] netlink: 65055 bytes leftover after parsing attributes in process `syz.4.15185'. [ 7091.082588][ T29] audit: type=1326 audit(134224818.976:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16788 comm="syz.2.15192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7091.086342][ T29] audit: type=1326 audit(134224818.976:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16788 comm="syz.2.15192" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x132970 code=0x7ffc0000 [ 7091.106807][ T29] audit: type=1326 audit(134224818.996:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16788 comm="syz.2.15192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7091.107388][ T29] audit: type=1326 audit(134224818.996:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16788 comm="syz.2.15192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7091.242872][T16792] netlink: 'syz.4.15193': attribute type 16 has an invalid length. [ 7091.250214][T16792] netlink: 156 bytes leftover after parsing attributes in process `syz.4.15193'. [ 7091.568873][ T29] audit: type=1804 audit(134224819.456:2144): pid=16797 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.4.15195" name="/newroot/198/file0" dev="tmpfs" ino=1027 res=1 errno=0 [ 7092.088501][T16808] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15199'. [ 7092.281980][ T29] audit: type=1400 audit(134224820.166:2145): avc: denied { kexec_image_load } for pid=16810 comm="syz.2.15201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 7092.556885][T16815] SELinux: Context system_u:object_r:syslogd_initrc_exec_t:s0 is not valid (left unmapped). [ 7092.560661][ T29] audit: type=1400 audit(134224820.456:2146): avc: denied { relabelto } for pid=16814 comm="syz.2.15202" name="file0" dev="tmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 7092.575454][ T29] audit: type=1400 audit(134224820.466:2147): avc: denied { associate } for pid=16814 comm="syz.2.15202" name="file0" dev="tmpfs" ino=1004 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 7092.616236][ T29] audit: type=1400 audit(134224820.506:2148): avc: denied { unlink } for pid=15138 comm="syz-executor" name="file0" dev="tmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 7096.924362][T16835] smc: net device bond0 applied user defined pnetid S [ 7096.927849][T16835] smc: net device bond0 erased user defined pnetid S [ 7097.442682][T16840] hid_parser_main: 20 callbacks suppressed [ 7097.443923][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.445047][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.446159][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.447279][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.448434][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.450568][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.451778][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.453633][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.454730][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.455785][T16840] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 7097.473976][T16840] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [sy] on syz0 [ 7107.260064][T16907] netlink: 12 bytes leftover after parsing attributes in process `syz.2.15226'. [ 7109.107611][ T29] audit: type=1400 audit(134224836.996:2149): avc: denied { create } for pid=16916 comm="syz.2.15230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 7109.158524][ T29] audit: type=1400 audit(134224837.046:2150): avc: denied { setopt } for pid=16916 comm="syz.2.15230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 7114.614375][T16957] netlink: 16 bytes leftover after parsing attributes in process `syz.2.15242'. [ 7114.655484][T16958] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15243'. [ 7114.672724][T16958] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15243'. [ 7114.954709][T16962] ip6gretap0: entered promiscuous mode [ 7114.976919][T16962] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15244'. [ 7118.945168][ T29] audit: type=1326 audit(134224846.836:2151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.945688][ T29] audit: type=1326 audit(134224846.836:2152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.964889][ T29] audit: type=1326 audit(134224846.856:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.965374][ T29] audit: type=1326 audit(134224846.856:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.965569][ T29] audit: type=1326 audit(134224846.856:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.979774][ T29] audit: type=1326 audit(134224846.866:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.981782][ T29] audit: type=1326 audit(134224846.876:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.982985][ T29] audit: type=1326 audit(134224846.876:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=0 ip=0x132970 code=0x7ffc0000 [ 7118.986917][ T29] audit: type=1326 audit(134224846.876:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7119.004300][ T29] audit: type=1326 audit(134224846.896:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16987 comm="syz.4.15252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7119.980097][T17007] netlink: 64 bytes leftover after parsing attributes in process `syz.2.15258'. [ 7120.892856][T17019] netlink: 40 bytes leftover after parsing attributes in process `syz.4.15263'. [ 7124.476175][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 7124.480592][ T29] audit: type=1400 audit(134224852.366:2165): avc: denied { bind } for pid=17043 comm="syz.2.15271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7124.483335][ T29] audit: type=1400 audit(134224852.376:2166): avc: denied { setopt } for pid=17043 comm="syz.2.15271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7129.166459][T17067] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17067 comm=syz.4.15278 [ 7135.166497][T17122] netlink: 'syz.4.15287': attribute type 3 has an invalid length. [ 7135.176066][T17122] netlink: 'syz.4.15287': attribute type 3 has an invalid length. [ 7152.494001][T17161] netlink: 128 bytes leftover after parsing attributes in process `syz.2.15298'. [ 7152.494693][T17161] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15298'. [ 7153.794904][ T29] audit: type=1326 audit(134224881.686:2167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="syz.2.15302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.797997][ T29] audit: type=1326 audit(134224881.686:2168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="syz.2.15302" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.812929][ T29] audit: type=1326 audit(134224881.706:2169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.816167][ T29] audit: type=1326 audit(134224881.706:2170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.833288][ T29] audit: type=1326 audit(134224881.716:2171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.835871][ T29] audit: type=1326 audit(134224881.726:2172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.841260][ T29] audit: type=1326 audit(134224881.736:2173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.844897][ T29] audit: type=1326 audit(134224881.736:2174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.852929][ T29] audit: type=1326 audit(134224881.746:2175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132970 code=0x7ffc0000 [ 7153.855587][ T29] audit: type=1326 audit(134224881.746:2176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17172 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7169.235561][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 7169.236684][ T29] audit: type=1326 audit(134224897.126:2184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17247 comm="syz.4.15320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7169.241712][ T29] audit: type=1326 audit(134224897.136:2185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17247 comm="syz.4.15320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7169.264563][ T29] audit: type=1326 audit(134224897.156:2186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17247 comm="syz.4.15320" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x132970 code=0x7ffc0000 [ 7169.364362][ T29] audit: type=1326 audit(134224897.256:2187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17247 comm="syz.4.15320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7169.377746][ T29] audit: type=1326 audit(134224897.256:2188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17247 comm="syz.4.15320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7174.309909][ T29] audit: type=1400 audit(134224902.196:2189): avc: denied { mount } for pid=17279 comm="syz.2.15329" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 7174.342627][ T29] audit: type=1400 audit(134224902.236:2190): avc: denied { mounton } for pid=17279 comm="syz.2.15329" path="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 7174.437679][ T29] audit: type=1400 audit(134224902.326:2191): avc: denied { unmount } for pid=15138 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 7178.618046][T17300] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15335'. [ 7179.523500][T17300] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 7179.621392][T17312] syzkaller1: entered promiscuous mode [ 7179.622556][T17312] syzkaller1: entered allmulticast mode [ 7181.964669][ T29] audit: type=1326 audit(134224909.826:2192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7181.989729][ T29] audit: type=1326 audit(134224909.876:2193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.012430][ T29] audit: type=1326 audit(134224909.906:2194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.012680][ T29] audit: type=1326 audit(134224909.906:2195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.017801][ T29] audit: type=1326 audit(134224909.906:2196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=132 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.026396][ T29] audit: type=1326 audit(134224909.916:2197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.026671][ T29] audit: type=1326 audit(134224909.916:2198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.034007][ T29] audit: type=1326 audit(134224909.926:2199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.048017][ T29] audit: type=1326 audit(134224909.936:2200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7182.056577][ T29] audit: type=1326 audit(134224909.946:2201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17328 comm="syz.2.15340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7183.121733][T17339] netlink: 68 bytes leftover after parsing attributes in process `syz.4.15344'. [ 7184.646433][T17352] netlink: 'syz.2.15347': attribute type 1 has an invalid length. [ 7184.650480][T17352] netlink: 36 bytes leftover after parsing attributes in process `syz.2.15347'. [ 7190.679205][T17386] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7190.691765][T17386] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7190.711668][T17386] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7190.712644][T17386] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7190.787517][ T29] kauditd_printk_skb: 136 callbacks suppressed [ 7190.787844][ T29] audit: type=1400 audit(134224918.676:2338): avc: denied { ioctl } for pid=17384 comm="syz.4.15356" path="socket:[147535]" dev="sockfs" ino=147535 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7194.235821][ T29] audit: type=1400 audit(134224922.106:2339): avc: denied { create } for pid=17398 comm="syz.4.15359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 7195.160735][ T29] audit: type=1326 audit(134224923.056:2340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.167347][ T29] audit: type=1326 audit(134224923.056:2341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.172346][ T29] audit: type=1326 audit(134224923.066:2342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.181485][ T29] audit: type=1326 audit(134224923.066:2343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.184820][ T29] audit: type=1326 audit(134224923.076:2344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.188428][ T29] audit: type=1326 audit(134224923.076:2345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.194883][ T29] audit: type=1326 audit(134224923.086:2346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.199727][ T29] audit: type=1326 audit(134224923.086:2347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17411 comm="syz.4.15362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7195.507947][T17421] netlink: 24 bytes leftover after parsing attributes in process `syz.4.15365'. [ 7195.584562][T17423] syz_tun: entered allmulticast mode [ 7195.596698][T17422] syz_tun: left allmulticast mode [ 7198.265715][T17437] IPv6: NLM_F_CREATE should be specified when creating new route [ 7213.263349][T17553] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 7215.351663][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 7215.352947][ T29] audit: type=1326 audit(134224943.246:2355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.355445][ T29] audit: type=1326 audit(134224943.246:2356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.357519][ T29] audit: type=1326 audit(134224943.246:2357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.361954][ T29] audit: type=1326 audit(134224943.256:2358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.363318][ T29] audit: type=1326 audit(134224943.256:2359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.372430][ T29] audit: type=1326 audit(134224943.266:2360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.389873][ T29] audit: type=1326 audit(134224943.276:2361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.391236][ T29] audit: type=1326 audit(134224943.276:2362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.393654][ T29] audit: type=1326 audit(134224943.276:2363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7215.395981][ T29] audit: type=1326 audit(134224943.286:2364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.2.15389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7217.580514][T17558] netlink: 8 bytes leftover after parsing attributes in process `syz.4.15387'. [ 7219.093920][T17611] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15395'. [ 7219.882117][T17624] netlink: 43 bytes leftover after parsing attributes in process `syz.4.15398'. [ 7221.136474][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 7221.136925][ T29] audit: type=1326 audit(134224949.026:2408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.147062][ T29] audit: type=1326 audit(134224949.036:2409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.147555][ T29] audit: type=1326 audit(134224949.036:2410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.160383][ T29] audit: type=1326 audit(134224949.046:2411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.160934][ T29] audit: type=1326 audit(134224949.056:2412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.183561][ T29] audit: type=1326 audit(134224949.076:2413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.196568][ T29] audit: type=1326 audit(134224949.076:2414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.207682][ T29] audit: type=1326 audit(134224949.086:2415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.208142][ T29] audit: type=1326 audit(134224949.106:2416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 7221.243621][ T29] audit: type=1326 audit(134224949.116:2417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17635 comm="syz.2.15401" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 7221.690668][ T30] INFO: task kworker/0:5:11591 blocked for more than 430 seconds. [ 7221.691943][ T30] Not tainted syzkaller #0 [ 7221.695671][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7221.697709][ T30] task:kworker/0:5 state:D stack:0 pid:11591 tgid:11591 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.701865][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.710573][ T30] Call trace: [ 7221.711894][ T30] [<81a63354>] (__schedule) from [<81a642e8>] (schedule+0x2c/0x130) [ 7221.713064][ T30] r10:ec6edd84 r9:00000002 r8:60000013 r7:829171a0 r6:ec6edd8c r5:83210c00 [ 7221.714189][ T30] r4:83210c00 [ 7221.715067][ T30] [<81a642bc>] (schedule) from [<81a646d0>] (schedule_preempt_disabled+0x18/0x24) [ 7221.716307][ T30] r5:83210c00 r4:8291719c [ 7221.717080][ T30] [<81a646b8>] (schedule_preempt_disabled) from [<81a67280>] (__mutex_lock.constprop.0+0x350/0xa24) [ 7221.721105][ T30] [<81a66f30>] (__mutex_lock.constprop.0) from [<81a67a28>] (__mutex_lock_slowpath+0x14/0x18) [ 7221.722722][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 [ 7221.723853][ T30] r4:00000000 [ 7221.724602][ T30] [<81a67a14>] (__mutex_lock_slowpath) from [<81a67a68>] (mutex_lock+0x3c/0x40) [ 7221.725841][ T30] [<81a67a2c>] (mutex_lock) from [<804e9f6c>] (_vm_unmap_aliases+0x68/0x240) [ 7221.727669][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.728833][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a5740 [ 7221.738896][ T30] r4:00000000 [ 7221.740350][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.741808][ T30] r9:83018405 r8:83210c00 r7:00000000 r6:83018400 r5:00001000 r4:7f26c000 [ 7221.742906][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.744138][ T30] r5:00001000 r4:df9ad000 [ 7221.745026][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.746692][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.747923][ T30] r5:84e2b78c r4:84ee7d80 [ 7221.749996][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.751415][ T30] r7:dddcfd80 r6:83018400 r5:84e2b78c r4:84ee7d80 [ 7221.752379][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.753512][ T30] r10:61c88647 r9:83210c00 r8:84ee7dac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 7221.754752][ T30] r4:84ee7d80 [ 7221.755462][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.757079][ T30] r10:00000000 r9:84ee7d80 r8:80278fec r7:edd35e60 r6:85729500 r5:83210c00 [ 7221.758082][ T30] r4:00000001 [ 7221.758745][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.761671][ T30] Exception stack(0xec6edfb0 to 0xec6edff8) [ 7221.762655][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7221.764006][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.765540][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7221.767439][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7221.768827][ T30] r4:857cd500 [ 7221.780728][ T30] INFO: task kworker/0:5:11591 is blocked on a mutex likely owned by task kworker/1:73:13548. SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 7221.782468][ T30] task:kworker/1:73 state:R running task stack:0 pid:13548 tgid:13548 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.786070][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.787717][ T30] Call trace: [ 7221.788825][ T30] [<81a63354>] (__schedule) from [<81a6471c>] (preempt_schedule_irq+0x40/0xa8) [ 7221.791160][ T30] r10:8280c9b4 r9:86c53c00 r8:80200c04 r7:ea63dd54 r6:ffffffff r5:86c53c00 [ 7221.792425][ T30] r4:00000000 [ 7221.793232][ T30] [<81a646dc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 7221.794878][ T30] Exception stack(0xea63dd20 to 0xea63dd68) [ 7221.795841][ T30] dd20: 93cc6000 ebb2f000 00000001 80239bf8 7f250000 00000001 82acb1c4 82aca5a0 [ 7221.796982][ T30] dd40: 7f250000 ebb2f000 8280c9b4 ea63dd9c ea63dda0 ea63dd70 80230af0 80239c10 [ 7221.798091][ T30] dd60: 80000013 ffffffff [ 7221.798965][ T30] r5:80000013 r4:80239c10 [ 7221.800274][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d30>] (__purge_vmap_area_lazy+0x284/0x458) [ 7221.802871][ T30] r4:82acb1e4 [ 7221.806038][ T30] [<804e9aac>] (__purge_vmap_area_lazy) from [<804ea0e8>] (_vm_unmap_aliases+0x1e4/0x240) [ 7221.807541][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea63ddc0 r5:ea63de08 [ 7221.811652][ T30] r4:ea63ddc0 [ 7221.812451][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.816436][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8ae40 [ 7221.817719][ T30] r4:00000000 [ 7221.818577][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.821006][ T30] r9:83018605 r8:86c53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 7221.822151][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.823350][ T30] r5:00001000 r4:e017b000 [ 7221.824146][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.826273][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.827448][ T30] r5:85a0638c r4:85877500 [ 7221.828159][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.830152][ T30] r7:ddde3d80 r6:83018600 r5:85a0638c r4:85877500 [ 7221.831133][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.832218][ T30] r10:61c88647 r9:86c53c00 r8:8587752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 7221.833368][ T30] r4:85877500 [ 7221.834076][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.835156][ T30] r10:00000000 r9:85877500 r8:80278fec r7:ea7e1e60 r6:85877a00 r5:86c53c00 [ 7221.836113][ T30] r4:00000001 [ 7221.837392][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.840335][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 7221.841293][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7221.842456][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.843530][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7221.844433][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7221.845446][ T30] r4:84e5cfc0 [ 7221.846617][ T30] INFO: task kworker/0:7:11655 blocked for more than 430 seconds. [ 7221.850864][ T30] Not tainted syzkaller #0 [ 7221.851718][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7221.852993][ T30] task:kworker/0:7 state:D stack:0 pid:11655 tgid:11655 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.854925][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.856171][ T30] Call trace: [ 7221.857223][ T30] [<81a63354>] (__schedule) from [<81a642e8>] (schedule+0x2c/0x130) [ 7221.858417][ T30] r10:df9d5d84 r9:00000002 r8:60010113 r7:829171a0 r6:df9d5d8c r5:85c6ec00 [ 7221.860535][ T30] r4:85c6ec00 [ 7221.861250][ T30] [<81a642bc>] (schedule) from [<81a646d0>] (schedule_preempt_disabled+0x18/0x24) [ 7221.862718][ T30] r5:85c6ec00 r4:8291719c [ 7221.863427][ T30] [<81a646b8>] (schedule_preempt_disabled) from [<81a67280>] (__mutex_lock.constprop.0+0x350/0xa24) [ 7221.864493][ T30] [<81a66f30>] (__mutex_lock.constprop.0) from [<81a67a28>] (__mutex_lock_slowpath+0x14/0x18) [ 7221.865624][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 [ 7221.866558][ T30] r4:00000000 [ 7221.867227][ T30] [<81a67a14>] (__mutex_lock_slowpath) from [<81a67a68>] (mutex_lock+0x3c/0x40) [ 7221.868193][ T30] [<81a67a2c>] (mutex_lock) from [<804e9f6c>] (_vm_unmap_aliases+0x68/0x240) [ 7221.869621][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.870760][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ea8c0 [ 7221.871670][ T30] r4:00000000 [ 7221.872299][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.873227][ T30] r9:83018405 r8:85c6ec00 r7:00000000 r6:83018400 r5:00001000 r4:7f26a000 [ 7221.874105][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.875286][ T30] r5:00001000 r4:df9a7000 [ 7221.876002][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.877222][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.881062][ T30] r5:84e2b38c r4:85886600 [ 7221.881811][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.883017][ T30] r7:dddcfd80 r6:83018400 r5:84e2b38c r4:85886600 [ 7221.883992][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.885105][ T30] r10:61c88647 r9:85c6ec00 r8:8588662c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 7221.885992][ T30] r4:85886600 [ 7221.890668][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.899966][ T30] r10:00000000 r9:85886600 r8:80278fec r7:ec7f9e60 r6:85886c80 r5:85c6ec00 [ 7221.901056][ T30] r4:00000001 [ 7221.901777][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.902945][ T30] Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) [ 7221.904042][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 7221.905190][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.906273][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7221.907211][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7221.908158][ T30] r4:8589fa80 [ 7221.909804][ T30] INFO: task kworker/0:7:11655 is blocked on a mutex likely owned by task kworker/1:73:13548. [ 7221.911012][ T30] task:kworker/1:73 state:R running task stack:0 pid:13548 tgid:13548 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.913302][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.914592][ T30] Call trace: [ 7221.915660][ T30] [<81a63354>] (__schedule) from [<81a6471c>] (preempt_schedule_irq+0x40/0xa8) [ 7221.916907][ T30] r10:8280c9b4 r9:86c53c00 r8:80200c04 r7:ea63dd54 r6:ffffffff r5:86c53c00 [ 7221.918087][ T30] r4:00000000 [ 7221.918783][ T30] [<81a646dc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 7221.920518][ T30] Exception stack(0xea63dd20 to 0xea63dd68) [ 7221.921361][ T30] dd20: 94375000 ebb2f000 00000001 80239bf8 7f250000 00000001 82acb1c4 82aca5a0 [ 7221.923041][ T30] dd40: 7f250000 ebb2f000 8280c9b4 ea63dd9c ea63dda0 ea63dd70 80230af0 80239c10 [ 7221.924486][ T30] dd60: 80000013 ffffffff [ 7221.925335][ T30] r5:80000013 r4:80239c10 [ 7221.926289][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d30>] (__purge_vmap_area_lazy+0x284/0x458) [ 7221.928502][ T30] r4:82acb1e4 [ 7221.940644][ T30] [<804e9aac>] (__purge_vmap_area_lazy) from [<804ea0e8>] (_vm_unmap_aliases+0x1e4/0x240) [ 7221.942162][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea63ddc0 r5:ea63de08 [ 7221.943665][ T30] r4:ea63ddc0 [ 7221.944475][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.945918][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8ae40 [ 7221.947014][ T30] r4:00000000 [ 7221.947965][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.949038][ T30] r9:83018605 r8:86c53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 7221.950634][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.951885][ T30] r5:00001000 r4:e017b000 [ 7221.952623][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.953693][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.954887][ T30] r5:85a0638c r4:85877500 [ 7221.955628][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.956824][ T30] r7:ddde3d80 r6:83018600 r5:85a0638c r4:85877500 [ 7221.957887][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.959097][ T30] r10:61c88647 r9:86c53c00 r8:8587752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 7221.960450][ T30] r4:85877500 [ 7221.961134][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.970833][ T30] r10:00000000 r9:85877500 r8:80278fec r7:ea7e1e60 r6:85877a00 r5:86c53c00 [ 7221.972116][ T30] r4:00000001 [ 7221.972949][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.974017][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 7221.974972][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7221.976069][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.977069][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7221.977930][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7221.978941][ T30] r4:84e5cfc0 [ 7221.980462][ T30] INFO: task kworker/0:8:11676 blocked for more than 430 seconds. [ 7221.981365][ T30] Not tainted syzkaller #0 [ 7221.982093][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7221.991419][ T30] task:kworker/0:8 state:D stack:0 pid:11676 tgid:11676 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.991989][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.992109][ T30] Call trace: [ 7221.992141][ T30] [<81a63354>] (__schedule) from [<81a642e8>] (schedule+0x2c/0x130) [ 7221.992252][ T30] r10:dfaf1d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfaf1d8c r5:8321d400 [ 7221.992296][ T30] r4:8321d400 [ 7221.992316][ T30] [<81a642bc>] (schedule) from [<81a646d0>] (schedule_preempt_disabled+0x18/0x24) [ 7221.992378][ T30] r5:8321d400 r4:8291719c [ 7221.992395][ T30] [<81a646b8>] (schedule_preempt_disabled) from [<81a67280>] (__mutex_lock.constprop.0+0x350/0xa24) [ 7221.992449][ T30] [<81a66f30>] (__mutex_lock.constprop.0) from [<81a67a28>] (__mutex_lock_slowpath+0x14/0x18) [ 7221.992536][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 [ 7221.992560][ T30] r4:00000000 [ 7221.992576][ T30] [<81a67a14>] (__mutex_lock_slowpath) from [<81a67a68>] (mutex_lock+0x3c/0x40) [ 7221.992651][ T30] [<81a67a2c>] (mutex_lock) from [<804e9f6c>] (_vm_unmap_aliases+0x68/0x240) [ 7221.992770][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.992908][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c0be00 [ 7221.992934][ T30] r4:00000000 [ 7221.992950][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.993019][ T30] r9:83018405 r8:8321d400 r7:00000000 r6:83018400 r5:00001000 r4:7f27c000 [ 7221.993126][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.993191][ T30] r5:00001000 r4:e8253000 [ 7221.993208][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.993262][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.993676][ T30] r5:84e2938c r4:84e0c300 [ 7221.993711][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.993779][ T30] r7:dddcfd80 r6:83018400 r5:84e2938c r4:84e0c300 [ 7221.993843][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.993917][ T30] r10:61c88647 r9:8321d400 r8:84e0c32c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 7221.993936][ T30] r4:84e0c300 [ 7221.993950][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.994015][ T30] r10:00000000 r9:84e0c300 r8:80278fec r7:df9d5e60 r6:85867500 r5:8321d400 [ 7221.994035][ T30] r4:00000001 [ 7221.994049][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.994172][ T30] Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) [ 7221.994220][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 7221.994311][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.994344][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7221.994405][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7221.994426][ T30] r4:858eaa80 [ 7221.995054][ T30] INFO: task kworker/0:8:11676 is blocked on a mutex likely owned by task kworker/1:73:13548. [ 7221.995091][ T30] task:kworker/1:73 state:R running task stack:0 pid:13548 tgid:13548 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7221.995400][ T30] Workqueue: events bpf_prog_free_deferred [ 7221.995462][ T30] Call trace: [ 7221.995491][ T30] [<81a63354>] (__schedule) from [<81a6471c>] (preempt_schedule_irq+0x40/0xa8) [ 7221.995568][ T30] r10:8280c9b4 r9:86c53c00 r8:80200c04 r7:ea63dd54 r6:ffffffff r5:86c53c00 [ 7221.995589][ T30] r4:00000000 [ 7221.995764][ T30] [<81a646dc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 7221.995831][ T30] Exception stack(0xea63dd20 to 0xea63dd68) [ 7221.995869][ T30] dd20: 94b99000 ebb2f000 00000001 80239bf8 7f250000 00000001 82acb1c4 82aca5a0 [ 7221.995904][ T30] dd40: 7f250000 ebb2f000 8280c9b4 ea63dd9c ea63dda0 ea63dd70 80230af0 80239c10 [ 7221.995927][ T30] dd60: 80000013 ffffffff [ 7221.995951][ T30] r5:80000013 r4:80239c10 [ 7221.995983][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d30>] (__purge_vmap_area_lazy+0x284/0x458) [ 7221.996074][ T30] r4:82acb1e4 [ 7221.996094][ T30] [<804e9aac>] (__purge_vmap_area_lazy) from [<804ea0e8>] (_vm_unmap_aliases+0x1e4/0x240) [ 7221.996156][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea63ddc0 r5:ea63de08 [ 7221.996176][ T30] r4:ea63ddc0 [ 7221.996191][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7221.996253][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8ae40 [ 7221.996270][ T30] r4:00000000 [ 7221.996475][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7221.996540][ T30] r9:83018605 r8:86c53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 7221.996593][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7221.996647][ T30] r5:00001000 r4:e017b000 [ 7221.997164][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7221.997228][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7221.997306][ T30] r5:85a0638c r4:85877500 [ 7221.997507][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7221.997583][ T30] r7:ddde3d80 r6:83018600 r5:85a0638c r4:85877500 [ 7221.997734][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7221.997807][ T30] r10:61c88647 r9:86c53c00 r8:8587752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 7221.997826][ T30] r4:85877500 [ 7221.997839][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7221.998375][ T30] r10:00000000 r9:85877500 r8:80278fec r7:ea7e1e60 r6:85877a00 r5:86c53c00 [ 7221.998401][ T30] r4:00000001 [ 7221.998443][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7221.998488][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 7221.998517][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7221.999065][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7221.999258][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.026736][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.026820][ T30] r4:84e5cfc0 [ 7222.026901][ T30] INFO: task kworker/0:11:11721 blocked for more than 430 seconds. [ 7222.026974][ T30] Not tainted syzkaller #0 [ 7222.027004][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7222.027023][ T30] task:kworker/0:11 state:D stack:0 pid:11721 tgid:11721 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7222.027325][ T30] Workqueue: events bpf_prog_free_deferred [ 7222.027657][ T30] Call trace: [ 7222.027711][ T30] [<81a63354>] (__schedule) from [<81a642e8>] (schedule+0x2c/0x130) [ 7222.027811][ T30] r10:e00b9d84 r9:00000002 r8:60000113 r7:829171a0 r6:e00b9d8c r5:841d3c00 [ 7222.027856][ T30] r4:841d3c00 [ 7222.027876][ T30] [<81a642bc>] (schedule) from [<81a646d0>] (schedule_preempt_disabled+0x18/0x24) [ 7222.028100][ T30] r5:841d3c00 r4:8291719c [ 7222.028124][ T30] [<81a646b8>] (schedule_preempt_disabled) from [<81a67280>] (__mutex_lock.constprop.0+0x350/0xa24) [ 7222.028182][ T30] [<81a66f30>] (__mutex_lock.constprop.0) from [<81a67a28>] (__mutex_lock_slowpath+0x14/0x18) [ 7222.028369][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b9e08 [ 7222.028399][ T30] r4:00000000 [ 7222.028418][ T30] [<81a67a14>] (__mutex_lock_slowpath) from [<81a67a68>] (mutex_lock+0x3c/0x40) [ 7222.028550][ T30] [<81a67a2c>] (mutex_lock) from [<804e9f6c>] (_vm_unmap_aliases+0x68/0x240) [ 7222.028623][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7222.028735][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba3c40 [ 7222.028762][ T30] r4:00000000 [ 7222.028897][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7222.028970][ T30] r9:83018405 r8:841d3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f270000 [ 7222.028991][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7222.029046][ T30] r5:00001000 r4:e41d5000 [ 7222.029122][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7222.029239][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7222.031419][ T30] r5:85fe638c r4:84e0ce80 [ 7222.031476][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7222.031580][ T30] r7:dddcfd80 r6:83018400 r5:85fe638c r4:84e0ce80 [ 7222.031599][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7222.031669][ T30] r10:61c88647 r9:841d3c00 r8:84e0ceac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 7222.031687][ T30] r4:84e0ce80 [ 7222.031700][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.031765][ T30] r10:00000000 r9:84e0ce80 r8:80278fec r7:dfb85e60 r6:85867880 r5:841d3c00 [ 7222.031784][ T30] r4:00000001 [ 7222.031807][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.031852][ T30] Exception stack(0xe00b9fb0 to 0xe00b9ff8) [ 7222.031885][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 7222.031916][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.031944][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.031978][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.031998][ T30] r4:858a02c0 [ 7222.032640][ T30] INFO: task kworker/0:11:11721 is blocked on a mutex likely owned by task kworker/1:73:13548. [ 7222.032690][ T30] task:kworker/1:73 state:R running task stack:0 pid:13548 tgid:13548 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7222.032810][ T30] Workqueue: events bpf_prog_free_deferred [ 7222.032877][ T30] Call trace: [ 7222.032907][ T30] [<81a63354>] (__schedule) from [<81a6471c>] (preempt_schedule_irq+0x40/0xa8) [ 7222.032983][ T30] r10:8280c9b4 r9:86c53c00 r8:80200c04 r7:ea63dd54 r6:ffffffff r5:86c53c00 [ 7222.033002][ T30] r4:00000000 [ 7222.033017][ T30] [<81a646dc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 7222.033070][ T30] Exception stack(0xea63dd20 to 0xea63dd68) [ 7222.033106][ T30] dd20: 94f03000 ebb2f000 00000001 80239bf8 7f250000 00000001 82acb1c4 82aca5a0 [ 7222.033138][ T30] dd40: 7f250000 ebb2f000 8280c9b4 ea63dd9c ea63dda0 ea63dd70 80230af0 80239c10 [ 7222.033161][ T30] dd60: 80000013 ffffffff [ 7222.033184][ T30] r5:80000013 r4:80239c10 [ 7222.033199][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d30>] (__purge_vmap_area_lazy+0x284/0x458) [ 7222.033259][ T30] r4:82acb1e4 [ 7222.033277][ T30] [<804e9aac>] (__purge_vmap_area_lazy) from [<804ea0e8>] (_vm_unmap_aliases+0x1e4/0x240) [ 7222.033337][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea63ddc0 r5:ea63de08 [ 7222.033356][ T30] r4:ea63ddc0 [ 7222.033369][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7222.033428][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8ae40 [ 7222.033446][ T30] r4:00000000 [ 7222.033461][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7222.033522][ T30] r9:83018605 r8:86c53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 7222.033543][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7222.033602][ T30] r5:00001000 r4:e017b000 [ 7222.033617][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7222.033665][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7222.033720][ T30] r5:85a0638c r4:85877500 [ 7222.033738][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7222.033809][ T30] r7:ddde3d80 r6:83018600 r5:85a0638c r4:85877500 [ 7222.033828][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7222.033892][ T30] r10:61c88647 r9:86c53c00 r8:8587752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 7222.033910][ T30] r4:85877500 [ 7222.033923][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.033987][ T30] r10:00000000 r9:85877500 r8:80278fec r7:ea7e1e60 r6:85877a00 r5:86c53c00 [ 7222.034007][ T30] r4:00000001 [ 7222.034021][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.034064][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 7222.034093][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7222.034126][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.034154][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.034186][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.034205][ T30] r4:84e5cfc0 [ 7222.034335][ T30] INFO: task kworker/0:43:12210 blocked for more than 430 seconds. [ 7222.034422][ T30] Not tainted syzkaller #0 [ 7222.034448][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7222.034465][ T30] task:kworker/0:43 state:D stack:0 pid:12210 tgid:12210 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7222.034519][ T30] Workqueue: events bpf_prog_free_deferred [ 7222.034569][ T30] Call trace: [ 7222.034595][ T30] [<81a63354>] (__schedule) from [<81a642e8>] (schedule+0x2c/0x130) [ 7222.034665][ T30] r10:dffd5d84 r9:00000002 r8:60010113 r7:829171a0 r6:dffd5d8c r5:85d7bc00 [ 7222.034682][ T30] r4:85d7bc00 [ 7222.034697][ T30] [<81a642bc>] (schedule) from [<81a646d0>] (schedule_preempt_disabled+0x18/0x24) [ 7222.034748][ T30] r5:85d7bc00 r4:8291719c [ 7222.034763][ T30] [<81a646b8>] (schedule_preempt_disabled) from [<81a67280>] (__mutex_lock.constprop.0+0x350/0xa24) [ 7222.034820][ T30] [<81a66f30>] (__mutex_lock.constprop.0) from [<81a67a28>] (__mutex_lock_slowpath+0x14/0x18) [ 7222.034887][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd5e08 [ 7222.034906][ T30] r4:00000000 [ 7222.034922][ T30] [<81a67a14>] (__mutex_lock_slowpath) from [<81a67a68>] (mutex_lock+0x3c/0x40) [ 7222.034970][ T30] [<81a67a2c>] (mutex_lock) from [<804e9f6c>] (_vm_unmap_aliases+0x68/0x240) [ 7222.035025][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7222.035090][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cdd880 [ 7222.035110][ T30] r4:00000000 [ 7222.035125][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7222.035182][ T30] r9:83018405 r8:85d7bc00 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [ 7222.035196][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7222.035247][ T30] r5:00001000 r4:e000b000 [ 7222.035262][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7222.035309][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7222.035362][ T30] r5:85c50f8c r4:84dfc680 [ 7222.035376][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7222.035433][ T30] r7:dddcfd80 r6:83018400 r5:85c50f8c r4:84dfc680 [ 7222.035448][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7222.035505][ T30] r10:61c88647 r9:85d7bc00 r8:84dfc6ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 7222.035521][ T30] r4:84dfc680 [ 7222.035534][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.035593][ T30] r10:00000000 r9:84dfc680 r8:80278fec r7:dfc49e60 r6:84dfcd80 r5:85d7bc00 [ 7222.035609][ T30] r4:00000001 [ 7222.035622][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.035660][ T30] Exception stack(0xdffd5fb0 to 0xdffd5ff8) [ 7222.035686][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 7222.035717][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.035743][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.035774][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.035790][ T30] r4:857728c0 [ 7222.036142][ T30] INFO: task kworker/0:43:12210 is blocked on a mutex likely owned by task kworker/1:73:13548. [ 7222.036173][ T30] task:kworker/1:73 state:R running task stack:0 pid:13548 tgid:13548 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 7222.036234][ T30] Workqueue: events bpf_prog_free_deferred [ 7222.036277][ T30] Call trace: [ 7222.036298][ T30] [<81a63354>] (__schedule) from [<81a6471c>] (preempt_schedule_irq+0x40/0xa8) [ 7222.036364][ T30] r10:8280c9b4 r9:86c53c00 r8:80200c04 r7:ea63dd54 r6:ffffffff r5:86c53c00 [ 7222.036380][ T30] r4:00000000 [ 7222.036393][ T30] [<81a646dc>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 7222.036438][ T30] Exception stack(0xea63dd20 to 0xea63dd68) [ 7222.036469][ T30] dd20: 94f03000 ebb2f000 00000001 80239bf8 7f250000 00000001 82acb1c4 82aca5a0 [ 7222.036500][ T30] dd40: 7f250000 ebb2f000 8280c9b4 ea63dd9c ea63dda0 ea63dd70 80230af0 80239c10 [ 7222.036520][ T30] dd60: 80000013 ffffffff [ 7222.036540][ T30] r5:80000013 r4:80239c10 [ 7222.036555][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9d30>] (__purge_vmap_area_lazy+0x284/0x458) [ 7222.036601][ T30] r4:82acb1e4 [ 7222.036615][ T30] [<804e9aac>] (__purge_vmap_area_lazy) from [<804ea0e8>] (_vm_unmap_aliases+0x1e4/0x240) [ 7222.036668][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea63ddc0 r5:ea63de08 [ 7222.036684][ T30] r4:ea63ddc0 [ 7222.036698][ T30] [<804e9f04>] (_vm_unmap_aliases) from [<804edd4c>] (vfree+0x16c/0x210) [ 7222.036756][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8ae40 [ 7222.036773][ T30] r4:00000000 [ 7222.036786][ T30] [<804edbe0>] (vfree) from [<80558a98>] (execmem_free+0x30/0x50) [ 7222.036845][ T30] r9:83018605 r8:86c53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 7222.036860][ T30] [<80558a68>] (execmem_free) from [<803c5f58>] (bpf_jit_free_exec+0x10/0x14) [ 7222.036907][ T30] r5:00001000 r4:e017b000 [ 7222.036921][ T30] [<803c5f48>] (bpf_jit_free_exec) from [<803c6338>] (bpf_jit_free+0x68/0xe4) [ 7222.036966][ T30] [<803c62d0>] (bpf_jit_free) from [<803c73e0>] (bpf_prog_free_deferred+0x140/0x158) [ 7222.037017][ T30] r5:85a0638c r4:85877500 [ 7222.037030][ T30] [<803c72a0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 7222.037088][ T30] r7:ddde3d80 r6:83018600 r5:85a0638c r4:85877500 [ 7222.037102][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 7222.037160][ T30] r10:61c88647 r9:86c53c00 r8:8587752c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 7222.037177][ T30] r4:85877500 [ 7222.037190][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.037247][ T30] r10:00000000 r9:85877500 r8:80278fec r7:ea7e1e60 r6:85877a00 r5:86c53c00 [ 7222.037263][ T30] r4:00000001 [ 7222.037277][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.037321][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 7222.037346][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 7222.037377][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.037448][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.037485][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.037507][ T30] r4:84e5cfc0 [ 7222.061459][ T30] NMI backtrace for cpu 1 [ 7222.061627][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 7222.061682][ T30] Hardware name: ARM-Versatile Express [ 7222.061713][ T30] Call trace: [ 7222.061782][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 7222.061911][ T30] r7:00000000 r6:00000113 r5:60000193 r4:82252424 [ 7222.061930][ T30] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 7222.062097][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 7222.062166][ T30] r5:00000001 r4:00000001 [ 7222.062257][ T30] [<8021f8bc>] (dump_stack) from [<81a4cf6c>] (nmi_cpu_backtrace+0x160/0x17c) [ 7222.062374][ T30] [<81a4ce0c>] (nmi_cpu_backtrace) from [<81a4d0b8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 7222.062444][ T30] r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [ 7222.062460][ T30] [<81a4cf88>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 7222.062531][ T30] r9:8281ba28 r8:8280c810 r7:000a8fdd r6:00007ccf r5:82abf7d4 r4:8609d40c [ 7222.062546][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fab0>] (watchdog+0x5d0/0x850) [ 7222.062607][ T30] [<8037f4e0>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.062796][ T30] r10:00000000 r9:00000000 r8:8037f4e0 r7:832a2780 r6:832a2780 r5:832e3000 [ 7222.062826][ T30] r4:00000001 [ 7222.062839][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.063080][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 7222.063157][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 7222.063192][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.063231][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.063265][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.063282][ T30] r4:833d5bc0 [ 7222.063446][ T30] Sending NMI from CPU 1 to CPUs 0: [ 7222.064922][ C0] NMI backtrace for cpu 0 [ 7222.065101][ C0] CPU: 0 UID: 0 PID: 2822 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 7222.065167][ C0] Hardware name: ARM-Versatile Express [ 7222.065223][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 7222.065305][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 7222.065364][ C0] pc : [<81a6d1bc>] lr : [<80a8ed48>] psr: 60000013 [ 7222.065405][ C0] sp : ead45eb0 ip : ead45ec0 fp : ead45ebc [ 7222.065443][ C0] r10: 82959554 r9 : 00000000 r8 : 00000000 [ 7222.065489][ C0] r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 [ 7222.065533][ C0] r3 : 00002a74 r2 : 00000000 r1 : 60000013 r0 : 84197840 [ 7222.065657][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 7222.065733][ C0] Control: 30c5387d Table: 84dfdd40 DAC: fffffffd [ 7222.065810][ C0] Call trace: [ 7222.065852][ C0] [<81a6d194>] (_raw_spin_unlock_irqrestore) from [<80a8ed48>] (pl011_console_device_unlock+0x20/0x24) [ 7222.065916][ C0] [<80a8ed28>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100) [ 7222.065992][ C0] [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4) [ 7222.066055][ C0] r6:8280c690 r5:841ce000 r4:829594b8 [ 7222.066074][ C0] [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.066145][ C0] r10:00000000 r9:829594b8 r8:802e37e0 r7:84751b80 r6:84751b80 r5:841ce000 [ 7222.066165][ C0] r4:00000001 [ 7222.066182][ C0] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.066230][ C0] Exception stack(0xead45fb0 to 0xead45ff8) [ 7222.066262][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 7222.066295][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.066325][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.066392][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.066420][ C0] r4:8422ef40 [ 7222.067287][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 7222.137248][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 7222.137742][ T30] Hardware name: ARM-Versatile Express [ 7222.138142][ T30] Call trace: [ 7222.138454][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 7222.138871][ T30] r7:82253148 r6:832e3000 r5:00000000 r4:82252424 [ 7222.139129][ T30] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 7222.139475][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 7222.140055][ T30] r5:00000000 r4:82a78d18 [ 7222.140302][ T30] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 7222.140798][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 7222.141156][ T30] r7:000a8fdd [ 7222.141314][ T30] [<80202800>] (panic) from [<8037f8f0>] (watchdog+0x410/0x850) [ 7222.141665][ T30] r3:00000001 r2:00000000 r1:00000001 r0:82253148 [ 7222.141934][ T30] [<8037f4e0>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 7222.142323][ T30] r10:00000000 r9:00000000 r8:8037f4e0 r7:832a2780 r6:832a2780 r5:832e3000 [ 7222.142704][ T30] r4:00000001 [ 7222.142998][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7222.143343][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 7222.143728][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 7222.144300][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7222.144690][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7222.145066][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 7222.145478][ T30] r4:833d5bc0 [ 7222.147907][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:00:41 Registers: info registers vcpu 0 CPU#0 R00=829c8ad0 R01=dddc73c8 R02=dddc7000 R03=81a61030 R04=82abd340 R05=4523d200 R06=0015feb0 R07=00000691 R08=00989680 R09=8280c960 R10=00989680 R11=ebb31de4 R12=ebb31de8 R13=ebb31dd8 R14=8130a578 R15=81a61040 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=005ca0a8 R01=005d2108 R02=0000006b R03=00000000 R04=00bdb538 R05=00000001 R06=00000003 R07=00bd91d8 R08=00000060 R09=005c901c R10=00003b94 R11=7eb332bc R12=00000000 R13=7eb33118 R14=0056f358 R15=0056e490 PSR=80010010 N--- A S usr32 s00=00000000 s01=943b0000 d00=943b000000000000 s02=004c5047 s03=0003b003 d01=0003b003004c5047 s04=03900300 s05=00000806 d02=0000080603900300 s06=98030100 s07=00080003 d03=0008000398030100 s08=0003a003 s09=01d80010 d04=01d800100003a003 s10=08000601 s11=03800222 d05=0380022208000601 s12=c6200800 s13=0008013f d06=0008013fc6200800 s14=0201c708 s15=ffffffff d07=ffffffff0201c708 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=080004e8 s33=04f00300 d16=04f00300080004e8 s34=ffffff04 s35=800303ff d17=800303ffffffff04 s36=ffff0405 s37=0303ffff d18=0303ffffffff0405 s38=08000590 s39=05980300 d19=0598030008000590 s40=03000800 s41=080005a0 d20=080005a003000800 s42=00028c00 s43=0a080006 d21=0a08000600028c00 s44=00038002 s45=0302a008 d22=0302a00800038002 s46=80040380 s47=01800301 d23=0180030180040380 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=dc5861d7 s53=81e636df d26=81e636dfdc5861d7 s54=ca69307a s55=0250cabe d27=0250cabeca69307a s56=1a576533 s57=7c1c5e1f d28=7c1c5e1f1a576533 s58=1b5c865e s59=140b18e3 d29=140b18e31b5c865e s60=05b8ddd0 s61=e683cce6 d30=e683cce605b8ddd0 s62=223706d6 s63=8bd5e67b d31=8bd5e67b223706d6 FPSCR: 00000000